All of lore.kernel.org
 help / color / mirror / Atom feed
From: Marcelo Tosatti <mtosatti@redhat.com>
To: Gleb Natapov <gleb@redhat.com>
Cc: kvm@vger.kernel.org, linux-mm@kvack.org,
	linux-kernel@vger.kernel.org, avi@redhat.com, mingo@elte.hu,
	a.p.zijlstra@chello.nl, tglx@linutronix.de, hpa@zytor.com,
	riel@redhat.com, cl@linux-foundation.org
Subject: Re: [PATCH v6 09/12] Inject asynchronous page fault into a PV guest if page is swapped out.
Date: Tue, 5 Oct 2010 16:00:51 -0300	[thread overview]
Message-ID: <20101005190051.GB1786@amt.cnet> (raw)
In-Reply-To: <1286207794-16120-10-git-send-email-gleb@redhat.com>

On Mon, Oct 04, 2010 at 05:56:31PM +0200, Gleb Natapov wrote:
> Send async page fault to a PV guest if it accesses swapped out memory.
> Guest will choose another task to run upon receiving the fault.
> 
> Allow async page fault injection only when guest is in user mode since
> otherwise guest may be in non-sleepable context and will not be able
> to reschedule.
> 
> Vcpu will be halted if guest will fault on the same page again or if
> vcpu executes kernel code.
> 
> Signed-off-by: Gleb Natapov <gleb@redhat.com>
> ---
>  arch/x86/include/asm/kvm_host.h |    3 ++
>  arch/x86/kvm/mmu.c              |    1 +
>  arch/x86/kvm/x86.c              |   49 ++++++++++++++++++++++++++++++++------
>  include/trace/events/kvm.h      |   17 ++++++++----
>  virt/kvm/async_pf.c             |    3 +-
>  5 files changed, 58 insertions(+), 15 deletions(-)
> 
> diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
> index de31551..2f6fc87 100644
> --- a/arch/x86/include/asm/kvm_host.h
> +++ b/arch/x86/include/asm/kvm_host.h
> @@ -419,6 +419,7 @@ struct kvm_vcpu_arch {
>  		gfn_t gfns[roundup_pow_of_two(ASYNC_PF_PER_VCPU)];
>  		struct gfn_to_hva_cache data;
>  		u64 msr_val;
> +		u32 id;
>  	} apf;
>  };
>  
> @@ -594,6 +595,7 @@ struct kvm_x86_ops {
>  };
>  
>  struct kvm_arch_async_pf {
> +	u32 token;
>  	gfn_t gfn;
>  };
>  
> @@ -842,6 +844,7 @@ void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
>  				 struct kvm_async_pf *work);
>  void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
>  			       struct kvm_async_pf *work);
> +bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu);
>  extern bool kvm_find_async_pf_gfn(struct kvm_vcpu *vcpu, gfn_t gfn);
>  
>  #endif /* _ASM_X86_KVM_HOST_H */
> diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
> index d85fda8..de53cab 100644
> --- a/arch/x86/kvm/mmu.c
> +++ b/arch/x86/kvm/mmu.c
> @@ -2580,6 +2580,7 @@ static int nonpaging_page_fault(struct kvm_vcpu *vcpu, gva_t gva,
>  int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu, gva_t gva, gfn_t gfn)
>  {
>  	struct kvm_arch_async_pf arch;
> +	arch.token = (vcpu->arch.apf.id++ << 12) | vcpu->vcpu_id;
>  	arch.gfn = gfn;
>  
>  	return kvm_setup_async_pf(vcpu, gva, gfn, &arch);
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> index 3e123ab..0e69d37 100644
> --- a/arch/x86/kvm/x86.c
> +++ b/arch/x86/kvm/x86.c
> @@ -6225,25 +6225,58 @@ static void kvm_del_async_pf_gfn(struct kvm_vcpu *vcpu, gfn_t gfn)
>  	}
>  }
>  
> +static int apf_put_user(struct kvm_vcpu *vcpu, u32 val)
> +{
> +
> +	return kvm_write_guest_cached(vcpu->kvm, &vcpu->arch.apf.data, &val,
> +				      sizeof(val));
> +}
> +
>  void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
>  				     struct kvm_async_pf *work)
>  {
> -	vcpu->arch.mp_state = KVM_MP_STATE_HALTED;
> -
> -	if (work == kvm_double_apf)
> +	if (work == kvm_double_apf) {
>  		trace_kvm_async_pf_doublefault(kvm_rip_read(vcpu));
> -	else {
> -		trace_kvm_async_pf_not_present(work->gva);
> -
> +		vcpu->arch.mp_state = KVM_MP_STATE_HALTED;
> +	} else {
> +		trace_kvm_async_pf_not_present(work->arch.token, work->gva);
>  		kvm_add_async_pf_gfn(vcpu, work->arch.gfn);
> +
> +		if (!(vcpu->arch.apf.msr_val & KVM_ASYNC_PF_ENABLED) ||
> +		    kvm_x86_ops->get_cpl(vcpu) == 0)
> +			vcpu->arch.mp_state = KVM_MP_STATE_HALTED;
> +		else if (!apf_put_user(vcpu, KVM_PV_REASON_PAGE_NOT_PRESENT)) {
> +			vcpu->arch.fault.error_code = 0;
> +			vcpu->arch.fault.address = work->arch.token;
> +			kvm_inject_page_fault(vcpu);
> +		}

Missed !kvm_event_needs_reinjection(vcpu) ? 


WARNING: multiple messages have this Message-ID (diff)
From: Marcelo Tosatti <mtosatti@redhat.com>
To: Gleb Natapov <gleb@redhat.com>
Cc: kvm@vger.kernel.org, linux-mm@kvack.org,
	linux-kernel@vger.kernel.org, avi@redhat.com, mingo@elte.hu,
	a.p.zijlstra@chello.nl, tglx@linutronix.de, hpa@zytor.com,
	riel@redhat.com, cl@linux-foundation.org
Subject: Re: [PATCH v6 09/12] Inject asynchronous page fault into a PV guest if page is swapped out.
Date: Tue, 5 Oct 2010 16:00:51 -0300	[thread overview]
Message-ID: <20101005190051.GB1786@amt.cnet> (raw)
In-Reply-To: <1286207794-16120-10-git-send-email-gleb@redhat.com>

On Mon, Oct 04, 2010 at 05:56:31PM +0200, Gleb Natapov wrote:
> Send async page fault to a PV guest if it accesses swapped out memory.
> Guest will choose another task to run upon receiving the fault.
> 
> Allow async page fault injection only when guest is in user mode since
> otherwise guest may be in non-sleepable context and will not be able
> to reschedule.
> 
> Vcpu will be halted if guest will fault on the same page again or if
> vcpu executes kernel code.
> 
> Signed-off-by: Gleb Natapov <gleb@redhat.com>
> ---
>  arch/x86/include/asm/kvm_host.h |    3 ++
>  arch/x86/kvm/mmu.c              |    1 +
>  arch/x86/kvm/x86.c              |   49 ++++++++++++++++++++++++++++++++------
>  include/trace/events/kvm.h      |   17 ++++++++----
>  virt/kvm/async_pf.c             |    3 +-
>  5 files changed, 58 insertions(+), 15 deletions(-)
> 
> diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
> index de31551..2f6fc87 100644
> --- a/arch/x86/include/asm/kvm_host.h
> +++ b/arch/x86/include/asm/kvm_host.h
> @@ -419,6 +419,7 @@ struct kvm_vcpu_arch {
>  		gfn_t gfns[roundup_pow_of_two(ASYNC_PF_PER_VCPU)];
>  		struct gfn_to_hva_cache data;
>  		u64 msr_val;
> +		u32 id;
>  	} apf;
>  };
>  
> @@ -594,6 +595,7 @@ struct kvm_x86_ops {
>  };
>  
>  struct kvm_arch_async_pf {
> +	u32 token;
>  	gfn_t gfn;
>  };
>  
> @@ -842,6 +844,7 @@ void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
>  				 struct kvm_async_pf *work);
>  void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
>  			       struct kvm_async_pf *work);
> +bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu);
>  extern bool kvm_find_async_pf_gfn(struct kvm_vcpu *vcpu, gfn_t gfn);
>  
>  #endif /* _ASM_X86_KVM_HOST_H */
> diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
> index d85fda8..de53cab 100644
> --- a/arch/x86/kvm/mmu.c
> +++ b/arch/x86/kvm/mmu.c
> @@ -2580,6 +2580,7 @@ static int nonpaging_page_fault(struct kvm_vcpu *vcpu, gva_t gva,
>  int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu, gva_t gva, gfn_t gfn)
>  {
>  	struct kvm_arch_async_pf arch;
> +	arch.token = (vcpu->arch.apf.id++ << 12) | vcpu->vcpu_id;
>  	arch.gfn = gfn;
>  
>  	return kvm_setup_async_pf(vcpu, gva, gfn, &arch);
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> index 3e123ab..0e69d37 100644
> --- a/arch/x86/kvm/x86.c
> +++ b/arch/x86/kvm/x86.c
> @@ -6225,25 +6225,58 @@ static void kvm_del_async_pf_gfn(struct kvm_vcpu *vcpu, gfn_t gfn)
>  	}
>  }
>  
