Received: by 2002:a05:6a10:144:0:0:0:0 with SMTP id 4csp1254927pxw; Sat, 9 Apr 2022 17:22:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJydD6SiVGcBGlbGB0kD7H3XqSjwCzeL2YmYupYUrOpcvlD1F/reogc3eQGdcJlQ/wmj69sL X-Received: by 2002:a63:2058:0:b0:399:24bb:77d3 with SMTP id r24-20020a632058000000b0039924bb77d3mr20982468pgm.412.1649550150654; Sat, 09 Apr 2022 17:22:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649550150; cv=none; d=google.com; s=arc-20160816; b=pePObDonnWMeKzBvhLkv2Dp2luoYTZYmiJtoqPobaDwTMd+qX3weWJjEHtVukNd6PD GHR1rQe+L7bVY/PAOPt7Dn3v4SATr4SEPmfKtbqfwO41Lg0eiGK1e0nNz/GVvFUOZM7i X1fzo+CNBZMdr33VBaC97qGLGzxcjevgqaL7XjWScfGE4bLCPWB3GnNRYkJmn58TqejS liS0wnVwCmlmeNJV884/jOdbiFRpsuyMkZ+W/REDmG7wDGLLBcMALgqupzc8WnwCb0sD gVSPZAZThD5XzQTKIwUeQQ45n7F9idq42YeSOi8xJhLHATNZveKJy+jC5CHzs2hWoGC1 vMTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=1qOh37iLUcxnJDmoGj1A0J8wEY8rbxtdTzE2pYYO2Ks=; b=1LaPO+lJ/Gl8hS3o3YHzkmTy5Q8r0gwtm42/VgtBeGFHKFoe9AiwiOHPdpUUEhmOZO 5ZgO1sqkow67qjYiMRk7UIWGRRktFvqjhGgKHKv8BY0CdBThx12FFGdfAav3quo4luWe 0ynqlNue07Dk1BD4f4sOpKzAksSYvjrrfsoxto5bUndIfAkFQQ3NxCRApqWWLOftECZY TC+FyaPMmXp5sjQkMsJUPkG9OWKbVbngq/bAxFuulp+vIlyvlWdyl0f9rQ6XbeBXyz0I ccicVwSdTltupKfBNEYLWZeDp8UHg8VAlFNv1/CipeLqMRpSJUZIhqY0pdxQFwWbru4E DO+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=K7ke0nxK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x5-20020a633105000000b003816043efd0si5371675pgx.453.2022.04.09.17.21.37; Sat, 09 Apr 2022 17:22:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=K7ke0nxK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239884AbiDHVhX (ORCPT + 99 others); Fri, 8 Apr 2022 17:37:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235929AbiDHVhW (ORCPT ); Fri, 8 Apr 2022 17:37:22 -0400 Received: from mail-pf1-x436.google.com (mail-pf1-x436.google.com [IPv6:2607:f8b0:4864:20::436]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A8C7124BFF for ; Fri, 8 Apr 2022 14:35:17 -0700 (PDT) Received: by mail-pf1-x436.google.com with SMTP id bo5so9500894pfb.4 for ; Fri, 08 Apr 2022 14:35:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=1qOh37iLUcxnJDmoGj1A0J8wEY8rbxtdTzE2pYYO2Ks=; b=K7ke0nxKWUWDfr1v0VmW7e7Sj+uaxy5yBp10RU78CNH/g52aooIPr2w/v94GPqq3yt zFQSXrnXOZwWVUdkVrnXqcdRHdIfF/bEXnSJnFQRftzCNuBi1e8Qhjqx8VPGVIHFvCXB 2Z8dmxdfIM2m4yiW/h/ciGT0wL20FvLMroNAuoVc3UK7tZGvENlBr1v4Ga4ak5TS0xT7 EVCU5/eAZq6lWcTbvTxiMajlg+tAlQpvVvxFpD9bd10ybCnJ2A+a3w5D0mo5UZtae6pZ 0Cu/TPA4wIOD9fd48Rf6GMXJ5k7Fa9yM+N6O3DNJ4Y5rx+o8OM4kClD90lO10A1XGyd+ MH1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=1qOh37iLUcxnJDmoGj1A0J8wEY8rbxtdTzE2pYYO2Ks=; b=keDV7P5cCPxKAiLwc62bEZkC2R4knV/cntN+FNP/Qb5Cg7btaccSbiFQ8w+JWT6KrW OABPFgmRcwYpStpx9xJL9b59lKTytcBfloWfJJZpZFxn5eQ9GWDA7RbDi2HmWLNF/R8e B0Gp3anSfssLhUeo6iymtVi40Np8UwqFM92kqP9Q8BVzOkoOE5L6+OqLH2s/qk2vEKmd unfgES2hux6iqnb+ioVj23vPhXR9N0zwng0aPy8w5JpnGvd2snbXo4PZbmXim3L8YkUc 9hO172WtBvmX7EN7HN/2vZ8LUsuUe9KWFEdBDk4KlNM5vGYzNxSMYmrr7GfAo6d3YGLp lZog== X-Gm-Message-State: AOAM532tWQUNhnFcHL0+GYdMWKMxICiBm+6L78X8vPglSR6bCcQcEP6f EYgPwp+6j7UK1UUkGSP0Lbs+xLYA0UYqwJZ/wCr5uQ== X-Received: by 2002:a65:53cc:0:b0:382:8506:f1a6 with SMTP id z12-20020a6553cc000000b003828506f1a6mr17358980pgr.44.1649453716972; Fri, 08 Apr 2022 14:35:16 -0700 (PDT) MIME-Version: 1.0 References: <20220310140911.50924-1-chao.p.peng@linux.intel.com> In-Reply-To: From: Vishal Annapurve Date: Fri, 8 Apr 2022 11:35:05 -1000 Message-ID: Subject: Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory To: Andy Lutomirski Cc: Chao Peng , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-api@vger.kernel.org, qemu-devel@nongnu.org, Paolo Bonzini , Jonathan Corbet , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H . Peter Anvin" , Hugh Dickins , Jeff Layton , "J . Bruce Fields" , Andrew Morton , Mike Rapoport , Steven Price , "Maciej S . Szmigiero" , Vlastimil Babka , Yu Zhang , "Kirill A . Shutemov" , Jun Nakajima , dave.hansen@intel.com, ak@linux.intel.com, david@redhat.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 28, 2022 at 10:17 AM Andy Lutomirski wrote: > > On Thu, Mar 10, 2022 at 6:09 AM Chao Peng wrote: > > > > This is the v5 of this series which tries to implement the fd-based KVM > > guest private memory. The patches are based on latest kvm/queue branch > > commit: > > > > d5089416b7fb KVM: x86: Introduce KVM_CAP_DISABLE_QUIRKS2 > > Can this series be run and a VM booted without TDX? A feature like > that might help push it forward. > > --Andy I have posted a RFC series with selftests to exercise the UPM feature with normal non-confidential VMs via https://lore.kernel.org/kvm/20220408210545.3915712-1-vannapurve@google.com/ -- Vishal