Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp96206rdb; Tue, 31 Oct 2023 01:37:19 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHmakG/IphASntwDUw0/lbxjI8dD3kgz6wE4/pBpkUYkhEoxI1E1iIDkh2kzHA9pMlaSGsm X-Received: by 2002:a17:90a:7e88:b0:280:c97:5968 with SMTP id j8-20020a17090a7e8800b002800c975968mr10166157pjl.5.1698741438718; Tue, 31 Oct 2023 01:37:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698741438; cv=none; d=google.com; s=arc-20160816; b=NdTnU6cNW/7FI1h8Fgd1dekhxhmx783aVqqIIMK86XB2zaEiq51YveLuMq36nYIyQ6 jr2Z3TwNyPMl24Ly9iELCDYTtUx/I9N9pXgIpEzx8RlUTPMsVZ5yP8My0xvVbF0m3OGt jCCm927RKbUAUjetK/bK2Xh69QKyDfP1CDpA7XFYdfjdve7qqxJljd2vAteCB0LQjZKh IW43gLS1qXla0qOlRQu9nIorn/0H+G0PmsY4LViNUGOCCWfrN5Ml38BqrQ6WbCubnGxL JL2wq+bUMVW1HsHz4KALMakVugQNMlD90y3XrtAkp23UlcvJnQWsTiBtIS8/prSRqW0T T/vQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=Z8h5RkdOR9BGKdCb7ALQk+f2uLvIQj65M4mqD+TjhbI=; fh=uso6SWbZqyN3ePA8mgN8HdHg5pNnB37ye2azP8XIY3I=; b=Jg9iBTzVA8yWPtuWlgz4QjvZjowo5HNc6cfGXtfYEhVKhPLTlJC4XKTYFHzSRsx433 0jTw9iSTeInfAqEoLDstLkftXNQ1AvGf8e4hqnCHosID6fTCj4ilXezEBkIjIDwVxSCD DZGl3aoLbQ2XRDdo/a+E5bFgXkE+aC46qErakUVNi098piK3hnbGQkMyeF9YOlig436c InoIEiA1zo1Jts8XNFZnJ+v/hjpH2I3RrSqnlaAlBayrUFjcPvl6Cwl1KY9ZwXWYuheH 3CfE+6SCkPtCizvBoaoqicnOPwso7MXOblxNKJa+i5zliJnpx6A2is9ypPNxfd7gVCQQ ZmXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="HF/aq1aK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id x5-20020a17090a970500b002804c67f37dsi647835pjo.63.2023.10.31.01.37.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 31 Oct 2023 01:37:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="HF/aq1aK"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 4BEEC8083A83; Tue, 31 Oct 2023 01:37:16 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234280AbjJaIhC (ORCPT + 99 others); Tue, 31 Oct 2023 04:37:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48066 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235459AbjJaIge (ORCPT ); Tue, 31 Oct 2023 04:36:34 -0400 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 088FB19A5; Tue, 31 Oct 2023 01:35:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1698741324; x=1730277324; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=P66Mu8Qvvs1bSZcrJh1IrkuvvxdPz+TRpT/cX8K5jyg=; b=HF/aq1aKX0AEQJ6p5OCq177hf/hgvm8BDy9PuwK4P10EL6t43isbenZV ssgovxU4JCBaCX3RJsx8J3agyvVn54zps6oEFbMcIJ8IInri0SO+Qv7o9 vhP+D0K7fELFd0MxMpML28YOYTEVAuvkxeEQO6jNgnM8KVdsHO8xsgK7M LoC5hQ9Ktbry8tcF6+XnT+i0AWw9Yx76pjGyrzq4k6l1L2EXNmHdvVOtP GcRU1YuSC1/JPl1fNcdzuxKOkboVRHVoIDizTEFvxG93PFOkAb7x6BGlY fOhqHtlNUhCthuO5uViTAUjo1SgOdcq5ljaCs65BaRgN5lPk3qakixnUu g==; X-IronPort-AV: E=McAfee;i="6600,9927,10879"; a="474479537" X-IronPort-AV: E=Sophos;i="6.03,265,1694761200"; d="scan'208";a="474479537" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Oct 2023 01:35:23 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10879"; a="795488444" X-IronPort-AV: E=Sophos;i="6.03,265,1694761200"; d="scan'208";a="795488444" Received: from xiaoyaol-hp-g830.ccr.corp.intel.com (HELO [10.93.9.145]) ([10.93.9.145]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Oct 2023 01:35:11 -0700 Message-ID: <7c0844d8-6f97-4904-a140-abeabeb552c1@intel.com> Date: Tue, 31 Oct 2023 16:35:08 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory Content-Language: en-US To: Sean Christopherson , Paolo Bonzini , Marc Zyngier , Oliver Upton , Huacai Chen , Michael Ellerman , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , Alexander Viro , Christian Brauner , "Matthew Wilcox (Oracle)" , Andrew Morton Cc: kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Xu Yilun , Chao Peng , Fuad Tabba , Jarkko Sakkinen , Anish Moorthy , David Matlack , Yu Zhang , Isaku Yamahata , =?UTF-8?B?TWlja2HDq2wgU2FsYcO8?= =?UTF-8?Q?n?= , Vlastimil Babka , Vishal Annapurve , Ackerley Tng , Maciej Szmigiero , David Hildenbrand , Quentin Perret , Michael Roth , Wang , Liam Merwick , Isaku Yamahata , "Kirill A . Shutemov" References: <20231027182217.3615211-1-seanjc@google.com> <20231027182217.3615211-18-seanjc@google.com> From: Xiaoyao Li In-Reply-To: <20231027182217.3615211-18-seanjc@google.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.3 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,HK_RANDOM_FROM, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Tue, 31 Oct 2023 01:37:16 -0700 (PDT) On 10/28/2023 2:21 AM, Sean Christopherson wrote: > Extended guest_memfd to allow backing guest memory with transparent > hugepages. Require userspace to opt-in via a flag even though there's no > known/anticipated use case for forcing small pages as THP is optional, > i.e. to avoid ending up in a situation where userspace is unaware that > KVM can't provide hugepages. Personally, it seems not so "transparent" if requiring userspace to opt-in. People need to 1) check if the kernel built with TRANSPARENT_HUGEPAGE support, or check is the sysfs of transparent hugepage exists; 2)get the maximum support hugepage size 3) ensure the size satisfies the alignment; before opt-in it. Even simpler, userspace can blindly try to create guest memfd with transparent hugapage flag. If getting error, fallback to create without the transparent hugepage flag. However, it doesn't look transparent to me.