public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Avi Kivity <avi@redhat.com>
To: Lai Jiangshan <laijs@cn.fujitsu.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>, kvm@vger.kernel.org
Subject: Re: [PATCH v2 0/4] Fix accessed bit tracking
Date: Mon, 07 Jun 2010 12:00:22 +0300	[thread overview]
Message-ID: <4C0CB526.9070309@redhat.com> (raw)
In-Reply-To: <4C0CB119.3060903@cn.fujitsu.com>

On 06/07/2010 11:43 AM, Lai Jiangshan wrote:
> Avi Kivity wrote:
>    
>> The kvm mmu synchronizes shadow ptes using the mmu lock, however the cpu
>> will happily ignore the lock when setting the accessed bit.  This can cause
>> the accessed bit to be lost.  Luckily this only results in incorrect page
>> selection for swap.
>>
>>      
> Atomic operation is heavy and slow, it hurts performance.
> Incorrect page selection for swap also hurts performance.
>    

We can avoid the exchange in most cases, for example if the new spte has 
the accessed bit set (already in the patch set) or if the page is 
already marked as accessed, or if we see the old spte has the accessed 
bit set (so no race can occur).  I'll update the patches to avoid 
atomics when possible.

I don't think atomics are that expensive, though, ~20 cycles on modern 
processors?

> I think there are very rare competitions happened and cause
> the accessed bit to be lost. Since there is no incorrect result
> when the accessed bit is lost. Is this problem over concern?
>    

The real concern is when we start using the dirty bit.  I'd like to 
fault read accesses with writeable sptes, but with the dirty bit clear.  
This way we can allow a guest to write to a page without a fault, but 
not cause it to swap too soon.

-- 
error compiling committee.c: too many arguments to function


  reply	other threads:[~2010-06-07  9:00 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-06-07  7:10 [PATCH v2 0/4] Fix accessed bit tracking Avi Kivity
2010-06-07  7:10 ` [PATCH v2 1/4] KVM: MMU: Introduce drop_spte() Avi Kivity
2010-06-07  7:10 ` [PATCH v2 2/4] KVM: MMU: Move accessed/dirty bit checks from rmap_remove() to drop_spte() Avi Kivity
2010-06-07  8:16   ` Lai Jiangshan
2010-06-07  9:01     ` Avi Kivity
2010-06-07  7:10 ` [PATCH v2 3/4] KVM: MMU: Atomically check for accessed bit when dropping an spte Avi Kivity
2010-06-08  2:07   ` Xiao Guangrong
2010-06-08  5:51     ` Avi Kivity
2010-06-07  7:10 ` [PATCH v2 4/4] KVM: MMU: Don't drop accessed bit while updating " Avi Kivity
2010-06-07  8:43 ` [PATCH v2 0/4] Fix accessed bit tracking Lai Jiangshan
2010-06-07  9:00   ` Avi Kivity [this message]
2010-06-08  2:35     ` Xiao Guangrong
2010-06-08  5:24       ` Avi Kivity
2010-06-08  6:53         ` Xiao Guangrong
2010-06-08  7:54           ` Avi Kivity
2010-06-08  8:30             ` Xiao Guangrong

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4C0CB526.9070309@redhat.com \
    --to=avi@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=laijs@cn.fujitsu.com \
    --cc=mtosatti@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox