From: Paolo Bonzini <pbonzini@redhat.com>
To: Sean Christopherson <seanjc@google.com>,
Like Xu <like.xu.linux@gmail.com>
Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org
Subject: Re: [PATCH 1/2] KVM: vmx, pmu: accept 0 for absent MSRs when host-initiated
Date: Thu, 16 Jun 2022 12:37:13 +0200 [thread overview]
Message-ID: <69fac460-ff29-ca76-d9a8-d2529cf02fa2@redhat.com> (raw)
In-Reply-To: <YqoqZjH+yjYJTxmT@google.com>
On 6/15/22 20:52, Sean Christopherson wrote:
> On Thu, Jun 02, 2022, Like Xu wrote:
>> I actually agree and understand the situation of maintainers/reviewers.
>> No one wants to maintain flawed code, especially in this community
>> where the majority of previous contributors disappeared after the code
>> was merged in. The existing heavy maintenance burden is already visible.
I don't think this is true. I think it's relatively rare for
contributors to disappear.
>> Thus we may have a maintainer/reviewers scalability issue. Due to missing
>> trust, competence or mastery of rules, most of the patches sent to the list
>> have no one to point out their flaws.
>
> Then write tests and run the ones that already exist. Relying purely on reviewers
> to detect flaws does not and cannot scale. I agree that we currently have a
> scalability issue, but I have different views on how to improve things.
>
>> I have privately received many complaints about the indifference of our
>> community, which is distressing.
You're welcome to expand on these complaints. But I suspect that a lot
of these would come from people that have been told "review other
people's work", "write tests" and/or "you submitted a broken patch" before.
"Let's try to accept" is basically what I did for PEBS and LBR, both of
which I merged basically out of guilt after a little-more-than-cursory
review. It turns out that both of them were broken in ways that weren't
subtle at all; and as a result, other work already queued to 5.19 had to
be bumped to 5.20.
Honestly I should have complained and un-merged them right after seeing
the msr.flat failure. Or perhaps I should have just said "write tests
and then I'll consider the series", but I "tried to accept" and we can
already see it was a failure.
>> Obviously, "try to accept" is not a 100% commitment and it will fail with high
>> probability, but such a stance (along with standard clarifications and requirements)
>> from reviewers and maintainers will make the contributors more concerned,
>> attract potential volunteers, and focus the efforts of our nominated reviewers.
If it "fails with high probability", all that happened was a waste of
time for everyone involved. Including the submitter who has waited for
weeks for a reviews only to be told "test X fails".
> I completely agree on needing better transparency for the lifecycle of patches
> going through the KVM tree. First and foremost, there need to be formal, documented
> rules for the "official" kvm/* branches, e.g. everything in kvm/queue passes ABC
> tests, everything in kvm/next also passes XYZ tests. That would also be a good
> place to document expectations, how things works, etc...
Agreed. I think this is a more general problem with Linux development
and I will propose this for maintainer summit.
But again, the relationship between contributors and maintainers should
be of mutual benefit. Rules help contributors, but contributors should
themselves behave and not throw broken patches at maintainers. And
again, guess what the best way is to tell maintainers your patch is not
broken? Include a test. It shows that you are paying attention.
> I fully realize that writing tests is not glamorous, and that some of KVM's tooling
> and infrastructure is lacking,
I wouldn't say lacking. Sure it's complicated, but between selftests
and kvm-unit-tests the tools *are* there. selftests that allow you to
test migration at an instruction boundary, for example, are not that
hard to write and were very important for features such as nested state
and AMX. They're not perfect, but they go a long way towards giving
confidence in the code; and it's easier to catch weird ioctl policies
from reviewing comprehensive tests than from reviewing the actual KVM code.
We're not talking of something like SEV or TDX here, we're talking about
very boring MSR emulation and only slightly less boring PMU passthrough.
Paolo
next prev parent reply other threads:[~2022-06-16 10:37 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-05-31 17:54 [PATCH 0/2] KVM: vmx, pmu: respect KVM_GET_MSR_INDEX_LIST/KVM_SET_MSR contracts Paolo Bonzini
2022-05-31 17:54 ` [PATCH 1/2] KVM: vmx, pmu: accept 0 for absent MSRs when host-initiated Paolo Bonzini
2022-05-31 18:37 ` Sean Christopherson
2022-06-01 2:46 ` Like Xu
2022-06-01 8:50 ` Paolo Bonzini
2022-06-01 16:39 ` Sean Christopherson
2022-06-02 2:12 ` Like Xu
2022-06-15 18:52 ` Sean Christopherson
2022-06-16 10:37 ` Paolo Bonzini [this message]
2022-06-16 15:30 ` Sean Christopherson
2022-06-01 8:54 ` Paolo Bonzini
2022-06-01 9:12 ` Yang, Weijiang
2022-06-01 10:15 ` Paolo Bonzini
2022-06-01 10:42 ` Yang, Weijiang
2022-05-31 17:54 ` [PATCH 2/2] KVM: x86: always allow host-initiated writes to PMU MSRs Paolo Bonzini
2022-06-01 1:12 ` Like Xu
2022-06-08 22:22 ` Sean Christopherson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=69fac460-ff29-ca76-d9a8-d2529cf02fa2@redhat.com \
--to=pbonzini@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=like.xu.linux@gmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=seanjc@google.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox