[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YbN58FS67bEBOZZu@google.com>
Date: Fri, 10 Dec 2021 16:01:52 +0000
From: Sean Christopherson <seanjc@...gle.com>
To: Paolo Bonzini <pbonzini@...hat.com>
Cc: Christian Borntraeger <borntraeger@...ux.ibm.com>,
Janosch Frank <frankja@...ux.ibm.com>,
David Hildenbrand <david@...hat.com>,
Claudio Imbrenda <imbrenda@...ux.ibm.com>,
Vitaly Kuznetsov <vkuznets@...hat.com>,
Wanpeng Li <wanpengli@...cent.com>,
Jim Mattson <jmattson@...gle.com>,
Joerg Roedel <joro@...tes.org>, kvm@...r.kernel.org,
linux-kernel@...r.kernel.org, Maxim Levitsky <mlevitsk@...hat.com>,
Ben Gardon <bgardon@...gle.com>,
Lai Jiangshan <jiangshanlai@...il.com>
Subject: Re: [PATCH 1/7] KVM: x86: Retry page fault if MMU reload is pending
and root has no sp
On Fri, Dec 10, 2021, Paolo Bonzini wrote:
> On 12/9/21 07:05, Sean Christopherson wrote:
> > + /* Special roots, e.g. pae_root, are not backed by shadow pages. */
> > + if (sp && is_obsolete_sp(vcpu->kvm, sp))
> > + return true;
> > +
> > + /*
> > + * Roots without an associated shadow page are considered invalid if
> > + * there is a pending request to free obsolete roots. The request is
> > + * only a hint that the current root_may_ be obsolete and needs to be
> > + * reloaded, e.g. if the guest frees a PGD that KVM is tracking as a
> > + * previous root, then __kvm_mmu_prepare_zap_page() signals all vCPUs
> > + * to reload even if no vCPU is actively using the root.
> > + */
> > + if (!sp && kvm_test_request(KVM_REQ_MMU_RELOAD, vcpu))
> > return true;
>
> Hmm I don't understand this (or maybe I do and I just don't like what I
> understand).
>
> KVM_REQ_MMU_RELOAD is raised after kvm->arch.mmu_valid_gen is fixed (of
> course, otherwise the other CPU might just not see any obsoleted page
> from the legacy MMU), therefore any check on KVM_REQ_MMU_RELOAD is just
> advisory.
I disagree. IMO, KVM should not be installing SPTEs into obsolete shadow pages,
which is what continuing on allows. I don't _think_ it's problematic, but I do
think it's wrong.
> This is not a problem per se; in the other commit message you said,
>
> For other MMUs, the resulting behavior is far more convoluted,
> though unlikely to be truly problematic.
>
> but it's unnecessarily complicating the logic. I'm more inclined to
> just play it simple and make the special roots process the page fault;
> Jiangshan's work should clean things up a bit:
Ya.
> --------- 8< -------------
> From 0c1e30d4e7e17692668d960452107f983dd2c9a9 Mon Sep 17 00:00:00 2001
> From: Paolo Bonzini <pbonzini@...hat.com>
> Date: Fri, 10 Dec 2021 07:41:02 -0500
> Subject: [PATCH] KVM: x86: Do not check obsoleteness of roots that have no sp
> attached
>
> The "special" roots, e.g. pae_root when KVM uses PAE paging, are not
> backed by a shadow page. Running with TDP disabled or with nested NPT
> explodes spectaculary due to dereferencing a NULL shadow page pointer.
> Play nice with a NULL shadow page when checking for an obsolete root in
> is_page_fault_stale().
>
> Fixes: a955cad84cda ("KVM: x86/mmu: Retry page fault if root is invalidated by memslot update")
> Cc: stable@...r.kernel.org
> Cc: Maxim Levitsky <mlevitsk@...hat.com>
> Analyzed-by: Sean Christopherson <seanjc@...gle.com>
> Signed-off-by: Paolo Bonzini <pbonzini@...hat.com>
>
> diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c
> index e2e1d012df22..4a3bcdd3cfe7 100644
> --- a/arch/x86/kvm/mmu/mmu.c
> +++ b/arch/x86/kvm/mmu/mmu.c
> @@ -3987,7 +3987,17 @@ static bool kvm_faultin_pfn(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault,
> static bool is_page_fault_stale(struct kvm_vcpu *vcpu,
> struct kvm_page_fault *fault, int mmu_seq)
> {
> - if (is_obsolete_sp(vcpu->kvm, to_shadow_page(vcpu->arch.mmu->root_hpa)))
> + struct kvm_mmu_page *sp = to_shadow_page(vcpu->arch.mmu->root_hpa);
> +
> + /*
> + * Special roots, e.g. pae_root, are not backed by shadow pages
> + * so there isn't an easy way to detect if they're obsolete.
Eh, for all intents and purposes, KVM_REQ_MMU_RELOAD very much says special roots
are obsolete. The root will be unloaded, i.e. will no longer be used, i.e. is obsolete.
The other way to check for an invalid special root would be to treat it as obsolete
if any of its children in entries 0-3 are present and obsolete. That would be more
precise, but it provides no benefit given KVM's current implementation.
I'm not completely opposed to doing nothing, but I do think it's silly to continue
on knowing that the work done by the page fault is all but gauranteed to be useless.
> + * If they are, any child SPTE created by the fault will be useless
> + * (they will instantly be treated as obsolete because they don't
> + * match the mmu_valid_gen); but they will not leak, so just play
> + * it simple.
> + */
> + if (sp && is_obsolete_sp(vcpu->kvm, sp))
> return true;
> return fault->slot &&
Powered by blists - more mailing lists