page_track.c 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Support KVM gust page tracking
  4. *
  5. * This feature allows us to track page access in guest. Currently, only
  6. * write access is tracked.
  7. *
  8. * Copyright(C) 2015 Intel Corporation.
  9. *
  10. * Author:
  11. * Xiao Guangrong <[email protected]>
  12. */
  13. #include <linux/kvm_host.h>
  14. #include <linux/rculist.h>
  15. #include <asm/kvm_page_track.h>
  16. #include "mmu.h"
  17. #include "mmu_internal.h"
  18. bool kvm_page_track_write_tracking_enabled(struct kvm *kvm)
  19. {
  20. return IS_ENABLED(CONFIG_KVM_EXTERNAL_WRITE_TRACKING) ||
  21. !tdp_enabled || kvm_shadow_root_allocated(kvm);
  22. }
  23. void kvm_page_track_free_memslot(struct kvm_memory_slot *slot)
  24. {
  25. int i;
  26. for (i = 0; i < KVM_PAGE_TRACK_MAX; i++) {
  27. kvfree(slot->arch.gfn_track[i]);
  28. slot->arch.gfn_track[i] = NULL;
  29. }
  30. }
  31. int kvm_page_track_create_memslot(struct kvm *kvm,
  32. struct kvm_memory_slot *slot,
  33. unsigned long npages)
  34. {
  35. int i;
  36. for (i = 0; i < KVM_PAGE_TRACK_MAX; i++) {
  37. if (i == KVM_PAGE_TRACK_WRITE &&
  38. !kvm_page_track_write_tracking_enabled(kvm))
  39. continue;
  40. slot->arch.gfn_track[i] =
  41. __vcalloc(npages, sizeof(*slot->arch.gfn_track[i]),
  42. GFP_KERNEL_ACCOUNT);
  43. if (!slot->arch.gfn_track[i])
  44. goto track_free;
  45. }
  46. return 0;
  47. track_free:
  48. kvm_page_track_free_memslot(slot);
  49. return -ENOMEM;
  50. }
  51. static inline bool page_track_mode_is_valid(enum kvm_page_track_mode mode)
  52. {
  53. if (mode < 0 || mode >= KVM_PAGE_TRACK_MAX)
  54. return false;
  55. return true;
  56. }
  57. int kvm_page_track_write_tracking_alloc(struct kvm_memory_slot *slot)
  58. {
  59. unsigned short *gfn_track;
  60. if (slot->arch.gfn_track[KVM_PAGE_TRACK_WRITE])
  61. return 0;
  62. gfn_track = __vcalloc(slot->npages, sizeof(*gfn_track),
  63. GFP_KERNEL_ACCOUNT);
  64. if (gfn_track == NULL)
  65. return -ENOMEM;
  66. slot->arch.gfn_track[KVM_PAGE_TRACK_WRITE] = gfn_track;
  67. return 0;
  68. }
  69. static void update_gfn_track(struct kvm_memory_slot *slot, gfn_t gfn,
  70. enum kvm_page_track_mode mode, short count)
  71. {
  72. int index, val;
  73. index = gfn_to_index(gfn, slot->base_gfn, PG_LEVEL_4K);
  74. val = slot->arch.gfn_track[mode][index];
  75. if (WARN_ON(val + count < 0 || val + count > USHRT_MAX))
  76. return;
  77. slot->arch.gfn_track[mode][index] += count;
  78. }
  79. /*
  80. * add guest page to the tracking pool so that corresponding access on that
  81. * page will be intercepted.
  82. *
  83. * It should be called under the protection both of mmu-lock and kvm->srcu
  84. * or kvm->slots_lock.
  85. *
  86. * @kvm: the guest instance we are interested in.
  87. * @slot: the @gfn belongs to.
  88. * @gfn: the guest page.
  89. * @mode: tracking mode, currently only write track is supported.
  90. */
  91. void kvm_slot_page_track_add_page(struct kvm *kvm,
  92. struct kvm_memory_slot *slot, gfn_t gfn,
  93. enum kvm_page_track_mode mode)
  94. {
  95. if (WARN_ON(!page_track_mode_is_valid(mode)))
  96. return;
  97. if (WARN_ON(mode == KVM_PAGE_TRACK_WRITE &&
  98. !kvm_page_track_write_tracking_enabled(kvm)))
  99. return;
  100. update_gfn_track(slot, gfn, mode, 1);
  101. /*
  102. * new track stops large page mapping for the
  103. * tracked page.
  104. */
  105. kvm_mmu_gfn_disallow_lpage(slot, gfn);
  106. if (mode == KVM_PAGE_TRACK_WRITE)
  107. if (kvm_mmu_slot_gfn_write_protect(kvm, slot, gfn, PG_LEVEL_4K))
  108. kvm_flush_remote_tlbs(kvm);
  109. }
  110. EXPORT_SYMBOL_GPL(kvm_slot_page_track_add_page);
  111. /*
  112. * remove the guest page from the tracking pool which stops the interception
  113. * of corresponding access on that page. It is the opposed operation of
  114. * kvm_slot_page_track_add_page().
  115. *
  116. * It should be called under the protection both of mmu-lock and kvm->srcu
  117. * or kvm->slots_lock.
  118. *
  119. * @kvm: the guest instance we are interested in.
  120. * @slot: the @gfn belongs to.
  121. * @gfn: the guest page.
  122. * @mode: tracking mode, currently only write track is supported.
