public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Gleb Natapov <gleb@redhat.com>
To: Marcelo Tosatti <mtosatti@redhat.com>
Cc: David Daney <ddaney.cavm@gmail.com>,
	kvm@vger.kernel.org, Sanjay Lal <sanjayl@kymasys.com>
Subject: Re: Q: What is the struct kvm srcu protecting?
Date: Fri, 3 May 2013 13:51:01 +0300	[thread overview]
Message-ID: <20130503105101.GE17141@redhat.com> (raw)
In-Reply-To: <20130503014836.GB8741@amt.cnet>

Hi David,

On Thu, May 02, 2013 at 10:48:36PM -0300, Marcelo Tosatti wrote:
> On Thu, May 02, 2013 at 11:22:52AM -0700, David Daney wrote:
> > Hi,
> > 
> > I am working on the MIPS KVM port, and am trying to figure out under
> > which circumstances do I need to srcu_read_lock()/srcu_read_unlock()
> > the kvm->srcu.
> 
Is your work somehow related to the work of Sanjay Lal that can be found
here: https://git.linux-mips.org/?p=ralf/upstream-sfr.git;a=summary?

Some clarification/addition to what Marcelo said below.

> For x86: kvm->srcu protects memory slot information (kvm->memslots) and
> in-kernel MMIO/PIO address->device structure mapping (kvm->buses).
> Search for synchronize_srcu_expedited() in virt/kvm/ to locate the
> updaters.
This is not only for x86. Any arch code that access memslots have to be
srcu read protected.

> 
> > I am looking at implementing something similar to arch/x86/kvm/x86.c
> > at __msr_io(), where we see:
> > 
> > .
> > .
> > .
> > 	idx = srcu_read_lock(&vcpu->kvm->srcu);
> > 	for (i = 0; i < msrs->nmsrs; ++i)
> > 		if (do_msr(vcpu, entries[i].index, &entries[i].data))
> > 			break;
> > 	srcu_read_unlock(&vcpu->kvm->srcu, idx);
> > .
> > .
> > .
> > 
> > Why is the srcu_read_lock() taken here?  I see no srcu_dereference()
> > in the code path that would indicate the need for obtaining the
> > lock.
> 
>         case KVM_GET_MSRS:
>                 r = msr_io(vcpu, argp, kvm_get_msr, 1);
>                 break;
>         case KVM_SET_MSRS:
>                 r = msr_io(vcpu, argp, do_set_msr, 0);
>                 break;
> 
> to
> 
> int kvm_get_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 *pdata)
> {
>         return kvm_x86_ops->get_msr(vcpu, msr_index, pdata);
> }
> 
> Somewhere down that path memslot information must be accessed.
> 
As Marcelo explained bellow on X86 srcu lock is held while vcpu loop is
running, so all the code that is usually called from vcpu does not do
its own locking. In rare cases that this code is called not from vcpu
main loop the locking is done explicitly on the high level.

This design is architecture choice. Other arches access memslot much
less and do locking as close to memslot access as possible. 

> > I have a feeling that I am missing some essential concept about the
> > design of this code, but I don't know what it is.
> > 
> > Can someone explain what is happening here?
> 
> For x86 the usage is: 
> 
> VCPU CODE PATH
> --------------
> 
> IOCTL(KVM_FD, KVM_VCPU_RUN)
> ENTER-KERNEL
> SRCU_READ_LOCK() 
> 	... large parte of vcpu context code performed with srcu lock held, 
> 	so that memory slot information can be used to access guest memory
> 	(gfn_to_memslot for example).
> SRCU_READ_UNLOCK()
> VMENTER
> 	while in guest mode srcu is not held so that updaters can make
> 	progress
> VMEXIT
> SRCU_READ_LOCK()
> 	back to vcpu context code
> 
> SRCU_READ_UNLOCK before return to userspace.
> 
> Also, when emulating HALT (kvm_vcpu_block) srcu is dropped.
> 
> UPDATERS
> --------
> See synchronize_srcu_expedited in virt/kvm/
> 
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

--
			Gleb.

  reply	other threads:[~2013-05-03 10:51 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-05-02 18:22 Q: What is the struct kvm srcu protecting? David Daney
2013-05-03  1:48 ` Marcelo Tosatti
2013-05-03 10:51   ` Gleb Natapov [this message]
2013-05-03 17:21     ` David Daney
2013-05-05  7:37       ` Gleb Natapov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20130503105101.GE17141@redhat.com \
    --to=gleb@redhat.com \
    --cc=ddaney.cavm@gmail.com \
    --cc=kvm@vger.kernel.org \
    --cc=mtosatti@redhat.com \
    --cc=sanjayl@kymasys.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox