Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp397416rwe; Wed, 24 Aug 2022 03:00:15 -0700 (PDT) X-Google-Smtp-Source: AA6agR5+VaaJ6Y2rL/DiDaTfdg3z+zh55XUEAlCWdIYNFotoHYN6T0Fn3RLR/IW/hYda7xJISjbi X-Received: by 2002:a17:902:bd49:b0:170:953d:c489 with SMTP id b9-20020a170902bd4900b00170953dc489mr28335305plx.96.1661335215310; Wed, 24 Aug 2022 03:00:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661335215; cv=none; d=google.com; s=arc-20160816; b=H/yq/LBS0jf4OTzPcwMRVlR6izpQ2qSrBnFHUPgNfbpoyYnazS2RZGu/x6xQmNS6Q0 Q5vg73lhq3RR0+rPeYTfzq2Wp+1xry8nJjSqSX39Z3vEe8HhHTsybcDInBeiZHpyUUZ2 EKPDB5QydLYZ7ro9Sg4dUlMCmyissF3m/i7K6TBt0t3x+4JwpTMD4TDGrXYXN/i2moMB LYBdgSG53jGw/rwSOK3H8Dk7ICOiOs1JzC3IBGGzLu+xfIo6bkuKLlyEqL3mzfAcq3nR bKIBGaiRGyvFQ9asgiKCNjnoX1ibmU+uMZOmwlE/PDaWNwYSviIwDusjZAswsa8oMaiu BqGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=xK/NXhUFbeWXCvRkBdddVeGXuy0IeQ2jLSZAJnfu2vc=; b=w1Cewpl9Y1sl1E7i5jNJKixR+Q+VFEZ1AZlMkqg50GtTdSkaAU1NhjdM/gXWD5ap9M RYKKZLJaYBdznYxZMOMm0Yjz5Go2f44J9yLKVzkvljTek+ZkvXFFU1pN1P7WRtfcUUSv i3fTZS45IRPpzjbea0t+azWAXvdZ06SqKSP+wH7PW11bzeWYpHATEXQVdpUZ/LzDSvLI 9KaLYYLH5jpUzUYROn6huL/kWhxkgYs6FJjS8jKwt4DsSFE/lZi0EKKJddFFdIiFSGWJ XsxCntKkScvXq5wmxOwLQlt8e49dBdS6KzFvyTnkbASeIS2zv13ckiYdCNd8e1KpgaFE vFng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=antgroup.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 189-20020a6300c6000000b0042b35f35736si35287pga.14.2022.08.24.03.00.03; Wed, 24 Aug 2022 03:00:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=antgroup.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235862AbiHXJ3p (ORCPT + 99 others); Wed, 24 Aug 2022 05:29:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49176 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235909AbiHXJ3a (ORCPT ); Wed, 24 Aug 2022 05:29:30 -0400 Received: from out0-151.mail.aliyun.com (out0-151.mail.aliyun.com [140.205.0.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E67A2844F6; Wed, 24 Aug 2022 02:29:27 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R891e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018047202;MF=houwenlong.hwl@antgroup.com;NM=1;PH=DS;RN=12;SR=0;TI=SMTPD_---.P-k32CP_1661333364; Received: from localhost(mailfrom:houwenlong.hwl@antgroup.com fp:SMTPD_---.P-k32CP_1661333364) by smtp.aliyun-inc.com; Wed, 24 Aug 2022 17:29:24 +0800 From: "Hou Wenlong" To: kvm@vger.kernel.org Cc: David Matlack , Sean Christopherson , Paolo Bonzini , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Lan Tianyu , linux-kernel@vger.kernel.org Subject: [PATCH v2 1/6] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in validate_direct_spte() Date: Wed, 24 Aug 2022 17:29:18 +0800 Message-Id: X-Mailer: git-send-email 2.31.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The spte pointing to the children SP is dropped, so the whole gfn range covered by the children SP should be flushed. Although, Hyper-V may treat a 1-page flush the same if the address points to a huge page, it still would be better to use the correct size of huge page. Also introduce a helper function to do range-based flushing when a direct SP is dropped, which would help prevent future buggy use of kvm_flush_remote_tlbs_with_address() in such case. Fixes: c3134ce240eed ("KVM: Replace old tlb flush function with new one to flush a specified range.") Suggested-by: David Matlack Signed-off-by: Hou Wenlong --- arch/x86/kvm/mmu/mmu.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c index e418ef3ecfcb..a3578abd8bbc 100644 --- a/arch/x86/kvm/mmu/mmu.c +++ b/arch/x86/kvm/mmu/mmu.c @@ -260,6 +260,14 @@ void kvm_flush_remote_tlbs_with_address(struct kvm *kvm, kvm_flush_remote_tlbs_with_range(kvm, &range); } +/* Flush all memory mapped by the given direct SP. */ +static void kvm_flush_remote_tlbs_direct_sp(struct kvm *kvm, struct kvm_mmu_page *sp) +{ + WARN_ON_ONCE(!sp->role.direct); + kvm_flush_remote_tlbs_with_address(kvm, sp->gfn, + KVM_PAGES_PER_HPAGE(sp->role.level + 1)); +} + static void mark_mmio_spte(struct kvm_vcpu *vcpu, u64 *sptep, u64 gfn, unsigned int access) { @@ -2341,7 +2349,7 @@ static void validate_direct_spte(struct kvm_vcpu *vcpu, u64 *sptep, return; drop_parent_pte(child, sptep); - kvm_flush_remote_tlbs_with_address(vcpu->kvm, child->gfn, 1); + kvm_flush_remote_tlbs_direct_sp(vcpu->kvm, child); } } -- 2.31.1