Received: by 2002:a25:2c96:0:0:0:0:0 with SMTP id s144csp1159833ybs; Mon, 25 May 2020 08:32:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxuVm0RL0+n0jOdg8qPmoVf+mYUsleH3kMrpVwIylFvRVsGalz5q0f3MMKxKGv54BqQVHPa X-Received: by 2002:a05:6402:a41:: with SMTP id bt1mr15355157edb.151.1590420742132; Mon, 25 May 2020 08:32:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590420742; cv=none; d=google.com; s=arc-20160816; b=IJmujAcvcfK7KGEkFgyY4uUecPIrQOFLiXrwY9mmso0o/rNmEyZLsS05AEFG/MAMRY nkZKtyEm7OCbasNRHHeNYmjurd3nhTmlBGD+SwAWjMPDg1xYNMs5YvL83zQR4b0FWTv3 mrGZGXT1ugNo//Os6/JtHOBqvAHODO/3pF9x/3Zkc6vOFTnvtPlinuCg2xr2Cff40rhk E2xaGx8I3tOCVLVQewehvBz/H/jheCGA8/HKPaGK2PrtOtPtpjj7LT3JH1hYxDdOGRbd IwIv7/CXaNWKZPanexB+OnMpCsHpG9RN/US5692QJbkvpj0l8wLRD7PLM9pbuTwm+oIk T+wQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=D//cvB4ccMcU7KW9UZeTWAleysSnbPmlxts0hTz3QMU=; b=XucNzDmCC3OSCT7pbzCQeSItCrpMmw9W1B41gSxh0Piseq8raKnnVSS3Adnx0bwlmO llpIDAVORS3HJZrKa2LCTCaZAgwXKukwZMgSp5puWsjLmFaXps+IE8ekZ9Jz7A2+5XoR oJ+xVuhCQ+N3LlKWVYopgUgkXDu6qnE/qBuQS6OjHj7tWgzjd25C0K6gUCsKluMfF661 sxfELcuEdHPhzYHcpIUX3tkuYUOeDb/h1LFYkKUtDkUEzVXakQX4czIskkpMy2p4/Q5R 8D+/lDgIHWZVWfqEQVWYGDzkXY5xo+NXISsVvGeyT9D0oKbdobhHba9EKq08Op1G6CHz OQfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=eXUisQw9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m22si10116018eja.636.2020.05.25.08.31.58; Mon, 25 May 2020 08:32:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=eXUisQw9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404189AbgEYP1H (ORCPT + 99 others); Mon, 25 May 2020 11:27:07 -0400 Received: from us-smtp-1.mimecast.com ([207.211.31.81]:26595 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2404122AbgEYP1F (ORCPT ); Mon, 25 May 2020 11:27:05 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1590420423; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=D//cvB4ccMcU7KW9UZeTWAleysSnbPmlxts0hTz3QMU=; b=eXUisQw9YjXCmbyjVS+/gbkH0znmy3p6sxaBvXi69LqER2FMR1WQGb7Y++/Gp6LvFuDx9X OSEIAIBrebmb0uWXnS1DT6+MFG+vxJiVNO3xoizQ4Nk4ISdqE1FRfFNhSJ9TnQjlFXchuj XYEILfXJpKPWOdG1m/E62/x/XYmpmwE= Received: from mail-ej1-f69.google.com (mail-ej1-f69.google.com [209.85.218.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-227-6noa9656NL6nkn6mQ973Fw-1; Mon, 25 May 2020 11:27:01 -0400 X-MC-Unique: 6noa9656NL6nkn6mQ973Fw-1 Received: by mail-ej1-f69.google.com with SMTP id h17so53955ejo.21 for ; Mon, 25 May 2020 08:27:01 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=D//cvB4ccMcU7KW9UZeTWAleysSnbPmlxts0hTz3QMU=; b=WFp2VtefC2axSFh155OJcokIDqwCTIiY8Ti62MD9RsuiJwZtdyQqqcIZ4h8C7ec48b GuRCnPUlr9v5ykiBnCmCc6iTnKuTf1X3QUTYJAz/D87omzktygXsuf0Uda/02IAgYMu8 eqXjXvJU9FfG/+YJW/QiDoufZN0sq0eaPFrgIlYX3b/2devpYlxO7+MPkRy74PQcT4tH PLUTv7EVi11GaMT3h7vBEj1WqfWU6hBO4j7Ru2T2pkKVpriVufMHSPSkGN1VnxUUWi13 rbODVAdEHwUtQCDug8UPVACML8bevlXl0CRocd1xRZy4rXDIi36FcdNHv5hl9hWzGtbh NC/g== X-Gm-Message-State: AOAM530zFOFry2r+RJstEW5CtpDX1ViyVtWwr2tP6LHhXe3BgwuBIqYH FGC3K2cQgr4EimyJ4u4OKNQ5lFFEe8N81rtjT3R2yXMyeIUTKmUaFoa/V+5uWCwpBHoaULQsDoS crll+5uoyQxDniE7KZQkCFDD9 X-Received: by 2002:aa7:c3cb:: with SMTP id l11mr15085927edr.364.1590420420658; Mon, 25 May 2020 08:27:00 -0700 (PDT) X-Received: by 2002:aa7:c3cb:: with SMTP id l11mr15085907edr.364.1590420420401; Mon, 25 May 2020 08:27:00 -0700 (PDT) Received: from vitty.brq.redhat.com (g-server-2.ign.cz. [91.219.240.2]) by smtp.gmail.com with ESMTPSA id cm26sm15655925edb.87.2020.05.25.08.26.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 May 2020 08:26:59 -0700 (PDT) From: Vitaly Kuznetsov To: "Kirill A. Shutemov" Cc: David Rientjes , Andrea Arcangeli , Kees Cook , Will Drewry , "Edgecombe\, Rick P" , "Kleen\, Andi" , x86@kernel.org, kvm@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" , Dave Hansen , Andy Lutomirski , Peter Zijlstra , Paolo Bonzini , Sean Christopherson , Wanpeng Li , Jim Mattson , Joerg Roedel Subject: Re: [RFC 10/16] KVM: x86: Enabled protected memory extension In-Reply-To: <20200522125214.31348-11-kirill.shutemov@linux.intel.com> References: <20200522125214.31348-1-kirill.shutemov@linux.intel.com> <20200522125214.31348-11-kirill.shutemov@linux.intel.com> Date: Mon, 25 May 2020 17:26:58 +0200 Message-ID: <871rn8827x.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org "Kirill A. Shutemov" writes: > Wire up hypercalls for the feature and define VM_KVM_PROTECTED. > > Signed-off-by: Kirill A. Shutemov > --- > arch/x86/Kconfig | 1 + > arch/x86/kvm/cpuid.c | 3 +++ > arch/x86/kvm/x86.c | 9 +++++++++ > include/linux/mm.h | 4 ++++ > 4 files changed, 17 insertions(+) > > diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig > index 58dd44a1b92f..420e3947f0c6 100644 > --- a/arch/x86/Kconfig > +++ b/arch/x86/Kconfig > @@ -801,6 +801,7 @@ config KVM_GUEST > select ARCH_CPUIDLE_HALTPOLL > select X86_MEM_ENCRYPT_COMMON > select SWIOTLB > + select ARCH_USES_HIGH_VMA_FLAGS > default y > ---help--- > This option enables various optimizations for running under the KVM > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c > index 901cd1fdecd9..94cc5e45467e 100644 > --- a/arch/x86/kvm/cpuid.c > +++ b/arch/x86/kvm/cpuid.c > @@ -714,6 +714,9 @@ static inline int __do_cpuid_func(struct kvm_cpuid_array *array, u32 function) > (1 << KVM_FEATURE_POLL_CONTROL) | > (1 << KVM_FEATURE_PV_SCHED_YIELD); > > + if (VM_KVM_PROTECTED) > + entry->eax |=(1 << KVM_FEATURE_MEM_PROTECTED); Nit: missing space. > + > if (sched_info_on()) > entry->eax |= (1 << KVM_FEATURE_STEAL_TIME); > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index c17e6eb9ad43..acba0ac07f61 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -7598,6 +7598,15 @@ int kvm_emulate_hypercall(struct kvm_vcpu *vcpu) > kvm_sched_yield(vcpu->kvm, a0); > ret = 0; > break; > + case KVM_HC_ENABLE_MEM_PROTECTED: > + ret = kvm_protect_all_memory(vcpu->kvm); > + break; > + case KVM_HC_MEM_SHARE: > + ret = kvm_protect_memory(vcpu->kvm, a0, a1, false); > + break; > + case KVM_HC_MEM_UNSHARE: > + ret = kvm_protect_memory(vcpu->kvm, a0, a1, true); > + break; > default: > ret = -KVM_ENOSYS; > break; > diff --git a/include/linux/mm.h b/include/linux/mm.h > index 4f7195365cc0..6eb771c14968 100644 > --- a/include/linux/mm.h > +++ b/include/linux/mm.h > @@ -329,7 +329,11 @@ extern unsigned int kobjsize(const void *objp); > # define VM_MAPPED_COPY VM_ARCH_1 /* T if mapped copy of data (nommu mmap) */ > #endif > > +#if defined(CONFIG_X86_64) && defined(CONFIG_KVM) > +#define VM_KVM_PROTECTED VM_HIGH_ARCH_4 > +#else > #define VM_KVM_PROTECTED 0 > +#endif > > #ifndef VM_GROWSUP > # define VM_GROWSUP VM_NONE -- Vitaly