From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH] export notifier #1 Date: Wed, 23 Jan 2008 12:27:57 +0200 Message-ID: <479716AD.5070708@qumranet.com> References: <20080116124256.44033d48@bree.surriel.com> <478E4356.7030303@qumranet.com> <20080117162302.GI7170@v2.random> <478F9C9C.7070500@qumranet.com> <20080117193252.GC24131@v2.random> <20080121125204.GJ6970@v2.random> <4795F9D2.1050503@qumranet.com> <20080122144332.GE7331@v2.random> <20080122200858.GB15848@v2.random> <20080122223139.GD15848@v2.random> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: Andrew Morton , Nick Piggin , Andrea Arcangeli , linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org, Benjamin Herrenschmidt , steiner-sJ/iWh9BUns@public.gmane.org, linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org, daniel.blueman-xqY44rlHlBpWk0Htik3J/w@public.gmane.org, holt-sJ/iWh9BUns@public.gmane.org, Hugh Dickins To: Christoph Lameter Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org Errors-To: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org List-Id: kvm.vger.kernel.org Christoph Lameter wrote: > Ahhh. Good to hear. But we will still end in a situation where only > the remote ptes point to the page. Maybe the remote instance will dirty > the page at that point? > > When the spte is dropped, its dirty bit is transferred to the page. > >> sharing code, and for you missing a single notifier means memory >> corruption because you don't bump the page count to represent the >> external reference). >> > > The approach with the export notifier is page based not based on the > mm_struct. We only need a single page count for a page that is exported to > a number of remote instances of linux. The page count is dropped when all > the remote instances have unmapped the page. > That won't work for kvm. If we have a hundred virtual machines, that means 99 no-op notifications. Also, our rmap key for finding the spte is keyed on (mm, va). I imagine most RDMA cards are similar. > > >>> @@ -966,6 +973,9 @@ int try_to_unmap(struct page *page, int >>> >>> BUG_ON(!PageLocked(page)); >>> >>> + if (unlikely(PageExported(page))) >>> + export_notifier(invalidate_page, page); >>> + >>> >> Passing the page here will complicate things especially for shared >> pages across different VM that are already working in KVM. For non >> > > How? > > >> shared pages we could cache the userland mapping address in >> page->private but it's a kludge only working for non-shared >> pages. Walking twice the anon_vma lists when only a single walk is >> > > There is only the need to walk twice for pages that are marked Exported. > And the double walk is only necessary if the exporter does not have its > own rmap. The cross partition thing that we are doing has such an rmap and > its a matter of walking the exporters rmap to clear out the external > references and then we walk the local rmaps. All once. > The problem is that external mmus need a reverse mapping structure to locate their ptes. We can't expand struct page so we need to base it on mm + va. > >> Besides the pinned pages ram leak by having the zero locking window >> above I'm curious how you are going to take care of the finegrined >> aging that I'm doing with the accessed bit set by hardware in the spte >> > > I think I explained that above. Remote users effectively are forbidden to > establish new references to the page by the clearing of the exported bit. > > Can they wait on that bit? -- error compiling committee.c: too many arguments to function ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/