Received: by 10.223.176.5 with SMTP id f5csp2847218wra; Mon, 5 Feb 2018 10:52:49 -0800 (PST) X-Google-Smtp-Source: AH8x224WRUBL0SNwUw/szukJ2+fYS+vUQDpRVuve5PLoQYaM8AmrECr5tiXkoVcsyBuNME1LF5Fs X-Received: by 2002:a17:902:1683:: with SMTP id h3-v6mr43963740plh.433.1517856769206; Mon, 05 Feb 2018 10:52:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517856769; cv=none; d=google.com; s=arc-20160816; b=GN6h1wIBs/H04y2FchVGQDXmw3GpF/AMyvRg/6WGs37u4yJ3anr9JuCPwRjen2T+Dx 40krnqM54wVaUijzJkNy3i6wMMxlAOxut3bLnZbXbebOyxpYho0EBDP0/srBORxisZa9 QRt+WvXz3nw1Tm10LET/czk+CCJOhjvPpnNlCRg3cb0SZPhW83Kd6mcicdyH0yRuIxZI uTmnWAs1RpF4bOOqMJ5n9v7j8/s87ssFgm5Lcpuf1+5MWoryO7uHG6NLkF4GPmJN+MOf ZBoyOch3/NBv/Fp3HnGYa+rH3b/2WuclpkbNNf0Jc9DN83yXGuiPEBet4sKNgbyaIsLW o9Kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:arc-authentication-results; bh=/vqQyTkBSDVfAozWvtlWyJKzu4CdlhZt3G6ODoWwqho=; b=UHkjEuongIssGduAb/LiIYB0FGm8A1R8TJy/WWtPgPDS6P/UW+13gN1zT9gae66uMJ ruqFJlsL1dViWmp/jBvBVFqVvjAq1SD433JTwVq5N2XKpx8bgUgYYkMdzsyJ3FMjV/md JZwCAtci88VtW9ZzAvBsXlCoUbi0rshVbmO8OHULFUp7MWi7Xxfi+Czr4yOR4tDKsK1U Sh0MpgcND9dDDdvkURu1lHa5IB7GvVwcHrxOCTIhLZ3sDQBbOb1DTYT0h6It0CT0JCgx 8F22Ps5ZPcnb1/GvG/pSkod6yiR4rQHUiNYocd4Q9gfMUxRr6b1wKcaxUdxE+5mHIcYH tJ1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=YBwlmuZQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bi1-v6si3228704plb.279.2018.02.05.10.52.34; Mon, 05 Feb 2018 10:52:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=YBwlmuZQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753976AbeBESvl (ORCPT + 99 others); Mon, 5 Feb 2018 13:51:41 -0500 Received: from smtp-fw-6002.amazon.com ([52.95.49.90]:23891 "EHLO smtp-fw-6002.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753636AbeBESr6 (ORCPT ); Mon, 5 Feb 2018 13:47:58 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209; t=1517856478; x=1549392478; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=/vqQyTkBSDVfAozWvtlWyJKzu4CdlhZt3G6ODoWwqho=; b=YBwlmuZQ1h8YqR/Wlg9kdEbWyPQbp4gvfMoFX3ScI1whWIKKvTb+eQoL N1OD//XQcxvL7cCbQVLsHMV25fEZIZuvBqUfd+6wR0i86/Vp1FUJCd1FR t7yMeTJYGA5Hu1FzRa0WhhUcnF2XUbx8ngXvr9gxqxaAOxXQ6L89C/S4W E=; X-IronPort-AV: E=Sophos;i="5.46,465,1511827200"; d="scan'208";a="330725241" Received: from iad6-co-svc-p1-lb1-vlan3.amazon.com (HELO email-inbound-relay-2c-168cbb73.us-west-2.amazon.com) ([10.124.125.6]) by smtp-border-fw-out-6002.iad6.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 05 Feb 2018 18:47:55 +0000 Received: from u54e1ad5160425a4b64ea.ant.amazon.com (pdx2-ws-svc-lb17-vlan3.amazon.com [10.247.140.70]) by email-inbound-relay-2c-168cbb73.us-west-2.amazon.com (8.14.7/8.14.7) with ESMTP id w15IlnDu006042 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 5 Feb 2018 18:47:51 GMT Received: from u54e1ad5160425a4b64ea.ant.amazon.com (localhost [127.0.0.1]) by u54e1ad5160425a4b64ea.ant.amazon.com (8.15.2/8.15.2/Debian-3) with ESMTP id w15IlnpR003139; Mon, 5 Feb 2018 19:47:49 +0100 Received: (from karahmed@localhost) by u54e1ad5160425a4b64ea.ant.amazon.com (8.15.2/8.15.2/Submit) id w15IlmRN003138; Mon, 5 Feb 2018 19:47:48 +0100 From: KarimAllah Ahmed To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: KarimAllah Ahmed , Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= Subject: [RFC 01/12] KVM: Introduce helper functions to map/unmap guest memory Date: Mon, 5 Feb 2018 19:47:20 +0100 Message-Id: <1517856451-2932-2-git-send-email-karahmed@amazon.de> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1517856451-2932-1-git-send-email-karahmed@amazon.de> References: <1517856451-2932-1-git-send-email-karahmed@amazon.