lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c7b88a13-a678-4276-b7bd-383a98836d21@linux.dev>
Date: Tue, 17 Jun 2025 23:40:08 -0700
From: Atish Patra <atish.patra@...ux.dev>
To: Anup Patel <apatel@...tanamicro.com>
Cc: Palmer Dabbelt <palmer@...belt.com>,
 Paul Walmsley <paul.walmsley@...ive.com>, Alexandre Ghiti <alex@...ti.fr>,
 Andrew Jones <ajones@...tanamicro.com>, Anup Patel <anup@...infault.org>,
 kvm@...r.kernel.org, kvm-riscv@...ts.infradead.org,
 linux-riscv@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2 12/12] RISC-V: KVM: Pass VMID as parameter to
 kvm_riscv_hfence_xyz() APIs


On 6/16/25 10:11 PM, Anup Patel wrote:
> On Sun, Jun 15, 2025 at 12:48 AM Atish Patra <atish.patra@...ux.dev> wrote:
>>
>>
>> On 6/14/25 12:12 PM, Atish Patra wrote:
>>> On 6/12/25 11:57 PM, Anup Patel wrote:
>>>> Currently, all kvm_riscv_hfence_xyz() APIs assume VMID to be the
>>>> host VMID of the Guest/VM which resticts use of these APIs only
>>>> for host TLB maintenance. Let's allow passing VMID as a parameter
>>>> to all kvm_riscv_hfence_xyz() APIs so that they can be re-used
>>>> for nested virtualization related TLB maintenance.
>>>>
>>>> Signed-off-by: Anup Patel <apatel@...tanamicro.com>
>>>> ---
>>>>    arch/riscv/include/asm/kvm_tlb.h  | 17 ++++++---
>>>>    arch/riscv/kvm/gstage.c           |  3 +-
>>>>    arch/riscv/kvm/tlb.c              | 61 ++++++++++++++++++++-----------
>>>>    arch/riscv/kvm/vcpu_sbi_replace.c | 17 +++++----
>>>>    arch/riscv/kvm/vcpu_sbi_v01.c     | 25 ++++++-------
>>>>    5 files changed, 73 insertions(+), 50 deletions(-)
>>>>
>>>> diff --git a/arch/riscv/include/asm/kvm_tlb.h b/arch/riscv/include/
>>>> asm/kvm_tlb.h
>>>> index f67e03edeaec..38a2f933ad3a 100644
>>>> --- a/arch/riscv/include/asm/kvm_tlb.h
>>>> +++ b/arch/riscv/include/asm/kvm_tlb.h
>>>> @@ -11,9 +11,11 @@
>>>>    enum kvm_riscv_hfence_type {
>>>>        KVM_RISCV_HFENCE_UNKNOWN = 0,
>>>>        KVM_RISCV_HFENCE_GVMA_VMID_GPA,
>>>> +    KVM_RISCV_HFENCE_GVMA_VMID_ALL,
>>>>        KVM_RISCV_HFENCE_VVMA_ASID_GVA,
>>>>        KVM_RISCV_HFENCE_VVMA_ASID_ALL,
>>>>        KVM_RISCV_HFENCE_VVMA_GVA,
>>>> +    KVM_RISCV_HFENCE_VVMA_ALL
>>>>    };
>>>>    struct kvm_riscv_hfence {
>>>> @@ -59,21 +61,24 @@ void kvm_riscv_fence_i(struct kvm *kvm,
>>>>    void kvm_riscv_hfence_gvma_vmid_gpa(struct kvm *kvm,
>>>>                        unsigned long hbase, unsigned long hmask,
>>>>                        gpa_t gpa, gpa_t gpsz,
>>>> -                    unsigned long order);
>>>> +                    unsigned long order, unsigned long vmid);
>>>>    void kvm_riscv_hfence_gvma_vmid_all(struct kvm *kvm,
>>>> -                    unsigned long hbase, unsigned long hmask);
>>>> +                    unsigned long hbase, unsigned long hmask,
>>>> +                    unsigned long vmid);
>>>>    void kvm_riscv_hfence_vvma_asid_gva(struct kvm *kvm,
>>>>                        unsigned long hbase, unsigned long hmask,
>>>>                        unsigned long gva, unsigned long gvsz,
>>>> -                    unsigned long order, unsigned long asid);
>>>> +                    unsigned long order, unsigned long asid,
>>>> +                    unsigned long vmid);
>>>>    void kvm_riscv_hfence_vvma_asid_all(struct kvm *kvm,
>>>>                        unsigned long hbase, unsigned long hmask,
>>>> -                    unsigned long asid);
>>>> +                    unsigned long asid, unsigned long vmid);
>>>>    void kvm_riscv_hfence_vvma_gva(struct kvm *kvm,
>>>>                       unsigned long hbase, unsigned long hmask,
>>>>                       unsigned long gva, unsigned long gvsz,
>>>> -                   unsigned long order);
>>>> +                   unsigned long order, unsigned long vmid);
>>>>    void kvm_riscv_hfence_vvma_all(struct kvm *kvm,
>>>> -                   unsigned long hbase, unsigned long hmask);
>>>> +                   unsigned long hbase, unsigned long hmask,
>>>> +                   unsigned long vmid);
>>>>    #endif
>>>> diff --git a/arch/riscv/kvm/gstage.c b/arch/riscv/kvm/gstage.c
>>>> index 9c7c44f09b05..24c270d6d0e2 100644
>>>> --- a/arch/riscv/kvm/gstage.c
>>>> +++ b/arch/riscv/kvm/gstage.c
>>>> @@ -117,7 +117,8 @@ static void gstage_tlb_flush(struct kvm_gstage
>>>> *gstage, u32 level, gpa_t addr)
>>>>        if (gstage->flags & KVM_GSTAGE_FLAGS_LOCAL)
>>>>            kvm_riscv_local_hfence_gvma_vmid_gpa(gstage->vmid, addr,
>>>> BIT(order), order);
>>>>        else
>>>> -        kvm_riscv_hfence_gvma_vmid_gpa(gstage->kvm, -1UL, 0, addr,
>>>> BIT(order), order);
>>>> +        kvm_riscv_hfence_gvma_vmid_gpa(gstage->kvm, -1UL, 0, addr,
>>>> BIT(order), order,
>>>> +                           gstage->vmid);
>>>>    }
>>>>    int kvm_riscv_gstage_set_pte(struct kvm_gstage *gstage,
>>>> diff --git a/arch/riscv/kvm/tlb.c b/arch/riscv/kvm/tlb.c
>>>> index 349fcfc93f54..3c5a70a2b927 100644
>>>> --- a/arch/riscv/kvm/tlb.c
>>>> +++ b/arch/riscv/kvm/tlb.c
>>>> @@ -251,6 +251,12 @@ void kvm_riscv_hfence_process(struct kvm_vcpu *vcpu)
>>>>                    kvm_riscv_local_hfence_gvma_vmid_gpa(d.vmid, d.addr,
>>>>                                         d.size, d.order);
>>>>                break;
>>>> +        case KVM_RISCV_HFENCE_GVMA_VMID_ALL:
>>>> +            if (kvm_riscv_nacl_available())
>>>> +                nacl_hfence_gvma_vmid_all(nacl_shmem(), d.vmid);
>>>> +            else
>>>> +                kvm_riscv_local_hfence_gvma_vmid_all(d.vmid);
>>>> +            break;
>>>>            case KVM_RISCV_HFENCE_VVMA_ASID_GVA:
>>>>                kvm_riscv_vcpu_pmu_incr_fw(vcpu,
>>>> SBI_PMU_FW_HFENCE_VVMA_ASID_RCVD);
>>>>                if (kvm_riscv_nacl_available())
