* [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page()
@ 2007-11-02 5:13 Sheng Yang
[not found] ` <200711021313.43013.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
0 siblings, 1 reply; 6+ messages in thread
From: Sheng Yang @ 2007-11-02 5:13 UTC (permalink / raw)
To: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
[-- Attachment #1: Type: text/plain, Size: 1890 bytes --]
From 00a52112d813af983dd4d34cb7dc701f6fe88829 Mon Sep 17 00:00:00 2001
From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
Date: Fri, 2 Nov 2007 11:56:17 +0800
Subject: [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page()
For SMP guest, alloc_apic_access_page() would be called more than once. So
only the last vcpu's vmcs get correct apic access address, causing SMP guest
can't benifit from FlexPriority.
This patch fixed this issue.
Signed-off-by: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
---
drivers/kvm/kvm_main.c | 1 +
drivers/kvm/vmx.c | 5 ++++-
2 files changed, 5 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c
index 34a681d..519626d 100644
--- a/drivers/kvm/kvm_main.c
+++ b/drivers/kvm/kvm_main.c
@@ -245,6 +245,7 @@ static struct kvm *kvm_create_vm(void)
spin_lock(&kvm_lock);
list_add(&kvm->vm_list, &vm_list);
spin_unlock(&kvm_lock);
+ kvm->apic_access_page = NULL;
return kvm;
}
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 42e7fad..89007b2 100644
--- a/drivers/kvm/vmx.c
+++ b/drivers/kvm/vmx.c
@@ -1466,6 +1466,8 @@ static int alloc_apic_access_page(struct kvm *kvm)
int r;
r = -EFAULT;
+ if (kvm->apic_access_page)
+ return 0;
kvm_userspace_mem.slot = APIC_ACCESS_PAGE_PRIVATE_MEMSLOT;
kvm_userspace_mem.flags = 0;
kvm_userspace_mem.guest_phys_addr = 0xfee00000ULL;
@@ -1584,7 +1586,8 @@ static int vmx_vcpu_setup(struct vcpu_vmx *vmx)
vmcs_writel(CR0_GUEST_HOST_MASK, ~0UL);
vmcs_writel(CR4_GUEST_HOST_MASK, KVM_GUEST_CR4_MASK);
- if (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))
+ if ((vmx->vcpu.vcpu_id == 0) &&
+ (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm)))
if (alloc_apic_access_page(vmx->vcpu.kvm) != 0)
return -ENOMEM;
--
1.5.2
[-- Attachment #2: 0001-KVM-VMX-Fix-repeatly-allocate-of-apic-access-page.patch --]
[-- Type: text/x-diff, Size: 1849 bytes --]
From 00a52112d813af983dd4d34cb7dc701f6fe88829 Mon Sep 17 00:00:00 2001
From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
Date: Fri, 2 Nov 2007 11:56:17 +0800
Subject: [PATCH] KVM: VMX: Fix repeatly allocate of apic access page
For SMP guest, alloc_apic_access_page() would be called more than once.
So only the last one works, causing SMP guest can't benifit from FlexPriority.
This patch fixed this issue.
Signed-off-by: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
---
drivers/kvm/kvm_main.c | 1 +
drivers/kvm/vmx.c | 5 ++++-
2 files changed, 5 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c
index 34a681d..519626d 100644
--- a/drivers/kvm/kvm_main.c
+++ b/drivers/kvm/kvm_main.c
@@ -245,6 +245,7 @@ static struct kvm *kvm_create_vm(void)
spin_lock(&kvm_lock);
list_add(&kvm->vm_list, &vm_list);
spin_unlock(&kvm_lock);
+ kvm->apic_access_page = NULL;
return kvm;
}
diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c
index 42e7fad..89007b2 100644
--- a/drivers/kvm/vmx.c
+++ b/drivers/kvm/vmx.c
@@ -1466,6 +1466,8 @@ static int alloc_apic_access_page(struct kvm *kvm)
int r;
r = -EFAULT;
+ if (kvm->apic_access_page)
+ return 0;
kvm_userspace_mem.slot = APIC_ACCESS_PAGE_PRIVATE_MEMSLOT;
kvm_userspace_mem.flags = 0;
kvm_userspace_mem.guest_phys_addr = 0xfee00000ULL;
@@ -1584,7 +1586,8 @@ static int vmx_vcpu_setup(struct vcpu_vmx *vmx)
vmcs_writel(CR0_GUEST_HOST_MASK, ~0UL);
vmcs_writel(CR4_GUEST_HOST_MASK, KVM_GUEST_CR4_MASK);
- if (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))
+ if ((vmx->vcpu.vcpu_id == 0) &&
+ (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm)))
if (alloc_apic_access_page(vmx->vcpu.kvm) != 0)
return -ENOMEM;
--
1.5.2
[-- Attachment #3: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #4: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply related [flat|nested] 6+ messages in thread[parent not found: <200711021313.43013.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>]
