From mboxrd@z Thu Jan 1 00:00:00 1970 From: Xiao Guangrong Subject: Re: [PATCH 3/4] KVM: Switch to srcu-less get_dirty_log() Date: Fri, 16 Mar 2012 13:03:48 +0800 Message-ID: <4F62C9B4.7060804@linux.vnet.ibm.com> References: <20120301193007.04b2db8e.yoshikawa.takuya@oss.ntt.co.jp> <20120301193316.96682d60.yoshikawa.takuya@oss.ntt.co.jp> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Cc: avi@redhat.com, mtosatti@redhat.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org To: Takuya Yoshikawa Return-path: Received: from e23smtp07.au.ibm.com ([202.81.31.140]:54690 "EHLO e23smtp07.au.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751748Ab2CPFED (ORCPT ); Fri, 16 Mar 2012 01:04:03 -0400 Received: from /spool/local by e23smtp07.au.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 16 Mar 2012 04:58:09 +1000 In-Reply-To: <20120301193316.96682d60.yoshikawa.takuya@oss.ntt.co.jp> Sender: kvm-owner@vger.kernel.org List-ID: On 03/01/2012 06:33 PM, Takuya Yoshikawa wrote: > + spin_lock(&kvm->mmu_lock); > > - r = -ENOMEM; > - slots = kmemdup(kvm->memslots, sizeof(*kvm->memslots), GFP_KERNEL); > - if (!slots) > - goto out; > + for (i = 0; i < n / sizeof(long); i++) { > + unsigned long mask; > + gfn_t offset; > > - memslot = id_to_memslot(slots, log->slot); > - memslot->nr_dirty_pages = 0; > - memslot->dirty_bitmap = dirty_bitmap_head; > - update_memslots(slots, NULL); > + if (!dirty_bitmap[i]) > + continue; > > - old_slots = kvm->memslots; > - rcu_assign_pointer(kvm->memslots, slots); > - synchronize_srcu_expedited(&kvm->srcu); > - kfree(old_slots); For my quickly review, mmu_lock can not protect everything, if the guest page is written out of the shadow page/ept table, dirty page will be lost. There is a example: CPU A CPU B guest page is written by write-emulation hold mmu-lock and see dirty-bitmap is not be changed, then migration is completed. call mark_page_dirty() to set dirty_bit map Right?