> +static int apf_put_user(struct kvm_vcpu *vcpu, u32 val)
> +{
> +
> +	return kvm_write_guest_cached(vcpu->kvm, &vcpu->arch.apf.data, &val,
> +				      sizeof(val));
> +}
> +
>  void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
>  				     struct kvm_async_pf *work)
>  {
> -	vcpu->arch.mp_state = KVM_MP_STATE_HALTED;
> -
> -	if (work == kvm_double_apf)
> +	if (work == kvm_double_apf) {
>  		trace_kvm_async_pf_doublefault(kvm_rip_read(vcpu));
> -	else {
> -		trace_kvm_async_pf_not_present(work->gva);
> -
> +		vcpu->arch.mp_state = KVM_MP_STATE_HALTED;
> +	} else {
> +		trace_kvm_async_pf_not_present(work->arch.token, work->gva);
>  		kvm_add_async_pf_gfn(vcpu, work->arch.gfn);
> +
> +		if (!(vcpu->arch.apf.msr_val & KVM_ASYNC_PF_ENABLED) ||
> +		    kvm_x86_ops->get_cpl(vcpu) == 0)
> +			vcpu->arch.mp_state = KVM_MP_STATE_HALTED;
> +		else if (!apf_put_user(vcpu, KVM_PV_REASON_PAGE_NOT_PRESENT)) {
> +			vcpu->arch.fault.error_code = 0;
> +			vcpu->arch.fault.address = work->arch.token;
> +			kvm_inject_page_fault(vcpu);
> +		}

Missed !kvm_event_needs_reinjection(vcpu) ? 

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

  parent reply	other threads:[~2010-10-05 19:53 UTC|newest]

Thread overview: 176+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-10-04 15:56 [PATCH v6 00/12] KVM: Add host swap event notifications for PV guest Gleb Natapov
2010-10-04 15:56 ` Gleb Natapov
2010-10-04 15:56 ` [PATCH v6 01/12] Add get_user_pages() variant that fails if major fault is required Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-04 15:56 ` [PATCH v6 02/12] Halt vcpu if page it tries to access is swapped out Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-05  1:20   ` Rik van Riel
2010-10-05  1:20     ` Rik van Riel
2010-10-05 14:59   ` Marcelo Tosatti
2010-10-05 14:59     ` Marcelo Tosatti
2010-10-06 10:50     ` Avi Kivity
2010-10-06 10:50       ` Avi Kivity
2010-10-06 10:52       ` Gleb Natapov
2010-10-06 10:52         ` Gleb Natapov
2010-10-07  9:54         ` Avi Kivity
2010-10-07  9:54           ` Avi Kivity
2010-10-07 17:48           ` Gleb Natapov
2010-10-07 17:48             ` Gleb Natapov
2010-10-06 11:15     ` Gleb Natapov
2010-10-06 11:15       ` Gleb Natapov
2010-10-07  9:50   ` Avi Kivity
2010-10-07  9:50     ` Avi Kivity
2010-10-07  9:52     ` Avi Kivity
2010-10-07  9:52       ` Avi Kivity
2010-10-07 13:24     ` Rik van Riel
2010-10-07 13:24       ` Rik van Riel
2010-10-07 13:29       ` Avi Kivity
2010-10-07 13:29         ` Avi Kivity
2010-10-07 17:47     ` Gleb Natapov
2010-10-07 17:47       ` Gleb Natapov
2010-10-09 18:30       ` Avi Kivity
2010-10-09 18:30         ` Avi Kivity
2010-10-09 18:32         ` Avi Kivity
2010-10-09 18:32           ` Avi Kivity
2010-10-10  7:30           ` Gleb Natapov
2010-10-10  7:30             ` Gleb Natapov
2010-10-10  7:29         ` Gleb Natapov
2010-10-10  7:29           ` Gleb Natapov
2010-10-10 15:55           ` Avi Kivity
2010-10-10 15:55             ` Avi Kivity
2010-10-10 15:56             ` Avi Kivity
2010-10-10 15:56               ` Avi Kivity
2010-10-10 16:17               ` Gleb Natapov
2010-10-10 16:17                 ` Gleb Natapov
2010-10-10 16:16             ` Gleb Natapov
2010-10-10 16:16               ` Gleb Natapov
2010-10-04 15:56 ` [PATCH v6 03/12] Retry fault before vmentry Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-05 15:54   ` Marcelo Tosatti
2010-10-05 15:54     ` Marcelo Tosatti
2010-10-06 11:07     ` Gleb Natapov
2010-10-06 11:07       ` Gleb Natapov
2010-10-06 14:20       ` Marcelo Tosatti
2010-10-06 14:20         ` Marcelo Tosatti
2010-10-07 18:44         ` Gleb Natapov
2010-10-07 18:44           ` Gleb Natapov
2010-10-08 16:07           ` Marcelo Tosatti
2010-10-08 16:07             ` Marcelo Tosatti
2010-10-07 12:29   ` Avi Kivity
2010-10-07 12:29     ` Avi Kivity
2010-10-07 17:21     ` Gleb Natapov
2010-10-07 17:21       ` Gleb Natapov
2010-10-09 18:42       ` Avi Kivity
2010-10-09 18:42         ` Avi Kivity
2010-10-10  7:35         ` Gleb Natapov
2010-10-10  7:35           ` Gleb Natapov
2010-10-04 15:56 ` [PATCH v6 04/12] Add memory slot versioning and use it to provide fast guest write interface Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-05  1:29   ` Rik van Riel
2010-10-05  1:29     ` Rik van Riel
2010-10-05 16:57   ` Marcelo Tosatti
2010-10-05 16:57     ` Marcelo Tosatti
2010-10-06 11:14     ` Gleb Natapov
2010-10-06 11:14       ` Gleb Natapov
2010-10-06 14:38       ` Marcelo Tosatti
2010-10-06 14:38         ` Marcelo Tosatti
2010-10-06 20:08         ` Gleb Natapov
2010-10-06 20:08           ` Gleb Natapov
2010-10-07 10:00           ` Avi Kivity
2010-10-07 10:00             ` Avi Kivity
2010-10-07 15:42             ` Marcelo Tosatti
2010-10-07 15:42               ` Marcelo Tosatti
2010-10-07 16:03               ` Gleb Natapov
2010-10-07 16:03                 ` Gleb Natapov
2010-10-07 16:20                 ` Avi Kivity
2010-10-07 16:20                   ` Avi Kivity
2010-10-07 17:23                   ` Gleb Natapov
2010-10-07 17:23                     ` Gleb Natapov
2010-10-10 12:48                     ` Avi Kivity
2010-10-10 12:48                       ` Avi Kivity
2010-10-07 12:31   ` Avi Kivity
2010-10-07 12:31     ` Avi Kivity
2010-10-04 15:56 ` [PATCH v6 05/12] Move kvm_smp_prepare_boot_cpu() from kvmclock.c to kvm.c Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-04 15:56 ` [PATCH v6 06/12] Add PV MSR to enable asynchronous page faults delivery Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-07 12:42   ` Avi Kivity
2010-10-07 12:42     ` Avi Kivity
2010-10-07 17:53     ` Gleb Natapov
2010-10-07 17:53       ` Gleb Natapov
2010-10-10 12:47       ` Avi Kivity
2010-10-10 12:47         ` Avi Kivity
2010-10-10 13:27         ` Gleb Natapov
2010-10-10 13:27           ` Gleb Natapov
2010-10-07 12:58   ` Avi Kivity
2010-10-07 12:58     ` Avi Kivity
2010-10-07 17:59     ` Gleb Natapov
2010-10-07 17:59       ` Gleb Natapov
2010-10-09 18:43       ` Avi Kivity
2010-10-09 18:43         ` Avi Kivity
2010-10-04 15:56 ` [PATCH v6 07/12] Add async PF initialization to PV guest Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-05  2:34   ` Rik van Riel
2010-10-05  2:34     ` Rik van Riel
