]> git.baikalelectronics.ru Git - kernel.git/commitdiff
RISC-V: KVM: Cleanup stale TLB entries when host CPU changes
authorAnup Patel <apatel@ventanamicro.com>
Mon, 9 May 2022 05:14:11 +0000 (10:44 +0530)
committerAnup Patel <anup@brainfault.org>
Fri, 20 May 2022 03:39:18 +0000 (09:09 +0530)
On RISC-V platforms with hardware VMID support, we share same
VMID for all VCPUs of a particular Guest/VM. This means we might
have stale G-stage TLB entries on the current Host CPU due to
some other VCPU of the same Guest which ran previously on the
current Host CPU.

To cleanup stale TLB entries, we simply flush all G-stage TLB
entries by VMID whenever underlying Host CPU changes for a VCPU.

Signed-off-by: Anup Patel <apatel@ventanamicro.com>
Reviewed-by: Atish Patra <atishp@rivosinc.com>
Signed-off-by: Anup Patel <anup@brainfault.org>
arch/riscv/include/asm/kvm_host.h
arch/riscv/kvm/tlb.c
arch/riscv/kvm/vcpu.c

index 01915d5f009449c854e3bbe08670ce2bd8bacb74..319c8aeb42af1580dde579753e467f61316b912e 100644 (file)
@@ -166,6 +166,9 @@ struct kvm_vcpu_arch {
        /* VCPU ran at least once */
        bool ran_atleast_once;
 
+       /* Last Host CPU on which Guest VCPU exited */
+       int last_exit_cpu;
+
        /* ISA feature bits (similar to MISA) */
        unsigned long isa;
 
@@ -253,6 +256,8 @@ void kvm_riscv_local_hfence_vvma_gva(unsigned long vmid,
                                     unsigned long order);
 void kvm_riscv_local_hfence_vvma_all(unsigned long vmid);
 
+void kvm_riscv_local_tlb_sanitize(struct kvm_vcpu *vcpu);
+
 void kvm_riscv_fence_i_process(struct kvm_vcpu *vcpu);
 void kvm_riscv_hfence_gvma_vmid_all_process(struct kvm_vcpu *vcpu);
 void kvm_riscv_hfence_vvma_all_process(struct kvm_vcpu *vcpu);
index c0f86d09c41d2bba1f7fee146487104a6bfd66ef..1a76d0b1907d54b43dca41f55878aba4da199ba7 100644 (file)
@@ -215,6 +215,29 @@ void kvm_riscv_local_hfence_vvma_all(unsigned long vmid)
        csr_write(CSR_HGATP, hgatp);
 }
 
+void kvm_riscv_local_tlb_sanitize(struct kvm_vcpu *vcpu)
+{
+       unsigned long vmid;
+
+       if (!kvm_riscv_gstage_vmid_bits() ||
+           vcpu->arch.last_exit_cpu == vcpu->cpu)
+               return;
+
+       /*
+        * On RISC-V platforms with hardware VMID support, we share same
+        * VMID for all VCPUs of a particular Guest/VM. This means we might
+        * have stale G-stage TLB entries on the current Host CPU due to
+        * some other VCPU of the same Guest which ran previously on the
+        * current Host CPU.
+        *
+        * To cleanup stale TLB entries, we simply flush all G-stage TLB
+        * entries by VMID whenever underlying Host CPU changes for a VCPU.
+        */
+
+       vmid = READ_ONCE(vcpu->kvm->arch.vmid.vmid);
+       kvm_riscv_local_hfence_gvma_vmid_all(vmid);
+}
+
 void kvm_riscv_fence_i_process(struct kvm_vcpu *vcpu)
 {
        local_flush_icache_all();
index 88b8c0fb5f5efa4a779840b0181187f5737ecd78..a7c8400f16b5fed2cbe8a4b4bbaed885f3abe3d6 100644 (file)
@@ -67,6 +67,8 @@ static void kvm_riscv_reset_vcpu(struct kvm_vcpu *vcpu)
        if (loaded)
                kvm_arch_vcpu_put(vcpu);
 
+       vcpu->arch.last_exit_cpu = -1;
+
        memcpy(csr, reset_csr, sizeof(*csr));
 
        memcpy(cntx, reset_cntx, sizeof(*cntx));
@@ -735,6 +737,7 @@ static void noinstr kvm_riscv_vcpu_enter_exit(struct kvm_vcpu *vcpu)
 {
        guest_state_enter_irqoff();
        __kvm_riscv_switch_to(&vcpu->arch);
+       vcpu->arch.last_exit_cpu = vcpu->cpu;
        guest_state_exit_irqoff();
 }
 
@@ -829,6 +832,14 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu)
                        continue;
                }
 
+               /*
+                * Cleanup stale TLB enteries
+                *
+                * Note: This should be done after G-stage VMID has been
+                * updated using kvm_riscv_gstage_vmid_ver_changed()
+                */
+               kvm_riscv_local_tlb_sanitize(vcpu);
+
                guest_timing_enter_irqoff();
 
                kvm_riscv_vcpu_enter_exit(vcpu);