Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4906579pxy; Tue, 27 Apr 2021 15:42:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy1c9ep+Ipig1QCtCRvggUNIslre88l5ojTmbquUPvwIHp01fyaCfknyA2S/kZryyF47p3Z X-Received: by 2002:a17:902:6b81:b029:ea:dcc5:b841 with SMTP id p1-20020a1709026b81b02900eadcc5b841mr26484123plk.29.1619563323487; Tue, 27 Apr 2021 15:42:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619563323; cv=none; d=google.com; s=arc-20160816; b=0pVgd8D26tCDKdsrPmZpX+rr7TZ2gV0L0kl8BY5r3X8SFnMTA+mMnYh3zjvVnuCBCW WXu78NIL8OszOrZy+WokAhQl3l2wG8baKyaCANHX6ee+Cvz6Q1vVV+vSZlRamIXgV+bm paPutFpXE0oMkQXR1lEYQgZiGnknDFBQd2YXOYYVX1B/MX9TSFmlfbHc3fdWstsva3an MCHTmirXfHnFksbfhb5Eizdyg3YMOfdHdtq8YTv6OJpteAEV0nJPpeb2XaPzKytFkVry oLVhUv5qb5bnqP5pc2f5nS8Tj/13giOjo2pBQxYx99PB8f34EmPNtT7c53oI3UTN4Pap W6dA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=IwwNOUpk3ODt0Lpl9liH9pYZxU/VRIgyeYGkiNpqM5w=; b=P+QZFz+RS9ImOjstX3sgdiofpoKeWHoiI9WkVaokb+Vh/1malY2AoUxUAIl59sqtT/ CPqQBqWlBoXd6ohGBEGciWaRuz1Y4zU+87KA5W7DeRiszWAyFgIiqjcy+nqTKtTeMxrc JkrHhgTHGBM3YhWnXqguCgYUT2NGvGYad0A+/u+Fo1A9w3Lm6guGyKqLSZZRgAeA4vkr WX1CXJAwPr9xKbrY74tOP4ao7J+jBMykd3u7Vl6/WmVFnJpT79UJAmSX1KQHcAipBvAy ATo3MXCd4jERnYslLAvC7Bi3VE7Z/9B8kEbSPO25saiaYYGp69Z/pC6zxGDVFKw2/R/v rPvQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=quk1wa4r; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e15si1338631plh.350.2021.04.27.15.41.50; Tue, 27 Apr 2021 15:42:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=quk1wa4r; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239226AbhD0Whj (ORCPT + 99 others); Tue, 27 Apr 2021 18:37:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50090 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239075AbhD0Whg (ORCPT ); Tue, 27 Apr 2021 18:37:36 -0400 Received: from mail-pg1-x54a.google.com (mail-pg1-x54a.google.com [IPv6:2607:f8b0:4864:20::54a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D8713C06175F for ; Tue, 27 Apr 2021 15:36:51 -0700 (PDT) Received: by mail-pg1-x54a.google.com with SMTP id t123-20020a632d810000b02901fcdcf045c3so20403020pgt.17 for ; Tue, 27 Apr 2021 15:36:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=IwwNOUpk3ODt0Lpl9liH9pYZxU/VRIgyeYGkiNpqM5w=; b=quk1wa4rWp3dK12YcQjVsfLL4dyW+yOEEHY2AkcN8Th/bxv3sbWM1lvSvRwKnfLOxa /moY5aE6K+FxsgqjgVKMNKpnjPr21k/yCKTrP7CDPSKW9orDE2OCEU6qQn6uMhVmWbCo CNq75iQGnqGEbsRa9VW9xKjU3b+t2mUmNoGwuGwJLdk4Tkq2QxoFF5w0Vb98nHBB+EqI NUKEgqems7QkfFNFE5BVWibioB0nQ96IYP9IZPcXgTFrjuWVdvGHCvxh5owl3y9A9/+4 9IwuW0asFBNSrTA5RIsLFienCUhU0z3PR9HkYWyI6GLHFYc9AwJidTs/z/pb/e34vVVU wJvA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=IwwNOUpk3ODt0Lpl9liH9pYZxU/VRIgyeYGkiNpqM5w=; b=aXaqR0Ba50hC4EUdl2JgNl0ESo4PGOWMpbCUojMbeo485mAyuiqMGnYYXEZ7RQAzt3 Lvsahz/2JopF1c/yu5bRWzzjTTqhcw2/wE8IVZgm987rjQfGahlrh75LZZv6PLvUuWib dyaeqehoBBfhHtpUceVdqUzQgQQbODF6cVpWdra1mZNy27em1G+kY6ASS5q1rxkOHrVm gQ+Agi3zf9k0wWl+iIbTnKIYh2MiINmj5/r2HCByADd7Zq51jMUNFZ7hghDxjU5XKM7H Z52Ie0BBLxbkjQeHpQ3CmhrdFQSLoU7XWgKR8IiRSqR6k6E5lJR9cQ5S2wqUv9haZT8Q KnFg== X-Gm-Message-State: AOAM531Juex0s4rxfvTww5blqvJamQxXjgUMNMTv50xv8EejYqRqd7Jw h11vCn4eiOFdaY6p7jg0SM29unE1QBmqWRfXuRHgBMk3tRHaPngTL2eXA3M/O3D+OK/TyJ3oSzP L2eo6huttJifgkwiNM9aL5tUsM5DJfUhDl7TDCDsmiDh0hJCg97VhOsy81Jby3K28pe0pxevG X-Received: from bgardon.sea.corp.google.com ([2620:15c:100:202:d0b5:c590:c6b:bd9c]) (user=bgardon job=sendgmr) by 2002:aa7:9571:0:b029:259:1f95:27db with SMTP id x17-20020aa795710000b02902591f9527dbmr25833597pfq.54.1619563011250; Tue, 27 Apr 2021 15:36:51 -0700 (PDT) Date: Tue, 27 Apr 2021 15:36:34 -0700 In-Reply-To: <20210427223635.2711774-1-bgardon@google.com> Message-Id: <20210427223635.2711774-6-bgardon@google.com> Mime-Version: 1.0 References: <20210427223635.2711774-1-bgardon@google.com> X-Mailer: git-send-email 2.31.1.498.g6c1eba8ee3d-goog Subject: [PATCH 5/6] KVM: x86/mmu: Protect kvm->memslots with a mutex From: Ben Gardon To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Paolo Bonzini , Peter Xu , Sean Christopherson , Peter Shier , Junaid Shahid , Jim Mattson , Yulei Zhang , Wanpeng Li , Vitaly Kuznetsov , Xiao Guangrong , Ben Gardon Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Adds a lock around memslots changes. Currently this lock does not have any effect on the syncronization model, but it will be used in a future commit to facilitate lazy rmap allocation. Signed-off-by: Ben Gardon --- arch/x86/include/asm/kvm_host.h | 5 +++++ arch/x86/kvm/x86.c | 11 +++++++++++ include/linux/kvm_host.h | 2 ++ virt/kvm/kvm_main.c | 9 ++++++++- 4 files changed, 26 insertions(+), 1 deletion(-) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index 3900dcf2439e..bce7fa152473 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h @@ -1124,6 +1124,11 @@ struct kvm_arch { #endif /* CONFIG_X86_64 */ bool shadow_mmu_active; + + /* + * Protects kvm->memslots. + */ + struct mutex memslot_assignment_lock; }; struct kvm_vm_stat { diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index fc32a7dbe4c4..30234fe96f48 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -10649,6 +10649,7 @@ int kvm_arch_init_vm(struct kvm *kvm, unsigned long type) raw_spin_lock_init(&kvm->arch.tsc_write_lock); mutex_init(&kvm->arch.apic_map_lock); spin_lock_init(&kvm->arch.pvclock_gtod_sync_lock); + mutex_init(&kvm->arch.memslot_assignment_lock); kvm->arch.kvmclock_offset = -get_kvmclock_base_ns(); pvclock_update_vm_gtod_copy(kvm); @@ -10868,6 +10869,16 @@ static int alloc_memslot_rmap(struct kvm_memory_slot *slot, return -ENOMEM; } + +void kvm_arch_assign_memslots(struct kvm *kvm, int as_id, + struct kvm_memslots *slots) +{ + mutex_lock(&kvm->arch.memslot_assignment_lock); + rcu_assign_pointer(kvm->memslots[as_id], slots); + mutex_unlock(&kvm->arch.memslot_assignment_lock); +} + + static int kvm_alloc_memslot_metadata(struct kvm_memory_slot *slot, unsigned long npages) { diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 8895b95b6a22..146bb839c754 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -720,6 +720,8 @@ int kvm_arch_prepare_memory_region(struct kvm *kvm, struct kvm_memory_slot *memslot, const struct kvm_userspace_memory_region *mem, enum kvm_mr_change change); +void kvm_arch_assign_memslots(struct kvm *kvm, int as_id, + struct kvm_memslots *slots); void kvm_arch_commit_memory_region(struct kvm *kvm, const struct kvm_userspace_memory_region *mem, struct kvm_memory_slot *old, diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 2799c6660cce..e62a37bc5b90 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1270,6 +1270,12 @@ static int check_memory_region_flags(const struct kvm_userspace_memory_region *m return 0; } +__weak void kvm_arch_assign_memslots(struct kvm *kvm, int as_id, + struct kvm_memslots *slots) +{ + rcu_assign_pointer(kvm->memslots[as_id], slots); +} + static struct kvm_memslots *install_new_memslots(struct kvm *kvm, int as_id, struct kvm_memslots *slots) { @@ -1279,7 +1285,8 @@ static struct kvm_memslots *install_new_memslots(struct kvm *kvm, WARN_ON(gen & KVM_MEMSLOT_GEN_UPDATE_IN_PROGRESS); slots->generation = gen | KVM_MEMSLOT_GEN_UPDATE_IN_PROGRESS; - rcu_assign_pointer(kvm->memslots[as_id], slots); + kvm_arch_assign_memslots(kvm, as_id, slots); + synchronize_srcu_expedited(&kvm->srcu); /* -- 2.31.1.498.g6c1eba8ee3d-goog