>>>> @@ -276,6 +282,13 @@ void kvm_riscv_hfence_process(struct kvm_vcpu *vcpu)
>>>>                    kvm_riscv_local_hfence_vvma_gva(d.vmid, d.addr,
>>>>                                    d.size, d.order);
>>>>                break;
>>>> +        case KVM_RISCV_HFENCE_VVMA_ALL:
>>>> +            kvm_riscv_vcpu_pmu_incr_fw(vcpu,
>>>> SBI_PMU_FW_HFENCE_VVMA_RCVD);
>>>> +            if (kvm_riscv_nacl_available())
>>>> +                nacl_hfence_vvma_all(nacl_shmem(), d.vmid);
>>>> +            else
>>>> +                kvm_riscv_local_hfence_vvma_all(d.vmid);
>>>> +            break;
>>>>            default:
>>>>                break;
>>>>            }
>>>> @@ -328,14 +341,13 @@ void kvm_riscv_fence_i(struct kvm *kvm,
>>>>    void kvm_riscv_hfence_gvma_vmid_gpa(struct kvm *kvm,
>>>>                        unsigned long hbase, unsigned long hmask,
>>>>                        gpa_t gpa, gpa_t gpsz,
>>>> -                    unsigned long order)
>>>> +                    unsigned long order, unsigned long vmid)
>>>>    {
>>>> -    struct kvm_vmid *v = &kvm->arch.vmid;
>>>>        struct kvm_riscv_hfence data;
>>>>        data.type = KVM_RISCV_HFENCE_GVMA_VMID_GPA;
>>>>        data.asid = 0;
>>>> -    data.vmid = READ_ONCE(v->vmid);
>>>> +    data.vmid = vmid;
>>>>        data.addr = gpa;
>>>>        data.size = gpsz;
>>>>        data.order = order;
>>>> @@ -344,23 +356,28 @@ void kvm_riscv_hfence_gvma_vmid_gpa(struct kvm
>>>> *kvm,
>>>>    }
>>>>    void kvm_riscv_hfence_gvma_vmid_all(struct kvm *kvm,
>>>> -                    unsigned long hbase, unsigned long hmask)
>>>> +                    unsigned long hbase, unsigned long hmask,
>>>> +                    unsigned long vmid)
>>>>    {
>>>> -    make_xfence_request(kvm, hbase, hmask, KVM_REQ_TLB_FLUSH,
>>>> -                KVM_REQ_TLB_FLUSH, NULL);
>>>> +    struct kvm_riscv_hfence data = {0};
>>>> +
>>>> +    data.type = KVM_RISCV_HFENCE_GVMA_VMID_ALL;
>>>> +    data.vmid = vmid;
>>>> +    make_xfence_request(kvm, hbase, hmask, KVM_REQ_HFENCE,
>>>> +                KVM_REQ_TLB_FLUSH, &data);
>>>>    }
>>>>    void kvm_riscv_hfence_vvma_asid_gva(struct kvm *kvm,
>>>>                        unsigned long hbase, unsigned long hmask,
>>>>                        unsigned long gva, unsigned long gvsz,
>>>> -                    unsigned long order, unsigned long asid)
>>>> +                    unsigned long order, unsigned long asid,
>>>> +                    unsigned long vmid)
>>>>    {
>>>> -    struct kvm_vmid *v = &kvm->arch.vmid;
>>>>        struct kvm_riscv_hfence data;
>>>>        data.type = KVM_RISCV_HFENCE_VVMA_ASID_GVA;
>>>>        data.asid = asid;
>>>> -    data.vmid = READ_ONCE(v->vmid);
>>>> +    data.vmid = vmid;
>>>>        data.addr = gva;
>>>>        data.size = gvsz;
>>>>        data.order = order;
>>>> @@ -370,15 +387,13 @@ void kvm_riscv_hfence_vvma_asid_gva(struct kvm
