* [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers
@ 2008-08-22 23:03 Marcelo Tosatti
2008-08-22 23:03 ` [patch 1/2] libkvm: add kvm_has_sync_mmu Marcelo Tosatti
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: Marcelo Tosatti @ 2008-08-22 23:03 UTC (permalink / raw)
To: kvm
fork'ing inside qemu can create stale shadow entries without mmu
notifiers.
--
^ permalink raw reply [flat|nested] 4+ messages in thread* [patch 1/2] libkvm: add kvm_has_sync_mmu 2008-08-22 23:03 [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers Marcelo Tosatti @ 2008-08-22 23:03 ` Marcelo Tosatti 2008-08-22 23:03 ` [patch 2/2] qemu: kvm: mark guest mapping as MADV_DONTFORK Marcelo Tosatti 2008-08-25 10:20 ` [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers Avi Kivity 2 siblings, 0 replies; 4+ messages in thread From: Marcelo Tosatti @ 2008-08-22 23:03 UTC (permalink / raw) To: kvm; +Cc: Anthony Liguori, Marcelo Tosatti [-- Attachment #1: sync-mmu --] [-- Type: text/plain, Size: 1327 bytes --] From: Anthony Liguori <aliguori@us.ibm.com> This patch adds a kvm_has_sync_mmu routine to libkvm. This allows userspace to query the existence of mmu notifiers which is important for ballooning since madvise() is not safe from userspace without it. Signed-off-by: Anthony Liguori <aliguori@us.ibm.com> Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com> Index: kvm-userspace.tip/libkvm/libkvm.c =================================================================== --- kvm-userspace.tip.orig/libkvm/libkvm.c +++ kvm-userspace.tip/libkvm/libkvm.c @@ -1053,6 +1053,15 @@ int kvm_pit_in_kernel(kvm_context_t kvm) return kvm->pit_in_kernel; } +int kvm_has_sync_mmu(kvm_context_t kvm) +{ + int r = 0; +#ifdef KVM_CAP_SYNC_MMU + r = ioctl(kvm->fd, KVM_CHECK_EXTENSION, KVM_CAP_SYNC_MMU); +#endif + return r; +} + int kvm_init_coalesced_mmio(kvm_context_t kvm) { int r = 0; Index: kvm-userspace.tip/libkvm/libkvm.h =================================================================== --- kvm-userspace.tip.orig/libkvm/libkvm.h +++ kvm-userspace.tip/libkvm/libkvm.h @@ -528,6 +528,8 @@ int kvm_dirty_pages_log_reset(kvm_contex */ int kvm_irqchip_in_kernel(kvm_context_t kvm); +int kvm_has_sync_mmu(kvm_context_t kvm); + #ifdef KVM_CAP_IRQCHIP /*! * \brief Dump in kernel IRQCHIP contents -- ^ permalink raw reply [flat|nested] 4+ messages in thread
* [patch 2/2] qemu: kvm: mark guest mapping as MADV_DONTFORK 2008-08-22 23:03 [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers Marcelo Tosatti 2008-08-22 23:03 ` [patch 1/2] libkvm: add kvm_has_sync_mmu Marcelo Tosatti @ 2008-08-22 23:03 ` Marcelo Tosatti 2008-08-25 10:20 ` [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers Avi Kivity 2 siblings, 0 replies; 4+ messages in thread From: Marcelo Tosatti @ 2008-08-22 23:03 UTC (permalink / raw) To: kvm; +Cc: Marcelo Tosatti [-- Attachment #1: kvm-setup-mem --] [-- Type: text/plain, Size: 2720 bytes --] When qemu fork's (ssh migration, qemu-nbd, slirp), the guest memory mapping becomes shared and write-protected by parent and child, until execve switches to a new mm. Since kernel commit 7885a4fbebcbae1f8594445a46aefb9d97353594, get_user_pages with force=1 parameter will break COW during this window, leaving stale shadow mappings that point to the previously shared page. Fix this by madvising the range as MADV_DONTFORK, if mmu notifiers are disabled. Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com> Index: kvm-userspace.tip/qemu/qemu-kvm.c =================================================================== --- kvm-userspace.tip.orig/qemu/qemu-kvm.c +++ kvm-userspace.tip/qemu/qemu-kvm.c @@ -25,6 +25,7 @@ int kvm_pit = 1; #include <pthread.h> #include <sys/utsname.h> #include <sys/syscall.h> +#include <sys/mman.h> #define bool _Bool #define false 0 @@ -812,6 +813,19 @@ void kvm_cpu_register_physical_memory(ta } } +int kvm_setup_guest_memory(void *area, unsigned long size) +{ + int ret = 0; + + if (kvm_enabled() && !kvm_has_sync_mmu(kvm_context)) + ret = madvise(area, size, MADV_DONTFORK); + + if (ret) + perror ("madvise"); + + return ret; +} + int kvm_qemu_check_extension(int ext) { return kvm_check_extension(kvm_context, ext); Index: kvm-userspace.tip/qemu/qemu-kvm.h =================================================================== --- kvm-userspace.tip.orig/qemu/qemu-kvm.h +++ kvm-userspace.tip/qemu/qemu-kvm.h @@ -45,6 +45,7 @@ void *kvm_cpu_create_phys_mem(target_phy void kvm_cpu_destroy_phys_mem(target_phys_addr_t start_addr, unsigned long size); +int kvm_setup_guest_memory(void *area, unsigned long size); int kvm_arch_qemu_create_context(void); Index: kvm-userspace.tip/qemu/vl.c =================================================================== --- kvm-userspace.tip.orig/qemu/vl.c +++ kvm-userspace.tip/qemu/vl.c @@ -8890,7 +8890,7 @@ static int gethugepagesize(void) return hugepagesize; } -void *alloc_mem_area(unsigned long memory, const char *path) +void *alloc_mem_area(size_t memory, unsigned long *len, const char *path) { char *filename; void *area; @@ -8929,18 +8929,23 @@ void *alloc_mem_area(unsigned long memor return NULL; } + *len = memory; return area; } void *qemu_alloc_physram(unsigned long memory) { void *area = NULL; + unsigned long map_len = memory; if (mem_path) - area = alloc_mem_area(memory, mem_path); + area = alloc_mem_area(memory, &map_len, mem_path); if (!area) area = qemu_vmalloc(memory); - +#ifdef USE_KVM + if (kvm_setup_guest_memory(area, map_len)) + area = NULL; +#endif return area; } -- ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers 2008-08-22 23:03 [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers Marcelo Tosatti 2008-08-22 23:03 ` [patch 1/2] libkvm: add kvm_has_sync_mmu Marcelo Tosatti 2008-08-22 23:03 ` [patch 2/2] qemu: kvm: mark guest mapping as MADV_DONTFORK Marcelo Tosatti @ 2008-08-25 10:20 ` Avi Kivity 2 siblings, 0 replies; 4+ messages in thread From: Avi Kivity @ 2008-08-25 10:20 UTC (permalink / raw) To: Marcelo Tosatti; +Cc: kvm Marcelo Tosatti wrote: > fork'ing inside qemu can create stale shadow entries without mmu > notifiers. > > Applied both. Thanks. -- error compiling committee.c: too many arguments to function ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2008-08-25 10:20 UTC | newest] Thread overview: 4+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2008-08-22 23:03 [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers Marcelo Tosatti 2008-08-22 23:03 ` [patch 1/2] libkvm: add kvm_has_sync_mmu Marcelo Tosatti 2008-08-22 23:03 ` [patch 2/2] qemu: kvm: mark guest mapping as MADV_DONTFORK Marcelo Tosatti 2008-08-25 10:20 ` [patch 0/2] madvise(MADV_DONTFORK) guest mem if !mmu_notifiers Avi Kivity
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox