From: Marcelo Tosatti <mtosatti@redhat.com>
To: Roman Kagan <rkagan@virtuozzo.com>,
kvm@vger.kernel.org, "Denis V. Lunev" <den@openvz.org>,
Owen Hofmann <osh@google.com>,
Paolo Bonzini <pbonzini@redhat.com>
Subject: Re: [PATCH] x86/kvm: fix condition to update kvm master clocks
Date: Tue, 21 Jun 2016 18:28:45 -0300 [thread overview]
Message-ID: <20160621212845.GA14318@amt.cnet> (raw)
In-Reply-To: <20160621144032.pmwc7baeo6247rzq@rkaganb.sw.ru>
On Tue, Jun 21, 2016 at 05:40:32PM +0300, Roman Kagan wrote:
> On Mon, Jun 20, 2016 at 06:29:10PM -0300, Marcelo Tosatti wrote:
> > On Mon, Jun 20, 2016 at 08:22:49PM +0300, Roman Kagan wrote:
> > > The per-vcpu hv_clock is updated when the vcpu processes
> > > KVM_REQ_CLOCK_UPDATE request.
> >
> > Yes.
> >
> > > Once kvm_gen_update_masterclock() sets KVM_REQ_CLOCK_UPDATE and
> > > clears KVM_REQ_MCLOCK_INPROGRESS for all vcpus, one vcpu can process the
> > > requests, enter the guest, and read another vcpu's hv_clock, before that
> > > other vcpu had a chance to process its KVM_REQ_CLOCK_UPDATE request.
> >
> > Yes. But guest code should be reading its local kvmclock area:
> >
> > /*
> > * Test we're still on the cpu as well as the version.
> > * We could have been migrated just after the first
> > * vgetcpu but before fetching the version, so we
> > * wouldn't notice a version change.
> > */
> > cpu1 = __getcpu() & VGETCPU_CPU_MASK;
> >
> > (vclock_gettime.c)
>
> This code is from an older version. The latest always reads the clock
> of the CPU #0:
>
> /*
> * Note: The kernel and hypervisor must guarantee that cpu ID
> * number maps 1:1 to per-CPU pvclock time info.
> *
> * Because the hypervisor is entirely unaware of guest userspace
> * preemption, it cannot guarantee that per-CPU pvclock time
> * info is updated if the underlying CPU changes or that that
> * version is increased whenever underlying CPU changes.
> *
> * On KVM, we are guaranteed that pvti updates for any vCPU are
> * atomic as seen by *all* vCPUs. This is an even stronger
> * guarantee than we get with a normal seqlock.
> *
> * On Xen, we don't appear to have that guarantee, but Xen still
> * supplies a valid seqlock using the version field.
> *
> * We only do pvclock vdso timing at all if
> * PVCLOCK_TSC_STABLE_BIT is set, and we interpret that bit to
> * mean that all vCPUs have matching pvti and that the TSC is
> * synced, so we can just look at vCPU 0's pvti.
> */
In that case vCPU-N (that has its local kvmclock updated), will read vCPU-0's
(which does not have its kvmclock area updated).
vCPU-0 kvmclock area either contains the old copy of kvmclock values,
or the new copy.
That reading of vCPU-0 is protected by the version check, therefore it
is safe.
> > > Is there anything that prevents this?
> >
> > Guest code confirming both version and cpu do not change across
> > a kvmclock read. Other than this, no.
>
> So is the code reading another vcpu's hv_clock wrong?
Its fine.
What you can't do is to:
at vcpu-3:
read kvmclock area of local vcpu.
read kvmclock area of remote vcpu.
And compare the values.
What you can do is:
at vcpu-1:
read kvmclock area of local vcpu.
at vcpu-3:
read kvmclock area of local vcpu.
And compare these reads. They should be monotonic.
Or only read from a single vcpu, thats also monotonic.
prev parent reply other threads:[~2016-06-21 21:29 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-05-26 14:49 [PATCH] x86/kvm: fix condition to update kvm master clocks Roman Kagan
2016-05-26 20:19 ` Radim Krčmář
2016-05-27 17:28 ` Roman Kagan
2016-05-27 18:11 ` Radim Krčmář
2016-05-27 18:46 ` Roman Kagan
2016-05-27 19:29 ` Radim Krčmář
2016-05-29 23:38 ` Marcelo Tosatti
2016-06-09 3:27 ` Marcelo Tosatti
2016-06-09 3:45 ` Marcelo Tosatti
2016-06-09 12:09 ` Roman Kagan
2016-06-09 18:25 ` Marcelo Tosatti
2016-06-09 19:19 ` Roman Kagan
2016-06-13 17:07 ` Roman Kagan
2016-06-14 22:11 ` Marcelo Tosatti
2016-06-13 17:19 ` Roman Kagan
2016-06-17 22:21 ` Marcelo Tosatti
2016-06-20 17:22 ` Roman Kagan
2016-06-20 21:29 ` Marcelo Tosatti
2016-06-21 14:40 ` Roman Kagan
2016-06-21 21:28 ` Marcelo Tosatti [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20160621212845.GA14318@amt.cnet \
--to=mtosatti@redhat.com \
--cc=den@openvz.org \
--cc=kvm@vger.kernel.org \
--cc=osh@google.com \
--cc=pbonzini@redhat.com \
--cc=rkagan@virtuozzo.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox