public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* Re: [PATCH 1/5] kvm/x86: fix inversed check for async_pf MSR
@ 2016-12-02 15:24 Mika Penttilä
  2016-12-02 17:02 ` Roman Kagan
  0 siblings, 1 reply; 7+ messages in thread
From: Mika Penttilä @ 2016-12-02 15:24 UTC (permalink / raw)
  To: rkagan, kvm

> > > > > --- a/arch/x86/kvm/x86.c
> > > > > +++ b/arch/x86/kvm/x86.c
> > > > > @@ -8402,7 +8402,7 @@ void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
> > > > > bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
> > > > > {
> > > > > 	if (!(vcpu->arch.apf.msr_val & KVM_ASYNC_PF_ENABLED))
> > > > > -		return true;
> > > > > +		return false;
> > > > > 
> > > > > 
> > > > Why do you make this change?
> > 
> > > Because the code does the opposite of what it's meant to do.
> > 
> > It could have a better name but returning "true" is right. See below.
> > 
> >  > > I think kvm_arch_async_page_present() is not
> > > > ever called now and neither kvm_del_async_pf_gfn(vcpu, work->arch.gfn);
> > > I wonder how you came to such a conclusion?  I certainly see them called
> > > on my test machine (you need to have the guest memory swapped out for
> > > that, that can be forced e.g. using a memory cgroup).
> > if !KVM_ASYNC_PF_ENABLED then kvm_check_async_pf_completion(), it's only call site, never calls it.

> How's that?  I don't see any check for it in
> kvm_check_async_pf_completion().  Moreover, that's exactly where it does
> that check.

void kvm_check_async_pf_completion(struct kvm_vcpu *vcpu)
{
        struct kvm_async_pf *work;

        while (!list_empty_careful(&vcpu->async_pf.done) &&
              kvm_arch_can_inject_async_page_present(vcpu)) {
                spin_lock(&vcpu->async_pf.lock);
  

and you made kvm_arch_can_inject_async_page_present(vcpu) return false if !KVM_ASYNC_PF_ENABLED (i.e. not enabled)


> > Maybe you had KVM_ASYNC_PF_ENABLED?

> Of course I did.  Not sure I get what you mean...

I mean if the guest support for async pf is not enabled you maybe broke that?

--Mika
 



^ permalink raw reply	[flat|nested] 7+ messages in thread
* Re: [PATCH 1/5] kvm/x86: fix inversed check for async_pf MSR
@ 2016-12-02 14:14 Mika Penttilä
  2016-12-02 14:31 ` Roman Kagan
  0 siblings, 1 reply; 7+ messages in thread
From: Mika Penttilä @ 2016-12-02 14:14 UTC (permalink / raw)
  To: rkagan, kvm

> On Fri, Dec 02, 2016 at 12:45:28PM +0200, Mika Penttilä wrote:
> > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> > > index bf11fe4..14a46e9 100644
> > > --- a/arch/x86/kvm/x86.c
> > > +++ b/arch/x86/kvm/x86.c
> > > @@ -8402,7 +8402,7 @@ void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
> > > bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
> > > {
> > > 	if (!(vcpu->arch.apf.msr_val & KVM_ASYNC_PF_ENABLED))
> > > -		return true;
> > > +		return false;
> > > 
> > > 
> > Why do you make this change?

> Because the code does the opposite of what it's meant to do.

It could have a better name but returning "true" is right. See below.

 > > I think kvm_arch_async_page_present() is not
> > ever called now and neither kvm_del_async_pf_gfn(vcpu, work->arch.gfn);

> I wonder how you came to such a conclusion?  I certainly see them called
> on my test machine (you need to have the guest memory swapped out for
> that, that can be forced e.g. using a memory cgroup).

if !KVM_ASYNC_PF_ENABLED then kvm_check_async_pf_completion(), it's only call site, never calls it.

Maybe you had KVM_ASYNC_PF_ENABLED?

> Roman.

--Mika


^ permalink raw reply	[flat|nested] 7+ messages in thread
* [PATCH 0/5] kvm: avoid delaying async_pf ready delivery
@ 2016-12-02  8:47 Roman Kagan
  2016-12-02  8:47 ` [PATCH 1/5] kvm/x86: fix inversed check for async_pf MSR Roman Kagan
  0 siblings, 1 reply; 7+ messages in thread
From: Roman Kagan @ 2016-12-02  8:47 UTC (permalink / raw)
  To: Radim Krčmář, Paolo Bonzini, kvm; +Cc: Denis Lunev, Roman Kagan

Make the guest immediately aware of async_pf's being resolved, to
prevent it from holding off higher priority tasks in favor of lower
priority ones, including nested guests.

Roman Kagan (5):
  kvm/x86: fix inversed check for async_pf MSR
  kvm: add helper for testing ready async_pf's
  kvm: kick vcpu when async_pf is resolved
  kvm/vmx: kick L2 guest to L1 by ready async_pf
  kvm/svm: kick L2 guest to L1 by ready async_pf

Signed-off-by: Roman Kagan <rkagan@virtuozzo.com>

 include/linux/kvm_host.h |  7 +++++++
 arch/x86/kvm/svm.c       | 10 ++++++++++
 arch/x86/kvm/vmx.c       |  9 +++++----
 arch/x86/kvm/x86.c       |  4 ++--
 virt/kvm/async_pf.c      | 11 +++++++----
 5 files changed, 31 insertions(+), 10 deletions(-)

-- 
2.9.3


^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2016-12-03  0:19 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <a237e9b7-8155-5006-81b1-ac77a5efd13d@nextfour.com>
2016-12-02 10:45 ` [PATCH 1/5] kvm/x86: fix inversed check for async_pf MSR Mika Penttilä
2016-12-02 12:05   ` Roman Kagan
2016-12-02 15:24 Mika Penttilä
2016-12-02 17:02 ` Roman Kagan
  -- strict thread matches above, loose matches on Subject: below --
2016-12-02 14:14 Mika Penttilä
2016-12-02 14:31 ` Roman Kagan
2016-12-02  8:47 [PATCH 0/5] kvm: avoid delaying async_pf ready delivery Roman Kagan
2016-12-02  8:47 ` [PATCH 1/5] kvm/x86: fix inversed check for async_pf MSR Roman Kagan

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox