Received: by 2002:a05:7412:b795:b0:e2:908c:2ebd with SMTP id iv21csp395055rdb; Thu, 2 Nov 2023 06:56:56 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGuvqb9LSJqdCafvOBUpk/lth21jmCmg0s1IJjytO/HOz5KYNfnDmP/Ce/3z66z1eqfFfWn X-Received: by 2002:a17:902:dac9:b0:1cc:5ce4:f64b with SMTP id q9-20020a170902dac900b001cc5ce4f64bmr13058911plx.8.1698933415722; Thu, 02 Nov 2023 06:56:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698933415; cv=none; d=google.com; s=arc-20160816; b=DgLswHhNFERRc7iAjL8Y4RtByh8m8h83eONwaHwb7uhigp4ZVVf5iiD/CRc8V9IFAa rtDFNniW+itzTiz1e1QncO0B1VlqQmWxuZZRu1cVmkTob38HC/ywvBZYax5xPhYgIbwP IKLT2P0Hu7uF8NBBuFSf3Cog2f0IRL2QnjNfRKlmVM8KLKHlh5nOOlRpXivDqIUFPxx5 I8bYwlpZ4JQlJjKaVSe78T/vbT5/qtvdUKoxlPFWQHmyMemlQOgCncIWFdMFsNBavzWh QxySJYr9unwpHS+iyZFWeHc+bkywI38nL/7G8vAuxeE1sweJyrohNbO/LLre4CVdQDyp aV3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=LWVbaemD/Qn2/IvLfOB52rG+LgMP2W3NogibJrZTMZ4=; fh=xK+wiX2TTq7O2X4TlNj4MXVc7h6ma8eyuy1Ur/RMLHE=; b=UYErPC4xzNPkK241bSFYBVSJrcp6Vewuv8HahEd1sO1uxJolgroumEEQW6WfCK/t1g shhEdxEme8Xl/mxEyfJ+riy17srS2QiWnsht7kuJA1oEIUq2ffy+EmDfE/t7vikTBQgZ jLiQ2nUUQxFoCnuH1Pt93fo5gHHqlBndEtsnZ/w7raanu4eLSU+lgeQBSR8ooz9jn5XU p2uZ8rzg8dHV0xMC0Tb/34Vh9rFYLpspX/8SgFiFL0LaHSKMGjGevivb8ZmI3cRU/Yiu 9x2XwHBGL4/tLdlbQVMT7KdY7eq44Df66bd2WdorTtP6WLM2sXFK1oGUgY+cdtJ0H+KF aDig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="FS6c/cqU"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id l11-20020a170903244b00b001c774a25b3bsi5359096pls.233.2023.11.02.06.56.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Nov 2023 06:56:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="FS6c/cqU"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 430F180A0DE1; Thu, 2 Nov 2023 06:56:43 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234984AbjKBN40 (ORCPT + 99 others); Thu, 2 Nov 2023 09:56:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58758 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229995AbjKBN4Y (ORCPT ); Thu, 2 Nov 2023 09:56:24 -0400 Received: from mail-qv1-xf32.google.com (mail-qv1-xf32.google.com [IPv6:2607:f8b0:4864:20::f32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 181D1181 for ; Thu, 2 Nov 2023 06:56:20 -0700 (PDT) Received: by mail-qv1-xf32.google.com with SMTP id 6a1803df08f44-66d0f945893so8104616d6.1 for ; Thu, 02 Nov 2023 06:56:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1698933379; x=1699538179; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=LWVbaemD/Qn2/IvLfOB52rG+LgMP2W3NogibJrZTMZ4=; b=FS6c/cqU8HUrSFSpasNovxZtSucuLqOiNizhLRtgFJQJYQRdxn5WGX+C6EkLV6TdvW vbK4vXVzgIbOY0t+TWaMxigHZmgv+oyPnyQUCkvKv2I7y8NeB1XxJG/sZEm4kmhEwWMz AGVkAG07XNj5lD+ZLOH5Yycb0HhcxS+cnCRMksHmMT0zFCrKkMHvcALa2IXPIbH6FM+A 4gd8rZgCjdZ7CvdTBXjoeLiBw9RrWS01KYQSuLuY7P1NxuTF1aErk/RuHbTeydcYzikT 1Z0bReKSyE5nSzUR80yIy5VxSjwHX8zO7L/kk9/AD7lknaipZYoqFYr3M0BJ0vxx8XmZ 2qMA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698933379; x=1699538179; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=LWVbaemD/Qn2/IvLfOB52rG+LgMP2W3NogibJrZTMZ4=; b=Fs7aNqSevUW62GNnwPLs4TM3Rjx+3mi3SB9ACjPNlo+fWnVXTQ00oN3O4Gof9tIMDO Cz/RhyI997xU4PtTiSDsQXEqyf011PqVdGDzXTG458O3MehAdZdne46XW94JkobjMvAb 1zOq91j7m3kX1pAdNVsCPRReO3p/IX38xuIRaNAcYYU6sGLN9eWgHdg7tFHF8C0Z61SN R84drprxs5dCC1jyFhCV/DSC5LZOD0RDki2UHdFwy/4lrm7GtrjfLS3rdEDn/lqD1IN7 YZdoySTS0S5ZMBdVLqP6O3ADM821+eqBfeZ1QVKC5mApduURMG4CxVLFIoAzE4sdiJdg KOSw== X-Gm-Message-State: AOJu0YyLwS+wR8CQlUmvX0xxSJZiLLHmThCq2v/p6250Xb7X3Xf/4kq5 +OFwI5pU4y2bxVRzUbkUGfDzqbsdi4v6qn26b8/VkQ== X-Received: by 2002:a05:6214:27ce:b0:66f:b9ef:9636 with SMTP id ge14-20020a05621427ce00b0066fb9ef9636mr10883504qvb.32.1698933378923; Thu, 02 Nov 2023 06:56:18 -0700 (PDT) MIME-Version: 1.0 References: <20231027182217.3615211-1-seanjc@google.com> <20231027182217.3615211-12-seanjc@google.com> In-Reply-To: <20231027182217.3615211-12-seanjc@google.com> From: Fuad Tabba Date: Thu, 2 Nov 2023 13:55:42 +0000 Message-ID: Subject: Re: [PATCH v13 11/35] KVM: Drop .on_unlock() mmu_notifier hook To: Sean Christopherson Cc: Paolo Bonzini , Marc Zyngier , Oliver Upton , Huacai Chen , Michael Ellerman , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , Alexander Viro , Christian Brauner , "Matthew Wilcox (Oracle)" , Andrew Morton , kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Xiaoyao Li , Xu Yilun , Chao Peng , Jarkko Sakkinen , Anish Moorthy , David Matlack , Yu Zhang , Isaku Yamahata , =?UTF-8?B?TWlja2HDq2wgU2FsYcO8bg==?= , Vlastimil Babka , Vishal Annapurve , Ackerley Tng , Maciej Szmigiero , David Hildenbrand , Quentin Perret , Michael Roth , Wang , Liam Merwick , Isaku Yamahata , "Kirill A . Shutemov" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Thu, 02 Nov 2023 06:56:43 -0700 (PDT) On Fri, Oct 27, 2023 at 7:22=E2=80=AFPM Sean Christopherson wrote: > > Drop the .on_unlock() mmu_notifer hook now that it's no longer used for > notifying arch code that memory has been reclaimed. Adding .on_unlock() > and invoking it *after* dropping mmu_lock was a terrible idea, as doing s= o > resulted in .on_lock() and .on_unlock() having divergent and asymmetric > behavior, and set future developers up for failure, i.e. all but asked fo= r > bugs where KVM relied on using .on_unlock() to try to run a callback whil= e > holding mmu_lock. > > Opportunistically add a lockdep assertion in kvm_mmu_invalidate_end() to > guard against future bugs of this nature. > > Reported-by: Isaku Yamahata > Link: https://lore.kernel.org/all/20230802203119.GB2021422@ls.amr.corp.in= tel.com > Signed-off-by: Sean Christopherson > --- Reviewed-by: Fuad Tabba Tested-by: Fuad Tabba Cheers, /fuad > virt/kvm/kvm_main.c | 13 +++---------- > 1 file changed, 3 insertions(+), 10 deletions(-) > > diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c > index 2bc04c8ae1f4..cb9376833c18 100644 > --- a/virt/kvm/kvm_main.c > +++ b/virt/kvm/kvm_main.c > @@ -544,7 +544,6 @@ static inline struct kvm *mmu_notifier_to_kvm(struct = mmu_notifier *mn) > typedef bool (*gfn_handler_t)(struct kvm *kvm, struct kvm_gfn_range *ran= ge); > > typedef void (*on_lock_fn_t)(struct kvm *kvm); > -typedef void (*on_unlock_fn_t)(struct kvm *kvm); > > struct kvm_mmu_notifier_range { > /* > @@ -556,7 +555,6 @@ struct kvm_mmu_notifier_range { > union kvm_mmu_notifier_arg arg; > gfn_handler_t handler; > on_lock_fn_t on_lock; > - on_unlock_fn_t on_unlock; > bool flush_on_ret; > bool may_block; > }; > @@ -663,11 +661,8 @@ static __always_inline kvm_mn_ret_t __kvm_handle_hva= _range(struct kvm *kvm, > if (range->flush_on_ret && r.ret) > kvm_flush_remote_tlbs(kvm); > > - if (r.found_memslot) { > + if (r.found_memslot) > KVM_MMU_UNLOCK(kvm); > - if (!IS_KVM_NULL_FN(range->on_unlock)) > - range->on_unlock(kvm); > - } > > srcu_read_unlock(&kvm->srcu, idx); > > @@ -687,7 +682,6 @@ static __always_inline int kvm_handle_hva_range(struc= t mmu_notifier *mn, > .arg =3D arg, > .handler =3D handler, > .on_lock =3D (void *)kvm_null_fn, > - .on_unlock =3D (void *)kvm_null_fn, > .flush_on_ret =3D true, > .may_block =3D false, > }; > @@ -706,7 +700,6 @@ static __always_inline int kvm_handle_hva_range_no_fl= ush(struct mmu_notifier *mn > .end =3D end, > .handler =3D handler, > .on_lock =3D (void *)kvm_null_fn, > - .on_unlock =3D (void *)kvm_null_fn, > .flush_on_ret =3D false, > .may_block =3D false, > }; > @@ -813,7 +806,6 @@ static int kvm_mmu_notifier_invalidate_range_start(st= ruct mmu_notifier *mn, > .end =3D range->end, > .handler =3D kvm_mmu_unmap_gfn_range, > .on_lock =3D kvm_mmu_invalidate_begin, > - .on_unlock =3D (void *)kvm_null_fn, > .flush_on_ret =3D true, > .may_block =3D mmu_notifier_range_blockable(range), > }; > @@ -858,6 +850,8 @@ static int kvm_mmu_notifier_invalidate_range_start(st= ruct mmu_notifier *mn, > > void kvm_mmu_invalidate_end(struct kvm *kvm) > { > + lockdep_assert_held_write(&kvm->mmu_lock); > + > /* > * This sequence increase will notify the kvm page fault that > * the page that is going to be mapped in the spte could have > @@ -889,7 +883,6 @@ static void kvm_mmu_notifier_invalidate_range_end(str= uct mmu_notifier *mn, > .end =3D range->end, > .handler =3D (void *)kvm_null_fn, > .on_lock =3D kvm_mmu_invalidate_end, > - .on_unlock =3D (void *)kvm_null_fn, > .flush_on_ret =3D false, > .may_block =3D mmu_notifier_range_blockable(range), > }; > -- > 2.42.0.820.g83a721a137-goog >