162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * KVM dirty ring implementation 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright 2019 Red Hat, Inc. 662306a36Sopenharmony_ci */ 762306a36Sopenharmony_ci#include <linux/kvm_host.h> 862306a36Sopenharmony_ci#include <linux/kvm.h> 962306a36Sopenharmony_ci#include <linux/vmalloc.h> 1062306a36Sopenharmony_ci#include <linux/kvm_dirty_ring.h> 1162306a36Sopenharmony_ci#include <trace/events/kvm.h> 1262306a36Sopenharmony_ci#include "kvm_mm.h" 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ciint __weak kvm_cpu_dirty_log_size(void) 1562306a36Sopenharmony_ci{ 1662306a36Sopenharmony_ci return 0; 1762306a36Sopenharmony_ci} 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ciu32 kvm_dirty_ring_get_rsvd_entries(void) 2062306a36Sopenharmony_ci{ 2162306a36Sopenharmony_ci return KVM_DIRTY_RING_RSVD_ENTRIES + kvm_cpu_dirty_log_size(); 2262306a36Sopenharmony_ci} 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_cibool kvm_use_dirty_bitmap(struct kvm *kvm) 2562306a36Sopenharmony_ci{ 2662306a36Sopenharmony_ci lockdep_assert_held(&kvm->slots_lock); 2762306a36Sopenharmony_ci 2862306a36Sopenharmony_ci return !kvm->dirty_ring_size || kvm->dirty_ring_with_bitmap; 2962306a36Sopenharmony_ci} 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_ci#ifndef CONFIG_NEED_KVM_DIRTY_RING_WITH_BITMAP 3262306a36Sopenharmony_cibool kvm_arch_allow_write_without_running_vcpu(struct kvm *kvm) 3362306a36Sopenharmony_ci{ 3462306a36Sopenharmony_ci return false; 3562306a36Sopenharmony_ci} 3662306a36Sopenharmony_ci#endif 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_cistatic u32 kvm_dirty_ring_used(struct kvm_dirty_ring *ring) 3962306a36Sopenharmony_ci{ 4062306a36Sopenharmony_ci return READ_ONCE(ring->dirty_index) - READ_ONCE(ring->reset_index); 4162306a36Sopenharmony_ci} 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_cistatic bool kvm_dirty_ring_soft_full(struct kvm_dirty_ring *ring) 4462306a36Sopenharmony_ci{ 4562306a36Sopenharmony_ci return kvm_dirty_ring_used(ring) >= ring->soft_limit; 4662306a36Sopenharmony_ci} 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_cistatic bool kvm_dirty_ring_full(struct kvm_dirty_ring *ring) 4962306a36Sopenharmony_ci{ 5062306a36Sopenharmony_ci return kvm_dirty_ring_used(ring) >= ring->size; 5162306a36Sopenharmony_ci} 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_cistatic void kvm_reset_dirty_gfn(struct kvm *kvm, u32 slot, u64 offset, u64 mask) 5462306a36Sopenharmony_ci{ 5562306a36Sopenharmony_ci struct kvm_memory_slot *memslot; 5662306a36Sopenharmony_ci int as_id, id; 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_ci as_id = slot >> 16; 5962306a36Sopenharmony_ci id = (u16)slot; 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_ci if (as_id >= KVM_ADDRESS_SPACE_NUM || id >= KVM_USER_MEM_SLOTS) 6262306a36Sopenharmony_ci return; 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci memslot = id_to_memslot(__kvm_memslots(kvm, as_id), id); 6562306a36Sopenharmony_ci 6662306a36Sopenharmony_ci if (!memslot || (offset + __fls(mask)) >= memslot->npages) 6762306a36Sopenharmony_ci return; 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci KVM_MMU_LOCK(kvm); 7062306a36Sopenharmony_ci kvm_arch_mmu_enable_log_dirty_pt_masked(kvm, memslot, offset, mask); 7162306a36Sopenharmony_ci KVM_MMU_UNLOCK(kvm); 7262306a36Sopenharmony_ci} 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ciint kvm_dirty_ring_alloc(struct kvm_dirty_ring *ring, int index, u32 size) 7562306a36Sopenharmony_ci{ 7662306a36Sopenharmony_ci ring->dirty_gfns = vzalloc(size); 7762306a36Sopenharmony_ci if (!ring->dirty_gfns) 7862306a36Sopenharmony_ci return -ENOMEM; 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci ring->size = size / sizeof(struct kvm_dirty_gfn); 8162306a36Sopenharmony_ci ring->soft_limit = ring->size - kvm_dirty_ring_get_rsvd_entries(); 8262306a36Sopenharmony_ci ring->dirty_index = 0; 8362306a36Sopenharmony_ci ring->reset_index = 0; 8462306a36Sopenharmony_ci ring->index = index; 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_ci return 0; 8762306a36Sopenharmony_ci} 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_cistatic inline void kvm_dirty_gfn_set_invalid(struct kvm_dirty_gfn *gfn) 9062306a36Sopenharmony_ci{ 9162306a36Sopenharmony_ci smp_store_release(&gfn->flags, 0); 9262306a36Sopenharmony_ci} 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_cistatic inline void kvm_dirty_gfn_set_dirtied(struct kvm_dirty_gfn *gfn) 9562306a36Sopenharmony_ci{ 9662306a36Sopenharmony_ci gfn->flags = KVM_DIRTY_GFN_F_DIRTY; 9762306a36Sopenharmony_ci} 9862306a36Sopenharmony_ci 9962306a36Sopenharmony_cistatic inline bool kvm_dirty_gfn_harvested(struct kvm_dirty_gfn *gfn) 10062306a36Sopenharmony_ci{ 10162306a36Sopenharmony_ci return smp_load_acquire(&gfn->flags) & KVM_DIRTY_GFN_F_RESET; 10262306a36Sopenharmony_ci} 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ciint kvm_dirty_ring_reset(struct kvm *kvm, struct kvm_dirty_ring *ring) 10562306a36Sopenharmony_ci{ 10662306a36Sopenharmony_ci u32 cur_slot, next_slot; 10762306a36Sopenharmony_ci u64 cur_offset, next_offset; 10862306a36Sopenharmony_ci unsigned long mask; 10962306a36Sopenharmony_ci int count = 0; 11062306a36Sopenharmony_ci struct kvm_dirty_gfn *entry; 11162306a36Sopenharmony_ci bool first_round = true; 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_ci /* This is only needed to make compilers happy */ 11462306a36Sopenharmony_ci cur_slot = cur_offset = mask = 0; 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci while (true) { 11762306a36Sopenharmony_ci entry = &ring->dirty_gfns[ring->reset_index & (ring->size - 1)]; 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci if (!kvm_dirty_gfn_harvested(entry)) 12062306a36Sopenharmony_ci break; 12162306a36Sopenharmony_ci 12262306a36Sopenharmony_ci next_slot = READ_ONCE(entry->slot); 12362306a36Sopenharmony_ci next_offset = READ_ONCE(entry->offset); 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_ci /* Update the flags to reflect that this GFN is reset */ 12662306a36Sopenharmony_ci kvm_dirty_gfn_set_invalid(entry); 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci ring->reset_index++; 12962306a36Sopenharmony_ci count++; 13062306a36Sopenharmony_ci /* 13162306a36Sopenharmony_ci * Try to coalesce the reset operations when the guest is 13262306a36Sopenharmony_ci * scanning pages in the same slot. 13362306a36Sopenharmony_ci */ 13462306a36Sopenharmony_ci if (!first_round && next_slot == cur_slot) { 13562306a36Sopenharmony_ci s64 delta = next_offset - cur_offset; 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci if (delta >= 0 && delta < BITS_PER_LONG) { 13862306a36Sopenharmony_ci mask |= 1ull << delta; 13962306a36Sopenharmony_ci continue; 14062306a36Sopenharmony_ci } 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci /* Backwards visit, careful about overflows! */ 14362306a36Sopenharmony_ci if (delta > -BITS_PER_LONG && delta < 0 && 14462306a36Sopenharmony_ci (mask << -delta >> -delta) == mask) { 14562306a36Sopenharmony_ci cur_offset = next_offset; 14662306a36Sopenharmony_ci mask = (mask << -delta) | 1; 14762306a36Sopenharmony_ci continue; 14862306a36Sopenharmony_ci } 14962306a36Sopenharmony_ci } 15062306a36Sopenharmony_ci kvm_reset_dirty_gfn(kvm, cur_slot, cur_offset, mask); 15162306a36Sopenharmony_ci cur_slot = next_slot; 15262306a36Sopenharmony_ci cur_offset = next_offset; 15362306a36Sopenharmony_ci mask = 1; 15462306a36Sopenharmony_ci first_round = false; 15562306a36Sopenharmony_ci } 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci kvm_reset_dirty_gfn(kvm, cur_slot, cur_offset, mask); 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_ci /* 16062306a36Sopenharmony_ci * The request KVM_REQ_DIRTY_RING_SOFT_FULL will be cleared 16162306a36Sopenharmony_ci * by the VCPU thread next time when it enters the guest. 16262306a36Sopenharmony_ci */ 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_ci trace_kvm_dirty_ring_reset(ring); 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_ci return count; 16762306a36Sopenharmony_ci} 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_civoid kvm_dirty_ring_push(struct kvm_vcpu *vcpu, u32 slot, u64 offset) 17062306a36Sopenharmony_ci{ 17162306a36Sopenharmony_ci struct kvm_dirty_ring *ring = &vcpu->dirty_ring; 17262306a36Sopenharmony_ci struct kvm_dirty_gfn *entry; 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci /* It should never get full */ 17562306a36Sopenharmony_ci WARN_ON_ONCE(kvm_dirty_ring_full(ring)); 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_ci entry = &ring->dirty_gfns[ring->dirty_index & (ring->size - 1)]; 17862306a36Sopenharmony_ci 17962306a36Sopenharmony_ci entry->slot = slot; 18062306a36Sopenharmony_ci entry->offset = offset; 18162306a36Sopenharmony_ci /* 18262306a36Sopenharmony_ci * Make sure the data is filled in before we publish this to 18362306a36Sopenharmony_ci * the userspace program. There's no paired kernel-side reader. 18462306a36Sopenharmony_ci */ 18562306a36Sopenharmony_ci smp_wmb(); 18662306a36Sopenharmony_ci kvm_dirty_gfn_set_dirtied(entry); 18762306a36Sopenharmony_ci ring->dirty_index++; 18862306a36Sopenharmony_ci trace_kvm_dirty_ring_push(ring, slot, offset); 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_ci if (kvm_dirty_ring_soft_full(ring)) 19162306a36Sopenharmony_ci kvm_make_request(KVM_REQ_DIRTY_RING_SOFT_FULL, vcpu); 19262306a36Sopenharmony_ci} 19362306a36Sopenharmony_ci 19462306a36Sopenharmony_cibool kvm_dirty_ring_check_request(struct kvm_vcpu *vcpu) 19562306a36Sopenharmony_ci{ 19662306a36Sopenharmony_ci /* 19762306a36Sopenharmony_ci * The VCPU isn't runnable when the dirty ring becomes soft full. 19862306a36Sopenharmony_ci * The KVM_REQ_DIRTY_RING_SOFT_FULL event is always set to prevent 19962306a36Sopenharmony_ci * the VCPU from running until the dirty pages are harvested and 20062306a36Sopenharmony_ci * the dirty ring is reset by userspace. 20162306a36Sopenharmony_ci */ 20262306a36Sopenharmony_ci if (kvm_check_request(KVM_REQ_DIRTY_RING_SOFT_FULL, vcpu) && 20362306a36Sopenharmony_ci kvm_dirty_ring_soft_full(&vcpu->dirty_ring)) { 20462306a36Sopenharmony_ci kvm_make_request(KVM_REQ_DIRTY_RING_SOFT_FULL, vcpu); 20562306a36Sopenharmony_ci vcpu->run->exit_reason = KVM_EXIT_DIRTY_RING_FULL; 20662306a36Sopenharmony_ci trace_kvm_dirty_ring_exit(vcpu); 20762306a36Sopenharmony_ci return true; 20862306a36Sopenharmony_ci } 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ci return false; 21162306a36Sopenharmony_ci} 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_cistruct page *kvm_dirty_ring_get_page(struct kvm_dirty_ring *ring, u32 offset) 21462306a36Sopenharmony_ci{ 21562306a36Sopenharmony_ci return vmalloc_to_page((void *)ring->dirty_gfns + offset * PAGE_SIZE); 21662306a36Sopenharmony_ci} 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_civoid kvm_dirty_ring_free(struct kvm_dirty_ring *ring) 21962306a36Sopenharmony_ci{ 22062306a36Sopenharmony_ci vfree(ring->dirty_gfns); 22162306a36Sopenharmony_ci ring->dirty_gfns = NULL; 22262306a36Sopenharmony_ci} 223