[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4DFF9766.3080505@cn.fujitsu.com>
Date: Tue, 21 Jun 2011 02:54:30 +0800
From: Xiao Guangrong <xiaoguangrong@...fujitsu.com>
To: Marcelo Tosatti <mtosatti@...hat.com>
CC: Avi Kivity <avi@...hat.com>, LKML <linux-kernel@...r.kernel.org>,
KVM <kvm@...r.kernel.org>
Subject: Re: [PATCH 10/15] KVM: MMU: lockless walking shadow page table
On 06/21/2011 12:37 AM, Marcelo Tosatti wrote:
>> + if (atomic_read(&kvm->arch.reader_counter)) {
>> + free_mmu_pages_unlock_parts(invalid_list);
>> + sp = list_first_entry(invalid_list, struct kvm_mmu_page, link);
>> + list_del_init(invalid_list);
>> + call_rcu(&sp->rcu, free_invalid_pages_rcu);
>> + return;
>> + }
>
> This is probably wrong, the caller wants the page to be zapped by the
> time the function returns, not scheduled sometime in the future.
>
It can be freed soon and KVM does not reuse these pages anymore...
it is not too bad, no?
>> +
>> do {
>> sp = list_first_entry(invalid_list, struct kvm_mmu_page, link);
>> WARN_ON(!sp->role.invalid || sp->root_count);
>> @@ -2601,6 +2633,35 @@ static gpa_t nonpaging_gva_to_gpa_nested(struct kvm_vcpu *vcpu, gva_t vaddr,
>> return vcpu->arch.nested_mmu.translate_gpa(vcpu, vaddr, access);
>> }
>>
>> +int kvm_mmu_walk_shadow_page_lockless(struct kvm_vcpu *vcpu, u64 addr,
>> + u64 sptes[4])
>> +{
>> + struct kvm_shadow_walk_iterator iterator;
>> + int nr_sptes = 0;
>> +
>> + rcu_read_lock();
>> +
>> + atomic_inc(&vcpu->kvm->arch.reader_counter);
>> + /* Increase the counter before walking shadow page table */
>> + smp_mb__after_atomic_inc();
>> +
>> + for_each_shadow_entry(vcpu, addr, iterator) {
>> + sptes[iterator.level-1] = *iterator.sptep;
>> + nr_sptes++;
>> + if (!is_shadow_present_pte(*iterator.sptep))
>> + break;
>> + }
>
> Why is lockless access needed for the MMIO optimization? Note the spte
> contents are copied to the array here are used for debugging purposes
> only, their contents are potentially stale.
>
Um, we can use it to check the mmio page fault if it is the real mmio access or the
bug of KVM, i discussed it with Avi:
===============================================
>
> Yes, it is, i just want to detect BUG for KVM, it helps us to know if "ept misconfig" is the
> real MMIO or the BUG. I noticed some "ept misconfig" BUGs is reported before, so i think doing
> this is necessary, and i think it is not too bad, since walking spte hierarchy is lockless,
> it really fast.
Okay. We can later see if it show up on profiles.
===============================================
And it is really fast, i will attach the 'perf result' when the v2 is posted.
Yes, their contents are potentially stale, we just use it to check mmio, after all, if we get the
stale spte, we will call page fault path to fix it.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists