[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [For Xen-4.10 Resend PATCH 3/3] Avoid excess icache flushes in populate_physmap() before domain has been created
Stefano Stabellini <sstabellini@xxxxxxxxxx> writes: > On Mon, 15 May 2017, Punit Agrawal wrote: >> populate_physmap() calls alloc_heap_pages() per requested >> extent. alloc_heap_pages() invalidates the entire icache per >> extent. During domain creation, the icache invalidations can be deffered >> until all the extents have been allocated as there is no risk of >> executing stale instructions from the icache. >> >> Introduce a new flag "MEMF_no_icache_flush" to be used to prevent >> alloc_heap_pages() from performing icache maintenance operations. Use >> the flag in populate_physmap() before the domain has been unpaused and >> perform required icache maintenance function at the end of the >> allocation. >> >> One concern is the lack of synchronisation around testing for >> "creation_finished". But it seems, in practice the window where it is >> out of sync should be small enough to not matter. >> >> Signed-off-by: Punit Agrawal <punit.agrawal@xxxxxxx> > > Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> Thanks, Stefano! I'll add the tags and post a new version with the changes suggested by Jan. > > >> --- >> xen/common/memory.c | 31 ++++++++++++++++++++++--------- >> xen/common/page_alloc.c | 2 +- >> xen/include/asm-x86/page.h | 4 ++++ >> xen/include/xen/mm.h | 2 ++ >> 4 files changed, 29 insertions(+), 10 deletions(-) >> >> diff --git a/xen/common/memory.c b/xen/common/memory.c >> index 52879e7438..34d2dda8b4 100644 >> --- a/xen/common/memory.c >> +++ b/xen/common/memory.c >> @@ -152,16 +152,26 @@ static void populate_physmap(struct memop_args *a) >> max_order(curr_d)) ) >> return; >> >> - /* >> - * With MEMF_no_tlbflush set, alloc_heap_pages() will ignore >> - * TLB-flushes. After VM creation, this is a security issue (it can >> - * make pages accessible to guest B, when guest A may still have a >> - * cached mapping to them). So we do this only during domain creation, >> - * when the domain itself has not yet been unpaused for the first >> - * time. >> - */ >> if ( unlikely(!d->creation_finished) ) >> + { >> + /* >> + * With MEMF_no_tlbflush set, alloc_heap_pages() will ignore >> + * TLB-flushes. After VM creation, this is a security issue (it can >> + * make pages accessible to guest B, when guest A may still have a >> + * cached mapping to them). So we do this only during domain >> creation, >> + * when the domain itself has not yet been unpaused for the first >> + * time. >> + */ >> a->memflags |= MEMF_no_tlbflush; >> + /* >> + * With MEMF_no_icache_flush, alloc_heap_pages() will skip >> + * performing icache flushes. We do it only before domain >> + * creation as once the domain is running there is a danger of >> + * executing instructions from stale caches if icache flush is >> + * delayed. >> + */ >> + a->memflags |= MEMF_no_icache_flush; >> + } >> >> for ( i = a->nr_done; i < a->nr_extents; i++ ) >> { >> @@ -211,7 +221,6 @@ static void populate_physmap(struct memop_args *a) >> } >> >> mfn = gpfn; >> - page = mfn_to_page(mfn); >> } >> else >> { >> @@ -255,6 +264,10 @@ static void populate_physmap(struct memop_args *a) >> out: >> if ( need_tlbflush ) >> filtered_flush_tlb_mask(tlbflush_timestamp); >> + >> + if ( a->memflags & MEMF_no_icache_flush ) >> + invalidate_icache(); >> + >> a->nr_done = i; >> } >> >> diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c >> index eba78f1a3d..8bcef6a547 100644 >> --- a/xen/common/page_alloc.c >> +++ b/xen/common/page_alloc.c >> @@ -833,7 +833,7 @@ static struct page_info *alloc_heap_pages( >> /* Ensure cache and RAM are consistent for platforms where the >> * guest can control its own visibility of/through the cache. >> */ >> - flush_page_to_ram(page_to_mfn(&pg[i]), true); >> + flush_page_to_ram(page_to_mfn(&pg[i]), !(memflags & >> MEMF_no_icache_flush)); >> } >> >> spin_unlock(&heap_lock); >> diff --git a/xen/include/asm-x86/page.h b/xen/include/asm-x86/page.h >> index 4cadb12646..3a375282f6 100644 >> --- a/xen/include/asm-x86/page.h >> +++ b/xen/include/asm-x86/page.h >> @@ -375,6 +375,10 @@ perms_strictly_increased(uint32_t old_flags, uint32_t >> new_flags) >> >> #define PAGE_ALIGN(x) (((x) + PAGE_SIZE - 1) & PAGE_MASK) >> >> +static inline void invalidate_icache(void) >> +{ >> +} >> + >> #endif /* __X86_PAGE_H__ */ >> >> /* >> diff --git a/xen/include/xen/mm.h b/xen/include/xen/mm.h >> index 88de3c1fa6..ee50d4cd7b 100644 >> --- a/xen/include/xen/mm.h >> +++ b/xen/include/xen/mm.h >> @@ -224,6 +224,8 @@ struct npfec { >> #define MEMF_no_owner (1U<<_MEMF_no_owner) >> #define _MEMF_no_tlbflush 6 >> #define MEMF_no_tlbflush (1U<<_MEMF_no_tlbflush) >> +#define _MEMF_no_icache_flush 7 >> +#define MEMF_no_icache_flush (1U<<_MEMF_no_icache_flush) >> #define _MEMF_node 8 >> #define MEMF_node_mask ((1U << (8 * sizeof(nodeid_t))) - 1) >> #define MEMF_node(n) ((((n) + 1) & MEMF_node_mask) << _MEMF_node) >> -- >> 2.11.0 >> > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxx > https://lists.xen.org/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |