From nobody Sun Dec 14 19:37:08 2025 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2064.outbound.protection.outlook.com [40.107.223.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9E5C7248F41 for ; Fri, 23 May 2025 15:44:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.223.64 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015098; cv=fail; b=bdus0ID646pLakjrgspc0OEHQzcPI9MQQYiK0ezwhVFYd5yy067adhY3HYRA07hQ3QEjOeg9n3wzu1Hcd9sTE9PdUzQBAHcAkE7VGhBS4RyhTi/2xVbHTs6e+6ri3AerbepI9AS2rzTcpsQl1C7+UuTbWzo+F003rDnvoTfV8Co= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015098; c=relaxed/simple; bh=qEeUq/6NBwjqTdME6bWWYamWJR/prEA+1r+zsW1vQ2E=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=JgwWydNqiB+SMEcNonm+gmdYRU0l7aRluirI+8TGYpCFakRgrqg/fg6PXxSeUCk6lpmRXRlZdHwzhTXnibMYenQ9TpR6+p7hnrPITzfrcyZb6RzqaA4jO0DU1ahJ711gzM4CPAjYO25u+7FoJYYFm4m52FAj/Lj7I1u7NlvxwQI= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com; spf=fail smtp.mailfrom=nvidia.com; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b=jkJrEMH/; arc=fail smtp.client-ip=40.107.223.64 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=nvidia.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b="jkJrEMH/" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=rZDfodrNuUXQzcZ9/mWd0g9zf/acUdTh9VoZLcASHXJgFSwgGR4afgmr4/pkGZJfwH9zGlbPcwUrkCSiKklySJmlzRHl4ykkJQrOg/z9WG24dqPs/m7OiJVL3vwNWB5qExI7rwuw3RAjMzgEoWuHd5iQzgJ0/V2ezN97NGL+yeRfq2A7VtxTywQoXihHNvRoqiaV3yFUyUz+B8mcWZTTppLDrzUOG0MllSx6lr8ltDyg017JfxzZQmtQ1ILOF8U+PlA1zFxcoke7oMFyLNb2SbsfzzdOfhLY2UGyhvJy2DGywnXYjVtbjUlRswmvSFlXx68/aomZS7DO6Pbi7vYc2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Gymzk3KsFCNp8Z21DTOLHrkEpVUsP4yOo0PLr+aRcVg=; b=OS5SZOOmE82lgNxR013h63MtMxmAFmhvPRk3/3XilfOwQfSZ4TOAOeXhe86hKktrDk+wMKhFxBTfiYovtJEMPj103PC91lK1pFS7fEa8XpT21fKv5/UiV9/ukkxe/M1Z7CbzD6hJHYqIAsDckk0VXEw87yf1ptS//QYU9UaKDP4o5rlE6w9MXSn+tIPWTukIAN5rWVmwqTT2sWnebboT0viBwufSE1dP7EVeBAyWG9vJxHbC9w9MxGD2QQ2oDMP2Ry9BOYmj1eNmslYB3+Q8w12/QHEeB8iQ8yHjOQE5jHZot/cb81zl9QU06K6Ux7KM6q4rI8O7WdOwNqemJV4Qaw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.118.232) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Gymzk3KsFCNp8Z21DTOLHrkEpVUsP4yOo0PLr+aRcVg=; b=jkJrEMH/JYjaESzdY59QoKHIehqMDJj4CGq4SxKekRJvhY1xi+keIBee/nk5NGWdX+4wE8lnaqhx6v7daoACPphIv8aePWEyoKrMQm7lQNOUExWX2vTIvy68Kr2yW9GPLf5iITIeCJzq4UdPjTmT9QFR2Q3wfMT5CEsr/qrO2VkQbIY78yZUSFcl1a7ZPeHr3N3+zj3sMXQiYsOe8mrEiJTABNa3uC2QP2W0klqbgRPyv9m33OV8Ys00ejq8dJguXWbV0Ivmi68BQq6SeIx1mDrbicnKquMcTuBD8zQ3vsxyb5OOoNEQMpUPNzgtGkdVB4rtD+XdlJ4y93XPFA7IhQ== Received: from SJ0PR03CA0295.namprd03.prod.outlook.com (2603:10b6:a03:39e::30) by SA1PR12MB7318.namprd12.prod.outlook.com (2603:10b6:806:2b3::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8722.31; Fri, 23 May 2025 15:44:53 +0000 Received: from SJ1PEPF00002310.namprd03.prod.outlook.com (2603:10b6:a03:39e:cafe::4e) by SJ0PR03CA0295.outlook.office365.com (2603:10b6:a03:39e::30) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 23 May 2025 15:44:53 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.118.232) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.118.232 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.118.232; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.118.232) by SJ1PEPF00002310.mail.protection.outlook.com (10.167.242.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 23 May 2025 15:44:53 +0000 Received: from drhqmail202.nvidia.com (10.126.190.181) by mail.nvidia.com (10.127.129.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 23 May 2025 08:44:46 -0700 Received: from drhqmail201.nvidia.com (10.126.190.180) by drhqmail202.nvidia.com (10.126.190.181) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14; Fri, 23 May 2025 08:44:45 -0700 Received: from localhost.nvidia.com (10.127.8.12) by mail.nvidia.com (10.126.190.180) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14 via Frontend Transport; Fri, 23 May 2025 08:44:45 -0700 From: To: , , , , , , , , , , , , CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [PATCH v5 1/5] KVM: arm64: Block cacheable PFNMAP mapping Date: Fri, 23 May 2025 15:44:41 +0000 Message-ID: <20250523154445.3779-2-ankita@nvidia.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20250523154445.3779-1-ankita@nvidia.com> References: <20250523154445.3779-1-ankita@nvidia.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-NV-OnPremToCloud: AnonymousSubmission X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF00002310:EE_|SA1PR12MB7318:EE_ X-MS-Office365-Filtering-Correlation-Id: 240bed3d-1325-417c-a10f-08dd9a10c29d X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|82310400026|36860700013|7416014|376014|921020; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?53wbcYuAb3U0wpHWzSLJd2D1i1ntgsxMcMeEhG9M2WOUQ4WNyxe1eOJtX74z?= =?us-ascii?Q?W44mVg62Hgq2frgaeNLLbzgcGs+DNFexdUVwzax5dYa7An5GFWQt05nIxINV?= =?us-ascii?Q?KNs4XVT1EPwVEgAcluAS8sVxvgVgoxRD/e3UcoWlMmN4SYgzpggrle50H9A+?= =?us-ascii?Q?cbKc/Ls5nGsUP7XaYAl8C4gyX0Q/lrVN2SkhTturmaA+kzHQmXA7F0lp5Xrq?= =?us-ascii?Q?vq4GkZ/gnY7JyT08EKpWPc5Z7oVp8LFoQd48KDsQPGy3L2soHlVFsxjjYasa?= =?us-ascii?Q?RFtI8VfL3yX6sFnqy1FIGbxQq+qoRcJNY8IlEV45WKhQZ2dXihEHuOtiTlg/?= =?us-ascii?Q?4jw1rVp3iOigCvEbz2nDS47Tbu13aYHDsYNwFkjgFut7bUoBrBQKxlImE0Cw?= =?us-ascii?Q?lZHrE3dLfd1snsj2sePaKq+hEd7p4VKkHdioEjf0mXACH7uoPa0UrKi4Ghgc?= =?us-ascii?Q?azX9fyCsfhPGTTLfYiacCl0cxNfcpXI+ig/q4wNelCf036l92SGLN178ysoz?= =?us-ascii?Q?2BYCNIP0Mc9AoZpAjuo+EmgZbUQGm7VcHkfbMV6yen8TTUf01txL/6GmcqV0?= =?us-ascii?Q?gyTlnjAkHZcwVOn9wtVgVr76SSCI0oLXjn5Ybew/kmMnyBlkpwYrKUgcY5bN?= =?us-ascii?Q?YW8W2h2fh8Pqx66cJ15rhXcOXJiHpgydkpxhZcaAcqnPDcV4ID5EOuiwa2Bb?= =?us-ascii?Q?0Zh6cmXODLYXTQMHvDhMf5YyuGjA4iAFZdMWYMZjzJUTsdpvTHufTl53Ifrw?= =?us-ascii?Q?bTgWbBVS1MWDS4clDf6cRSJw1qs7Y5PJSoevViEhlt51I5G6gSeNCs1GGjrA?= =?us-ascii?Q?o7deyGDlOpOzRWJRqc2Wt/Jdbyy18YN6jo3d0flwrPBiJNZagHtPjzVKFT3h?= =?us-ascii?Q?z9ZXEZcruMU0aI1dS925AtNubKgkwS9Saq7Yz71CoYvp7+6UlSMU25gAoq+f?= =?us-ascii?Q?NW5F/EYNfgaquhsghxKxBk7vfBy6crd5+HK2KETQP40pgz5CeV3azLvx55AX?= =?us-ascii?Q?9GM2CqD2XgVZ3mJU1BCt31cMpOwy74zQY1eLmxov3p44VaT/N7kQfH45mHKB?= =?us-ascii?Q?ijZLUn7ewX4oPwfd7Qn20IX0r6rVq86NKLngxLdfU2TLnqbMHFTV9SE121hy?= =?us-ascii?Q?Yfws+UPSAmwCFHeHRJJPIw77ZzfxT6f06PUfTClrWL7gXNR0+66XcLJAe52e?= =?us-ascii?Q?biZw5gSzHoA5YV1acm4Jj+MyY2ybQIVH9v1e+tWd01BPOrL8WrGunicj1SjV?= =?us-ascii?Q?r4OwH8Kh64lZKzaPNBi1TiOK5nwcyEJGvtRvK9DpGeJicuTJ+ddQsTCh17zn?= =?us-ascii?Q?Er7BScrWNkjf0XVbxI8Eg3tJi+oGsRyxUByfxM7QdHl+9NddFQ2+LZe2aD/m?= =?us-ascii?Q?wbE82lUjXmW/IFetpJppC9ICvYIuchLZSlisVCgOyFNYqCfKZmx0Ywaq0GZq?= =?us-ascii?Q?9Yajz+Xy3i0uaEDe5B/YhpmucOT6a0nCO+mjjSwRMrhSfwnRxYBPMlWMUg4p?= =?us-ascii?Q?bwKv3cBg00Um1qiIiOJ256gYYsFJuDHkZCssRIm0UPHZTxJp6syjfVbE5A?= =?us-ascii?Q?=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.118.232;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc7edge1.nvidia.com;CAT:NONE;SFS:(13230040)(1800799024)(82310400026)(36860700013)(7416014)(376014)(921020);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 May 2025 15:44:53.1599 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 240bed3d-1325-417c-a10f-08dd9a10c29d X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.118.232];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF00002310.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR12MB7318 Content-Type: text/plain; charset="utf-8" From: Ankit Agrawal Fixes a security bug due to mismatched attributes between S1 and S2 mapping. Currently, it is possible for a region to be cacheable in S1, but mapped non cached in S2. This creates a potential issue where the VMM may sanitize cacheable memory across VMs using cacheable stores, ensuring it is zeroed. However, if KVM subsequently assigns this memory to a VM as uncached, the VM could end up accessing stale, non-zeroed data from a previous VM, leading to unintended data exposure. This is a security risk. Block such mismatch attributes case by returning EINVAL when userspace try to map PFNMAP cacheable. Only allow NORMAL_NC and DEVICE_*. CC: Oliver Upton CC: Sean Christopherson CC: Catalin Marinas Suggested-by: Jason Gunthorpe Signed-off-by: Ankit Agrawal --- arch/arm64/kvm/mmu.c | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c index 2feb6c6b63af..305a0e054f81 100644 --- a/arch/arm64/kvm/mmu.c +++ b/arch/arm64/kvm/mmu.c @@ -1466,6 +1466,18 @@ static bool kvm_vma_mte_allowed(struct vm_area_struc= t *vma) return vma->vm_flags & VM_MTE_ALLOWED; } =20 +/* + * Determine the memory region cacheability from VMA's pgprot. This + * is used to set the stage 2 PTEs. + */ +static unsigned long mapping_type_noncacheable(pgprot_t page_prot) +{ + unsigned long mt =3D FIELD_GET(PTE_ATTRINDX_MASK, pgprot_val(page_prot)); + + return (mt =3D=3D MT_NORMAL_NC || mt =3D=3D MT_DEVICE_nGnRnE || + mt =3D=3D MT_DEVICE_nGnRE); +} + static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa, struct kvm_s2_trans *nested, struct kvm_memory_slot *memslot, unsigned long hva, @@ -1612,6 +1624,10 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phy= s_addr_t fault_ipa, =20 vfio_allow_any_uc =3D vma->vm_flags & VM_ALLOW_ANY_UNCACHED; =20 + if ((vma->vm_flags & VM_PFNMAP) && + !mapping_type_noncacheable(vma->vm_page_prot)) + return -EINVAL; + /* Don't use the VMA after the unlock -- it may have vanished */ vma =3D NULL; =20 @@ -2207,6 +2223,12 @@ int kvm_arch_prepare_memory_region(struct kvm *kvm, ret =3D -EINVAL; break; } + + /* Cacheable PFNMAP is not allowed */ + if (!mapping_type_noncacheable(vma->vm_page_prot)) { + ret =3D -EINVAL; + break; + } } hva =3D min(reg_end, vma->vm_end); } while (hva < reg_end); --=20 2.34.1 From nobody Sun Dec 14 19:37:08 2025 Received: from NAM04-MW2-obe.outbound.protection.outlook.com (mail-mw2nam04on2065.outbound.protection.outlook.com [40.107.101.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 260CF2951B5 for ; Fri, 23 May 2025 15:45:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.101.65 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015116; cv=fail; b=Y+eipJ6RW35diRO6V1v0Zh2i+XKYSZ+SvXATkdVNMlltomcItyt565fYVdyOiffoCcrkfLuFvM3LS8hnNtXn0m4/6zfJA+oMLSUm9QXqHxDIAntbq39N5MmqyYwYIln10PlC/aRswb6dXbYven6O45a9n+DqTq6usZA2qPaghFg= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015116; c=relaxed/simple; bh=YCTABOeuYXthINnhf/StJlkplswkYPopNXMLpBUSQ5k=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=X5xIDBltDrpkRl8MbYskMi/5bqjJJ1IQVzuv5xQaDnzBtvQR3eqiAaGLNETiSLyLoyH/aR0faUOuRqNuEKdeieiEiEV3+Y60UwqMRl/FSuuxnE/Xrnl3Ra/H48dNLIBrSmDNj5e9IjukomkpqAn0vNggAR48zPFeE4Y/JGF0JiI= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com; spf=fail smtp.mailfrom=nvidia.com; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b=l83/P24H; arc=fail smtp.client-ip=40.107.101.65 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=nvidia.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b="l83/P24H" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=c0zruVgJ8pgSVFBxouJ9zlMtyaxzmLl4L7DOPDlOs08fDquSj6IYxDTJ77y8/nB4dbwYC4pILUHuHIgyy/t+zbWHvDCXpDYB/Qwkv65kDewmfKqQTam2tiq8BJ/k+4yrmC4DlHNc2NDZSN13sBkTQsaUUlewJsIZ3gpRM+vhyCnDmqxKALfHEdCZokgHmYPy5rV9atZPeaKuBAZy1ATH3Mkjqdf4qYtt6s+b+dyqVwAMIRqLQ+bkhxu0ZubZzcDOalz7GnDTwNMcQg5zE8Qznp/kzSBXmTH2S4SoSRiLr8EDrY/zt5iPKxeO2bZu576yyNnuTa13FqBAPNh1wt4EaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bW5E1oaD/9AgHG56rYr1wGHv7xbFYhUjEVEVXUoNReQ=; b=RHxV9AIBL42VZSDpR8ZgW7rosruzTTobk0yFV+H31+YVwwvO3lzvm51XFMsyAzP8KZZ6fBkVZruL9Pbv18QteVKo+o1rqvios/Pc3q4fREOCQlJ7IcGGKqIQT/g/7+jVafsLvUExiMUAnBleb1Noi/RGI5+tYX+V3EQE8IPHahPvV4UbAEA7e2YkdOaXiF1YDKtQSm8mTRSgwS+/r5rrY0ckNJ4F1TPO59dAFYF1f2i6WDqSQbcpgnjvvh3tUzIUUAzNIh6Kf4/gME9UotPsxME/DfFzMXTwUlMgZtDJg3LmXexA0wmMh9BkFLoY9pImTcmJb7sMba4pVAA5ZTs7cQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.118.233) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bW5E1oaD/9AgHG56rYr1wGHv7xbFYhUjEVEVXUoNReQ=; b=l83/P24HwDsKR0D3ndMJylg3lX2hJhdzyftgPZKQAlJVQCCT0OCErQG06mxvqjh/MrKRHSdZtZ55aoOKavyFTXuU9ulhcEm/PviwNpSIvw4JAsa9QUgPSqHaEOrjxY8SzEs1kp2LrFBxJF+eo9+6wRa0qHkmnUiXUDXHx1VguegCt8PS45eGKxI6x/Rs8rGWaIMzZkQ9HrJjYW8s7MqKr4QpTEzW4KogWPo1m31UGn7/hqcvOottGw14IooyjrxhGRR4oirxpMoIEaBnBz7QUeer9UcAcdlvr7Bmp4t0mEVRN1Uw0QEHtYPEpr9214Oeg2aTNYOT61z/PasOwXrbNg== Received: from BN0PR04CA0199.namprd04.prod.outlook.com (2603:10b6:408:e9::24) by CY5PR12MB6381.namprd12.prod.outlook.com (2603:10b6:930:3f::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8746.30; Fri, 23 May 2025 15:45:11 +0000 Received: from BN1PEPF00004682.namprd03.prod.outlook.com (2603:10b6:408:e9:cafe::e8) by BN0PR04CA0199.outlook.office365.com (2603:10b6:408:e9::24) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.21 via Frontend Transport; Fri, 23 May 2025 15:45:10 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.118.233) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.118.233 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.118.233; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.118.233) by BN1PEPF00004682.mail.protection.outlook.com (10.167.243.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 23 May 2025 15:45:10 +0000 Received: from drhqmail202.nvidia.com (10.126.190.181) by mail.nvidia.com (10.127.129.6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 23 May 2025 08:44:46 -0700 Received: from drhqmail201.nvidia.com (10.126.190.180) by drhqmail202.nvidia.com (10.126.190.181) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14; Fri, 23 May 2025 08:44:46 -0700 Received: from localhost.nvidia.com (10.127.8.12) by mail.nvidia.com (10.126.190.180) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14 via Frontend Transport; Fri, 23 May 2025 08:44:46 -0700 From: To: , , , , , , , , , , , , CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [PATCH v5 2/5] KVM: arm64: New function to determine hardware cache management support Date: Fri, 23 May 2025 15:44:42 +0000 Message-ID: <20250523154445.3779-3-ankita@nvidia.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20250523154445.3779-1-ankita@nvidia.com> References: <20250523154445.3779-1-ankita@nvidia.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-NV-OnPremToCloud: AnonymousSubmission X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN1PEPF00004682:EE_|CY5PR12MB6381:EE_ X-MS-Office365-Filtering-Correlation-Id: 5274622d-4fe1-4b35-0fc7-08dd9a10cd22 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|376014|7416014|1800799024|36860700013|921020; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?0TjkH4urT9+RENMdsoNA5ctj8CYMF8CSIAcVLwyTs+xV5uv1qTx9viGFV3Ke?= =?us-ascii?Q?oY38QZEKtgIj37TMbn7n35+LcoZO8LmHfl2IcFWovmBjp2GOfjUxfBl4E9Ch?= =?us-ascii?Q?6Z/WEDyHPbQov7BBpm9n9yU8MW0BiO8XQAc4wkqoz8IH9oiNJHi8ZyU6OdsR?= =?us-ascii?Q?hMbuYcWLXlZQlt/J/U1sY1fAO8H3JoQwGUdqbbz/3PeVJRoYIt5Ir3FZg8aE?= =?us-ascii?Q?vn1dfLfFwqX01vK3qY+7s1B+H6tGopJxnuJih3IgiaZjvb7Qf4VhX2A3XYG/?= =?us-ascii?Q?it5vK5trvxamusJnwRWRUDfY8uNhFow57hiOOs4/ttkTbyMIhOPSkUJtyrVh?= =?us-ascii?Q?V57acJdHQItqjKmmEue8eDHSLRTj0Tzi6ClYl0532YdS4bukREtwyCH9lK+N?= =?us-ascii?Q?BdGggb05PC+LgAxywoCiiBghWqCC7FBNI804Ak0UfpwSYiyJHfuHBTBs8s5w?= =?us-ascii?Q?z7MXBf2/Nj14fIKnfcHVw2EEVMgIljE/i5358m0LlrgLG/SFQ64hqtsuyTVq?= =?us-ascii?Q?XBgzj4QCqGpy4bTf4LNPyd8ox1TDYJn8mX0VWlv9OIkVN0zuMoePefnYWwYZ?= =?us-ascii?Q?ejTVtD1iPfE9b8rQggb1uZzHpGN/hi9qxVnn8g1LDknIfx11J3nU30fJxDtH?= =?us-ascii?Q?4auIA3KZMCPcpDyoMJ4ckqlQ4nQryWFRH1fKYgkCfZz7qLRsayv+KgYy7RML?= =?us-ascii?Q?zCfyzQSWKKek5tXPCXt/pUHwJbc5enPx22KNAJgsuItgRub/qFD2WA/yHSoG?= =?us-ascii?Q?zzeEjViG1nuvlNs+AauYmnEpQ851kunVb5II4vQw2oycNlWf0EvhQZUsPcBk?= =?us-ascii?Q?UteoQA2giwucSSlrMNTkszNVjg+4GnCDe9EMOn51P7tXm1+T1wg796zQW61I?= =?us-ascii?Q?APHpfdz+BanzAmjuYR+nGuE6dPBS7JBMuithOcGcSc/fA1DxMSbLsF1egJBW?= =?us-ascii?Q?i6QmqndSUlUdVjDj3W/8dFXaD8ySE11P4rnpV2Yj1cAhF3JOpqmkxKdnGbUf?= =?us-ascii?Q?DEI+IRzjuw76V0aXgjVc+LjM9MyGrdE/TJupVVsPyBIllemUQkWPPhvggEtX?= =?us-ascii?Q?RsEbr5nqrG9iFoTlzRe+boI1NeuKKsItvdwSUtlG/tFyhWvSeKlIryQDBa5J?= =?us-ascii?Q?u36lfq3zlYNg/i2bCn3QnKIYv2UJFL6IzuZLfWmvPz1rQ00EDvAePCrwGte/?= =?us-ascii?Q?n7V7Xrhm1LnYRXzRjFevwuftETdRCaQ2EsB/qNEc7pT2xM2VnYpkbQWpY3AN?= =?us-ascii?Q?/wPqqIx2CfiTHGFscjpz6hN/rtIj/T7uYKfIPe9IH1ljMXEYMvdgjpbbkpHN?= =?us-ascii?Q?4NaYi1x5M+F8RP/j1a1yxoPNhp91Jm5mFxZVEuIxqEi3+Tg58q08YmQDmrqF?= =?us-ascii?Q?AHI9AgKbpmGwG/7/3U3RYRFnu7At5S5e8fXig5C34Xg8sb7WNt6OGVTTqLr3?= =?us-ascii?Q?okkmF9oixFsfHnSdA7fbtKkmm3ddkxNsnELC8WUWOc0EdcZqYxJcPcSwDwqf?= =?us-ascii?Q?YI/jTYUhPH3Vtdib6S/WUke01MoObXWK+YG2RWdtXgIS5Enu9e+VgOLyiA?= =?us-ascii?Q?=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.118.233;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc7edge2.nvidia.com;CAT:NONE;SFS:(13230040)(82310400026)(376014)(7416014)(1800799024)(36860700013)(921020);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 May 2025 15:45:10.7334 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5274622d-4fe1-4b35-0fc7-08dd9a10cd22 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.118.233];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN1PEPF00004682.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR12MB6381 Content-Type: text/plain; charset="utf-8" From: Ankit Agrawal The hardware supports safely mapping PFNMAP as cacheable if it is capable of managing cache. This can be determined by the presence of FWB (Force Write Back) and CACHE_DIC feature. When FWB is not enabled, the kernel expects to trivially do cache management by flushing the memory by linearly converting a kvm_pte to phys_addr to a KVA. The cache management thus relies on memory being mapped. Since the GPU device memory is not kernel mapped, exit when the FWB is not supported. Similarly, ARM64_HAS_CACHE_DIC allows KVM to avoid flushing the icache and turns icache_inval_pou() into a NOP. So the cacheable PFNMAP is contingent on these two hardware features. Introduce a new function to make the check for presence of those features. CC: David Hildenbrand Signed-off-by: Ankit Agrawal --- arch/arm64/kvm/mmu.c | 12 ++++++++++++ include/linux/kvm_host.h | 2 ++ 2 files changed, 14 insertions(+) diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c index 305a0e054f81..124655da02ca 100644 --- a/arch/arm64/kvm/mmu.c +++ b/arch/arm64/kvm/mmu.c @@ -1287,6 +1287,18 @@ void kvm_arch_mmu_enable_log_dirty_pt_masked(struct = kvm *kvm, kvm_nested_s2_wp(kvm); } =20 +/** + * kvm_arch_supports_cacheable_pfnmap() - Determine whether hardware + * supports cache management. + * + * Return: True if FWB and DIC is supported. + */ +bool kvm_arch_supports_cacheable_pfnmap(void) +{ + return cpus_have_final_cap(ARM64_HAS_STAGE2_FWB) && + cpus_have_final_cap(ARM64_HAS_CACHE_DIC); +} + static void kvm_send_hwpoison_signal(unsigned long address, short lsb) { send_sig_mceerr(BUS_MCEERR_AR, (void __user *)address, lsb, current); diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 291d49b9bf05..3750d216d456 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -1231,6 +1231,8 @@ void kvm_arch_flush_shadow_all(struct kvm *kvm); /* flush memory translations pointing to 'slot' */ void kvm_arch_flush_shadow_memslot(struct kvm *kvm, struct kvm_memory_slot *slot); +/* hardware support cache management */ +bool kvm_arch_supports_cacheable_pfnmap(void); =20 int kvm_prefetch_pages(struct kvm_memory_slot *slot, gfn_t gfn, struct page **pages, int nr_pages); --=20 2.34.1 From nobody Sun Dec 14 19:37:08 2025 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2070.outbound.protection.outlook.com [40.107.244.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2FFAC14286 for ; Fri, 23 May 2025 15:44:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.244.70 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015098; cv=fail; b=q76G0fBkma9iI4IjuSDxQEC8znm09BIGlf9IGaML9T20f6ML4c+Z1YzOXA33efNm1PE/kO9mudsSoKXAsjS91YeaMgpYQAgmTDhoZ+cR8Awcda5FA+PVmyXgti0A3X3pREzA4t7tfC3eVsDVe450Ympf8hpvyCX2+tYpAnl1nFg= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015098; c=relaxed/simple; bh=qPD3zsb8fM+dziKuxzB5Py+N6VHYWl9kkDqcrkxpOgY=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=Tli66oV004Sdce0X5FMatolVKP5NZNmxXog5mpgdVnEJZ/PJAYIGSS6T/Jv7DGc4rUQclreLhQYj0xLxues9NHVpRT0A+RxK7tVE66nhEl27kuZs92fcWNXOKEjmW+d1Nx7rL6nqOJzlh8pe7Y1RQL81pV+tDCwo8SbnI+vSKNE= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com; spf=fail smtp.mailfrom=nvidia.com; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b=KD43nDE6; arc=fail smtp.client-ip=40.107.244.70 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=nvidia.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b="KD43nDE6" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=y2Wdn5cduixafIA8HISdvxapFCNlc/s8k4pULzDX7RDfJ8lYQJTKXX5jrkvNA1HtL2vugmh9sSv20MSbbyeFjnyRvD7cLccjm6SZK44NpQ3+Kp8CEgmVO1lMNLFIS0xWHPlKWIELhxpB4R9MUPiJ4utzdxYnHshrXGtCKFAnNpuYOo3n3vs/3tPoe0DHxlDvChzt0u28J40s+ssgVEX7lXui4auqbzPNRvsXoApu5kfcO8b3H5VI4e+jaavBPoNLn5XL80Ewhj6TpUcLWrnY2pzYqoe52x25dZ+Wo16brOCiTDtTKSmctHZL2S0EMkwpJd5Sn5pqLQg91kErkaiRPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=SaXOPNuoWZbkvn372SU9RtPMnt+hVXByG4V0S5FqS6A=; b=fNC3iLj0K7IOtzz7zjcyByxwLR4lDj+I/M7TeZNthE2b9k/FVwGwIbC1nxGuWNHvsmvUMe5TPLheHFYJFrEhXeiEFkmNsMK9V+ZDjsBnbuCR2gHDU/WBySoUIywmcZFQccwHb57nSEFWZs//Qrm+zcYvywkQ4t+YeAj6vDhwdLyNK0Z/3NaXlnFHGPjK4wZp50ao9WBN25vyPV8SLsTF7cjSi+Q092yMSu5TLRJTW2+52Rrc+gufKZOxsQuGL/vQhCY+5Tzel/jvbVIWCjHTYjQV6agpzwLlTVcnjdYQsYRGzLgEZqq6+1K97r9f8CyV4AnN/kotdHQLatA9i4n4MQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.118.232) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SaXOPNuoWZbkvn372SU9RtPMnt+hVXByG4V0S5FqS6A=; b=KD43nDE6y96vy9X97YYgeSVQiTBJAUjoSQblK1AbWVgAV+bAoYw/ZUZ18+qXljTEOe91yyVRrtc2DUEkJVV1ymA/L8FgpOeLCWQ5JBEOqY13ta8OAPPLycGUTTyzSGVHrfXLPM67hxDL9YKi3IavqE/JetHlNTI3NSPjdEEe8DsHiWy0Ku/RSw1sIkF57nJ+JjR/BcGdaF8rTi8OSUNMyjYkf68JiUmsfGCFv5kc9+4QfCVcbklmrYSKBw+ZE2sNnwX+E7Z1vRA56CyLKg3GDe1C1kJ9qapsMGAmjw2W9nLsfaSrN80jr0588lUJ1K3guMxCCgzTAtettu5LxWQIgA== Received: from SJ0PR03CA0288.namprd03.prod.outlook.com (2603:10b6:a03:39e::23) by DS7PR12MB6021.namprd12.prod.outlook.com (2603:10b6:8:87::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8699.26; Fri, 23 May 2025 15:44:54 +0000 Received: from SJ1PEPF00002310.namprd03.prod.outlook.com (2603:10b6:a03:39e:cafe::22) by SJ0PR03CA0288.outlook.office365.com (2603:10b6:a03:39e::23) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 23 May 2025 15:44:54 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.118.232) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.118.232 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.118.232; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.118.232) by SJ1PEPF00002310.mail.protection.outlook.com (10.167.242.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 23 May 2025 15:44:54 +0000 Received: from drhqmail202.nvidia.com (10.126.190.181) by mail.nvidia.com (10.127.129.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 23 May 2025 08:44:47 -0700 Received: from drhqmail201.nvidia.com (10.126.190.180) by drhqmail202.nvidia.com (10.126.190.181) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14; Fri, 23 May 2025 08:44:46 -0700 Received: from localhost.nvidia.com (10.127.8.12) by mail.nvidia.com (10.126.190.180) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14 via Frontend Transport; Fri, 23 May 2025 08:44:46 -0700 From: To: , , , , , , , , , , , , CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [PATCH v5 3/5] kvm: arm64: New memslot flag to indicate cacheable mapping Date: Fri, 23 May 2025 15:44:43 +0000 Message-ID: <20250523154445.3779-4-ankita@nvidia.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20250523154445.3779-1-ankita@nvidia.com> References: <20250523154445.3779-1-ankita@nvidia.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-NV-OnPremToCloud: AnonymousSubmission X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF00002310:EE_|DS7PR12MB6021:EE_ X-MS-Office365-Filtering-Correlation-Id: f8aa7f71-3dab-49d4-77fc-08dd9a10c395 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|82310400026|7416014|1800799024|376014|921020; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?JYzbOzNnY/DENusrRt2EEJFq7HiLBP3TmDjQVd6PfQgemvTe2bGyaK2uMxR6?= =?us-ascii?Q?DGjVMYdw1qfDAr2pFd/rfm2qQ1+gnWkho3iqkxKJVWWmu3Yf/nJ57xSfaDO/?= =?us-ascii?Q?4+U2Wro2TnC0a7brT/lDlUJqCzanZYqLa71GxTlU2ZKR2jjN9VzB21Qf/RcK?= =?us-ascii?Q?MTEMIC1qh+Nzo+JBnHBAt006o83GsF/TYytiDtPrAL8C+dBE0Xt1/KCI38m/?= =?us-ascii?Q?WK/85hvKTs9rNnXW/QeXjBIPuKnK+z9SGtqiB0Z2DgDJCNy2NvJKMQp+XKiN?= =?us-ascii?Q?v7TAvvFYO14vETIAo4hUafwjdxTor134eu9OhHbvSKDKT8fAKp2RWMG2ZIw2?= =?us-ascii?Q?evpnBbsO0/tZnblP4OvO7pzmLZxSurLLrJU2LW/Xoqq/DX3IixWD3xFa+Jyp?= =?us-ascii?Q?MZ+Y32z6YAVpf7e+QYAuWWgGPF6yedzcQEL7OZjgEgqiv9L9IpN522otlZ9J?= =?us-ascii?Q?MaiNPemnNI+Eo3L+/XyHuUeUfLo6AAKUI96Slz5abyi1JRGvPB4KnKhIQ4i6?= =?us-ascii?Q?6ecgkv6NQJV0c0k5Lz10uDEsQ6yBi4WUqmnxc9ZF5CZ9vSlanqP8PbTQAMVp?= =?us-ascii?Q?pMlpkw8Yu0hxZ5PZbV0D7C5rgqfhBRn6/Tvr9Dxs+f7j2EJo79gD4L/Wge6L?= =?us-ascii?Q?yIuvRRBTpXPzgQse14y9MQFbsRdQbmb83vXz+u3CsTMjoi/uYydDZIkx3FpT?= =?us-ascii?Q?Gi/C4lv5J7P9srOgvqkWaopzwCoPVxIKeDX7O/T3fIZKOXavQ7NqHn2Usqjy?= =?us-ascii?Q?q5hKrlw4S71G4M7kCIi4F5i9a7mDm9LMYfVlFSc8qZGN4GtiREGyvM102I0i?= =?us-ascii?Q?0Pcu3omTU1NXL05dmc20prA5sawYN+YDQFs+Jx0Jc0nd24prVxpDndTlTmp5?= =?us-ascii?Q?1wM5a+4jWfOdjPIrE+mEoUdGQ6rAQeg07iTmQZzoZDBspAK0jVNiVyW28jRF?= =?us-ascii?Q?iu8FLLmQ0oxl2E0tmhPRI27fSRKZVAVqhkV3Tv8UFA1wHG7Zh3qOsn46gIGj?= =?us-ascii?Q?m416jBEbnByMSZ7g79mHkQDJ9SdDqSoPcvpPYCLWjPSAQ1XMVOBKYW0+5Ago?= =?us-ascii?Q?gzMUV7axwYA+WpssTJR4IYFnZD7i9eM4V5UAWvvoEzINzo5SugOox1NDqxXr?= =?us-ascii?Q?asKBpUoeagvSml3nf8o212sWLr6epRCd55FAZbPLJuztHpRbm7RzaqMGH4Ab?= =?us-ascii?Q?z4C8BKPgaBbPEi+G1tc60IYYv3sOdvmgxupAo+pMNut7b56ifjMlJFEgG1+g?= =?us-ascii?Q?TQ9Sp4TMePY7CwYcN3BLjIESAcZGrvLl7G8HyxgddQN6rHUVfZqolCijK+Wi?= =?us-ascii?Q?xRP4jQk/wvF4Ou6d/J1hxijI2HBb9BLghoQ5wPrfRPnwxMnxYa6bLIC4Q2oO?= =?us-ascii?Q?TN0+LiQJ7eKuJZjhqcPYS7QobLBYOIyrjlfYr/VWQgD8EOsgwpMgJQ8ouHzv?= =?us-ascii?Q?KkSQhOdZ8YZKq7eW7Q7NsywE49iKBBjdaHN+Yl7rSxBlanB0q6/nBmAH193t?= =?us-ascii?Q?CWIgPbkj5lBItiQ4cs5yKRelSAe3RI7aMFcNRi3UKOBJ51v/fIA4sYOxVw?= =?us-ascii?Q?=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.118.232;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc7edge1.nvidia.com;CAT:NONE;SFS:(13230040)(36860700013)(82310400026)(7416014)(1800799024)(376014)(921020);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 May 2025 15:44:54.7849 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f8aa7f71-3dab-49d4-77fc-08dd9a10c395 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.118.232];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF00002310.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR12MB6021 Content-Type: text/plain; charset="utf-8" From: Ankit Agrawal Introduce a new memslot flag KVM_MEM_ENABLE_CACHEABLE_PFNMAP as a tool for userspace to indicate that it expects a particular PFN range to be mapped cacheable. This will serve as a guide for the KVM to activate the code that allows cacheable PFNMAP. CC: Oliver Upton CC: Catalin Marinas CC: Jason Gunthorpe Suggested-by: Marc Zyngier Signed-off-by: Ankit Agrawal --- include/uapi/linux/kvm.h | 1 + virt/kvm/kvm_main.c | 3 ++- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index b6ae8ad8934b..9defefe7bdf0 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -51,6 +51,7 @@ struct kvm_userspace_memory_region2 { #define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0) #define KVM_MEM_READONLY (1UL << 1) #define KVM_MEM_GUEST_MEMFD (1UL << 2) +#define KVM_MEM_ENABLE_CACHEABLE_PFNMAP (1UL << 3) =20 /* for KVM_IRQ_LINE */ struct kvm_irq_level { diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index e85b33a92624..5e0532c3abc2 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1524,7 +1524,8 @@ static void kvm_replace_memslot(struct kvm *kvm, * only allows these. */ #define KVM_SET_USER_MEMORY_REGION_V1_FLAGS \ - (KVM_MEM_LOG_DIRTY_PAGES | KVM_MEM_READONLY) + (KVM_MEM_LOG_DIRTY_PAGES | KVM_MEM_READONLY | \ + KVM_MEM_ENABLE_CACHEABLE_PFNMAP) =20 static int check_memory_region_flags(struct kvm *kvm, const struct kvm_userspace_memory_region2 *mem) --=20 2.34.1 From nobody Sun Dec 14 19:37:08 2025 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2044.outbound.protection.outlook.com [40.107.93.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7CB502957AD for ; Fri, 23 May 2025 15:45:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.93.44 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015117; cv=fail; b=ed1wrYUidNtzw/5NQPL/bgurFsBX0cJh6nxkHmgd/raleg6TtAHRcj8NTrlje7nFH1/51i+J7YLuhQVcBBHYu3+JWQRQTsrAFIazUIwfsNMl5Iay1CuvjE4kBAk4mPJkX5rYozzRBIZC5Ub64i0nyE7Fwx7gEDL3vHu9IpYctUM= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015117; c=relaxed/simple; bh=cam65h2eSzybfKW2JS4kICdDcD8NFjqqtEkTEoc5kg0=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=W2j7AstGDvoi/W2LkPHKJvRl3lApELXSxxuA44w2iSy48H64LmfnIpzTDiCzxG4Z/W4SvANA+7PGSMKB1z/LAOVSY/2ywBeEearnbc1fcXxkrHPDvSMiy/MIX5yUL3mD55aZTaR116tTQh86mYUewBukWpqzRHAxPCzh30QM9qQ= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com; spf=fail smtp.mailfrom=nvidia.com; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b=D7yh6zpS; arc=fail smtp.client-ip=40.107.93.44 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=nvidia.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b="D7yh6zpS" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Mt4tO68ldDeguWYJ1xo7GOcyC+wMsyLEMXsYmVMqC7MduX9NPlcjgxRty5JBQJOAr8hBqvtIkMwd9DMv7TblxkPw5l/CqDg53ERWyy3XnKkd2EPkBexhdyeDGi/wyIU6D0Bv2p646sZixOYWPJgTVspnRCXXVI6gwQCuo5WO5mtAdDdfd20ltGVWL3pWRc448lO0CDQkFjx/908fCuByr2NwJUvxwaYZZgK86LBIU1eKtVwVtqB0fw9XjVDwRKNxxZwLiAB88tRwmtalPDlQqT3NhlgDqsvmKSjtXDbMePyXtDm6ZPvmjIqma7c0hChpI0utQCUKQb51bLz1SmejqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=wNm5I7I6CYILmyn8GPEX+GWP30RzjTDi9t+YdQ+Let8=; b=qKJR/Q728dvvRGa18CIovIV1OHAd8zwg6tKItgdwo1t7g2BMEJTyZYYE5bDyrn8LbtjjNSS3E+/XjTxOQq4+wV/4IJclqeQAeFqfn5/jhAqmkRHE+BxLV7Sjjna37wY8L6K9FeXlHhh2udsNKKEcQF+8de1oRvSeiZA6+Q65CmsBLytfATkev44UD6jGakC3mKkgnxBg3V0BLayjOyBc8mzLGrr6W5PWxB82lh9JRBAgHDcBbUqT8rdxq437Z7bqjs65ecqFdFlsJiiw4eqN9EUHw0UnI8oB4dDWbZne8/vxyGcq3db4xfa+j2GkNv6ScBpiM1fqrL+ycqJ6EzLIYw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.118.233) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wNm5I7I6CYILmyn8GPEX+GWP30RzjTDi9t+YdQ+Let8=; b=D7yh6zpSfDYMh32yz5lOaks2W7vnnluId8mM4CeQkKa7+S95XrIhwgE7WynfmvRSN1oh4tYqBWFBQ4Sn7G29UEMt2dcXVNAsFmMdYnp/S7Q6OO0mUMjWnq7lINdxWJ9/aSa5gnrT8LI8EEDxkmjlKZo3Mb52HaEG9uX4JF4e5HH6zX6gRQFVg25itJOFMy+aiy8D8U4I8OEZybPh3tf8LX9m6CZtQPXUhzIKPh+VB8sodSG4Q4ujp2lgX/GC3DrB172yuwq5D1GL4/tZLLORJmAJ/7B2YcSJEE5xDwIr3Y8gVf+Cw8L2Ig/CgabF8vyHm1gKDWAvNHGSaG9xW8cv8Q== Received: from BN9PR03CA0442.namprd03.prod.outlook.com (2603:10b6:408:113::27) by CY5PR12MB6084.namprd12.prod.outlook.com (2603:10b6:930:28::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.20; Fri, 23 May 2025 15:45:11 +0000 Received: from BN1PEPF00004685.namprd03.prod.outlook.com (2603:10b6:408:113:cafe::e9) by BN9PR03CA0442.outlook.office365.com (2603:10b6:408:113::27) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 23 May 2025 15:45:11 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.118.233) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.118.233 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.118.233; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.118.233) by BN1PEPF00004685.mail.protection.outlook.com (10.167.243.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 23 May 2025 15:45:11 +0000 Received: from drhqmail202.nvidia.com (10.126.190.181) by mail.nvidia.com (10.127.129.6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 23 May 2025 08:44:47 -0700 Received: from drhqmail201.nvidia.com (10.126.190.180) by drhqmail202.nvidia.com (10.126.190.181) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14; Fri, 23 May 2025 08:44:47 -0700 Received: from localhost.nvidia.com (10.127.8.12) by mail.nvidia.com (10.126.190.180) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14 via Frontend Transport; Fri, 23 May 2025 08:44:46 -0700 From: To: , , , , , , , , , , , , CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [PATCH v5 4/5] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags Date: Fri, 23 May 2025 15:44:44 +0000 Message-ID: <20250523154445.3779-5-ankita@nvidia.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20250523154445.3779-1-ankita@nvidia.com> References: <20250523154445.3779-1-ankita@nvidia.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-NV-OnPremToCloud: AnonymousSubmission X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN1PEPF00004685:EE_|CY5PR12MB6084:EE_ X-MS-Office365-Filtering-Correlation-Id: 8bd68431-40c6-4646-e56b-08dd9a10cdb3 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|1800799024|7416014|36860700013|376014|921020; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?D+BakqhInwRfeiIT5B9Pqm2L+wtzROm1zIfdKJgIthu23acxn3l2MyLly9rl?= =?us-ascii?Q?dThk9Z2xSMFDmkM4X1DqheJ4QJk2K8eZYd5hD5hygmQ1pZ78klDTsyCJtpnp?= =?us-ascii?Q?9EqSGu+XQ7w4ZQHYFy7Ao/7au4XOxSOQHnd4Y6j7WMvO+XVGEZPBX9tLqB3l?= =?us-ascii?Q?aIdTrykLtar6DeVA1Nu5rQOcTRKEIQWZL/a8nR4VTlHEdcnqUl8v+W5kY0ao?= =?us-ascii?Q?LBFWEo/XnGJxFvuuqTdUwz0WW3+Gyv4exLhUJB+yj9UG7F/NBK1k+bVbm9Ip?= =?us-ascii?Q?2oCvRbEECFxkx7Oi/tJVCTFw70SP+THiIJ3VIU0XnJ8zZKTtQiYA/MRrpH4w?= =?us-ascii?Q?ev3fD2qT4rvtWSK0/ERaUtlLGw93TFJGsJqWoPnu5tmeYmER+nAWWJpfmhb+?= =?us-ascii?Q?ODxF7BbbV4xC9aYx6hDCnQ6zkgJVF0taZmDyEXEOe7S5dXubxqsqI52+rr/9?= =?us-ascii?Q?76zZg6kjKo3++Zwy6MziO1VHobDiZ3E+0NM8WwWfdCHoTpn/+9h/ETVyzc77?= =?us-ascii?Q?jl0rUb+5gVkJM9Kx7LXd3QzXgCge41xxkFnV3MTcMZp6ZcyEQkVVI0PkX7PH?= =?us-ascii?Q?nEtO8nKaGC/iHRrXQoG2pZAVb0AOZOzzHlsnrHHnaxvMMV3HVwtEPiOSp5nV?= =?us-ascii?Q?+WTY5qneUSSKFMWqW9pGdqt1JxG6EFjrZdg+7PVH1YZwTJ8TWldzW8FMd07M?= =?us-ascii?Q?O70pPXvz6DBR1v9v339YhCwQvaA0LXXJFmC+QVJsZkyS3HPhQdzidMo7cVYM?= =?us-ascii?Q?UhTLDvr2UXC8JeVcDl6FANrpLO1U4mdsXK1/+A1gToa94r7yEiZRYWHg04dz?= =?us-ascii?Q?JosGRqEA9Rs90Ca7xdfI62a/asTHfkFa0onJ4f7RrrlLEqA/3cx9jdM6ByoB?= =?us-ascii?Q?7iLQBpKlDQfKxZzNDQrfuYGOYako9VAC6D48FMSlK6jCYSKbj3nHnZhR2cWt?= =?us-ascii?Q?nCQhzNfzM45Z/BgllYf4wSVMo6FgdrrG5r43BhR2Dol1X+l8Rdt34Nx9g15W?= =?us-ascii?Q?qfwNwCc7MTLdS8qbX6049NLmtfJZIjJmZdEvLs5aWuFUFmvsuscsrI1X2cPm?= =?us-ascii?Q?Huwv947Sl0wQK1tSXjU6cLj/CZRcpU7Y8UKZ/5Q/p08ytV5FxptlhoHNni37?= =?us-ascii?Q?NN4UMKV6lSW3JF7a30aN2BYGl5JPZcwDnrdzlMiKV2SL7r6FvY6jHpEm8eGi?= =?us-ascii?Q?vLPFBL5qEFLrdmpHjnlb3Y0G0/MJrmQFfwGRU17rw2p1Ep1Wd56G1ZoOVniG?= =?us-ascii?Q?cm8kH7jmJFIZyqItWN4PjgObVEFM0F98p1jpNCkvQroYn5m6Q7ADDdJl+Ie2?= =?us-ascii?Q?0eIFw5/r4W7pNC15H/6pxAiMYJ4uLfMYd89MiJkPOveY2ZIWNG4uUMzci8JP?= =?us-ascii?Q?T7KJQWWdrmo3bWW8QFMj7Y/zY2qy9FbOTyLk9Z9EueH4jnMqwvA1Me+j4ycX?= =?us-ascii?Q?Ue4onkHWVZqbkgQq80eS/hM0j934hnrD63HAjO7slt8lpLrGtjnxAlmf3vYn?= =?us-ascii?Q?7xdB1qbzfKeUaAL18iQAt/zf2KzsIXL7j7FypVbb84eS3NI1DxLBri5zDQ?= =?us-ascii?Q?=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.118.233;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc7edge2.nvidia.com;CAT:NONE;SFS:(13230040)(82310400026)(1800799024)(7416014)(36860700013)(376014)(921020);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 May 2025 15:45:11.6879 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8bd68431-40c6-4646-e56b-08dd9a10cdb3 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.118.233];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN1PEPF00004685.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR12MB6084 Content-Type: text/plain; charset="utf-8" From: Ankit Agrawal Today KVM forces the memory to either NORMAL or DEVICE_nGnRE based on pfn_is_map_memory (which tracks whether the device memory is added to the kernel) and ignores the per-VMA flags that indicates the memory attributes. The KVM code is thus restrictive and allows only for the memory that is added to the kernel to be marked as cacheable. The device memory such as on the Grace Hopper/Blackwell systems is interchangeable with DDR memory and retains properties such as cacheability, unaligned accesses, atomics and handling of executable faults. This requires the device memory to be mapped as NORMAL in stage-2. Given that the GPU device memory is not added to the kernel (but is rather VMA mapped through remap_pfn_range() in nvgrace-gpu module which sets VM_PFNMAP), pfn_is_map_memory() is false and thus KVM prevents such memory to be mapped Normal cacheable. The patch aims to solve this use case. Note when FWB is not enabled, the kernel expects to trivially do cache management by flushing the memory by linearly converting a kvm_pte to phys_addr to a KVA, see kvm_flush_dcache_to_poc(). The cache management thus relies on memory being mapped. Moreover ARM64_HAS_CACHE_DIC CPU cap allows KVM to avoid flushing the icache and turns icache_inval_pou() into a NOP. These two capabilities are thus a requirement of the cacheable PFNMAP feature. Make use of kvm_arch_supports_cacheable_pfnmap() to check them. A cachebility check is made if the VM_PFNMAP is set in VMA flags by consulting the VMA pgprot value. If the pgprot mapping type is cacheable, it is safe to be mapped S2 cacheable as the KVM S2 will have the same Normal memory type as the VMA has in the S1 and KVM has no additional responsibility for safety. Checking pgprot as NORMAL is thus a KVM sanity check. Introduce a new variable cacheable_devmem to indicate a safely cacheable mapping. Do not set the device variable when cacheable_devmem is true. This essentially have the effect of setting stage-2 mapping as NORMAL through kvm_pgtable_stage2_map. Add check for COW VM_PFNMAP and refuse such mapping. No additional checks for MTE are needed as kvm_arch_prepare_memory_region() already tests it at an early stage during memslot creation. There would not even be a fault if the memslot is not created. CC: Oliver Upton Suggested-by: Jason Gunthorpe Suggested-by: Catalin Marinas Suggested-by: David Hildenbrand Signed-off-by: Ankit Agrawal --- arch/arm64/kvm/mmu.c | 46 +++++++++++++++++++++++++++++++++++++------- 1 file changed, 39 insertions(+), 7 deletions(-) diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c index 124655da02ca..c505efc4d174 100644 --- a/arch/arm64/kvm/mmu.c +++ b/arch/arm64/kvm/mmu.c @@ -1499,6 +1499,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys= _addr_t fault_ipa, bool write_fault, writable, force_pte =3D false; bool exec_fault, mte_allowed; bool device =3D false, vfio_allow_any_uc =3D false; + bool cacheable_devmem =3D false; unsigned long mmu_seq; phys_addr_t ipa =3D fault_ipa; struct kvm *kvm =3D vcpu->kvm; @@ -1636,9 +1637,19 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phy= s_addr_t fault_ipa, =20 vfio_allow_any_uc =3D vma->vm_flags & VM_ALLOW_ANY_UNCACHED; =20 - if ((vma->vm_flags & VM_PFNMAP) && - !mapping_type_noncacheable(vma->vm_page_prot)) - return -EINVAL; + if (vma->vm_flags & VM_PFNMAP) { + /* Reject COW VM_PFNMAP */ + if (is_cow_mapping(vma->vm_flags)) + return -EINVAL; + + /* + * If the VM_PFNMAP is set in VMA flags, do a KVM sanity + * check to see if pgprot mapping type is MT_NORMAL and a + * safely cacheable device memory. + */ + if (!mapping_type_noncacheable(vma->vm_page_prot)) + cacheable_devmem =3D true; + } =20 /* Don't use the VMA after the unlock -- it may have vanished */ vma =3D NULL; @@ -1671,10 +1682,13 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, ph= ys_addr_t fault_ipa, * via __kvm_faultin_pfn(), vma_pagesize is set to PAGE_SIZE * and must not be upgraded. * - * In both cases, we don't let transparent_hugepage_adjust() + * Do not set device as the device memory is cacheable. Note + * that such mapping is safe as the KVM S2 will have the same + * Normal memory type as the VMA has in the S1. * change things at the last minute. */ - device =3D true; + if (!cacheable_devmem) + device =3D true; } else if (logging_active && !write_fault) { /* * Only actually map the page as writable if this was a write @@ -1756,6 +1770,19 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phy= s_addr_t fault_ipa, prot |=3D KVM_PGTABLE_PROT_X; } =20 + /* + * When FWB is unsupported KVM needs to do cache flushes + * (via dcache_clean_inval_poc()) of the underlying memory. This is + * only possible if the memory is already mapped into the kernel map. + * + * Outright reject as the cacheable device memory is not present in + * the kernel map and not suitable for cache management. + */ + if (cacheable_devmem && !kvm_arch_supports_cacheable_pfnmap()) { + ret =3D -EINVAL; + goto out_unlock; + } + /* * Under the premise of getting a FSC_PERM fault, we just need to relax * permissions only if vma_pagesize equals fault_granule. Otherwise, @@ -2236,8 +2263,13 @@ int kvm_arch_prepare_memory_region(struct kvm *kvm, break; } =20 - /* Cacheable PFNMAP is not allowed */ - if (!mapping_type_noncacheable(vma->vm_page_prot)) { + /* + * Cacheable PFNMAP is allowed only if the hardware + * supports it and userspace asks for it. + */ + if (!mapping_type_noncacheable(vma->vm_page_prot) && + (!(new->flags & KVM_MEM_ENABLE_CACHEABLE_PFNMAP) || + !kvm_arch_supports_cacheable_pfnmap())) { ret =3D -EINVAL; break; } --=20 2.34.1 From nobody Sun Dec 14 19:37:08 2025 Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on2047.outbound.protection.outlook.com [40.107.96.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1C5D4296143 for ; Fri, 23 May 2025 15:45:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.96.47 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015102; cv=fail; b=rX3JUG16zcAbEOy7gpU1xYNMJuS91wVt9sfIrzy6uIAMAG91eHr4LnV4EVHAf5rDv4sbfGdsoAQKTSu/0bnieUt1ybkGbkQYxI3rvz3O1FUo52wOPmttHQehYIu5adwHaRm9HSOB7coW4kyFKWcmZmdHZVddfX6JQU9vOrlT6fQ= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1748015102; c=relaxed/simple; bh=WlA8Q3eudTJ21rsdqr8Xelu7x+qTruANsAunHmmOZz8=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=Vn1WD4BwwtCmLNf6hTf9UyoEoIpOlwPy/gq9xuExeP6ptTmfm/FYHcjsNu3r3pIUgMWU6qo56RuzLKsum4vQF39qcK2OYt/tbfdT/x3aJ3HSsxStbPfxCvkyTCE9MT2TlQSN0yZ72VeidPngDlCVfNAjwMqUgN4c8tPlzuaAkHA= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com; spf=fail smtp.mailfrom=nvidia.com; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b=Rlks4Kwn; arc=fail smtp.client-ip=40.107.96.47 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=nvidia.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=nvidia.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com header.b="Rlks4Kwn" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wlLXrHyZpSYiGiqHvKK4rZGZxUUv09+8949TlmcQLzZ6MA1g9F8x113XUB2QFliuMX8wjGbdcsGhmSGAIeulCMAMQUvuSl1vQLiYLHKGEhTiZ/cGMFiohxPcHXfKXIX01a5qAcZn3eApFxzfc8rENmYgIcR1aWSBZ2PhD75MyQJ8wBhm/zKSxG0ZB3u1LalzrkHMAr+sD7X4spGezx7VhzGhF2WZGWO1r4C8w+TwGIpJWQt/upK8OqtUe0eAa3Pm7/dgP/WwdofJaxCQgkq0vitX5uC1kapt7DKIIYVb1c2wz0yuvyApmaotu6f5W1LhnVLevMlas9W2r5baoEpYpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JcIC5oOa1/q0xme3qWX3do4fSWKvRzBqq12MsnItkZM=; b=rlP6SB3VBIDqX3R9nQR+E0ITqEAwNMWfah16eaie4ZomdTaT4fgMGkv778TFdgn9j2AGICq94nbiKuCdp+y1mrPWmw2LGP5dEaEXq7Wl3Kezmjql+E+9Dn27el15IALzwlcF0opuqSO/V/uKuO3zcyLbQdIrsn+wyYNGPUTlB3BD9CtfB+SIkX4HTSED7cmOAP+X8+slNqfBy5vqBw5gSGs+qAeXXKOf5rk2QLK3ZXQ/BsOUsz76Ui5h+zyQccb0aBp8t9J5OzSBLTQXgcX11jE1rzEgJIFY17CviOKOnxSZF+LlzX8OZTQq+uF8cf7cTviaLt93vhnsI/VhwvugrA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.118.232) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JcIC5oOa1/q0xme3qWX3do4fSWKvRzBqq12MsnItkZM=; b=Rlks4KwnskFI+QZ5VJWeJmigOZPAq3mQbKAjlijplDRBXuudkYmrZYCKPm6jIhE6eykZiwUefY/FqwI9BCkR5Z+6wLLX61EJMfLjsuzSNZLD4j5WcimEKPr4XDCfwRVBZ6DA0HGIRZui1HDyjXnhmrHu2Ks9JRygdw+ySxv1+girX5ZyqO8A92+FTMOjkS60SWyk3YPqVXtpkuziA7gOvxLkfCEWd8wMmC5B5nK3GjoLBRc/B8RrzEGC4Cel6LMtLAJmVedomjWMwSBO6d26sEdM1Vp4VYBi9BoULH6/9XBryl7g4ePHyK0yFzpbCQaKpaDX/VUwcty0pBavfXyD+Q== Received: from SJ0PR03CA0286.namprd03.prod.outlook.com (2603:10b6:a03:39e::21) by IA1PR12MB6354.namprd12.prod.outlook.com (2603:10b6:208:3e2::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8746.30; Fri, 23 May 2025 15:44:56 +0000 Received: from SJ1PEPF00002310.namprd03.prod.outlook.com (2603:10b6:a03:39e:cafe::9a) by SJ0PR03CA0286.outlook.office365.com (2603:10b6:a03:39e::21) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8746.31 via Frontend Transport; Fri, 23 May 2025 15:44:56 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.118.232) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.118.232 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.118.232; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.118.232) by SJ1PEPF00002310.mail.protection.outlook.com (10.167.242.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 23 May 2025 15:44:56 +0000 Received: from drhqmail202.nvidia.com (10.126.190.181) by mail.nvidia.com (10.127.129.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 23 May 2025 08:44:48 -0700 Received: from drhqmail201.nvidia.com (10.126.190.180) by drhqmail202.nvidia.com (10.126.190.181) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14; Fri, 23 May 2025 08:44:47 -0700 Received: from localhost.nvidia.com (10.127.8.12) by mail.nvidia.com (10.126.190.180) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.14 via Frontend Transport; Fri, 23 May 2025 08:44:47 -0700 From: To: , , , , , , , , , , , , CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [PATCH v5 5/5] KVM: arm64: Expose new KVM cap for cacheable PFNMAP Date: Fri, 23 May 2025 15:44:45 +0000 Message-ID: <20250523154445.3779-6-ankita@nvidia.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20250523154445.3779-1-ankita@nvidia.com> References: <20250523154445.3779-1-ankita@nvidia.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-NV-OnPremToCloud: AnonymousSubmission X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF00002310:EE_|IA1PR12MB6354:EE_ X-MS-Office365-Filtering-Correlation-Id: d1689343-a3db-4dd9-acbc-08dd9a10c475 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|376014|82310400026|7416014|921020; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?hBxiNiDXVvDWC4bDd9fmwnM/abozDkBaOjhRJwbfxGyMbtQG9Yzsd4LPBzlv?