Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3388951pxf; Mon, 5 Apr 2021 10:42:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyeWgec6BWAJKCN2pG6Lz2gjw/i+0ompy+he87FNQsFytgMGecIivfUUyqXw/IdUY6StepU X-Received: by 2002:a05:6e02:c09:: with SMTP id d9mr20377319ile.62.1617644555153; Mon, 05 Apr 2021 10:42:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617644555; cv=none; d=google.com; s=arc-20160816; b=LIY9ylMsGyNHW7vxgUwtTyaupWn9L2WAu7FxOEASGfwgcxjrdtOU7aq4vJdVsxoS1o 76G23tpWrD8mfAFvp7A+Jfr2xWW2UVwWEYuRBX+38zpsDZLgUAfXlUlQCbIJmbFdc0gt Aq4d7tiTSPxEavSEOeg0uKKejiee2j207L5NkD7sav25kODawaHnGsE3RgZLLOWG8juI T7Gh2rYYGoAQdzBAtlXXBPa4Rbx/3+PMOyuWqxD8Jl17JTCIlRjalz53GliPyk98xTRZ KqKGE9HzUQxn+YYEWVWvjDCbVzWg+hc5ZDA036wcGGpLYdCs4A/osI9KW7Pn/kPNRS0N YSJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JGtXzc6ofHHtUzQfM2HtXegFeZAVLcl/38aOWh6BrBQ=; b=wSgf+wtDUr7IMBC1oXEe6BUkkY6eGnDvEzJPIC+LBpd2p4H4M5p6gNyJpz2rlqewO3 G26t9yOBt4RE68+phNkCNpezx45xviULWJKKwWxFqz/VkDyN0o4oXAEk2JvzN6QY53Xo GXqYw0hMiBy+Ri8oPbi6O4emB2+LovwUb/YUdRJmWIuRaBvuoBFn6NEvjZLjMW5STVfw Rlq2nDeQrKt5gGck9CuhVZ2N9RotVPdfrQmsUI2oOAyWCZaIUrUPviNTBiXnJAd6+abw XWhu2+XGbbDXzmE2gCTjyy/BNQIqspE9KJ3Xa6kNLu8W5R+KyVgwD/hLuet6p7QaMZOE 4I3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=e+GfYoIq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j8si15282385jat.114.2021.04.05.10.42.22; Mon, 05 Apr 2021 10:42:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=e+GfYoIq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240789AbhDEJX0 (ORCPT + 99 others); Mon, 5 Apr 2021 05:23:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:40016 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239839AbhDEJRw (ORCPT ); Mon, 5 Apr 2021 05:17:52 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1560D61398; Mon, 5 Apr 2021 09:17:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617614266; bh=PHvG2PGnmRPfeKpjbouAXG3dfkE/eJaN2EL+bFGjspo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=e+GfYoIqG6HZTk57TZJt2LqWQex2ZpHy0hfdebNZCW32K2tppfrpz1/vTO4GyKj/n AV2Dx/CTaoZwUB/nbzMqqR1TV1GCH1uJxp71IKWt8b0qxPOTc69tTPy0HB1QmMf6jB 0jswy6DgtFHCQ1Sew2BCLUX849MzvpQyundelNDs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Peter Feiner , Ben Gardon , Paolo Bonzini , Sasha Levin Subject: [PATCH 5.11 109/152] KVM: x86/mmu: Yield in TDU MMU iter even if no SPTES changed Date: Mon, 5 Apr 2021 10:54:18 +0200 Message-Id: <20210405085037.773852726@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210405085034.233917714@linuxfoundation.org> References: <20210405085034.233917714@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ben Gardon [ Upstream commit 1af4a96025b33587ca953c7ef12a1b20c6e70412 ] Given certain conditions, some TDP MMU functions may not yield reliably / frequently enough. For example, if a paging structure was very large but had few, if any writable entries, wrprot_gfn_range could traverse many entries before finding a writable entry and yielding because the check for yielding only happens after an SPTE is modified. Fix this issue by moving the yield to the beginning of the loop. Fixes: a6a0b05da9f3 ("kvm: x86/mmu: Support dirty logging for the TDP MMU") Reviewed-by: Peter Feiner Signed-off-by: Ben Gardon Message-Id: <20210202185734.1680553-15-bgardon@google.com> Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- arch/x86/kvm/mmu/tdp_mmu.c | 32 ++++++++++++++++++++++---------- 1 file changed, 22 insertions(+), 10 deletions(-) diff --git a/arch/x86/kvm/mmu/tdp_mmu.c b/arch/x86/kvm/mmu/tdp_mmu.c index a07d37abb63f..0567286fba39 100644 --- a/arch/x86/kvm/mmu/tdp_mmu.c +++ b/arch/x86/kvm/mmu/tdp_mmu.c @@ -470,6 +470,12 @@ static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, bool flush_needed = false; tdp_root_for_each_pte(iter, root, start, end) { + if (can_yield && + tdp_mmu_iter_cond_resched(kvm, &iter, flush_needed)) { + flush_needed = false; + continue; + } + if (!is_shadow_present_pte(iter.old_spte)) continue; @@ -484,9 +490,7 @@ static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, continue; tdp_mmu_set_spte(kvm, &iter, 0); - - flush_needed = !(can_yield && - tdp_mmu_iter_cond_resched(kvm, &iter, true)); + flush_needed = true; } return flush_needed; } @@ -850,6 +854,9 @@ static bool wrprot_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, for_each_tdp_pte_min_level(iter, root->spt, root->role.level, min_level, start, end) { + if (tdp_mmu_iter_cond_resched(kvm, &iter, false)) + continue; + if (!is_shadow_present_pte(iter.old_spte) || !is_last_spte(iter.old_spte, iter.level)) continue; @@ -858,8 +865,6 @@ static bool wrprot_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte); spte_set = true; - - tdp_mmu_iter_cond_resched(kvm, &iter, false); } return spte_set; } @@ -903,6 +908,9 @@ static bool clear_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, bool spte_set = false; tdp_root_for_each_leaf_pte(iter, root, start, end) { + if (tdp_mmu_iter_cond_resched(kvm, &iter, false)) + continue; + if (spte_ad_need_write_protect(iter.old_spte)) { if (is_writable_pte(iter.old_spte)) new_spte = iter.old_spte & ~PT_WRITABLE_MASK; @@ -917,8 +925,6 @@ static bool clear_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte); spte_set = true; - - tdp_mmu_iter_cond_resched(kvm, &iter, false); } return spte_set; } @@ -1026,6 +1032,9 @@ static bool set_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, bool spte_set = false; tdp_root_for_each_pte(iter, root, start, end) { + if (tdp_mmu_iter_cond_resched(kvm, &iter, false)) + continue; + if (!is_shadow_present_pte(iter.old_spte)) continue; @@ -1033,8 +1042,6 @@ static bool set_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, tdp_mmu_set_spte(kvm, &iter, new_spte); spte_set = true; - - tdp_mmu_iter_cond_resched(kvm, &iter, false); } return spte_set; @@ -1075,6 +1082,11 @@ static void zap_collapsible_spte_range(struct kvm *kvm, bool spte_set = false; tdp_root_for_each_pte(iter, root, start, end) { + if (tdp_mmu_iter_cond_resched(kvm, &iter, spte_set)) { + spte_set = false; + continue; + } + if (!is_shadow_present_pte(iter.old_spte) || !is_last_spte(iter.old_spte, iter.level)) continue; @@ -1087,7 +1099,7 @@ static void zap_collapsible_spte_range(struct kvm *kvm, tdp_mmu_set_spte(kvm, &iter, 0); - spte_set = !tdp_mmu_iter_cond_resched(kvm, &iter, true); + spte_set = true; } if (spte_set) -- 2.30.1