lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAK9=C2VPNC8_dxVxbrdvz7k_yG=XdKHhFk1b57+r6ORvWqNMWA@mail.gmail.com>
Date: Tue, 17 Jun 2025 10:41:43 +0530
From: Anup Patel <apatel@...tanamicro.com>
To: Atish Patra <atish.patra@...ux.dev>
Cc: Palmer Dabbelt <palmer@...belt.com>, Paul Walmsley <paul.walmsley@...ive.com>, 
	Alexandre Ghiti <alex@...ti.fr>, Andrew Jones <ajones@...tanamicro.com>, 
	Anup Patel <anup@...infault.org>, kvm@...r.kernel.org, kvm-riscv@...ts.infradead.org, 
	linux-riscv@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2 12/12] RISC-V: KVM: Pass VMID as parameter to
 kvm_riscv_hfence_xyz() APIs

On Sun, Jun 15, 2025 at 12:48 AM Atish Patra <atish.patra@...ux.dev> wrote:
>
>
>
> On 6/14/25 12:12 PM, Atish Patra wrote:
> >
> > On 6/12/25 11:57 PM, Anup Patel wrote:
> >> Currently, all kvm_riscv_hfence_xyz() APIs assume VMID to be the
> >> host VMID of the Guest/VM which resticts use of these APIs only
> >> for host TLB maintenance. Let's allow passing VMID as a parameter
> >> to all kvm_riscv_hfence_xyz() APIs so that they can be re-used
> >> for nested virtualization related TLB maintenance.
> >>
> >> Signed-off-by: Anup Patel <apatel@...tanamicro.com>
> >> ---
> >>   arch/riscv/include/asm/kvm_tlb.h  | 17 ++++++---
> >>   arch/riscv/kvm/gstage.c           |  3 +-
> >>   arch/riscv/kvm/tlb.c              | 61 ++++++++++++++++++++-----------
> >>   arch/riscv/kvm/vcpu_sbi_replace.c | 17 +++++----
> >>   arch/riscv/kvm/vcpu_sbi_v01.c     | 25 ++++++-------
> >>   5 files changed, 73 insertions(+), 50 deletions(-)
> >>
> >> diff --git a/arch/riscv/include/asm/kvm_tlb.h b/arch/riscv/include/
> >> asm/kvm_tlb.h
> >> index f67e03edeaec..38a2f933ad3a 100644
> >> --- a/arch/riscv/include/asm/kvm_tlb.h
> >> +++ b/arch/riscv/include/asm/kvm_tlb.h
> >> @@ -11,9 +11,11 @@
> >>   enum kvm_riscv_hfence_type {
> >>       KVM_RISCV_HFENCE_UNKNOWN = 0,
> >>       KVM_RISCV_HFENCE_GVMA_VMID_GPA,
> >> +    KVM_RISCV_HFENCE_GVMA_VMID_ALL,
> >>       KVM_RISCV_HFENCE_VVMA_ASID_GVA,
> >>       KVM_RISCV_HFENCE_VVMA_ASID_ALL,
> >>       KVM_RISCV_HFENCE_VVMA_GVA,
> >> +    KVM_RISCV_HFENCE_VVMA_ALL
> >>   };
> >>   struct kvm_riscv_hfence {
> >> @@ -59,21 +61,24 @@ void kvm_riscv_fence_i(struct kvm *kvm,
> >>   void kvm_riscv_hfence_gvma_vmid_gpa(struct kvm *kvm,
> >>                       unsigned long hbase, unsigned long hmask,
> >>                       gpa_t gpa, gpa_t gpsz,
> >> -                    unsigned long order);
> >> +                    unsigned long order, unsigned long vmid);
> >>   void kvm_riscv_hfence_gvma_vmid_all(struct kvm *kvm,
> >> -                    unsigned long hbase, unsigned long hmask);
> >> +                    unsigned long hbase, unsigned long hmask,
> >> +                    unsigned long vmid);
> >>   void kvm_riscv_hfence_vvma_asid_gva(struct kvm *kvm,
> >>                       unsigned long hbase, unsigned long hmask,
> >>                       unsigned long gva, unsigned long gvsz,
> >> -                    unsigned long order, unsigned long asid);
> >> +                    unsigned long order, unsigned long asid,
> >> +                    unsigned long vmid);
> >>   void kvm_riscv_hfence_vvma_asid_all(struct kvm *kvm,
> >>                       unsigned long hbase, unsigned long hmask,
> >> -                    unsigned long asid);
> >> +                    unsigned long asid, unsigned long vmid);
> >>   void kvm_riscv_hfence_vvma_gva(struct kvm *kvm,
> >>                      unsigned long hbase, unsigned long hmask,
> >>                      unsigned long gva, unsigned long gvsz,
> >> -                   unsigned long order);
> >> +                   unsigned long order, unsigned long vmid);
> >>   void kvm_riscv_hfence_vvma_all(struct kvm *kvm,
> >> -                   unsigned long hbase, unsigned long hmask);
> >> +                   unsigned long hbase, unsigned long hmask,
> >> +                   unsigned long vmid);
> >>   #endif
> >> diff --git a/arch/riscv/kvm/gstage.c b/arch/riscv/kvm/gstage.c
> >> index 9c7c44f09b05..24c270d6d0e2 100644
> >> --- a/arch/riscv/kvm/gstage.c
> >> +++ b/arch/riscv/kvm/gstage.c
> >> @@ -117,7 +117,8 @@ static void gstage_tlb_flush(struct kvm_gstage
> >> *gstage, u32 level, gpa_t addr)
> >>       if (gstage->flags & KVM_GSTAGE_FLAGS_LOCAL)
> >>           kvm_riscv_local_hfence_gvma_vmid_gpa(gstage->vmid, addr,
> >> BIT(order), order);
> >>       else
> >> -        kvm_riscv_hfence_gvma_vmid_gpa(gstage->kvm, -1UL, 0, addr,
> >> BIT(order), order);
> >> +        kvm_riscv_hfence_gvma_vmid_gpa(gstage->kvm, -1UL, 0, addr,
> >> BIT(order), order,
> >> +                           gstage->vmid);
> >>   }
> >>   int kvm_riscv_gstage_set_pte(struct kvm_gstage *gstage,
> >> diff --git a/arch/riscv/kvm/tlb.c b/arch/riscv/kvm/tlb.c
> >> index 349fcfc93f54..3c5a70a2b927 100644
> >> --- a/arch/riscv/kvm/tlb.c
> >> +++ b/arch/riscv/kvm/tlb.c
> >> @@ -251,6 +251,12 @@ void kvm_riscv_hfence_process(struct kvm_vcpu *vcpu)
> >>                   kvm_riscv_local_hfence_gvma_vmid_gpa(d.vmid, d.addr,
> >>                                        d.size, d.order);
> >>               break;
> >> +        case KVM_RISCV_HFENCE_GVMA_VMID_ALL:
> >> +            if (kvm_riscv_nacl_available())
> >> +                nacl_hfence_gvma_vmid_all(nacl_shmem(), d.vmid);
> >> +            else
> >> +                kvm_riscv_local_hfence_gvma_vmid_all(d.vmid);
> >> +            break;
> >>           case KVM_RISCV_HFENCE_VVMA_ASID_GVA:
> >>               kvm_riscv_vcpu_pmu_incr_fw(vcpu,
> >> SBI_PMU_FW_HFENCE_VVMA_ASID_RCVD);
> >>               if (kvm_riscv_nacl_available())
> >> @@ -276,6 +282,13 @@ void kvm_riscv_hfence_process(struct kvm_vcpu *vcpu)
> >>                   kvm_riscv_local_hfence_vvma_gva(d.vmid, d.addr,
> >>                                   d.size, d.order);
> >>               break;
> >> +        case KVM_RISCV_HFENCE_VVMA_ALL:
> >> +            kvm_riscv_vcpu_pmu_incr_fw(vcpu,
> >> SBI_PMU_FW_HFENCE_VVMA_RCVD);
> >> +            if (kvm_riscv_nacl_available())
> >> +                nacl_hfence_vvma_all(nacl_shmem(), d.vmid);
> >> +            else
> >> +                kvm_riscv_local_hfence_vvma_all(d.vmid);
> >> +            break;
> >>           default:
> >>               break;
> >>           }
> >> @@ -328,14 +341,13 @@ void kvm_riscv_fence_i(struct kvm *kvm,
> >>   void kvm_riscv_hfence_gvma_vmid_gpa(struct kvm *kvm,
> >>                       unsigned long hbase, unsigned long hmask,
> >>                       gpa_t gpa, gpa_t gpsz,
> >> -                    unsigned long order)
> >> +                    unsigned long order, unsigned long vmid)
> >>   {
> >> -    struct kvm_vmid *v = &kvm->arch.vmid;
> >>       struct kvm_riscv_hfence data;
> >>       data.type = KVM_RISCV_HFENCE_GVMA_VMID_GPA;
> >>       data.asid = 0;
> >> -    data.vmid = READ_ONCE(v->vmid);
> >> +    data.vmid = vmid;
> >>       data.addr = gpa;
> >>       data.size = gpsz;
> >>       data.order = order;
> >> @@ -344,23 +356,28 @@ void kvm_riscv_hfence_gvma_vmid_gpa(struct kvm
> >> *kvm,
> >>   }
> >>   void kvm_riscv_hfence_gvma_vmid_all(struct kvm *kvm,
> >> -                    unsigned long hbase, unsigned long hmask)
> >> +                    unsigned long hbase, unsigned long hmask,
> >> +                    unsigned long vmid)
> >>   {
> >> -    make_xfence_request(kvm, hbase, hmask, KVM_REQ_TLB_FLUSH,
> >> -                KVM_REQ_TLB_FLUSH, NULL);
> >> +    struct kvm_riscv_hfence data = {0};
> >> +
> >> +    data.type = KVM_RISCV_HFENCE_GVMA_VMID_ALL;
> >> +    data.vmid = vmid;
> >> +    make_xfence_request(kvm, hbase, hmask, KVM_REQ_HFENCE,
> >> +                KVM_REQ_TLB_FLUSH, &data);
> >>   }
> >>   void kvm_riscv_hfence_vvma_asid_gva(struct kvm *kvm,
> >>                       unsigned long hbase, unsigned long hmask,
> >>                       unsigned long gva, unsigned long gvsz,
> >> -                    unsigned long order, unsigned long asid)
> >> +                    unsigned long order, unsigned long asid,
> >> +                    unsigned long vmid)
> >>   {
> >> -    struct kvm_vmid *v = &kvm->arch.vmid;
> >>       struct kvm_riscv_hfence data;
> >>       data.type = KVM_RISCV_HFENCE_VVMA_ASID_GVA;
> >>       data.asid = asid;
> >> -    data.vmid = READ_ONCE(v->vmid);
> >> +    data.vmid = vmid;
> >>       data.addr = gva;
> >>       data.size = gvsz;
> >>       data.order = order;
> >> @@ -370,15 +387,13 @@ void kvm_riscv_hfence_vvma_asid_gva(struct kvm
> >> *kvm,
> >>   void kvm_riscv_hfence_vvma_asid_all(struct kvm *kvm,
> >>                       unsigned long hbase, unsigned long hmask,
> >> -                    unsigned long asid)
> >> +                    unsigned long asid, unsigned long vmid)
> >>   {
> >> -    struct kvm_vmid *v = &kvm->arch.vmid;
> >> -    struct kvm_riscv_hfence data;
> >> +    struct kvm_riscv_hfence data = {0};
> >>       data.type = KVM_RISCV_HFENCE_VVMA_ASID_ALL;
> >>       data.asid = asid;
> >> -    data.vmid = READ_ONCE(v->vmid);
> >> -    data.addr = data.size = data.order = 0;
> >> +    data.vmid = vmid;
> >>       make_xfence_request(kvm, hbase, hmask, KVM_REQ_HFENCE,
> >>                   KVM_REQ_HFENCE_VVMA_ALL, &data);
> >>   }
> >> @@ -386,14 +401,13 @@ void kvm_riscv_hfence_vvma_asid_all(struct kvm
> >> *kvm,
> >>   void kvm_riscv_hfence_vvma_gva(struct kvm *kvm,
> >>                      unsigned long hbase, unsigned long hmask,
> >>                      unsigned long gva, unsigned long gvsz,
> >> -                   unsigned long order)
> >> +                   unsigned long order, unsigned long vmid)
> >>   {
> >> -    struct kvm_vmid *v = &kvm->arch.vmid;
> >>       struct kvm_riscv_hfence data;
> >>       data.type = KVM_RISCV_HFENCE_VVMA_GVA;
> >>       data.asid = 0;
> >> -    data.vmid = READ_ONCE(v->vmid);
> >> +    data.vmid = vmid;
> >>       data.addr = gva;
> >>       data.size = gvsz;
> >>       data.order = order;
> >> @@ -402,16 +416,21 @@ void kvm_riscv_hfence_vvma_gva(struct kvm *kvm,
> >>   }
> >>   void kvm_riscv_hfence_vvma_all(struct kvm *kvm,
> >> -                   unsigned long hbase, unsigned long hmask)
> >> +                   unsigned long hbase, unsigned long hmask,
> >> +                   unsigned long vmid)
> >>   {
> >> -    make_xfence_request(kvm, hbase, hmask, KVM_REQ_HFENCE_VVMA_ALL,
> >> -                KVM_REQ_HFENCE_VVMA_ALL, NULL);
> >> +    struct kvm_riscv_hfence data = {0};
> >> +
> >> +    data.type = KVM_RISCV_HFENCE_VVMA_ALL;
> >> +    data.vmid = vmid;
> >> +    make_xfence_request(kvm, hbase, hmask, KVM_REQ_HFENCE,
> >> +                KVM_REQ_HFENCE_VVMA_ALL, &data);
> >>   }
> >>   int kvm_arch_flush_remote_tlbs_range(struct kvm *kvm, gfn_t gfn, u64
> >> nr_pages)
> >>   {
> >>       kvm_riscv_hfence_gvma_vmid_gpa(kvm, -1UL, 0,
> >>                          gfn << PAGE_SHIFT, nr_pages << PAGE_SHIFT,
> >> -                       PAGE_SHIFT);
> >> +                       PAGE_SHIFT, READ_ONCE(kvm->arch.vmid.vmid));
> >>       return 0;
> >>   }
> >> diff --git a/arch/riscv/kvm/vcpu_sbi_replace.c b/arch/riscv/kvm/
> >> vcpu_sbi_replace.c
> >> index b17fad091bab..b490ed1428a6 100644
> >> --- a/arch/riscv/kvm/vcpu_sbi_replace.c
> >> +++ b/arch/riscv/kvm/vcpu_sbi_replace.c
> >> @@ -96,6 +96,7 @@ static int kvm_sbi_ext_rfence_handler(struct
> >> kvm_vcpu *vcpu, struct kvm_run *run
> >>       unsigned long hmask = cp->a0;
> >>       unsigned long hbase = cp->a1;
> >>       unsigned long funcid = cp->a6;
> >> +    unsigned long vmid;
> >>       switch (funcid) {
> >>       case SBI_EXT_RFENCE_REMOTE_FENCE_I:
> >> @@ -103,22 +104,22 @@ static int kvm_sbi_ext_rfence_handler(struct
> >> kvm_vcpu *vcpu, struct kvm_run *run
> >>           kvm_riscv_vcpu_pmu_incr_fw(vcpu, SBI_PMU_FW_FENCE_I_SENT);
> >>           break;
> >>       case SBI_EXT_RFENCE_REMOTE_SFENCE_VMA:
> >> +        vmid = READ_ONCE(vcpu->kvm->arch.vmid.vmid);
> >>           if ((cp->a2 == 0 && cp->a3 == 0) || cp->a3 == -1UL)
> >> -            kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase, hmask);
> >> +            kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase, hmask, vmid);
> >
> > This patch doesn't apply cleanly on 6.16-rc1.
> >
> > <<<<<<< HEAD
> >                  if (cp->a2 == 0 && cp->a3 == 0)
> >                          kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase,
> > hmask);
> > =======
> >                  vmid = READ_ONCE(vcpu->kvm->arch.vmid.vmid);
> >                  if ((cp->a2 == 0 && cp->a3 == 0) || cp->a3 == -1UL)
> >                          kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase,
> > hmask, vmid);
> >  >>>>>>> 57ec61198cc1 (RISC-V: KVM: Pass VMID as parameter to
> > kvm_riscv_hfence_xyz() APIs)
> > else
> >                          kvm_riscv_hfence_vvma_gva(vcpu->kvm, hbase, hmask,
> >                                                    cp->a2, cp->a3,
> > PAGE_SHIFT, vmid);
> >                  kvm_riscv_vcpu_pmu_incr_fw(vcpu,
> > SBI_PMU_FW_HFENCE_VVMA_SENT);
> > break;
> >          case SBI_EXT_RFENCE_REMOTE_SFENCE_VMA_ASID:
> > <<<<<<< HEAD
> >                  if (cp->a2 == 0 && cp->a3 == 0)
> > kvm_riscv_hfence_vvma_asid_all(vcpu->kvm,
> >                                                         hbase, hmask,
> > cp->a4);
> > =======
> >                  vmid = READ_ONCE(vcpu->kvm->arch.vmid.vmid);
> >                  if ((cp->a2 == 0 && cp->a3 == 0) || cp->a3 == -1UL)
> > kvm_riscv_hfence_vvma_asid_all(vcpu->kvm, hbase, hmask,
> >                                                         cp->a4, vmid);
> >  >>>>>>> 57ec61198cc1 (RISC-V: KVM: Pass VMID as parameter to
> > kvm_riscv_hfence_xyz() APIs)
> >
> >
>
> ohh you already queued the PATCH1 from v1 of this series. If I try to
> rebase on top of riscv_kvm_queue, I see the following error in b4 shazam.
>
> ---
> Patch failed at 0008 RISC-V: KVM: Factor-out MMU related declarations
> into separate headers.
> ----
>

Yes, first two patches are fixes for Linux-6.16

Regards,
Anup

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