xref: /linux/arch/x86/kvm/mmu/tdp_mmu.c (revision 24168c5e6dfbdd5b414f048f47f75d64533296ca)
1 // SPDX-License-Identifier: GPL-2.0
2 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
3 
4 #include "mmu.h"
5 #include "mmu_internal.h"
6 #include "mmutrace.h"
7 #include "tdp_iter.h"
8 #include "tdp_mmu.h"
9 #include "spte.h"
10 
11 #include <asm/cmpxchg.h>
12 #include <trace/events/kvm.h>
13 
14 /* Initializes the TDP MMU for the VM, if enabled. */
15 void kvm_mmu_init_tdp_mmu(struct kvm *kvm)
16 {
17 	INIT_LIST_HEAD(&kvm->arch.tdp_mmu_roots);
18 	spin_lock_init(&kvm->arch.tdp_mmu_pages_lock);
19 }
20 
21 /* Arbitrarily returns true so that this may be used in if statements. */
22 static __always_inline bool kvm_lockdep_assert_mmu_lock_held(struct kvm *kvm,
23 							     bool shared)
24 {
25 	if (shared)
26 		lockdep_assert_held_read(&kvm->mmu_lock);
27 	else
28 		lockdep_assert_held_write(&kvm->mmu_lock);
29 
30 	return true;
31 }
32 
33 void kvm_mmu_uninit_tdp_mmu(struct kvm *kvm)
34 {
35 	/*
36 	 * Invalidate all roots, which besides the obvious, schedules all roots
37 	 * for zapping and thus puts the TDP MMU's reference to each root, i.e.
38 	 * ultimately frees all roots.
39 	 */
40 	kvm_tdp_mmu_invalidate_all_roots(kvm);
41 	kvm_tdp_mmu_zap_invalidated_roots(kvm);
42 
43 	WARN_ON(atomic64_read(&kvm->arch.tdp_mmu_pages));
44 	WARN_ON(!list_empty(&kvm->arch.tdp_mmu_roots));
45 
46 	/*
47 	 * Ensure that all the outstanding RCU callbacks to free shadow pages
48 	 * can run before the VM is torn down.  Putting the last reference to
49 	 * zapped roots will create new callbacks.
50 	 */
51 	rcu_barrier();
52 }
53 
54 static void tdp_mmu_free_sp(struct kvm_mmu_page *sp)
55 {
56 	free_page((unsigned long)sp->spt);
57 	kmem_cache_free(mmu_page_header_cache, sp);
58 }
59 
60 /*
61  * This is called through call_rcu in order to free TDP page table memory
62  * safely with respect to other kernel threads that may be operating on
63  * the memory.
64  * By only accessing TDP MMU page table memory in an RCU read critical
65  * section, and freeing it after a grace period, lockless access to that
66  * memory won't use it after it is freed.
67  */
68 static void tdp_mmu_free_sp_rcu_callback(struct rcu_head *head)
69 {
70 	struct kvm_mmu_page *sp = container_of(head, struct kvm_mmu_page,
71 					       rcu_head);
72 
73 	tdp_mmu_free_sp(sp);
74 }
75 
76 void kvm_tdp_mmu_put_root(struct kvm *kvm, struct kvm_mmu_page *root)
77 {
78 	if (!refcount_dec_and_test(&root->tdp_mmu_root_count))
79 		return;
80 
81 	/*
82 	 * The TDP MMU itself holds a reference to each root until the root is
83 	 * explicitly invalidated, i.e. the final reference should be never be
84 	 * put for a valid root.
85 	 */
86 	KVM_BUG_ON(!is_tdp_mmu_page(root) || !root->role.invalid, kvm);
87 
88 	spin_lock(&kvm->arch.tdp_mmu_pages_lock);
89 	list_del_rcu(&root->link);
90 	spin_unlock(&kvm->arch.tdp_mmu_pages_lock);
91 	call_rcu(&root->rcu_head, tdp_mmu_free_sp_rcu_callback);
92 }
93 
94 /*
95  * Returns the next root after @prev_root (or the first root if @prev_root is
96  * NULL).  A reference to the returned root is acquired, and the reference to
97  * @prev_root is released (the caller obviously must hold a reference to
98  * @prev_root if it's non-NULL).
99  *
100  * If @only_valid is true, invalid roots are skipped.
101  *
102  * Returns NULL if the end of tdp_mmu_roots was reached.
103  */
104 static struct kvm_mmu_page *tdp_mmu_next_root(struct kvm *kvm,
105 					      struct kvm_mmu_page *prev_root,
106 					      bool only_valid)
107 {
108 	struct kvm_mmu_page *next_root;
109 
110 	/*
111 	 * While the roots themselves are RCU-protected, fields such as
112 	 * role.invalid are protected by mmu_lock.
113 	 */
114 	lockdep_assert_held(&kvm->mmu_lock);
115 
116 	rcu_read_lock();
117 
118 	if (prev_root)
119 		next_root = list_next_or_null_rcu(&kvm->arch.tdp_mmu_roots,
120 						  &prev_root->link,
121 						  typeof(*prev_root), link);
122 	else
123 		next_root = list_first_or_null_rcu(&kvm->arch.tdp_mmu_roots,
124 						   typeof(*next_root), link);
125 
126 	while (next_root) {
127 		if ((!only_valid || !next_root->role.invalid) &&
128 		    kvm_tdp_mmu_get_root(next_root))
129 			break;
130 
131 		next_root = list_next_or_null_rcu(&kvm->arch.tdp_mmu_roots,
132 				&next_root->link, typeof(*next_root), link);
133 	}
134 
135 	rcu_read_unlock();
136 
137 	if (prev_root)
138 		kvm_tdp_mmu_put_root(kvm, prev_root);
139 
140 	return next_root;
141 }
142 
143 /*
144  * Note: this iterator gets and puts references to the roots it iterates over.
145  * This makes it safe to release the MMU lock and yield within the loop, but
146  * if exiting the loop early, the caller must drop the reference to the most
147  * recent root. (Unless keeping a live reference is desirable.)
148  *
149  * If shared is set, this function is operating under the MMU lock in read
150  * mode.
151  */
152 #define __for_each_tdp_mmu_root_yield_safe(_kvm, _root, _as_id, _only_valid)	\
153 	for (_root = tdp_mmu_next_root(_kvm, NULL, _only_valid);		\
154 	     ({ lockdep_assert_held(&(_kvm)->mmu_lock); }), _root;		\
155 	     _root = tdp_mmu_next_root(_kvm, _root, _only_valid))		\
156 		if (_as_id >= 0 && kvm_mmu_page_as_id(_root) != _as_id) {	\
157 		} else
158 
159 #define for_each_valid_tdp_mmu_root_yield_safe(_kvm, _root, _as_id)	\
160 	__for_each_tdp_mmu_root_yield_safe(_kvm, _root, _as_id, true)
161 
162 #define for_each_tdp_mmu_root_yield_safe(_kvm, _root)			\
163 	for (_root = tdp_mmu_next_root(_kvm, NULL, false);		\
164 	     ({ lockdep_assert_held(&(_kvm)->mmu_lock); }), _root;	\
165 	     _root = tdp_mmu_next_root(_kvm, _root, false))
166 
167 /*
168  * Iterate over all TDP MMU roots.  Requires that mmu_lock be held for write,
169  * the implication being that any flow that holds mmu_lock for read is
170  * inherently yield-friendly and should use the yield-safe variant above.
171  * Holding mmu_lock for write obviates the need for RCU protection as the list
172  * is guaranteed to be stable.
173  */
174 #define __for_each_tdp_mmu_root(_kvm, _root, _as_id, _only_valid)		\
175 	list_for_each_entry(_root, &_kvm->arch.tdp_mmu_roots, link)		\
176 		if (kvm_lockdep_assert_mmu_lock_held(_kvm, false) &&		\
177 		    ((_as_id >= 0 && kvm_mmu_page_as_id(_root) != _as_id) ||	\
178 		     ((_only_valid) && (_root)->role.invalid))) {		\
179 		} else
180 
181 #define for_each_tdp_mmu_root(_kvm, _root, _as_id)			\
182 	__for_each_tdp_mmu_root(_kvm, _root, _as_id, false)
183 
184 #define for_each_valid_tdp_mmu_root(_kvm, _root, _as_id)		\
185 	__for_each_tdp_mmu_root(_kvm, _root, _as_id, true)
186 
187 static struct kvm_mmu_page *tdp_mmu_alloc_sp(struct kvm_vcpu *vcpu)
188 {
189 	struct kvm_mmu_page *sp;
190 
191 	sp = kvm_mmu_memory_cache_alloc(&vcpu->arch.mmu_page_header_cache);
192 	sp->spt = kvm_mmu_memory_cache_alloc(&vcpu->arch.mmu_shadow_page_cache);
193 
194 	return sp;
195 }
196 
197 static void tdp_mmu_init_sp(struct kvm_mmu_page *sp, tdp_ptep_t sptep,
198 			    gfn_t gfn, union kvm_mmu_page_role role)
199 {
200 	INIT_LIST_HEAD(&sp->possible_nx_huge_page_link);
201 
202 	set_page_private(virt_to_page(sp->spt), (unsigned long)sp);
203 
204 	sp->role = role;
205 	sp->gfn = gfn;
206 	sp->ptep = sptep;
207 	sp->tdp_mmu_page = true;
208 
209 	trace_kvm_mmu_get_page(sp, true);
210 }
211 
212 static void tdp_mmu_init_child_sp(struct kvm_mmu_page *child_sp,
213 				  struct tdp_iter *iter)
214 {
215 	struct kvm_mmu_page *parent_sp;
216 	union kvm_mmu_page_role role;
217 
218 	parent_sp = sptep_to_sp(rcu_dereference(iter->sptep));
219 
220 	role = parent_sp->role;
221 	role.level--;
222 
223 	tdp_mmu_init_sp(child_sp, iter->sptep, iter->gfn, role);
224 }
225 
226 int kvm_tdp_mmu_alloc_root(struct kvm_vcpu *vcpu)
227 {
228 	struct kvm_mmu *mmu = vcpu->arch.mmu;
229 	union kvm_mmu_page_role role = mmu->root_role;
230 	int as_id = kvm_mmu_role_as_id(role);
231 	struct kvm *kvm = vcpu->kvm;
232 	struct kvm_mmu_page *root;
233 
234 	/*
235 	 * Check for an existing root before acquiring the pages lock to avoid
236 	 * unnecessary serialization if multiple vCPUs are loading a new root.
237 	 * E.g. when bringing up secondary vCPUs, KVM will already have created
238 	 * a valid root on behalf of the primary vCPU.
239 	 */
240 	read_lock(&kvm->mmu_lock);
241 
242 	for_each_valid_tdp_mmu_root_yield_safe(kvm, root, as_id) {
243 		if (root->role.word == role.word)
244 			goto out_read_unlock;
245 	}
246 
247 	spin_lock(&kvm->arch.tdp_mmu_pages_lock);
248 
249 	/*
250 	 * Recheck for an existing root after acquiring the pages lock, another
251 	 * vCPU may have raced ahead and created a new usable root.  Manually
252 	 * walk the list of roots as the standard macros assume that the pages
253 	 * lock is *not* held.  WARN if grabbing a reference to a usable root
254 	 * fails, as the last reference to a root can only be put *after* the
255 	 * root has been invalidated, which requires holding mmu_lock for write.
256 	 */
257 	list_for_each_entry(root, &kvm->arch.tdp_mmu_roots, link) {
258 		if (root->role.word == role.word &&
259 		    !WARN_ON_ONCE(!kvm_tdp_mmu_get_root(root)))
260 			goto out_spin_unlock;
261 	}
262 
263 	root = tdp_mmu_alloc_sp(vcpu);
264 	tdp_mmu_init_sp(root, NULL, 0, role);
265 
266 	/*
267 	 * TDP MMU roots are kept until they are explicitly invalidated, either
268 	 * by a memslot update or by the destruction of the VM.  Initialize the
269 	 * refcount to two; one reference for the vCPU, and one reference for
270 	 * the TDP MMU itself, which is held until the root is invalidated and
271 	 * is ultimately put by kvm_tdp_mmu_zap_invalidated_roots().
272 	 */
273 	refcount_set(&root->tdp_mmu_root_count, 2);
274 	list_add_rcu(&root->link, &kvm->arch.tdp_mmu_roots);
275 
276 out_spin_unlock:
277 	spin_unlock(&kvm->arch.tdp_mmu_pages_lock);
278 out_read_unlock:
279 	read_unlock(&kvm->mmu_lock);
280 	/*
281 	 * Note, KVM_REQ_MMU_FREE_OBSOLETE_ROOTS will prevent entering the guest
282 	 * and actually consuming the root if it's invalidated after dropping
283 	 * mmu_lock, and the root can't be freed as this vCPU holds a reference.
284 	 */
285 	mmu->root.hpa = __pa(root->spt);
286 	mmu->root.pgd = 0;
287 	return 0;
288 }
289 
290 static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
291 				u64 old_spte, u64 new_spte, int level,
292 				bool shared);
293 
294 static void tdp_account_mmu_page(struct kvm *kvm, struct kvm_mmu_page *sp)
295 {
296 	kvm_account_pgtable_pages((void *)sp->spt, +1);
297 	atomic64_inc(&kvm->arch.tdp_mmu_pages);
298 }
299 
300 static void tdp_unaccount_mmu_page(struct kvm *kvm, struct kvm_mmu_page *sp)
301 {
302 	kvm_account_pgtable_pages((void *)sp->spt, -1);
303 	atomic64_dec(&kvm->arch.tdp_mmu_pages);
304 }
305 
306 /**
307  * tdp_mmu_unlink_sp() - Remove a shadow page from the list of used pages
308  *
309  * @kvm: kvm instance
310  * @sp: the page to be removed
311  */
312 static void tdp_mmu_unlink_sp(struct kvm *kvm, struct kvm_mmu_page *sp)
313 {
314 	tdp_unaccount_mmu_page(kvm, sp);
315 
316 	if (!sp->nx_huge_page_disallowed)
317 		return;
318 
319 	spin_lock(&kvm->arch.tdp_mmu_pages_lock);
320 	sp->nx_huge_page_disallowed = false;
321 	untrack_possible_nx_huge_page(kvm, sp);
322 	spin_unlock(&kvm->arch.tdp_mmu_pages_lock);
323 }
324 
325 /**
326  * handle_removed_pt() - handle a page table removed from the TDP structure
327  *
328  * @kvm: kvm instance
329  * @pt: the page removed from the paging structure
330  * @shared: This operation may not be running under the exclusive use
331  *	    of the MMU lock and the operation must synchronize with other
332  *	    threads that might be modifying SPTEs.
333  *
334  * Given a page table that has been removed from the TDP paging structure,
335  * iterates through the page table to clear SPTEs and free child page tables.
336  *
337  * Note that pt is passed in as a tdp_ptep_t, but it does not need RCU
338  * protection. Since this thread removed it from the paging structure,
339  * this thread will be responsible for ensuring the page is freed. Hence the
340  * early rcu_dereferences in the function.
341  */
342 static void handle_removed_pt(struct kvm *kvm, tdp_ptep_t pt, bool shared)
343 {
344 	struct kvm_mmu_page *sp = sptep_to_sp(rcu_dereference(pt));
345 	int level = sp->role.level;
346 	gfn_t base_gfn = sp->gfn;
347 	int i;
348 
349 	trace_kvm_mmu_prepare_zap_page(sp);
350 
351 	tdp_mmu_unlink_sp(kvm, sp);
352 
353 	for (i = 0; i < SPTE_ENT_PER_PAGE; i++) {
354 		tdp_ptep_t sptep = pt + i;
355 		gfn_t gfn = base_gfn + i * KVM_PAGES_PER_HPAGE(level);
356 		u64 old_spte;
357 
358 		if (shared) {
359 			/*
360 			 * Set the SPTE to a nonpresent value that other
361 			 * threads will not overwrite. If the SPTE was
362 			 * already marked as removed then another thread
363 			 * handling a page fault could overwrite it, so
364 			 * set the SPTE until it is set from some other
365 			 * value to the removed SPTE value.
366 			 */
367 			for (;;) {
368 				old_spte = kvm_tdp_mmu_write_spte_atomic(sptep, REMOVED_SPTE);
369 				if (!is_removed_spte(old_spte))
370 					break;
371 				cpu_relax();
372 			}
373 		} else {
374 			/*
375 			 * If the SPTE is not MMU-present, there is no backing
376 			 * page associated with the SPTE and so no side effects
377 			 * that need to be recorded, and exclusive ownership of
378 			 * mmu_lock ensures the SPTE can't be made present.
379 			 * Note, zapping MMIO SPTEs is also unnecessary as they
380 			 * are guarded by the memslots generation, not by being
381 			 * unreachable.
382 			 */
383 			old_spte = kvm_tdp_mmu_read_spte(sptep);
384 			if (!is_shadow_present_pte(old_spte))
385 				continue;
386 
387 			/*
388 			 * Use the common helper instead of a raw WRITE_ONCE as
389 			 * the SPTE needs to be updated atomically if it can be
390 			 * modified by a different vCPU outside of mmu_lock.
391 			 * Even though the parent SPTE is !PRESENT, the TLB
392 			 * hasn't yet been flushed, and both Intel and AMD
393 			 * document that A/D assists can use upper-level PxE
394 			 * entries that are cached in the TLB, i.e. the CPU can
395 			 * still access the page and mark it dirty.
396 			 *
397 			 * No retry is needed in the atomic update path as the
398 			 * sole concern is dropping a Dirty bit, i.e. no other
399 			 * task can zap/remove the SPTE as mmu_lock is held for
400 			 * write.  Marking the SPTE as a removed SPTE is not
401 			 * strictly necessary for the same reason, but using
402 			 * the remove SPTE value keeps the shared/exclusive
403 			 * paths consistent and allows the handle_changed_spte()
404 			 * call below to hardcode the new value to REMOVED_SPTE.
405 			 *
406 			 * Note, even though dropping a Dirty bit is the only
407 			 * scenario where a non-atomic update could result in a
408 			 * functional bug, simply checking the Dirty bit isn't
409 			 * sufficient as a fast page fault could read the upper
410 			 * level SPTE before it is zapped, and then make this
411 			 * target SPTE writable, resume the guest, and set the
412 			 * Dirty bit between reading the SPTE above and writing
413 			 * it here.
414 			 */
415 			old_spte = kvm_tdp_mmu_write_spte(sptep, old_spte,
416 							  REMOVED_SPTE, level);
417 		}
418 		handle_changed_spte(kvm, kvm_mmu_page_as_id(sp), gfn,
419 				    old_spte, REMOVED_SPTE, level, shared);
420 	}
421 
422 	call_rcu(&sp->rcu_head, tdp_mmu_free_sp_rcu_callback);
423 }
424 
425 /**
426  * handle_changed_spte - handle bookkeeping associated with an SPTE change
427  * @kvm: kvm instance
428  * @as_id: the address space of the paging structure the SPTE was a part of
429  * @gfn: the base GFN that was mapped by the SPTE
430  * @old_spte: The value of the SPTE before the change
431  * @new_spte: The value of the SPTE after the change
432  * @level: the level of the PT the SPTE is part of in the paging structure
433  * @shared: This operation may not be running under the exclusive use of
434  *	    the MMU lock and the operation must synchronize with other
435  *	    threads that might be modifying SPTEs.
436  *
437  * Handle bookkeeping that might result from the modification of a SPTE.  Note,
438  * dirty logging updates are handled in common code, not here (see make_spte()
439  * and fast_pf_fix_direct_spte()).
440  */
441 static void handle_changed_spte(struct kvm *kvm, int as_id, gfn_t gfn,
442 				u64 old_spte, u64 new_spte, int level,
443 				bool shared)
444 {
445 	bool was_present = is_shadow_present_pte(old_spte);
446 	bool is_present = is_shadow_present_pte(new_spte);
447 	bool was_leaf = was_present && is_last_spte(old_spte, level);
448 	bool is_leaf = is_present && is_last_spte(new_spte, level);
449 	bool pfn_changed = spte_to_pfn(old_spte) != spte_to_pfn(new_spte);
450 
451 	WARN_ON_ONCE(level > PT64_ROOT_MAX_LEVEL);
452 	WARN_ON_ONCE(level < PG_LEVEL_4K);
453 	WARN_ON_ONCE(gfn & (KVM_PAGES_PER_HPAGE(level) - 1));
454 
455 	/*
456 	 * If this warning were to trigger it would indicate that there was a
457 	 * missing MMU notifier or a race with some notifier handler.
458 	 * A present, leaf SPTE should never be directly replaced with another
459 	 * present leaf SPTE pointing to a different PFN. A notifier handler
460 	 * should be zapping the SPTE before the main MM's page table is
461 	 * changed, or the SPTE should be zeroed, and the TLBs flushed by the
462 	 * thread before replacement.
463 	 */
464 	if (was_leaf && is_leaf && pfn_changed) {
465 		pr_err("Invalid SPTE change: cannot replace a present leaf\n"
466 		       "SPTE with another present leaf SPTE mapping a\n"
467 		       "different PFN!\n"
468 		       "as_id: %d gfn: %llx old_spte: %llx new_spte: %llx level: %d",
469 		       as_id, gfn, old_spte, new_spte, level);
470 
471 		/*
472 		 * Crash the host to prevent error propagation and guest data
473 		 * corruption.
474 		 */
475 		BUG();
476 	}
477 
478 	if (old_spte == new_spte)
479 		return;
480 
481 	trace_kvm_tdp_mmu_spte_changed(as_id, gfn, level, old_spte, new_spte);
482 
483 	if (is_leaf)
484 		check_spte_writable_invariants(new_spte);
485 
486 	/*
487 	 * The only times a SPTE should be changed from a non-present to
488 	 * non-present state is when an MMIO entry is installed/modified/
489 	 * removed. In that case, there is nothing to do here.
490 	 */
491 	if (!was_present && !is_present) {
492 		/*
493 		 * If this change does not involve a MMIO SPTE or removed SPTE,
494 		 * it is unexpected. Log the change, though it should not
495 		 * impact the guest since both the former and current SPTEs
496 		 * are nonpresent.
497 		 */
498 		if (WARN_ON_ONCE(!is_mmio_spte(kvm, old_spte) &&
499 				 !is_mmio_spte(kvm, new_spte) &&
500 				 !is_removed_spte(new_spte)))
501 			pr_err("Unexpected SPTE change! Nonpresent SPTEs\n"
502 			       "should not be replaced with another,\n"
503 			       "different nonpresent SPTE, unless one or both\n"
504 			       "are MMIO SPTEs, or the new SPTE is\n"
505 			       "a temporary removed SPTE.\n"
506 			       "as_id: %d gfn: %llx old_spte: %llx new_spte: %llx level: %d",
507 			       as_id, gfn, old_spte, new_spte, level);
508 		return;
509 	}
510 
511 	if (is_leaf != was_leaf)
512 		kvm_update_page_stats(kvm, level, is_leaf ? 1 : -1);
513 
514 	if (was_leaf && is_dirty_spte(old_spte) &&
515 	    (!is_present || !is_dirty_spte(new_spte) || pfn_changed))
516 		kvm_set_pfn_dirty(spte_to_pfn(old_spte));
517 
518 	/*
519 	 * Recursively handle child PTs if the change removed a subtree from
520 	 * the paging structure.  Note the WARN on the PFN changing without the
521 	 * SPTE being converted to a hugepage (leaf) or being zapped.  Shadow
522 	 * pages are kernel allocations and should never be migrated.
523 	 */
524 	if (was_present && !was_leaf &&
525 	    (is_leaf || !is_present || WARN_ON_ONCE(pfn_changed)))
526 		handle_removed_pt(kvm, spte_to_child_pt(old_spte, level), shared);
527 
528 	if (was_leaf && is_accessed_spte(old_spte) &&
529 	    (!is_present || !is_accessed_spte(new_spte) || pfn_changed))
530 		kvm_set_pfn_accessed(spte_to_pfn(old_spte));
531 }
532 
533 static inline int __tdp_mmu_set_spte_atomic(struct tdp_iter *iter, u64 new_spte)
534 {
535 	u64 *sptep = rcu_dereference(iter->sptep);
536 
537 	/*
538 	 * The caller is responsible for ensuring the old SPTE is not a REMOVED
539 	 * SPTE.  KVM should never attempt to zap or manipulate a REMOVED SPTE,
540 	 * and pre-checking before inserting a new SPTE is advantageous as it
541 	 * avoids unnecessary work.
542 	 */
543 	WARN_ON_ONCE(iter->yielded || is_removed_spte(iter->old_spte));
544 
545 	/*
546 	 * Note, fast_pf_fix_direct_spte() can also modify TDP MMU SPTEs and
547 	 * does not hold the mmu_lock.  On failure, i.e. if a different logical
548 	 * CPU modified the SPTE, try_cmpxchg64() updates iter->old_spte with
549 	 * the current value, so the caller operates on fresh data, e.g. if it
550 	 * retries tdp_mmu_set_spte_atomic()
551 	 */
552 	if (!try_cmpxchg64(sptep, &iter->old_spte, new_spte))
553 		return -EBUSY;
554 
555 	return 0;
556 }
557 
558 /*
559  * tdp_mmu_set_spte_atomic - Set a TDP MMU SPTE atomically
560  * and handle the associated bookkeeping.  Do not mark the page dirty
561  * in KVM's dirty bitmaps.
562  *
563  * If setting the SPTE fails because it has changed, iter->old_spte will be
564  * refreshed to the current value of the spte.
565  *
566  * @kvm: kvm instance
567  * @iter: a tdp_iter instance currently on the SPTE that should be set
568  * @new_spte: The value the SPTE should be set to
569  * Return:
570  * * 0      - If the SPTE was set.
571  * * -EBUSY - If the SPTE cannot be set. In this case this function will have
572  *            no side-effects other than setting iter->old_spte to the last
573  *            known value of the spte.
574  */
575 static inline int tdp_mmu_set_spte_atomic(struct kvm *kvm,
576 					  struct tdp_iter *iter,
577 					  u64 new_spte)
578 {
579 	int ret;
580 
581 	lockdep_assert_held_read(&kvm->mmu_lock);
582 
583 	ret = __tdp_mmu_set_spte_atomic(iter, new_spte);
584 	if (ret)
585 		return ret;
586 
587 	handle_changed_spte(kvm, iter->as_id, iter->gfn, iter->old_spte,
588 			    new_spte, iter->level, true);
589 
590 	return 0;
591 }
592 
593 static inline int tdp_mmu_zap_spte_atomic(struct kvm *kvm,
594 					  struct tdp_iter *iter)
595 {
596 	int ret;
597 
598 	lockdep_assert_held_read(&kvm->mmu_lock);
599 
600 	/*
601 	 * Freeze the SPTE by setting it to a special, non-present value. This
602 	 * will stop other threads from immediately installing a present entry
603 	 * in its place before the TLBs are flushed.
604 	 *
605 	 * Delay processing of the zapped SPTE until after TLBs are flushed and
606 	 * the REMOVED_SPTE is replaced (see below).
607 	 */
608 	ret = __tdp_mmu_set_spte_atomic(iter, REMOVED_SPTE);
609 	if (ret)
610 		return ret;
611 
612 	kvm_flush_remote_tlbs_gfn(kvm, iter->gfn, iter->level);
613 
614 	/*
615 	 * No other thread can overwrite the removed SPTE as they must either
616 	 * wait on the MMU lock or use tdp_mmu_set_spte_atomic() which will not
617 	 * overwrite the special removed SPTE value. Use the raw write helper to
618 	 * avoid an unnecessary check on volatile bits.
619 	 */
620 	__kvm_tdp_mmu_write_spte(iter->sptep, SHADOW_NONPRESENT_VALUE);
621 
622 	/*
623 	 * Process the zapped SPTE after flushing TLBs, and after replacing
624 	 * REMOVED_SPTE with 0. This minimizes the amount of time vCPUs are
625 	 * blocked by the REMOVED_SPTE and reduces contention on the child
626 	 * SPTEs.
627 	 */
628 	handle_changed_spte(kvm, iter->as_id, iter->gfn, iter->old_spte,
629 			    0, iter->level, true);
630 
631 	return 0;
632 }
633 
634 
635 /*
636  * tdp_mmu_set_spte - Set a TDP MMU SPTE and handle the associated bookkeeping
637  * @kvm:	      KVM instance
638  * @as_id:	      Address space ID, i.e. regular vs. SMM
639  * @sptep:	      Pointer to the SPTE
640  * @old_spte:	      The current value of the SPTE
641  * @new_spte:	      The new value that will be set for the SPTE
642  * @gfn:	      The base GFN that was (or will be) mapped by the SPTE
643  * @level:	      The level _containing_ the SPTE (its parent PT's level)
644  *
645  * Returns the old SPTE value, which _may_ be different than @old_spte if the
646  * SPTE had voldatile bits.
647  */
648 static u64 tdp_mmu_set_spte(struct kvm *kvm, int as_id, tdp_ptep_t sptep,
649 			    u64 old_spte, u64 new_spte, gfn_t gfn, int level)
650 {
651 	lockdep_assert_held_write(&kvm->mmu_lock);
652 
653 	/*
654 	 * No thread should be using this function to set SPTEs to or from the
655 	 * temporary removed SPTE value.
656 	 * If operating under the MMU lock in read mode, tdp_mmu_set_spte_atomic
657 	 * should be used. If operating under the MMU lock in write mode, the
658 	 * use of the removed SPTE should not be necessary.
659 	 */
660 	WARN_ON_ONCE(is_removed_spte(old_spte) || is_removed_spte(new_spte));
661 
662 	old_spte = kvm_tdp_mmu_write_spte(sptep, old_spte, new_spte, level);
663 
664 	handle_changed_spte(kvm, as_id, gfn, old_spte, new_spte, level, false);
665 	return old_spte;
666 }
667 
668 static inline void tdp_mmu_iter_set_spte(struct kvm *kvm, struct tdp_iter *iter,
669 					 u64 new_spte)
670 {
671 	WARN_ON_ONCE(iter->yielded);
672 	iter->old_spte = tdp_mmu_set_spte(kvm, iter->as_id, iter->sptep,
673 					  iter->old_spte, new_spte,
674 					  iter->gfn, iter->level);
675 }
676 
677 #define tdp_root_for_each_pte(_iter, _root, _start, _end) \
678 	for_each_tdp_pte(_iter, _root, _start, _end)
679 
680 #define tdp_root_for_each_leaf_pte(_iter, _root, _start, _end)	\
681 	tdp_root_for_each_pte(_iter, _root, _start, _end)		\
682 		if (!is_shadow_present_pte(_iter.old_spte) ||		\
683 		    !is_last_spte(_iter.old_spte, _iter.level))		\
684 			continue;					\
685 		else
686 
687 #define tdp_mmu_for_each_pte(_iter, _mmu, _start, _end)		\
688 	for_each_tdp_pte(_iter, root_to_sp(_mmu->root.hpa), _start, _end)
689 
690 /*
691  * Yield if the MMU lock is contended or this thread needs to return control
692  * to the scheduler.
693  *
694  * If this function should yield and flush is set, it will perform a remote
695  * TLB flush before yielding.
696  *
697  * If this function yields, iter->yielded is set and the caller must skip to
698  * the next iteration, where tdp_iter_next() will reset the tdp_iter's walk
699  * over the paging structures to allow the iterator to continue its traversal
700  * from the paging structure root.
701  *
702  * Returns true if this function yielded.
703  */
704 static inline bool __must_check tdp_mmu_iter_cond_resched(struct kvm *kvm,
705 							  struct tdp_iter *iter,
706 							  bool flush, bool shared)
707 {
708 	WARN_ON_ONCE(iter->yielded);
709 
710 	/* Ensure forward progress has been made before yielding. */
711 	if (iter->next_last_level_gfn == iter->yielded_gfn)
712 		return false;
713 
714 	if (need_resched() || rwlock_needbreak(&kvm->mmu_lock)) {
715 		if (flush)
716 			kvm_flush_remote_tlbs(kvm);
717 
718 		rcu_read_unlock();
719 
720 		if (shared)
721 			cond_resched_rwlock_read(&kvm->mmu_lock);
722 		else
723 			cond_resched_rwlock_write(&kvm->mmu_lock);
724 
725 		rcu_read_lock();
726 
727 		WARN_ON_ONCE(iter->gfn > iter->next_last_level_gfn);
728 
729 		iter->yielded = true;
730 	}
731 
732 	return iter->yielded;
733 }
734 
735 static inline gfn_t tdp_mmu_max_gfn_exclusive(void)
736 {
737 	/*
738 	 * Bound TDP MMU walks at host.MAXPHYADDR.  KVM disallows memslots with
739 	 * a gpa range that would exceed the max gfn, and KVM does not create
740 	 * MMIO SPTEs for "impossible" gfns, instead sending such accesses down
741 	 * the slow emulation path every time.
742 	 */
743 	return kvm_mmu_max_gfn() + 1;
744 }
745 
746 static void __tdp_mmu_zap_root(struct kvm *kvm, struct kvm_mmu_page *root,
747 			       bool shared, int zap_level)
748 {
749 	struct tdp_iter iter;
750 
751 	gfn_t end = tdp_mmu_max_gfn_exclusive();
752 	gfn_t start = 0;
753 
754 	for_each_tdp_pte_min_level(iter, root, zap_level, start, end) {
755 retry:
756 		if (tdp_mmu_iter_cond_resched(kvm, &iter, false, shared))
757 			continue;
758 
759 		if (!is_shadow_present_pte(iter.old_spte))
760 			continue;
761 
762 		if (iter.level > zap_level)
763 			continue;
764 
765 		if (!shared)
766 			tdp_mmu_iter_set_spte(kvm, &iter, SHADOW_NONPRESENT_VALUE);
767 		else if (tdp_mmu_set_spte_atomic(kvm, &iter, SHADOW_NONPRESENT_VALUE))
768 			goto retry;
769 	}
770 }
771 
772 static void tdp_mmu_zap_root(struct kvm *kvm, struct kvm_mmu_page *root,
773 			     bool shared)
774 {
775 
776 	/*
777 	 * The root must have an elevated refcount so that it's reachable via
778 	 * mmu_notifier callbacks, which allows this path to yield and drop
779 	 * mmu_lock.  When handling an unmap/release mmu_notifier command, KVM
780 	 * must drop all references to relevant pages prior to completing the
781 	 * callback.  Dropping mmu_lock with an unreachable root would result
782 	 * in zapping SPTEs after a relevant mmu_notifier callback completes
783 	 * and lead to use-after-free as zapping a SPTE triggers "writeback" of
784 	 * dirty accessed bits to the SPTE's associated struct page.
785 	 */
786 	WARN_ON_ONCE(!refcount_read(&root->tdp_mmu_root_count));
787 
788 	kvm_lockdep_assert_mmu_lock_held(kvm, shared);
789 
790 	rcu_read_lock();
791 
792 	/*
793 	 * Zap roots in multiple passes of decreasing granularity, i.e. zap at
794 	 * 4KiB=>2MiB=>1GiB=>root, in order to better honor need_resched() (all
795 	 * preempt models) or mmu_lock contention (full or real-time models).
796 	 * Zapping at finer granularity marginally increases the total time of
797 	 * the zap, but in most cases the zap itself isn't latency sensitive.
798 	 *
799 	 * If KVM is configured to prove the MMU, skip the 4KiB and 2MiB zaps
800 	 * in order to mimic the page fault path, which can replace a 1GiB page
801 	 * table with an equivalent 1GiB hugepage, i.e. can get saddled with
802 	 * zapping a 1GiB region that's fully populated with 4KiB SPTEs.  This
803 	 * allows verifying that KVM can safely zap 1GiB regions, e.g. without
804 	 * inducing RCU stalls, without relying on a relatively rare event
805 	 * (zapping roots is orders of magnitude more common).  Note, because
806 	 * zapping a SP recurses on its children, stepping down to PG_LEVEL_4K
807 	 * in the iterator itself is unnecessary.
808 	 */
809 	if (!IS_ENABLED(CONFIG_KVM_PROVE_MMU)) {
810 		__tdp_mmu_zap_root(kvm, root, shared, PG_LEVEL_4K);
811 		__tdp_mmu_zap_root(kvm, root, shared, PG_LEVEL_2M);
812 	}
813 	__tdp_mmu_zap_root(kvm, root, shared, PG_LEVEL_1G);
814 	__tdp_mmu_zap_root(kvm, root, shared, root->role.level);
815 
816 	rcu_read_unlock();
817 }
818 
819 bool kvm_tdp_mmu_zap_sp(struct kvm *kvm, struct kvm_mmu_page *sp)
820 {
821 	u64 old_spte;
822 
823 	/*
824 	 * This helper intentionally doesn't allow zapping a root shadow page,
825 	 * which doesn't have a parent page table and thus no associated entry.
826 	 */
827 	if (WARN_ON_ONCE(!sp->ptep))
828 		return false;
829 
830 	old_spte = kvm_tdp_mmu_read_spte(sp->ptep);
831 	if (WARN_ON_ONCE(!is_shadow_present_pte(old_spte)))
832 		return false;
833 
834 	tdp_mmu_set_spte(kvm, kvm_mmu_page_as_id(sp), sp->ptep, old_spte,
835 			 SHADOW_NONPRESENT_VALUE, sp->gfn, sp->role.level + 1);
836 
837 	return true;
838 }
839 
840 /*
841  * If can_yield is true, will release the MMU lock and reschedule if the
842  * scheduler needs the CPU or there is contention on the MMU lock. If this
843  * function cannot yield, it will not release the MMU lock or reschedule and
844  * the caller must ensure it does not supply too large a GFN range, or the
845  * operation can cause a soft lockup.
846  */
847 static bool tdp_mmu_zap_leafs(struct kvm *kvm, struct kvm_mmu_page *root,
848 			      gfn_t start, gfn_t end, bool can_yield, bool flush)
849 {
850 	struct tdp_iter iter;
851 
852 	end = min(end, tdp_mmu_max_gfn_exclusive());
853 
854 	lockdep_assert_held_write(&kvm->mmu_lock);
855 
856 	rcu_read_lock();
857 
858 	for_each_tdp_pte_min_level(iter, root, PG_LEVEL_4K, start, end) {
859 		if (can_yield &&
860 		    tdp_mmu_iter_cond_resched(kvm, &iter, flush, false)) {
861 			flush = false;
862 			continue;
863 		}
864 
865 		if (!is_shadow_present_pte(iter.old_spte) ||
866 		    !is_last_spte(iter.old_spte, iter.level))
867 			continue;
868 
869 		tdp_mmu_iter_set_spte(kvm, &iter, SHADOW_NONPRESENT_VALUE);
870 
871 		/*
872 		 * Zappings SPTEs in invalid roots doesn't require a TLB flush,
873 		 * see kvm_tdp_mmu_zap_invalidated_roots() for details.
874 		 */
875 		if (!root->role.invalid)
876 			flush = true;
877 	}
878 
879 	rcu_read_unlock();
880 
881 	/*
882 	 * Because this flow zaps _only_ leaf SPTEs, the caller doesn't need
883 	 * to provide RCU protection as no 'struct kvm_mmu_page' will be freed.
884 	 */
885 	return flush;
886 }
887 
888 /*
889  * Zap leaf SPTEs for the range of gfns, [start, end), for all *VALID** roots.
890  * Returns true if a TLB flush is needed before releasing the MMU lock, i.e. if
891  * one or more SPTEs were zapped since the MMU lock was last acquired.
892  */
893 bool kvm_tdp_mmu_zap_leafs(struct kvm *kvm, gfn_t start, gfn_t end, bool flush)
894 {
895 	struct kvm_mmu_page *root;
896 
897 	lockdep_assert_held_write(&kvm->mmu_lock);
898 	for_each_valid_tdp_mmu_root_yield_safe(kvm, root, -1)
899 		flush = tdp_mmu_zap_leafs(kvm, root, start, end, true, flush);
900 
901 	return flush;
902 }
903 
904 void kvm_tdp_mmu_zap_all(struct kvm *kvm)
905 {
906 	struct kvm_mmu_page *root;
907 
908 	/*
909 	 * Zap all roots, including invalid roots, as all SPTEs must be dropped
910 	 * before returning to the caller.  Zap directly even if the root is
911 	 * also being zapped by a worker.  Walking zapped top-level SPTEs isn't
912 	 * all that expensive and mmu_lock is already held, which means the
913 	 * worker has yielded, i.e. flushing the work instead of zapping here
914 	 * isn't guaranteed to be any faster.
915 	 *
916 	 * A TLB flush is unnecessary, KVM zaps everything if and only the VM
917 	 * is being destroyed or the userspace VMM has exited.  In both cases,
918 	 * KVM_RUN is unreachable, i.e. no vCPUs will ever service the request.
919 	 */
920 	lockdep_assert_held_write(&kvm->mmu_lock);
921 	for_each_tdp_mmu_root_yield_safe(kvm, root)
922 		tdp_mmu_zap_root(kvm, root, false);
923 }
924 
925 /*
926  * Zap all invalidated roots to ensure all SPTEs are dropped before the "fast
927  * zap" completes.
928  */
929 void kvm_tdp_mmu_zap_invalidated_roots(struct kvm *kvm)
930 {
931 	struct kvm_mmu_page *root;
932 
933 	read_lock(&kvm->mmu_lock);
934 
935 	for_each_tdp_mmu_root_yield_safe(kvm, root) {
936 		if (!root->tdp_mmu_scheduled_root_to_zap)
937 			continue;
938 
939 		root->tdp_mmu_scheduled_root_to_zap = false;
940 		KVM_BUG_ON(!root->role.invalid, kvm);
941 
942 		/*
943 		 * A TLB flush is not necessary as KVM performs a local TLB
944 		 * flush when allocating a new root (see kvm_mmu_load()), and
945 		 * when migrating a vCPU to a different pCPU.  Note, the local
946 		 * TLB flush on reuse also invalidates paging-structure-cache
947 		 * entries, i.e. TLB entries for intermediate paging structures,
948 		 * that may be zapped, as such entries are associated with the
949 		 * ASID on both VMX and SVM.
950 		 */
951 		tdp_mmu_zap_root(kvm, root, true);
952 
953 		/*
954 		 * The referenced needs to be put *after* zapping the root, as
955 		 * the root must be reachable by mmu_notifiers while it's being
956 		 * zapped
957 		 */
958 		kvm_tdp_mmu_put_root(kvm, root);
959 	}
960 
961 	read_unlock(&kvm->mmu_lock);
962 }
963 
964 /*
965  * Mark each TDP MMU root as invalid to prevent vCPUs from reusing a root that
966  * is about to be zapped, e.g. in response to a memslots update.  The actual
967  * zapping is done separately so that it happens with mmu_lock with read,
968  * whereas invalidating roots must be done with mmu_lock held for write (unless
969  * the VM is being destroyed).
970  *
971  * Note, kvm_tdp_mmu_zap_invalidated_roots() is gifted the TDP MMU's reference.
972  * See kvm_tdp_mmu_alloc_root().
973  */
974 void kvm_tdp_mmu_invalidate_all_roots(struct kvm *kvm)
975 {
976 	struct kvm_mmu_page *root;
977 
978 	/*
979 	 * mmu_lock must be held for write to ensure that a root doesn't become
980 	 * invalid while there are active readers (invalidating a root while
981 	 * there are active readers may or may not be problematic in practice,
982 	 * but it's uncharted territory and not supported).
983 	 *
984 	 * Waive the assertion if there are no users of @kvm, i.e. the VM is
985 	 * being destroyed after all references have been put, or if no vCPUs
986 	 * have been created (which means there are no roots), i.e. the VM is
987 	 * being destroyed in an error path of KVM_CREATE_VM.
988 	 */
989 	if (IS_ENABLED(CONFIG_PROVE_LOCKING) &&
990 	    refcount_read(&kvm->users_count) && kvm->created_vcpus)
991 		lockdep_assert_held_write(&kvm->mmu_lock);
992 
993 	/*
994 	 * As above, mmu_lock isn't held when destroying the VM!  There can't
995 	 * be other references to @kvm, i.e. nothing else can invalidate roots
996 	 * or get/put references to roots.
997 	 */
998 	list_for_each_entry(root, &kvm->arch.tdp_mmu_roots, link) {
999 		/*
1000 		 * Note, invalid roots can outlive a memslot update!  Invalid
1001 		 * roots must be *zapped* before the memslot update completes,
1002 		 * but a different task can acquire a reference and keep the
1003 		 * root alive after its been zapped.
1004 		 */
1005 		if (!root->role.invalid) {
1006 			root->tdp_mmu_scheduled_root_to_zap = true;
1007 			root->role.invalid = true;
1008 		}
1009 	}
1010 }
1011 
1012 /*
1013  * Installs a last-level SPTE to handle a TDP page fault.
1014  * (NPT/EPT violation/misconfiguration)
1015  */
1016 static int tdp_mmu_map_handle_target_level(struct kvm_vcpu *vcpu,
1017 					  struct kvm_page_fault *fault,
1018 					  struct tdp_iter *iter)
1019 {
1020 	struct kvm_mmu_page *sp = sptep_to_sp(rcu_dereference(iter->sptep));
1021 	u64 new_spte;
1022 	int ret = RET_PF_FIXED;
1023 	bool wrprot = false;
1024 
1025 	if (WARN_ON_ONCE(sp->role.level != fault->goal_level))
1026 		return RET_PF_RETRY;
1027 
1028 	if (unlikely(!fault->slot))
1029 		new_spte = make_mmio_spte(vcpu, iter->gfn, ACC_ALL);
1030 	else
1031 		wrprot = make_spte(vcpu, sp, fault->slot, ACC_ALL, iter->gfn,
1032 					 fault->pfn, iter->old_spte, fault->prefetch, true,
1033 					 fault->map_writable, &new_spte);
1034 
1035 	if (new_spte == iter->old_spte)
1036 		ret = RET_PF_SPURIOUS;
1037 	else if (tdp_mmu_set_spte_atomic(vcpu->kvm, iter, new_spte))
1038 		return RET_PF_RETRY;
1039 	else if (is_shadow_present_pte(iter->old_spte) &&
1040 		 !is_last_spte(iter->old_spte, iter->level))
1041 		kvm_flush_remote_tlbs_gfn(vcpu->kvm, iter->gfn, iter->level);
1042 
1043 	/*
1044 	 * If the page fault was caused by a write but the page is write
1045 	 * protected, emulation is needed. If the emulation was skipped,
1046 	 * the vCPU would have the same fault again.
1047 	 */
1048 	if (wrprot) {
1049 		if (fault->write)
1050 			ret = RET_PF_EMULATE;
1051 	}
1052 
1053 	/* If a MMIO SPTE is installed, the MMIO will need to be emulated. */
1054 	if (unlikely(is_mmio_spte(vcpu->kvm, new_spte))) {
1055 		vcpu->stat.pf_mmio_spte_created++;
1056 		trace_mark_mmio_spte(rcu_dereference(iter->sptep), iter->gfn,
1057 				     new_spte);
1058 		ret = RET_PF_EMULATE;
1059 	} else {
1060 		trace_kvm_mmu_set_spte(iter->level, iter->gfn,
1061 				       rcu_dereference(iter->sptep));
1062 	}
1063 
1064 	return ret;
1065 }
1066 
1067 /*
1068  * tdp_mmu_link_sp - Replace the given spte with an spte pointing to the
1069  * provided page table.
1070  *
1071  * @kvm: kvm instance
1072  * @iter: a tdp_iter instance currently on the SPTE that should be set
1073  * @sp: The new TDP page table to install.
1074  * @shared: This operation is running under the MMU lock in read mode.
1075  *
1076  * Returns: 0 if the new page table was installed. Non-0 if the page table
1077  *          could not be installed (e.g. the atomic compare-exchange failed).
1078  */
1079 static int tdp_mmu_link_sp(struct kvm *kvm, struct tdp_iter *iter,
1080 			   struct kvm_mmu_page *sp, bool shared)
1081 {
1082 	u64 spte = make_nonleaf_spte(sp->spt, !kvm_ad_enabled());
1083 	int ret = 0;
1084 
1085 	if (shared) {
1086 		ret = tdp_mmu_set_spte_atomic(kvm, iter, spte);
1087 		if (ret)
1088 			return ret;
1089 	} else {
1090 		tdp_mmu_iter_set_spte(kvm, iter, spte);
1091 	}
1092 
1093 	tdp_account_mmu_page(kvm, sp);
1094 
1095 	return 0;
1096 }
1097 
1098 static int tdp_mmu_split_huge_page(struct kvm *kvm, struct tdp_iter *iter,
1099 				   struct kvm_mmu_page *sp, bool shared);
1100 
1101 /*
1102  * Handle a TDP page fault (NPT/EPT violation/misconfiguration) by installing
1103  * page tables and SPTEs to translate the faulting guest physical address.
1104  */
1105 int kvm_tdp_mmu_map(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault)
1106 {
1107 	struct kvm_mmu *mmu = vcpu->arch.mmu;
1108 	struct kvm *kvm = vcpu->kvm;
1109 	struct tdp_iter iter;
1110 	struct kvm_mmu_page *sp;
1111 	int ret = RET_PF_RETRY;
1112 
1113 	kvm_mmu_hugepage_adjust(vcpu, fault);
1114 
1115 	trace_kvm_mmu_spte_requested(fault);
1116 
1117 	rcu_read_lock();
1118 
1119 	tdp_mmu_for_each_pte(iter, mmu, fault->gfn, fault->gfn + 1) {
1120 		int r;
1121 
1122 		if (fault->nx_huge_page_workaround_enabled)
1123 			disallowed_hugepage_adjust(fault, iter.old_spte, iter.level);
1124 
1125 		/*
1126 		 * If SPTE has been frozen by another thread, just give up and
1127 		 * retry, avoiding unnecessary page table allocation and free.
1128 		 */
1129 		if (is_removed_spte(iter.old_spte))
1130 			goto retry;
1131 
1132 		if (iter.level == fault->goal_level)
1133 			goto map_target_level;
1134 
1135 		/* Step down into the lower level page table if it exists. */
1136 		if (is_shadow_present_pte(iter.old_spte) &&
1137 		    !is_large_pte(iter.old_spte))
1138 			continue;
1139 
1140 		/*
1141 		 * The SPTE is either non-present or points to a huge page that
1142 		 * needs to be split.
1143 		 */
1144 		sp = tdp_mmu_alloc_sp(vcpu);
1145 		tdp_mmu_init_child_sp(sp, &iter);
1146 
1147 		sp->nx_huge_page_disallowed = fault->huge_page_disallowed;
1148 
1149 		if (is_shadow_present_pte(iter.old_spte))
1150 			r = tdp_mmu_split_huge_page(kvm, &iter, sp, true);
1151 		else
1152 			r = tdp_mmu_link_sp(kvm, &iter, sp, true);
1153 
1154 		/*
1155 		 * Force the guest to retry if installing an upper level SPTE
1156 		 * failed, e.g. because a different task modified the SPTE.
1157 		 */
1158 		if (r) {
1159 			tdp_mmu_free_sp(sp);
1160 			goto retry;
1161 		}
1162 
1163 		if (fault->huge_page_disallowed &&
1164 		    fault->req_level >= iter.level) {
1165 			spin_lock(&kvm->arch.tdp_mmu_pages_lock);
1166 			if (sp->nx_huge_page_disallowed)
1167 				track_possible_nx_huge_page(kvm, sp);
1168 			spin_unlock(&kvm->arch.tdp_mmu_pages_lock);
1169 		}
1170 	}
1171 
1172 	/*
1173 	 * The walk aborted before reaching the target level, e.g. because the
1174 	 * iterator detected an upper level SPTE was frozen during traversal.
1175 	 */
1176 	WARN_ON_ONCE(iter.level == fault->goal_level);
1177 	goto retry;
1178 
1179 map_target_level:
1180 	ret = tdp_mmu_map_handle_target_level(vcpu, fault, &iter);
1181 
1182 retry:
1183 	rcu_read_unlock();
1184 	return ret;
1185 }
1186 
1187 bool kvm_tdp_mmu_unmap_gfn_range(struct kvm *kvm, struct kvm_gfn_range *range,
1188 				 bool flush)
1189 {
1190 	struct kvm_mmu_page *root;
1191 
1192 	__for_each_tdp_mmu_root_yield_safe(kvm, root, range->slot->as_id, false)
1193 		flush = tdp_mmu_zap_leafs(kvm, root, range->start, range->end,
1194 					  range->may_block, flush);
1195 
1196 	return flush;
1197 }
1198 
1199 typedef bool (*tdp_handler_t)(struct kvm *kvm, struct tdp_iter *iter,
1200 			      struct kvm_gfn_range *range);
1201 
1202 static __always_inline bool kvm_tdp_mmu_handle_gfn(struct kvm *kvm,
1203 						   struct kvm_gfn_range *range,
1204 						   tdp_handler_t handler)
1205 {
1206 	struct kvm_mmu_page *root;
1207 	struct tdp_iter iter;
1208 	bool ret = false;
1209 
1210 	/*
1211 	 * Don't support rescheduling, none of the MMU notifiers that funnel
1212 	 * into this helper allow blocking; it'd be dead, wasteful code.
1213 	 */
1214 	for_each_tdp_mmu_root(kvm, root, range->slot->as_id) {
1215 		rcu_read_lock();
1216 
1217 		tdp_root_for_each_leaf_pte(iter, root, range->start, range->end)
1218 			ret |= handler(kvm, &iter, range);
1219 
1220 		rcu_read_unlock();
1221 	}
1222 
1223 	return ret;
1224 }
1225 
1226 /*
1227  * Mark the SPTEs range of GFNs [start, end) unaccessed and return non-zero
1228  * if any of the GFNs in the range have been accessed.
1229  *
1230  * No need to mark the corresponding PFN as accessed as this call is coming
1231  * from the clear_young() or clear_flush_young() notifier, which uses the
1232  * return value to determine if the page has been accessed.
1233  */
1234 static bool age_gfn_range(struct kvm *kvm, struct tdp_iter *iter,
1235 			  struct kvm_gfn_range *range)
1236 {
1237 	u64 new_spte;
1238 
1239 	/* If we have a non-accessed entry we don't need to change the pte. */
1240 	if (!is_accessed_spte(iter->old_spte))
1241 		return false;
1242 
1243 	if (spte_ad_enabled(iter->old_spte)) {
1244 		iter->old_spte = tdp_mmu_clear_spte_bits(iter->sptep,
1245 							 iter->old_spte,
1246 							 shadow_accessed_mask,
1247 							 iter->level);
1248 		new_spte = iter->old_spte & ~shadow_accessed_mask;
1249 	} else {
1250 		/*
1251 		 * Capture the dirty status of the page, so that it doesn't get
1252 		 * lost when the SPTE is marked for access tracking.
1253 		 */
1254 		if (is_writable_pte(iter->old_spte))
1255 			kvm_set_pfn_dirty(spte_to_pfn(iter->old_spte));
1256 
1257 		new_spte = mark_spte_for_access_track(iter->old_spte);
1258 		iter->old_spte = kvm_tdp_mmu_write_spte(iter->sptep,
1259 							iter->old_spte, new_spte,
1260 							iter->level);
1261 	}
1262 
1263 	trace_kvm_tdp_mmu_spte_changed(iter->as_id, iter->gfn, iter->level,
1264 				       iter->old_spte, new_spte);
1265 	return true;
1266 }
1267 
1268 bool kvm_tdp_mmu_age_gfn_range(struct kvm *kvm, struct kvm_gfn_range *range)
1269 {
1270 	return kvm_tdp_mmu_handle_gfn(kvm, range, age_gfn_range);
1271 }
1272 
1273 static bool test_age_gfn(struct kvm *kvm, struct tdp_iter *iter,
1274 			 struct kvm_gfn_range *range)
1275 {
1276 	return is_accessed_spte(iter->old_spte);
1277 }
1278 
1279 bool kvm_tdp_mmu_test_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
1280 {
1281 	return kvm_tdp_mmu_handle_gfn(kvm, range, test_age_gfn);
1282 }
1283 
1284 /*
1285  * Remove write access from all SPTEs at or above min_level that map GFNs
1286  * [start, end). Returns true if an SPTE has been changed and the TLBs need to
1287  * be flushed.
1288  */
1289 static bool wrprot_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root,
1290 			     gfn_t start, gfn_t end, int min_level)
1291 {
1292 	struct tdp_iter iter;
1293 	u64 new_spte;
1294 	bool spte_set = false;
1295 
1296 	rcu_read_lock();
1297 
1298 	BUG_ON(min_level > KVM_MAX_HUGEPAGE_LEVEL);
1299 
1300 	for_each_tdp_pte_min_level(iter, root, min_level, start, end) {
1301 retry:
1302 		if (tdp_mmu_iter_cond_resched(kvm, &iter, false, true))
1303 			continue;
1304 
1305 		if (!is_shadow_present_pte(iter.old_spte) ||
1306 		    !is_last_spte(iter.old_spte, iter.level) ||
1307 		    !(iter.old_spte & PT_WRITABLE_MASK))
1308 			continue;
1309 
1310 		new_spte = iter.old_spte & ~PT_WRITABLE_MASK;
1311 
1312 		if (tdp_mmu_set_spte_atomic(kvm, &iter, new_spte))
1313 			goto retry;
1314 
1315 		spte_set = true;
1316 	}
1317 
1318 	rcu_read_unlock();
1319 	return spte_set;
1320 }
1321 
1322 /*
1323  * Remove write access from all the SPTEs mapping GFNs in the memslot. Will
1324  * only affect leaf SPTEs down to min_level.
1325  * Returns true if an SPTE has been changed and the TLBs need to be flushed.
1326  */
1327 bool kvm_tdp_mmu_wrprot_slot(struct kvm *kvm,
1328 			     const struct kvm_memory_slot *slot, int min_level)
1329 {
1330 	struct kvm_mmu_page *root;
1331 	bool spte_set = false;
1332 
1333 	lockdep_assert_held_read(&kvm->mmu_lock);
1334 
1335 	for_each_valid_tdp_mmu_root_yield_safe(kvm, root, slot->as_id)
1336 		spte_set |= wrprot_gfn_range(kvm, root, slot->base_gfn,
1337 			     slot->base_gfn + slot->npages, min_level);
1338 
1339 	return spte_set;
1340 }
1341 
1342 static struct kvm_mmu_page *__tdp_mmu_alloc_sp_for_split(gfp_t gfp)
1343 {
1344 	struct kvm_mmu_page *sp;
1345 
1346 	gfp |= __GFP_ZERO;
1347 
1348 	sp = kmem_cache_alloc(mmu_page_header_cache, gfp);
1349 	if (!sp)
1350 		return NULL;
1351 
1352 	sp->spt = (void *)__get_free_page(gfp);
1353 	if (!sp->spt) {
1354 		kmem_cache_free(mmu_page_header_cache, sp);
1355 		return NULL;
1356 	}
1357 
1358 	return sp;
1359 }
1360 
1361 static struct kvm_mmu_page *tdp_mmu_alloc_sp_for_split(struct kvm *kvm,
1362 						       struct tdp_iter *iter,
1363 						       bool shared)
1364 {
1365 	struct kvm_mmu_page *sp;
1366 
1367 	kvm_lockdep_assert_mmu_lock_held(kvm, shared);
1368 
1369 	/*
1370 	 * Since we are allocating while under the MMU lock we have to be
1371 	 * careful about GFP flags. Use GFP_NOWAIT to avoid blocking on direct
1372 	 * reclaim and to avoid making any filesystem callbacks (which can end
1373 	 * up invoking KVM MMU notifiers, resulting in a deadlock).
1374 	 *
1375 	 * If this allocation fails we drop the lock and retry with reclaim
1376 	 * allowed.
1377 	 */
1378 	sp = __tdp_mmu_alloc_sp_for_split(GFP_NOWAIT | __GFP_ACCOUNT);
1379 	if (sp)
1380 		return sp;
1381 
1382 	rcu_read_unlock();
1383 
1384 	if (shared)
1385 		read_unlock(&kvm->mmu_lock);
1386 	else
1387 		write_unlock(&kvm->mmu_lock);
1388 
1389 	iter->yielded = true;
1390 	sp = __tdp_mmu_alloc_sp_for_split(GFP_KERNEL_ACCOUNT);
1391 
1392 	if (shared)
1393 		read_lock(&kvm->mmu_lock);
1394 	else
1395 		write_lock(&kvm->mmu_lock);
1396 
1397 	rcu_read_lock();
1398 
1399 	return sp;
1400 }
1401 
1402 /* Note, the caller is responsible for initializing @sp. */
1403 static int tdp_mmu_split_huge_page(struct kvm *kvm, struct tdp_iter *iter,
1404 				   struct kvm_mmu_page *sp, bool shared)
1405 {
1406 	const u64 huge_spte = iter->old_spte;
1407 	const int level = iter->level;
1408 	int ret, i;
1409 
1410 	/*
1411 	 * No need for atomics when writing to sp->spt since the page table has
1412 	 * not been linked in yet and thus is not reachable from any other CPU.
1413 	 */
1414 	for (i = 0; i < SPTE_ENT_PER_PAGE; i++)
1415 		sp->spt[i] = make_huge_page_split_spte(kvm, huge_spte, sp->role, i);
1416 
1417 	/*
1418 	 * Replace the huge spte with a pointer to the populated lower level
1419 	 * page table. Since we are making this change without a TLB flush vCPUs
1420 	 * will see a mix of the split mappings and the original huge mapping,
1421 	 * depending on what's currently in their TLB. This is fine from a
1422 	 * correctness standpoint since the translation will be the same either
1423 	 * way.
1424 	 */
1425 	ret = tdp_mmu_link_sp(kvm, iter, sp, shared);
1426 	if (ret)
1427 		goto out;
1428 
1429 	/*
1430 	 * tdp_mmu_link_sp_atomic() will handle subtracting the huge page we
1431 	 * are overwriting from the page stats. But we have to manually update
1432 	 * the page stats with the new present child pages.
1433 	 */
1434 	kvm_update_page_stats(kvm, level - 1, SPTE_ENT_PER_PAGE);
1435 
1436 out:
1437 	trace_kvm_mmu_split_huge_page(iter->gfn, huge_spte, level, ret);
1438 	return ret;
1439 }
1440 
1441 static int tdp_mmu_split_huge_pages_root(struct kvm *kvm,
1442 					 struct kvm_mmu_page *root,
1443 					 gfn_t start, gfn_t end,
1444 					 int target_level, bool shared)
1445 {
1446 	struct kvm_mmu_page *sp = NULL;
1447 	struct tdp_iter iter;
1448 	int ret = 0;
1449 
1450 	rcu_read_lock();
1451 
1452 	/*
1453 	 * Traverse the page table splitting all huge pages above the target
1454 	 * level into one lower level. For example, if we encounter a 1GB page
1455 	 * we split it into 512 2MB pages.
1456 	 *
1457 	 * Since the TDP iterator uses a pre-order traversal, we are guaranteed
1458 	 * to visit an SPTE before ever visiting its children, which means we
1459 	 * will correctly recursively split huge pages that are more than one
1460 	 * level above the target level (e.g. splitting a 1GB to 512 2MB pages,
1461 	 * and then splitting each of those to 512 4KB pages).
1462 	 */
1463 	for_each_tdp_pte_min_level(iter, root, target_level + 1, start, end) {
1464 retry:
1465 		if (tdp_mmu_iter_cond_resched(kvm, &iter, false, shared))
1466 			continue;
1467 
1468 		if (!is_shadow_present_pte(iter.old_spte) || !is_large_pte(iter.old_spte))
1469 			continue;
1470 
1471 		if (!sp) {
1472 			sp = tdp_mmu_alloc_sp_for_split(kvm, &iter, shared);
1473 			if (!sp) {
1474 				ret = -ENOMEM;
1475 				trace_kvm_mmu_split_huge_page(iter.gfn,
1476 							      iter.old_spte,
1477 							      iter.level, ret);
1478 				break;
1479 			}
1480 
1481 			if (iter.yielded)
1482 				continue;
1483 		}
1484 
1485 		tdp_mmu_init_child_sp(sp, &iter);
1486 
1487 		if (tdp_mmu_split_huge_page(kvm, &iter, sp, shared))
1488 			goto retry;
1489 
1490 		sp = NULL;
1491 	}
1492 
1493 	rcu_read_unlock();
1494 
1495 	/*
1496 	 * It's possible to exit the loop having never used the last sp if, for
1497 	 * example, a vCPU doing HugePage NX splitting wins the race and
1498 	 * installs its own sp in place of the last sp we tried to split.
1499 	 */
1500 	if (sp)
1501 		tdp_mmu_free_sp(sp);
1502 
1503 	return ret;
1504 }
1505 
1506 
1507 /*
1508  * Try to split all huge pages mapped by the TDP MMU down to the target level.
1509  */
1510 void kvm_tdp_mmu_try_split_huge_pages(struct kvm *kvm,
1511 				      const struct kvm_memory_slot *slot,
1512 				      gfn_t start, gfn_t end,
1513 				      int target_level, bool shared)
1514 {
1515 	struct kvm_mmu_page *root;
1516 	int r = 0;
1517 
1518 	kvm_lockdep_assert_mmu_lock_held(kvm, shared);
1519 	for_each_valid_tdp_mmu_root_yield_safe(kvm, root, slot->as_id) {
1520 		r = tdp_mmu_split_huge_pages_root(kvm, root, start, end, target_level, shared);
1521 		if (r) {
1522 			kvm_tdp_mmu_put_root(kvm, root);
1523 			break;
1524 		}
1525 	}
1526 }
1527 
1528 static bool tdp_mmu_need_write_protect(struct kvm_mmu_page *sp)
1529 {
1530 	/*
1531 	 * All TDP MMU shadow pages share the same role as their root, aside
1532 	 * from level, so it is valid to key off any shadow page to determine if
1533 	 * write protection is needed for an entire tree.
1534 	 */
1535 	return kvm_mmu_page_ad_need_write_protect(sp) || !kvm_ad_enabled();
1536 }
1537 
1538 static bool clear_dirty_gfn_range(struct kvm *kvm, struct kvm_mmu_page *root,
1539 			   gfn_t start, gfn_t end)
1540 {
1541 	const u64 dbit = tdp_mmu_need_write_protect(root) ? PT_WRITABLE_MASK :
1542 							    shadow_dirty_mask;
1543 	struct tdp_iter iter;
1544 	bool spte_set = false;
1545 
1546 	rcu_read_lock();
1547 
1548 	tdp_root_for_each_pte(iter, root, start, end) {
1549 retry:
1550 		if (!is_shadow_present_pte(iter.old_spte) ||
1551 		    !is_last_spte(iter.old_spte, iter.level))
1552 			continue;
1553 
1554 		if (tdp_mmu_iter_cond_resched(kvm, &iter, false, true))
1555 			continue;
1556 
1557 		KVM_MMU_WARN_ON(dbit == shadow_dirty_mask &&
1558 				spte_ad_need_write_protect(iter.old_spte));
1559 
1560 		if (!(iter.old_spte & dbit))
1561 			continue;
1562 
1563 		if (tdp_mmu_set_spte_atomic(kvm, &iter, iter.old_spte & ~dbit))
1564 			goto retry;
1565 
1566 		spte_set = true;
1567 	}
1568 
1569 	rcu_read_unlock();
1570 	return spte_set;
1571 }
1572 
1573 /*
1574  * Clear the dirty status (D-bit or W-bit) of all the SPTEs mapping GFNs in the
1575  * memslot. Returns true if an SPTE has been changed and the TLBs need to be
1576  * flushed.
