Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751969Ab3CRIJJ (ORCPT ); Mon, 18 Mar 2013 04:09:09 -0400 Received: from e23smtp06.au.ibm.com ([202.81.31.148]:60180 "EHLO e23smtp06.au.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751861Ab3CRIJG (ORCPT ); Mon, 18 Mar 2013 04:09:06 -0400 Message-ID: <5146CB92.7060203@linux.vnet.ibm.com> Date: Mon, 18 Mar 2013 16:08:50 +0800 From: Xiao Guangrong User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130110 Thunderbird/17.0.2 MIME-Version: 1.0 To: Gleb Natapov CC: Marcelo Tosatti , LKML , KVM Subject: Re: [PATCH 5/5] KVM: MMU: fast invalid all mmio sptes References: <51433D98.4050605@linux.vnet.ibm.com> <51433E71.2070107@linux.vnet.ibm.com> <20130317150239.GM11223@redhat.com> In-Reply-To: <20130317150239.GM11223@redhat.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Content-Scanned: Fidelis XPS MAILER x-cbid: 13031808-7014-0000-0000-000002BA7B20 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6891 Lines: 175 On 03/17/2013 11:02 PM, Gleb Natapov wrote: > On Fri, Mar 15, 2013 at 11:29:53PM +0800, Xiao Guangrong wrote: >> This patch tries to introduce a very simple and scale way to invalid all >> mmio sptes - it need not walk any shadow pages and hold mmu-lock >> >> KVM maintains a global mmio invalid generation-number which is stored in >> kvm->arch.mmio_invalid_gen and every mmio spte stores the current global >> generation-number into his available bits when it is created >> >> When KVM need zap all mmio sptes, it just simply increase the global >> generation-number. When guests do mmio access, KVM intercepts a MMIO #PF >> then it walks the shadow page table and get the mmio spte. If the >> generation-number on the spte does not equal the global generation-number, >> it will go to the normal #PF handler to update the mmio spte >> >> Since 19 bits are used to store generation-number on mmio spte, the >> generation-number can be round after 33554432 times. It is large enough >> for nearly all most cases, but making the code be more strong, we zap all >> shadow pages when the number is round >> > Very nice idea, but why drop Takuya patches instead of using > kvm_mmu_zap_mmio_sptes() when generation number overflows. I am not sure whether it is still needed. Requesting to zap all mmio sptes for more than 500000 times is really really rare, it nearly does not happen. (By the way, 33554432 is wrong in the changelog, i just copy that for my origin implantation.) And, after my patch optimizing zapping all shadow pages, zap-all-sps should not be a problem anymore since it does not take too much lock time. Your idea? > > >> Signed-off-by: Xiao Guangrong >> --- >> arch/x86/include/asm/kvm_host.h | 2 + >> arch/x86/kvm/mmu.c | 61 +++++++++++++++++++++++++++++++++------ >> arch/x86/kvm/mmutrace.h | 17 +++++++++++ >> arch/x86/kvm/paging_tmpl.h | 7 +++- >> arch/x86/kvm/vmx.c | 4 ++ >> arch/x86/kvm/x86.c | 6 +-- >> 6 files changed, 82 insertions(+), 15 deletions(-) >> >> diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h >> index ef7f4a5..572398e 100644 >> --- a/arch/x86/include/asm/kvm_host.h >> +++ b/arch/x86/include/asm/kvm_host.h >> @@ -529,6 +529,7 @@ struct kvm_arch { >> unsigned int n_requested_mmu_pages; >> unsigned int n_max_mmu_pages; >> unsigned int indirect_shadow_pages; >> + unsigned int mmio_invalid_gen; > Why invalid? Should be mmio_valid_gen or mmio_current_get. mmio_invalid_gen is only updated in kvm_mmu_invalidate_mmio_sptes, so i named it as _invalid_. But mmio_valid_gen is good for me. > >> struct hlist_head mmu_page_hash[KVM_NUM_MMU_PAGES]; >> /* >> * Hash table of struct kvm_mmu_page. >> @@ -765,6 +766,7 @@ void kvm_mmu_slot_remove_write_access(struct kvm *kvm, int slot); >> void kvm_mmu_write_protect_pt_masked(struct kvm *kvm, >> struct kvm_memory_slot *slot, >> gfn_t gfn_offset, unsigned long mask); >> +void kvm_mmu_invalid_mmio_spte(struct kvm *kvm); > Agree with Takuya that kvm_mmu_invalidate_mmio_sptes() is a better name. Me too. > >> void kvm_mmu_zap_all(struct kvm *kvm); >> unsigned int kvm_mmu_calculate_mmu_pages(struct kvm *kvm); >> void kvm_mmu_change_mmu_pages(struct kvm *kvm, unsigned int kvm_nr_mmu_pages); >> diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c >> index 13626f4..7093a92 100644 >> --- a/arch/x86/kvm/mmu.c >> +++ b/arch/x86/kvm/mmu.c >> @@ -234,12 +234,13 @@ static unsigned int get_mmio_spte_generation(u64 spte) >> static void mark_mmio_spte(struct kvm *kvm, u64 *sptep, u64 gfn, >> unsigned access) >> { >> - u64 mask = generation_mmio_spte_mask(0); >> + unsigned int gen = ACCESS_ONCE(kvm->arch.mmio_invalid_gen); >> + u64 mask = generation_mmio_spte_mask(gen); >> >> access &= ACC_WRITE_MASK | ACC_USER_MASK; >> mask |= shadow_mmio_mask | access | gfn << PAGE_SHIFT; >> >> - trace_mark_mmio_spte(sptep, gfn, access, 0); >> + trace_mark_mmio_spte(sptep, gfn, access, gen); >> mmu_spte_set(sptep, mask); >> } >> >> @@ -269,6 +270,34 @@ static bool set_mmio_spte(struct kvm *kvm, u64 *sptep, gfn_t gfn, >> return false; >> } >> >> +static bool check_mmio_spte(struct kvm *kvm, u64 spte) >> +{ >> + return get_mmio_spte_generation(spte) == >> + ACCESS_ONCE(kvm->arch.mmio_invalid_gen); >> +} >> + >> +/* >> + * The caller should protect concurrent access on >> + * kvm->arch.mmio_invalid_gen. Currently, it is used by >> + * kvm_arch_commit_memory_region and protected by kvm->slots_lock. >> + */ >> +void kvm_mmu_invalid_mmio_spte(struct kvm *kvm) >> +{ >> + /* Ensure update memslot has been completed. */ >> + smp_mb(); > What barrier this one is paired with? It is paired with nothing. :) I used mb here just for avoid increasing the generation-number before updating the memslot. But on other sides (storing gen and checking gen), we do not need to care it - the worse case is that we emulate a memory-accessed instruction. > >> + >> + trace_kvm_mmu_invalid_mmio_spte(kvm); > Something wrong with indentation. My mistake. No idea why checkpatch did not warn me. > >> + >> + /* >> + * The very rare case: if the generation-number is round, >> + * zap all shadow pages. >> + */ >> + if (unlikely(kvm->arch.mmio_invalid_gen++ == MAX_GEN)) { >> + kvm->arch.mmio_invalid_gen = 0; >> + return kvm_mmu_zap_all(kvm); >> + } >> +} >> + >> static inline u64 rsvd_bits(int s, int e) >> { >> return ((1ULL << (e - s + 1)) - 1) << s; >> @@ -3183,9 +3212,12 @@ static u64 walk_shadow_page_get_mmio_spte(struct kvm_vcpu *vcpu, u64 addr) >> } >> >> /* >> - * If it is a real mmio page fault, return 1 and emulat the instruction >> - * directly, return 0 to let CPU fault again on the address, -1 is >> - * returned if bug is detected. >> + * Return value: >> + * 2: invalid spte is detected then let the real page fault path >> + * update the mmio spte. >> + * 1: it is a real mmio page fault, emulate the instruction directly. >> + * 0: let CPU fault again on the address. >> + * -1: bug is detected. >> */ > What about dropping spte and let guest re-fault instead of propagating > new return value up the call chain. If this is slow lets at least define > a enum with descriptive names. Checking mmio spte is out of mmu-lock, we can not clear it here. And should be updated in the real page fault path, so it is no worth to atomic-ly clear it out of mmu-lock and refault again. (As you said, it is slow). I will define the return value as your suggestion in the next version. Thanks for your review and valuable suggestions, Gleb! -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/