From: Marcelo Tosatti <mtosatti@redhat.com>
To: Avi Kivity <avi@qumranet.com>
Cc: KVM list <kvm@vger.kernel.org>
Subject: Re: [patch 07/13] KVM: MMU: mode specific sync_page
Date: Mon, 8 Sep 2008 03:03:54 -0300 [thread overview]
Message-ID: <20080908060354.GA1014@dmt.cnet> (raw)
In-Reply-To: <48C3A455.5080100@qumranet.com>
On Sun, Sep 07, 2008 at 12:52:21PM +0300, Avi Kivity wrote:
> What if vcpu0 is in mode X, while vcpu1 is in mode Y. vcpu0 writes to
> some pagetable, causing both mode X and mode Y shadows to become
> unsynced, so on the next resync (either by vcpu0 or vcpu1) we need to
> sync both modes.
>From the oos core patch:
- hlist_for_each_entry(sp, node, bucket, hash_link)
- if (sp->gfn == gfn && sp->role.word == role.word) {
+ hlist_for_each_entry_safe(sp, node, tmp, bucket, hash_link)
+ if (sp->gfn == gfn) {
+ /*
+ * If a pagetable becomes referenced by more than one
+ * root, or has multiple roles, unsync it and disable
+ * oos. For higher level pgtables the entire tree
+ * has to be synced.
+ */
+ if (sp->root_gfn != root_gfn) {
+ kvm_set_pg_inuse(sp);
+ if (set_shared_mmu_page(vcpu, sp))
+ tmp = bucket->first;
+ kvm_clear_pg_inuse(sp);
+ unsyncable = 0;
+ }
So as soon as a pagetable is shadowed with different modes, its resynced
and unsyncing is disabled.
> Same problem with kvm_mmu_pte_write(), which right now hacks around it.
>
> Maybe we need a ->ops member.
>> + if (!is_present_pte(*pt)) {
>> + rmap_remove(vcpu->kvm, &sp->spt[i]);
>> + sp->spt[i] = shadow_notrap_nonpresent_pte;
>> + pt++;
>> + continue;
>> + }
>>
>
> Are we missing a tlb flush? Or will the caller take care of it?
Yes, there's a local TLB flush missing, which can be collapsed into a
single kvm_x86_ops->tlb_flush in the caller.
>> +
>> + pte_access = sp->role.access & FNAME(gpte_access)(vcpu, *pt);
>> + /* user */
>> + if (pte_access & ACC_USER_MASK)
>> + spte |= shadow_user_mask;
>>
>
> There are some special cases involving cr0.wp=0 and the user mask. so
> spte.u is not correlated exactly with gpte.u.
How come?
>> + /* guest->shadow accessed sync */
>> + if (!(*pt & PT_ACCESSED_MASK))
>> + spte &= ~PT_ACCESSED_MASK;
>>
>
> spte shouldn't be accessible at all if gpte is not accessed, so we can
> set gpte.a on the next access (similar to spte not being writeable if
> gpte is not dirty).
Right. Perhaps accessed bit synchronization to guest could be performed
lazily somehow, so as to avoid a vmexit on every first page access.
>> + /* shadow->guest accessed sync */
>> + if (spte & PT_ACCESSED_MASK)
>> + set_bit(PT_ACCESSED_SHIFT, (unsigned long *)pt);
>>
>
> host accessed and guest accessed are very different. We shouldn't set
> host accessed unless we're sure the guest will access the page very soon.
>
>> + set_shadow_pte(&sp->spt[i], spte);
>>
>
> What if permissions are reduced?
Then a local TLB flush is needed. Flushing the TLB's of remote vcpus
should be done by the guest AFAICS.
> You can use PT_* instead of shadow_* as this will never be called when
> ept is active.
>
> I'm worried about the duplication with kvm_mmu_set_pte(). Perhaps that
> can be refactored instead to be the inner loop.
Will look into that.
next prev parent reply other threads:[~2008-09-08 6:05 UTC|newest]
Thread overview: 42+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-09-06 18:48 [patch 00/13] RFC: out of sync shadow Marcelo Tosatti
2008-09-06 18:48 ` [patch 01/13] x86/mm: get_user_pages_fast_atomic Marcelo Tosatti
2008-09-07 8:42 ` Avi Kivity
2008-09-08 6:10 ` Marcelo Tosatti
2008-09-08 14:20 ` Avi Kivity
2008-09-06 18:48 ` [patch 02/13] KVM: MMU: switch to get_user_pages_fast Marcelo Tosatti
2008-09-07 8:45 ` Avi Kivity
2008-09-07 20:44 ` Marcelo Tosatti
2008-09-08 14:53 ` Avi Kivity
2008-09-09 12:21 ` Andrea Arcangeli
2008-09-09 13:57 ` Avi Kivity
2008-09-06 18:48 ` [patch 03/13] KVM: MMU: gfn_to_page_atomic Marcelo Tosatti
2008-09-06 18:48 ` [patch 04/13] KVM: MMU: switch prefetch_page to gfn_to_page_atomic Marcelo Tosatti
2008-09-06 18:48 ` [patch 05/13] KVM: MMU: do not write-protect large mappings Marcelo Tosatti
2008-09-07 9:04 ` Avi Kivity
2008-09-07 20:54 ` Marcelo Tosatti
2008-09-06 18:48 ` [patch 06/13] KVM: MMU: global page keeping Marcelo Tosatti
2008-09-07 9:16 ` Avi Kivity
2008-09-06 18:48 ` [patch 07/13] KVM: MMU: mode specific sync_page Marcelo Tosatti
2008-09-07 9:52 ` Avi Kivity
2008-09-08 6:03 ` Marcelo Tosatti [this message]
2008-09-08 9:50 ` Avi Kivity
2008-09-06 18:48 ` [patch 08/13] KVM: MMU: record guest root level on struct guest_walker Marcelo Tosatti
2008-09-06 18:48 ` [patch 09/13] KVM: MMU: out of sync shadow core Marcelo Tosatti
2008-09-07 11:01 ` Avi Kivity
2008-09-08 7:19 ` Marcelo Tosatti
2008-09-08 14:51 ` Avi Kivity
2008-09-11 8:19 ` Marcelo Tosatti
2008-09-11 13:15 ` Marcelo Tosatti
2008-09-06 18:48 ` [patch 10/13] KVM: MMU: sync roots on mmu reload Marcelo Tosatti
2008-09-06 18:48 ` [patch 11/13] KVM: MMU: sync global pages on cr0/cr4 writes Marcelo Tosatti
2008-09-06 18:48 ` [patch 12/13] KVM: x86: trap invlpg Marcelo Tosatti
2008-09-07 11:14 ` Avi Kivity
2008-09-06 18:48 ` [patch 13/13] KVM: MMU: ignore multiroot when unsyncing global pages Marcelo Tosatti
2008-09-07 11:22 ` [patch 00/13] RFC: out of sync shadow Avi Kivity
2008-09-08 7:23 ` Marcelo Tosatti
2008-09-08 14:56 ` Avi Kivity
2008-09-12 4:05 ` David S. Ahern
2008-09-12 11:51 ` Marcelo Tosatti
2008-09-12 15:12 ` David S. Ahern
2008-09-12 18:09 ` Marcelo Tosatti
2008-09-12 18:19 ` David S. Ahern
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20080908060354.GA1014@dmt.cnet \
--to=mtosatti@redhat.com \
--cc=avi@qumranet.com \
--cc=kvm@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox