Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3348508pxf; Mon, 5 Apr 2021 09:40:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyOnjcHh6X9B3xi/HQ4a/lhlX1ytO6I98xJjKDT0NT2sUbzDTadM8gykg2cocEhmKF1Gx5k X-Received: by 2002:a02:caa9:: with SMTP id e9mr24522946jap.59.1617640846115; Mon, 05 Apr 2021 09:40:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617640846; cv=none; d=google.com; s=arc-20160816; b=zjKLQ8EUw/Lo/kx0bPD6ZrmyAgBi63FzbEBgDY3TiXxd7/oIFLTqWCh1q2Wo581U7t FMuv3wSSQlyb2wnm9EKQLUoRYHzf3fbJFamoTrK777qvL3gUBeW+avzWgsy4JkysJdq/ O/gQ4+ZvnVUz5C4DO5j4MN+NWvJlwZkoxg6Ilm6Gyj0v2BDjtnCkJTbRqa5y+fKdQfIf s1+t99bXfduSKNHf7f+fQsdjBzRS+IYW0BT1BAxaONAIW/WSjtGYvaqF0O1YrLmNELZ9 9FN5YwwIpJwcAH8sTjLxabHwSbfU3No7Axv9gJ0oSZRP07nQXMCl/SyHN0byYohPBJPx S/dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PbRwHT7/3iH4Ov8203KGxbIUFSRvUFpjwsQAoJAilYo=; b=tFwVnDgbpRudymOkcLtyYjl1bFWLdR2tpS7W9P4FWsm/CKQ5t9Qjj13vQGk17Ah8TZ zLTqouGNpg4n3gwBgo7smvsVC1d+AS1oSQo42T1+dBJl3DRgaPjaNB2VO8W2ealQE2YE 3jxK7A26lVPUZLlpJ3vLTSLGOdHBVuhC99WCylMpSSvYSuSpRKQlXQU0IXYDgKGBicJX Y/JjFhe31fxxRFGXp/syqG/QXTOouk6pTkMA9PD+5/SCEBtMM23K1bXxgyXwWP37SNr1 UasbWbXxrStix5/tkQpySxlVHsePdICgBEpbxGcgNeMmRXhGvl1t2cp8KgWlkMdvq8FW N8xA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="toW/urii"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z14si16047231ilu.82.2021.04.05.09.40.34; Mon, 05 Apr 2021 09:40:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="toW/urii"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239884AbhDEJOZ (ORCPT + 99 others); Mon, 5 Apr 2021 05:14:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:55326 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239214AbhDEJJj (ORCPT ); Mon, 5 Apr 2021 05:09:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 48CB461394; Mon, 5 Apr 2021 09:09:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617613771; bh=6+h6WVR2L38idR3DW+NBHZIA0fWBqAp+53ZIp21wA44=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=toW/uriiA8RlKN0SlT+V8Qogq3IzkwA3/UJOHsXwOQWZ/hjCok9fNyHP5IiyS4FX0 J19S5tF5PU8mHS/wdrf9plIL27UqPCkzRwyMbnS0EyWf4uKpDB06l5g0ghnTl1XBSE yyXtOW2amvGYZrOQB9KWOzvybLeeIGRhB2lE0gPU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Peter Feiner , Ben Gardon , Paolo Bonzini , Sasha Levin Subject: [PATCH 5.10 086/126] KVM: x86/mmu: Yield in TDU MMU iter even if no SPTES changed Date: Mon, 5 Apr 2021 10:54:08 +0200 Message-Id: <20210405085033.914881679@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210405085031.040238881@linuxfoundation.org> References: <20210405085031.040238881@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ben Gardon [ Upstream commit 1af4a96025b33587ca953c7ef12a1b20c6e70412 ] Given certain conditions, some TDP MMU functions may not yield reliably / frequently enough. For example, if a paging structure was very large but had few, if any writable entries, wrprot_gfn_range could traverse many entries before finding a writable entry and yielding because the check for yielding only happens after an SPTE is modified. Fix this issue by moving the yield to the beginning of the loop. Fixes: a6a0b05da9f3 ("kvm: x86/mmu: Support dirty logging for the TDP MMU") Reviewed-by: Peter Feiner Signed-off-by: Ben Gardon Message-Id: <20210202185734.1680553-15-bgardon@google.com> Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- arch/x86/kvm/mmu/tdp_mmu.c | 32 ++++++++++++++++++++++---------- 1 file changed, 22 insertions(+), 10 deletions(-) diff --git a/arch/x86/kvm/mmu/tdp_mmu.c b/arch/x86/kvm/mmu/tdp_mmu.c index f0bc5d3ce3d4..0d17457f1c84 100644 --- a/arch/x86/kvm/mmu/tdp_mmu.c +++ b/arch/x86/kvm/mmu/tdp_mmu.c @@ -462,6 +462,12 @@ static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, bool flush_needed = false; tdp_root_for_each_pte(iter, root, start, end) { + if (can_yield && + tdp_mmu_iter_cond_resched(kvm, &iter, flush_needed)) { + flush_needed = false; + continue; + } + if (!is_shadow_present_pte(iter.old_spte)) continue; @@ -476,9 +482,7 @@ static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, continue; tdp_mmu_set_spte(kvm, &iter, 0); - - flush_needed = !(can_yield && - tdp_mmu_iter_cond_resched(kvm, &iter, true)); + flush_needed = true; } return flush_needed; } @@ -838,6 +842,9 @@ static bool wrprot_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, for_each_tdp_pte_min_level(iter, root->spt, root->role.level, min_level, start, end) { + if (tdp_mmu_iter_cond_resched(kvm, &iter, false)) + continue; + if (!is_shadow_present_pte(iter.old_spte) || !is_last_spte(iter.old_spte, iter.level)) continue; @@ -846,8 +853,6 @@ static bool wrprot_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte); spte_set = true; - - tdp_mmu_iter_cond_resched(kvm, &iter, false); } return spte_set; } @@ -891,6 +896,9 @@ static bool clear_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, bool spte_set = false; tdp_root_for_each_leaf_pte(iter, root, start, end) { + if (tdp_mmu_iter_cond_resched(kvm, &iter, false)) + continue; + if (spte_ad_need_write_protect(iter.old_spte)) { if (is_writable_pte(iter.old_spte)) new_spte = iter.old_spte & ~PT_WRITABLE_MASK; @@ -905,8 +913,6 @@ static bool clear_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte); spte_set = true; - - tdp_mmu_iter_cond_resched(kvm, &iter, false); } return spte_set; } @@ -1014,6 +1020,9 @@ static bool set_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, bool spte_set = false; tdp_root_for_each_pte(iter, root, start, end) { + if (tdp_mmu_iter_cond_resched(kvm, &iter, false)) + continue; + if (!is_shadow_present_pte(iter.old_spte)) continue; @@ -1021,8 +1030,6 @@ static bool set_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, tdp_mmu_set_spte(kvm, &iter, new_spte); spte_set = true; - - tdp_mmu_iter_cond_resched(kvm, &iter, false); } return spte_set; @@ -1063,6 +1070,11 @@ static void zap_collapsible_spte_range(struct kvm *kvm, bool spte_set = false; tdp_root_for_each_pte(iter, root, start, end) { + if (tdp_mmu_iter_cond_resched(kvm, &iter, spte_set)) { + spte_set = false; + continue; + } + if (!is_shadow_present_pte(iter.old_spte) || !is_last_spte(iter.old_spte, iter.level)) continue; @@ -1075,7 +1087,7 @@ static void zap_collapsible_spte_range(struct kvm *kvm, tdp_mmu_set_spte(kvm, &iter, 0); - spte_set = !tdp_mmu_iter_cond_resched(kvm, &iter, true); + spte_set = true; } if (spte_set) -- 2.30.1