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Introduce helper functions to map and unmap guest memory into host kernel memory. These helper functions support mapping guest memory both that are managed by the host kernel (i.e. have a "struct page") and the ones that are not managed by the kernel (i.e. does not have a "struct page"). Cc: Paolo Bonzini Cc: Radim Krčmář Cc: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org Signed-off-by: KarimAllah Ahmed --- include/linux/kvm_host.h | 18 ++++++++++++++ virt/kvm/kvm_main.c | 62 ++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 80 insertions(+) diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 6bdd4b9..45d2854 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -204,6 +204,12 @@ enum { READING_SHADOW_PAGE_TABLES, }; +struct kvm_host_mapping { + struct page *page; + void *kaddr; + kvm_pfn_t pfn; +}; + /* * Sometimes a large or cross-page mmio needs to be broken up into separate * exits for userspace servicing. @@ -700,6 +706,10 @@ struct kvm_memslots *kvm_vcpu_memslots(struct kvm_vcpu *vcpu); struct kvm_memory_slot *kvm_vcpu_gfn_to_memslot(struct kvm_vcpu *vcpu, gfn_t gfn); kvm_pfn_t kvm_vcpu_gfn_to_pfn_atomic(struct kvm_vcpu *vcpu, gfn_t gfn); kvm_pfn_t kvm_vcpu_gfn_to_pfn(struct kvm_vcpu *vcpu, gfn_t gfn); +bool kvm_vcpu_gfn_to_host_mapping(struct kvm_vcpu *vcpu, gfn_t gfn, + struct kvm_host_mapping *mapping, + bool kernel_access); +void kvm_release_host_mapping(struct kvm_host_mapping *mapping, bool dirty); struct page *kvm_vcpu_gfn_to_page(struct kvm_vcpu *vcpu, gfn_t gfn); unsigned long kvm_vcpu_gfn_to_hva(struct kvm_vcpu *vcpu, gfn_t gfn); unsigned long kvm_vcpu_gfn_to_hva_prot(struct kvm_vcpu *vcpu, gfn_t gfn, bool *writable); @@ -990,6 +1000,14 @@ static inline hpa_t pfn_to_hpa(kvm_pfn_t pfn) return (hpa_t)pfn << PAGE_SHIFT; } +static inline bool kvm_vcpu_gpa_to_host_mapping(struct kvm_vcpu *vcpu, gpa_t gpa, + struct kvm_host_mapping *mapping, + bool kernel_access) +{ + return kvm_vcpu_gfn_to_host_mapping(vcpu, gpa_to_gfn(gpa), mapping, + kernel_access); +} + static inline struct page *kvm_vcpu_gpa_to_page(struct kvm_vcpu *vcpu, gpa_t gpa) { diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 210bf82..2b9f93d 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1653,6 +1653,68 @@ struct page *gfn_to_page(struct kvm *kvm, gfn_t gfn) } EXPORT_SYMBOL_GPL(gfn_to_page); +bool kvm_vcpu_gfn_to_host_mapping(struct kvm_vcpu *vcpu, gfn_t gfn, + struct kvm_host_mapping *mapping, + bool kernel_access) +{ + void *kaddr = NULL; + kvm_pfn_t pfn; + struct page *page = NULL; + + pfn = kvm_vcpu_gfn_to_pfn(vcpu, gfn); + + if (pfn_valid(pfn)) { + page = kvm_pfn_to_page(pfn); + if (is_error_page(page)) + return false; + + if (kernel_access) { + kaddr = kmap(page); + if (!kaddr) + return false; + } + + mapping->kaddr = kaddr; + mapping->page = page; + mapping->pfn = pfn; + return true; + } + + kaddr = memremap(pfn << PAGE_SHIFT, PAGE_SIZE, MEMREMAP_WB); + if (!kaddr) + return false; + + mapping->page = NULL; + mapping->kaddr = kaddr; + mapping->pfn = pfn; + + return true; +} +EXPORT_SYMBOL_GPL(kvm_vcpu_gfn_to_kaddr); + +void kvm_release_host_mapping(struct kvm_host_mapping *mapping, bool dirty) +{ + if (mapping->page) { + if (mapping->kaddr) + kunmap(mapping->page); + + if (dirty) + kvm_release_page_dirty(mapping->page); + else + kvm_release_page_clean(mapping->page); + } else { + if (mapping->kaddr) + memunmap(mapping->kaddr); + + if (dirty) + kvm_release_pfn_dirty(mapping->pfn); + else + kvm_release_pfn_clean(mapping->pfn); + } + + memset(mapping, 0, sizeof(*mapping)); +} + struct page *kvm_vcpu_gfn_to_page(struct kvm_vcpu *vcpu, gfn_t gfn) { kvm_pfn_t pfn; -- 2.7.4