2010-10-05 18:25   ` Marcelo Tosatti
2010-10-05 18:25     ` Marcelo Tosatti
2010-10-06 10:55     ` Gleb Natapov
2010-10-06 10:55       ` Gleb Natapov
2010-10-06 14:45       ` Marcelo Tosatti
2010-10-06 14:45         ` Marcelo Tosatti
2010-10-06 20:05         ` Gleb Natapov
2010-10-06 20:05           ` Gleb Natapov
2010-10-07 12:50   ` Avi Kivity
2010-10-07 12:50     ` Avi Kivity
2010-10-08  7:54     ` Gleb Natapov
2010-10-08  7:54       ` Gleb Natapov
2010-10-09 18:44       ` Avi Kivity
2010-10-09 18:44         ` Avi Kivity
2010-10-04 15:56 ` [PATCH v6 08/12] Handle async PF in a guest Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-07 13:10   ` Avi Kivity
2010-10-07 13:10     ` Avi Kivity
2010-10-07 17:14     ` Gleb Natapov
2010-10-07 17:14       ` Gleb Natapov
2010-10-07 17:18       ` Avi Kivity
2010-10-07 17:18         ` Avi Kivity
2010-10-07 17:48         ` Rik van Riel
2010-10-07 17:48           ` Rik van Riel
2010-10-07 18:03         ` Gleb Natapov
2010-10-07 18:03           ` Gleb Natapov
2010-10-09 18:48           ` Avi Kivity
2010-10-09 18:48             ` Avi Kivity
2010-10-10  7:56             ` Gleb Natapov
2010-10-10  7:56               ` Gleb Natapov
2010-10-10 12:40               ` Avi Kivity
2010-10-10 12:40                 ` Avi Kivity
2010-10-10 12:32     ` Gleb Natapov
2010-10-10 12:32       ` Gleb Natapov
2010-10-10 12:38       ` Avi Kivity
2010-10-10 12:38         ` Avi Kivity
2010-10-10 13:22         ` Gleb Natapov
2010-10-10 13:22           ` Gleb Natapov
2010-10-04 15:56 ` [PATCH v6 09/12] Inject asynchronous page fault into a PV guest if page is swapped out Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-05  2:36   ` Rik van Riel
2010-10-05  2:36     ` Rik van Riel
2010-10-05 19:00   ` Marcelo Tosatti [this message]
2010-10-05 19:00     ` Marcelo Tosatti
2010-10-06 10:42     ` Gleb Natapov
2010-10-06 10:42       ` Gleb Natapov
2010-10-04 15:56 ` [PATCH v6 10/12] Handle async PF in non preemptable context Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-05 19:51   ` Marcelo Tosatti
2010-10-05 19:51     ` Marcelo Tosatti
2010-10-06 10:41     ` Gleb Natapov
2010-10-06 10:41       ` Gleb Natapov
2010-10-10 14:25       ` Gleb Natapov
2010-10-10 14:25         ` Gleb Natapov
2010-10-04 15:56 ` [PATCH v6 11/12] Let host know whether the guest can handle async PF in non-userspace context Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-07 13:36   ` Avi Kivity
2010-10-07 13:36     ` Avi Kivity
2010-10-04 15:56 ` [PATCH v6 12/12] Send async PF when guest is not in userspace too Gleb Natapov
2010-10-04 15:56   ` Gleb Natapov
2010-10-05  2:37   ` Rik van Riel
2010-10-05  2:37     ` Rik van Riel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20101005190051.GB1786@amt.cnet \
    --to=mtosatti@redhat.com \
    --cc=a.p.zijlstra@chello.nl \
    --cc=avi@redhat.com \
    --cc=cl@linux-foundation.org \
    --cc=gleb@redhat.com \
    --cc=hpa@zytor.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=mingo@elte.hu \
    --cc=riel@redhat.com \
    --cc=tglx@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.