Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp3870736pxu; Tue, 20 Oct 2020 02:41:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwteMMR/yhdO2lUNEQW0gaBSAg7ukBhzp6diskGH/NVW/cJ4W6Vw2z2F07cQpOtljMD6lrz X-Received: by 2002:a17:906:3b93:: with SMTP id u19mr2342113ejf.290.1603186868676; Tue, 20 Oct 2020 02:41:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603186868; cv=none; d=google.com; s=arc-20160816; b=gxPfOCBONGuW16xUgSsNsQbbB1Hb1VkYXJb77gkPHu03oubTZY5jzJ4q0+j/hLdHCz fJYZFha9GguqYv3uKpI6IfjGDBeT6e8SKNLJxqOCsb9srKl87Z5yYctDaM0Rbafy/D5T 5TTkBOT2do9moodVVUIoHDB8u5i7aP0SrABepfUE62wH7W/MhBhAwL1s/+m996FOGERm CZt0NgbEMqOrN3G6fTeNoIDtHlbsnHhCPbZvAkV5mO+D0SZqBfhlT0TN/Hw0RReZkPs1 wOEhwETVwkg2WV1wtW+7vy2GQsbJhk80miCJ44XV4GOqMw4mdbkBXPbe5nBCo9cvIebZ I0og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=qLURW/jdlNSmWtGV7khIZIL/9JX3uhBDJsl3glpsKS8=; b=Dy9Mrq9lT9cORCf7hxE9kDeWyAm8hnZjLwLJwCoMmxxAA0KFFssOQfi0Gr4veoQTfd w5NdWu2SqWjrfg9F/YSUM581402kB7qfd0hNsA9ksDmyQP7WY/Q9uBvNeCi40ZTik9+P 99hr5OdLsGvChHQRmexWF5R5LAFWbaozrji55Jhe/ElFBQYXe8VWfAk73PB2edNKp5k2 MiZwdGd0PbafR6klxCH4/51ytMuYZ91Z/qvw/ndMRhYEi+bQ0G8DXHecCnvgC6DZXp9u 9Kvr3j1hiFBJwDS+PVTJbToRS0/g/1MW9h4P+DJ4EM7ifOXsj61voK7xIAY6rUUBS7c/ HXlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@shutemov-name.20150623.gappssmtp.com header.s=20150623 header.b=Jaw6HndA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ha7si867247ejb.379.2020.10.20.02.40.46; Tue, 20 Oct 2020 02:41:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@shutemov-name.20150623.gappssmtp.com header.s=20150623 header.b=Jaw6HndA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404045AbgJTGVS (ORCPT + 99 others); Tue, 20 Oct 2020 02:21:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48558 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403852AbgJTGTK (ORCPT ); Tue, 20 Oct 2020 02:19:10 -0400 Received: from mail-lf1-x143.google.com (mail-lf1-x143.google.com [IPv6:2a00:1450:4864:20::143]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9EF91C0613CE for ; Mon, 19 Oct 2020 23:19:09 -0700 (PDT) Received: by mail-lf1-x143.google.com with SMTP id d24so660091lfa.8 for ; Mon, 19 Oct 2020 23:19:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shutemov-name.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=qLURW/jdlNSmWtGV7khIZIL/9JX3uhBDJsl3glpsKS8=; b=Jaw6HndAu/3od4pm499wgLo/PnSpOsgf0qKVfrKZ1ObrIz2yUpappsJVWeGMaVAqNO zSq3AWMELJvDUUtpU8pJz+MZT0jeQQR7iN/Ls98p1ehKXFap4WGihAI3j73Y43ME2ILD Qx9R8kIrkKBMrnE5Wz8ug5w+u3Gub5ePmKcDsf5JJtjgCQkVIFtvxx25WrErKV8U4Dve P5UiLdHJzlXicKgNe8Ov+RGhPZS9rX9WxGEc+5yZ68LNby4EsxZ6T9FgHRrW74PIhXab OHvYo/0kDIK1WRTZvuBsBjo02CVVdOGsKHYcx7W8ewU4ZIqOMNtSxDmApLflbLxA5FA5 zJeA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=qLURW/jdlNSmWtGV7khIZIL/9JX3uhBDJsl3glpsKS8=; b=H4U/BzLianZGtztDroG1sb/ChPIGgt8XHE21KZ3e7onwDmdJyOzV/lZ9CF03MQdv8s +TelFAlpzR/LGFbnubY7d4iEYk+nxY0j5QLpsy+MWM9YoPQmvAwquFf1z8n1t7fDJb8v uY8g74wmWfuZcqPYGOZyudzuO9MzJohMlgnbJV3A/Qn01syKRjsMvnr83adfp0WsJS2j 2OJ2XJAnGpHd5DPAzW6M/dsvwNMOo3gDCqf3J3duk1ZfTXVypVAy8ikCrb9EOFjN53ls HAuEydEFVFf8cYKgXUsBhtJ5/miDbor7LBgX/EDHNeBj899B7bpYir6htl9Vs5Dw8CZ+ dNpw== X-Gm-Message-State: AOAM531ttimNqZLhgw9lItpJNrse7HZahWhFZfSowyqYGsiKvXJikJsW AXvnH3zWXjdwWCxB9bSn7j9LBw== X-Received: by 2002:a19:64b:: with SMTP id 72mr395872lfg.47.1603174748148; Mon, 19 Oct 2020 23:19:08 -0700 (PDT) Received: from box.localdomain ([86.57.175.117]) by smtp.gmail.com with ESMTPSA id m30sm136843lfc.97.2020.10.19.23.19.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Oct 2020 23:19:06 -0700 (PDT) From: "Kirill A. Shutemov" X-Google-Original-From: "Kirill A. Shutemov" Received: by box.localdomain (Postfix, from userid 1000) id D79B8102F64; Tue, 20 Oct 2020 09:19:01 +0300 (+03) To: Dave Hansen , Andy Lutomirski , Peter Zijlstra , Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel Cc: David Rientjes , Andrea Arcangeli , Kees Cook , Will Drewry , "Edgecombe, Rick P" , "Kleen, Andi" , Liran Alon , Mike Rapoport , x86@kernel.org, kvm@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [RFCv2 05/16] x86/kvm: Make VirtIO use DMA API in KVM guest Date: Tue, 20 Oct 2020 09:18:48 +0300 Message-Id: <20201020061859.18385-6-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201020061859.18385-1-kirill.shutemov@linux.intel.com> References: <20201020061859.18385-1-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org VirtIO for KVM is a primary way to provide IO. All memory that used for communication with the host has to be marked as shared. The easiest way to archive that is to use DMA API that already knows how to deal with shared memory. Signed-off-by: Kirill A. Shutemov --- drivers/virtio/virtio_ring.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c index becc77697960..ace733845d5d 100644 --- a/drivers/virtio/virtio_ring.c +++ b/drivers/virtio/virtio_ring.c @@ -12,6 +12,7 @@ #include #include #include +#include #ifdef DEBUG /* For development, we want to crash whenever the ring is screwed. */ @@ -255,6 +256,9 @@ static bool vring_use_dma_api(struct virtio_device *vdev) if (xen_domain()) return true; + if (kvm_mem_protected()) + return true; + return false; } -- 2.26.2