1 // SPDX-License-Identifier: GPL-2.0 2 3 #include "mmu.h" 4 #include "mmu_internal.h" 5 #include "mmutrace.h" 6 #include "tdp_iter.h" 7 #include "tdp_mmu.h" 8 #include "spte.h" 9 10 #include <asm/cmpxchg.h> 11 #include <trace/events/kvm.h> 12 13 static bool __read_mostly tdp_mmu_enabled = false; 14 module_param_named(tdp_mmu, tdp_mmu_enabled, bool, 0644); 15 16 /* Initializes the TDP MMU for the VM, if enabled. */ 17 void kvm_mmu_init_tdp_mmu(struct kvm *kvm) 18 { 19 if (!tdp_enabled || !READ_ONCE(tdp_mmu_enabled)) 20 return; 21 22 /* This should not be changed for the lifetime of the VM. */ 23 kvm->arch.tdp_mmu_enabled = true; 24 25 INIT_LIST_HEAD(&kvm->arch.tdp_mmu_roots); 26 spin_lock_init(&kvm->arch.tdp_mmu_pages_lock); 27 INIT_LIST_HEAD(&kvm->arch.tdp_mmu_pages); 28 } 29 30 void kvm_mmu_uninit_tdp_mmu(struct kvm *kvm) 31 { 32 if (!kvm->arch.tdp_mmu_enabled) 33 return; 34 35 WARN_ON(!list_empty(&kvm->arch.tdp_mmu_roots)); 36 37 /* 38 * Ensure that all the outstanding RCU callbacks to free shadow pages 39 * can run before the VM is torn down. 40 */ 41 rcu_barrier(); 42 } 43 44 static void tdp_mmu_put_root(struct kvm *kvm, struct kvm_mmu_page *root) 45 { 46 if (kvm_mmu_put_root(kvm, root)) 47 kvm_tdp_mmu_free_root(kvm, root); 48 } 49 50 static inline bool tdp_mmu_next_root_valid(struct kvm *kvm, 51 struct kvm_mmu_page *root) 52 { 53 lockdep_assert_held_write(&kvm->mmu_lock); 54 55 if (list_entry_is_head(root, &kvm->arch.tdp_mmu_roots, link)) 56 return false; 57 58 kvm_mmu_get_root(kvm, root); 59 return true; 60 61 } 62 63 static inline struct kvm_mmu_page *tdp_mmu_next_root(struct kvm *kvm, 64 struct kvm_mmu_page *root) 65 { 66 struct kvm_mmu_page *next_root; 67 68 next_root = list_next_entry(root, link); 69 tdp_mmu_put_root(kvm, root); 70 return next_root; 71 } 72 73 /* 74 * Note: this iterator gets and puts references to the roots it iterates over. 75 * This makes it safe to release the MMU lock and yield within the loop, but 76 * if exiting the loop early, the caller must drop the reference to the most 77 * recent root. (Unless keeping a live reference is desirable.) 78 */ 79 #define for_each_tdp_mmu_root_yield_safe(_kvm, _root) \ 80 for (_root = list_first_entry(&_kvm->arch.tdp_mmu_roots, \ 81 typeof(*_root), link); \ 82 tdp_mmu_next_root_valid(_kvm, _root); \ 83 _root = tdp_mmu_next_root(_kvm, _root)) 84 85 #define for_each_tdp_mmu_root(_kvm, _root) \ 86 list_for_each_entry(_root, &_kvm->arch.tdp_mmu_roots, link) 87 88 static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, 89 gfn_t start, gfn_t end, bool can_yield, bool flush); 90 91 void kvm_tdp_mmu_free_root(struct kvm *kvm, struct kvm_mmu_page *root) 92 { 93 gfn_t max_gfn = 1ULL << (shadow_phys_bits - PAGE_SHIFT); 94 95 lockdep_assert_held_write(&kvm->mmu_lock); 96 97 WARN_ON(root->root_count); 98 WARN_ON(!root->tdp_mmu_page); 99 100 list_del(&root->link); 101 102 zap_gfn_range(kvm, root, 0, max_gfn, false, false); 103 104 free_page((unsigned long)root->spt); 105 kmem_cache_free(mmu_page_header_cache, root); 106 } 107 108 static union kvm_mmu_page_role page_role_for_level(struct kvm_vcpu *vcpu, 109 int level) 110 { 111 union kvm_mmu_page_role role; 112 113 role = vcpu->arch.mmu->mmu_role.base; 114 role.level = level; 115 role.direct = true; 116 role.gpte_is_8_bytes = true; 117 role.access = ACC_ALL; 118 119 return role; 120 } 121 122 static struct kvm_mmu_page *alloc_tdp_mmu_page(struct kvm_vcpu *vcpu, gfn_t gfn, 123 int level) 124 { 125 struct kvm_mmu_page *sp; 126 127 sp = kvm_mmu_memory_cache_alloc(&vcpu->arch.mmu_page_header_cache); 128 sp->spt = kvm_mmu_memory_cache_alloc(&vcpu->arch.mmu_shadow_page_cache); 129 set_page_private(virt_to_page(sp->spt), (unsigned long)sp); 130 131 sp->role.word = page_role_for_level(vcpu, level).word; 132 sp->gfn = gfn; 133 sp->tdp_mmu_page = true; 134 135 trace_kvm_mmu_get_page(sp, true); 136 137 return sp; 138 } 139 140 static struct kvm_mmu_page *get_tdp_mmu_vcpu_root(struct kvm_vcpu *vcpu) 141 { 142 union kvm_mmu_page_role role; 143 struct kvm *kvm = vcpu->kvm; 144 struct kvm_mmu_page *root; 145 146 role = page_role_for_level(vcpu, vcpu->arch.mmu->shadow_root_level); 147 148 write_lock(&kvm->mmu_lock); 149 150 /* Check for an existing root before allocating a new one. */ 151 for_each_tdp_mmu_root(kvm, root) { 152 if (root->role.word == role.word) { 153 kvm_mmu_get_root(kvm, root); 154 write_unlock(&kvm->mmu_lock); 155 return root; 156 } 157 } 158 159 root = alloc_tdp_mmu_page(vcpu, 0, vcpu->arch.mmu->shadow_root_level); 160 root->root_count = 1; 161 162 list_add(&root->link, &kvm->arch.tdp_mmu_roots); 163 164 write_unlock(&kvm->mmu_lock); 165 166 return root; 167 } 168 169 hpa_t kvm_tdp_mmu_get_vcpu_root_hpa(struct kvm_vcpu *vcpu) 170 { 171 struct kvm_mmu_page *root; 172 173 root = get_tdp_mmu_vcpu_root(vcpu); 174 if (!root) 175 return INVALID_PAGE; 176 177 return __pa(root->spt); 178 } 179 180 static void tdp_mmu_free_sp(struct kvm_mmu_page *sp) 181 { 182 free_page((unsigned long)sp->spt); 183 kmem_cache_free(mmu_page_header_cache, sp); 184 } 185 186 /* 187 * This is called through call_rcu in order to free TDP page table memory 188 * safely with respect to other kernel threads that may be operating on 189 * the memory. 190 * By only accessing TDP MMU page table memory in an RCU read critical 191 * section, and freeing it after a grace period, lockless access to that 192 * memory won't use it after it is freed. 193 */ 194 static void tdp_mmu_free_sp_rcu_callback(struct rcu_head *head) 195 { 196 struct kvm_mmu_page *sp = container_of(head, struct kvm_mmu_page, 197 rcu_head); 198 199 tdp_mmu_free_sp(sp); 200 } 201 202 static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn, 203 u64 old_spte, u64 new_spte, int level, 204 bool shared); 205 206 static void handle_changed_spte_acc_track(u64 old_spte, u64 new_spte, int level) 207 { 208 bool pfn_changed = spte_to_pfn(old_spte) != spte_to_pfn(new_spte); 209 210 if (!is_shadow_present_pte(old_spte) || !is_last_spte(old_spte, level)) 211 return; 212 213 if (is_accessed_spte(old_spte) && 214 (!is_accessed_spte(new_spte) || pfn_changed)) 215 kvm_set_pfn_accessed(spte_to_pfn(old_spte)); 216 } 217 218 static void handle_changed_spte_dirty_log(struct kvm *kvm, int as_id, gfn_t gfn, 219 u64 old_spte, u64 new_spte, int level) 220 { 221 bool pfn_changed; 222 struct kvm_memory_slot *slot; 223 224 if (level > PG_LEVEL_4K) 225 return; 226 227 pfn_changed = spte_to_pfn(old_spte) != spte_to_pfn(new_spte); 228 229 if ((!is_writable_pte(old_spte) || pfn_changed) && 230 is_writable_pte(new_spte)) { 231 slot = __gfn_to_memslot(__kvm_memslots(kvm, as_id), gfn); 232 mark_page_dirty_in_slot(kvm, slot, gfn); 233 } 234 } 235 236 /** 237 * tdp_mmu_link_page - Add a new page to the list of pages used by the TDP MMU 238 * 239 * @kvm: kvm instance 240 * @sp: the new page 241 * @shared: This operation may not be running under the exclusive use of 242 * the MMU lock and the operation must synchronize with other 243 * threads that might be adding or removing pages. 244 * @account_nx: This page replaces a NX large page and should be marked for 245 * eventual reclaim. 246 */ 247 static void tdp_mmu_link_page(struct kvm *kvm, struct kvm_mmu_page *sp, 248 bool shared, bool account_nx) 249 { 250 if (shared) 251 spin_lock(&kvm->arch.tdp_mmu_pages_lock); 252 else 253 lockdep_assert_held_write(&kvm->mmu_lock); 254 255 list_add(&sp->link, &kvm->arch.tdp_mmu_pages); 256 if (account_nx) 257 account_huge_nx_page(kvm, sp); 258 259 if (shared) 260 spin_unlock(&kvm->arch.tdp_mmu_pages_lock); 261 } 262 263 /** 264 * tdp_mmu_unlink_page - Remove page from the list of pages used by the TDP MMU 265 * 266 * @kvm: kvm instance 267 * @sp: the page to be removed 268 * @shared: This operation may not be running under the exclusive use of 269 * the MMU lock and the operation must synchronize with other 270 * threads that might be adding or removing pages. 271 */ 272 static void tdp_mmu_unlink_page(struct kvm *kvm, struct kvm_mmu_page *sp, 273 bool shared) 274 { 275 if (shared) 276 spin_lock(&kvm->arch.tdp_mmu_pages_lock); 277 else 278 lockdep_assert_held_write(&kvm->mmu_lock); 279 280 list_del(&sp->link); 281 if (sp->lpage_disallowed) 282 unaccount_huge_nx_page(kvm, sp); 283 284 if (shared) 285 spin_unlock(&kvm->arch.tdp_mmu_pages_lock); 286 } 287 288 /** 289 * handle_removed_tdp_mmu_page - handle a pt removed from the TDP structure 290 * 291 * @kvm: kvm instance 292 * @pt: the page removed from the paging structure 293 * @shared: This operation may not be running under the exclusive use 294 * of the MMU lock and the operation must synchronize with other 295 * threads that might be modifying SPTEs. 296 * 297 * Given a page table that has been removed from the TDP paging structure, 298 * iterates through the page table to clear SPTEs and free child page tables. 299 * 300 * Note that pt is passed in as a tdp_ptep_t, but it does not need RCU 301 * protection. Since this thread removed it from the paging structure, 302 * this thread will be responsible for ensuring the page is freed. Hence the 303 * early rcu_dereferences in the function. 304 */ 305 static void handle_removed_tdp_mmu_page(struct kvm *kvm, tdp_ptep_t pt, 306 bool shared) 307 { 308 struct kvm_mmu_page *sp = sptep_to_sp(rcu_dereference(pt)); 309 int level = sp->role.level; 310 gfn_t base_gfn = sp->gfn; 311 u64 old_child_spte; 312 u64 *sptep; 313 gfn_t gfn; 314 int i; 315 316 trace_kvm_mmu_prepare_zap_page(sp); 317 318 tdp_mmu_unlink_page(kvm, sp, shared); 319 320 for (i = 0; i < PT64_ENT_PER_PAGE; i++) { 321 sptep = rcu_dereference(pt) + i; 322 gfn = base_gfn + (i * KVM_PAGES_PER_HPAGE(level - 1)); 323 324 if (shared) { 325 /* 326 * Set the SPTE to a nonpresent value that other 327 * threads will not overwrite. If the SPTE was 328 * already marked as removed then another thread 329 * handling a page fault could overwrite it, so 330 * set the SPTE until it is set from some other 331 * value to the removed SPTE value. 332 */ 333 for (;;) { 334 old_child_spte = xchg(sptep, REMOVED_SPTE); 335 if (!is_removed_spte(old_child_spte)) 336 break; 337 cpu_relax(); 338 } 339 } else { 340 /* 341 * If the SPTE is not MMU-present, there is no backing 342 * page associated with the SPTE and so no side effects 343 * that need to be recorded, and exclusive ownership of 344 * mmu_lock ensures the SPTE can't be made present. 345 * Note, zapping MMIO SPTEs is also unnecessary as they 346 * are guarded by the memslots generation, not by being 347 * unreachable. 348 */ 349 old_child_spte = READ_ONCE(*sptep); 350 if (!is_shadow_present_pte(old_child_spte)) 351 continue; 352 353 /* 354 * Marking the SPTE as a removed SPTE is not 355 * strictly necessary here as the MMU lock will 356 * stop other threads from concurrently modifying 357 * this SPTE. Using the removed SPTE value keeps 358 * the two branches consistent and simplifies 359 * the function. 360 */ 361 WRITE_ONCE(*sptep, REMOVED_SPTE); 362 } 363 handle_changed_spte(kvm, kvm_mmu_page_as_id(sp), gfn, 364 old_child_spte, REMOVED_SPTE, level - 1, 365 shared); 366 } 367 368 kvm_flush_remote_tlbs_with_address(kvm, gfn, 369 KVM_PAGES_PER_HPAGE(level)); 370 371 call_rcu(&sp->rcu_head, tdp_mmu_free_sp_rcu_callback); 372 } 373 374 /** 375 * handle_changed_spte - handle bookkeeping associated with an SPTE change 376 * @kvm: kvm instance 377 * @as_id: the address space of the paging structure the SPTE was a part of 378 * @gfn: the base GFN that was mapped by the SPTE 379 * @old_spte: The value of the SPTE before the change 380 * @new_spte: The value of the SPTE after the change 381 * @level: the level of the PT the SPTE is part of in the paging structure 382 * @shared: This operation may not be running under the exclusive use of 383 * the MMU lock and the operation must synchronize with other 384 * threads that might be modifying SPTEs. 385 * 386 * Handle bookkeeping that might result from the modification of a SPTE. 387 * This function must be called for all TDP SPTE modifications. 388 */ 389 static void __handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn, 390 u64 old_spte, u64 new_spte, int level, 391 bool shared) 392 { 393 bool was_present = is_shadow_present_pte(old_spte); 394 bool is_present = is_shadow_present_pte(new_spte); 395 bool was_leaf = was_present && is_last_spte(old_spte, level); 396 bool is_leaf = is_present && is_last_spte(new_spte, level); 397 bool pfn_changed = spte_to_pfn(old_spte) != spte_to_pfn(new_spte); 398 399 WARN_ON(level > PT64_ROOT_MAX_LEVEL); 400 WARN_ON(level < PG_LEVEL_4K); 401 WARN_ON(gfn & (KVM_PAGES_PER_HPAGE(level) - 1)); 402 403 /* 404 * If this warning were to trigger it would indicate that there was a 405 * missing MMU notifier or a race with some notifier handler. 406 * A present, leaf SPTE should never be directly replaced with another 407 * present leaf SPTE pointing to a differnt PFN. A notifier handler 408 * should be zapping the SPTE before the main MM's page table is 409 * changed, or the SPTE should be zeroed, and the TLBs flushed by the 410 * thread before replacement. 411 */ 412 if (was_leaf && is_leaf && pfn_changed) { 413 pr_err("Invalid SPTE change: cannot replace a present leaf\n" 414 "SPTE with another present leaf SPTE mapping a\n" 415 "different PFN!\n" 416 "as_id: %d gfn: %llx old_spte: %llx new_spte: %llx level: %d", 417 as_id, gfn, old_spte, new_spte, level); 418 419 /* 420 * Crash the host to prevent error propagation and guest data 421 * courruption. 422 */ 423 BUG(); 424 } 425 426 if (old_spte == new_spte) 427 return; 428 429 trace_kvm_tdp_mmu_spte_changed(as_id, gfn, level, old_spte, new_spte); 430 431 /* 432 * The only times a SPTE should be changed from a non-present to 433 * non-present state is when an MMIO entry is installed/modified/ 434 * removed. In that case, there is nothing to do here. 435 */ 436 if (!was_present && !is_present) { 437 /* 438 * If this change does not involve a MMIO SPTE or removed SPTE, 439 * it is unexpected. Log the change, though it should not 440 * impact the guest since both the former and current SPTEs 441 * are nonpresent. 442 */ 443 if (WARN_ON(!is_mmio_spte(old_spte) && 444 !is_mmio_spte(new_spte) && 445 !is_removed_spte(new_spte))) 446 pr_err("Unexpected SPTE change! Nonpresent SPTEs\n" 447 "should not be replaced with another,\n" 448 "different nonpresent SPTE, unless one or both\n" 449 "are MMIO SPTEs, or the new SPTE is\n" 450 "a temporary removed SPTE.\n" 451 "as_id: %d gfn: %llx old_spte: %llx new_spte: %llx level: %d", 452 as_id, gfn, old_spte, new_spte, level); 453 return; 454 } 455 456 457 if (was_leaf && is_dirty_spte(old_spte) && 458 (!is_dirty_spte(new_spte) || pfn_changed)) 459 kvm_set_pfn_dirty(spte_to_pfn(old_spte)); 460 461 /* 462 * Recursively handle child PTs if the change removed a subtree from 463 * the paging structure. 464 */ 465 if (was_present && !was_leaf && (pfn_changed || !is_present)) 466 handle_removed_tdp_mmu_page(kvm, 467 spte_to_child_pt(old_spte, level), shared); 468 } 469 470 static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn, 471 u64 old_spte, u64 new_spte, int level, 472 bool shared) 473 { 474 __handle_changed_spte(kvm, as_id, gfn, old_spte, new_spte, level, 475 shared); 476 handle_changed_spte_acc_track(old_spte, new_spte, level); 477 handle_changed_spte_dirty_log(kvm, as_id, gfn, old_spte, 478 new_spte, level); 479 } 480 481 /* 482 * tdp_mmu_set_spte_atomic - Set a TDP MMU SPTE atomically and handle the 483 * associated bookkeeping 484 * 485 * @kvm: kvm instance 486 * @iter: a tdp_iter instance currently on the SPTE that should be set 487 * @new_spte: The value the SPTE should be set to 488 * Returns: true if the SPTE was set, false if it was not. If false is returned, 489 * this function will have no side-effects. 490 */ 491 static inline bool tdp_mmu_set_spte_atomic(struct kvm *kvm, 492 struct tdp_iter *iter, 493 u64 new_spte) 494 { 495 lockdep_assert_held_read(&kvm->mmu_lock); 496 497 /* 498 * Do not change removed SPTEs. Only the thread that froze the SPTE 499 * may modify it. 500 */ 501 if (iter->old_spte == REMOVED_SPTE) 502 return false; 503 504 if (cmpxchg64(rcu_dereference(iter->sptep), iter->old_spte, 505 new_spte) != iter->old_spte) 506 return false; 507 508 handle_changed_spte(kvm, iter->as_id, iter->gfn, iter->old_spte, 509 new_spte, iter->level, true); 510 511 return true; 512 } 513 514 static inline bool tdp_mmu_zap_spte_atomic(struct kvm *kvm, 515 struct tdp_iter *iter) 516 { 517 /* 518 * Freeze the SPTE by setting it to a special, 519 * non-present value. This will stop other threads from 520 * immediately installing a present entry in its place 521 * before the TLBs are flushed. 522 */ 523 if (!tdp_mmu_set_spte_atomic(kvm, iter, REMOVED_SPTE)) 524 return false; 525 526 kvm_flush_remote_tlbs_with_address(kvm, iter->gfn, 527 KVM_PAGES_PER_HPAGE(iter->level)); 528 529 /* 530 * No other thread can overwrite the removed SPTE as they 531 * must either wait on the MMU lock or use 532 * tdp_mmu_set_spte_atomic which will not overrite the 533 * special removed SPTE value. No bookkeeping is needed 534 * here since the SPTE is going from non-present 535 * to non-present. 536 */ 537 WRITE_ONCE(*rcu_dereference(iter->sptep), 0); 538 539 return true; 540 } 541 542 543 /* 544 * __tdp_mmu_set_spte - Set a TDP MMU SPTE and handle the associated bookkeeping 545 * @kvm: kvm instance 546 * @iter: a tdp_iter instance currently on the SPTE that should be set 547 * @new_spte: The value the SPTE should be set to 548 * @record_acc_track: Notify the MM subsystem of changes to the accessed state 549 * of the page. Should be set unless handling an MMU 550 * notifier for access tracking. Leaving record_acc_track 551 * unset in that case prevents page accesses from being 552 * double counted. 553 * @record_dirty_log: Record the page as dirty in the dirty bitmap if 554 * appropriate for the change being made. Should be set 555 * unless performing certain dirty logging operations. 556 * Leaving record_dirty_log unset in that case prevents page 557 * writes from being double counted. 558 */ 559 static inline void __tdp_mmu_set_spte(struct kvm *kvm, struct tdp_iter *iter, 560 u64 new_spte, bool record_acc_track, 561 bool record_dirty_log) 562 { 563 lockdep_assert_held_write(&kvm->mmu_lock); 564 565 /* 566 * No thread should be using this function to set SPTEs to the 567 * temporary removed SPTE value. 568 * If operating under the MMU lock in read mode, tdp_mmu_set_spte_atomic 569 * should be used. If operating under the MMU lock in write mode, the 570 * use of the removed SPTE should not be necessary. 571 */ 572 WARN_ON(iter->old_spte == REMOVED_SPTE); 573 574 WRITE_ONCE(*rcu_dereference(iter->sptep), new_spte); 575 576 __handle_changed_spte(kvm, iter->as_id, iter->gfn, iter->old_spte, 577 new_spte, iter->level, false); 578 if (record_acc_track) 579 handle_changed_spte_acc_track(iter->old_spte, new_spte, 580 iter->level); 581 if (record_dirty_log) 582 handle_changed_spte_dirty_log(kvm, iter->as_id, iter->gfn, 583 iter->old_spte, new_spte, 584 iter->level); 585 } 586 587 static inline void tdp_mmu_set_spte(struct kvm *kvm, struct tdp_iter *iter, 588 u64 new_spte) 589 { 590 __tdp_mmu_set_spte(kvm, iter, new_spte, true, true); 591 } 592 593 static inline void tdp_mmu_set_spte_no_acc_track(struct kvm *kvm, 594 struct tdp_iter *iter, 595 u64 new_spte) 596 { 597 __tdp_mmu_set_spte(kvm, iter, new_spte, false, true); 598 } 599 600 static inline void tdp_mmu_set_spte_no_dirty_log(struct kvm *kvm, 601 struct tdp_iter *iter, 602 u64 new_spte) 603 { 604 __tdp_mmu_set_spte(kvm, iter, new_spte, true, false); 605 } 606 607 #define tdp_root_for_each_pte(_iter, _root, _start, _end) \ 608 for_each_tdp_pte(_iter, _root->spt, _root->role.level, _start, _end) 609 610 #define tdp_root_for_each_leaf_pte(_iter, _root, _start, _end) \ 611 tdp_root_for_each_pte(_iter, _root, _start, _end) \ 612 if (!is_shadow_present_pte(_iter.old_spte) || \ 613 !is_last_spte(_iter.old_spte, _iter.level)) \ 614 continue; \ 615 else 616 617 #define tdp_mmu_for_each_pte(_iter, _mmu, _start, _end) \ 618 for_each_tdp_pte(_iter, __va(_mmu->root_hpa), \ 619 _mmu->shadow_root_level, _start, _end) 620 621 /* 622 * Yield if the MMU lock is contended or this thread needs to return control 623 * to the scheduler. 624 * 625 * If this function should yield and flush is set, it will perform a remote 626 * TLB flush before yielding. 627 * 628 * If this function yields, it will also reset the tdp_iter's walk over the 629 * paging structure and the calling function should skip to the next 630 * iteration to allow the iterator to continue its traversal from the 631 * paging structure root. 632 * 633 * Return true if this function yielded and the iterator's traversal was reset. 634 * Return false if a yield was not needed. 635 */ 636 static inline bool tdp_mmu_iter_cond_resched(struct kvm *kvm, 637 struct tdp_iter *iter, bool flush) 638 { 639 /* Ensure forward progress has been made before yielding. */ 640 if (iter->next_last_level_gfn == iter->yielded_gfn) 641 return false; 642 643 if (need_resched() || rwlock_needbreak(&kvm->mmu_lock)) { 644 rcu_read_unlock(); 645 646 if (flush) 647 kvm_flush_remote_tlbs(kvm); 648 649 cond_resched_rwlock_write(&kvm->mmu_lock); 650 rcu_read_lock(); 651 652 WARN_ON(iter->gfn > iter->next_last_level_gfn); 653 654 tdp_iter_restart(iter); 655 656 return true; 657 } 658 659 return false; 660 } 661 662 /* 663 * Tears down the mappings for the range of gfns, [start, end), and frees the 664 * non-root pages mapping GFNs strictly within that range. Returns true if 665 * SPTEs have been cleared and a TLB flush is needed before releasing the 666 * MMU lock. 667 * If can_yield is true, will release the MMU lock and reschedule if the 668 * scheduler needs the CPU or there is contention on the MMU lock. If this 669 * function cannot yield, it will not release the MMU lock or reschedule and 670 * the caller must ensure it does not supply too large a GFN range, or the 671 * operation can cause a soft lockup. Note, in some use cases a flush may be 672 * required by prior actions. Ensure the pending flush is performed prior to 673 * yielding. 674 */ 675 static bool zap_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, 676 gfn_t start, gfn_t end, bool can_yield, bool flush) 677 { 678 struct tdp_iter iter; 679 680 rcu_read_lock(); 681 682 tdp_root_for_each_pte(iter, root, start, end) { 683 if (can_yield && 684 tdp_mmu_iter_cond_resched(kvm, &iter, flush)) { 685 flush = false; 686 continue; 687 } 688 689 if (!is_shadow_present_pte(iter.old_spte)) 690 continue; 691 692 /* 693 * If this is a non-last-level SPTE that covers a larger range 694 * than should be zapped, continue, and zap the mappings at a 695 * lower level. 696 */ 697 if ((iter.gfn < start || 698 iter.gfn + KVM_PAGES_PER_HPAGE(iter.level) > end) && 699 !is_last_spte(iter.old_spte, iter.level)) 700 continue; 701 702 tdp_mmu_set_spte(kvm, &iter, 0); 703 flush = true; 704 } 705 706 rcu_read_unlock(); 707 return flush; 708 } 709 710 /* 711 * Tears down the mappings for the range of gfns, [start, end), and frees the 712 * non-root pages mapping GFNs strictly within that range. Returns true if 713 * SPTEs have been cleared and a TLB flush is needed before releasing the 714 * MMU lock. 715 */ 716 bool __kvm_tdp_mmu_zap_gfn_range(struct kvm *kvm, gfn_t start, gfn_t end, 717 bool can_yield) 718 { 719 struct kvm_mmu_page *root; 720 bool flush = false; 721 722 for_each_tdp_mmu_root_yield_safe(kvm, root) 723 flush = zap_gfn_range(kvm, root, start, end, can_yield, flush); 724 725 return flush; 726 } 727 728 void kvm_tdp_mmu_zap_all(struct kvm *kvm) 729 { 730 gfn_t max_gfn = 1ULL << (shadow_phys_bits - PAGE_SHIFT); 731 bool flush; 732 733 flush = kvm_tdp_mmu_zap_gfn_range(kvm, 0, max_gfn); 734 if (flush) 735 kvm_flush_remote_tlbs(kvm); 736 } 737 738 /* 739 * Installs a last-level SPTE to handle a TDP page fault. 740 * (NPT/EPT violation/misconfiguration) 741 */ 742 static int tdp_mmu_map_handle_target_level(struct kvm_vcpu *vcpu, int write, 743 int map_writable, 744 struct tdp_iter *iter, 745 kvm_pfn_t pfn, bool prefault) 746 { 747 u64 new_spte; 748 int ret = 0; 749 int make_spte_ret = 0; 750 751 if (unlikely(is_noslot_pfn(pfn))) 752 new_spte = make_mmio_spte(vcpu, iter->gfn, ACC_ALL); 753 else 754 make_spte_ret = make_spte(vcpu, ACC_ALL, iter->level, iter->gfn, 755 pfn, iter->old_spte, prefault, true, 756 map_writable, !shadow_accessed_mask, 757 &new_spte); 758 759 if (new_spte == iter->old_spte) 760 ret = RET_PF_SPURIOUS; 761 else if (!tdp_mmu_set_spte_atomic(vcpu->kvm, iter, new_spte)) 762 return RET_PF_RETRY; 763 764 /* 765 * If the page fault was caused by a write but the page is write 766 * protected, emulation is needed. If the emulation was skipped, 767 * the vCPU would have the same fault again. 768 */ 769 if (make_spte_ret & SET_SPTE_WRITE_PROTECTED_PT) { 770 if (write) 771 ret = RET_PF_EMULATE; 772 kvm_make_request(KVM_REQ_TLB_FLUSH_CURRENT, vcpu); 773 } 774 775 /* If a MMIO SPTE is installed, the MMIO will need to be emulated. */ 776 if (unlikely(is_mmio_spte(new_spte))) { 777 trace_mark_mmio_spte(rcu_dereference(iter->sptep), iter->gfn, 778 new_spte); 779 ret = RET_PF_EMULATE; 780 } else 781 trace_kvm_mmu_set_spte(iter->level, iter->gfn, 782 rcu_dereference(iter->sptep)); 783 784 trace_kvm_mmu_set_spte(iter->level, iter->gfn, 785 rcu_dereference(iter->sptep)); 786 if (!prefault) 787 vcpu->stat.pf_fixed++; 788 789 return ret; 790 } 791 792 /* 793 * Handle a TDP page fault (NPT/EPT violation/misconfiguration) by installing 794 * page tables and SPTEs to translate the faulting guest physical address. 795 */ 796 int kvm_tdp_mmu_map(struct kvm_vcpu *vcpu, gpa_t gpa, u32 error_code, 797 int map_writable, int max_level, kvm_pfn_t pfn, 798 bool prefault) 799 { 800 bool nx_huge_page_workaround_enabled = is_nx_huge_page_enabled(); 801 bool write = error_code & PFERR_WRITE_MASK; 802 bool exec = error_code & PFERR_FETCH_MASK; 803 bool huge_page_disallowed = exec && nx_huge_page_workaround_enabled; 804 struct kvm_mmu *mmu = vcpu->arch.mmu; 805 struct tdp_iter iter; 806 struct kvm_mmu_page *sp; 807 u64 *child_pt; 808 u64 new_spte; 809 int ret; 810 gfn_t gfn = gpa >> PAGE_SHIFT; 811 int level; 812 int req_level; 813 814 if (WARN_ON(!VALID_PAGE(vcpu->arch.mmu->root_hpa))) 815 return RET_PF_RETRY; 816 if (WARN_ON(!is_tdp_mmu_root(vcpu->kvm, vcpu->arch.mmu->root_hpa))) 817 return RET_PF_RETRY; 818 819 level = kvm_mmu_hugepage_adjust(vcpu, gfn, max_level, &pfn, 820 huge_page_disallowed, &req_level); 821 822 trace_kvm_mmu_spte_requested(gpa, level, pfn); 823 824 rcu_read_lock(); 825 826 tdp_mmu_for_each_pte(iter, mmu, gfn, gfn + 1) { 827 if (nx_huge_page_workaround_enabled) 828 disallowed_hugepage_adjust(iter.old_spte, gfn, 829 iter.level, &pfn, &level); 830 831 if (iter.level == level) 832 break; 833 834 /* 835 * If there is an SPTE mapping a large page at a higher level 836 * than the target, that SPTE must be cleared and replaced 837 * with a non-leaf SPTE. 838 */ 839 if (is_shadow_present_pte(iter.old_spte) && 840 is_large_pte(iter.old_spte)) { 841 if (!tdp_mmu_zap_spte_atomic(vcpu->kvm, &iter)) 842 break; 843 844 /* 845 * The iter must explicitly re-read the spte here 846 * because the new value informs the !present 847 * path below. 848 */ 849 iter.old_spte = READ_ONCE(*rcu_dereference(iter.sptep)); 850 } 851 852 if (!is_shadow_present_pte(iter.old_spte)) { 853 sp = alloc_tdp_mmu_page(vcpu, iter.gfn, iter.level); 854 child_pt = sp->spt; 855 856 new_spte = make_nonleaf_spte(child_pt, 857 !shadow_accessed_mask); 858 859 if (tdp_mmu_set_spte_atomic(vcpu->kvm, &iter, 860 new_spte)) { 861 tdp_mmu_link_page(vcpu->kvm, sp, true, 862 huge_page_disallowed && 863 req_level >= iter.level); 864 865 trace_kvm_mmu_get_page(sp, true); 866 } else { 867 tdp_mmu_free_sp(sp); 868 break; 869 } 870 } 871 } 872 873 if (iter.level != level) { 874 rcu_read_unlock(); 875 return RET_PF_RETRY; 876 } 877 878 ret = tdp_mmu_map_handle_target_level(vcpu, write, map_writable, &iter, 879 pfn, prefault); 880 rcu_read_unlock(); 881 882 return ret; 883 } 884 885 static __always_inline int 886 kvm_tdp_mmu_handle_hva_range(struct kvm *kvm, 887 unsigned long start, 888 unsigned long end, 889 unsigned long data, 890 int (*handler)(struct kvm *kvm, 891 struct kvm_memory_slot *slot, 892 struct kvm_mmu_page *root, 893 gfn_t start, 894 gfn_t end, 895 unsigned long data)) 896 { 897 struct kvm_memslots *slots; 898 struct kvm_memory_slot *memslot; 899 struct kvm_mmu_page *root; 900 int ret = 0; 901 int as_id; 902 903 for_each_tdp_mmu_root_yield_safe(kvm, root) { 904 as_id = kvm_mmu_page_as_id(root); 905 slots = __kvm_memslots(kvm, as_id); 906 kvm_for_each_memslot(memslot, slots) { 907 unsigned long hva_start, hva_end; 908 gfn_t gfn_start, gfn_end; 909 910 hva_start = max(start, memslot->userspace_addr); 911 hva_end = min(end, memslot->userspace_addr + 912 (memslot->npages << PAGE_SHIFT)); 913 if (hva_start >= hva_end) 914 continue; 915 /* 916 * {gfn(page) | page intersects with [hva_start, hva_end)} = 917 * {gfn_start, gfn_start+1, ..., gfn_end-1}. 918 */ 919 gfn_start = hva_to_gfn_memslot(hva_start, memslot); 920 gfn_end = hva_to_gfn_memslot(hva_end + PAGE_SIZE - 1, memslot); 921 922 ret |= handler(kvm, memslot, root, gfn_start, 923 gfn_end, data); 924 } 925 } 926 927 return ret; 928 } 929 930 static int zap_gfn_range_hva_wrapper(struct kvm *kvm, 931 struct kvm_memory_slot *slot, 932 struct kvm_mmu_page *root, gfn_t start, 933 gfn_t end, unsigned long unused) 934 { 935 return zap_gfn_range(kvm, root, start, end, false, false); 936 } 937 938 int kvm_tdp_mmu_zap_hva_range(struct kvm *kvm, unsigned long start, 939 unsigned long end) 940 { 941 return kvm_tdp_mmu_handle_hva_range(kvm, start, end, 0, 942 zap_gfn_range_hva_wrapper); 943 } 944 945 /* 946 * Mark the SPTEs range of GFNs [start, end) unaccessed and return non-zero 947 * if any of the GFNs in the range have been accessed. 948 */ 949 static int age_gfn_range(struct kvm *kvm, struct kvm_memory_slot *slot, 950 struct kvm_mmu_page *root, gfn_t start, gfn_t end, 951 unsigned long unused) 952 { 953 struct tdp_iter iter; 954 int young = 0; 955 u64 new_spte = 0; 956 957 rcu_read_lock(); 958 959 tdp_root_for_each_leaf_pte(iter, root, start, end) { 960 /* 961 * If we have a non-accessed entry we don't need to change the 962 * pte. 963 */ 964 if (!is_accessed_spte(iter.old_spte)) 965 continue; 966 967 new_spte = iter.old_spte; 968 969 if (spte_ad_enabled(new_spte)) { 970 clear_bit((ffs(shadow_accessed_mask) - 1), 971 (unsigned long *)&new_spte); 972 } else { 973 /* 974 * Capture the dirty status of the page, so that it doesn't get 975 * lost when the SPTE is marked for access tracking. 976 */ 977 if (is_writable_pte(new_spte)) 978 kvm_set_pfn_dirty(spte_to_pfn(new_spte)); 979 980 new_spte = mark_spte_for_access_track(new_spte); 981 } 982 new_spte &= ~shadow_dirty_mask; 983 984 tdp_mmu_set_spte_no_acc_track(kvm, &iter, new_spte); 985 young = 1; 986 987 trace_kvm_age_page(iter.gfn, iter.level, slot, young); 988 } 989 990 rcu_read_unlock(); 991 992 return young; 993 } 994 995 int kvm_tdp_mmu_age_hva_range(struct kvm *kvm, unsigned long start, 996 unsigned long end) 997 { 998 return kvm_tdp_mmu_handle_hva_range(kvm, start, end, 0, 999 age_gfn_range); 1000 } 1001 1002 static int test_age_gfn(struct kvm *kvm, struct kvm_memory_slot *slot, 1003 struct kvm_mmu_page *root, gfn_t gfn, gfn_t unused, 1004 unsigned long unused2) 1005 { 1006 struct tdp_iter iter; 1007 1008 tdp_root_for_each_leaf_pte(iter, root, gfn, gfn + 1) 1009 if (is_accessed_spte(iter.old_spte)) 1010 return 1; 1011 1012 return 0; 1013 } 1014 1015 int kvm_tdp_mmu_test_age_hva(struct kvm *kvm, unsigned long hva) 1016 { 1017 return kvm_tdp_mmu_handle_hva_range(kvm, hva, hva + 1, 0, 1018 test_age_gfn); 1019 } 1020 1021 /* 1022 * Handle the changed_pte MMU notifier for the TDP MMU. 1023 * data is a pointer to the new pte_t mapping the HVA specified by the MMU 1024 * notifier. 1025 * Returns non-zero if a flush is needed before releasing the MMU lock. 1026 */ 1027 static int set_tdp_spte(struct kvm *kvm, struct kvm_memory_slot *slot, 1028 struct kvm_mmu_page *root, gfn_t gfn, gfn_t unused, 1029 unsigned long data) 1030 { 1031 struct tdp_iter iter; 1032 pte_t *ptep = (pte_t *)data; 1033 kvm_pfn_t new_pfn; 1034 u64 new_spte; 1035 int need_flush = 0; 1036 1037 rcu_read_lock(); 1038 1039 WARN_ON(pte_huge(*ptep)); 1040 1041 new_pfn = pte_pfn(*ptep); 1042 1043 tdp_root_for_each_pte(iter, root, gfn, gfn + 1) { 1044 if (iter.level != PG_LEVEL_4K) 1045 continue; 1046 1047 if (!is_shadow_present_pte(iter.old_spte)) 1048 break; 1049 1050 tdp_mmu_set_spte(kvm, &iter, 0); 1051 1052 kvm_flush_remote_tlbs_with_address(kvm, iter.gfn, 1); 1053 1054 if (!pte_write(*ptep)) { 1055 new_spte = kvm_mmu_changed_pte_notifier_make_spte( 1056 iter.old_spte, new_pfn); 1057 1058 tdp_mmu_set_spte(kvm, &iter, new_spte); 1059 } 1060 1061 need_flush = 1; 1062 } 1063 1064 if (need_flush) 1065 kvm_flush_remote_tlbs_with_address(kvm, gfn, 1); 1066 1067 rcu_read_unlock(); 1068 1069 return 0; 1070 } 1071 1072 int kvm_tdp_mmu_set_spte_hva(struct kvm *kvm, unsigned long address, 1073 pte_t *host_ptep) 1074 { 1075 return kvm_tdp_mmu_handle_hva_range(kvm, address, address + 1, 1076 (unsigned long)host_ptep, 1077 set_tdp_spte); 1078 } 1079 1080 /* 1081 * Remove write access from all the SPTEs mapping GFNs [start, end). If 1082 * skip_4k is set, SPTEs that map 4k pages, will not be write-protected. 1083 * Returns true if an SPTE has been changed and the TLBs need to be flushed. 1084 */ 1085 static bool wrprot_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, 1086 gfn_t start, gfn_t end, int min_level) 1087 { 1088 struct tdp_iter iter; 1089 u64 new_spte; 1090 bool spte_set = false; 1091 1092 rcu_read_lock(); 1093 1094 BUG_ON(min_level > KVM_MAX_HUGEPAGE_LEVEL); 1095 1096 for_each_tdp_pte_min_level(iter, root->spt, root->role.level, 1097 min_level, start, end) { 1098 if (tdp_mmu_iter_cond_resched(kvm, &iter, false)) 1099 continue; 1100 1101 if (!is_shadow_present_pte(iter.old_spte) || 1102 !is_last_spte(iter.old_spte, iter.level) || 1103 !(iter.old_spte & PT_WRITABLE_MASK)) 1104 continue; 1105 1106 new_spte = iter.old_spte & ~PT_WRITABLE_MASK; 1107 1108 tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte); 1109 spte_set = true; 1110 } 1111 1112 rcu_read_unlock(); 1113 return spte_set; 1114 } 1115 1116 /* 1117 * Remove write access from all the SPTEs mapping GFNs in the memslot. Will 1118 * only affect leaf SPTEs down to min_level. 1119 * Returns true if an SPTE has been changed and the TLBs need to be flushed. 1120 */ 1121 bool kvm_tdp_mmu_wrprot_slot(struct kvm *kvm, struct kvm_memory_slot *slot, 1122 int min_level) 1123 { 1124 struct kvm_mmu_page *root; 1125 int root_as_id; 1126 bool spte_set = false; 1127 1128 for_each_tdp_mmu_root_yield_safe(kvm, root) { 1129 root_as_id = kvm_mmu_page_as_id(root); 1130 if (root_as_id != slot->as_id) 1131 continue; 1132 1133 spte_set |= wrprot_gfn_range(kvm, root, slot->base_gfn, 1134 slot->base_gfn + slot->npages, min_level); 1135 } 1136 1137 return spte_set; 1138 } 1139 1140 /* 1141 * Clear the dirty status of all the SPTEs mapping GFNs in the memslot. If 1142 * AD bits are enabled, this will involve clearing the dirty bit on each SPTE. 1143 * If AD bits are not enabled, this will require clearing the writable bit on 1144 * each SPTE. Returns true if an SPTE has been changed and the TLBs need to 1145 * be flushed. 1146 */ 1147 static bool clear_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root, 1148 gfn_t start, gfn_t end) 1149 { 1150 struct tdp_iter iter; 1151 u64 new_spte; 1152 bool spte_set = false; 1153 1154 rcu_read_lock(); 1155 1156 tdp_root_for_each_leaf_pte(iter, root, start, end) { 1157 if (tdp_mmu_iter_cond_resched(kvm, &iter, false)) 1158 continue; 1159 1160 if (spte_ad_need_write_protect(iter.old_spte)) { 1161 if (is_writable_pte(iter.old_spte)) 1162 new_spte = iter.old_spte & ~PT_WRITABLE_MASK; 1163 else 1164 continue; 1165 } else { 1166 if (iter.old_spte & shadow_dirty_mask) 1167 new_spte = iter.old_spte & ~shadow_dirty_mask; 1168 else 1169 continue; 1170 } 1171 1172 tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte); 1173 spte_set = true; 1174 } 1175 1176 rcu_read_unlock(); 1177 return spte_set; 1178 } 1179 1180 /* 1181 * Clear the dirty status of all the SPTEs mapping GFNs in the memslot. If 1182 * AD bits are enabled, this will involve clearing the dirty bit on each SPTE. 1183 * If AD bits are not enabled, this will require clearing the writable bit on 1184 * each SPTE. Returns true if an SPTE has been changed and the TLBs need to 1185 * be flushed. 1186 */ 1187 bool kvm_tdp_mmu_clear_dirty_slot(struct kvm *kvm, struct kvm_memory_slot *slot) 1188 { 1189 struct kvm_mmu_page *root; 1190 int root_as_id; 1191 bool spte_set = false; 1192 1193 for_each_tdp_mmu_root_yield_safe(kvm, root) { 1194 root_as_id = kvm_mmu_page_as_id(root); 1195 if (root_as_id != slot->as_id) 1196 continue; 1197 1198 spte_set |= clear_dirty_gfn_range(kvm, root, slot->base_gfn, 1199 slot->base_gfn + slot->npages); 1200 } 1201 1202 return spte_set; 1203 } 1204 1205 /* 1206 * Clears the dirty status of all the 4k SPTEs mapping GFNs for which a bit is 1207 * set in mask, starting at gfn. The given memslot is expected to contain all 1208 * the GFNs represented by set bits in the mask. If AD bits are enabled, 1209 * clearing the dirty status will involve clearing the dirty bit on each SPTE 1210 * or, if AD bits are not enabled, clearing the writable bit on each SPTE. 1211 */ 1212 static void clear_dirty_pt_masked(struct kvm *kvm, struct kvm_mmu_page *root, 1213 gfn_t gfn, unsigned long mask, bool wrprot) 1214 { 1215 struct tdp_iter iter; 1216 u64 new_spte; 1217 1218 rcu_read_lock(); 1219 1220 tdp_root_for_each_leaf_pte(iter, root, gfn + __ffs(mask), 1221 gfn + BITS_PER_LONG) { 1222 if (!mask) 1223 break; 1224 1225 if (iter.level > PG_LEVEL_4K || 1226 !(mask & (1UL << (iter.gfn - gfn)))) 1227 continue; 1228 1229 mask &= ~(1UL << (iter.gfn - gfn)); 1230 1231 if (wrprot || spte_ad_need_write_protect(iter.old_spte)) { 1232 if (is_writable_pte(iter.old_spte)) 1233 new_spte = iter.old_spte & ~PT_WRITABLE_MASK; 1234 else 1235 continue; 1236 } else { 1237 if (iter.old_spte & shadow_dirty_mask) 1238 new_spte = iter.old_spte & ~shadow_dirty_mask; 1239 else 1240 continue; 1241 } 1242 1243 tdp_mmu_set_spte_no_dirty_log(kvm, &iter, new_spte); 1244 } 1245 1246 rcu_read_unlock(); 1247 } 1248 1249 /* 1250 * Clears the dirty status of all the 4k SPTEs mapping GFNs for which a bit is 1251 * set in mask, starting at gfn. The given memslot is expected to contain all 1252 * the GFNs represented by set bits in the mask. If AD bits are enabled, 1253 * clearing the dirty status will involve clearing the dirty bit on each SPTE 1254 * or, if AD bits are not enabled, clearing the writable bit on each SPTE. 1255 */ 1256 void kvm_tdp_mmu_clear_dirty_pt_masked(struct kvm *kvm, 1257 struct kvm_memory_slot *slot, 1258 gfn_t gfn, unsigned long mask, 1259 bool wrprot) 1260 { 1261 struct kvm_mmu_page *root; 1262 int root_as_id; 1263 1264 lockdep_assert_held_write(&kvm->mmu_lock); 1265 for_each_tdp_mmu_root(kvm, root) { 1266 root_as_id = kvm_mmu_page_as_id(root); 1267 if (root_as_id != slot->as_id) 1268 continue; 1269 1270 clear_dirty_pt_masked(kvm, root, gfn, mask, wrprot); 1271 } 1272 } 1273 1274 /* 1275 * Clear leaf entries which could be replaced by large mappings, for 1276 * GFNs within the slot. 1277 */ 1278 static void zap_collapsible_spte_range(struct kvm *kvm, 1279 struct kvm_mmu_page *root, 1280 struct kvm_memory_slot *slot) 1281 { 1282 gfn_t start = slot->base_gfn; 1283 gfn_t end = start + slot->npages; 1284 struct tdp_iter iter; 1285 kvm_pfn_t pfn; 1286 bool spte_set = false; 1287 1288 rcu_read_lock(); 1289 1290 tdp_root_for_each_pte(iter, root, start, end) { 1291 if (tdp_mmu_iter_cond_resched(kvm, &iter, spte_set)) { 1292 spte_set = false; 1293 continue; 1294 } 1295 1296 if (!is_shadow_present_pte(iter.old_spte) || 1297 !is_last_spte(iter.old_spte, iter.level)) 1298 continue; 1299 1300 pfn = spte_to_pfn(iter.old_spte); 1301 if (kvm_is_reserved_pfn(pfn) || 1302 iter.level >= kvm_mmu_max_mapping_level(kvm, slot, iter.gfn, 1303 pfn, PG_LEVEL_NUM)) 1304 continue; 1305 1306 tdp_mmu_set_spte(kvm, &iter, 0); 1307 1308 spte_set = true; 1309 } 1310 1311 rcu_read_unlock(); 1312 if (spte_set) 1313 kvm_flush_remote_tlbs(kvm); 1314 } 1315 1316 /* 1317 * Clear non-leaf entries (and free associated page tables) which could 1318 * be replaced by large mappings, for GFNs within the slot. 1319 */ 1320 void kvm_tdp_mmu_zap_collapsible_sptes(struct kvm *kvm, 1321 struct kvm_memory_slot *slot) 1322 { 1323 struct kvm_mmu_page *root; 1324 int root_as_id; 1325 1326 for_each_tdp_mmu_root_yield_safe(kvm, root) { 1327 root_as_id = kvm_mmu_page_as_id(root); 1328 if (root_as_id != slot->as_id) 1329 continue; 1330 1331 zap_collapsible_spte_range(kvm, root, slot); 1332 } 1333 } 1334 1335 /* 1336 * Removes write access on the last level SPTE mapping this GFN and unsets the 1337 * SPTE_MMU_WRITABLE bit to ensure future writes continue to be intercepted. 1338 * Returns true if an SPTE was set and a TLB flush is needed. 1339 */ 1340 static bool write_protect_gfn(struct kvm *kvm, struct kvm_mmu_page *root, 1341 gfn_t gfn) 1342 { 1343 struct tdp_iter iter; 1344 u64 new_spte; 1345 bool spte_set = false; 1346 1347 rcu_read_lock(); 1348 1349 tdp_root_for_each_leaf_pte(iter, root, gfn, gfn + 1) { 1350 if (!is_writable_pte(iter.old_spte)) 1351 break; 1352 1353 new_spte = iter.old_spte & 1354 ~(PT_WRITABLE_MASK | SPTE_MMU_WRITEABLE); 1355 1356 tdp_mmu_set_spte(kvm, &iter, new_spte); 1357 spte_set = true; 1358 } 1359 1360 rcu_read_unlock(); 1361 1362 return spte_set; 1363 } 1364 1365 /* 1366 * Removes write access on the last level SPTE mapping this GFN and unsets the 1367 * SPTE_MMU_WRITABLE bit to ensure future writes continue to be intercepted. 1368 * Returns true if an SPTE was set and a TLB flush is needed. 1369 */ 1370 bool kvm_tdp_mmu_write_protect_gfn(struct kvm *kvm, 1371 struct kvm_memory_slot *slot, gfn_t gfn) 1372 { 1373 struct kvm_mmu_page *root; 1374 int root_as_id; 1375 bool spte_set = false; 1376 1377 lockdep_assert_held_write(&kvm->mmu_lock); 1378 for_each_tdp_mmu_root(kvm, root) { 1379 root_as_id = kvm_mmu_page_as_id(root); 1380 if (root_as_id != slot->as_id) 1381 continue; 1382 1383 spte_set |= write_protect_gfn(kvm, root, gfn); 1384 } 1385 return spte_set; 1386 } 1387 1388 /* 1389 * Return the level of the lowest level SPTE added to sptes. 1390 * That SPTE may be non-present. 1391 */ 1392 int kvm_tdp_mmu_get_walk(struct kvm_vcpu *vcpu, u64 addr, u64 *sptes, 1393 int *root_level) 1394 { 1395 struct tdp_iter iter; 1396 struct kvm_mmu *mmu = vcpu->arch.mmu; 1397 gfn_t gfn = addr >> PAGE_SHIFT; 1398 int leaf = -1; 1399 1400 *root_level = vcpu->arch.mmu->shadow_root_level; 1401 1402 rcu_read_lock(); 1403 1404 tdp_mmu_for_each_pte(iter, mmu, gfn, gfn + 1) { 1405 leaf = iter.level; 1406 sptes[leaf] = iter.old_spte; 1407 } 1408 1409 rcu_read_unlock(); 1410 1411 return leaf; 1412 } 1413