Hi Sean,
Thanks for the prompt reply. Please see my following reply. Thanks.
On Tue, Oct 13, 2020 at 12:52 AM Sean Christopherson <
sean.j.christopherson(a)intel.com> wrote:
On Tue, Oct 13, 2020 at 12:30:39AM -0400, harry harry wrote:
> Hi Sean,
>
> Thank you very much for your thorough explanations. Please see my
> inline replies as follows. Thanks!
>
> On Mon, Oct 12, 2020 at 12:54 PM Sean Christopherson
> <sean.j.christopherson(a)intel.com> wrote:
> >
> > No, the guest physical address spaces is not intrinsically tied to
the
host
> > virtual address spaces. The fact that GPAs and HVAs are
related in
KVM is a
> > property KVM's architecture. EPT/NPT has absolutely
nothing to do
with HVAs.
> >
> > As Maxim pointed out, KVM links a guest's physical address space,
i.e. GPAs, to
> > the host's virtual address space, i.e. HVAs, via
memslots. For all
intents and
> > purposes, this is an extra layer of address translation
that is
purely software
> > defined. The memslots allow KVM to retrieve the HPA for a
given GPA
when
> > servicing a shadow page fault (a.k.a. EPT violation).
> >
> > When EPT is enabled, a shadow page fault due to an unmapped GPA will
look
like:
> >
> > GVA -> [guest page tables] -> GPA -> EPT Violation VM-Exit
> >
> > The above walk of the guest page tables is done in hardware. KVM
then
does the
> > following walks in software to retrieve the desired HPA:
> >
> > GPA -> [memslots] -> HVA -> [host page tables] -> HPA
>
> Do you mean that GPAs are different from their corresponding HVAs when
> KVM does the walks (as you said above) in software?
What do you mean by "different"? GPAs and HVAs are two completely
different
address spaces.
Let me give you one concrete example as follows to explain the meaning of
``different''.
Suppose a program is running in a single-vCPU VM. The program allocates and
references one page (e.g., array[1024*4]). Assume that allocating and
referencing the page in the guest OS triggers a page fault and host OS
allocates a machine page to back it.
Assume that GVA of array[0] is 0x000000000021 and its corresponding GPA is
0x0000000000000081. I think array[0]'s corresponding HVA should also be
0x0000000000000081, which is the same as array[0]'s GPA. If array[0]'s HVA
is not 0x0000000000000081, array[0]'s GPA is* different* from its
corresponding HVA.
Now, let's assume array[0]'s GPA is different from its corresponding HVA. I
think there might be one issue like this: I think MMU's hardware logic to
translate ``GPA ->[extended/nested page tables] -> HPA''[1] should be the
same as ``VA-> [page tables] -> PA"[2]; if true, how does KVM find the
correct HPA with the different HVA (e.g., array[0]'s HVA is not
0x0000000000000081) when there are EPT violations?
[1] Please note that this hardware walk is the last step, which only
translates the guest physical address to the host physical address through
the four-level nested page table.
[2] Please note that this hardware walk assumes translating the VA to the
PA without virtualization involvement.
Please note that the above addresses are not real and just use for
explanations.
Thanks,
Harry