1577  */
1578 bool kvm_tdp_mmu_clear_dirty_slot(struct kvm *kvm,
1579 				  const struct kvm_memory_slot *slot)
1580 {
1581 	struct kvm_mmu_page *root;
1582 	bool spte_set = false;
1583 
1584 	lockdep_assert_held_read(&kvm->mmu_lock);
1585 	for_each_valid_tdp_mmu_root_yield_safe(kvm, root, slot->as_id)
1586 		spte_set |= clear_dirty_gfn_range(kvm, root, slot->base_gfn,
1587 				slot->base_gfn + slot->npages);
1588 
1589 	return spte_set;
1590 }
1591 
1592 static void clear_dirty_pt_masked(struct kvm *kvm, struct kvm_mmu_page *root,
1593 				  gfn_t gfn, unsigned long mask, bool wrprot)
1594 {
1595 	const u64 dbit = (wrprot || tdp_mmu_need_write_protect(root)) ? PT_WRITABLE_MASK :
1596 									shadow_dirty_mask;
1597 	struct tdp_iter iter;
1598 
1599 	lockdep_assert_held_write(&kvm->mmu_lock);
1600 
1601 	rcu_read_lock();
1602 
1603 	tdp_root_for_each_leaf_pte(iter, root, gfn + __ffs(mask),
1604 				    gfn + BITS_PER_LONG) {
1605 		if (!mask)
1606 			break;
1607 
1608 		KVM_MMU_WARN_ON(dbit == shadow_dirty_mask &&
1609 				spte_ad_need_write_protect(iter.old_spte));
1610 
1611 		if (iter.level > PG_LEVEL_4K ||
1612 		    !(mask & (1UL << (iter.gfn - gfn))))
1613 			continue;
1614 
1615 		mask &= ~(1UL << (iter.gfn - gfn));
1616 
1617 		if (!(iter.old_spte & dbit))
1618 			continue;
1619 
1620 		iter.old_spte = tdp_mmu_clear_spte_bits(iter.sptep,
1621 							iter.old_spte, dbit,
1622 							iter.level);
1623 
1624 		trace_kvm_tdp_mmu_spte_changed(iter.as_id, iter.gfn, iter.level,
1625 					       iter.old_spte,
1626 					       iter.old_spte & ~dbit);
1627 		kvm_set_pfn_dirty(spte_to_pfn(iter.old_spte));
1628 	}
1629 
1630 	rcu_read_unlock();
1631 }
1632 
1633 /*
1634  * Clear the dirty status (D-bit or W-bit) of all the 4k SPTEs mapping GFNs for
1635  * which a bit is set in mask, starting at gfn. The given memslot is expected to
1636  * contain all the GFNs represented by set bits in the mask.
1637  */
1638 void kvm_tdp_mmu_clear_dirty_pt_masked(struct kvm *kvm,
1639 				       struct kvm_memory_slot *slot,
1640 				       gfn_t gfn, unsigned long mask,
1641 				       bool wrprot)
1642 {
1643 	struct kvm_mmu_page *root;
1644 
1645 	for_each_valid_tdp_mmu_root(kvm, root, slot->as_id)
1646 		clear_dirty_pt_masked(kvm, root, gfn, mask, wrprot);
1647 }
1648 
1649 static void zap_collapsible_spte_range(struct kvm *kvm,
1650 				       struct kvm_mmu_page *root,
1651 				       const struct kvm_memory_slot *slot)
1652 {
1653 	gfn_t start = slot->base_gfn;
1654 	gfn_t end = start + slot->npages;
1655 	struct tdp_iter iter;
1656 	int max_mapping_level;
1657 
1658 	rcu_read_lock();
1659 
1660 	for_each_tdp_pte_min_level(iter, root, PG_LEVEL_2M, start, end) {
1661 retry:
1662 		if (tdp_mmu_iter_cond_resched(kvm, &iter, false, true))
1663 			continue;
1664 
1665 		if (iter.level > KVM_MAX_HUGEPAGE_LEVEL ||
1666 		    !is_shadow_present_pte(iter.old_spte))
1667 			continue;
1668 
1669 		/*
1670 		 * Don't zap leaf SPTEs, if a leaf SPTE could be replaced with
1671 		 * a large page size, then its parent would have been zapped
1672 		 * instead of stepping down.
1673 		 */
1674 		if (is_last_spte(iter.old_spte, iter.level))
1675 			continue;
1676 
1677 		/*
1678 		 * If iter.gfn resides outside of the slot, i.e. the page for
1679 		 * the current level overlaps but is not contained by the slot,
1680 		 * then the SPTE can't be made huge.  More importantly, trying
1681 		 * to query that info from slot->arch.lpage_info will cause an
1682 		 * out-of-bounds access.
1683 		 */
1684 		if (iter.gfn < start || iter.gfn >= end)
1685 			continue;
1686 
1687 		max_mapping_level = kvm_mmu_max_mapping_level(kvm, slot,
1688 							      iter.gfn, PG_LEVEL_NUM);
1689 		if (max_mapping_level < iter.level)
1690 			continue;
1691 
1692 		/* Note, a successful atomic zap also does a remote TLB flush. */
1693 		if (tdp_mmu_zap_spte_atomic(kvm, &iter))
1694 			goto retry;
1695 	}
1696 
1697 	rcu_read_unlock();
1698 }
1699 
1700 /*
1701  * Zap non-leaf SPTEs (and free their associated page tables) which could
1702  * be replaced by huge pages, for GFNs within the slot.
1703  */
1704 void kvm_tdp_mmu_zap_collapsible_sptes(struct kvm *kvm,
1705 				       const struct kvm_memory_slot *slot)
1706 {
1707 	struct kvm_mmu_page *root;
1708 
1709 	lockdep_assert_held_read(&kvm->mmu_lock);
1710 	for_each_valid_tdp_mmu_root_yield_safe(kvm, root, slot->as_id)
1711 		zap_collapsible_spte_range(kvm, root, slot);
1712 }
1713 
1714 /*
1715  * Removes write access on the last level SPTE mapping this GFN and unsets the
1716  * MMU-writable bit to ensure future writes continue to be intercepted.
1717  * Returns true if an SPTE was set and a TLB flush is needed.
1718  */
1719 static bool write_protect_gfn(struct kvm *kvm, struct kvm_mmu_page *root,
1720 			      gfn_t gfn, int min_level)
1721 {
1722 	struct tdp_iter iter;
1723 	u64 new_spte;
1724 	bool spte_set = false;
1725 
1726 	BUG_ON(min_level > KVM_MAX_HUGEPAGE_LEVEL);
1727 
1728 	rcu_read_lock();
1729 
1730 	for_each_tdp_pte_min_level(iter, root, min_level, gfn, gfn + 1) {
1731 		if (!is_shadow_present_pte(iter.old_spte) ||
1732 		    !is_last_spte(iter.old_spte, iter.level))
1733 			continue;
1734 
1735 		new_spte = iter.old_spte &
1736 			~(PT_WRITABLE_MASK | shadow_mmu_writable_mask);
1737 
1738 		if (new_spte == iter.old_spte)
1739 			break;
1740 
1741 		tdp_mmu_iter_set_spte(kvm, &iter, new_spte);
1742 		spte_set = true;
1743 	}
1744 
1745 	rcu_read_unlock();
1746 
1747 	return spte_set;
1748 }
1749 
1750 /*
1751  * Removes write access on the last level SPTE mapping this GFN and unsets the
1752  * MMU-writable bit to ensure future writes continue to be intercepted.
1753  * Returns true if an SPTE was set and a TLB flush is needed.
1754  */
1755 bool kvm_tdp_mmu_write_protect_gfn(struct kvm *kvm,
1756 				   struct kvm_memory_slot *slot, gfn_t gfn,
1757 				   int min_level)
1758 {
1759 	struct kvm_mmu_page *root;
1760 	bool spte_set = false;
1761 
1762 	lockdep_assert_held_write(&kvm->mmu_lock);
1763 	for_each_valid_tdp_mmu_root(kvm, root, slot->as_id)
1764 		spte_set |= write_protect_gfn(kvm, root, gfn, min_level);
1765 
1766 	return spte_set;
1767 }
1768 
1769 /*
1770  * Return the level of the lowest level SPTE added to sptes.
1771  * That SPTE may be non-present.
1772  *
1773  * Must be called between kvm_tdp_mmu_walk_lockless_{begin,end}.
1774  */
1775 int kvm_tdp_mmu_get_walk(struct kvm_vcpu *vcpu, u64 addr, u64 *sptes,
1776 			 int *root_level)
1777 {
1778 	struct tdp_iter iter;
1779 	struct kvm_mmu *mmu = vcpu->arch.mmu;
1780 	gfn_t gfn = addr >> PAGE_SHIFT;
1781 	int leaf = -1;
1782 
1783 	*root_level = vcpu->arch.mmu->root_role.level;
1784 
1785 	tdp_mmu_for_each_pte(iter, mmu, gfn, gfn + 1) {
1786 		leaf = iter.level;
1787 		sptes[leaf] = iter.old_spte;
1788 	}
1789 
1790 	return leaf;
1791 }
1792 
1793 /*
1794  * Returns the last level spte pointer of the shadow page walk for the given
1795  * gpa, and sets *spte to the spte value. This spte may be non-preset. If no
1796  * walk could be performed, returns NULL and *spte does not contain valid data.
1797  *
1798  * Contract:
1799  *  - Must be called between kvm_tdp_mmu_walk_lockless_{begin,end}.
1800  *  - The returned sptep must not be used after kvm_tdp_mmu_walk_lockless_end.
1801  *
1802  * WARNING: This function is only intended to be called during fast_page_fault.
1803  */
1804 u64 *kvm_tdp_mmu_fast_pf_get_last_sptep(struct kvm_vcpu *vcpu, u64 addr,
1805 					u64 *spte)
1806 {
1807 	struct tdp_iter iter;
1808 	struct kvm_mmu *mmu = vcpu->arch.mmu;
1809 	gfn_t gfn = addr >> PAGE_SHIFT;
1810 	tdp_ptep_t sptep = NULL;
1811 
1812 	tdp_mmu_for_each_pte(iter, mmu, gfn, gfn + 1) {
1813 		*spte = iter.old_spte;
1814 		sptep = iter.sptep;
1815 	}
1816 
1817 	/*
1818 	 * Perform the rcu_dereference to get the raw spte pointer value since
1819 	 * we are passing it up to fast_page_fault, which is shared with the
1820 	 * legacy MMU and thus does not retain the TDP MMU-specific __rcu
1821 	 * annotation.
1822 	 *
1823 	 * This is safe since fast_page_fault obeys the contracts of this
1824 	 * function as well as all TDP MMU contracts around modifying SPTEs
1825 	 * outside of mmu_lock.
1826 	 */
1827 	return rcu_dereference(sptep);
1828 }
1829