Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp7559908rwr; Tue, 25 Apr 2023 15:16:51 -0700 (PDT) X-Google-Smtp-Source: AKy350bIQC6sZYmkqlwpLM1FYE9UYRI0Wyutl7nLCAdnIyO1heXak+wH2nISXEY3XltbaTb3KZH3 X-Received: by 2002:a05:6a00:1309:b0:63d:5de3:b3f2 with SMTP id j9-20020a056a00130900b0063d5de3b3f2mr21389015pfu.18.1682461011523; Tue, 25 Apr 2023 15:16:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682461011; cv=none; d=google.com; s=arc-20160816; b=pTL7Ze8B7EV9SWLaecFXVyiwwFp/VQGs1Li31P+V2pL2tF/v38Kk1Of2OPo+jGzsBK cYBhrV+w2HajlgeqsQ5c1u3DIE8S00TPV0Uc0WmzH7kkyGgOkj7EvwWBfCC2jRD0YUtp civQ9JX5HjfX2U5SX9snufdPHD/2rRMRlzgJd/3pb8s/D9i7KvO4SNiWp6WJDkaana+h dNTotQRDPi5VeWMaxq3wC+rvN1ysU0zBtwBmndS4jzxNrgtrJnZ2JpWIWqKX+xN5PwsV C32KerZ2ezUYkkI76NTzNRhQaHxXowJsIh/bGTIDgc1cajMbiAlG9mGaTZnwVUkWr0je Usqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=L8DPNyuyk2/u+aEgseKKlFNQ27d0QT6mpfVWpUBlqwY=; b=cN7ixpll14e8w6+8Hu+cABKDX9Fag+H5v6bLdO3mmmCdNO/eFivvIMPFVAco0NMzgB 8gAoiqdyPaKnDpXtxnvlvmuBQSjcOWPuu/JAPemJAg0J8/z5OIktGx/LRlljrr9mFeWF JkvoAVHxKFkejGTBu5MenOotA/jz42/Dx+lqt/tzTmdlYC4hCtiMEeLjjLGgSOmPhvnh /2riuX/v+BUlmooCDupTWFBtgwdbj/2sztTLfODoqnWk+cCkImTB1r8f4i9M/vXenCP9 eWZr3SDhoW1gow7hUKiaAjYdRfQvW1FNaXTEKqS7OklWaFQYExEJRJ2svV/icYz9LcVV fPQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=cO1943ed; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h186-20020a636cc3000000b00520861f7c0csi14749465pgc.501.2023.04.25.15.16.39; Tue, 25 Apr 2023 15:16:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=cO1943ed; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235293AbjDYWCB (ORCPT + 99 others); Tue, 25 Apr 2023 18:02:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46380 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232003AbjDYWB7 (ORCPT ); Tue, 25 Apr 2023 18:01:59 -0400 Received: from mail-pl1-x62a.google.com (mail-pl1-x62a.google.com [IPv6:2607:f8b0:4864:20::62a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0A230A7 for ; Tue, 25 Apr 2023 15:01:58 -0700 (PDT) Received: by mail-pl1-x62a.google.com with SMTP id d9443c01a7336-1a920d484bdso51506445ad.1 for ; Tue, 25 Apr 2023 15:01:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1682460117; x=1685052117; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=L8DPNyuyk2/u+aEgseKKlFNQ27d0QT6mpfVWpUBlqwY=; b=cO1943ed+PS9Mueux5UEXL+zcs07hWnyKhXuto5xtQxJrV7RWRfn+F8YSvhEOeA5V9 YDOaV6JeGwRrR6XS9MSvFoHc9BnFN3e9Y7IBMhHPzTMfOKrd4cj5DnmY7OTINTRmFFlp mGdhVi/8HWhe8z4ELfJw9hLHOApOi8oc+GMm5L+diWE9lhNtbzl849UgPaEo6OG8SN8E feOrRFoy0jmIXL015jpFk3WwSGUTu1w8oMezBiIvPKk/2TbSQMXC/E0cdl7oj+WI1asF F3TPeZEKmBdN1zWvqLn2O4ym26sPXu31+Fyr78oJlMYjJxwFA9fe9mKef25OtKXR6aYI XZ0A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682460117; x=1685052117; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=L8DPNyuyk2/u+aEgseKKlFNQ27d0QT6mpfVWpUBlqwY=; b=NTJHhl7DhORBWwnK7MILDIN2HqLdW8q+5yY4qmjOh8WaUv+JtUoTH/ztzgEruSTthX snlTC6KNuk0VjhZ/4bV/iioeKRbcfAnWPO6wz4FAgEVaSxxdpHPLjS9XWlGZUu3NV8Dl f7A1Zf6vKoGxNRwo1xFsXvw/i8PaU4+zsuQpJtNxxjo41CKe2LoyhosD6YKiGUOCYkWk DZcbY/QQyzC/FYi0L58rwkYeyXEmhRCTsh+zow7aB78wglwKRUfDXycbCpNt+3SaQDzq oghqmVAVXOrY4fVePUQB2J2aDP58u0g9fMcfs6Ejvdly67yn8Ipzv19hvi4XKLfgYz7a Zu6g== X-Gm-Message-State: AC+VfDzL+N0P9Ls4o9+gH1ofVkK6JmBgIVlz9t2TLuNhcJz10uH3njG5 xO9Ruu+lPEKOqiBrga1s9+rmVw== X-Received: by 2002:a17:903:18c:b0:1a9:8ddd:8215 with SMTP id z12-20020a170903018c00b001a98ddd8215mr4209724plg.4.1682460117394; Tue, 25 Apr 2023 15:01:57 -0700 (PDT) Received: from google.com (223.103.125.34.bc.googleusercontent.com. [34.125.103.223]) by smtp.gmail.com with ESMTPSA id jd15-20020a170903260f00b001a97ffb87b7sm3033905plb.12.2023.04.25.15.01.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 25 Apr 2023 15:01:56 -0700 (PDT) Date: Tue, 25 Apr 2023 15:01:52 -0700 From: David Matlack To: Sean Christopherson Cc: Paolo Bonzini , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Jeremi Piotrowski , Ben Gardon Subject: Re: [PATCH v2] KVM: x86: Preserve TDP MMU roots until they are explicitly invalidated Message-ID: References: <20230421214946.2571580-1-seanjc@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-14.5 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,FSL_HELO_FAKE,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 24, 2023 at 05:36:37PM -0700, Sean Christopherson wrote: > On Mon, Apr 24, 2023, David Matlack wrote: > > It'd be nice to keep around the lockdep assertion though for the other (and > > future) callers. The cleanest options I can think of are: > > > > 1. Pass in a bool "vm_teardown" kvm_tdp_mmu_invalidate_all_roots() and > > use that to gate the lockdep assertion. > > 2. Take the mmu_lock for read in kvm_mmu_uninit_tdp_mmu() and pass > > down bool shared to kvm_tdp_mmu_invalidate_all_roots(). > > > > Both would satisfy your concern of not blocking teardown on the async > > worker and my concern of keeping the lockdep check. I think I prefer > > (1) since, as you point out, taking the mmu_lock at all is > > unnecessary. > > Hmm, another option: > > 3. Refactor the code so that kvm_arch_init_vm() doesn't call > kvm_tdp_mmu_invalidate_all_roots() when VM creation fails, and then lockdep > can ignore on users_count==0 without hitting the false positive. > > I like (2) the least. Not sure I prefer (1) versus (3). I dislike passing bools > just to ignore lockdep, but reworking code for a "never hit in practice" edge case > is arguably worse :-/ Agree (2) is the worst option. (3) seems potentially brittle (likely to trigger a false-positive lockdep warning if the code ever gets refactored back). How about throwing some underscores at the problem? diff --git a/arch/x86/kvm/mmu/tdp_mmu.c b/arch/x86/kvm/mmu/tdp_mmu.c index 649e1773baf1..3e00afc31c71 100644 --- a/arch/x86/kvm/mmu/tdp_mmu.c +++ b/arch/x86/kvm/mmu/tdp_mmu.c @@ -38,6 +38,8 @@ static __always_inline bool kvm_lockdep_assert_mmu_lock_held(struct kvm *kvm, return true; } +static void __kvm_tdp_mmu_invalidate_all_roots(struct kvm *kvm); + void kvm_mmu_uninit_tdp_mmu(struct kvm *kvm) { /* @@ -45,7 +47,7 @@ void kvm_mmu_uninit_tdp_mmu(struct kvm *kvm) * for zapping and thus puts the TDP MMU's reference to each root, i.e. * ultimately frees all roots. */ - kvm_tdp_mmu_invalidate_all_roots(kvm); + __kvm_tdp_mmu_invalidate_all_roots(kvm); /* * Destroying a workqueue also first flushes the workqueue, i.e. no @@ -1004,7 +1006,7 @@ void kvm_tdp_mmu_zap_invalidated_roots(struct kvm *kvm) * Note, the asynchronous worker is gifted the TDP MMU's reference. * See kvm_tdp_mmu_get_vcpu_root_hpa(). */ -void kvm_tdp_mmu_invalidate_all_roots(struct kvm *kvm) +static void __kvm_tdp_mmu_invalidate_all_roots(struct kvm *kvm) { struct kvm_mmu_page *root; @@ -1026,6 +1028,12 @@ void kvm_tdp_mmu_invalidate_all_roots(struct kvm *kvm) rcu_read_unlock(); } +void kvm_tdp_mmu_invalidate_all_roots(struct kvm *kvm) +{ + lockdep_assert_held_write(&kvm->mmu_lock); + __kvm_tdp_mmu_invalidate_all_roots(kvm); +} + /* * Installs a last-level SPTE to handle a TDP page fault. * (NPT/EPT violation/misconfiguration)