On Thu, Jun 20, 2013 at 07:15:25PM +0100, Will Deacon wrote: > On Thu, Jun 20, 2013 at 06:14:09PM +0100, Christoffer Dall wrote: > > On Thu, Jun 20, 2013 at 09:13:22AM +0100, Marc Zyngier wrote: > > > On 20/06/13 01:18, Christoffer Dall wrote: > > > > On Wed, Jun 19, 2013 at 02:20:04PM +0100, Marc Zyngier wrote: > > > >> We may have preempted the guest while it was performing a maintainance > > > >> operation (TLB invalidation, for example). Make sure it completes > > > >> before we do anything else by adding the necessary barriers. > > > >> > > > >> Signed-off-by: Marc Zyngier <marc.zyngier@xxxxxxx> > > > >> --- > > > >> arch/arm/kvm/interrupts.S | 9 +++++++++ > > > >> 1 file changed, 9 insertions(+) > > > >> > > > >> diff --git a/arch/arm/kvm/interrupts.S b/arch/arm/kvm/interrupts.S > > > >> index afa6c04..3124e0f 100644 > > > >> --- a/arch/arm/kvm/interrupts.S > > > >> +++ b/arch/arm/kvm/interrupts.S > > > >> @@ -149,6 +149,15 @@ __kvm_vcpu_return: > > > >> * r0: vcpu pointer > > > >> * r1: exception code > > > >> */ > > > >> + > > > >> + /* > > > >> + * We may have preempted the guest while it was performing a > > > >> + * maintainance operation (TLB invalidation, for example). Make > > > >> + * sure it completes before we do anything else. > > > >> + */ > > > > > > > > Can you explain what could go wrong here without these two instructions? > > > > > > There would be no guarantee that the TLB invalidation has effectively > > > completed, and is visible by other CPUs. Not sure that would be a > > > massive issue in any decent guest OS, but I thought it was worth plugging. > > > > ok, I was trying to think about how it would break, and if a guest needs > > a TLB invalidation to be visisble by other CPUs it would have to have a > > dsb/isb itself after the operation, and that would eventually be > > executed once the VCPU was rescheduled, but potentially on another CPU, > > but then I wonder if the PCPU migration on the host wouldn't take care > > of it? > > Actually, it's worse than both of you think :) > > The dsb *must* be executed on the same physical CPU as the TLB invalidation. > The same virtual CPU isn't enough, which is all that is guaranteed by the > guest. If you don't have a dsb on your vcpu migration path, then you need > something here. > > The same thing applies to cache maintenance operations. > But are we not sure that a dsb will happen anywhere in the kernel if a process is migrated to a different core? -Christoffer _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/cucslists/listinfo/kvmarm