From nobody Tue Dec 2 03:00:11 2025 Received: from mail-wm1-f74.google.com (mail-wm1-f74.google.com [209.85.128.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9EE6232C33B for ; Mon, 17 Nov 2025 18:48:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763405310; cv=none; b=HOoRUBTQ1ogN246aQkwY8KZZe9p0WvIUtb7HhE7WDfL8VeShcxG5sES9S0AnP4TIPu2GOLY9RwYUBuy8Y4gXmZn5qlR95ESG6hato7VzKTvWrzxfn3Jx5lltT1nSiqEip2wBffCxAm1Vt/XQOr6sfz+XOyYAXe/6MT9GLuKglsk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763405310; c=relaxed/simple; bh=4IqE8xy28CzdZK+AF2L6odntz8pjMNLJKCMqqsIJDbk=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=LsZuPO6STBAYO/uVi3WiQ+tw2SrolIfsWXh5LC+btwhV79iY3Fa0m31tjJfZTHi2ChtTSPKJl6sWFLbxt9Rj/RE5uApkOv6Z4qyFoPRb6yZg2+huVLV6R2whbNHC9zBlieHa2Y/Bo9j309uSLlVnhT9s5D6FRLSkL6iNh4xu5P0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--smostafa.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=aFsyeSLR; arc=none smtp.client-ip=209.85.128.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--smostafa.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="aFsyeSLR" Received: by mail-wm1-f74.google.com with SMTP id 5b1f17b1804b1-47106720618so58530765e9.1 for ; Mon, 17 Nov 2025 10:48:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1763405307; x=1764010107; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=gey9r3BX8+q00LlBjzU+MZugMloP0I19eNAirMDKs/Y=; b=aFsyeSLRNDP7KrGEQAqdH7goCCYYR01gZMv1OsAGEwdZDCCCHFzlqDtZ8V6AuU8xXD 0gznZpc/CwznqmvoAaG29qZmgLbvcRlBh9ZzjJB+D4o1tDVZ8V+BDRsS6xRHszxVflmZ iX+fRN6zVDqYm/BZZw4UjAMv5KAG1e3DrqPKo700TKDBkBRQdgMh8WnW1rjS2aV079Zm ETa1SH5z0CRcqWyrGTG5OCCgZmDUX6/yOeQAipRj3JMDcLNYnKs/nqxs6ldRUGw2a+tg Kl65FRGn+sUFqgYuhHCq1ikDhksy+0dD0aWqg57WTcBafUh0R1zNlTwZyVNmazBbhgu2 K7PA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763405307; x=1764010107; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=gey9r3BX8+q00LlBjzU+MZugMloP0I19eNAirMDKs/Y=; b=cOxlFEX6qqtD5LWOn1qF1Oxoi3vbjNP3K0hcsBqpFMocw5anbCMzndNjCLklHzKVoM IeZ5noSDP1TwCTxJq64gGyGvKauEy3JQ8ZMUHCVfqRVfU0TYpmzqLbb0PaMF13Wwy2ZW QDNovMKJ1Vug/VkRtLYz/lPrXUd9Bl2Tp8OcbFxXv0aKptBn/nSXxOpoXA3HrpBEoyoL lwupj5YCW9tG21Ho1nUGYS0j8fFrq222JWSJHXdI9165UzkjF4IZfXTDJFl2wM6hzrt5 /PNyd68UpPyyEe87ZKzZGP1iJx5br90npSlQ1nHLOUO7fbJqaTAC11EObnbK6VLUYGHU VUlg== X-Forwarded-Encrypted: i=1; AJvYcCV5zipybGww6efzDC1AQl7UVo5BsfGFc3qoIewbhUl5kxAMo9OtsF+k73JC2NYrByhj3XlZ+HINdifZ+W8=@vger.kernel.org X-Gm-Message-State: AOJu0YxhEM8fwVU1MGSipvC0cZkxSCeije0FC1WjBRizHNcE/tTML7yF 376I4yFS+e63r3GiIPMJUfcadBjKvpYPIrjuxvLhB06qGiuGpwMzhjrNsLZEqZdBHQAQ9t0jT7Y ZtRamu+gfwINl/Q== X-Google-Smtp-Source: AGHT+IELZ+q3N1lhluRpg0RwaEHfI9/MWh02IHmoZQ//qg9i+LZm5h9SGh+IdmhWZuUmmhd2BHNm41tOgYJ4fA== X-Received: from wmqt6.prod.google.com ([2002:a05:600c:1986:b0:46e:37d6:c1a6]) (user=smostafa job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:4f93:b0:46e:7247:cbc0 with SMTP id 5b1f17b1804b1-4778fe6654dmr122626225e9.18.1763405307068; Mon, 17 Nov 2025 10:48:27 -0800 (PST) Date: Mon, 17 Nov 2025 18:47:48 +0000 In-Reply-To: <20251117184815.1027271-1-smostafa@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251117184815.1027271-1-smostafa@google.com> X-Mailer: git-send-email 2.52.0.rc1.455.g30608eb744-goog Message-ID: <20251117184815.1027271-2-smostafa@google.com> Subject: [PATCH v5 01/27] KVM: arm64: Add a new function to donate memory with prot From: Mostafa Saleh To: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, iommu@lists.linux.dev Cc: catalin.marinas@arm.com, will@kernel.org, maz@kernel.org, oliver.upton@linux.dev, joey.gouly@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com, joro@8bytes.org, jean-philippe@linaro.org, jgg@ziepe.ca, praan@google.com, danielmentz@google.com, mark.rutland@arm.com, qperret@google.com, tabba@google.com, Mostafa Saleh Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Soon, IOMMU drivers running in the hypervisor might interact with non-coherent devices, so it needs a mechanism to map memory as non cacheable. Add ___pkvm_host_donate_hyp() which accepts a new argument for prot, so the driver can add KVM_PGTABLE_PROT_NORMAL_NC. Signed-off-by: Mostafa Saleh --- arch/arm64/kvm/hyp/include/nvhe/mem_protect.h | 1 + arch/arm64/kvm/hyp/nvhe/mem_protect.c | 11 +++++++++-- 2 files changed, 10 insertions(+), 2 deletions(-) diff --git a/arch/arm64/kvm/hyp/include/nvhe/mem_protect.h b/arch/arm64/kvm= /hyp/include/nvhe/mem_protect.h index 5f9d56754e39..52d7ee91e18c 100644 --- a/arch/arm64/kvm/hyp/include/nvhe/mem_protect.h +++ b/arch/arm64/kvm/hyp/include/nvhe/mem_protect.h @@ -36,6 +36,7 @@ int __pkvm_prot_finalize(void); int __pkvm_host_share_hyp(u64 pfn); int __pkvm_host_unshare_hyp(u64 pfn); int __pkvm_host_donate_hyp(u64 pfn, u64 nr_pages); +int ___pkvm_host_donate_hyp(u64 pfn, u64 nr_pages, enum kvm_pgtable_prot p= rot); int __pkvm_hyp_donate_host(u64 pfn, u64 nr_pages); int __pkvm_host_share_ffa(u64 pfn, u64 nr_pages); int __pkvm_host_unshare_ffa(u64 pfn, u64 nr_pages); diff --git a/arch/arm64/kvm/hyp/nvhe/mem_protect.c b/arch/arm64/kvm/hyp/nvh= e/mem_protect.c index ddc8beb55eee..434b1d6aa49e 100644 --- a/arch/arm64/kvm/hyp/nvhe/mem_protect.c +++ b/arch/arm64/kvm/hyp/nvhe/mem_protect.c @@ -769,13 +769,15 @@ int __pkvm_host_unshare_hyp(u64 pfn) return ret; } =20 -int __pkvm_host_donate_hyp(u64 pfn, u64 nr_pages) +int ___pkvm_host_donate_hyp(u64 pfn, u64 nr_pages, enum kvm_pgtable_prot p= rot) { u64 phys =3D hyp_pfn_to_phys(pfn); u64 size =3D PAGE_SIZE * nr_pages; void *virt =3D __hyp_va(phys); int ret; =20 + WARN_ON((prot & KVM_PGTABLE_PROT_RWX) !=3D KVM_PGTABLE_PROT_RW); + host_lock_component(); hyp_lock_component(); =20 @@ -787,7 +789,7 @@ int __pkvm_host_donate_hyp(u64 pfn, u64 nr_pages) goto unlock; =20 __hyp_set_page_state_range(phys, size, PKVM_PAGE_OWNED); - WARN_ON(pkvm_create_mappings_locked(virt, virt + size, PAGE_HYP)); + WARN_ON(pkvm_create_mappings_locked(virt, virt + size, prot)); WARN_ON(host_stage2_set_owner_locked(phys, size, PKVM_ID_HYP)); =20 unlock: @@ -797,6 +799,11 @@ int __pkvm_host_donate_hyp(u64 pfn, u64 nr_pages) return ret; } =20 +int __pkvm_host_donate_hyp(u64 pfn, u64 nr_pages) +{ + return ___pkvm_host_donate_hyp(pfn, nr_pages, PAGE_HYP); +} + int __pkvm_hyp_donate_host(u64 pfn, u64 nr_pages) { u64 phys =3D hyp_pfn_to_phys(pfn); --=20 2.52.0.rc1.455.g30608eb744-goog