kvm mmu virtualization
play

KVM MMU Virtualization Xiao Guangrong - PowerPoint PPT Presentation

KVM MMU Virtualization Xiao Guangrong <xiaoguangrong@cn.fujitsu.com> Index What is MMU Virtualization? How to implement MMU Virtualization? How to optimize MMU Virtualization? What will I do? 2 What is MMU Virtualization


  1. KVM MMU Virtualization Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>

  2. Index  What is MMU Virtualization?  How to implement MMU Virtualization?  How to optimize MMU Virtualization?  What will I do? 2

  3. What is MMU Virtualization NO Virtualization IN Virtualization Guest view CPU CPU Virtual address GVA MMU MMU MMU Physical address Virtualization GPA Guest Physical Physical Memory Memory ...... GVA: guest virtual address GPA: guest physical address Host Physical Memory 3

  4. The functions of MMU Virtualization  Translate guest physical address to the specified host physical address  Control the memory access permission – R/W, NX, U/S  Track Accessed/Dirty bits of guest page table 4

  5. GFN to PFN in KVM  Use ioctl( fd, KVM_SET_USER_MEMORY_REGION, kvm_userspace_memory_region ) to register guest physical memory – guest_phys_addr, memory_size, userspace_addr Guest GPA guest_phys_addr memory_size VMM HVA userspace_addr GFN: Guest Frame Number PFN: Host Page Frame Number Host HPA GPA: Guest Physical Address HVA: Host Virtual Address HPA: Host Physical Address 5

  6. How to implement MMU Virtualization?  Soft MMU – Implemented by software  Hard MMU – Supported by hardware • NPT on SVM from AMD • EPT on VMX from Intel 6

  7. Soft MMU: overview Guest Guest Guest Guest L2 L3 L3 L1 Guest Page Guest CR3 write-protected write-protected write-protected ( level, access, gfn...... ) GFN To PFN Host Page Load to CR3 Shadow CR3 Shadow Shadow Shadow L2 L1 L3 7

  8. Soft MMU: how to implement (1)  Lower the access permission to keep consistency: – Guest pages table are write-protected to keep the consistency between shadow page table and guest page table – Remove the writable bit of shadow PTE if the Dirty bit of guest PTE is not set 8

  9. Soft MMU: how to implement (2)  The guest events we should intercept: – Page fault • If guest page table is invalid, inject this page fault to guest • Atomically set A/D bit of guest page table • Setup/fix the mapping of shadow page • Sync shadow page table and guest page table if it is a write page fault – Load CR3 • Flush TLB • Load the new shadow page – INVLPG 9 • Flush TLB

  10. Hard MMU  EPT/NPT functions: – The new layer to translate guest physical address to host physical address – Use EPT/NPT for all guest physical address accesses, including MMIO and guest page table walking  Comparing to Soft MMU: – It's simple and reduces lots of VM exits... 10

  11. Hard MMU: overview GVA Directory offset Table offset offset Guest Guest Guest + gCR3 + Directory Table Page + GPA HPA GPA HPA GPA HPA EPT/NPT 11

  12. Hard MMU: translate GPA to HPA EPT/NPT GPA 63 ~ 48 47 ~ 39 38 ~ 30 29 ~ 21 20 ~ 12 11 ~ 0 + + Host Page + + HPA + EPTP HPA HPA HPA HPA 12

  13. How to optimize MMU Virtualization?  1. No-trap for non-present PTEs  2. Unsync shadow pages  3. PTE prefetch  4. KSM  5. THP 13

  14. 1. No-trap for non-present PTEs  Objective – Reduce VM exits  In soft MMU, if the page-fault is caused by PTE not present(PFEC.P = 0), it is not intercepted by the host  It only works on VMX – VMCB.PFEC_MASK = 1, MCB.PFEC_MATCH = 1, VMCB.EXCEPTION_BITMAP.#PF = 1 PTE: Page Table Entry FPEC: Page Fault Error Code 14

  15. 2. Unsync shadow pages  Objective – Reduce VM exits  Background: – In soft MMU, in order to keep consistency, we need to write-protect the guest page table  This mechanism can let guest writes these pages directly 15

  16. 2. Unsync shadow pages  For the performance reason, we allow the guest page table to be writable if and only if the page is the last level page-structure (Level 1)  Base on TLB rules – We need to flush TLB to ensure the translation use the modified page structures, then we can Intercept the TLB flush operations and sync shadow pages – Sometimes, TLB is not need to be flushed(old PTE.P = 0, PTE.A=0, raise access permission), then it can be synced though page fault 16

  17. 2. Unsync shadow pages Guest Page table Guest Page table Guest Write BBB BBB Flush TLB Guest Sync Host Page Fault A'A'A' B'B'B' Shadow page table Shadow page table 17

  18. 3. PTE prefetch  Objective – Reduce VM exits  When #PF occurs, we prefetch other invalid shadow PTEs, so if these PTEs are accessed, the #PF can be avoided 18

  19. 3. PTE prefetch Guest Page table Guest Page table access AAA AAA BBB BBB CCC CCC Guest Page fault Host .P=0 A'A'A' .P=0 B'B'B' .P=0 C'C'C' Shadow page table Shadow page table 19

  20. 4. KSM  Objective – Saving memory  Kernel Shared Memory  It's a memory-saving de-duplication feature 20

  21. 4. KSM Origin state: GFN GFN Guest 1 Guest 2 HVA HVA VMM1 VMM2 Writable Writable Host aaa aaa Merge 21

  22. 4. KSM Merge state: GFN GFN Guest 1 Guest 2 HVA HVA VMM1 VMM2 Read-only Read-only Host Free aaa If Guest 1 writes the page COW 22

  23. 4. KSM Cow state: GFN GFN Guest 1 Guest 2 HVA HVA VMM1 VMM2 Writable Read-only Host bbb aaa 23

  24. 5. THP  Objective – Reduce memory accesses while guest and EPT/NPT page table walking – Improve TLB usage  Transparent Hugepage  Both host and guest can use huge page automatically 24

  25. What will I do  Lockless MMU – Feature: • Avoid big lock for the whole MMU – Lock shadow page instead of whole MMU • Lockless to walk shadow page – Use RCU to avoid shadow page to be freed • Lockless to update shadow PTE – Cmpxchg... 25

  26. What will I do  Lockless MMU – Advantage: • Allow VCPU to run concurrently on MMU path • Good preparing work for KSM to track dirty page which is mapped by shadow page table • Good preparing work for LRU algorithm of MMU page eviction 26

  27. Questions? 27

  28. Thanks! 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend