[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <86pm7xjh3y.wl-maz@kernel.org>
Date: Fri, 21 Apr 2023 18:10:57 +0100
From: Marc Zyngier <maz@...nel.org>
To: Vipin Sharma <vipinsh@...gle.com>
Cc: oliver.upton@...ux.dev, james.morse@....com,
suzuki.poulose@....com, yuzenghui@...wei.com,
catalin.marinas@....com, will@...nel.org, chenhuacai@...nel.org,
aleksandar.qemu.devel@...il.com, tsbogend@...ha.franken.de,
anup@...infault.org, atishp@...shpatra.org,
paul.walmsley@...ive.com, palmer@...belt.com,
aou@...s.berkeley.edu, seanjc@...gle.com, pbonzini@...hat.com,
dmatlack@...gle.com, ricarkol@...gle.com,
linux-arm-kernel@...ts.infradead.org, kvmarm@...ts.linux.dev,
linux-mips@...r.kernel.org, kvm-riscv@...ts.infradead.org,
linux-riscv@...ts.infradead.org, linux-kselftest@...r.kernel.org,
kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 9/9] KVM: arm64: Run clear-dirty-log under MMU read lock
On Fri, 21 Apr 2023 17:53:05 +0100,
Vipin Sharma <vipinsh@...gle.com> wrote:
>
> Take MMU read lock for write protecting PTEs and use shared page table
> walker for clearing dirty logs.
>
> Clearing dirty logs are currently performed under MMU write locks. This
> means vCPUs write protection fault, which also take MMU read lock, will
> be blocked during this operation. This causes guest degradation and
> especially noticeable on VMs with lot of vCPUs.
>
> Taking MMU read lock will allow vCPUs to execute parallelly and reduces
> the impact on vCPUs performance.
Sure. Taking no lock whatsoever would be even better.
What I don't see is the detailed explanation that gives me the warm
feeling that this is safe and correct. Such an explanation is the
minimum condition for me to even read the patch.
Thanks,
M.
--
Without deviation from the norm, progress is not possible.
Powered by blists - more mailing lists