diff options
author | Sean Christopherson <[email protected]> | 2024-03-08 17:09:29 -0800 |
---|---|---|
committer | Sean Christopherson <[email protected]> | 2024-06-07 07:18:03 -0700 |
commit | 377b2f359d1f71c75f8cc352b5c81f2210312d83 (patch) | |
tree | e552a7308bad09bcf189b0e81983b02ce8a87e94 /lib/test_fortify/write_overflow-strncpy-src.c | |
parent | 65a4de0ffd975af7e2ffc9acb875b6a8ae7ee1aa (diff) |
KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
Unconditionally honor guest PAT on CPUs that support self-snoop, as
Intel has confirmed that CPUs that support self-snoop always snoop caches
and store buffers. I.e. CPUs with self-snoop maintain cache coherency
even in the presence of aliased memtypes, thus there is no need to trust
the guest behaves and only honor PAT as a last resort, as KVM does today.
Honoring guest PAT is desirable for use cases where the guest has access
to non-coherent DMA _without_ bouncing through VFIO, e.g. when a virtual
(mediated, for all intents and purposes) GPU is exposed to the guest, along
with buffers that are consumed directly by the physical GPU, i.e. which
can't be proxied by the host to ensure writes from the guest are performed
with the correct memory type for the GPU.
Cc: Yiwei Zhang <[email protected]>
Suggested-by: Yan Zhao <[email protected]>
Suggested-by: Kevin Tian <[email protected]>
Tested-by: Xiangfei Ma <[email protected]>
Tested-by: Yongwei Ma <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Sean Christopherson <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-strncpy-src.c')
0 files changed, 0 insertions, 0 deletions