From patchwork Fri Jun 16 02:32:17 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yan Zhao X-Patchwork-Id: 108795 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp1055872vqr; Thu, 15 Jun 2023 20:05:32 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5Vzk45udQrVWchM0EX1lfiEev/7zaj4L+sTPw8HGAoeJ3Qz5oLe5FJgnl+h4+WiTIHDJEW X-Received: by 2002:a05:6a21:2c98:b0:119:9d1d:1500 with SMTP id ua24-20020a056a212c9800b001199d1d1500mr1212980pzb.26.1686884731811; Thu, 15 Jun 2023 20:05:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686884731; cv=none; d=google.com; s=arc-20160816; b=nHFBPskKnRY06osTvwTu+8xv2F1waGgwdqjV5VqF/EmyAKa/OVlWdUz7hLv3xsgtry 65+xkj0FbvFDC7pR+yCFnvmkkyUqpZCA7Z5s7LDrxpe8wEjIMWdEZ5KBiwcRcu8UzN6h tOJX1pV/10NY57RYSn6kAEYJ0+ByI/8JNFENiOXPdVCimckA0gvdj97QD9b6O/HMu4zM G96de9oIhKCxBfeW+Xgo9jaP1qP3JdQooNLhHoJzDp+zqbfXEGcfSghqzdVLTEt9bK2D Zqh42DEyTyjk29LwX5SRORCuXieYgScxht9tHtOQcS03iOReBb7NTT7xOfkYUvU56Cjx JoVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=tq5Q9F2gLxJLnmUdRuEyz1Rj9zYdg2CJUzYnXrBGmrg=; b=tu+NjJ3Knz96DxgUhcZFsL85yyaS4/tkGcslrKsrck+5piM2hSxjpIyfmCLAK6vkhH LTlQcAafXtzDLX1zy5kzzy3aYhribwF4vHv0r6ZyXwiAkgYqOdIkj4qRsW0/g6HLdDK1 CC+YhNMZ4uR4OyQrnt9wO+awyBqgzg6hMEA4D93f5KiZbXFEXxsCIk9bgTE2PljMHuNx etcBNAFtybBueUDshxmtsYw8H7BOjAD4If/mi5yokZr9LJYqjenooECcSP5TsV+eipBl MV/YidWTQ6KfDyLUhhFanjZ4dSucWjYo5yv03i/RZbERp/18QyOXP4kcsfVWuEjjIdUd QM7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=VLl4mwSK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i2-20020a625402000000b006665e070b9csi4573977pfb.137.2023.06.15.20.05.18; Thu, 15 Jun 2023 20:05:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=VLl4mwSK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239971AbjFPC5h (ORCPT + 99 others); Thu, 15 Jun 2023 22:57:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57036 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229509AbjFPC5f (ORCPT ); Thu, 15 Jun 2023 22:57:35 -0400 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5C045297C; Thu, 15 Jun 2023 19:57:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1686884254; x=1718420254; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=ut2e3J98JDctUs6MMT7+OPH8GV0+N2ela+vuLlRy0YU=; b=VLl4mwSK3nWsjmnxllFM8zr+8D5U9sdl83C3d2ytVfcTFAy8qi/trJlf oJeHDf3OOglPkPuTuLhjiN1FbIYJUPIQc8EqZD1+QviozFeV7GyXvebjL Qiuqj6Us2NMCpHLy/+GhlQ1WJx6oyvpo8cDvVvZr3tYaORregT4xYPcvk W2RIjKFWznRK9BEl49GMasnurTqwn3TYAfocb1WlXzHtaS8mTvQsdHMgG ZdmaediC5yeLiw64QJhn/Es/qpN7sDurqJQQV3vf+njOIEJs1bOh++cb0 zuvaXMo6/5vE8xSD+BboIHqH9RYrYB91OXI4S8364Ild4p2/kFGO5/wTW A==; X-IronPort-AV: E=McAfee;i="6600,9927,10742"; a="387732923" X-IronPort-AV: E=Sophos;i="6.00,246,1681196400"; d="scan'208";a="387732923" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jun 2023 19:57:34 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10742"; a="802653734" X-IronPort-AV: E=Sophos;i="6.00,246,1681196400"; d="scan'208";a="802653734" Received: from yzhao56-desk.sh.intel.com ([10.239.159.62]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jun 2023 19:57:32 -0700 From: Yan Zhao To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: pbonzini@redhat.com, seanjc@google.com, chao.gao@intel.com, kai.huang@intel.com, robert.hoo.linux@gmail.com, Yan Zhao Subject: [PATCH v3 01/11] KVM: x86/mmu: helpers to return if KVM honors guest MTRRs Date: Fri, 16 Jun 2023 10:32:17 +0800 Message-Id: <20230616023217.7081-1-yan.y.zhao@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20230616023101.7019-1-yan.y.zhao@intel.com> References: <20230616023101.7019-1-yan.y.zhao@intel.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1768826844114172928?= X-GMAIL-MSGID: =?utf-8?q?1768826844114172928?= Added helpers to check if KVM honors guest MTRRs. The inner helper __kvm_mmu_honors_guest_mtrrs() is also provided to outside callers for the purpose of checking if guest MTRRs were honored before stopping non-coherent DMA. Suggested-by: Sean Christopherson Signed-off-by: Yan Zhao --- arch/x86/kvm/mmu.h | 7 +++++++ arch/x86/kvm/mmu/mmu.c | 15 +++++++++++++++ 2 files changed, 22 insertions(+) diff --git a/arch/x86/kvm/mmu.h b/arch/x86/kvm/mmu.h index 92d5a1924fc1..38bd449226f6 100644 --- a/arch/x86/kvm/mmu.h +++ b/arch/x86/kvm/mmu.h @@ -235,6 +235,13 @@ static inline u8 permission_fault(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu, return -(u32)fault & errcode; } +bool __kvm_mmu_honors_guest_mtrrs(struct kvm *kvm, bool vm_has_noncoherent_dma); + +static inline bool kvm_mmu_honors_guest_mtrrs(struct kvm *kvm) +{ + return __kvm_mmu_honors_guest_mtrrs(kvm, kvm_arch_has_noncoherent_dma(kvm)); +} + void kvm_zap_gfn_range(struct kvm *kvm, gfn_t gfn_start, gfn_t gfn_end); int kvm_arch_write_log_dirty(struct kvm_vcpu *vcpu); diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c index 1e5db621241f..b4f89f015c37 100644 --- a/arch/x86/kvm/mmu/mmu.c +++ b/arch/x86/kvm/mmu/mmu.c @@ -4516,6 +4516,21 @@ static int kvm_tdp_mmu_page_fault(struct kvm_vcpu *vcpu, } #endif +bool __kvm_mmu_honors_guest_mtrrs(struct kvm *kvm, bool vm_has_noncoherent_dma) +{ + /* + * If the TDP is enabled, the host MTRRs are ignored by TDP + * (shadow_memtype_mask is non-zero), and the VM has non-coherent DMA + * (DMA doesn't snoop CPU caches), KVM's ABI is to honor the memtype + * from the guest's MTRRs so that guest accesses to memory that is + * DMA'd aren't cached against the guest's wishes. + * + * Note, KVM may still ultimately ignore guest MTRRs for certain PFNs, + * e.g. KVM will force UC memtype for host MMIO. + */ + return vm_has_noncoherent_dma && tdp_enabled && shadow_memtype_mask; +} + int kvm_tdp_page_fault(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault) { /*