Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1354115ybl; Tue, 3 Dec 2019 06:01:01 -0800 (PST) X-Google-Smtp-Source: APXvYqwsM01CYRHUZrtCxSyPlUklQ4gm77cZCdK4ECQTlWrbmt6jgUvD5hByYuoiT2nj19tvp+8c X-Received: by 2002:a9d:3b0:: with SMTP id f45mr3273044otf.92.1575381661470; Tue, 03 Dec 2019 06:01:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575381661; cv=none; d=google.com; s=arc-20160816; b=0seTxFgKShbkyGyvdEnEdXRpMDGHtGV8WSYxl2eWOkK1nYv6AitNO6ku+Efy8VEJHq 7pH4xQ6zyyros4EKhauWT3+gDqdAeUwNxGKKLfB3Q1CKSB4mfkkkzY3nY8kBObYQlakK Vuj+WmpEUQooBNo7atFYImQVG2QrN+rGHoBJmMb5ayuax9c+zHgsCyJWxLvrPSQEbVnL r/GzEFRMRwHwiBn2KCwJL6OnaIjj4KBn8Q1KWzHuM9mqX9kddnrhjpb60U5v5I47l0Gs u+4Qny5eRGMBpAbNltXuf726zv1IfaaHlpbRgWpF9M6IlfvjMK7FYchy0bt6du9JzzhX 9zKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=SoDHsKfGXaF4SVOK9FpzJoN4EZym00SZYVVw6Skh79M=; b=PbI1ycHXTRXnpZ2qKoQ/F/IvicFVmezti4V//nt8Fp+cKFoyUe8luf3nOMWEOBddVk z2YuoHR2hHzk4LUSzcKTRtPRjDpahoGxsztGuU06r8OPNKvpTH+AeJT9bOoEgJATmpti uVO5qhs1eBucTD95mT6/26VY7oGBVL6w7CHAA4nlwsPChanD7nK9jQj9LA1AizdtRIRw TtxwqSygfslbZGuCp5jNXkUVqOpV1XDXk8vFe3yeaqg1aT2keqVfik1/+uxih59vAAex f5TBNKa+O3dS4ep7ZPrpCBtJ3plRmBBHCZGeS99ZMdOKnwaaJyZ5RqaigSIJ2wTzbryx 05nA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="hGYrc/2x"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x20si1193798otq.222.2019.12.03.06.00.48; Tue, 03 Dec 2019 06:01:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="hGYrc/2x"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726684AbfLCN7W (ORCPT + 99 others); Tue, 3 Dec 2019 08:59:22 -0500 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:59885 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726474AbfLCN7V (ORCPT ); Tue, 3 Dec 2019 08:59:21 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1575381560; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=SoDHsKfGXaF4SVOK9FpzJoN4EZym00SZYVVw6Skh79M=; b=hGYrc/2xb8PqApvxJsbabXTiZ+EFkkPWaRLqQui+HFEzajW/JU9xhMlIGGawM64EZCQ1sr z/we5/2Vn6Vs8EHsa3QjrVoRa8+l10QZ3HSh8U+wlTN/kzC40jtqFudXUxfg920dfXYjV0 pYqdgAsmBpcLT+iY6ymXfSZD7D4TBvk= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-33-dwxPde5DMC6aGhwgd-5DCA-1; Tue, 03 Dec 2019 08:59:17 -0500 Received: by mail-wm1-f69.google.com with SMTP id l11so1455602wmi.0 for ; Tue, 03 Dec 2019 05:59:17 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=SoDHsKfGXaF4SVOK9FpzJoN4EZym00SZYVVw6Skh79M=; b=hvSIKtDW1u1HvzAp26+c9/3TPnEyf2Fy5JPeGR3Qub8JFUWBn0M5lMH85RNqbalf0g eoWZtAapVL5oTR8PdJ+XOLF28Bqx89k1DfSoDL8Vygtk6XcLo37q06B2SWTTQPHiuADG JierjgcTcQNSI3auUqY7g2zOClkYijFRqew7XJ2U6Hk14NdV2wwdf0qjg/+CJ181T+BA QfqzEa6dfx5C85gMj/OtSTGOSpC+Lb6L2ulJf8h/Oph9jdQhf/5iu9SLEa3jllA3cK2F 6L1V/tLAnpHm79xrlps60AWlckc5XB133WNmfoFkpHn7YraIEw4f3BO/gpPT3jBaezIs zDLA== X-Gm-Message-State: APjAAAUHJzim02dX6gz6PlCQtG4JKXtChQYIpidYO11YOuy+4smEibfb ZbVG1dt+2MKrtRVqbWKfL5seYToLJKz5d2tc/qo7GLdBzfcQrNGUMk+O4N6a/jVMAwU7ERBGNVR p/USo/MMxLQ4l/7ccDzFsaHMv X-Received: by 2002:a1c:9cce:: with SMTP id f197mr28970906wme.133.1575381556175; Tue, 03 Dec 2019 05:59:16 -0800 (PST) X-Received: by 2002:a1c:9cce:: with SMTP id f197mr28970883wme.133.1575381555838; Tue, 03 Dec 2019 05:59:15 -0800 (PST) Received: from ?IPv6:2001:b07:6468:f312:8dc6:5dd5:2c0a:6a9a? ([2001:b07:6468:f312:8dc6:5dd5:2c0a:6a9a]) by smtp.gmail.com with ESMTPSA id d12sm3629784wrp.62.2019.12.03.05.59.14 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 03 Dec 2019 05:59:15 -0800 (PST) Subject: Re: [PATCH RFC 00/15] KVM: Dirty ring interface To: Peter Xu Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Sean Christopherson , "Dr . David Alan Gilbert" , Vitaly Kuznetsov References: <20191129213505.18472-1-peterx@redhat.com> <20191202021337.GB18887@xz-x1> From: Paolo Bonzini Message-ID: Date: Tue, 3 Dec 2019 14:59:14 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1 MIME-Version: 1.0 In-Reply-To: <20191202021337.GB18887@xz-x1> Content-Language: en-US X-MC-Unique: dwxPde5DMC6aGhwgd-5DCA-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/12/19 03:13, Peter Xu wrote: >> This is not needed, it will just be a false negative (dirty page that >> actually isn't dirty). The dirty bit will be cleared when userspace >> resets the ring buffer; then the instruction will be executed again and >> mark the page dirty again. Since ring full is not a common condition, >> it's not a big deal. > > Actually I added this only because it failed one of the unit tests > when verifying the dirty bits.. But now after a second thought, I > probably agree with you that we can change the userspace too to fix > this. I think there is already a similar case in dirty_log_test when a page is dirty but we called KVM_GET_DIRTY_LOG just before it got written to. > I think the steps of the failed test case could be simplified into > something like this (assuming the QEMU migration context, might be > easier to understand): > > 1. page P has data P1 > 2. vcpu writes to page P, with date P2 > 3. vmexit (P is still with data P1) > 4. mark P as dirty, ring full, user exit > 5. collect dirty bit P, migrate P with data P1 > 6. vcpu run due to some reason, P was written with P2, user exit again > (because ring is already reaching soft limit) > 7. do KVM_RESET_DIRTY_RINGS Migration should only be done after KVM_RESET_DIRTY_RINGS (think of KVM_RESET_DIRTY_RINGS as the equivalent of KVM_CLEAR_DIRTY_LOG). > dirty_log_test-29003 [001] 184503.384328: kvm_entry: vcpu 1 > dirty_log_test-29003 [001] 184503.384329: kvm_exit: reason EPT_VIOLATION rip 0x40359f info 582 0 > dirty_log_test-29003 [001] 184503.384329: kvm_page_fault: address 7fc036d000 error_code 582 > dirty_log_test-29003 [001] 184503.384331: kvm_entry: vcpu 1 > dirty_log_test-29003 [001] 184503.384332: kvm_exit: reason EPT_VIOLATION rip 0x40359f info 582 0 > dirty_log_test-29003 [001] 184503.384332: kvm_page_fault: address 7fc036d000 error_code 582 > dirty_log_test-29003 [001] 184503.384332: kvm_dirty_ring_push: ring 1: dirty 0x37f reset 0x1c0 slot 1 offset 0x37e ret 0 (used 447) > dirty_log_test-29003 [001] 184503.384333: kvm_entry: vcpu 1 > dirty_log_test-29003 [001] 184503.384334: kvm_exit: reason EPT_VIOLATION rip 0x40359f info 582 0 > dirty_log_test-29003 [001] 184503.384334: kvm_page_fault: address 7fc036e000 error_code 582 > dirty_log_test-29003 [001] 184503.384336: kvm_entry: vcpu 1 > dirty_log_test-29003 [001] 184503.384336: kvm_exit: reason EPT_VIOLATION rip 0x40359f info 582 0 > dirty_log_test-29003 [001] 184503.384336: kvm_page_fault: address 7fc036e000 error_code 582 > dirty_log_test-29003 [001] 184503.384337: kvm_dirty_ring_push: ring 1: dirty 0x380 reset 0x1c0 slot 1 offset 0x37f ret 1 (used 448) > dirty_log_test-29003 [001] 184503.384337: kvm_dirty_ring_exit: vcpu 1 > dirty_log_test-29003 [001] 184503.384338: kvm_fpu: unload > dirty_log_test-29003 [001] 184503.384340: kvm_userspace_exit: reason 0x1d (29) > dirty_log_test-29000 [006] 184503.505103: kvm_dirty_ring_reset: ring 1: dirty 0x380 reset 0x380 (used 0) > dirty_log_test-29003 [001] 184503.505184: kvm_fpu: load > dirty_log_test-29003 [001] 184503.505187: kvm_entry: vcpu 1 > dirty_log_test-29003 [001] 184503.505193: kvm_exit: reason EPT_VIOLATION rip 0x40359f info 582 0 > dirty_log_test-29003 [001] 184503.505194: kvm_page_fault: address 7fc036f000 error_code 582 <-------- [1] > dirty_log_test-29003 [001] 184503.505206: kvm_entry: vcpu 1 > dirty_log_test-29003 [001] 184503.505207: kvm_exit: reason EPT_VIOLATION rip 0x40359f info 582 0 > dirty_log_test-29003 [001] 184503.505207: kvm_page_fault: address 7fc036f000 error_code 582 > dirty_log_test-29003 [001] 184503.505226: kvm_dirty_ring_push: ring 1: dirty 0x381 reset 0x380 slot 1 offset 0x380 ret 0 (used 1) > dirty_log_test-29003 [001] 184503.505226: kvm_entry: vcpu 1 > dirty_log_test-29003 [001] 184503.505227: kvm_exit: reason EPT_VIOLATION rip 0x40359f info 582 0 > dirty_log_test-29003 [001] 184503.505228: kvm_page_fault: address 7fc0370000 error_code 582 > dirty_log_test-29003 [001] 184503.505231: kvm_entry: vcpu 1 > ... > > The test was trying to continuously write to pages, from above log > starting from 7fc036d000. The reason 0x1d (29) is the new dirty ring > full exit reason. > > So far I'm still unsure of two things: > > 1. Why for each page we faulted twice rather than once. Take the > example of page at 7fc036e000 above, the first fault didn't > trigger the marking dirty path, while only until the 2nd ept > violation did we trigger kvm_dirty_ring_push. Not sure about that. Try enabling kvmmmu tracepoints too, it will tell you more of the path that was taken while processing the EPT violation. If your machine has PML, what you're seeing is likely not-present violation, not dirty-protect violation. Try disabling pml and see if the trace changes. > 2. Why we didn't get the last page written again after > kvm_userspace_exit (last page was 7fc036e000, and the test failed > because 7fc036e000 detected change however dirty bit unset). In > this case the first write after KVM_RESET_DIRTY_RINGS is the line > pointed by [1], I thought it should be a rewritten of page > 7fc036e000 because when the user exit happens logically the write > should not happen yet and eip should keep. However at [1] it's > already writting to a new page. IIUC you should get, with PML enabled: - guest writes to page - PML marks dirty bit, causes vmexit - host copies PML log to ring, causes userspace exit - userspace calls KVM_RESET_DIRTY_RINGS - host marks page as clean - userspace calls KVM_RUN - guest writes again to page but the page won't be in the ring until after another vmexit happens. Therefore, it's okay to reap the pages in the ring asynchronously, but there must be a synchronization point in the testcase sooner or later, where all CPUs are kicked out of KVM_RUN. This synchronization point corresponds to the migration downtime. Thanks, Paolo