lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <45084C2E.4060203@vmware.com>
Date:	Wed, 13 Sep 2006 11:21:34 -0700
From:	Zachary Amsden <zach@...are.com>
To:	Martin Schwidefsky <schwidefsky@...ibm.com>
Cc:	linux-kernel@...r.kernel.org, virtualization@...ts.osdl.org,
	akpm@...l.org, nickpiggin@...oo.com.au, frankeh@...son.ibm.com,
	rhim@...gateh.edu
Subject: Re: [patch 3/9] Guest page hinting: volatile page cache.

Martin Schwidefsky wrote:
> The code added by this patch uses the volatile state for all page cache
> pages, even for pages which are referenced by writable ptes. The host
> needs to be able to check the dirty state of the pages. Since the host
> doesn't know where the page table entries of the guest are located,
> the volatile state as introduced by this patch is only usable on
> architectures with per-page dirty bits (s390 only). For per-pte dirty
> bit architectures some additional code is needed.
>   

What do you mean by per-page dirty bits.  Do you mean per-page dirty 
bits in hardware (s390), in software (Linux), or maintained by the 
hypervisor?

> The interesting question is where to put the state transitions between
> the volatile and the stable state. The simple solution is the make a
> page stable whenever a lookup is done or a page reference is derived
> from a page table entry. Attempts to make pages volatile are added at
> strategic points. Now what are the conditions that prevent a page from
> being made volatile? There are 10 conditions:
> 1) The page is reserved. Some sort of special page.
> 2) The page is marked dirty in the struct page. The page content is
>    more recent than the data on the backing device. The host cannot
>    access the linux internal dirty bit so the page needs to be stable.
> 3) The page is in writeback. The page content is needed for i/o.
> 4) The page is locked. Someone has exclusive access to the page.
>   

I'll tend to agree from a heuristical performance point of view, but I 
don't see any reason that a locked page can't be made volatile from a 
correctness perspective.

> 5) The page is anonymous. Swap cache support needs additional code.
> 6) The page has no mapping. No backing, the page cannot be recreated.
> 7) The page is not uptodate.
> 8) The page has private information. try_to_release_page can fail,
>    e.g. in case the private information is journaling data. The discard
>    fault need to be able to remove the page.
> 9) The page is already discarded.
> 10) The page map count is not equal to the page reference count - 1.
>    The discard fault handler can remove the page cache reference and
>    all mappers of a page. It cannot remove the page reference for any
>    other user of the page.
>   

Does s390 use per physical page permission bits separate from the PTEs?  
Because I don't see how you can generate a discard fault otherwise 
unless you know where the page table entries of the guest are located, 
which you already said you don't.  Or perhaps I'm misunderstanding the 
meaning of discard fault - I'm taking it to mean a fault which happens 
on access to a volatile page that was discarded by the hypervisor - thus 
requiring a refresh of all mapping PTEs?

Thanks,

Zach
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