[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCHv2 2/3] mm: don't free pages until mm locks are released



>>> On 02.12.15 at 18:14, <david.vrabel@xxxxxxxxxx> wrote:
> On 02/12/15 16:46, Tim Deegan wrote:
>> At 16:30 +0000 on 02 Dec (1449073841), George Dunlap wrote:
>>> On 02/12/15 16:23, Tim Deegan wrote:
>>>> At 07:25 +0000 on 02 Dec (1449041100), Tian, Kevin wrote:
>>>>>> From: David Vrabel [mailto:david.vrabel@xxxxxxxxxx]
>>>>>> Sent: Saturday, November 14, 2015 2:50 AM
>>>>>>
>>>>>> If a page is freed without translations being invalidated, and the page 
>>>>>> is
>>>>>> subsequently allocated to another domain, a guest with a cached
>>>>>> translation will still be able to access the page.
>>>>>>
>>>>>> Currently translations are invalidated before releasing the page ref, but
>>>>>> while still holding the mm locks.  To allow translations to be 
>>>>>> invalidated
>>>>>> without holding the mm locks, we need to keep a reference to the page
>>>>>> for a bit longer in some cases.
>>>>>>
>>>>>> [ This seems difficult to a) verify as correct; and b) difficult to get
>>>>>> correct in the future.  A better suggestion would be useful.  Perhaps
>>>>>> using something like pg->tlbflush_needed mechanism that already exists
>>>>>> for pages from PV guests? ]
>>>>>
>>>>> Per-page flag looks clean in general, but not an expert here. Tim might
>>>>> have a better idea.
>>>>
>>>> I think you can probably use the tlbflush_timestamp stuff as-is for
>>>> EPT flushes -- the existing TLB shootdowns already drop all EPT
>>>> translations.
>>>
>>> Are you saying that if you do a TLB shootdown you don't need to do an
>>> invept command?
>> 
>> Yes, I think so.  flush_area_local() -> hvm_flush_guest_tlbs() ->
>> hvm_asid_flush_core() should DTRT.
> 
> I don't think so. Guest-physical mappings are only tagged with the EP4TA
> and not the VPID, thus changing the VPID does nothing.

Indeed. And in fact they tell us that using VPID together with EPT is
kind of pointless when different guests use different EPTPs.

> Thus we would need to extend the current mechanism to determine that a
> invept is also needed.

Agreed.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.