>>>> *kvm,
>>>>    void kvm_riscv_hfence_vvma_asid_all(struct kvm *kvm,
>>>>                        unsigned long hbase, unsigned long hmask,
>>>> -                    unsigned long asid)
>>>> +                    unsigned long asid, unsigned long vmid)
>>>>    {
>>>> -    struct kvm_vmid *v = &kvm->arch.vmid;
>>>> -    struct kvm_riscv_hfence data;
>>>> +    struct kvm_riscv_hfence data = {0};
>>>>        data.type = KVM_RISCV_HFENCE_VVMA_ASID_ALL;
>>>>        data.asid = asid;
>>>> -    data.vmid = READ_ONCE(v->vmid);
>>>> -    data.addr = data.size = data.order = 0;
>>>> +    data.vmid = vmid;
>>>>        make_xfence_request(kvm, hbase, hmask, KVM_REQ_HFENCE,
>>>>                    KVM_REQ_HFENCE_VVMA_ALL, &data);
>>>>    }
>>>> @@ -386,14 +401,13 @@ void kvm_riscv_hfence_vvma_asid_all(struct kvm
>>>> *kvm,
>>>>    void kvm_riscv_hfence_vvma_gva(struct kvm *kvm,
>>>>                       unsigned long hbase, unsigned long hmask,
>>>>                       unsigned long gva, unsigned long gvsz,
>>>> -                   unsigned long order)
>>>> +                   unsigned long order, unsigned long vmid)
>>>>    {
>>>> -    struct kvm_vmid *v = &kvm->arch.vmid;
>>>>        struct kvm_riscv_hfence data;
>>>>        data.type = KVM_RISCV_HFENCE_VVMA_GVA;
>>>>        data.asid = 0;
>>>> -    data.vmid = READ_ONCE(v->vmid);
>>>> +    data.vmid = vmid;
>>>>        data.addr = gva;
>>>>        data.size = gvsz;
>>>>        data.order = order;
>>>> @@ -402,16 +416,21 @@ void kvm_riscv_hfence_vvma_gva(struct kvm *kvm,
>>>>    }
>>>>    void kvm_riscv_hfence_vvma_all(struct kvm *kvm,
>>>> -                   unsigned long hbase, unsigned long hmask)
>>>> +                   unsigned long hbase, unsigned long hmask,
>>>> +                   unsigned long vmid)
>>>>    {
>>>> -    make_xfence_request(kvm, hbase, hmask, KVM_REQ_HFENCE_VVMA_ALL,
>>>> -                KVM_REQ_HFENCE_VVMA_ALL, NULL);
>>>> +    struct kvm_riscv_hfence data = {0};
>>>> +
>>>> +    data.type = KVM_RISCV_HFENCE_VVMA_ALL;
>>>> +    data.vmid = vmid;
>>>> +    make_xfence_request(kvm, hbase, hmask, KVM_REQ_HFENCE,
>>>> +                KVM_REQ_HFENCE_VVMA_ALL, &data);
>>>>    }
>>>>    int kvm_arch_flush_remote_tlbs_range(struct kvm *kvm, gfn_t gfn, u64
>>>> nr_pages)
>>>>    {
>>>>        kvm_riscv_hfence_gvma_vmid_gpa(kvm, -1UL, 0,
>>>>                           gfn << PAGE_SHIFT, nr_pages << PAGE_SHIFT,
>>>> -                       PAGE_SHIFT);
>>>> +                       PAGE_SHIFT, READ_ONCE(kvm->arch.vmid.vmid));
>>>>        return 0;
>>>>    }
>>>> diff --git a/arch/riscv/kvm/vcpu_sbi_replace.c b/arch/riscv/kvm/
>>>> vcpu_sbi_replace.c
>>>> index b17fad091bab..b490ed1428a6 100644
>>>> --- a/arch/riscv/kvm/vcpu_sbi_replace.c
>>>> +++ b/arch/riscv/kvm/vcpu_sbi_replace.c
>>>> @@ -96,6 +96,7 @@ static int kvm_sbi_ext_rfence_handler(struct
>>>> kvm_vcpu *vcpu, struct kvm_run *run
>>>>        unsigned long hmask = cp->a0;
>>>>        unsigned long hbase = cp->a1;
>>>>        unsigned long funcid = cp->a6;
>>>> +    unsigned long vmid;
>>>>        switch (funcid) {
>>>>        case SBI_EXT_RFENCE_REMOTE_FENCE_I:
>>>> @@ -103,22 +104,22 @@ static int kvm_sbi_ext_rfence_handler(struct
>>>> kvm_vcpu *vcpu, struct kvm_run *run
>>>>            kvm_riscv_vcpu_pmu_incr_fw(vcpu, SBI_PMU_FW_FENCE_I_SENT);
>>>>            break;
>>>>        case SBI_EXT_RFENCE_REMOTE_SFENCE_VMA:
>>>> +        vmid = READ_ONCE(vcpu->kvm->arch.vmid.vmid);
>>>>            if ((cp->a2 == 0 && cp->a3 == 0) || cp->a3 == -1UL)
>>>> -            kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase, hmask);
>>>> +            kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase, hmask, vmid);
>>> This patch doesn't apply cleanly on 6.16-rc1.
>>>
>>> <<<<<<< HEAD
>>>                   if (cp->a2 == 0 && cp->a3 == 0)
>>>                           kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase,
>>> hmask);
>>> =======
>>>                   vmid = READ_ONCE(vcpu->kvm->arch.vmid.vmid);
>>>                   if ((cp->a2 == 0 && cp->a3 == 0) || cp->a3 == -1UL)
>>>                           kvm_riscv_hfence_vvma_all(vcpu->kvm, hbase,
>>> hmask, vmid);
>>>   >>>>>>> 57ec61198cc1 (RISC-V: KVM: Pass VMID as parameter to
>>> kvm_riscv_hfence_xyz() APIs)
>>> else
>>>                           kvm_riscv_hfence_vvma_gva(vcpu->kvm, hbase, hmask,
>>>                                                     cp->a2, cp->a3,
>>> PAGE_SHIFT, vmid);
>>>                   kvm_riscv_vcpu_pmu_incr_fw(vcpu,
>>> SBI_PMU_FW_HFENCE_VVMA_SENT);
>>> break;
>>>           case SBI_EXT_RFENCE_REMOTE_SFENCE_VMA_ASID:
>>> <<<<<<< HEAD
>>>                   if (cp->a2 == 0 && cp->a3 == 0)
>>> kvm_riscv_hfence_vvma_asid_all(vcpu->kvm,
>>>                                                          hbase, hmask,
>>> cp->a4);
>>> =======
>>>                   vmid = READ_ONCE(vcpu->kvm->arch.vmid.vmid);
>>>                   if ((cp->a2 == 0 && cp->a3 == 0) || cp->a3 == -1UL)
>>> kvm_riscv_hfence_vvma_asid_all(vcpu->kvm, hbase, hmask,
>>>                                                          cp->a4, vmid);
>>>   >>>>>>> 57ec61198cc1 (RISC-V: KVM: Pass VMID as parameter to
>>> kvm_riscv_hfence_xyz() APIs)
>>>
>>>
>> ohh you already queued the PATCH1 from v1 of this series. If I try to
>> rebase on top of riscv_kvm_queue, I see the following error in b4 shazam.
>>
>> ---
>> Patch failed at 0008 RISC-V: KVM: Factor-out MMU related declarations
>> into separate headers.
>> ----
>>
> Yes, first two patches are fixes for Linux-6.16
Ahh I see the fixes branch was updated yesterday. The rebase works 
cleanly now. Thanks.
> Regards,
> Anup

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