Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp284869imu; Mon, 26 Nov 2018 21:29:53 -0800 (PST) X-Google-Smtp-Source: AFSGD/U8G9xOa7Nibr2NeprS8JymP0yguw50aYf60hm8jYeh/fJDtUEKKeZlUsZWmsmWbkHaoDrz X-Received: by 2002:a63:7418:: with SMTP id p24mr28170520pgc.196.1543296593131; Mon, 26 Nov 2018 21:29:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543296593; cv=none; d=google.com; s=arc-20160816; b=f7tHzOXslfA5lwTBD5JCBGMfbmD+HTyMMZ2kg8EdntsVCYapk3iTUoWMLx4dUdhH1K G2kj2/sMq33HMyM4lwyCwBVbD61YNFZ7bFhN2sd3c3YKKgwDffWy/VsyBWXHuCtpzJxy ZXA9p2kKksgql8XbOiaw+ZS5ZJWD7FUWiXW+GrCN8n+VwV0RwltWUy+Nn3W+4BUX7bhV FR6Y2UcXDS26i798R258NTq5hzX/wnFRFP42amSFslYhE5gmliUmaHpMAygM/KHCgpkK O8JxC8nlKzuA1xlgMV/l3qEYH7AVemGKw1pz+aetpzMkQh8ptxIo/zlPDHfIqKGT1+6Z AflA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:from:references:to:subject:dkim-signature; bh=ADDYaefAmoC7cM1qTVmJ3Bmus29HIzgGemZpCw0HP1E=; b=UucibDUd/BObi/Ldld2BjXVXGMLRXfJEIZVbJ4aOFBg7q44BukpvE4vHSDd0yK/Qb0 MpMnZNUnPZDr9BN4hzwP/m5aKUy+aFoOomZ77H3liGQ4oXeJuH+Q3hBGSxP6XZYLCQ9s VRGXC6dgknIeF8grbYQg63hp1x953t7VxYl1D7BCgN5dzcgrJEGLE2YiluBgg5xSVp8l v7/otQbixJ59RBAcCP0zJ5zIqi9uEu2PAVISa9EMEEUO0GeWNfjLT4/7GLWzrhj7iLrx 2aaq/rbgmcK4BtH7xbVJvMjqzmICWmj8XMp2DYwF7H5OeBViTDNl7itA9NFUSmULZX4o u9KA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=AS09QNfu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q128si3350658pfc.179.2018.11.26.21.29.01; Mon, 26 Nov 2018 21:29:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=AS09QNfu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728535AbeK0QBP (ORCPT + 99 others); Tue, 27 Nov 2018 11:01:15 -0500 Received: from mail-pg1-f195.google.com ([209.85.215.195]:32865 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728025AbeK0QBO (ORCPT ); Tue, 27 Nov 2018 11:01:14 -0500 Received: by mail-pg1-f195.google.com with SMTP id z11so7284413pgu.0 for ; Mon, 26 Nov 2018 21:04:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=subject:to:references:from:organization:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=ADDYaefAmoC7cM1qTVmJ3Bmus29HIzgGemZpCw0HP1E=; b=AS09QNfunQrY3tRCIN6YeAth4C5NyxWTrogDL1B+3AOL/82BKNB7Cfpc78vmu0wLv2 ZBTZJEndQyM3HfH95svoeSMWxQMGOl0N9ZJjrjegK7DZOQk92H9+r5QAurQsFAw0yMyV xCf/W69x0QO3eBGokGpysgjQ7e1e0xFUUllwL3ghOPr7HZYU2keKRgIyqLpzhdxXm4oh 6g/Q8L+Zz5NQFxOda0+C75j1vloGDM5Os5kYZAbmdTsckWEV2/ODkTqFuH8s/TNQm3Rz vNhvxqhDakLOlspOV4i//8HWklHiadLk+DGr0MizI52Zz845J3w0DGdy7IP9mU8J9A06 4wug== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=ADDYaefAmoC7cM1qTVmJ3Bmus29HIzgGemZpCw0HP1E=; b=gIdwhK7F90p9dStHoFyt526I6IddsvrUNx8z1nxQSRMfi3PaWqmnCcfraZzxzrVBEp P/uZpNc91y9RBoGsQ9pt9oweM6qi1MZy/lnp5wnZDZXa18oo8o0sGeLSeFGyQYGJ7LKz KDraAuGKGlWiYuRT9X/vh+SNdsgqlluUWQYCWIF9hAyjGGmHB+1kkkeC32yIlxGN5rOH drtYXpTBA7bk7LVqm6zXUFss3BHOdQfa48Q3aEx2Q/wZSnn/ZsKo0O9xBCh+nJVHRHc8 TjAzl2WABH+dcXuKchSFEicgiwrsFpj6CKnY3j/Sm+kGGTvg4s97YeHSxLZU2VeTZlWm 17wQ== X-Gm-Message-State: AA+aEWbdO7m+9GhW7zwoNfQHjRqOz+ljcY0VaJpDjP5d+7LMIWodX9zB mr78iuwrvQKifoTmVOPTKe+e4w== X-Received: by 2002:a65:514c:: with SMTP id g12mr27654338pgq.169.1543295075463; Mon, 26 Nov 2018 21:04:35 -0800 (PST) Received: from js-desktop.svl.corp.google.com ([2620:15c:2cd:2:5c1d:6557:d90c:ea99]) by smtp.gmail.com with ESMTPSA id p2sm2623659pfb.28.2018.11.26.21.04.33 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Nov 2018 21:04:34 -0800 (PST) Subject: Re: [PATCH 3/3] kvm: introduce manual dirty log reprotect To: Paolo Bonzini , linux-kernel@vger.kernel.org, kvm@vger.kernel.org References: <1543251253-24762-1-git-send-email-pbonzini@redhat.com> <1543251253-24762-4-git-send-email-pbonzini@redhat.com> From: Junaid Shahid Organization: Google Message-ID: Date: Mon, 26 Nov 2018 21:04:33 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <1543251253-24762-4-git-send-email-pbonzini@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/26/2018 08:54 AM, Paolo Bonzini wrote: > There are two problems with KVM_GET_DIRTY_LOG. First, and less important, > it can take kvm->mmu_lock for an extended period of time. Second, its user > can actually see many false positives in some cases. The latter is due > to a benign race like this: > > 1. KVM_GET_DIRTY_LOG returns a set of dirty pages and write protects > them. > 2. The guest modifies the pages, causing them to be marked ditry. > 3. Userspace actually copies the pages. > 4. KVM_GET_DIRTY_LOG returns those pages as dirty again, even though > they were not written to since (3). > > This is especially a problem for large guests, where the time between > (1) and (3) can be substantial. This patch introduces a new > capability which, when enabled, makes KVM_GET_DIRTY_LOG not > write-protect the pages it returns. Instead, userspace has to > explicitly clear the dirty log bits just before using the content > of the page. The new KVM_CLEAR_DIRTY_LOG ioctl can operate on a > 64-page granularity rather than requiring to sync a full memslot. > This way the mmu_lock is taken for small amounts of time, and > only a small amount of time will pass between write protection > of pages and the sending of their content. > > Signed-off-by: Paolo Bonzini > --- > Documentation/virtual/kvm/api.txt | 65 +++++++++++ > arch/mips/kvm/mips.c | 23 ++++ > arch/x86/kvm/x86.c | 27 +++++ > include/linux/kvm_host.h | 5 + > include/uapi/linux/kvm.h | 15 +++ > tools/testing/selftests/kvm/Makefile | 2 + > tools/testing/selftests/kvm/clear_dirty_log_test.c | 2 + > tools/testing/selftests/kvm/dirty_log_test.c | 19 ++++ > tools/testing/selftests/kvm/include/kvm_util.h | 2 + > tools/testing/selftests/kvm/lib/kvm_util.c | 13 +++ > virt/kvm/arm/arm.c | 16 +++ > virt/kvm/kvm_main.c | 120 ++++++++++++++++++--- > 12 files changed, 293 insertions(+), 16 deletions(-) > create mode 100644 tools/testing/selftests/kvm/clear_dirty_log_test.c > > diff --git a/Documentation/virtual/kvm/api.txt b/Documentation/virtual/kvm/api.txt > index 1071c10cf1c7..859927fb0b9c 100644 > --- a/Documentation/virtual/kvm/api.txt > +++ b/Documentation/virtual/kvm/api.txt > @@ -305,6 +305,9 @@ the address space for which you want to return the dirty bitmap. > They must be less than the value that KVM_CHECK_EXTENSION returns for > the KVM_CAP_MULTI_ADDRESS_SPACE capability. > > +The bits in the dirty bitmap are cleared before the ioctl returns, unless > +KVM_CAP_MANUAL_DIRTY_LOG_PROTECT is enabled. For more information, > +see the description of the capability. > > 4.9 KVM_SET_MEMORY_ALIAS > > @@ -3758,6 +3761,44 @@ Coalesced pio is based on coalesced mmio. There is little difference > between coalesced mmio and pio except that coalesced pio records accesses > to I/O ports. > > +4.117 KVM_CLEAR_DIRTY_LOG (vm ioctl) > + > +Capability: KVM_CAP_MANUAL_DIRTY_LOG_PROTECT > +Architectures: x86 > +Type: vm ioctl > +Parameters: struct kvm_dirty_log (in/out) Shouldn't this be just (in) rather than (in/out)? > +Returns: 0 on success, -1 on error > + > +/* for KVM_CLEAR_DIRTY_LOG */ > +struct kvm_clear_dirty_log { > + __u32 slot; > + __u32 num_pages; > + __u64 first_page; > + union { > + void __user *dirty_bitmap; /* one bit per page */ > + __u64 padding; > + }; > +}; > + > +The ioctl write-protects pages in a memory slot according to the > +bitmap that is passed in struct kvm_clear_dirty_log's dirty_bitmap > +field. Bit 0 of the bitmap corresponds to page "first_page" in the > +memory slot, and num_pages is the size in bits of the input bitmap. > +Both first_page and num_pages must be a multiple of 64. For each > +bit that is set in the input bitmap, the corresponding page is write > +protected and marked "clean" in KVM's dirty bitmap. There will not be any write protection when PML is enabled. To make it more accurate, perhaps we could say something like "The ioctl clears the dirty status of pages ..." and later "For each bit that is set in the input bitmap, the corresponding page is marked clean in KVM's dirty bitmap and dirty tracking is re-enabled for that page either via write-protection or via clearing the Dirty bit in the PTE, depending on the dirty logging mode in use." > + > +If KVM_CAP_MULTI_ADDRESS_SPACE is available, bits 16-31 specifies > +the address space for which you want to return the dirty bitmap. > +They must be less than the value that KVM_CHECK_EXTENSION returns for > +the KVM_CAP_MULTI_ADDRESS_SPACE capability. > + > +This ioctl is mostly useful when KVM_CAP_MANUAL_DIRTY_LOG_PROTECT > +is enabled; for more information, see the description of the capability. > +However, it can always be used as long as KVM_CHECK_EXTENSION confirms > +that KVM_CAP_MANUAL_DIRTY_LOG_PROTECT is present. > + > + > 5. The kvm_run structure > ------------------------ > > @@ -4652,6 +4693,30 @@ and injected exceptions. > * For the new DR6 bits, note that bit 16 is set iff the #DB exception > will clear DR6.RTM. > > +7.18 KVM_CAP_MANUAL_DIRTY_LOG_PROTECT > + > +Architectures: all > +Parameters: args[0] whether feature should be enabled or not > + > +With this capability enabled, KVM_GET_DIRTY_LOG will not automatically > +clear and write-protect all pages that are returned as dirty. > +Rather, userspace will have to do this operation separately using > +KVM_CLEAR_DIRTY_LOG. > + > +At the cost of a slightly more complicated operation, this provides better > +scalability and responsiveness for two reasons. First, > +KVM_CLEAR_DIRTY_LOG ioctl can operate on a 64-page granularity rather > +than requiring to sync a full memslot; this ensures that KVM does not > +take spinlocks for an extended period of time. Second, in some cases a > +large amount of time can pass between a call to KVM_GET_DIRTY_LOG and > +userspace actually using the data in the page. Pages can be modified > +during this time, which is inefficint for both the guest and userspace: > +the guest will incur a higher penalty due to write protection faults, > +while userspace can see false reports of dirty pages. Manual reprotection > +helps reducing this time, improving guest performance and reducing the > +number of dirty log false positives. > + > + > 8. Other capabilities. > ---------------------- > > diff --git a/arch/mips/kvm/mips.c b/arch/mips/kvm/mips.c > index 3898e657952e..3734cd58895e 100644 > --- a/arch/mips/kvm/mips.c > +++ b/arch/mips/kvm/mips.c > @@ -1023,6 +1023,29 @@ int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) > return r; > } > > +int kvm_vm_ioctl_clear_dirty_log(struct kvm *kvm, struct kvm_clear_dirty_log *log) > +{ > + struct kvm_memslots *slots; > + struct kvm_memory_slot *memslot; > + bool flush = false; > + int r; > + > + mutex_lock(&kvm->slots_lock); > + > + r = kvm_clear_dirty_log_protect(kvm, log, &flush); > + > + if (flush) { > + slots = kvm_memslots(kvm); > + memslot = id_to_memslot(slots, log->slot); > + > + /* Let implementation handle TLB/GVA invalidation */ > + kvm_mips_callbacks->flush_shadow_memslot(kvm, memslot); > + } > + > + mutex_unlock(&kvm->slots_lock); > + return r; > +} > + > long kvm_arch_vm_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) > { > long r; > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index ff6a8411a15c..0a5b335b45bd 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -4435,6 +4435,33 @@ int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) > return r; > } > > +int kvm_vm_ioctl_clear_dirty_log(struct kvm *kvm, struct kvm_clear_dirty_log *log) > +{ > + bool flush = false; > + int r; > + > + mutex_lock(&kvm->slots_lock); > + > + /* > + * Flush potentially hardware-cached dirty pages to dirty_bitmap. > + */ > + if (kvm_x86_ops->flush_log_dirty) > + kvm_x86_ops->flush_log_dirty(kvm); Although this more strictly adheres to the API definition, but in practice it might be potentially more efficient to skip it without causing any real issues. In practice, this IOCTL is expected to generally contain only bits from a prior GET_DIRTY_LOG IOCTL with the manual reset capability set. So the pages in question would most likely still have their PTE Dirty bits set and will not be in the PML buffer. Hence the PML flush, with the associated kicking of all VCPUs, wouldn't really do anything in most cases. There are, of course, exceptions where the Dirty bit could get cleared through other mechanisms and then the page could end up in the PML buffer again, and if we skip this step, then it will not get cleared properly, but that probably wouldn't happen often enough to be a big deal. In theory, someone could also call the CLEAR_DIRTY_LOG IOCTL without a preceding GET_DIRTY_LOG (or specify pages that weren't returned as dirty by GET_DIRTY_LOG) and then expect all of them to be clear in a subsequent GET_DIRTY_LOG call in the absence of any activity by the VM on those pages. Perhaps we could just mention in the API documentation that the clearing is best-effort to avoid such expectations. > + > + r = kvm_clear_dirty_log_protect(kvm, log, &flush); > + > + /* > + * All the TLBs can be flushed out of mmu lock, see the comments in > + * kvm_mmu_slot_remove_write_access(). > + */ > + lockdep_assert_held(&kvm->slots_lock); > + if (flush) > + kvm_flush_remote_tlbs(kvm); > + > + mutex_unlock(&kvm->slots_lock); > + return r; > +} > + > int kvm_vm_ioctl_irq_line(struct kvm *kvm, struct kvm_irq_level *irq_event, > bool line_status) > { > diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h > index 8c56b2873b13..e065aeaae29e 100644 > --- a/include/linux/kvm_host.h > +++ b/include/linux/kvm_host.h > @@ -449,6 +449,7 @@ struct kvm { > #endif > long tlbs_dirty; > struct list_head devices; > + bool manual_dirty_log_protect; > struct dentry *debugfs_dentry; > struct kvm_stat_data **debugfs_stat_data; > struct srcu_struct srcu; > @@ -754,6 +755,8 @@ int kvm_get_dirty_log(struct kvm *kvm, > > int kvm_get_dirty_log_protect(struct kvm *kvm, > struct kvm_dirty_log *log, bool *flush); > +int kvm_clear_dirty_log_protect(struct kvm *kvm, > + struct kvm_clear_dirty_log *log, bool *flush); > > void kvm_arch_mmu_enable_log_dirty_pt_masked(struct kvm *kvm, > struct kvm_memory_slot *slot, > @@ -762,6 +765,8 @@ void kvm_arch_mmu_enable_log_dirty_pt_masked(struct kvm *kvm, > > int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, > struct kvm_dirty_log *log); > +int kvm_vm_ioctl_clear_dirty_log(struct kvm *kvm, > + struct kvm_clear_dirty_log *log); > > int kvm_vm_ioctl_irq_line(struct kvm *kvm, struct kvm_irq_level *irq_level, > bool line_status); > diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h > index b8da14cee8e5..681e6bbdc157 100644 > --- a/include/uapi/linux/kvm.h > +++ b/include/uapi/linux/kvm.h > @@ -492,6 +492,17 @@ struct kvm_dirty_log { > }; > }; > > +/* for KVM_CLEAR_DIRTY_LOG */ > +struct kvm_clear_dirty_log { > + __u32 slot; > + __u32 num_pages; > + __u64 first_page; > + union { > + void __user *dirty_bitmap; /* one bit per page */ > + __u64 padding2; > + }; > +}; > + > /* for KVM_SET_SIGNAL_MASK */ > struct kvm_signal_mask { > __u32 len; > @@ -976,6 +987,7 @@ struct kvm_ppc_resize_hpt { > #define KVM_CAP_EXCEPTION_PAYLOAD 164 > #define KVM_CAP_ARM_VM_IPA_SIZE 165 > #define KVM_CAP_HYPERV_STIMER_DIRECT 166 > +#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 167 > > #ifdef KVM_CAP_IRQ_ROUTING > > @@ -1422,6 +1434,9 @@ struct kvm_enc_region { > #define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state) > #define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state) > > +/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT */ > +#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log) > + > /* Secure Encrypted Virtualization command */ > enum sev_cmd_id { > /* Guest initialization commands */ > diff --git a/tools/testing/selftests/kvm/Makefile b/tools/testing/selftests/kvm/Makefile > index 01a219229238..e35955bf59b3 100644 > --- a/tools/testing/selftests/kvm/Makefile > +++ b/tools/testing/selftests/kvm/Makefile > @@ -15,8 +15,10 @@ TEST_GEN_PROGS_x86_64 += x86_64/cr4_cpuid_sync_test > TEST_GEN_PROGS_x86_64 += x86_64/state_test > TEST_GEN_PROGS_x86_64 += x86_64/evmcs_test > TEST_GEN_PROGS_x86_64 += dirty_log_test > +TEST_GEN_PROGS_x86_64 += clear_dirty_log_test > > TEST_GEN_PROGS_aarch64 += dirty_log_test > +TEST_GEN_PROGS_aarch64 += clear_dirty_log_test > > TEST_GEN_PROGS += $(TEST_GEN_PROGS_$(UNAME_M)) > LIBKVM += $(LIBKVM_$(UNAME_M)) > diff --git a/tools/testing/selftests/kvm/clear_dirty_log_test.c b/tools/testing/selftests/kvm/clear_dirty_log_test.c > new file mode 100644 > index 000000000000..749336937d37 > --- /dev/null > +++ b/tools/testing/selftests/kvm/clear_dirty_log_test.c > @@ -0,0 +1,2 @@ > +#define USE_CLEAR_DIRTY_LOG > +#include "dirty_log_test.c" > diff --git a/tools/testing/selftests/kvm/dirty_log_test.c b/tools/testing/selftests/kvm/dirty_log_test.c > index aeff95a91b15..4629c7ccfa28 100644 > --- a/tools/testing/selftests/kvm/dirty_log_test.c > +++ b/tools/testing/selftests/kvm/dirty_log_test.c > @@ -275,6 +275,14 @@ static void run_test(enum vm_guest_mode mode, unsigned long iterations, > > vm = create_vm(mode, VCPU_ID, guest_num_pages, guest_code); > > +#ifdef USE_CLEAR_DIRTY_LOG > + struct kvm_enable_cap cap = {}; > + > + cap.cap = KVM_CAP_MANUAL_DIRTY_LOG_PROTECT; > + cap.args[0] = 1; > + vm_enable_cap(vm, &cap); > +#endif > + > /* Add an extra memory slot for testing dirty logging */ > vm_userspace_mem_region_add(vm, VM_MEM_SRC_ANONYMOUS, > guest_test_mem, > @@ -316,6 +324,10 @@ static void run_test(enum vm_guest_mode mode, unsigned long iterations, > /* Give the vcpu thread some time to dirty some pages */ > usleep(interval * 1000); > kvm_vm_get_dirty_log(vm, TEST_MEM_SLOT_INDEX, bmap); > +#ifdef USE_CLEAR_DIRTY_LOG > + kvm_vm_clear_dirty_log(vm, TEST_MEM_SLOT_INDEX, bmap, 0, > + DIV_ROUND_UP(host_num_pages, 64) * 64); > +#endif > vm_dirty_log_verify(bmap); > iteration++; > sync_global_to_guest(vm, iteration); > @@ -392,6 +404,13 @@ int main(int argc, char *argv[]) > unsigned int mode; > int opt, i; > > +#ifdef USE_CLEAR_DIRTY_LOG > + if (!kvm_check_cap(KVM_CAP_MANUAL_DIRTY_LOG_PROTECT)) { > + fprintf(stderr, "KVM_CLEAR_DIRTY_LOG not available, skipping tests\n"); > + exit(KSFT_SKIP); > + } > +#endif > + > while ((opt = getopt(argc, argv, "hi:I:o:tm:")) != -1) { > switch (opt) { > case 'i': > diff --git a/tools/testing/selftests/kvm/include/kvm_util.h b/tools/testing/selftests/kvm/include/kvm_util.h > index a4e59e3b4826..c51bfaba017a 100644 > --- a/tools/testing/selftests/kvm/include/kvm_util.h > +++ b/tools/testing/selftests/kvm/include/kvm_util.h > @@ -58,6 +58,8 @@ enum vm_mem_backing_src_type { > void kvm_vm_restart(struct kvm_vm *vmp, int perm); > void kvm_vm_release(struct kvm_vm *vmp); > void kvm_vm_get_dirty_log(struct kvm_vm *vm, int slot, void *log); > +void kvm_vm_clear_dirty_log(struct kvm_vm *vm, int slot, void *log, > + uint64_t first_page, uint32_t num_pages); > > int kvm_memcmp_hva_gva(void *hva, struct kvm_vm *vm, const vm_vaddr_t gva, > size_t len); > diff --git a/tools/testing/selftests/kvm/lib/kvm_util.c b/tools/testing/selftests/kvm/lib/kvm_util.c > index 1b41e71283d5..c9e94d6503af 100644 > --- a/tools/testing/selftests/kvm/lib/kvm_util.c > +++ b/tools/testing/selftests/kvm/lib/kvm_util.c > @@ -231,6 +231,19 @@ void kvm_vm_get_dirty_log(struct kvm_vm *vm, int slot, void *log) > strerror(-ret)); > } > > +void kvm_vm_clear_dirty_log(struct kvm_vm *vm, int slot, void *log, > + uint64_t first_page, uint32_t num_pages) > +{ > + struct kvm_clear_dirty_log args = { .dirty_bitmap = log, .slot = slot, > + .first_page = first_page, > + .num_pages = num_pages }; > + int ret; > + > + ret = ioctl(vm->fd, KVM_CLEAR_DIRTY_LOG, &args); > + TEST_ASSERT(ret == 0, "%s: KVM_CLEAR_DIRTY_LOG failed: %s", > + strerror(-ret)); > +} > + > /* > * Userspace Memory Region Find > * > diff --git a/virt/kvm/arm/arm.c b/virt/kvm/arm/arm.c > index 120a2663dab9..e91adf77d99a 100644 > --- a/virt/kvm/arm/arm.c > +++ b/virt/kvm/arm/arm.c > @@ -1219,6 +1219,22 @@ int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) > return r; > } > > +int kvm_vm_ioctl_clear_dirty_log(struct kvm *kvm, struct kvm_clear_dirty_log *log) > +{ > + bool flush = false; > + int r; > + > + mutex_lock(&kvm->slots_lock); > + > + r = kvm_clear_dirty_log_protect(kvm, log, &flush); > + > + if (flush) > + kvm_flush_remote_tlbs(kvm); > + > + mutex_unlock(&kvm->slots_lock); > + return r; > +} > + > static int kvm_vm_ioctl_set_device_addr(struct kvm *kvm, > struct kvm_arm_device_addr *dev_addr) > { > diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c > index b1eae5394411..e6ed9e5553ff 100644 > --- a/virt/kvm/kvm_main.c > +++ b/virt/kvm/kvm_main.c > @@ -1176,37 +1176,104 @@ int kvm_get_dirty_log_protect(struct kvm *kvm, > return -ENOENT; > > n = kvm_dirty_bitmap_bytes(memslot); > + *flush = false; > + if (kvm->manual_dirty_log_protect) { > + /* Unlike kvm_get_dirty_log, we always return false in *flush, > + * because no flush is needed until KVM_CLEAR_DIRTY_LOG. > + */ > + dirty_bitmap_buffer = dirty_bitmap; There is already a kvm_get_dirty_log() function, which does pretty much exactly the same thing as this case (apart from setting the is_dirty flag). Perhaps it would be better to just use that instead (or to merge the two functions). > + } else { > + dirty_bitmap_buffer = kvm_second_dirty_bitmap(memslot); > + memset(dirty_bitmap_buffer, 0, n); > > - dirty_bitmap_buffer = kvm_second_dirty_bitmap(memslot); > - memset(dirty_bitmap_buffer, 0, n); > + spin_lock(&kvm->mmu_lock); > + for (i = 0; i < n / sizeof(long); i++) { > + unsigned long mask; > + gfn_t offset; > > - spin_lock(&kvm->mmu_lock); > + if (!dirty_bitmap[i]) > + continue; > + > + *flush = true; > + mask = xchg(&dirty_bitmap[i], 0); > + dirty_bitmap_buffer[i] = mask; > + > + if (mask) { > + offset = i * BITS_PER_LONG; > + kvm_arch_mmu_enable_log_dirty_pt_masked(kvm, memslot, > + offset, mask); > + } > + } > + spin_unlock(&kvm->mmu_lock); > + } > + > + if (copy_to_user(log->dirty_bitmap, dirty_bitmap_buffer, n)) > + return -EFAULT; > + return 0; > +} > +EXPORT_SYMBOL_GPL(kvm_get_dirty_log_protect); > + > +/** > + * kvm_clear_dirty_log_protect - clear dirty bits in the bitmap > + * are dirty write protect the corresponding pages for next write. Typo, and also no write protection for PML. > + * @kvm: pointer to kvm instance > + * @log: slot id and address from which to fetch the bitmap of dirty pages > + */ > +int kvm_clear_dirty_log_protect(struct kvm *kvm, > + struct kvm_clear_dirty_log *log, bool *flush) > +{ > + struct kvm_memslots *slots; > + struct kvm_memory_slot *memslot; > + int as_id, id, n; > + gfn_t offset; > + unsigned long i; > + unsigned long *dirty_bitmap; > + unsigned long *dirty_bitmap_buffer; > + > + as_id = log->slot >> 16; > + id = (u16)log->slot; > + if (as_id >= KVM_ADDRESS_SPACE_NUM || id >= KVM_USER_MEM_SLOTS) > + return -EINVAL; > + > + if ((log->first_page & 63) || (log->num_pages & 63)) > + return -EINVAL; > + > + slots = __kvm_memslots(kvm, as_id); > + memslot = id_to_memslot(slots, id); > + > + dirty_bitmap = memslot->dirty_bitmap; > + if (!dirty_bitmap) > + return -ENOENT; > + > + n = kvm_dirty_bitmap_bytes(memslot); > *flush = false; > - for (i = 0; i < n / sizeof(long); i++) { > - unsigned long mask; > - gfn_t offset; > + dirty_bitmap_buffer = kvm_second_dirty_bitmap(memslot); > + if (copy_from_user(dirty_bitmap_buffer, log->dirty_bitmap, n)) > + return -EFAULT; > > - if (!dirty_bitmap[i]) > + spin_lock(&kvm->mmu_lock); > + for (offset = log->first_page, > + i = offset / BITS_PER_LONG, n = log->num_pages / BITS_PER_LONG; n--; > + i++, offset += BITS_PER_LONG) { > + unsigned long mask = *dirty_bitmap_buffer++; > + atomic_long_t *p = (atomic_long_t *) &dirty_bitmap[i]; > + if (!mask) > continue; > > - *flush = true; > - > - mask = xchg(&dirty_bitmap[i], 0); > - dirty_bitmap_buffer[i] = mask; > + mask &= atomic_long_fetch_andnot(mask, p); There is a subtle point here which might be worth mentioning in a comment. The mask is coming from userspace and can contain set bits beyond the end of the memslot (since memslots are not guaranteed to be multiples of 64-pages). That is ok here because we AND it with KVM's dirty bitmap, which will clear off any such extraneous bits beyond the end, and thus kvm_arch_mmu_enable_log_dirty_pt_masked below doesn't have to worry about the mask being out of range. > > + /* mask contains the bits that really have been cleared. */ > if (mask) { > - offset = i * BITS_PER_LONG; > + *flush = true; > kvm_arch_mmu_enable_log_dirty_pt_masked(kvm, memslot, > offset, mask); > } > } > - > spin_unlock(&kvm->mmu_lock); > - if (copy_to_user(log->dirty_bitmap, dirty_bitmap_buffer, n)) > - return -EFAULT; > + > return 0; > } > -EXPORT_SYMBOL_GPL(kvm_get_dirty_log_protect); > +EXPORT_SYMBOL_GPL(kvm_clear_dirty_log_protect); > #endif > > bool kvm_largepages_enabled(void) > @@ -2945,6 +3012,9 @@ static long kvm_vm_ioctl_check_extension_generic(struct kvm *kvm, long arg) > case KVM_CAP_IOEVENTFD_ANY_LENGTH: > case KVM_CAP_CHECK_EXTENSION_VM: > case KVM_CAP_ENABLE_CAP_VM: > +#ifdef CONFIG_KVM_GENERIC_DIRTYLOG_READ_PROTECT > + case KVM_CAP_MANUAL_DIRTY_LOG_PROTECT: > +#endif Shouldn't we also add this new CONFIG option to the Kconfig file? > return 1; > #ifdef CONFIG_KVM_MMIO > case KVM_CAP_COALESCED_MMIO: > @@ -2978,6 +3048,13 @@ static int kvm_vm_ioctl_enable_cap_generic(struct kvm *kvm, > struct kvm_enable_cap *cap) > { > switch (cap->cap) { > +#ifdef CONFIG_KVM_GENERIC_DIRTYLOG_READ_PROTECT > + case KVM_CAP_MANUAL_DIRTY_LOG_PROTECT: > + if (cap->flags || (cap->args[0] & ~1)) > + return -EINVAL; > + kvm->manual_dirty_log_protect = cap->args[0]; > + return 0; > +#endif > default: > return kvm_vm_ioctl_enable_cap(kvm, cap); > } > @@ -3025,6 +3102,17 @@ static long kvm_vm_ioctl(struct file *filp, > r = kvm_vm_ioctl_get_dirty_log(kvm, &log); > break; > } > +#ifdef CONFIG_KVM_GENERIC_DIRTYLOG_READ_PROTECT > + case KVM_CLEAR_DIRTY_LOG: { > + struct kvm_clear_dirty_log log; > + > + r = -EFAULT; > + if (copy_from_user(&log, argp, sizeof(log))) > + goto out; > + r = kvm_vm_ioctl_clear_dirty_log(kvm, &log); > + break; > + } > +#endif > #ifdef CONFIG_KVM_MMIO > case KVM_REGISTER_COALESCED_MMIO: { > struct kvm_coalesced_mmio_zone zone; >