* Re: [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page() [not found] ` <200711021313.43013.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> @ 2007-11-04 7:46 ` Avi Kivity [not found] ` <472D78CA.6080508-atKUWr5tajBWk0Htik3J/w@public.gmane.org> 0 siblings, 1 reply; 6+ messages in thread From: Avi Kivity @ 2007-11-04 7:46 UTC (permalink / raw) To: Sheng Yang; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f Sheng Yang wrote: > From 00a52112d813af983dd4d34cb7dc701f6fe88829 Mon Sep 17 00:00:00 2001 > From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> > Date: Fri, 2 Nov 2007 11:56:17 +0800 > Subject: [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page() > > For SMP guest, alloc_apic_access_page() would be called more than once. So > only the last vcpu's vmcs get correct apic access address, causing SMP guest > can't benifit from FlexPriority. > > This patch fixed this issue. > > Signed-off-by: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> > --- > drivers/kvm/kvm_main.c | 1 + > drivers/kvm/vmx.c | 5 ++++- > 2 files changed, 5 insertions(+), 1 deletions(-) > > diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c > index 34a681d..519626d 100644 > --- a/drivers/kvm/kvm_main.c > +++ b/drivers/kvm/kvm_main.c > @@ -245,6 +245,7 @@ static struct kvm *kvm_create_vm(void) > spin_lock(&kvm_lock); > list_add(&kvm->vm_list, &vm_list); > spin_unlock(&kvm_lock); > + kvm->apic_access_page = NULL; > Seems unnecessary, since the whole thing is kzalloc()ed? > return kvm; > } > > diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c > index 42e7fad..89007b2 100644 > --- a/drivers/kvm/vmx.c > +++ b/drivers/kvm/vmx.c > @@ -1466,6 +1466,8 @@ static int alloc_apic_access_page(struct kvm *kvm) > int r; > > r = -EFAULT; > + if (kvm->apic_access_page) > + return 0; > Racy, what if two vcpus are created simultaneously? > kvm_userspace_mem.slot = APIC_ACCESS_PAGE_PRIVATE_MEMSLOT; > kvm_userspace_mem.flags = 0; > kvm_userspace_mem.guest_phys_addr = 0xfee00000ULL; > @@ -1584,7 +1586,8 @@ static int vmx_vcpu_setup(struct vcpu_vmx *vmx) > vmcs_writel(CR0_GUEST_HOST_MASK, ~0UL); > vmcs_writel(CR4_GUEST_HOST_MASK, KVM_GUEST_CR4_MASK); > > - if (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm)) > + if ((vmx->vcpu.vcpu_id == 0) && > + (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))) > if (alloc_apic_access_page(vmx->vcpu.kvm) != 0) > return -ENOMEM; > > We may not have vcpu id 0 (though it's very unlikely). I think the problems arise because we are doing a VM-wide operation (memory slot) from a vcpu context. I think adding a ->vm_create() arch op and allocating the memory there will be better (under kvm->lock). -- Any sufficiently difficult bug is indistinguishable from a feature. ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <472D78CA.6080508-atKUWr5tajBWk0Htik3J/w@public.gmane.org>]
* Re: [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page () [not found] ` <472D78CA.6080508-atKUWr5tajBWk0Htik3J/w@public.gmane.org> @ 2007-11-05 5:52 ` Sheng Yang [not found] ` <200711051352.15366.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2007-11-05 8:52 ` [PATCH] KVM: VMX: Fix repeatlycalling alloc_apic_access_page() Dong, Eddie 1 sibling, 1 reply; 6+ messages in thread From: Sheng Yang @ 2007-11-05 5:52 UTC (permalink / raw) To: Avi Kivity; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Sunday 04 November 2007 15:46:18 Avi Kivity wrote: > Sheng Yang wrote: > > From 00a52112d813af983dd4d34cb7dc701f6fe88829 Mon Sep 17 00:00:00 2001 > > From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> > > Date: Fri, 2 Nov 2007 11:56:17 +0800 > > Subject: [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page() > > > > For SMP guest, alloc_apic_access_page() would be called more than once. > > So only the last vcpu's vmcs get correct apic access address, causing SMP > > guest can't benifit from FlexPriority. > > > > This patch fixed this issue. > > > > Signed-off-by: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> > > --- > > drivers/kvm/kvm_main.c | 1 + > > drivers/kvm/vmx.c | 5 ++++- > > 2 files changed, 5 insertions(+), 1 deletions(-) > > > > diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c > > index 34a681d..519626d 100644 > > --- a/drivers/kvm/kvm_main.c > > +++ b/drivers/kvm/kvm_main.c > > @@ -245,6 +245,7 @@ static struct kvm *kvm_create_vm(void) > > spin_lock(&kvm_lock); > > list_add(&kvm->vm_list, &vm_list); > > spin_unlock(&kvm_lock); > > + kvm->apic_access_page = NULL; > > Seems unnecessary, since the whole thing is kzalloc()ed? Yeah, that's right. I missed it. > > > return kvm; > > } > > > > diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c > > index 42e7fad..89007b2 100644 > > --- a/drivers/kvm/vmx.c > > +++ b/drivers/kvm/vmx.c > > @@ -1466,6 +1466,8 @@ static int alloc_apic_access_page(struct kvm *kvm) > > int r; > > > > r = -EFAULT; > > + if (kvm->apic_access_page) > > + return 0; > > Racy, what if two vcpus are created simultaneously? I think it is not racy, for BSP have been created before APs in sequence, and I am ensure only BSP(vcpu id=0) would call this. > > > kvm_userspace_mem.slot = APIC_ACCESS_PAGE_PRIVATE_MEMSLOT; > > kvm_userspace_mem.flags = 0; > > kvm_userspace_mem.guest_phys_addr = 0xfee00000ULL; > > @@ -1584,7 +1586,8 @@ static int vmx_vcpu_setup(struct vcpu_vmx *vmx) > > vmcs_writel(CR0_GUEST_HOST_MASK, ~0UL); > > vmcs_writel(CR4_GUEST_HOST_MASK, KVM_GUEST_CR4_MASK); > > > > - if (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm)) > > + if ((vmx->vcpu.vcpu_id == 0) && > > + (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))) > > if (alloc_apic_access_page(vmx->vcpu.kvm) != 0) > > return -ENOMEM; > > We may not have vcpu id 0 (though it's very unlikely). Um... I am not quite understand when we will miss vcpu id 0. I think vcpu id 0 is used to indicate BSP. > > I think the problems arise because we are doing a VM-wide operation > (memory slot) from a vcpu context. I think adding a ->vm_create() arch > op and allocating the memory there will be better (under kvm->lock). Agree, but a little problem remains. I have to do feature detection before call allocate function, but kvm_create_vm() is called before kvm_create_irqchip(). So I can't find a proper position for create_vm(). Any suggestion? -- Thanks Yang, Sheng ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <200711051352.15366.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>]
* Re: [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page() [not found] ` <200711051352.15366.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> @ 2007-11-05 13:55 ` Avi Kivity 0 siblings, 0 replies; 6+ messages in thread From: Avi Kivity @ 2007-11-05 13:55 UTC (permalink / raw) To: Sheng Yang; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f Sheng Yang wrote: > >>> return kvm; >>> } >>> >>> diff --git a/drivers/kvm/vmx.c b/drivers/kvm/vmx.c >>> index 42e7fad..89007b2 100644 >>> --- a/drivers/kvm/vmx.c >>> +++ b/drivers/kvm/vmx.c >>> @@ -1466,6 +1466,8 @@ static int alloc_apic_access_page(struct kvm *kvm) >>> int r; >>> >>> r = -EFAULT; >>> + if (kvm->apic_access_page) >>> + return 0; >>> >> Racy, what if two vcpus are created simultaneously? >> > > I think it is not racy, for BSP have been created before APs in sequence, and > I am ensure only BSP(vcpu id=0) would call this. > > That's true for qemu. But we have to be use malicious userspace can't crash the kernel or leak memory using the kvm APIs. >>> kvm_userspace_mem.slot = APIC_ACCESS_PAGE_PRIVATE_MEMSLOT; >>> kvm_userspace_mem.flags = 0; >>> kvm_userspace_mem.guest_phys_addr = 0xfee00000ULL; >>> @@ -1584,7 +1586,8 @@ static int vmx_vcpu_setup(struct vcpu_vmx *vmx) >>> vmcs_writel(CR0_GUEST_HOST_MASK, ~0UL); >>> vmcs_writel(CR4_GUEST_HOST_MASK, KVM_GUEST_CR4_MASK); >>> >>> - if (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm)) >>> + if ((vmx->vcpu.vcpu_id == 0) && >>> + (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))) >>> if (alloc_apic_access_page(vmx->vcpu.kvm) != 0) >>> return -ENOMEM; >>> >> We may not have vcpu id 0 (though it's very unlikely). >> > > Um... I am not quite understand when we will miss vcpu id 0. I think vcpu id 0 > is used to indicate BSP. > That's what qemu does. But another userspace perhaps will do this differently. This is a minor problem compared to the one above. > >> I think the problems arise because we are doing a VM-wide operation >> (memory slot) from a vcpu context. I think adding a ->vm_create() arch >> op and allocating the memory there will be better (under kvm->lock). >> > > Agree, but a little problem remains. > > I have to do feature detection before call allocate function, but > kvm_create_vm() is called before kvm_create_irqchip(). So I can't find a > proper position for create_vm(). Any suggestion? > You're right, during vm creation we have no idea if we want the FlexPriority page. So you can do this in the same place, just take kvm->mutex and check if it exists first (you need to do that anyway), no dependency on vcpu 0. -- Any sufficiently difficult bug is indistinguishable from a feature. ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH] KVM: VMX: Fix repeatlycalling alloc_apic_access_page() [not found] ` <472D78CA.6080508-atKUWr5tajBWk0Htik3J/w@public.gmane.org> 2007-11-05 5:52 ` [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page () Sheng Yang @ 2007-11-05 8:52 ` Dong, Eddie [not found] ` <10EA09EFD8728347A513008B6B0DA77A02557D41-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org> 1 sibling, 1 reply; 6+ messages in thread From: Dong, Eddie @ 2007-11-05 8:52 UTC (permalink / raw) To: Avi Kivity, Yang, Sheng; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f >> >> - if (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm)) >> + if ((vmx->vcpu.vcpu_id == 0) && >> + (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))) >> if (alloc_apic_access_page(vmx->vcpu.kvm) != 0) >> return -ENOMEM; >> >> > > We may not have vcpu id 0 (though it's very unlikely). > Current LAPIC code assume vcpu_id = 0 for BSP. And even no real support of APIC_ID change. How about use (vcpu->apic_base & MSR_IA32_APICBASE_BSP) ? ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ ^ permalink raw reply [flat|nested] 6+ messages in thread
[parent not found: <10EA09EFD8728347A513008B6B0DA77A02557D41-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>]
* Re: [PATCH] KVM: VMX: Fix repeatlycalling alloc_apic_access_page() [not found] ` <10EA09EFD8728347A513008B6B0DA77A02557D41-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org> @ 2007-11-05 13:58 ` Avi Kivity 0 siblings, 0 replies; 6+ messages in thread From: Avi Kivity @ 2007-11-05 13:58 UTC (permalink / raw) To: Dong, Eddie; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f Dong, Eddie wrote: >>> - if (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm)) >>> + if ((vmx->vcpu.vcpu_id == 0) && >>> + (vm_need_virtualize_apic_accesses(vmx->vcpu.kvm))) >>> if (alloc_apic_access_page(vmx->vcpu.kvm) != 0) >>> return -ENOMEM; >>> >>> >>> >> We may not have vcpu id 0 (though it's very unlikely). >> >> > > Current LAPIC code assume vcpu_id = 0 for BSP. > And even no real support of APIC_ID change. > > How about use (vcpu->apic_base & MSR_IA32_APICBASE_BSP) ? > Taking kvm->mutex and checking avoids hidden dependencies and is necessary anyway. I need to sit down and document the kvm locking rules. -- Any sufficiently difficult bug is indistinguishable from a feature. ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2007-11-05 13:58 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-11-02 5:13 [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page() Sheng Yang
[not found] ` <200711021313.43013.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2007-11-04 7:46 ` Avi Kivity
[not found] ` <472D78CA.6080508-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-11-05 5:52 ` [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page () Sheng Yang
[not found] ` <200711051352.15366.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2007-11-05 13:55 ` [PATCH] KVM: VMX: Fix repeatly calling alloc_apic_access_page() Avi Kivity
2007-11-05 8:52 ` [PATCH] KVM: VMX: Fix repeatlycalling alloc_apic_access_page() Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A02557D41-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2007-11-05 13:58 ` Avi Kivity
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox