On Wed, May 28, 2025 at 1:30 PM Sean Christopherson <seanjc@xxxxxxxxxx> wrote: > On Wed, May 28, 2025, James Houghton wrote: > > On Wed, May 28, 2025 at 11:09 AM James Houghton <jthoughton@xxxxxxxxxx> wrote: > > > On Tue, May 6, 2025 at 8:06 PM Sean Christopherson <seanjc@xxxxxxxxxx> wrote: > > > > @@ -2127,14 +2131,19 @@ void kvm_arch_commit_memory_region(struct kvm *kvm, > > > > const struct kvm_memory_slot *new, > > > > enum kvm_mr_change change) > > > > { > > > > - bool log_dirty_pages = new && new->flags & KVM_MEM_LOG_DIRTY_PAGES; > > > > + u32 old_flags = old ? old->flags : 0; > > > > + u32 new_flags = new ? new->flags : 0; > > > > + > > > > + /* Nothing to do if not toggling dirty logging. */ > > > > + if (!((old_flags ^ new_flags) & KVM_MEM_LOG_DIRTY_PAGES)) > > > > + return; > > > > > > This is my bug, not yours, but I think this condition must also check > > > that `change == KVM_MR_FLAGS_ONLY` for it to be correct. This, for > > > example, will break the case where we are deleting a memslot that > > > still has KVM_MEM_LOG_DIRTY_PAGES enabled. Will fix in the next > > > version. > > > > Ah it wouldn't break that example, as `new` would be NULL. But I think > > it would break the case where we are moving a memslot that keeps > > `KVM_MEM_LOG_DIRTY_PAGES`. > > Can you elaborate? Maybe with the full snippet of the final code that's broken. > I'm not entirely following what's path you're referring to. This is even more broken than I realized. I mean that this diff should be applied on top of your patch: diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c index 5e2ccde66f43c..f1db3f7742b28 100644 --- a/arch/arm64/kvm/mmu.c +++ b/arch/arm64/kvm/mmu.c @@ -2134,8 +2134,12 @@ void kvm_arch_commit_memory_region(struct kvm *kvm, u32 old_flags = old ? old->flags : 0; u32 new_flags = new ? new->flags : 0; - /* Nothing to do if not toggling dirty logging. */ - if (!((old_flags ^ new_flags) & KVM_MEM_LOG_DIRTY_PAGES)) + /* + * If only changing flags, nothing to do if not toggling + * dirty logging. + */ + if (change == KVM_MR_FLAGS_ONLY && + !((old_flags ^ new_flags) & KVM_MEM_LOG_DIRTY_PAGES)) return; /* So the final commit looks like: commit 3c4b57b25b1123629c5f2b64065d51ecdadb6771 Author: James Houghton <jthoughton@xxxxxxxxxx> Date: Tue May 6 15:38:31 2025 -0700 KVM: arm64: Add support for KVM userfault exits <to be written by James> Signed-off-by: James Houghton <jthoughton@xxxxxxxxxx> Signed-off-by: Sean Christopherson <seanjc@xxxxxxxxxx> diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c index c5d21bcfa3ed4..f1db3f7742b28 100644 --- a/arch/arm64/kvm/mmu.c +++ b/arch/arm64/kvm/mmu.c @@ -2127,15 +2131,23 @@ void kvm_arch_commit_memory_region(struct kvm *kvm, const struct kvm_memory_slot *new, enum kvm_mr_change change) { - bool log_dirty_pages = new && new->flags & KVM_MEM_LOG_DIRTY_PAGES; + u32 old_flags = old ? old->flags : 0; + u32 new_flags = new ? new->flags : 0; + + /* + * If only changing flags, nothing to do if not toggling + * dirty logging. + */ + if (change == KVM_MR_FLAGS_ONLY && + !((old_flags ^ new_flags) & KVM_MEM_LOG_DIRTY_PAGES)) + return; /* * At this point memslot has been committed and there is an * allocated dirty_bitmap[], dirty pages will be tracked while the * memory slot is write protected. */ - if (log_dirty_pages) { - + if (new_flags & KVM_MEM_LOG_DIRTY_PAGES) { if (change == KVM_MR_DELETE) return; So we need to bail out early if we are enabling KVM_MEM_USERFAULT but KVM_MEM_LOG_DIRTY_PAGES is already enabled, otherwise we'll be write-protecting a bunch of PTEs that we don't need or want to WP. When *disabling* KVM_MEM_USERFAULT, we definitely don't want to WP things, as we aren't going to get the unmap afterwards anyway. So the check we started with handles this: > > > > + u32 old_flags = old ? old->flags : 0; > > > > + u32 new_flags = new ? new->flags : 0; > > > > + > > > > + /* Nothing to do if not toggling dirty logging. */ > > > > + if (!((old_flags ^ new_flags) & KVM_MEM_LOG_DIRTY_PAGES)) > > > > + return; So why also check for `change == KVM_MR_FLAGS_ONLY` as well? Everything I just said doesn't really apply when the memslot is being created, moved, or destroyed. Otherwise, consider the case where we never enable dirty logging: - Memslot deletion would be totally broken; we'll see that KVM_MEM_LOG_DIRTY_PAGES is not getting toggled and then bail out, skipping some freeing. - Memslot creation would be broken in a similar way; we'll skip a bunch of setup work. - For memslot moving, the only case that we could possibly be leaving KVM_MEM_LOG_DIRTY_PAGES set without the change being KVM_MR_FLAGS_ONLY, I think we still need to do the split and WP stuff.