xref: /openbmc/linux/arch/x86/kvm/mmu/tdp_mmu.c (revision dde81f94)
1fe5db27dSBen Gardon // SPDX-License-Identifier: GPL-2.0
2fe5db27dSBen Gardon 
302c00b3aSBen Gardon #include "mmu.h"
402c00b3aSBen Gardon #include "mmu_internal.h"
5bb18842eSBen Gardon #include "mmutrace.h"
62f2fad08SBen Gardon #include "tdp_iter.h"
7fe5db27dSBen Gardon #include "tdp_mmu.h"
802c00b3aSBen Gardon #include "spte.h"
9fe5db27dSBen Gardon 
1095fb5b02SBen Gardon #ifdef CONFIG_X86_64
11fe5db27dSBen Gardon static bool __read_mostly tdp_mmu_enabled = false;
1295fb5b02SBen Gardon module_param_named(tdp_mmu, tdp_mmu_enabled, bool, 0644);
1395fb5b02SBen Gardon #endif
14fe5db27dSBen Gardon 
15fe5db27dSBen Gardon static bool is_tdp_mmu_enabled(void)
16fe5db27dSBen Gardon {
17fe5db27dSBen Gardon #ifdef CONFIG_X86_64
18fe5db27dSBen Gardon 	return tdp_enabled && READ_ONCE(tdp_mmu_enabled);
19fe5db27dSBen Gardon #else
20fe5db27dSBen Gardon 	return false;
21fe5db27dSBen Gardon #endif /* CONFIG_X86_64 */
22fe5db27dSBen Gardon }
23fe5db27dSBen Gardon 
24fe5db27dSBen Gardon /* Initializes the TDP MMU for the VM, if enabled. */
25fe5db27dSBen Gardon void kvm_mmu_init_tdp_mmu(struct kvm *kvm)
26fe5db27dSBen Gardon {
27fe5db27dSBen Gardon 	if (!is_tdp_mmu_enabled())
28fe5db27dSBen Gardon 		return;
29fe5db27dSBen Gardon 
30fe5db27dSBen Gardon 	/* This should not be changed for the lifetime of the VM. */
31fe5db27dSBen Gardon 	kvm->arch.tdp_mmu_enabled = true;
3202c00b3aSBen Gardon 
3302c00b3aSBen Gardon 	INIT_LIST_HEAD(&kvm->arch.tdp_mmu_roots);
3489c0fd49SBen Gardon 	INIT_LIST_HEAD(&kvm->arch.tdp_mmu_pages);
35fe5db27dSBen Gardon }
36fe5db27dSBen Gardon 
37fe5db27dSBen Gardon void kvm_mmu_uninit_tdp_mmu(struct kvm *kvm)
38fe5db27dSBen Gardon {
39fe5db27dSBen Gardon 	if (!kvm->arch.tdp_mmu_enabled)
40fe5db27dSBen Gardon 		return;
4102c00b3aSBen Gardon 
4202c00b3aSBen Gardon 	WARN_ON(!list_empty(&kvm->arch.tdp_mmu_roots));
4302c00b3aSBen Gardon }
4402c00b3aSBen Gardon 
4502c00b3aSBen Gardon #define for_each_tdp_mmu_root(_kvm, _root)			    \
4602c00b3aSBen Gardon 	list_for_each_entry(_root, &_kvm->arch.tdp_mmu_roots, link)
4702c00b3aSBen Gardon 
4802c00b3aSBen Gardon bool is_tdp_mmu_root(struct kvm *kvm, hpa_t hpa)
4902c00b3aSBen Gardon {
5002c00b3aSBen Gardon 	struct kvm_mmu_page *sp;
5102c00b3aSBen Gardon 
52c887c9b9SPaolo Bonzini 	if (!kvm->arch.tdp_mmu_enabled)
53c887c9b9SPaolo Bonzini 		return false;
54c887c9b9SPaolo Bonzini 	if (WARN_ON(!VALID_PAGE(hpa)))
55c887c9b9SPaolo Bonzini 		return false;
56c887c9b9SPaolo Bonzini 
5702c00b3aSBen Gardon 	sp = to_shadow_page(hpa);
58c887c9b9SPaolo Bonzini 	if (WARN_ON(!sp))
59c887c9b9SPaolo Bonzini 		return false;
6002c00b3aSBen Gardon 
6102c00b3aSBen Gardon 	return sp->tdp_mmu_page && sp->root_count;
6202c00b3aSBen Gardon }
6302c00b3aSBen Gardon 
64faaf05b0SBen Gardon static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root,
65063afacdSBen Gardon 			  gfn_t start, gfn_t end, bool can_yield);
66faaf05b0SBen Gardon 
6702c00b3aSBen Gardon void kvm_tdp_mmu_free_root(struct kvm *kvm, struct kvm_mmu_page *root)
6802c00b3aSBen Gardon {
69339f5a7fSRick Edgecombe 	gfn_t max_gfn = 1ULL << (shadow_phys_bits - PAGE_SHIFT);
70faaf05b0SBen Gardon 
7102c00b3aSBen Gardon 	lockdep_assert_held(&kvm->mmu_lock);
7202c00b3aSBen Gardon 
7302c00b3aSBen Gardon 	WARN_ON(root->root_count);
7402c00b3aSBen Gardon 	WARN_ON(!root->tdp_mmu_page);
7502c00b3aSBen Gardon 
7602c00b3aSBen Gardon 	list_del(&root->link);
7702c00b3aSBen Gardon 
78063afacdSBen Gardon 	zap_gfn_range(kvm, root, 0, max_gfn, false);
79faaf05b0SBen Gardon 
8002c00b3aSBen Gardon 	free_page((unsigned long)root->spt);
8102c00b3aSBen Gardon 	kmem_cache_free(mmu_page_header_cache, root);
8202c00b3aSBen Gardon }
8302c00b3aSBen Gardon 
8402c00b3aSBen Gardon static union kvm_mmu_page_role page_role_for_level(struct kvm_vcpu *vcpu,
8502c00b3aSBen Gardon 						   int level)
8602c00b3aSBen Gardon {
8702c00b3aSBen Gardon 	union kvm_mmu_page_role role;
8802c00b3aSBen Gardon 
8902c00b3aSBen Gardon 	role = vcpu->arch.mmu->mmu_role.base;
9002c00b3aSBen Gardon 	role.level = level;
9102c00b3aSBen Gardon 	role.direct = true;
9202c00b3aSBen Gardon 	role.gpte_is_8_bytes = true;
9302c00b3aSBen Gardon 	role.access = ACC_ALL;
9402c00b3aSBen Gardon 
9502c00b3aSBen Gardon 	return role;
9602c00b3aSBen Gardon }
9702c00b3aSBen Gardon 
9802c00b3aSBen Gardon static struct kvm_mmu_page *alloc_tdp_mmu_page(struct kvm_vcpu *vcpu, gfn_t gfn,
9902c00b3aSBen Gardon 					       int level)
10002c00b3aSBen Gardon {
10102c00b3aSBen Gardon 	struct kvm_mmu_page *sp;
10202c00b3aSBen Gardon 
10302c00b3aSBen Gardon 	sp = kvm_mmu_memory_cache_alloc(&vcpu->arch.mmu_page_header_cache);
10402c00b3aSBen Gardon 	sp->spt = kvm_mmu_memory_cache_alloc(&vcpu->arch.mmu_shadow_page_cache);
10502c00b3aSBen Gardon 	set_page_private(virt_to_page(sp->spt), (unsigned long)sp);
10602c00b3aSBen Gardon 
10702c00b3aSBen Gardon 	sp->role.word = page_role_for_level(vcpu, level).word;
10802c00b3aSBen Gardon 	sp->gfn = gfn;
10902c00b3aSBen Gardon 	sp->tdp_mmu_page = true;
11002c00b3aSBen Gardon 
11102c00b3aSBen Gardon 	return sp;
11202c00b3aSBen Gardon }
11302c00b3aSBen Gardon 
11402c00b3aSBen Gardon static struct kvm_mmu_page *get_tdp_mmu_vcpu_root(struct kvm_vcpu *vcpu)
11502c00b3aSBen Gardon {
11602c00b3aSBen Gardon 	union kvm_mmu_page_role role;
11702c00b3aSBen Gardon 	struct kvm *kvm = vcpu->kvm;
11802c00b3aSBen Gardon 	struct kvm_mmu_page *root;
11902c00b3aSBen Gardon 
12002c00b3aSBen Gardon 	role = page_role_for_level(vcpu, vcpu->arch.mmu->shadow_root_level);
12102c00b3aSBen Gardon 
12202c00b3aSBen Gardon 	spin_lock(&kvm->mmu_lock);
12302c00b3aSBen Gardon 
12402c00b3aSBen Gardon 	/* Check for an existing root before allocating a new one. */
12502c00b3aSBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
12602c00b3aSBen Gardon 		if (root->role.word == role.word) {
12702c00b3aSBen Gardon 			kvm_mmu_get_root(kvm, root);
12802c00b3aSBen Gardon 			spin_unlock(&kvm->mmu_lock);
12902c00b3aSBen Gardon 			return root;
13002c00b3aSBen Gardon 		}
13102c00b3aSBen Gardon 	}
13202c00b3aSBen Gardon 
13302c00b3aSBen Gardon 	root = alloc_tdp_mmu_page(vcpu, 0, vcpu->arch.mmu->shadow_root_level);
13402c00b3aSBen Gardon 	root->root_count = 1;
13502c00b3aSBen Gardon 
13602c00b3aSBen Gardon 	list_add(&root->link, &kvm->arch.tdp_mmu_roots);
13702c00b3aSBen Gardon 
13802c00b3aSBen Gardon 	spin_unlock(&kvm->mmu_lock);
13902c00b3aSBen Gardon 
14002c00b3aSBen Gardon 	return root;
14102c00b3aSBen Gardon }
14202c00b3aSBen Gardon 
14302c00b3aSBen Gardon hpa_t kvm_tdp_mmu_get_vcpu_root_hpa(struct kvm_vcpu *vcpu)
14402c00b3aSBen Gardon {
14502c00b3aSBen Gardon 	struct kvm_mmu_page *root;
14602c00b3aSBen Gardon 
14702c00b3aSBen Gardon 	root = get_tdp_mmu_vcpu_root(vcpu);
14802c00b3aSBen Gardon 	if (!root)
14902c00b3aSBen Gardon 		return INVALID_PAGE;
15002c00b3aSBen Gardon 
15102c00b3aSBen Gardon 	return __pa(root->spt);
152fe5db27dSBen Gardon }
1532f2fad08SBen Gardon 
1542f2fad08SBen Gardon static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
1552f2fad08SBen Gardon 				u64 old_spte, u64 new_spte, int level);
1562f2fad08SBen Gardon 
157faaf05b0SBen Gardon static int kvm_mmu_page_as_id(struct kvm_mmu_page *sp)
158faaf05b0SBen Gardon {
159faaf05b0SBen Gardon 	return sp->role.smm ? 1 : 0;
160faaf05b0SBen Gardon }
161faaf05b0SBen Gardon 
162f8e14497SBen Gardon static void handle_changed_spte_acc_track(u64 old_spte, u64 new_spte, int level)
163f8e14497SBen Gardon {
164f8e14497SBen Gardon 	bool pfn_changed = spte_to_pfn(old_spte) != spte_to_pfn(new_spte);
165f8e14497SBen Gardon 
166f8e14497SBen Gardon 	if (!is_shadow_present_pte(old_spte) || !is_last_spte(old_spte, level))
167f8e14497SBen Gardon 		return;
168f8e14497SBen Gardon 
169f8e14497SBen Gardon 	if (is_accessed_spte(old_spte) &&
170f8e14497SBen Gardon 	    (!is_accessed_spte(new_spte) || pfn_changed))
171f8e14497SBen Gardon 		kvm_set_pfn_accessed(spte_to_pfn(old_spte));
172f8e14497SBen Gardon }
173f8e14497SBen Gardon 
174a6a0b05dSBen Gardon static void handle_changed_spte_dirty_log(struct kvm *kvm, int as_id, gfn_t gfn,
175a6a0b05dSBen Gardon 					  u64 old_spte, u64 new_spte, int level)
176a6a0b05dSBen Gardon {
177a6a0b05dSBen Gardon 	bool pfn_changed;
178a6a0b05dSBen Gardon 	struct kvm_memory_slot *slot;
179a6a0b05dSBen Gardon 
180a6a0b05dSBen Gardon 	if (level > PG_LEVEL_4K)
181a6a0b05dSBen Gardon 		return;
182a6a0b05dSBen Gardon 
183a6a0b05dSBen Gardon 	pfn_changed = spte_to_pfn(old_spte) != spte_to_pfn(new_spte);
184a6a0b05dSBen Gardon 
185a6a0b05dSBen Gardon 	if ((!is_writable_pte(old_spte) || pfn_changed) &&
186a6a0b05dSBen Gardon 	    is_writable_pte(new_spte)) {
187a6a0b05dSBen Gardon 		slot = __gfn_to_memslot(__kvm_memslots(kvm, as_id), gfn);
188a6a0b05dSBen Gardon 		mark_page_dirty_in_slot(slot, gfn);
189a6a0b05dSBen Gardon 	}
190a6a0b05dSBen Gardon }
191a6a0b05dSBen Gardon 
1922f2fad08SBen Gardon /**
1932f2fad08SBen Gardon  * handle_changed_spte - handle bookkeeping associated with an SPTE change
1942f2fad08SBen Gardon  * @kvm: kvm instance
1952f2fad08SBen Gardon  * @as_id: the address space of the paging structure the SPTE was a part of
1962f2fad08SBen Gardon  * @gfn: the base GFN that was mapped by the SPTE
1972f2fad08SBen Gardon  * @old_spte: The value of the SPTE before the change
1982f2fad08SBen Gardon  * @new_spte: The value of the SPTE after the change
1992f2fad08SBen Gardon  * @level: the level of the PT the SPTE is part of in the paging structure
2002f2fad08SBen Gardon  *
2012f2fad08SBen Gardon  * Handle bookkeeping that might result from the modification of a SPTE.
2022f2fad08SBen Gardon  * This function must be called for all TDP SPTE modifications.
2032f2fad08SBen Gardon  */
2042f2fad08SBen Gardon static void __handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
2052f2fad08SBen Gardon 				u64 old_spte, u64 new_spte, int level)
2062f2fad08SBen Gardon {
2072f2fad08SBen Gardon 	bool was_present = is_shadow_present_pte(old_spte);
2082f2fad08SBen Gardon 	bool is_present = is_shadow_present_pte(new_spte);
2092f2fad08SBen Gardon 	bool was_leaf = was_present && is_last_spte(old_spte, level);
2102f2fad08SBen Gardon 	bool is_leaf = is_present && is_last_spte(new_spte, level);
2112f2fad08SBen Gardon 	bool pfn_changed = spte_to_pfn(old_spte) != spte_to_pfn(new_spte);
2122f2fad08SBen Gardon 	u64 *pt;
21389c0fd49SBen Gardon 	struct kvm_mmu_page *sp;
2142f2fad08SBen Gardon 	u64 old_child_spte;
2152f2fad08SBen Gardon 	int i;
2162f2fad08SBen Gardon 
2172f2fad08SBen Gardon 	WARN_ON(level > PT64_ROOT_MAX_LEVEL);
2182f2fad08SBen Gardon 	WARN_ON(level < PG_LEVEL_4K);
219764388ceSSean Christopherson 	WARN_ON(gfn & (KVM_PAGES_PER_HPAGE(level) - 1));
2202f2fad08SBen Gardon 
2212f2fad08SBen Gardon 	/*
2222f2fad08SBen Gardon 	 * If this warning were to trigger it would indicate that there was a
2232f2fad08SBen Gardon 	 * missing MMU notifier or a race with some notifier handler.
2242f2fad08SBen Gardon 	 * A present, leaf SPTE should never be directly replaced with another
2252f2fad08SBen Gardon 	 * present leaf SPTE pointing to a differnt PFN. A notifier handler
2262f2fad08SBen Gardon 	 * should be zapping the SPTE before the main MM's page table is
2272f2fad08SBen Gardon 	 * changed, or the SPTE should be zeroed, and the TLBs flushed by the
2282f2fad08SBen Gardon 	 * thread before replacement.
2292f2fad08SBen Gardon 	 */
2302f2fad08SBen Gardon 	if (was_leaf && is_leaf && pfn_changed) {
2312f2fad08SBen Gardon 		pr_err("Invalid SPTE change: cannot replace a present leaf\n"
2322f2fad08SBen Gardon 		       "SPTE with another present leaf SPTE mapping a\n"
2332f2fad08SBen Gardon 		       "different PFN!\n"
2342f2fad08SBen Gardon 		       "as_id: %d gfn: %llx old_spte: %llx new_spte: %llx level: %d",
2352f2fad08SBen Gardon 		       as_id, gfn, old_spte, new_spte, level);
2362f2fad08SBen Gardon 
2372f2fad08SBen Gardon 		/*
2382f2fad08SBen Gardon 		 * Crash the host to prevent error propagation and guest data
2392f2fad08SBen Gardon 		 * courruption.
2402f2fad08SBen Gardon 		 */
2412f2fad08SBen Gardon 		BUG();
2422f2fad08SBen Gardon 	}
2432f2fad08SBen Gardon 
2442f2fad08SBen Gardon 	if (old_spte == new_spte)
2452f2fad08SBen Gardon 		return;
2462f2fad08SBen Gardon 
2472f2fad08SBen Gardon 	/*
2482f2fad08SBen Gardon 	 * The only times a SPTE should be changed from a non-present to
2492f2fad08SBen Gardon 	 * non-present state is when an MMIO entry is installed/modified/
2502f2fad08SBen Gardon 	 * removed. In that case, there is nothing to do here.
2512f2fad08SBen Gardon 	 */
2522f2fad08SBen Gardon 	if (!was_present && !is_present) {
2532f2fad08SBen Gardon 		/*
2542f2fad08SBen Gardon 		 * If this change does not involve a MMIO SPTE, it is
2552f2fad08SBen Gardon 		 * unexpected. Log the change, though it should not impact the
2562f2fad08SBen Gardon 		 * guest since both the former and current SPTEs are nonpresent.
2572f2fad08SBen Gardon 		 */
2582f2fad08SBen Gardon 		if (WARN_ON(!is_mmio_spte(old_spte) && !is_mmio_spte(new_spte)))
2592f2fad08SBen Gardon 			pr_err("Unexpected SPTE change! Nonpresent SPTEs\n"
2602f2fad08SBen Gardon 			       "should not be replaced with another,\n"
2612f2fad08SBen Gardon 			       "different nonpresent SPTE, unless one or both\n"
2622f2fad08SBen Gardon 			       "are MMIO SPTEs.\n"
2632f2fad08SBen Gardon 			       "as_id: %d gfn: %llx old_spte: %llx new_spte: %llx level: %d",
2642f2fad08SBen Gardon 			       as_id, gfn, old_spte, new_spte, level);
2652f2fad08SBen Gardon 		return;
2662f2fad08SBen Gardon 	}
2672f2fad08SBen Gardon 
2682f2fad08SBen Gardon 
2692f2fad08SBen Gardon 	if (was_leaf && is_dirty_spte(old_spte) &&
2702f2fad08SBen Gardon 	    (!is_dirty_spte(new_spte) || pfn_changed))
2712f2fad08SBen Gardon 		kvm_set_pfn_dirty(spte_to_pfn(old_spte));
2722f2fad08SBen Gardon 
2732f2fad08SBen Gardon 	/*
2742f2fad08SBen Gardon 	 * Recursively handle child PTs if the change removed a subtree from
2752f2fad08SBen Gardon 	 * the paging structure.
2762f2fad08SBen Gardon 	 */
2772f2fad08SBen Gardon 	if (was_present && !was_leaf && (pfn_changed || !is_present)) {
2782f2fad08SBen Gardon 		pt = spte_to_child_pt(old_spte, level);
27989c0fd49SBen Gardon 		sp = sptep_to_sp(pt);
28089c0fd49SBen Gardon 
28189c0fd49SBen Gardon 		list_del(&sp->link);
2822f2fad08SBen Gardon 
28329cf0f50SBen Gardon 		if (sp->lpage_disallowed)
28429cf0f50SBen Gardon 			unaccount_huge_nx_page(kvm, sp);
28529cf0f50SBen Gardon 
2862f2fad08SBen Gardon 		for (i = 0; i < PT64_ENT_PER_PAGE; i++) {
2872f2fad08SBen Gardon 			old_child_spte = READ_ONCE(*(pt + i));
2882f2fad08SBen Gardon 			WRITE_ONCE(*(pt + i), 0);
2892f2fad08SBen Gardon 			handle_changed_spte(kvm, as_id,
2902f2fad08SBen Gardon 				gfn + (i * KVM_PAGES_PER_HPAGE(level - 1)),
2912f2fad08SBen Gardon 				old_child_spte, 0, level - 1);
2922f2fad08SBen Gardon 		}
2932f2fad08SBen Gardon 
2942f2fad08SBen Gardon 		kvm_flush_remote_tlbs_with_address(kvm, gfn,
2952f2fad08SBen Gardon 						   KVM_PAGES_PER_HPAGE(level));
2962f2fad08SBen Gardon 
2972f2fad08SBen Gardon 		free_page((unsigned long)pt);
29889c0fd49SBen Gardon 		kmem_cache_free(mmu_page_header_cache, sp);
2992f2fad08SBen Gardon 	}
3002f2fad08SBen Gardon }
3012f2fad08SBen Gardon 
3022f2fad08SBen Gardon static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
3032f2fad08SBen Gardon 				u64 old_spte, u64 new_spte, int level)
3042f2fad08SBen Gardon {
3052f2fad08SBen Gardon 	__handle_changed_spte(kvm, as_id, gfn, old_spte, new_spte, level);
306f8e14497SBen Gardon 	handle_changed_spte_acc_track(old_spte, new_spte, level);
307a6a0b05dSBen Gardon 	handle_changed_spte_dirty_log(kvm, as_id, gfn, old_spte,
308a6a0b05dSBen Gardon 				      new_spte, level);
3092f2fad08SBen Gardon }
310faaf05b0SBen Gardon 
311f8e14497SBen Gardon static inline void __tdp_mmu_set_spte(struct kvm *kvm, struct tdp_iter *iter,
312a6a0b05dSBen Gardon 				      u64 new_spte, bool record_acc_track,
313a6a0b05dSBen Gardon 				      bool record_dirty_log)
314faaf05b0SBen Gardon {
315faaf05b0SBen Gardon 	u64 *root_pt = tdp_iter_root_pt(iter);
316faaf05b0SBen Gardon 	struct kvm_mmu_page *root = sptep_to_sp(root_pt);
317faaf05b0SBen Gardon 	int as_id = kvm_mmu_page_as_id(root);
318faaf05b0SBen Gardon 
319f8e14497SBen Gardon 	WRITE_ONCE(*iter->sptep, new_spte);
320faaf05b0SBen Gardon 
321f8e14497SBen Gardon 	__handle_changed_spte(kvm, as_id, iter->gfn, iter->old_spte, new_spte,
322faaf05b0SBen Gardon 			      iter->level);
323f8e14497SBen Gardon 	if (record_acc_track)
324f8e14497SBen Gardon 		handle_changed_spte_acc_track(iter->old_spte, new_spte,
325f8e14497SBen Gardon 					      iter->level);
326a6a0b05dSBen Gardon 	if (record_dirty_log)
327a6a0b05dSBen Gardon 		handle_changed_spte_dirty_log(kvm, as_id, iter->gfn,
328a6a0b05dSBen Gardon 					      iter->old_spte, new_spte,
329a6a0b05dSBen Gardon 					      iter->level);
330f8e14497SBen Gardon }
331f8e14497SBen Gardon 
332f8e14497SBen Gardon static inline void tdp_mmu_set_spte(struct kvm *kvm, struct tdp_iter *iter,
333f8e14497SBen Gardon 				    u64 new_spte)
334f8e14497SBen Gardon {
335a6a0b05dSBen Gardon 	__tdp_mmu_set_spte(kvm, iter, new_spte, true, true);
336f8e14497SBen Gardon }
337f8e14497SBen Gardon 
338f8e14497SBen Gardon static inline void tdp_mmu_set_spte_no_acc_track(struct kvm *kvm,
339f8e14497SBen Gardon 						 struct tdp_iter *iter,
340f8e14497SBen Gardon 						 u64 new_spte)
341f8e14497SBen Gardon {
342a6a0b05dSBen Gardon 	__tdp_mmu_set_spte(kvm, iter, new_spte, false, true);
343a6a0b05dSBen Gardon }
344a6a0b05dSBen Gardon 
345a6a0b05dSBen Gardon static inline void tdp_mmu_set_spte_no_dirty_log(struct kvm *kvm,
346a6a0b05dSBen Gardon 						 struct tdp_iter *iter,
347a6a0b05dSBen Gardon 						 u64 new_spte)
348a6a0b05dSBen Gardon {
349a6a0b05dSBen Gardon 	__tdp_mmu_set_spte(kvm, iter, new_spte, true, false);
350faaf05b0SBen Gardon }
351faaf05b0SBen Gardon 
352faaf05b0SBen Gardon #define tdp_root_for_each_pte(_iter, _root, _start, _end) \
353faaf05b0SBen Gardon 	for_each_tdp_pte(_iter, _root->spt, _root->role.level, _start, _end)
354faaf05b0SBen Gardon 
355f8e14497SBen Gardon #define tdp_root_for_each_leaf_pte(_iter, _root, _start, _end)	\
356f8e14497SBen Gardon 	tdp_root_for_each_pte(_iter, _root, _start, _end)		\
357f8e14497SBen Gardon 		if (!is_shadow_present_pte(_iter.old_spte) ||		\
358f8e14497SBen Gardon 		    !is_last_spte(_iter.old_spte, _iter.level))		\
359f8e14497SBen Gardon 			continue;					\
360f8e14497SBen Gardon 		else
361f8e14497SBen Gardon 
362bb18842eSBen Gardon #define tdp_mmu_for_each_pte(_iter, _mmu, _start, _end)		\
363bb18842eSBen Gardon 	for_each_tdp_pte(_iter, __va(_mmu->root_hpa),		\
364bb18842eSBen Gardon 			 _mmu->shadow_root_level, _start, _end)
365bb18842eSBen Gardon 
366faaf05b0SBen Gardon /*
367faaf05b0SBen Gardon  * Flush the TLB if the process should drop kvm->mmu_lock.
368faaf05b0SBen Gardon  * Return whether the caller still needs to flush the tlb.
369faaf05b0SBen Gardon  */
370faaf05b0SBen Gardon static bool tdp_mmu_iter_flush_cond_resched(struct kvm *kvm, struct tdp_iter *iter)
371faaf05b0SBen Gardon {
372faaf05b0SBen Gardon 	if (need_resched() || spin_needbreak(&kvm->mmu_lock)) {
373faaf05b0SBen Gardon 		kvm_flush_remote_tlbs(kvm);
374faaf05b0SBen Gardon 		cond_resched_lock(&kvm->mmu_lock);
375faaf05b0SBen Gardon 		tdp_iter_refresh_walk(iter);
376faaf05b0SBen Gardon 		return false;
377faaf05b0SBen Gardon 	} else {
378faaf05b0SBen Gardon 		return true;
379faaf05b0SBen Gardon 	}
380faaf05b0SBen Gardon }
381faaf05b0SBen Gardon 
382a6a0b05dSBen Gardon static void tdp_mmu_iter_cond_resched(struct kvm *kvm, struct tdp_iter *iter)
383a6a0b05dSBen Gardon {
384a6a0b05dSBen Gardon 	if (need_resched() || spin_needbreak(&kvm->mmu_lock)) {
385a6a0b05dSBen Gardon 		cond_resched_lock(&kvm->mmu_lock);
386a6a0b05dSBen Gardon 		tdp_iter_refresh_walk(iter);
387a6a0b05dSBen Gardon 	}
388a6a0b05dSBen Gardon }
389a6a0b05dSBen Gardon 
390faaf05b0SBen Gardon /*
391faaf05b0SBen Gardon  * Tears down the mappings for the range of gfns, [start, end), and frees the
392faaf05b0SBen Gardon  * non-root pages mapping GFNs strictly within that range. Returns true if
393faaf05b0SBen Gardon  * SPTEs have been cleared and a TLB flush is needed before releasing the
394faaf05b0SBen Gardon  * MMU lock.
395063afacdSBen Gardon  * If can_yield is true, will release the MMU lock and reschedule if the
396063afacdSBen Gardon  * scheduler needs the CPU or there is contention on the MMU lock. If this
397063afacdSBen Gardon  * function cannot yield, it will not release the MMU lock or reschedule and
398063afacdSBen Gardon  * the caller must ensure it does not supply too large a GFN range, or the
399063afacdSBen Gardon  * operation can cause a soft lockup.
400faaf05b0SBen Gardon  */
401faaf05b0SBen Gardon static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root,
402063afacdSBen Gardon 			  gfn_t start, gfn_t end, bool can_yield)
403faaf05b0SBen Gardon {
404faaf05b0SBen Gardon 	struct tdp_iter iter;
405faaf05b0SBen Gardon 	bool flush_needed = false;
406faaf05b0SBen Gardon 
407faaf05b0SBen Gardon 	tdp_root_for_each_pte(iter, root, start, end) {
408faaf05b0SBen Gardon 		if (!is_shadow_present_pte(iter.old_spte))
409faaf05b0SBen Gardon 			continue;
410faaf05b0SBen Gardon 
411faaf05b0SBen Gardon 		/*
412faaf05b0SBen Gardon 		 * If this is a non-last-level SPTE that covers a larger range
413faaf05b0SBen Gardon 		 * than should be zapped, continue, and zap the mappings at a
414faaf05b0SBen Gardon 		 * lower level.
415faaf05b0SBen Gardon 		 */
416faaf05b0SBen Gardon 		if ((iter.gfn < start ||
417faaf05b0SBen Gardon 		     iter.gfn + KVM_PAGES_PER_HPAGE(iter.level) > end) &&
418faaf05b0SBen Gardon 		    !is_last_spte(iter.old_spte, iter.level))
419faaf05b0SBen Gardon 			continue;
420faaf05b0SBen Gardon 
421faaf05b0SBen Gardon 		tdp_mmu_set_spte(kvm, &iter, 0);
422faaf05b0SBen Gardon 
423063afacdSBen Gardon 		if (can_yield)
424faaf05b0SBen Gardon 			flush_needed = tdp_mmu_iter_flush_cond_resched(kvm, &iter);
425063afacdSBen Gardon 		else
426063afacdSBen Gardon 			flush_needed = true;
427faaf05b0SBen Gardon 	}
428faaf05b0SBen Gardon 	return flush_needed;
429faaf05b0SBen Gardon }
430faaf05b0SBen Gardon 
431faaf05b0SBen Gardon /*
432faaf05b0SBen Gardon  * Tears down the mappings for the range of gfns, [start, end), and frees the
433faaf05b0SBen Gardon  * non-root pages mapping GFNs strictly within that range. Returns true if
434faaf05b0SBen Gardon  * SPTEs have been cleared and a TLB flush is needed before releasing the
435faaf05b0SBen Gardon  * MMU lock.
436faaf05b0SBen Gardon  */
437faaf05b0SBen Gardon bool kvm_tdp_mmu_zap_gfn_range(struct kvm *kvm, gfn_t start, gfn_t end)
438faaf05b0SBen Gardon {
439faaf05b0SBen Gardon 	struct kvm_mmu_page *root;
440faaf05b0SBen Gardon 	bool flush = false;
441faaf05b0SBen Gardon 
442faaf05b0SBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
443faaf05b0SBen Gardon 		/*
444faaf05b0SBen Gardon 		 * Take a reference on the root so that it cannot be freed if
445faaf05b0SBen Gardon 		 * this thread releases the MMU lock and yields in this loop.
446faaf05b0SBen Gardon 		 */
447faaf05b0SBen Gardon 		kvm_mmu_get_root(kvm, root);
448faaf05b0SBen Gardon 
449063afacdSBen Gardon 		flush |= zap_gfn_range(kvm, root, start, end, true);
450faaf05b0SBen Gardon 
451faaf05b0SBen Gardon 		kvm_mmu_put_root(kvm, root);
452faaf05b0SBen Gardon 	}
453faaf05b0SBen Gardon 
454faaf05b0SBen Gardon 	return flush;
455faaf05b0SBen Gardon }
456faaf05b0SBen Gardon 
457faaf05b0SBen Gardon void kvm_tdp_mmu_zap_all(struct kvm *kvm)
458faaf05b0SBen Gardon {
459339f5a7fSRick Edgecombe 	gfn_t max_gfn = 1ULL << (shadow_phys_bits - PAGE_SHIFT);
460faaf05b0SBen Gardon 	bool flush;
461faaf05b0SBen Gardon 
462faaf05b0SBen Gardon 	flush = kvm_tdp_mmu_zap_gfn_range(kvm, 0, max_gfn);
463faaf05b0SBen Gardon 	if (flush)
464faaf05b0SBen Gardon 		kvm_flush_remote_tlbs(kvm);
465faaf05b0SBen Gardon }
466bb18842eSBen Gardon 
467bb18842eSBen Gardon /*
468bb18842eSBen Gardon  * Installs a last-level SPTE to handle a TDP page fault.
469bb18842eSBen Gardon  * (NPT/EPT violation/misconfiguration)
470bb18842eSBen Gardon  */
471bb18842eSBen Gardon static int tdp_mmu_map_handle_target_level(struct kvm_vcpu *vcpu, int write,
472bb18842eSBen Gardon 					  int map_writable,
473bb18842eSBen Gardon 					  struct tdp_iter *iter,
474bb18842eSBen Gardon 					  kvm_pfn_t pfn, bool prefault)
475bb18842eSBen Gardon {
476bb18842eSBen Gardon 	u64 new_spte;
477bb18842eSBen Gardon 	int ret = 0;
478bb18842eSBen Gardon 	int make_spte_ret = 0;
479bb18842eSBen Gardon 
480bb18842eSBen Gardon 	if (unlikely(is_noslot_pfn(pfn))) {
481bb18842eSBen Gardon 		new_spte = make_mmio_spte(vcpu, iter->gfn, ACC_ALL);
482bb18842eSBen Gardon 		trace_mark_mmio_spte(iter->sptep, iter->gfn, new_spte);
483bb18842eSBen Gardon 	} else
484bb18842eSBen Gardon 		make_spte_ret = make_spte(vcpu, ACC_ALL, iter->level, iter->gfn,
485bb18842eSBen Gardon 					 pfn, iter->old_spte, prefault, true,
486bb18842eSBen Gardon 					 map_writable, !shadow_accessed_mask,
487bb18842eSBen Gardon 					 &new_spte);
488bb18842eSBen Gardon 
489bb18842eSBen Gardon 	if (new_spte == iter->old_spte)
490bb18842eSBen Gardon 		ret = RET_PF_SPURIOUS;
491bb18842eSBen Gardon 	else
492bb18842eSBen Gardon 		tdp_mmu_set_spte(vcpu->kvm, iter, new_spte);
493bb18842eSBen Gardon 
494bb18842eSBen Gardon 	/*
495bb18842eSBen Gardon 	 * If the page fault was caused by a write but the page is write
496bb18842eSBen Gardon 	 * protected, emulation is needed. If the emulation was skipped,
497bb18842eSBen Gardon 	 * the vCPU would have the same fault again.
498bb18842eSBen Gardon 	 */
499bb18842eSBen Gardon 	if (make_spte_ret & SET_SPTE_WRITE_PROTECTED_PT) {
500bb18842eSBen Gardon 		if (write)
501bb18842eSBen Gardon 			ret = RET_PF_EMULATE;
502bb18842eSBen Gardon 		kvm_make_request(KVM_REQ_TLB_FLUSH_CURRENT, vcpu);
503bb18842eSBen Gardon 	}
504bb18842eSBen Gardon 
505bb18842eSBen Gardon 	/* If a MMIO SPTE is installed, the MMIO will need to be emulated. */
506bb18842eSBen Gardon 	if (unlikely(is_mmio_spte(new_spte)))
507bb18842eSBen Gardon 		ret = RET_PF_EMULATE;
508bb18842eSBen Gardon 
509bb18842eSBen Gardon 	trace_kvm_mmu_set_spte(iter->level, iter->gfn, iter->sptep);
510bb18842eSBen Gardon 	if (!prefault)
511bb18842eSBen Gardon 		vcpu->stat.pf_fixed++;
512bb18842eSBen Gardon 
513bb18842eSBen Gardon 	return ret;
514bb18842eSBen Gardon }
515bb18842eSBen Gardon 
516bb18842eSBen Gardon /*
517bb18842eSBen Gardon  * Handle a TDP page fault (NPT/EPT violation/misconfiguration) by installing
518bb18842eSBen Gardon  * page tables and SPTEs to translate the faulting guest physical address.
519bb18842eSBen Gardon  */
520bb18842eSBen Gardon int kvm_tdp_mmu_map(struct kvm_vcpu *vcpu, gpa_t gpa, u32 error_code,
521bb18842eSBen Gardon 		    int map_writable, int max_level, kvm_pfn_t pfn,
522bb18842eSBen Gardon 		    bool prefault)
523bb18842eSBen Gardon {
524bb18842eSBen Gardon 	bool nx_huge_page_workaround_enabled = is_nx_huge_page_enabled();
525bb18842eSBen Gardon 	bool write = error_code & PFERR_WRITE_MASK;
526bb18842eSBen Gardon 	bool exec = error_code & PFERR_FETCH_MASK;
527bb18842eSBen Gardon 	bool huge_page_disallowed = exec && nx_huge_page_workaround_enabled;
528bb18842eSBen Gardon 	struct kvm_mmu *mmu = vcpu->arch.mmu;
529bb18842eSBen Gardon 	struct tdp_iter iter;
53089c0fd49SBen Gardon 	struct kvm_mmu_page *sp;
531bb18842eSBen Gardon 	u64 *child_pt;
532bb18842eSBen Gardon 	u64 new_spte;
533bb18842eSBen Gardon 	int ret;
534bb18842eSBen Gardon 	gfn_t gfn = gpa >> PAGE_SHIFT;
535bb18842eSBen Gardon 	int level;
536bb18842eSBen Gardon 	int req_level;
537bb18842eSBen Gardon 
538bb18842eSBen Gardon 	if (WARN_ON(!VALID_PAGE(vcpu->arch.mmu->root_hpa)))
539bb18842eSBen Gardon 		return RET_PF_RETRY;
540bb18842eSBen Gardon 	if (WARN_ON(!is_tdp_mmu_root(vcpu->kvm, vcpu->arch.mmu->root_hpa)))
541bb18842eSBen Gardon 		return RET_PF_RETRY;
542bb18842eSBen Gardon 
543bb18842eSBen Gardon 	level = kvm_mmu_hugepage_adjust(vcpu, gfn, max_level, &pfn,
544bb18842eSBen Gardon 					huge_page_disallowed, &req_level);
545bb18842eSBen Gardon 
546bb18842eSBen Gardon 	trace_kvm_mmu_spte_requested(gpa, level, pfn);
547bb18842eSBen Gardon 	tdp_mmu_for_each_pte(iter, mmu, gfn, gfn + 1) {
548bb18842eSBen Gardon 		if (nx_huge_page_workaround_enabled)
549bb18842eSBen Gardon 			disallowed_hugepage_adjust(iter.old_spte, gfn,
550bb18842eSBen Gardon 						   iter.level, &pfn, &level);
551bb18842eSBen Gardon 
552bb18842eSBen Gardon 		if (iter.level == level)
553bb18842eSBen Gardon 			break;
554bb18842eSBen Gardon 
555bb18842eSBen Gardon 		/*
556bb18842eSBen Gardon 		 * If there is an SPTE mapping a large page at a higher level
557bb18842eSBen Gardon 		 * than the target, that SPTE must be cleared and replaced
558bb18842eSBen Gardon 		 * with a non-leaf SPTE.
559bb18842eSBen Gardon 		 */
560bb18842eSBen Gardon 		if (is_shadow_present_pte(iter.old_spte) &&
561bb18842eSBen Gardon 		    is_large_pte(iter.old_spte)) {
562bb18842eSBen Gardon 			tdp_mmu_set_spte(vcpu->kvm, &iter, 0);
563bb18842eSBen Gardon 
564bb18842eSBen Gardon 			kvm_flush_remote_tlbs_with_address(vcpu->kvm, iter.gfn,
565bb18842eSBen Gardon 					KVM_PAGES_PER_HPAGE(iter.level));
566bb18842eSBen Gardon 
567bb18842eSBen Gardon 			/*
568bb18842eSBen Gardon 			 * The iter must explicitly re-read the spte here
569bb18842eSBen Gardon 			 * because the new value informs the !present
570bb18842eSBen Gardon 			 * path below.
571bb18842eSBen Gardon 			 */
572bb18842eSBen Gardon 			iter.old_spte = READ_ONCE(*iter.sptep);
573bb18842eSBen Gardon 		}
574bb18842eSBen Gardon 
575bb18842eSBen Gardon 		if (!is_shadow_present_pte(iter.old_spte)) {
57689c0fd49SBen Gardon 			sp = alloc_tdp_mmu_page(vcpu, iter.gfn, iter.level);
57789c0fd49SBen Gardon 			list_add(&sp->link, &vcpu->kvm->arch.tdp_mmu_pages);
57889c0fd49SBen Gardon 			child_pt = sp->spt;
579bb18842eSBen Gardon 			clear_page(child_pt);
580bb18842eSBen Gardon 			new_spte = make_nonleaf_spte(child_pt,
581bb18842eSBen Gardon 						     !shadow_accessed_mask);
582bb18842eSBen Gardon 
583bb18842eSBen Gardon 			trace_kvm_mmu_get_page(sp, true);
58429cf0f50SBen Gardon 			if (huge_page_disallowed && req_level >= iter.level)
58529cf0f50SBen Gardon 				account_huge_nx_page(vcpu->kvm, sp);
58629cf0f50SBen Gardon 
587bb18842eSBen Gardon 			tdp_mmu_set_spte(vcpu->kvm, &iter, new_spte);
588bb18842eSBen Gardon 		}
589bb18842eSBen Gardon 	}
590bb18842eSBen Gardon 
591bb18842eSBen Gardon 	if (WARN_ON(iter.level != level))
592bb18842eSBen Gardon 		return RET_PF_RETRY;
593bb18842eSBen Gardon 
594bb18842eSBen Gardon 	ret = tdp_mmu_map_handle_target_level(vcpu, write, map_writable, &iter,
595bb18842eSBen Gardon 					      pfn, prefault);
596bb18842eSBen Gardon 
597bb18842eSBen Gardon 	return ret;
598bb18842eSBen Gardon }
599063afacdSBen Gardon 
600063afacdSBen Gardon static int kvm_tdp_mmu_handle_hva_range(struct kvm *kvm, unsigned long start,
601063afacdSBen Gardon 		unsigned long end, unsigned long data,
602063afacdSBen Gardon 		int (*handler)(struct kvm *kvm, struct kvm_memory_slot *slot,
603063afacdSBen Gardon 			       struct kvm_mmu_page *root, gfn_t start,
604063afacdSBen Gardon 			       gfn_t end, unsigned long data))
605063afacdSBen Gardon {
606063afacdSBen Gardon 	struct kvm_memslots *slots;
607063afacdSBen Gardon 	struct kvm_memory_slot *memslot;
608063afacdSBen Gardon 	struct kvm_mmu_page *root;
609063afacdSBen Gardon 	int ret = 0;
610063afacdSBen Gardon 	int as_id;
611063afacdSBen Gardon 
612063afacdSBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
613063afacdSBen Gardon 		/*
614063afacdSBen Gardon 		 * Take a reference on the root so that it cannot be freed if
615063afacdSBen Gardon 		 * this thread releases the MMU lock and yields in this loop.
616063afacdSBen Gardon 		 */
617063afacdSBen Gardon 		kvm_mmu_get_root(kvm, root);
618063afacdSBen Gardon 
619063afacdSBen Gardon 		as_id = kvm_mmu_page_as_id(root);
620063afacdSBen Gardon 		slots = __kvm_memslots(kvm, as_id);
621063afacdSBen Gardon 		kvm_for_each_memslot(memslot, slots) {
622063afacdSBen Gardon 			unsigned long hva_start, hva_end;
623063afacdSBen Gardon 			gfn_t gfn_start, gfn_end;
624063afacdSBen Gardon 
625063afacdSBen Gardon 			hva_start = max(start, memslot->userspace_addr);
626063afacdSBen Gardon 			hva_end = min(end, memslot->userspace_addr +
627063afacdSBen Gardon 				      (memslot->npages << PAGE_SHIFT));
628063afacdSBen Gardon 			if (hva_start >= hva_end)
629063afacdSBen Gardon 				continue;
630063afacdSBen Gardon 			/*
631063afacdSBen Gardon 			 * {gfn(page) | page intersects with [hva_start, hva_end)} =
632063afacdSBen Gardon 			 * {gfn_start, gfn_start+1, ..., gfn_end-1}.
633063afacdSBen Gardon 			 */
634063afacdSBen Gardon 			gfn_start = hva_to_gfn_memslot(hva_start, memslot);
635063afacdSBen Gardon 			gfn_end = hva_to_gfn_memslot(hva_end + PAGE_SIZE - 1, memslot);
636063afacdSBen Gardon 
637063afacdSBen Gardon 			ret |= handler(kvm, memslot, root, gfn_start,
638063afacdSBen Gardon 				       gfn_end, data);
639063afacdSBen Gardon 		}
640063afacdSBen Gardon 
641063afacdSBen Gardon 		kvm_mmu_put_root(kvm, root);
642063afacdSBen Gardon 	}
643063afacdSBen Gardon 
644063afacdSBen Gardon 	return ret;
645063afacdSBen Gardon }
646063afacdSBen Gardon 
647063afacdSBen Gardon static int zap_gfn_range_hva_wrapper(struct kvm *kvm,
648063afacdSBen Gardon 				     struct kvm_memory_slot *slot,
649063afacdSBen Gardon 				     struct kvm_mmu_page *root, gfn_t start,
650063afacdSBen Gardon 				     gfn_t end, unsigned long unused)
651063afacdSBen Gardon {
652063afacdSBen Gardon 	return zap_gfn_range(kvm, root, start, end, false);
653063afacdSBen Gardon }
654063afacdSBen Gardon 
655063afacdSBen Gardon int kvm_tdp_mmu_zap_hva_range(struct kvm *kvm, unsigned long start,
656063afacdSBen Gardon 			      unsigned long end)
657063afacdSBen Gardon {
658063afacdSBen Gardon 	return kvm_tdp_mmu_handle_hva_range(kvm, start, end, 0,
659063afacdSBen Gardon 					    zap_gfn_range_hva_wrapper);
660063afacdSBen Gardon }
661f8e14497SBen Gardon 
662f8e14497SBen Gardon /*
663f8e14497SBen Gardon  * Mark the SPTEs range of GFNs [start, end) unaccessed and return non-zero
664f8e14497SBen Gardon  * if any of the GFNs in the range have been accessed.
665f8e14497SBen Gardon  */
666f8e14497SBen Gardon static int age_gfn_range(struct kvm *kvm, struct kvm_memory_slot *slot,
667f8e14497SBen Gardon 			 struct kvm_mmu_page *root, gfn_t start, gfn_t end,
668f8e14497SBen Gardon 			 unsigned long unused)
669f8e14497SBen Gardon {
670f8e14497SBen Gardon 	struct tdp_iter iter;
671f8e14497SBen Gardon 	int young = 0;
672f8e14497SBen Gardon 	u64 new_spte = 0;
673f8e14497SBen Gardon 
674f8e14497SBen Gardon 	tdp_root_for_each_leaf_pte(iter, root, start, end) {
675f8e14497SBen Gardon 		/*
676f8e14497SBen Gardon 		 * If we have a non-accessed entry we don't need to change the
677f8e14497SBen Gardon 		 * pte.
678f8e14497SBen Gardon 		 */
679f8e14497SBen Gardon 		if (!is_accessed_spte(iter.old_spte))
680f8e14497SBen Gardon 			continue;
681f8e14497SBen Gardon 
682f8e14497SBen Gardon 		new_spte = iter.old_spte;
683f8e14497SBen Gardon 
684f8e14497SBen Gardon 		if (spte_ad_enabled(new_spte)) {
685f8e14497SBen Gardon 			clear_bit((ffs(shadow_accessed_mask) - 1),
686f8e14497SBen Gardon 				  (unsigned long *)&new_spte);
687f8e14497SBen Gardon 		} else {
688f8e14497SBen Gardon 			/*
689f8e14497SBen Gardon 			 * Capture the dirty status of the page, so that it doesn't get
690f8e14497SBen Gardon 			 * lost when the SPTE is marked for access tracking.
691f8e14497SBen Gardon 			 */
692f8e14497SBen Gardon 			if (is_writable_pte(new_spte))
693f8e14497SBen Gardon 				kvm_set_pfn_dirty(spte_to_pfn(new_spte));
694f8e14497SBen Gardon 
695f8e14497SBen Gardon 			new_spte = mark_spte_for_access_track(new_spte);
696f8e14497SBen Gardon 		}
697a6a0b05dSBen Gardon 		new_spte &= ~shadow_dirty_mask;
698f8e14497SBen Gardon 
699f8e14497SBen Gardon 		tdp_mmu_set_spte_no_acc_track(kvm, &iter, new_spte);
700f8e14497SBen Gardon 		young = 1;
701f8e14497SBen Gardon 	}
702f8e14497SBen Gardon 
703f8e14497SBen Gardon 	return young;
704f8e14497SBen Gardon }
705f8e14497SBen Gardon 
706f8e14497SBen Gardon int kvm_tdp_mmu_age_hva_range(struct kvm *kvm, unsigned long start,
707f8e14497SBen Gardon 			      unsigned long end)
708f8e14497SBen Gardon {
709f8e14497SBen Gardon 	return kvm_tdp_mmu_handle_hva_range(kvm, start, end, 0,
710f8e14497SBen Gardon 					    age_gfn_range);
711f8e14497SBen Gardon }
712f8e14497SBen Gardon 
713f8e14497SBen Gardon static int test_age_gfn(struct kvm *kvm, struct kvm_memory_slot *slot,
714f8e14497SBen Gardon 			struct kvm_mmu_page *root, gfn_t gfn, gfn_t unused,
715f8e14497SBen Gardon 			unsigned long unused2)
716f8e14497SBen Gardon {
717f8e14497SBen Gardon 	struct tdp_iter iter;
718f8e14497SBen Gardon 
719f8e14497SBen Gardon 	tdp_root_for_each_leaf_pte(iter, root, gfn, gfn + 1)
720f8e14497SBen Gardon 		if (is_accessed_spte(iter.old_spte))
721f8e14497SBen Gardon 			return 1;
722f8e14497SBen Gardon 
723f8e14497SBen Gardon 	return 0;
724f8e14497SBen Gardon }
725f8e14497SBen Gardon 
726f8e14497SBen Gardon int kvm_tdp_mmu_test_age_hva(struct kvm *kvm, unsigned long hva)
727f8e14497SBen Gardon {
728f8e14497SBen Gardon 	return kvm_tdp_mmu_handle_hva_range(kvm, hva, hva + 1, 0,
729f8e14497SBen Gardon 					    test_age_gfn);
730f8e14497SBen Gardon }
7311d8dd6b3SBen Gardon 
7321d8dd6b3SBen Gardon /*
7331d8dd6b3SBen Gardon  * Handle the changed_pte MMU notifier for the TDP MMU.
7341d8dd6b3SBen Gardon  * data is a pointer to the new pte_t mapping the HVA specified by the MMU
7351d8dd6b3SBen Gardon  * notifier.
7361d8dd6b3SBen Gardon  * Returns non-zero if a flush is needed before releasing the MMU lock.
7371d8dd6b3SBen Gardon  */
7381d8dd6b3SBen Gardon static int set_tdp_spte(struct kvm *kvm, struct kvm_memory_slot *slot,
7391d8dd6b3SBen Gardon 			struct kvm_mmu_page *root, gfn_t gfn, gfn_t unused,
7401d8dd6b3SBen Gardon 			unsigned long data)
7411d8dd6b3SBen Gardon {
7421d8dd6b3SBen Gardon 	struct tdp_iter iter;
7431d8dd6b3SBen Gardon 	pte_t *ptep = (pte_t *)data;
7441d8dd6b3SBen Gardon 	kvm_pfn_t new_pfn;
7451d8dd6b3SBen Gardon 	u64 new_spte;
7461d8dd6b3SBen Gardon 	int need_flush = 0;
7471d8dd6b3SBen Gardon 
7481d8dd6b3SBen Gardon 	WARN_ON(pte_huge(*ptep));
7491d8dd6b3SBen Gardon 
7501d8dd6b3SBen Gardon 	new_pfn = pte_pfn(*ptep);
7511d8dd6b3SBen Gardon 
7521d8dd6b3SBen Gardon 	tdp_root_for_each_pte(iter, root, gfn, gfn + 1) {
7531d8dd6b3SBen Gardon 		if (iter.level != PG_LEVEL_4K)
7541d8dd6b3SBen Gardon 			continue;
7551d8dd6b3SBen Gardon 
7561d8dd6b3SBen Gardon 		if (!is_shadow_present_pte(iter.old_spte))
7571d8dd6b3SBen Gardon 			break;
7581d8dd6b3SBen Gardon 
7591d8dd6b3SBen Gardon 		tdp_mmu_set_spte(kvm, &iter, 0);
7601d8dd6b3SBen Gardon 
7611d8dd6b3SBen Gardon 		kvm_flush_remote_tlbs_with_address(kvm, iter.gfn, 1);
7621d8dd6b3SBen Gardon 
7631d8dd6b3SBen Gardon 		if (!pte_write(*ptep)) {
7641d8dd6b3SBen Gardon 			new_spte = kvm_mmu_changed_pte_notifier_make_spte(
7651d8dd6b3SBen Gardon 					iter.old_spte, new_pfn);
7661d8dd6b3SBen Gardon 
7671d8dd6b3SBen Gardon 			tdp_mmu_set_spte(kvm, &iter, new_spte);
7681d8dd6b3SBen Gardon 		}
7691d8dd6b3SBen Gardon 
7701d8dd6b3SBen Gardon 		need_flush = 1;
7711d8dd6b3SBen Gardon 	}
7721d8dd6b3SBen Gardon 
7731d8dd6b3SBen Gardon 	if (need_flush)
7741d8dd6b3SBen Gardon 		kvm_flush_remote_tlbs_with_address(kvm, gfn, 1);
7751d8dd6b3SBen Gardon 
7761d8dd6b3SBen Gardon 	return 0;
7771d8dd6b3SBen Gardon }
7781d8dd6b3SBen Gardon 
7791d8dd6b3SBen Gardon int kvm_tdp_mmu_set_spte_hva(struct kvm *kvm, unsigned long address,
7801d8dd6b3SBen Gardon 			     pte_t *host_ptep)
7811d8dd6b3SBen Gardon {
7821d8dd6b3SBen Gardon 	return kvm_tdp_mmu_handle_hva_range(kvm, address, address + 1,
7831d8dd6b3SBen Gardon 					    (unsigned long)host_ptep,
7841d8dd6b3SBen Gardon 					    set_tdp_spte);
7851d8dd6b3SBen Gardon }
7861d8dd6b3SBen Gardon 
787a6a0b05dSBen Gardon /*
788a6a0b05dSBen Gardon  * Remove write access from all the SPTEs mapping GFNs [start, end). If
789a6a0b05dSBen Gardon  * skip_4k is set, SPTEs that map 4k pages, will not be write-protected.
790a6a0b05dSBen Gardon  * Returns true if an SPTE has been changed and the TLBs need to be flushed.
791a6a0b05dSBen Gardon  */
792a6a0b05dSBen Gardon static bool wrprot_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root,
793a6a0b05dSBen Gardon 			     gfn_t start, gfn_t end, int min_level)
794a6a0b05dSBen Gardon {
795a6a0b05dSBen Gardon 	struct tdp_iter iter;
796a6a0b05dSBen Gardon 	u64 new_spte;
797a6a0b05dSBen Gardon 	bool spte_set = false;
798a6a0b05dSBen Gardon 
799a6a0b05dSBen Gardon 	BUG_ON(min_level > KVM_MAX_HUGEPAGE_LEVEL);
800a6a0b05dSBen Gardon 
801a6a0b05dSBen Gardon 	for_each_tdp_pte_min_level(iter, root->spt, root->role.level,
802a6a0b05dSBen Gardon 				   min_level, start, end) {
803a6a0b05dSBen Gardon 		if (!is_shadow_present_pte(iter.old_spte) ||
804a6a0b05dSBen Gardon 		    !is_last_spte(iter.old_spte, iter.level))
805a6a0b05dSBen Gardon 			continue;
806a6a0b05dSBen Gardon 
807a6a0b05dSBen Gardon 		new_spte = iter.old_spte & ~PT_WRITABLE_MASK;
808a6a0b05dSBen Gardon 
809a6a0b05dSBen Gardon 		tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte);
810a6a0b05dSBen Gardon 		spte_set = true;
811a6a0b05dSBen Gardon 
812a6a0b05dSBen Gardon 		tdp_mmu_iter_cond_resched(kvm, &iter);
813a6a0b05dSBen Gardon 	}
814a6a0b05dSBen Gardon 	return spte_set;
815a6a0b05dSBen Gardon }
816a6a0b05dSBen Gardon 
817a6a0b05dSBen Gardon /*
818a6a0b05dSBen Gardon  * Remove write access from all the SPTEs mapping GFNs in the memslot. Will
819a6a0b05dSBen Gardon  * only affect leaf SPTEs down to min_level.
820a6a0b05dSBen Gardon  * Returns true if an SPTE has been changed and the TLBs need to be flushed.
821a6a0b05dSBen Gardon  */
822a6a0b05dSBen Gardon bool kvm_tdp_mmu_wrprot_slot(struct kvm *kvm, struct kvm_memory_slot *slot,
823a6a0b05dSBen Gardon 			     int min_level)
824a6a0b05dSBen Gardon {
825a6a0b05dSBen Gardon 	struct kvm_mmu_page *root;
826a6a0b05dSBen Gardon 	int root_as_id;
827a6a0b05dSBen Gardon 	bool spte_set = false;
828a6a0b05dSBen Gardon 
829a6a0b05dSBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
830a6a0b05dSBen Gardon 		root_as_id = kvm_mmu_page_as_id(root);
831a6a0b05dSBen Gardon 		if (root_as_id != slot->as_id)
832a6a0b05dSBen Gardon 			continue;
833a6a0b05dSBen Gardon 
834a6a0b05dSBen Gardon 		/*
835a6a0b05dSBen Gardon 		 * Take a reference on the root so that it cannot be freed if
836a6a0b05dSBen Gardon 		 * this thread releases the MMU lock and yields in this loop.
837a6a0b05dSBen Gardon 		 */
838a6a0b05dSBen Gardon 		kvm_mmu_get_root(kvm, root);
839a6a0b05dSBen Gardon 
840a6a0b05dSBen Gardon 		spte_set |= wrprot_gfn_range(kvm, root, slot->base_gfn,
841a6a0b05dSBen Gardon 			     slot->base_gfn + slot->npages, min_level);
842a6a0b05dSBen Gardon 
843a6a0b05dSBen Gardon 		kvm_mmu_put_root(kvm, root);
844a6a0b05dSBen Gardon 	}
845a6a0b05dSBen Gardon 
846a6a0b05dSBen Gardon 	return spte_set;
847a6a0b05dSBen Gardon }
848a6a0b05dSBen Gardon 
849a6a0b05dSBen Gardon /*
850a6a0b05dSBen Gardon  * Clear the dirty status of all the SPTEs mapping GFNs in the memslot. If
851a6a0b05dSBen Gardon  * AD bits are enabled, this will involve clearing the dirty bit on each SPTE.
852a6a0b05dSBen Gardon  * If AD bits are not enabled, this will require clearing the writable bit on
853a6a0b05dSBen Gardon  * each SPTE. Returns true if an SPTE has been changed and the TLBs need to
854a6a0b05dSBen Gardon  * be flushed.
855a6a0b05dSBen Gardon  */
856a6a0b05dSBen Gardon static bool clear_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root,
857a6a0b05dSBen Gardon 			   gfn_t start, gfn_t end)
858a6a0b05dSBen Gardon {
859a6a0b05dSBen Gardon 	struct tdp_iter iter;
860a6a0b05dSBen Gardon 	u64 new_spte;
861a6a0b05dSBen Gardon 	bool spte_set = false;
862a6a0b05dSBen Gardon 
863a6a0b05dSBen Gardon 	tdp_root_for_each_leaf_pte(iter, root, start, end) {
864a6a0b05dSBen Gardon 		if (spte_ad_need_write_protect(iter.old_spte)) {
865a6a0b05dSBen Gardon 			if (is_writable_pte(iter.old_spte))
866a6a0b05dSBen Gardon 				new_spte = iter.old_spte & ~PT_WRITABLE_MASK;
867a6a0b05dSBen Gardon 			else
868a6a0b05dSBen Gardon 				continue;
869a6a0b05dSBen Gardon 		} else {
870a6a0b05dSBen Gardon 			if (iter.old_spte & shadow_dirty_mask)
871a6a0b05dSBen Gardon 				new_spte = iter.old_spte & ~shadow_dirty_mask;
872a6a0b05dSBen Gardon 			else
873a6a0b05dSBen Gardon 				continue;
874a6a0b05dSBen Gardon 		}
875a6a0b05dSBen Gardon 
876a6a0b05dSBen Gardon 		tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte);
877a6a0b05dSBen Gardon 		spte_set = true;
878a6a0b05dSBen Gardon 
879a6a0b05dSBen Gardon 		tdp_mmu_iter_cond_resched(kvm, &iter);
880a6a0b05dSBen Gardon 	}
881a6a0b05dSBen Gardon 	return spte_set;
882a6a0b05dSBen Gardon }
883a6a0b05dSBen Gardon 
884a6a0b05dSBen Gardon /*
885a6a0b05dSBen Gardon  * Clear the dirty status of all the SPTEs mapping GFNs in the memslot. If
886a6a0b05dSBen Gardon  * AD bits are enabled, this will involve clearing the dirty bit on each SPTE.
887a6a0b05dSBen Gardon  * If AD bits are not enabled, this will require clearing the writable bit on
888a6a0b05dSBen Gardon  * each SPTE. Returns true if an SPTE has been changed and the TLBs need to
889a6a0b05dSBen Gardon  * be flushed.
890a6a0b05dSBen Gardon  */
891a6a0b05dSBen Gardon bool kvm_tdp_mmu_clear_dirty_slot(struct kvm *kvm, struct kvm_memory_slot *slot)
892a6a0b05dSBen Gardon {
893a6a0b05dSBen Gardon 	struct kvm_mmu_page *root;
894a6a0b05dSBen Gardon 	int root_as_id;
895a6a0b05dSBen Gardon 	bool spte_set = false;
896a6a0b05dSBen Gardon 
897a6a0b05dSBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
898a6a0b05dSBen Gardon 		root_as_id = kvm_mmu_page_as_id(root);
899a6a0b05dSBen Gardon 		if (root_as_id != slot->as_id)
900a6a0b05dSBen Gardon 			continue;
901a6a0b05dSBen Gardon 
902a6a0b05dSBen Gardon 		/*
903a6a0b05dSBen Gardon 		 * Take a reference on the root so that it cannot be freed if
904a6a0b05dSBen Gardon 		 * this thread releases the MMU lock and yields in this loop.
905a6a0b05dSBen Gardon 		 */
906a6a0b05dSBen Gardon 		kvm_mmu_get_root(kvm, root);
907a6a0b05dSBen Gardon 
908a6a0b05dSBen Gardon 		spte_set |= clear_dirty_gfn_range(kvm, root, slot->base_gfn,
909a6a0b05dSBen Gardon 				slot->base_gfn + slot->npages);
910a6a0b05dSBen Gardon 
911a6a0b05dSBen Gardon 		kvm_mmu_put_root(kvm, root);
912a6a0b05dSBen Gardon 	}
913a6a0b05dSBen Gardon 
914a6a0b05dSBen Gardon 	return spte_set;
915a6a0b05dSBen Gardon }
916a6a0b05dSBen Gardon 
917a6a0b05dSBen Gardon /*
918a6a0b05dSBen Gardon  * Clears the dirty status of all the 4k SPTEs mapping GFNs for which a bit is
919a6a0b05dSBen Gardon  * set in mask, starting at gfn. The given memslot is expected to contain all
920a6a0b05dSBen Gardon  * the GFNs represented by set bits in the mask. If AD bits are enabled,
921a6a0b05dSBen Gardon  * clearing the dirty status will involve clearing the dirty bit on each SPTE
922a6a0b05dSBen Gardon  * or, if AD bits are not enabled, clearing the writable bit on each SPTE.
923a6a0b05dSBen Gardon  */
924a6a0b05dSBen Gardon static void clear_dirty_pt_masked(struct kvm *kvm, struct kvm_mmu_page *root,
925a6a0b05dSBen Gardon 				  gfn_t gfn, unsigned long mask, bool wrprot)
926a6a0b05dSBen Gardon {
927a6a0b05dSBen Gardon 	struct tdp_iter iter;
928a6a0b05dSBen Gardon 	u64 new_spte;
929a6a0b05dSBen Gardon 
930a6a0b05dSBen Gardon 	tdp_root_for_each_leaf_pte(iter, root, gfn + __ffs(mask),
931a6a0b05dSBen Gardon 				    gfn + BITS_PER_LONG) {
932a6a0b05dSBen Gardon 		if (!mask)
933a6a0b05dSBen Gardon 			break;
934a6a0b05dSBen Gardon 
935a6a0b05dSBen Gardon 		if (iter.level > PG_LEVEL_4K ||
936a6a0b05dSBen Gardon 		    !(mask & (1UL << (iter.gfn - gfn))))
937a6a0b05dSBen Gardon 			continue;
938a6a0b05dSBen Gardon 
939a6a0b05dSBen Gardon 		if (wrprot || spte_ad_need_write_protect(iter.old_spte)) {
940a6a0b05dSBen Gardon 			if (is_writable_pte(iter.old_spte))
941a6a0b05dSBen Gardon 				new_spte = iter.old_spte & ~PT_WRITABLE_MASK;
942a6a0b05dSBen Gardon 			else
943a6a0b05dSBen Gardon 				continue;
944a6a0b05dSBen Gardon 		} else {
945a6a0b05dSBen Gardon 			if (iter.old_spte & shadow_dirty_mask)
946a6a0b05dSBen Gardon 				new_spte = iter.old_spte & ~shadow_dirty_mask;
947a6a0b05dSBen Gardon 			else
948a6a0b05dSBen Gardon 				continue;
949a6a0b05dSBen Gardon 		}
950a6a0b05dSBen Gardon 
951a6a0b05dSBen Gardon 		tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte);
952a6a0b05dSBen Gardon 
953a6a0b05dSBen Gardon 		mask &= ~(1UL << (iter.gfn - gfn));
954a6a0b05dSBen Gardon 	}
955a6a0b05dSBen Gardon }
956a6a0b05dSBen Gardon 
957a6a0b05dSBen Gardon /*
958a6a0b05dSBen Gardon  * Clears the dirty status of all the 4k SPTEs mapping GFNs for which a bit is
959a6a0b05dSBen Gardon  * set in mask, starting at gfn. The given memslot is expected to contain all
960a6a0b05dSBen Gardon  * the GFNs represented by set bits in the mask. If AD bits are enabled,
961a6a0b05dSBen Gardon  * clearing the dirty status will involve clearing the dirty bit on each SPTE
962a6a0b05dSBen Gardon  * or, if AD bits are not enabled, clearing the writable bit on each SPTE.
963a6a0b05dSBen Gardon  */
964a6a0b05dSBen Gardon void kvm_tdp_mmu_clear_dirty_pt_masked(struct kvm *kvm,
965a6a0b05dSBen Gardon 				       struct kvm_memory_slot *slot,
966a6a0b05dSBen Gardon 				       gfn_t gfn, unsigned long mask,
967a6a0b05dSBen Gardon 				       bool wrprot)
968a6a0b05dSBen Gardon {
969a6a0b05dSBen Gardon 	struct kvm_mmu_page *root;
970a6a0b05dSBen Gardon 	int root_as_id;
971a6a0b05dSBen Gardon 
972a6a0b05dSBen Gardon 	lockdep_assert_held(&kvm->mmu_lock);
973a6a0b05dSBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
974a6a0b05dSBen Gardon 		root_as_id = kvm_mmu_page_as_id(root);
975a6a0b05dSBen Gardon 		if (root_as_id != slot->as_id)
976a6a0b05dSBen Gardon 			continue;
977a6a0b05dSBen Gardon 
978a6a0b05dSBen Gardon 		clear_dirty_pt_masked(kvm, root, gfn, mask, wrprot);
979a6a0b05dSBen Gardon 	}
980a6a0b05dSBen Gardon }
981a6a0b05dSBen Gardon 
982a6a0b05dSBen Gardon /*
983a6a0b05dSBen Gardon  * Set the dirty status of all the SPTEs mapping GFNs in the memslot. This is
984a6a0b05dSBen Gardon  * only used for PML, and so will involve setting the dirty bit on each SPTE.
985a6a0b05dSBen Gardon  * Returns true if an SPTE has been changed and the TLBs need to be flushed.
986a6a0b05dSBen Gardon  */
987a6a0b05dSBen Gardon static bool set_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root,
988a6a0b05dSBen Gardon 				gfn_t start, gfn_t end)
989a6a0b05dSBen Gardon {
990a6a0b05dSBen Gardon 	struct tdp_iter iter;
991a6a0b05dSBen Gardon 	u64 new_spte;
992a6a0b05dSBen Gardon 	bool spte_set = false;
993a6a0b05dSBen Gardon 
994a6a0b05dSBen Gardon 	tdp_root_for_each_pte(iter, root, start, end) {
995a6a0b05dSBen Gardon 		if (!is_shadow_present_pte(iter.old_spte))
996a6a0b05dSBen Gardon 			continue;
997a6a0b05dSBen Gardon 
998a6a0b05dSBen Gardon 		new_spte = iter.old_spte | shadow_dirty_mask;
999a6a0b05dSBen Gardon 
1000a6a0b05dSBen Gardon 		tdp_mmu_set_spte(kvm, &iter, new_spte);
1001a6a0b05dSBen Gardon 		spte_set = true;
1002a6a0b05dSBen Gardon 
1003a6a0b05dSBen Gardon 		tdp_mmu_iter_cond_resched(kvm, &iter);
1004a6a0b05dSBen Gardon 	}
1005a6a0b05dSBen Gardon 
1006a6a0b05dSBen Gardon 	return spte_set;
1007a6a0b05dSBen Gardon }
1008a6a0b05dSBen Gardon 
1009a6a0b05dSBen Gardon /*
1010a6a0b05dSBen Gardon  * Set the dirty status of all the SPTEs mapping GFNs in the memslot. This is
1011a6a0b05dSBen Gardon  * only used for PML, and so will involve setting the dirty bit on each SPTE.
1012a6a0b05dSBen Gardon  * Returns true if an SPTE has been changed and the TLBs need to be flushed.
1013a6a0b05dSBen Gardon  */
1014a6a0b05dSBen Gardon bool kvm_tdp_mmu_slot_set_dirty(struct kvm *kvm, struct kvm_memory_slot *slot)
1015a6a0b05dSBen Gardon {
1016a6a0b05dSBen Gardon 	struct kvm_mmu_page *root;
1017a6a0b05dSBen Gardon 	int root_as_id;
1018a6a0b05dSBen Gardon 	bool spte_set = false;
1019a6a0b05dSBen Gardon 
1020a6a0b05dSBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
1021a6a0b05dSBen Gardon 		root_as_id = kvm_mmu_page_as_id(root);
1022a6a0b05dSBen Gardon 		if (root_as_id != slot->as_id)
1023a6a0b05dSBen Gardon 			continue;
1024a6a0b05dSBen Gardon 
1025a6a0b05dSBen Gardon 		/*
1026a6a0b05dSBen Gardon 		 * Take a reference on the root so that it cannot be freed if
1027a6a0b05dSBen Gardon 		 * this thread releases the MMU lock and yields in this loop.
1028a6a0b05dSBen Gardon 		 */
1029a6a0b05dSBen Gardon 		kvm_mmu_get_root(kvm, root);
1030a6a0b05dSBen Gardon 
1031a6a0b05dSBen Gardon 		spte_set |= set_dirty_gfn_range(kvm, root, slot->base_gfn,
1032a6a0b05dSBen Gardon 				slot->base_gfn + slot->npages);
1033a6a0b05dSBen Gardon 
1034a6a0b05dSBen Gardon 		kvm_mmu_put_root(kvm, root);
1035a6a0b05dSBen Gardon 	}
1036a6a0b05dSBen Gardon 	return spte_set;
1037a6a0b05dSBen Gardon }
1038a6a0b05dSBen Gardon 
103914881998SBen Gardon /*
104014881998SBen Gardon  * Clear non-leaf entries (and free associated page tables) which could
104114881998SBen Gardon  * be replaced by large mappings, for GFNs within the slot.
104214881998SBen Gardon  */
104314881998SBen Gardon static void zap_collapsible_spte_range(struct kvm *kvm,
104414881998SBen Gardon 				       struct kvm_mmu_page *root,
104514881998SBen Gardon 				       gfn_t start, gfn_t end)
104614881998SBen Gardon {
104714881998SBen Gardon 	struct tdp_iter iter;
104814881998SBen Gardon 	kvm_pfn_t pfn;
104914881998SBen Gardon 	bool spte_set = false;
105014881998SBen Gardon 
105114881998SBen Gardon 	tdp_root_for_each_pte(iter, root, start, end) {
105214881998SBen Gardon 		if (!is_shadow_present_pte(iter.old_spte) ||
105314881998SBen Gardon 		    is_last_spte(iter.old_spte, iter.level))
105414881998SBen Gardon 			continue;
105514881998SBen Gardon 
105614881998SBen Gardon 		pfn = spte_to_pfn(iter.old_spte);
105714881998SBen Gardon 		if (kvm_is_reserved_pfn(pfn) ||
105814881998SBen Gardon 		    !PageTransCompoundMap(pfn_to_page(pfn)))
105914881998SBen Gardon 			continue;
106014881998SBen Gardon 
106114881998SBen Gardon 		tdp_mmu_set_spte(kvm, &iter, 0);
106214881998SBen Gardon 
106314881998SBen Gardon 		spte_set = tdp_mmu_iter_flush_cond_resched(kvm, &iter);
106414881998SBen Gardon 	}
106514881998SBen Gardon 
106614881998SBen Gardon 	if (spte_set)
106714881998SBen Gardon 		kvm_flush_remote_tlbs(kvm);
106814881998SBen Gardon }
106914881998SBen Gardon 
107014881998SBen Gardon /*
107114881998SBen Gardon  * Clear non-leaf entries (and free associated page tables) which could
107214881998SBen Gardon  * be replaced by large mappings, for GFNs within the slot.
107314881998SBen Gardon  */
107414881998SBen Gardon void kvm_tdp_mmu_zap_collapsible_sptes(struct kvm *kvm,
107514881998SBen Gardon 				       const struct kvm_memory_slot *slot)
107614881998SBen Gardon {
107714881998SBen Gardon 	struct kvm_mmu_page *root;
107814881998SBen Gardon 	int root_as_id;
107914881998SBen Gardon 
108014881998SBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
108114881998SBen Gardon 		root_as_id = kvm_mmu_page_as_id(root);
108214881998SBen Gardon 		if (root_as_id != slot->as_id)
108314881998SBen Gardon 			continue;
108414881998SBen Gardon 
108514881998SBen Gardon 		/*
108614881998SBen Gardon 		 * Take a reference on the root so that it cannot be freed if
108714881998SBen Gardon 		 * this thread releases the MMU lock and yields in this loop.
108814881998SBen Gardon 		 */
108914881998SBen Gardon 		kvm_mmu_get_root(kvm, root);
109014881998SBen Gardon 
109114881998SBen Gardon 		zap_collapsible_spte_range(kvm, root, slot->base_gfn,
109214881998SBen Gardon 					   slot->base_gfn + slot->npages);
109314881998SBen Gardon 
109414881998SBen Gardon 		kvm_mmu_put_root(kvm, root);
109514881998SBen Gardon 	}
109614881998SBen Gardon }
109746044f72SBen Gardon 
109846044f72SBen Gardon /*
109946044f72SBen Gardon  * Removes write access on the last level SPTE mapping this GFN and unsets the
110046044f72SBen Gardon  * SPTE_MMU_WRITABLE bit to ensure future writes continue to be intercepted.
110146044f72SBen Gardon  * Returns true if an SPTE was set and a TLB flush is needed.
110246044f72SBen Gardon  */
110346044f72SBen Gardon static bool write_protect_gfn(struct kvm *kvm, struct kvm_mmu_page *root,
110446044f72SBen Gardon 			      gfn_t gfn)
110546044f72SBen Gardon {
110646044f72SBen Gardon 	struct tdp_iter iter;
110746044f72SBen Gardon 	u64 new_spte;
110846044f72SBen Gardon 	bool spte_set = false;
110946044f72SBen Gardon 
111046044f72SBen Gardon 	tdp_root_for_each_leaf_pte(iter, root, gfn, gfn + 1) {
111146044f72SBen Gardon 		if (!is_writable_pte(iter.old_spte))
111246044f72SBen Gardon 			break;
111346044f72SBen Gardon 
111446044f72SBen Gardon 		new_spte = iter.old_spte &
111546044f72SBen Gardon 			~(PT_WRITABLE_MASK | SPTE_MMU_WRITEABLE);
111646044f72SBen Gardon 
111746044f72SBen Gardon 		tdp_mmu_set_spte(kvm, &iter, new_spte);
111846044f72SBen Gardon 		spte_set = true;
111946044f72SBen Gardon 	}
112046044f72SBen Gardon 
112146044f72SBen Gardon 	return spte_set;
112246044f72SBen Gardon }
112346044f72SBen Gardon 
112446044f72SBen Gardon /*
112546044f72SBen Gardon  * Removes write access on the last level SPTE mapping this GFN and unsets the
112646044f72SBen Gardon  * SPTE_MMU_WRITABLE bit to ensure future writes continue to be intercepted.
112746044f72SBen Gardon  * Returns true if an SPTE was set and a TLB flush is needed.
112846044f72SBen Gardon  */
112946044f72SBen Gardon bool kvm_tdp_mmu_write_protect_gfn(struct kvm *kvm,
113046044f72SBen Gardon 				   struct kvm_memory_slot *slot, gfn_t gfn)
113146044f72SBen Gardon {
113246044f72SBen Gardon 	struct kvm_mmu_page *root;
113346044f72SBen Gardon 	int root_as_id;
113446044f72SBen Gardon 	bool spte_set = false;
113546044f72SBen Gardon 
113646044f72SBen Gardon 	lockdep_assert_held(&kvm->mmu_lock);
113746044f72SBen Gardon 	for_each_tdp_mmu_root(kvm, root) {
113846044f72SBen Gardon 		root_as_id = kvm_mmu_page_as_id(root);
113946044f72SBen Gardon 		if (root_as_id != slot->as_id)
114046044f72SBen Gardon 			continue;
114146044f72SBen Gardon 
114246044f72SBen Gardon 		spte_set |= write_protect_gfn(kvm, root, gfn);
114346044f72SBen Gardon 	}
114446044f72SBen Gardon 	return spte_set;
114546044f72SBen Gardon }
114646044f72SBen Gardon 
114795fb5b02SBen Gardon /*
114895fb5b02SBen Gardon  * Return the level of the lowest level SPTE added to sptes.
114995fb5b02SBen Gardon  * That SPTE may be non-present.
115095fb5b02SBen Gardon  */
115139b4d43eSSean Christopherson int kvm_tdp_mmu_get_walk(struct kvm_vcpu *vcpu, u64 addr, u64 *sptes,
115239b4d43eSSean Christopherson 			 int *root_level)
115395fb5b02SBen Gardon {
115495fb5b02SBen Gardon 	struct tdp_iter iter;
115595fb5b02SBen Gardon 	struct kvm_mmu *mmu = vcpu->arch.mmu;
115695fb5b02SBen Gardon 	gfn_t gfn = addr >> PAGE_SHIFT;
11572aa07893SSean Christopherson 	int leaf = -1;
115895fb5b02SBen Gardon 
115939b4d43eSSean Christopherson 	*root_level = vcpu->arch.mmu->shadow_root_level;
116039b4d43eSSean Christopherson 
116195fb5b02SBen Gardon 	tdp_mmu_for_each_pte(iter, mmu, gfn, gfn + 1) {
116295fb5b02SBen Gardon 		leaf = iter.level;
1163*dde81f94SSean Christopherson 		sptes[leaf] = iter.old_spte;
116495fb5b02SBen Gardon 	}
116595fb5b02SBen Gardon 
116695fb5b02SBen Gardon 	return leaf;
116795fb5b02SBen Gardon }
1168