= =?us-ascii?Q?H0RTuKZuu9ll9NztqgNDPtAJlst42LRzFuiD5tFQAL8OQufDsyXqIYDfxSeU?= =?us-ascii?Q?QyV/91tud4rcqb/cnaYvbsr/8Chlz4inUqijHljvMvrEk/wj3BI9Go5+XfMn?= =?us-ascii?Q?Cra+R5DLr5RQAfUeAH92bpuDNcBkX4gKLVVkO5U5rwDQdHmgvlibj8R5Muzo?= =?us-ascii?Q?X8fqf9/Wg/I5PSsJ3hVn8Nq1QjdCvuB74H5RDQoiIHHQc8yc0jdM3q+CRvQL?= =?us-ascii?Q?zR+MrP/ZwT1QgqC/ZSABcIW4BcGKnyPEvSkjQLooACLwEYyS1PTAXKtj+/RY?= =?us-ascii?Q?UsH81lvqZS7ZEvQym7Jo5ikh9masQ9MF37HTAsDbpQRpc/8Ecx2tAvHlYZtO?= =?us-ascii?Q?A3u4cwsN9/IbHcKhCVpPrWuBQ5OE8er2Z3XvF01qBjOVegK+kj9DVGsLsRHa?= =?us-ascii?Q?dMjji9yp1SVg0RePCK6Ai4NdKkcmfdDBNWL8n+PBOQzudRVH58+BK2rtQuGj?= =?us-ascii?Q?z0T766ZSrZlkuQR6kpk9qzPLA/UCIuVaBv6rvwqqHMCzHBYTXwkBZJYOrCMk?= =?us-ascii?Q?RTeXehjOIP6S2Yc4cbBT5y50O5tQw5YIJsGDOs3WKYD3cpBpA8m95DS/YLJ+?= =?us-ascii?Q?OKtd5q+AY//dwUgxCRlyvnnL5wdK2HsRwgu/Jtu+XK7PHPNzKLrSNflSxGjr?= =?us-ascii?Q?wyCGHvGDYl30yk8R/ai7Yw2204A74LgUlkPZwn6MlQB7Dp3nv3h/ezaEGIbN?= =?us-ascii?Q?tur5DBikZ+w3ZxZbyf5r9+ipnHiFSQYX9Cb5KBsta7bOWikpY2cqbmIip5jT?= =?us-ascii?Q?Bnc4frJQsm2cDLlMlbAPsfQaa+xx1xWEzvSCkMU89PRTU4EZ+78H3aA/eb7C?= =?us-ascii?Q?pMZqzZMU6lHXpSje5fAHoRtv4dj4SBpV2YpMzoyhkuflT+ubdYe/KrFtMHEj?= =?us-ascii?Q?d2K0WT41wtDWLdYZDi9TX9qyuXZK3eqZ55XSKfvinu3i+fq5MMAPbLZ8e/JR?= =?us-ascii?Q?nCV5vqDV1mLGhdcURJCAX7h/qFXshDGOIU7Vq42ajCKAEUZQ3Hnbzquusp+d?= =?us-ascii?Q?+X9KM4/paGKl9Y6PRAfRidxJoMb3GuuS7qccHUYGcbKE7x7ONZ+ay4pDSOo9?= =?us-ascii?Q?76eP32HAZSG5K2ztU9LXjCNIWAAvt5CpYxao/pUbhQrw1VZd2GVi8vuiJbLh?= =?us-ascii?Q?N9NewkHTgNDSIxi9d3ALJyOU+ZCiywyiW1Gmy3m3HwMSVn5JM6CJJPUrkfQp?= =?us-ascii?Q?HhuhbCIt5P32RKHt183krlPudy8fs3+lK5aBhJFkTi4jkLJxhQKnsLnj9vNm?= =?us-ascii?Q?N5uQpaPjosJXwKFKkj71QskYtAu0EyHdMdmAC4ryYPNyheaQN3ZtpmDinYvr?= =?us-ascii?Q?8lehgwg6TA1S+2fsNDqgRV+RvZc5eO0bl0NPM+BWADolCpWaNXW2+H/wLlQv?= =?us-ascii?Q?ib8AMig+6djHZRpqKCjH5PiXlx0QN1SszmX1RJWTGf67fsB99Lvz3tL3Pxk7?= =?us-ascii?Q?8ACDy2emi4K5zBKxbxgsP0XfB/2OsJ9xcNcrIMHWczR4hv4azaHUUsG1EQ?= =?us-ascii?Q?=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.118.232;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc7edge1.nvidia.com;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(376014)(82310400026)(7416014)(921020);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 May 2025 15:44:56.2537 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d1689343-a3db-4dd9-acbc-08dd9a10c475 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.118.232];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF00002310.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB6354 Content-Type: text/plain; charset="utf-8" From: Ankit Agrawal Introduce a new KVM capability to expose to the userspace whether cacheable mapping of PFNMAP is supported. The ability to safely do the cacheable mapping of PFNMAP is contingent on S2FWB and ARM64_HAS_CACHE_DIC. S2FWB allows KVM to avoid flushing the D cache, ARM64_HAS_CACHE_DIC allows KVM to avoid flushing the icache and turns icache_inval_pou() into a NOP. The cap would be false if those requirements are missing and is checked by making use of kvm_arch_supports_cacheable_pfnmap. This capability would allow userspace to discover the support. This would be used in conjunction with the KVM_MEM_ENABLE_CACHEABLE_PFNMAP memslot flag. Userspace is required to query this capability before it can set the memslot flag. This cap could also be used by userspace to prevent live-migration across FWB and non-FWB hosts. CC: Catalin Marinas CC: Jason Gunthorpe CC: Oliver Upton CC: David Hildenbrand Suggested-by: Marc Zyngier Signed-off-by: Ankit Agrawal --- Documentation/virt/kvm/api.rst | 17 ++++++++++++++++- arch/arm64/kvm/arm.c | 7 +++++++ include/uapi/linux/kvm.h | 1 + virt/kvm/kvm_main.c | 8 ++++++++ 4 files changed, 32 insertions(+), 1 deletion(-) diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index 47c7c3f92314..ad4c5e131977 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -8478,7 +8478,7 @@ ENOSYS for the others. When enabled, KVM will exit to userspace with KVM_EXIT_SYSTEM_EVENT of type KVM_SYSTEM_EVENT_SUSPEND to process the guest suspend request. =20 -7.37 KVM_CAP_ARM_WRITABLE_IMP_ID_REGS +7.42 KVM_CAP_ARM_WRITABLE_IMP_ID_REGS ------------------------------------- =20 :Architectures: arm64 @@ -8496,6 +8496,21 @@ aforementioned registers before the first KVM_RUN. T= hese registers are VM scoped, meaning that the same set of values are presented on all vCPUs in a given VM. =20 +7.43 KVM_CAP_ARM_CACHEABLE_PFNMAP_SUPPORTED +------------------------------------------- + +:Architectures: arm64 +:Target: VM +:Parameters: None + +This capability indicate to the userspace whether a PFNMAP memory region +can be safely mapped as cacheable. This relies on the presence of +force write back (FWB) feature support on the hardware. + +The usermode could query this capability and subsequently set the +KVM_MEM_ENABLE_CACHEABLE_PFNMAP memslot flag forming a handshake to +activate the code. + 8. Other capabilities. =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =20 diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c index 68fec8c95fee..ea34b08237c4 100644 --- a/arch/arm64/kvm/arm.c +++ b/arch/arm64/kvm/arm.c @@ -402,6 +402,13 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long= ext) case KVM_CAP_ARM_SUPPORTED_REG_MASK_RANGES: r =3D BIT(0); break; + case KVM_CAP_ARM_CACHEABLE_PFNMAP_SUPPORTED: + if (!kvm) + r =3D -EINVAL; + else + r =3D kvm_arch_supports_cacheable_pfnmap(); + break; + default: r =3D 0; } diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 9defefe7bdf0..fb868586d73d 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -931,6 +931,7 @@ struct kvm_enable_cap { #define KVM_CAP_X86_APIC_BUS_CYCLES_NS 237 #define KVM_CAP_X86_GUEST_MODE 238 #define KVM_CAP_ARM_WRITABLE_IMP_ID_REGS 239 +#define KVM_CAP_ARM_CACHEABLE_PFNMAP_SUPPORTED 240 =20 struct kvm_irq_routing_irqchip { __u32 irqchip; diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 5e0532c3abc2..25af7292810c 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1527,11 +1527,19 @@ static void kvm_replace_memslot(struct kvm *kvm, (KVM_MEM_LOG_DIRTY_PAGES | KVM_MEM_READONLY | \ KVM_MEM_ENABLE_CACHEABLE_PFNMAP) =20 +bool __weak kvm_arch_supports_cacheable_pfnmap(void) +{ + return false; +} + static int check_memory_region_flags(struct kvm *kvm, const struct kvm_userspace_memory_region2 *mem) { u32 valid_flags =3D KVM_MEM_LOG_DIRTY_PAGES; =20 + if (kvm_arch_supports_cacheable_pfnmap()) + valid_flags |=3D KVM_MEM_ENABLE_CACHEABLE_PFNMAP; + if (kvm_arch_has_private_mem(kvm)) valid_flags |=3D KVM_MEM_GUEST_MEMFD; =20 --=20 2.34.1