  123. */
  124. void kvm_slot_page_track_remove_page(struct kvm *kvm,
  125. struct kvm_memory_slot *slot, gfn_t gfn,
  126. enum kvm_page_track_mode mode)
  127. {
  128. if (WARN_ON(!page_track_mode_is_valid(mode)))
  129. return;
  130. if (WARN_ON(mode == KVM_PAGE_TRACK_WRITE &&
  131. !kvm_page_track_write_tracking_enabled(kvm)))
  132. return;
  133. update_gfn_track(slot, gfn, mode, -1);
  134. /*
  135. * allow large page mapping for the tracked page
  136. * after the tracker is gone.
  137. */
  138. kvm_mmu_gfn_allow_lpage(slot, gfn);
  139. }
  140. EXPORT_SYMBOL_GPL(kvm_slot_page_track_remove_page);
  141. /*
  142. * check if the corresponding access on the specified guest page is tracked.
  143. */
  144. bool kvm_slot_page_track_is_active(struct kvm *kvm,
  145. const struct kvm_memory_slot *slot,
  146. gfn_t gfn, enum kvm_page_track_mode mode)
  147. {
  148. int index;
  149. if (WARN_ON(!page_track_mode_is_valid(mode)))
  150. return false;
  151. if (!slot)
  152. return false;
  153. if (mode == KVM_PAGE_TRACK_WRITE &&
  154. !kvm_page_track_write_tracking_enabled(kvm))
  155. return false;
  156. index = gfn_to_index(gfn, slot->base_gfn, PG_LEVEL_4K);
  157. return !!READ_ONCE(slot->arch.gfn_track[mode][index]);
  158. }
  159. void kvm_page_track_cleanup(struct kvm *kvm)
  160. {
  161. struct kvm_page_track_notifier_head *head;
  162. head = &kvm->arch.track_notifier_head;
  163. cleanup_srcu_struct(&head->track_srcu);
  164. }
  165. int kvm_page_track_init(struct kvm *kvm)
  166. {
  167. struct kvm_page_track_notifier_head *head;
  168. head = &kvm->arch.track_notifier_head;
  169. INIT_HLIST_HEAD(&head->track_notifier_list);
  170. return init_srcu_struct(&head->track_srcu);
  171. }
  172. /*
  173. * register the notifier so that event interception for the tracked guest
  174. * pages can be received.
  175. */
  176. void
  177. kvm_page_track_register_notifier(struct kvm *kvm,
  178. struct kvm_page_track_notifier_node *n)
  179. {
  180. struct kvm_page_track_notifier_head *head;
  181. head = &kvm->arch.track_notifier_head;
  182. write_lock(&kvm->mmu_lock);
  183. hlist_add_head_rcu(&n->node, &head->track_notifier_list);
  184. write_unlock(&kvm->mmu_lock);
  185. }
  186. EXPORT_SYMBOL_GPL(kvm_page_track_register_notifier);
  187. /*
  188. * stop receiving the event interception. It is the opposed operation of
  189. * kvm_page_track_register_notifier().
  190. */
  191. void
  192. kvm_page_track_unregister_notifier(struct kvm *kvm,
  193. struct kvm_page_track_notifier_node *n)
  194. {
  195. struct kvm_page_track_notifier_head *head;
  196. head = &kvm->arch.track_notifier_head;
  197. write_lock(&kvm->mmu_lock);
  198. hlist_del_rcu(&n->node);
  199. write_unlock(&kvm->mmu_lock);
  200. synchronize_srcu(&head->track_srcu);
  201. }
  202. EXPORT_SYMBOL_GPL(kvm_page_track_unregister_notifier);
  203. /*
  204. * Notify the node that write access is intercepted and write emulation is
  205. * finished at this time.
  206. *
  207. * The node should figure out if the written page is the one that node is
  208. * interested in by itself.
  209. */
  210. void kvm_page_track_write(struct kvm_vcpu *vcpu, gpa_t gpa, const u8 *new,
  211. int bytes)
  212. {
  213. struct kvm_page_track_notifier_head *head;
  214. struct kvm_page_track_notifier_node *n;
  215. int idx;
  216. head = &vcpu->kvm->arch.track_notifier_head;
  217. if (hlist_empty(&head->track_notifier_list))
  218. return;
  219. idx = srcu_read_lock(&head->track_srcu);
  220. hlist_for_each_entry_srcu(n, &head->track_notifier_list, node,
  221. srcu_read_lock_held(&head->track_srcu))
  222. if (n->track_write)
  223. n->track_write(vcpu, gpa, new, bytes, n);
  224. srcu_read_unlock(&head->track_srcu, idx);
  225. }
  226. /*
  227. * Notify the node that memory slot is being removed or moved so that it can
  228. * drop write-protection for the pages in the memory slot.
  229. *
  230. * The node should figure out it has any write-protected pages in this slot
  231. * by itself.
  232. */
  233. void kvm_page_track_flush_slot(struct kvm *kvm, struct kvm_memory_slot *slot)
  234. {
  235. struct kvm_page_track_notifier_head *head;
  236. struct kvm_page_track_notifier_node *n;
  237. int idx;
  238. head = &kvm->arch.track_notifier_head;
  239. if (hlist_empty(&head->track_notifier_list))
  240. return;
  241. idx = srcu_read_lock(&head->track_srcu);
  242. hlist_for_each_entry_srcu(n, &head->track_notifier_list, node,
  243. srcu_read_lock_held(&head->track_srcu))
  244. if (n->track_flush_slot)
  245. n->track_flush_slot(kvm, slot, n);
  246. srcu_read_unlock(&head->track_srcu, idx);
  247. }