Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3381541pxf; Mon, 5 Apr 2021 10:30:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx4IFEKvpKCL9IxKMtTgq9ebNEdaTmYmR4sb49SD0U24z8S5LLuoUt0ilnDdr4ktQBkWZio X-Received: by 2002:a17:906:1749:: with SMTP id d9mr28877246eje.12.1617643830136; Mon, 05 Apr 2021 10:30:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617643830; cv=none; d=google.com; s=arc-20160816; b=SjVuBDkuvx3L9yNU4UasvMe1OJ6E5P+of6NxlHpCl+OTFyhJJh3NMcM7isGF/tws0h w0Te0wM1B1WiqOKWlf6muKuP654kvQhGpjlpIE7gwG/HGr8I6Q/YViXeHQVPyo7A47tG GFOaJZTN7XUgmZkywnszlRCrIBAipZvagifL7twfGhljxD9HJzu30Z7YwB2GChfncfNU dBxy82TwLDu26iwHZvjyyB+UO/e7rRq2Y6VoiZWk4ZaFokh3h62t9f5VszdfSNKPQA40 0xRq48Cw55n3EnLWv+jJxYlLLTTaazQuv9c2M+6lutnIyzglXnaA5phGixmHlX45dvYr zY/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VcvaPzq7UqAGSaCC7KuaGTEC9XKRiGeqTmxnCFdOap4=; b=ysRJrMkElBiXcugn2G5FcZt6GV9klZ3iCpR6uwwDUpXS1ERPztpRzxxPH78XMtUiRj me/ZwVzgup9jIW1z+wEFMLC5/51/d0lQOBGxqbfGXsq0NQAXve4FdEXyqfY8fAkNfSd1 5DdbZhK2ZucxZqpZDVTxuhjajWHuuEyyyyyenFkVlZEqEMp+w6MMRke1EL2deAafoXmo j87dowdPc6UpsjXllXpZovLL73oX7qarVui/ztZb3KKZL6heKmb6G3zUd5u47boOJC8M cQPvZRnIIsZ6Af+lVTiB9SMdBaFS2jYJrIjFb8prOY19d3cs4sDJwZ2gKCodInkSsGQt zQQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UUv9NU9E; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n8si5355271ejz.717.2021.04.05.10.30.06; Mon, 05 Apr 2021 10:30:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UUv9NU9E; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241026AbhDEJXg (ORCPT + 99 others); Mon, 5 Apr 2021 05:23:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:40272 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232529AbhDEJSD (ORCPT ); Mon, 5 Apr 2021 05:18:03 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id DBAC16139D; Mon, 5 Apr 2021 09:17:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617614277; bh=C4VUF+Qpl1xiNSAGeR3mPOLfwI6zyTsVilv7iay51p8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UUv9NU9EzPmmPulDUGv+M5EBeEAQucbpolP9BLPOuGAyzbovzGF122zo2HfodyUVN 2sAxxtZcdjr42BsZsOLuXo9NSf+qxgUizr/+jULJJW/kTwrt62HpWH43esRj/rcmKg 20kwgbBsHfFjLx+qaNC6ggebV8dBZEoWrLGk+vBs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ben Gardon , Sean Christopherson , Paolo Bonzini , Sasha Levin Subject: [PATCH 5.11 113/152] KVM: x86/mmu: Ensure TLBs are flushed when yielding during GFN range zap Date: Mon, 5 Apr 2021 10:54:22 +0200 Message-Id: <20210405085037.905514557@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210405085034.233917714@linuxfoundation.org> References: <20210405085034.233917714@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson [ Upstream commit a835429cda91621fca915d80672a157b47738afb ] When flushing a range of GFNs across multiple roots, ensure any pending flush from a previous root is honored before yielding while walking the tables of the current root. Note, kvm_tdp_mmu_zap_gfn_range() now intentionally overwrites its local "flush" with the result to avoid redundant flushes. zap_gfn_range() preserves and return the incoming "flush", unless of course the flush was performed prior to yielding and no new flush was triggered. Fixes: 1af4a96025b3 ("KVM: x86/mmu: Yield in TDU MMU iter even if no SPTES changed") Cc: stable@vger.kernel.org Reviewed-by: Ben Gardon Signed-off-by: Sean Christopherson Message-Id: <20210325200119.1359384-2-seanjc@google.com> Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- arch/x86/kvm/mmu/tdp_mmu.c | 23 ++++++++++++----------- 1 file changed, 12 insertions(+), 11 deletions(-) diff --git a/arch/x86/kvm/mmu/tdp_mmu.c b/arch/x86/kvm/mmu/tdp_mmu.c index 65c9172dcdf9..50c088a41dee 100644 --- a/arch/x86/kvm/mmu/tdp_mmu.c +++ b/arch/x86/kvm/mmu/tdp_mmu.c @@ -111,7 +111,7 @@ bool is_tdp_mmu_root(struct kvm *kvm, hpa_t hpa) } static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, - gfn_t start, gfn_t end, bool can_yield); + gfn_t start, gfn_t end, bool can_yield, bool flush); void kvm_tdp_mmu_free_root(struct kvm *kvm, struct kvm_mmu_page *root) { @@ -124,7 +124,7 @@ void kvm_tdp_mmu_free_root(struct kvm *kvm, struct kvm_mmu_page *root) list_del(&root->link); - zap_gfn_range(kvm, root, 0, max_gfn, false); + zap_gfn_range(kvm, root, 0, max_gfn, false, false); free_page((unsigned long)root->spt); kmem_cache_free(mmu_page_header_cache, root); @@ -506,20 +506,21 @@ static inline bool tdp_mmu_iter_cond_resched(struct kvm *kvm, * scheduler needs the CPU or there is contention on the MMU lock. If this * function cannot yield, it will not release the MMU lock or reschedule and * the caller must ensure it does not supply too large a GFN range, or the - * operation can cause a soft lockup. + * operation can cause a soft lockup. Note, in some use cases a flush may be + * required by prior actions. Ensure the pending flush is performed prior to + * yielding. */ static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, - gfn_t start, gfn_t end, bool can_yield) + gfn_t start, gfn_t end, bool can_yield, bool flush) { struct tdp_iter iter; - bool flush_needed = false; rcu_read_lock(); tdp_root_for_each_pte(iter, root, start, end) { if (can_yield && - tdp_mmu_iter_cond_resched(kvm, &iter, flush_needed)) { - flush_needed = false; + tdp_mmu_iter_cond_resched(kvm, &iter, flush)) { + flush = false; continue; } @@ -537,11 +538,11 @@ static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, continue; tdp_mmu_set_spte(kvm, &iter, 0); - flush_needed = true; + flush = true; } rcu_read_unlock(); - return flush_needed; + return flush; } /* @@ -556,7 +557,7 @@ bool kvm_tdp_mmu_zap_gfn_range(struct kvm *kvm, gfn_t start, gfn_t end) bool flush = false; for_each_tdp_mmu_root_yield_safe(kvm, root) - flush |= zap_gfn_range(kvm, root, start, end, true); + flush = zap_gfn_range(kvm, root, start, end, true, flush); return flush; } @@ -759,7 +760,7 @@ static int zap_gfn_range_hva_wrapper(struct kvm *kvm, struct kvm_mmu_page *root, gfn_t start, gfn_t end, unsigned long unused) { - return zap_gfn_range(kvm, root, start, end, false); + return zap_gfn_range(kvm, root, start, end, false, false); } int kvm_tdp_mmu_zap_hva_range(struct kvm *kvm, unsigned long start, -- 2.30.1