From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 81B99C4167B for ; Tue, 31 Oct 2023 02:28:13 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 1E2606B027A; Mon, 30 Oct 2023 22:28:13 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 1935E6B0281; Mon, 30 Oct 2023 22:28:13 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 05AD96B0285; Mon, 30 Oct 2023 22:28:13 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id E8F966B027A for ; Mon, 30 Oct 2023 22:28:12 -0400 (EDT) Received: from smtpin18.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id C24CA120709 for ; Tue, 31 Oct 2023 02:28:12 +0000 (UTC) X-FDA: 81404172024.18.F2348C4 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.126]) by imf08.hostedemail.com (Postfix) with ESMTP id A48D5160018 for ; Tue, 31 Oct 2023 02:28:10 +0000 (UTC) Authentication-Results: imf08.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=BuIMI15p; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf08.hostedemail.com: domain of xiaoyao.li@intel.com designates 134.134.136.126 as permitted sender) smtp.mailfrom=xiaoyao.li@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1698719290; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=ErT9bozsFB6/ospkjZ5lveEr38iAXU0gXWZJxToBdTg=; b=jTlz1Uu2X7/Wg1XiLobPsWGu0iY7WxjSwuIyDnYtTeUsE2x6J0Kden70XqA24XhdxxCrdl affN/LxPbnqJpzlhdfsWb0D1GiQid3eTH2KKu5DrA3Tud2IvsFhgntJx559PBWvumE6+sJ 4w+fhCsHB5+4pHxLW8tzWT1ka3umWxo= ARC-Authentication-Results: i=1; imf08.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=BuIMI15p; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf08.hostedemail.com: domain of xiaoyao.li@intel.com designates 134.134.136.126 as permitted sender) smtp.mailfrom=xiaoyao.li@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1698719290; a=rsa-sha256; cv=none; b=NRXwukP2tnGMbk00QolueMAz0wzRPr5XbZfVPSe7HTARRlKBo/NYh1z+YIAAUYMeSGsyMZ 4ocnScgFhA4ifls8kVRQgoddZ6AUPo/muQGRFPsBtmpvswRZbiFL5Ke2WdB6Dnvm580Ppm xbyNHtf7S2020aGBbJcPVa2g2lfe3bQ= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1698719290; x=1730255290; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=vr6E776DqFsISXT/abuJv1DHpqFpjFuaZ5JfgggngVk=; b=BuIMI15paS4O474D/tJ3ESPG+5u1lGEewVuhvPJe7YZ0/1HEWfN/7M3c HpzVSw1qB1JI+u3zMh3NP36trFyqcHAkKXSSr7f5Rqjr1iY62B7OofwuO l1F52dqdFmmbEHHERIKtgpaW4kciWfagziccCFuEhZlrwYzxqIxi7FOgI UPYZ9Rtios6G1zuaTVEbKTGCOiIlBUjtoEZvAuRXf+fUHEMNPacOa+FT2 ntoIrjUluGFo7ilMLu7a1B5BV/LL6a6d6KnSb4KMTIMbskfw1TsJUj3A3 4PRUVCE/Zl6k0peS5ngn/KtHf9FH5kH5o1F38/SVmYOa9zyUfGFPHRdSi Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10879"; a="373249921" X-IronPort-AV: E=Sophos;i="6.03,264,1694761200"; d="scan'208";a="373249921" Received: from orviesa001.jf.intel.com ([10.64.159.141]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Oct 2023 19:28:09 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.03,264,1694761200"; d="scan'208";a="8161979" Received: from xiaoyaol-hp-g830.ccr.corp.intel.com (HELO [10.93.9.145]) ([10.93.9.145]) by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Oct 2023 19:27:57 -0700 Message-ID: Date: Tue, 31 Oct 2023 10:27:56 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory Content-Language: en-US To: Sean Christopherson , Paolo Bonzini , Marc Zyngier , Oliver Upton , Huacai Chen , Michael Ellerman , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , Alexander Viro , Christian Brauner , "Matthew Wilcox (Oracle)" , Andrew Morton Cc: kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Xu Yilun , Chao Peng , Fuad Tabba , Jarkko Sakkinen , Anish Moorthy , David Matlack , Yu Zhang , Isaku Yamahata , =?UTF-8?B?TWlja2HDq2wgU2FsYcO8?= =?UTF-8?Q?n?= , Vlastimil Babka , Vishal Annapurve , Ackerley Tng , Maciej Szmigiero , David Hildenbrand , Quentin Perret , Michael Roth , Wang , Liam Merwick , Isaku Yamahata , "Kirill A . Shutemov" References: <20231027182217.3615211-1-seanjc@google.com> <20231027182217.3615211-17-seanjc@google.com> From: Xiaoyao Li In-Reply-To: <20231027182217.3615211-17-seanjc@google.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: A48D5160018 X-Rspam-User: X-Rspamd-Server: rspam05 X-Stat-Signature: rkbyue6dwnrb1ugmer19e7tcjwnpkrgr X-HE-Tag: 1698719290-535059 X-HE-Meta: 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 7uXWNgnU jeNgnnqEV2LAi6qtQ8Fp18/N4amRu3ijpRsiNROR9VknYDbvrGKU0YPC/TEvVAbCJeC78DVypeHO1DyALWLt8s7Dao53gRMFHMrdCOpnJmp9VvkptAtH8q41759A9Q2L0MbudITUs/nnBCTXlZl185jsbsJosD8NMgkebIn4GjtdLKt4lWDmYGCY1BdvrHOA8EJx6V9akmJsf7br7R6aW9873pZ6AfZT/O67Nb/8I4KdV7lWMxWW8NY6Cfk2miNWqGb/fp9nXIk3GknrUl40BTf0cGjLdhLGalYwxWrTqK0yZzpConA3iJ9DZ/g== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 10/28/2023 2:21 AM, Sean Christopherson wrote: ... > +KVM_SET_USER_MEMORY_REGION2 is an extension to KVM_SET_USER_MEMORY_REGION that > +allows mapping guest_memfd memory into a guest. All fields shared with > +KVM_SET_USER_MEMORY_REGION identically. Userspace can set KVM_MEM_PRIVATE in > +flags to have KVM bind the memory region to a given guest_memfd range of > +[guest_memfd_offset, guest_memfd_offset + memory_size]. The target guest_memfd > +must point at a file created via KVM_CREATE_GUEST_MEMFD on the current VM, and > +the target range must not be bound to any other memory region. All standard > +bounds checks apply (use common sense). > + > :: > > struct kvm_userspace_memory_region2 { > @@ -6087,9 +6096,24 @@ applied. > __u64 guest_phys_addr; > __u64 memory_size; /* bytes */ > __u64 userspace_addr; /* start of the userspace allocated memory */ > + __u64 guest_memfd_offset; missing a tab > + __u32 guest_memfd; > + __u32 pad1; > + __u64 pad2[14]; > }; >