From: Paolo Bonzini <pbonzini@redhat.com>
To: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>, gleb@kernel.org
Cc: avi.kivity@gmail.com, mtosatti@redhat.com,
linux-kernel@vger.kernel.org, kvm@vger.kernel.org
Subject: Re: [PATCH v5 5/5] KVM: MMU: flush tlb out of mmu lock when write-protect the sptes
Date: Mon, 28 Apr 2014 13:30:50 +0200 [thread overview]
Message-ID: <535E3BEA.4050704@redhat.com> (raw)
In-Reply-To: <1397725576-6617-6-git-send-email-xiaoguangrong@linux.vnet.ibm.com>
What about some editing of the big comment...
/*
* Currently, shadow PTEs are write protected in two cases, 1) write protecting
* guest page tables, 2) resetting dirty tracking after KVM_GET_DIRTY_LOG. The
* differences between these two sorts are:
*
* a) only the first case clears SPTE_MMU_WRITEABLE bit.
*
* b) the first case requires flushing the TLB immediately to avoid corruption
* of the shadow page table on other VCPUs. In order to synchronize with
* other VCPUs the flush is done under the MMU lock.
*
* The second case instead can delay flushing of the TLB until just before
* returning the dirty bitmap is returned to userspace; this is because it
* only write-protects pages that are set in the bitmap, and further writes
* to those pages can be safely ignored until userspace examines the bitmap.
* We rely on this to flush the TLB outside the MMU lock.
*
* A problem arises when these two cases occur concurrently. Userspace can
* call KVM_GET_DIRTY_LOG, which write-protects pages but does not immediately
* flush the TLB; in the meanwhile, KVM wants to write-protect a guest page
* table, sees it's already write-protected, and the result is a corrupted TLB.
*
* To avoid this problem, when write protecting guest page tables we *always*
* flush the TLB if the spte has the SPTE_MMU_WRITEABLE bit set, even if
* the spte was already write-protected. This works since case 2 never touches
* SPTE_MMU_WRITEABLE bit. In other words, whenever a spte is updated (only
* permission and status bits are changed) we need to check whether a spte with
* SPTE_MMU_WRITEABLE becomes readonly. If that happens, we flush the TLB.
* mmu_spte_update() handles this.
*
* The rules to use SPTE_MMU_WRITEABLE and PT_WRITABLE_MASK are as follows:
*
* a) if you want to see if it has a writable TLB entry, or if the spte can be
* writable on the mmu mapping, check SPTE_MMU_WRITEABLE. This is the most
* common case, otherwise
*
* b) when fixing a page fault on the spte or doing write-protection for
* dirty logging, check PT_WRITABLE_MASK.
Is the above accurate?
> * TODO: introduce APIs to split these two cases.
What do you mean exactly?
Paolo
next prev parent reply other threads:[~2014-04-28 11:30 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-04-17 9:06 [PATCH v5 0/5] KVM: x86: flush tlb out of mmu-lock after write protection Xiao Guangrong
2014-04-17 9:06 ` [PATCH v5 1/5] Revert "KVM: Simplify kvm->tlbs_dirty handling" Xiao Guangrong
2014-04-17 9:06 ` [PATCH v5 2/5] KVM: MMU: properly check last spte in fast_page_fault() Xiao Guangrong
2014-04-17 9:06 ` [PATCH v5 3/5] KVM: MMU: lazily drop large spte Xiao Guangrong
2014-04-17 9:06 ` [PATCH v5 4/5] KVM: MMU: flush tlb if the spte can be locklessly modified Xiao Guangrong
2014-04-17 9:06 ` [PATCH v5 5/5] KVM: MMU: flush tlb out of mmu lock when write-protect the sptes Xiao Guangrong
2014-04-28 11:30 ` Paolo Bonzini [this message]
2014-04-24 14:56 ` [PATCH v5 0/5] KVM: x86: flush tlb out of mmu-lock after write protection Marcelo Tosatti
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=535E3BEA.4050704@redhat.com \
--to=pbonzini@redhat.com \
--cc=avi.kivity@gmail.com \
--cc=gleb@kernel.org \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mtosatti@redhat.com \
--cc=xiaoguangrong@linux.vnet.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox