Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp308456pxb; Mon, 25 Oct 2021 08:42:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyNohD9vMJzCd1/CO728kYJ/agTJN6twlnrbNkhGxFR4EVo8sNi9ecMrUELLUKplXDsEaCu X-Received: by 2002:a65:6389:: with SMTP id h9mr14134109pgv.83.1635176551271; Mon, 25 Oct 2021 08:42:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635176551; cv=none; d=google.com; s=arc-20160816; b=fKWQNy3TFT5zCrbTy+GOvqnqCoVj0F2bal985h+dIMZ0BwM+3G15Esitc9IUr5+hqS Hf9mnnawI7XeDWKMAohUgC8aQDSAfTD8spCxeiNBixYN+EjM7hbp7rX6sy/olkXDXWWc VdyVINFdEH5TNWTLrZvykYAxIznax2Dnjm58PnWj72lqbFLiXZkTRQ3HI8gghn9vhG5Z Bx5YzgJZmL4arZjAogE89iTQe7gkGY9FebbB3FqQ4DVl7G7qg8vxpDpiJLLgPUa4V4tF +qKvsVcnl2C66mUFISG5F/6cDp2C58CY4wyzGQxR3Jvf+1C8kEdWo1vvwXmZI6HCF7Vi h8mA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=4JnvwWaRo4iE6zeN8DeflI8kuZhLv6TYtgEJ2sN18X0=; b=fbZCirYyQBjbelOScttMa0L4hQbW4HHFbswuwdM4Gc0Mbry3ycJ7tjF2vUVtFmOx7y U2p+/CBcQGjDT0WKsg07YoBoRxVRZlS2x5X8A+wllziHxlIzumx+DlYm7q4P2A0jns/H YJW+6BIXmdbSF5BXdxwwxF8BWchIpA2CrWbyWpX700IRqUrLRdvWHad2M/yKoYWfPZUa RmQd+mmhFyn9KliOA2OVeQ8v8Eh9vPTHrFRHaXoTSGUxkjxWLtqaR9M5by1611NC10Qy wWRRvbmifMx+urY5J6/fBEExSDofASgHeLIx8wtXHMonT2NRZYW8s+NUM+wlugY1YCAn R/RA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b="rom/C+7m"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z12si28674165pgu.584.2021.10.25.08.41.55; Mon, 25 Oct 2021 08:42:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b="rom/C+7m"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231350AbhJYPlx (ORCPT + 99 others); Mon, 25 Oct 2021 11:41:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56660 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229809AbhJYPlv (ORCPT ); Mon, 25 Oct 2021 11:41:51 -0400 Received: from mail-pj1-x1029.google.com (mail-pj1-x1029.google.com [IPv6:2607:f8b0:4864:20::1029]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE866C061745 for ; Mon, 25 Oct 2021 08:39:29 -0700 (PDT) Received: by mail-pj1-x1029.google.com with SMTP id oa12-20020a17090b1bcc00b0019f715462a8so312112pjb.3 for ; Mon, 25 Oct 2021 08:39:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=4JnvwWaRo4iE6zeN8DeflI8kuZhLv6TYtgEJ2sN18X0=; b=rom/C+7mjkBstnMy4kARza9EAU5haDsedag9MF1Zu7WU30XMVtslLTmJS9nsVH/4aW LNokxElJgsig45c3pYprJDavuno9wsjLPEDvcv2TmfyACdG1j+kqyg0m61VF0UlNa8tN bNr/6RFoZUqOaFUtnGwIjrWXcjPhkjdNjwZvYIvi9+Paf91n/6uv1CtnXCGKqXzseRh9 e4FJz23pel7svPYBsPeOA6lQHq3pGX4Ey2yj9jakwJsv9q3O841Q2pye58s7OKYDA7SC i55TfAFVvcdF4XpsBgH+W0sUNZPXciJE+DCU+NoWxrU1xv+JziMARtTkFyWDQnzWxNp6 URzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=4JnvwWaRo4iE6zeN8DeflI8kuZhLv6TYtgEJ2sN18X0=; b=khtsoOjAAUFFnSTlCg4+sIiLeHUVpyofGQ0dTWNbWLsU340z+2M0yFjJI8cxmozE+a sV1wmBHLoGBUtIWBwdjsTd2sN2om4VXsJjoxGDQ+m5WcQpu7hwwl7491uORPQ07dTh7d aTTfP1WjyoeW75LF8qiOoDaPJ+g4O7awBq7iZYsurraiZnJEE0Pi23wHQEp/V4ZMoA00 Cq0XagcRKsBBiQ+qqkN6VxFwQPeR5qJ1zC3ZIwRO9lh+c3sqMpzHb+iKNWavM4S39EdA 8p/y6h+xNdnFTguVn2jZUjgTN7UH9OBhKn8fRHNv79YHzjWqVLBNM9omnBGfP9NjfqMf Fnyw== X-Gm-Message-State: AOAM533ScfL8eTz95d8YPzEoNe1fWTFyf17DTcWtuD6GpHuhniE9jcXd vkMfQ8KMESMIkquJlpv1GQb+yw== X-Received: by 2002:a17:90a:c297:: with SMTP id f23mr24322651pjt.37.1635176369106; Mon, 25 Oct 2021 08:39:29 -0700 (PDT) Received: from google.com (157.214.185.35.bc.googleusercontent.com. [35.185.214.157]) by smtp.gmail.com with ESMTPSA id om5sm19094195pjb.36.2021.10.25.08.39.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Oct 2021 08:39:28 -0700 (PDT) Date: Mon, 25 Oct 2021 15:39:24 +0000 From: Sean Christopherson To: "Maciej S. Szmigiero" Cc: Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Maxim Levitsky , Ben Gardon Subject: Re: [PATCH 2/3] KVM: x86/mmu: Drop a redundant remote TLB flush in kvm_zap_gfn_range() Message-ID: References: <20211022010005.1454978-1-seanjc@google.com> <20211022010005.1454978-3-seanjc@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 22, 2021, Maciej S. Szmigiero wrote: > On 22.10.2021 03:00, Sean Christopherson wrote: > > Remove an unnecessary remote TLB flush in kvm_zap_gfn_range() now that > > said function holds mmu_lock for write for its entire duration. The > > flush was added by the now-reverted commit to allow TDP MMU to flush while > > holding mmu_lock for read, as the transition from write=>read required > > dropping the lock and thus a pending flush needed to be serviced. > > > > Fixes: 5a324c24b638 ("Revert "KVM: x86/mmu: Allow zap gfn range to operate under the mmu read lock"") > > Cc: Maxim Levitsky > > Cc: Maciej S. Szmigiero > > Cc: Ben Gardon > > Signed-off-by: Sean Christopherson > > --- > > arch/x86/kvm/mmu/mmu.c | 3 --- > > 1 file changed, 3 deletions(-) > > > > diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c > > index f82b192bba0b..e8b8a665e2e9 100644 > > --- a/arch/x86/kvm/mmu/mmu.c > > +++ b/arch/x86/kvm/mmu/mmu.c > > @@ -5700,9 +5700,6 @@ void kvm_zap_gfn_range(struct kvm *kvm, gfn_t gfn_start, gfn_t gfn_end) > > end - 1, true, flush); > > } > > } > > - if (flush) > > - kvm_flush_remote_tlbs_with_address(kvm, gfn_start, > > - gfn_end - gfn_start); > > } > > if (is_tdp_mmu_enabled(kvm)) { > > > > Unfortunately, it seems that a pending flush from __kvm_zap_rmaps() > can be reset back to false by the following line: > > flush = kvm_tdp_mmu_zap_gfn_range(kvm, i, gfn_start, gfn_end, flush); > > kvm_tdp_mmu_zap_gfn_range() calls __kvm_tdp_mmu_zap_gfn_range with > "can_yield" set to true, which passes it to zap_gfn_range, which has > this code: > > if (can_yield && > > tdp_mmu_iter_cond_resched(kvm, &iter, flush, shared)) { > > flush = false; > > continue; > > } That's working by design. If the MMU (legacy or TDP) yields during zap, it _must_ flush before dropping mmu_lock so that any SPTE modifications are guaranteed to be observed by all vCPUs. Clearing "flush" is deliberate/correct as another is flush is needed if and only if additional SPTE modifications are made. static inline bool tdp_mmu_iter_cond_resched(struct kvm *kvm, struct tdp_iter *iter, bool flush, bool shared) { /* Ensure forward progress has been made before yielding. */ if (iter->next_last_level_gfn == iter->yielded_gfn) return false; if (need_resched() || rwlock_needbreak(&kvm->mmu_lock)) { rcu_read_unlock(); if (flush) kvm_flush_remote_tlbs(kvm); <------- ****** HERE ****** if (shared) cond_resched_rwlock_read(&kvm->mmu_lock); else cond_resched_rwlock_write(&kvm->mmu_lock); rcu_read_lock(); WARN_ON(iter->gfn > iter->next_last_level_gfn); tdp_iter_restart(iter); return true; } return false; }