Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3528788pxb; Mon, 16 Nov 2020 17:59:06 -0800 (PST) X-Google-Smtp-Source: ABdhPJy7fUAXMB1mDOHo7TvKWIkwWzhUaF5sEaXJAKy/5RQHLPsGotfdAn6ObCmCobTTqPqCKhQM X-Received: by 2002:aa7:d408:: with SMTP id z8mr18484375edq.166.1605578346712; Mon, 16 Nov 2020 17:59:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605578346; cv=none; d=google.com; s=arc-20160816; b=igJKuYIQ1Noni0fo3drRUUyNa6Az5tOJF8+dnIKvY2gWmUju/Pk2qlyb/xnnelDBfB 8SbamwfrhShfbWW+hD/wFoQwjFo/2IM4SVt6frngQ1Og3bRbBZPPrWalbQZLtrozE0RK DQo8c1i6DGc3THlXBRvWZ4h/4f29Zi4iUumrEd82jcYnD/eWOfPAkd7uZ+If299+ptq6 IGeuFQQJo6fcmGOcN0djoJBo3gnkQHtrhSF8WLh7zMWroWVfGqGQQNZInVezWeCUXUgf adn3y0+OVIXYSc4Ska90g/l0vRZY3g6cAaVb1ke0agrA/k0cxBfpTp4DsLCnE7RK8q+1 EKrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:references:in-reply-to :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=e91plf0SFFfNMkaT2Yy0E/t4tIXNJb3V5zBYz1wOGgE=; b=btDETAHlILkDcCzlvx2aCGoHKCZtXUtVos2xSNoyKyBJtRUm2D8HqqxrQ0fqCyhlpQ rCzNdVY3BGd0tAVaAiJOAbR84TJseDLPwY1zrjTW+9qXkvttzd55jQKSTcc6KWwWqpQ0 BSlhEKewjX8w+Y0l/xRxw6VxmuABYbFjtURbChvxuS05SwqURLEBHtFz0bIL+iufIpGu k/OoPATgFsLcIPJLe7kYd0CSCmVy7RPnsADqOX0bPr1naIhqXe3unQmQ/YK1EYdfsIfr J/9kq0ek+ajVCgY5QQDCpGdRZNjtdt4EGDUG1pATneERuS+VdIHi3Cqed/x2LN/UzIBI lcHQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w26si13163511edt.596.2020.11.16.17.58.44; Mon, 16 Nov 2020 17:59:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388098AbgKPS2G (ORCPT + 99 others); Mon, 16 Nov 2020 13:28:06 -0500 Received: from mga06.intel.com ([134.134.136.31]:20632 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388086AbgKPS2E (ORCPT ); Mon, 16 Nov 2020 13:28:04 -0500 IronPort-SDR: +JsGjOS9Qt2iT8fBSSW0DBTECaxYSi2JPoak/1nKUGvpnAqCkIQfLHamzv15e0IF2R5PWIfXtG JxDnjdTKzRBg== X-IronPort-AV: E=McAfee;i="6000,8403,9807"; a="232410031" X-IronPort-AV: E=Sophos;i="5.77,483,1596524400"; d="scan'208";a="232410031" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Nov 2020 10:28:03 -0800 IronPort-SDR: kmdBeUL4mdS0+jujBwt2ADTN0JowZGlBjbiaErA3r/ls19CNWuswZNlgUfjAmq523RLBg4SlcU 1EbibhERw4fg== X-IronPort-AV: E=Sophos;i="5.77,483,1596524400"; d="scan'208";a="400527986" Received: from ls.sc.intel.com (HELO localhost) ([143.183.96.54]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Nov 2020 10:28:02 -0800 From: isaku.yamahata@intel.com To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: isaku.yamahata@intel.com, isaku.yamahata@gmail.com, Sean Christopherson Subject: [RFC PATCH 23/67] KVM: Add per-VM flag to disable dirty logging of memslots for TDs Date: Mon, 16 Nov 2020 10:26:08 -0800 Message-Id: X-Mailer: git-send-email 2.17.1 In-Reply-To: References: In-Reply-To: References: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson Add a flag for TDX to mark dirty logging as unsupported. Suggested-by: Kai Huang Signed-off-by: Sean Christopherson --- include/linux/kvm_host.h | 1 + virt/kvm/kvm_main.c | 5 ++++- 2 files changed, 5 insertions(+), 1 deletion(-) diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 1a0df7b83fd0..9682282cb258 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -517,6 +517,7 @@ struct kvm { pid_t userspace_pid; unsigned int max_halt_poll_ns; + bool dirty_log_unsupported; #ifdef __KVM_HAVE_READONLY_MEM bool readonly_mem_unsupported; #endif diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 572a66a61c29..aa5f27753756 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1103,7 +1103,10 @@ static void update_memslots(struct kvm_memslots *slots, static int check_memory_region_flags(struct kvm *kvm, const struct kvm_userspace_memory_region *mem) { - u32 valid_flags = KVM_MEM_LOG_DIRTY_PAGES; + u32 valid_flags = 0; + + if (!kvm->dirty_log_unsupported) + valid_flags |= KVM_MEM_LOG_DIRTY_PAGES; #ifdef __KVM_HAVE_READONLY_MEM if (!kvm->readonly_mem_unsupported) -- 2.17.1