|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v6 2/2] xen: move TLB-flush filtering out into populate_physmap during vm creation
On 20/09/16 03:31, Dongli Zhang wrote:
> This patch implemented parts of TODO left in commit id
> a902c12ee45fc9389eb8fe54eeddaf267a555c58 (More efficient TLB-flush
> filtering in alloc_heap_pages()). It moved TLB-flush filtering out into
> populate_physmap. Because of TLB-flush in alloc_heap_pages, it's very slow
> to create a guest with memory size of more than 100GB on host with 100+
> cpus.
>
> This patch introduced a "MEMF_no_tlbflush" bit to memflags to indicate
> whether TLB-flush should be done in alloc_heap_pages or its caller
> populate_physmap. Once this bit is set in memflags, alloc_heap_pages will
> ignore TLB-flush. To use this bit after vm is created might lead to
> security issue, that is, this would make pages accessible to the guest B,
> when guest A may still have a cached mapping to them.
>
> Therefore, this patch also introduced a "creation_finished" field to struct
> domain to indicate whether this domain has ever got unpaused by hypervisor.
> MEMF_no_tlbflush can be set only during vm creation phase when
> creation_finished is still false before this domain gets unpaused for the
> first time.
>
> Signed-off-by: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>
> ---
> Changed since v5:
> * Remove conditional check before "d->creation_finished = true;".
> * Place "bool creation_finished;" next to the other group of booleans.
> * Remove duplicate "only" in comments.
>
> Changed since v4:
> * Rename is_ever_unpaused to creation_finished.
> * Change bool_t to bool.
> * Polish comments.
>
> Changed since v3:
> * Set the flag to true in domain_unpause_by_systemcontroller when
> unpausing the guest domain for the first time.
> * Use true/false for all boot_t variables.
> * Add unlikely to optimize "if statement".
> * Correct comment style.
>
> Changed since v2:
> * Limit this optimization to domain creation time.
>
> ---
> xen/common/domain.c | 7 +++++++
> xen/common/memory.c | 22 ++++++++++++++++++++++
> xen/common/page_alloc.c | 4 +++-
> xen/include/xen/mm.h | 2 ++
> xen/include/xen/sched.h | 6 ++++++
> 5 files changed, 40 insertions(+), 1 deletion(-)
>
> diff --git a/xen/common/domain.c b/xen/common/domain.c
> index a8804e4..3abaca9 100644
> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -1004,6 +1004,13 @@ int domain_unpause_by_systemcontroller(struct domain
> *d)
> {
> int old, new, prev = d->controller_pause_count;
>
> + /*
> + * We record this information here for populate_physmap to figure out
> + * that the domain has finished being created. In fact, we're only
> + * allowed to set the MEMF_no_tlbflush flag during VM creation.
> + */
> + d->creation_finished = true;
> +
> do
> {
> old = prev;
> diff --git a/xen/common/memory.c b/xen/common/memory.c
> index cc0f69e..21797ca 100644
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -141,6 +141,8 @@ static void populate_physmap(struct memop_args *a)
> unsigned int i, j;
> xen_pfn_t gpfn, mfn;
> struct domain *d = a->domain, *curr_d = current->domain;
> + bool need_tlbflush = false;
> + uint32_t tlbflush_timestamp = 0;
>
> if ( !guest_handle_subrange_okay(a->extent_list, a->nr_done,
> a->nr_extents-1) )
> @@ -150,6 +152,17 @@ static void populate_physmap(struct memop_args *a)
> max_order(curr_d)) )
> return;
>
> + /*
> + * With MEMF_no_tlbflush set, alloc_heap_pages() will ignore
> + * TLB-flushes. After VM creation, this is a security issue (it can
> + * make pages accessible to guest B, when guest A may still have a
> + * cached mapping to them). So we do this only during domain creation,
> + * when the domain itself has not yet been unpaused for the first
> + * time.
> + */
> + if ( unlikely(!d->creation_finished) )
> + a->memflags |= MEMF_no_tlbflush;
> +
> for ( i = a->nr_done; i < a->nr_extents; i++ )
> {
> if ( i != a->nr_done && hypercall_preempt_check() )
> @@ -214,6 +227,13 @@ static void populate_physmap(struct memop_args *a)
> goto out;
> }
>
> + if ( unlikely(a->memflags & MEMF_no_tlbflush) )
> + {
> + for ( j = 0; j < (1U << a->extent_order); j++ )
> + accumulate_tlbflush(&need_tlbflush, &page[j],
> + &tlbflush_timestamp);
> + }
> +
> mfn = page_to_mfn(page);
> }
>
> @@ -232,6 +252,8 @@ static void populate_physmap(struct memop_args *a)
> }
>
> out:
> + if ( need_tlbflush )
> + filtered_flush_tlb_mask(tlbflush_timestamp);
> a->nr_done = i;
> }
>
> diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
> index d7ca3a0..ae2476d 100644
> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -827,7 +827,9 @@ static struct page_info *alloc_heap_pages(
> BUG_ON(pg[i].count_info != PGC_state_free);
> pg[i].count_info = PGC_state_inuse;
>
> - accumulate_tlbflush(&need_tlbflush, &pg[i], &tlbflush_timestamp);
> + if ( !(memflags & MEMF_no_tlbflush) )
> + accumulate_tlbflush(&need_tlbflush, &pg[i],
> + &tlbflush_timestamp);
>
> /* Initialise fields which have other uses for free pages. */
> pg[i].u.inuse.type_info = 0;
> diff --git a/xen/include/xen/mm.h b/xen/include/xen/mm.h
> index 50db01d..76fbb82 100644
> --- a/xen/include/xen/mm.h
> +++ b/xen/include/xen/mm.h
> @@ -222,6 +222,8 @@ struct npfec {
> #define MEMF_exact_node (1U<<_MEMF_exact_node)
> #define _MEMF_no_owner 5
> #define MEMF_no_owner (1U<<_MEMF_no_owner)
> +#define _MEMF_no_tlbflush 6
> +#define MEMF_no_tlbflush (1U<<_MEMF_no_tlbflush)
> #define _MEMF_node 8
> #define MEMF_node_mask ((1U << (8 * sizeof(nodeid_t))) - 1)
> #define MEMF_node(n) ((((n) + 1) & MEMF_node_mask) << _MEMF_node)
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index 2f9c15f..cd05e55 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -386,6 +386,12 @@ struct domain
> bool_t disable_migrate;
> /* Is this guest being debugged by dom0? */
> bool_t debugger_attached;
> + /*
> + * Set to true at the very end of domain creation, when the domain is
> + * unpaused for the first time by the systemcontroller.
> + */
> + bool creation_finished;
> +
> /* Which guest this guest has privileges on */
> struct domain *target;
>
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |