Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4044FC74A5B for ; Sat, 18 Mar 2023 04:56:19 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229585AbjCRE4R (ORCPT ); Sat, 18 Mar 2023 00:56:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38284 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229541AbjCRE4Q (ORCPT ); Sat, 18 Mar 2023 00:56:16 -0400 Received: from mail-pj1-x102f.google.com (mail-pj1-x102f.google.com [IPv6:2607:f8b0:4864:20::102f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 920201A4AA; Fri, 17 Mar 2023 21:56:14 -0700 (PDT) Received: by mail-pj1-x102f.google.com with SMTP id l9-20020a17090a3f0900b0023d32684e7fso9453119pjc.1; Fri, 17 Mar 2023 21:56:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1679115374; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=0YbI6EnprkaJ0z2mh57VIFs7p2IQ38bwj/ew8ckKGBI=; b=pzW/czJXLyPtklm89YmSEu7k7rQ4owrV9aB1tx2M8TlyW7Lopp4TnPOTzhSM+KWYkP op5OfNRuOuYOuQ8nwCy5mMzkUg4Vng+kTBpyLUKbY1qAWm3Uv9Zj0El9ZSbZGwbcK3DJ 9SJvzGmx5BFzDSxzOY9efC+Kcqox1Npxnso7xD7uO91100+vlmCCp+UhrKnJeOY0ex7o 0rgE/Gs9zwDj8bU9u9VH9drScl1/tz7XYbO42NIcccdtI4Y6FuiGnkSiT+u1hNORuf/O 4WgTZ0BOIwdHDat9PWCWNzi4pYK7m5qUS3fHQNtiQRTq6H9bAHwRcKr0s8DLzGRT2c87 7muQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679115374; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=0YbI6EnprkaJ0z2mh57VIFs7p2IQ38bwj/ew8ckKGBI=; b=qR0hntZU4BZganxoSROOuzWkTdid6bR7CLQO/DU6Ksf2xmPVnKruIoYl1ZhqBD7jM3 yEFsEEK7vO9w9A9emPCkCQh9fsUxBZY977i8UO42dpOmfsKwl7McEIAhhHGRXmNvhWcN y6WBqPAn5yF3AUtdmAL+oICPmNqvMsw8Dy1ZYJYC9Z8eeWmEh+AGrIChNrkOPWTvVXLP jarrTra9JomwZb0vQRGniEsQzxOdagtR9fE1SCuc0L2ovCVW4p91FQ4uQGcXoXSPi2Ym d8fep2yzEvbaRoBSYFGUEVKUaU54fGdgPlrP2gZ0O20cnzTwbmHfWZBJvUS6rqVg3WGS 5qTQ== X-Gm-Message-State: AO0yUKXNcWQxN6jPwysOD9vNRj7YBIh5APwMBpMvkZ41zY4AUF0U8ew2 6zjM9XxyqC4icdZ+x0O6Oak= X-Google-Smtp-Source: AK7set/n48jK0pB0RDpGT/Sd7g0Ao3Xnl3nTM+JCzq4BvLmG2MWkWy7WQvPxWq2abPqnkiu4E6+74g== X-Received: by 2002:a17:90a:51c5:b0:23d:4a9e:868b with SMTP id u63-20020a17090a51c500b0023d4a9e868bmr10897649pjh.31.1679115373822; Fri, 17 Mar 2023 21:56:13 -0700 (PDT) Received: from localhost ([192.55.54.55]) by smtp.gmail.com with ESMTPSA id s16-20020a17090a1c1000b0023d0e743ff6sm5750279pjs.3.2023.03.17.21.56.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Mar 2023 21:56:13 -0700 (PDT) Date: Fri, 17 Mar 2023 21:56:11 -0700 From: Isaku Yamahata To: Michael Roth Cc: kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, seanjc@google.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, marcorr@google.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, dgilbert@redhat.com, jarkko@kernel.org, ashish.kalra@amd.com, nikunj.dadhania@amd.com, isaku.yamahata@gmail.com Subject: Re: [PATCH RFC v8 02/56] KVM: x86: Add 'update_mem_attr' x86 op Message-ID: <20230318045611.GE408922@ls.amr.corp.intel.com> References: <20230220183847.59159-1-michael.roth@amd.com> <20230220183847.59159-3-michael.roth@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20230220183847.59159-3-michael.roth@amd.com> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Feb 20, 2023 at 12:37:53PM -0600, Michael Roth wrote: > This callback will do any platform-specific handling needed for > converting pages between shared/private. > > Signed-off-by: Michael Roth > --- > arch/x86/include/asm/kvm-x86-ops.h | 1 + > arch/x86/include/asm/kvm_host.h | 2 ++ > arch/x86/kvm/mmu/mmu.c | 13 +++++++++++++ > include/linux/kvm_host.h | 4 ++++ > virt/kvm/kvm_main.c | 29 +++++++++++++++++++++++++++++ > 5 files changed, 49 insertions(+) > > diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h > index 72183da010b8..a8aaf532c2ab 100644 > --- a/arch/x86/include/asm/kvm-x86-ops.h > +++ b/arch/x86/include/asm/kvm-x86-ops.h > @@ -132,6 +132,7 @@ KVM_X86_OP(complete_emulated_msr) > KVM_X86_OP(vcpu_deliver_sipi_vector) > KVM_X86_OP_OPTIONAL_RET0(vcpu_get_apicv_inhibit_reasons); > KVM_X86_OP_OPTIONAL_RET0(fault_is_private); > +KVM_X86_OP_OPTIONAL_RET0(update_mem_attr) > > #undef KVM_X86_OP > #undef KVM_X86_OP_OPTIONAL > diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h > index f856d689dda0..2da3fb2d5d1b 100644 > --- a/arch/x86/include/asm/kvm_host.h > +++ b/arch/x86/include/asm/kvm_host.h > @@ -1644,6 +1644,8 @@ struct kvm_x86_ops { > void (*load_mmu_pgd)(struct kvm_vcpu *vcpu, hpa_t root_hpa, > int root_level); > bool (*fault_is_private)(struct kvm *kvm, gpa_t gpa, u64 error_code, bool *private_fault); > + int (*update_mem_attr)(struct kvm_memory_slot *slot, unsigned int attr, > + gfn_t start, gfn_t end); > > bool (*has_wbinvd_exit)(void); > > diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c > index fb3f34b7391c..053bd77bbf52 100644 > --- a/arch/x86/kvm/mmu/mmu.c > +++ b/arch/x86/kvm/mmu/mmu.c > @@ -7251,4 +7251,17 @@ void kvm_arch_set_memory_attributes(struct kvm *kvm, > linfo_update_mixed(gfn, slot, level, mixed); > } > } > + > +void kvm_arch_post_set_memory_attributes(struct kvm *kvm, > + struct kvm_memory_slot *slot, > + unsigned long attrs, > + gfn_t start, gfn_t end) > +{ > + int ret; > + > + ret = static_call(kvm_x86_update_mem_attr)(slot, attrs, start, end); > + if (ret) > + pr_warn_ratelimited("Failed to update GFN range 0x%llx-0x%llx with attributes 0x%lx. Ret: %d\n", > + start, end, attrs, ret); > +} > #endif > diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h > index fdc59479b3e2..d200b8f45583 100644 > --- a/include/linux/kvm_host.h > +++ b/include/linux/kvm_host.h > @@ -2330,6 +2330,10 @@ void kvm_arch_set_memory_attributes(struct kvm *kvm, > struct kvm_memory_slot *slot, > unsigned long attrs, > gfn_t start, gfn_t end); > +void kvm_arch_post_set_memory_attributes(struct kvm *kvm, > + struct kvm_memory_slot *slot, > + unsigned long attrs, > + gfn_t start, gfn_t end); > > static inline bool kvm_mem_is_private(struct kvm *kvm, gfn_t gfn) > { > diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c > index b68574ff6c30..8ec985f1c57d 100644 > --- a/virt/kvm/kvm_main.c > +++ b/virt/kvm/kvm_main.c > @@ -2561,6 +2561,32 @@ static void kvm_mem_attrs_changed(struct kvm *kvm, unsigned long attrs, > kvm_flush_remote_tlbs(kvm); > } > > +static void kvm_post_mem_attrs_changed(struct kvm *kvm, unsigned long attrs, > + gfn_t start_orig, gfn_t end_orig) > +{ > + struct kvm_memory_slot *slot; > + struct kvm_memslots *slots; > + struct kvm_memslot_iter iter; > + int i; > + > + for (i = 0; i < kvm_arch_nr_memslot_as_ids(kvm); i++) { > + slots = __kvm_memslots(kvm, i); > + > + kvm_for_each_memslot_in_gfn_range(&iter, slots, start_orig, end_orig) { > + gfn_t start, end; > + > + slot = iter.slot; > + start = max(start_orig, slot->base_gfn); > + end = min(end_orig, slot->base_gfn + slot->npages); > + > + if (start >= end) > + continue; > + > + kvm_arch_post_set_memory_attributes(kvm, slot, attrs, start, end); > + } > + } > +} > + > static int kvm_vm_ioctl_set_mem_attributes(struct kvm *kvm, > struct kvm_memory_attributes *attrs) > { > @@ -2602,6 +2628,9 @@ static int kvm_vm_ioctl_set_mem_attributes(struct kvm *kvm, > kvm_mmu_invalidate_end(kvm); > KVM_MMU_UNLOCK(kvm); > > + if (i > start) > + kvm_post_mem_attrs_changed(kvm, attrs->attributes, start, i); > + Doesn't kvm_arch_set_memory_attributes() work for you? i.e the following patch. The error check and pr_warn_ratelimited() can be pushed down into the callback. From 7c618c1f3c236c382e64680efcbe7d8a672aa870 Mon Sep 17 00:00:00 2001 Message-Id: <7c618c1f3c236c382e64680efcbe7d8a672aa870.1679114841.git.isaku.yamahata@intel.com> In-Reply-To: <428a676face7a06a90e59dca1c32941c9b6ee001.1679114841.git.isaku.yamahata@intel.com> References: <428a676face7a06a90e59dca1c32941c9b6ee001.1679114841.git.isaku.yamahata@intel.com> From: Isaku Yamahata Date: Fri, 17 Mar 2023 12:00:09 -0700 Subject: [PATCH 4/4] KVM: x86: Add 'set_mem_attr' x86 op This callback will do any platform-specific handling needed for converting pages between shared/private. Originally-by: Michael Roth Signed-off-by: Isaku Yamahata --- arch/x86/include/asm/kvm-x86-ops.h | 1 + arch/x86/include/asm/kvm_host.h | 2 ++ arch/x86/kvm/mmu/mmu.c | 1 + 3 files changed, 4 insertions(+) diff --git a/arch/x86/include/asm/kvm-x86-ops.h b/arch/x86/include/asm/kvm-x86-ops.h index dc5f18ac0bd5..956db2ee25a5 100644 --- a/arch/x86/include/asm/kvm-x86-ops.h +++ b/arch/x86/include/asm/kvm-x86-ops.h @@ -100,6 +100,7 @@ KVM_X86_OP_OPTIONAL_RET0(set_identity_map_addr) KVM_X86_OP_OPTIONAL_RET0(get_mt_mask) KVM_X86_OP(load_mmu_pgd) KVM_X86_OP(fault_is_private) +KVM_X86_OP_OPTIONAL(set_mem_attr) KVM_X86_OP_OPTIONAL(link_private_spt) KVM_X86_OP_OPTIONAL(free_private_spt) KVM_X86_OP_OPTIONAL(split_private_spt) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index 0382d236fbf4..88e11dd3afde 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h @@ -1731,6 +1731,8 @@ struct kvm_x86_ops { void (*load_mmu_pgd)(struct kvm_vcpu *vcpu, hpa_t root_hpa, int root_level); bool (*fault_is_private)(struct kvm *kvm, gpa_t gpa, u64 error_code); + void (*set_mem_attr)(struct kvm *kvm, struct kvm_memory_slot *slot, + unsigned int attr, gfn_t start, gfn_t end); int (*link_private_spt)(struct kvm *kvm, gfn_t gfn, enum pg_level level, void *private_spt); diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c index 0ec94c72895c..329333486e64 100644 --- a/arch/x86/kvm/mmu/mmu.c +++ b/arch/x86/kvm/mmu/mmu.c @@ -7908,6 +7908,7 @@ void kvm_arch_set_memory_attributes(struct kvm *kvm, gfn_t start, gfn_t end) { kvm_update_lpage_mixed_flag(kvm, slot, true, attrs, start, end); + static_call(kvm_x86_set_mem_attr)(kvm, slot, attrs, start, end); } void kvm_memory_attributes_create_memslot(struct kvm *kvm, -- 2.25.1 -- Isaku Yamahata