On 13/05/2015 13:31, Andrew Jones wrote: > Commit 1050dcda30529 introduced KVM_MEMSLOT_INCOHERENT to flag memory > regions that may have coherency issues due to mapping host system RAM > as non-cacheable. This was introduced as a KVM internal flag, but now > give KVM userspace access to it so that it may use it for hinting > likely problematic regions. Also rename to KVM_MEM_UNCACHED. > > Signed-off-by: Andrew Jones <drjo...@redhat.com> > --- > Documentation/virtual/kvm/api.txt | 20 ++++++++++++++------ > arch/arm/include/uapi/asm/kvm.h | 1 + > arch/arm/kvm/arm.c | 1 + > arch/arm/kvm/mmu.c | 4 ++-- > arch/arm64/include/uapi/asm/kvm.h | 1 + > include/linux/kvm_host.h | 1 - > include/uapi/linux/kvm.h | 2 ++ > virt/kvm/kvm_main.c | 7 ++++++- > 8 files changed, 27 insertions(+), 10 deletions(-) > > diff --git a/Documentation/virtual/kvm/api.txt > b/Documentation/virtual/kvm/api.txt > index 9fa2bf8c3f6f1..04ffd9f5db5f2 100644 > --- a/Documentation/virtual/kvm/api.txt > +++ b/Documentation/virtual/kvm/api.txt > @@ -905,6 +905,7 @@ struct kvm_userspace_memory_region { > /* for kvm_memory_region::flags */ > #define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0) > #define KVM_MEM_READONLY (1UL << 1) > +#define KVM_MEM_UNCACHED (1UL << 2) > > This ioctl allows the user to create or modify a guest physical memory > slot. When changing an existing slot, it may be moved in the guest > @@ -920,12 +921,19 @@ It is recommended that the lower 21 bits of > guest_phys_addr and userspace_addr > be identical. This allows large pages in the guest to be backed by large > pages in the host. > > -The flags field supports two flags: KVM_MEM_LOG_DIRTY_PAGES and > -KVM_MEM_READONLY. The former can be set to instruct KVM to keep track of > -writes to memory within the slot. See KVM_GET_DIRTY_LOG ioctl to know how to > -use it. The latter can be set, if KVM_CAP_READONLY_MEM capability allows it, > -to make a new slot read-only. In this case, writes to this memory will be > -posted to userspace as KVM_EXIT_MMIO exits. > +The flags field supports the following flags. All flags may be used in > +combination. > + - KVM_MEM_LOG_DIRTY_PAGES: no capability required > + Set this to instruct KVM to keep track of writes to memory within > + the slot. (See the KVM_GET_DIRTY_LOG ioctl) > + - KVM_MEM_READONLY: depends on capability KVM_CAP_READONLY_MEM > + Set this to make a new slot read-only. In this case, writes to > + this memory will be posted to userspace as KVM_EXIT_MMIO exits. > + EINVAL will be returned if the slot is not new. > + - KVM_MEM_UNCACHED: depends on capability KVM_CAP_UNCACHED_MEM > + Set this to make a new slot uncached, i.e. userspace will always > + directly read/write RAM for this memory region. EINVAL will be > + returned if the slot is not new. > > When the KVM_CAP_SYNC_MMU capability is available, changes in the backing of > the memory region are automatically reflected into the guest. For example, > an > diff --git a/arch/arm/include/uapi/asm/kvm.h b/arch/arm/include/uapi/asm/kvm.h > index df3f60cb1168a..893a331655115 100644 > --- a/arch/arm/include/uapi/asm/kvm.h > +++ b/arch/arm/include/uapi/asm/kvm.h > @@ -26,6 +26,7 @@ > #define __KVM_HAVE_GUEST_DEBUG > #define __KVM_HAVE_IRQ_LINE > #define __KVM_HAVE_READONLY_MEM > +#define __KVM_HAVE_UNCACHED_MEM > > #define KVM_REG_SIZE(id) \ > (1U << (((id) & KVM_REG_SIZE_MASK) >> KVM_REG_SIZE_SHIFT)) > diff --git a/arch/arm/kvm/arm.c b/arch/arm/kvm/arm.c > index d9631ecddd56e..cbb532de9c8b5 100644 > --- a/arch/arm/kvm/arm.c > +++ b/arch/arm/kvm/arm.c > @@ -182,6 +182,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long > ext) > case KVM_CAP_ARM_PSCI_0_2: > case KVM_CAP_READONLY_MEM: > case KVM_CAP_MP_STATE: > + case KVM_CAP_UNCACHED_MEM: > r = 1; > break; > case KVM_CAP_COALESCED_MMIO: > diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c > index 1d5accbd3dcf2..bc1665acd73e7 100644 > --- a/arch/arm/kvm/mmu.c > +++ b/arch/arm/kvm/mmu.c > @@ -1307,7 +1307,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, > phys_addr_t fault_ipa, > if (!hugetlb && !force_pte) > hugetlb = transparent_hugepage_adjust(&pfn, &fault_ipa); > > - fault_ipa_uncached = memslot->flags & KVM_MEMSLOT_INCOHERENT; > + fault_ipa_uncached = memslot->flags & KVM_MEM_UNCACHED; > > if (hugetlb) { > pmd_t new_pmd = pfn_pmd(pfn, mem_type); > @@ -1834,7 +1834,7 @@ int kvm_arch_create_memslot(struct kvm *kvm, struct > kvm_memory_slot *slot, > * regions as incoherent. > */ > if (slot->flags & KVM_MEM_READONLY) > - slot->flags |= KVM_MEMSLOT_INCOHERENT; > + slot->flags |= KVM_MEM_UNCACHED; > return 0; > } > > diff --git a/arch/arm64/include/uapi/asm/kvm.h > b/arch/arm64/include/uapi/asm/kvm.h > index d26832022127e..be46855ca01b7 100644 > --- a/arch/arm64/include/uapi/asm/kvm.h > +++ b/arch/arm64/include/uapi/asm/kvm.h > @@ -38,6 +38,7 @@ > #define __KVM_HAVE_GUEST_DEBUG > #define __KVM_HAVE_IRQ_LINE > #define __KVM_HAVE_READONLY_MEM > +#define __KVM_HAVE_UNCACHED_MEM > > #define KVM_REG_SIZE(id) \ > (1U << (((id) & KVM_REG_SIZE_MASK) >> KVM_REG_SIZE_SHIFT)) > diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h > index ad45054309a0f..74d6a14529f53 100644 > --- a/include/linux/kvm_host.h > +++ b/include/linux/kvm_host.h > @@ -39,7 +39,6 @@ > * include/linux/kvm_h. > */ > #define KVM_MEMSLOT_INVALID (1UL << 16) > -#define KVM_MEMSLOT_INCOHERENT (1UL << 17) > > /* Two fragments for cross MMIO pages. */ > #define KVM_MAX_MMIO_FRAGMENTS 2 > diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h > index 4b60056776d14..ceb6e805e5f77 100644 > --- a/include/uapi/linux/kvm.h > +++ b/include/uapi/linux/kvm.h > @@ -108,6 +108,7 @@ struct kvm_userspace_memory_region { > */ > #define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0) > #define KVM_MEM_READONLY (1UL << 1) > +#define KVM_MEM_UNCACHED (1UL << 2) > > /* for KVM_IRQ_LINE */ > struct kvm_irq_level { > @@ -814,6 +815,7 @@ struct kvm_ppc_smmu_info { > #define KVM_CAP_S390_INJECT_IRQ 113 > #define KVM_CAP_S390_IRQ_STATE 114 > #define KVM_CAP_PPC_HWRNG 115 > +#define KVM_CAP_UNCACHED_MEM 116 > > #ifdef KVM_CAP_IRQ_ROUTING > > diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c > index 90977418aeb6e..d1d535d80a075 100644 > --- a/virt/kvm/kvm_main.c > +++ b/virt/kvm/kvm_main.c > @@ -719,6 +719,10 @@ static int check_memory_region_flags(struct > kvm_userspace_memory_region *mem) > valid_flags |= KVM_MEM_READONLY; > #endif > > +#ifdef __KVM_HAVE_UNCACHED_MEM > + valid_flags |= KVM_MEM_UNCACHED; > +#endif > + > if (mem->flags & ~valid_flags) > return -EINVAL; > > @@ -816,7 +820,8 @@ int __kvm_set_memory_region(struct kvm *kvm, > else { /* Modify an existing slot. */ > if ((mem->userspace_addr != old.userspace_addr) || > (npages != old.npages) || > - ((new.flags ^ old.flags) & KVM_MEM_READONLY)) > + ((new.flags ^ old.flags) & > + (KVM_MEM_READONLY | KVM_MEM_UNCACHED))) > goto out; > > if (base_gfn != old.base_gfn) >
Reviewed-by: Paolo Bonzini <pbonz...@redhat.com>