Received: by 2002:a25:1104:0:0:0:0:0 with SMTP id 4csp253487ybr; Fri, 22 May 2020 05:58:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyl0i6/jhQhpk2SZd0FzOQXI+4qirvH9KWQyeIDEP6iwL9xG4h0lPgBbuc5vk58UhW+QL+/ X-Received: by 2002:aa7:dd12:: with SMTP id i18mr2868252edv.133.1590152304538; Fri, 22 May 2020 05:58:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590152304; cv=none; d=google.com; s=arc-20160816; b=0EWNTpUhQ3vndhIn1v5RNfnvk6uoTQ+6nk7fn5sYbG8n16JVwYWp+M6cdv1epK+MpZ S9J8qNzM5X42G4CpJxUN/fWrkqi2UgFIXrXX01ul2rKfzFJz3rPUqTOLq09CGDXIKitC m6T1nzm6+slqwXZ/NtJ/d4YWxjn54iYwev9FR0WTXOwiP09m2T/ew9V4xriAlxoIBzz3 CkV1cw0jChVnG6kwb0bePSE29qBzLvDzZdLHtrq2uqFKwdLP2ZJiC+xzzD6Zt0oc/kpi nnUhc6VvUSuVRhhEkRlMp9qWWGGTqBv8VR4Px/qzsIKjy3EEv+lUXz/KtfHoqD1PuZHp tO0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=TRTK9a5mpqTDY5ZfccpPpqg6MJ7UvrTh0xOAXZSLOT0=; b=oOY7z0x7ln7PRt9Myks0IYcI0pslA/NVreqHjNw1j8hMZS5q67MRSOQ1Rug5yPQq1x GHOHeQp4EXKd76nN4Llj0YoPulm424/AVcwTfUfvqwc4PEkwuzphUaS2s9UIGcKci9eq KBK2tP2RzfNb3uJnB+kZcKhEgJ5D9s+FqFw0fk5ORXVSl0cgS+zKM+rkNgvMHZQu7nZ9 r45ldKjXwacMjQdgBJau8OcvJTIo8mDdD+v3h40vsvJlXZUpL3H3WTadtEIT+TPDEEpG K4GTocFNAjB2J2DwbFpYD0s3UZbIayDEzdsp3ZQ7oZwFdXa7BYftkFmgLN9pI9Ev1tx3 SKNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@shutemov-name.20150623.gappssmtp.com header.s=20150623 header.b=GtiEZ4n1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p23si5015281eju.299.2020.05.22.05.58.00; Fri, 22 May 2020 05:58:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@shutemov-name.20150623.gappssmtp.com header.s=20150623 header.b=GtiEZ4n1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730269AbgEVMx5 (ORCPT + 99 others); Fri, 22 May 2020 08:53:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38584 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729847AbgEVMwW (ORCPT ); Fri, 22 May 2020 08:52:22 -0400 Received: from mail-lj1-x242.google.com (mail-lj1-x242.google.com [IPv6:2a00:1450:4864:20::242]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6B049C08C5C7 for ; Fri, 22 May 2020 05:52:22 -0700 (PDT) Received: by mail-lj1-x242.google.com with SMTP id z18so12439362lji.12 for ; Fri, 22 May 2020 05:52:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shutemov-name.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=TRTK9a5mpqTDY5ZfccpPpqg6MJ7UvrTh0xOAXZSLOT0=; b=GtiEZ4n19ouyAizgKUR7+QtiVY5GOsdnqMTjHrIb62L5xETehoiRwghxpTXWAFsud/ mzMElUVEBDDRWzoET4wNfdBr+wjaqzM/XIt1wcZOSbxfJkSXPhaXh78G/xODWbBkjHWI Ml2DHUVIQJ87N1mWdC9TF590bqRjFqLm61X3ZvCMq8khw6tLBA9ohicbe26vEv2hL8U5 4F9TmwyGNQDDzBo+XOMmQUHnWmvDEW6nCGxTzjxiqD3j423EdCtU2NM74RLdpHP02Q1T BbVYwG/7tf+sGDZcMWGVGYeXypePS7/N7EB2aXkxTZ+AwJIqmQ4ZMG6MMGqCPisBllWD ayxw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=TRTK9a5mpqTDY5ZfccpPpqg6MJ7UvrTh0xOAXZSLOT0=; b=MTSoSNimbQK8Wcni7qRf/FelS9DWJaycefL+gRYuuf9gyBrQF8lXT0bCq93Y9QCh0S BzGuzCOjkoCtLUimvWZ5RpFjBAfHyzlonIRBi4qeIVQgfHD6RSi1PBDmqPIS+Xnm4Oam C4Tg1r6IiM7wr386z7dfpoIE+2pTr6VieAUvIRpKDt3R41NkrZ6VB5xWaU7coVOuFFRd KlvExuq9PMo2lU+X1yNmEZoC4v7CxjIQgr4/g/WZtK6dK09QNj0QQUoO9Pw7PM/DAZbd aZcUlqGf4BPObmc/9YMGU1N+2l/ye7jMUVsUgf4Iy+l2NlV5vI9+HopPhzHvs5ArLv0y iumA== X-Gm-Message-State: AOAM533gwiciOqQ6fTvfYUQCBaJmP83IX/s4BHsUkS73UwfiJz2sFUon 0h+PXL5Vtq/0vBIvSKxsDDC0wA== X-Received: by 2002:a2e:9f43:: with SMTP id v3mr7757905ljk.285.1590151940948; Fri, 22 May 2020 05:52:20 -0700 (PDT) Received: from box.localdomain ([86.57.175.117]) by smtp.gmail.com with ESMTPSA id n8sm2401340lfb.20.2020.05.22.05.52.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 May 2020 05:52:20 -0700 (PDT) From: "Kirill A. Shutemov" X-Google-Original-From: "Kirill A. Shutemov" Received: by box.localdomain (Postfix, from userid 1000) id C0A1C102053; Fri, 22 May 2020 15:52:19 +0300 (+03) To: Dave Hansen , Andy Lutomirski , Peter Zijlstra , Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel Cc: David Rientjes , Andrea Arcangeli , Kees Cook , Will Drewry , "Edgecombe, Rick P" , "Kleen, Andi" , x86@kernel.org, kvm@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [RFC 05/16] x86/kvm: Make VirtIO use DMA API in KVM guest Date: Fri, 22 May 2020 15:52:03 +0300 Message-Id: <20200522125214.31348-6-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200522125214.31348-1-kirill.shutemov@linux.intel.com> References: <20200522125214.31348-1-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org VirtIO for KVM is a primary way to provide IO. All memory that used for communication with the host has to be marked as shared. The easiest way to archive that is to use DMA API that already knows how to deal with shared memory. Signed-off-by: Kirill A. Shutemov --- drivers/virtio/virtio_ring.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c index 58b96baa8d48..bd9c56160107 100644 --- a/drivers/virtio/virtio_ring.c +++ b/drivers/virtio/virtio_ring.c @@ -12,6 +12,7 @@ #include #include #include +#include #ifdef DEBUG /* For development, we want to crash whenever the ring is screwed. */ @@ -255,6 +256,9 @@ static bool vring_use_dma_api(struct virtio_device *vdev) if (xen_domain()) return true; + if (kvm_mem_protected()) + return true; + return false; } -- 2.26.2