Re: [PATCH v2] x86/kvm: Disable KVM_ASYNC_PF_SEND_ALWAYS
From: Vivek Goyal
Date: Tue Apr 07 2020 - 13:21:50 EST
On Mon, Apr 06, 2020 at 01:42:28PM -0700, Andy Lutomirski wrote:
>
> > On Apr 6, 2020, at 1:32 PM, Andy Lutomirski <luto@xxxxxxxxxxxxxx> wrote:
> >
> > ï
> >> On Apr 6, 2020, at 1:25 PM, Peter Zijlstra <peterz@xxxxxxxxxxxxx> wrote:
> >>
> >> ïOn Mon, Apr 06, 2020 at 03:09:51PM -0400, Vivek Goyal wrote:
> >>>> On Mon, Mar 09, 2020 at 09:22:15PM +0100, Peter Zijlstra wrote:
> >>>>> On Mon, Mar 09, 2020 at 08:05:18PM +0100, Thomas Gleixner wrote:
> >>>>>> Andy Lutomirski <luto@xxxxxxxxxx> writes:
> >>>>>
> >>>>>>> I'm okay with the save/restore dance, I guess. It's just yet more
> >>>>>>> entry crud to deal with architecture nastiness, except that this
> >>>>>>> nastiness is 100% software and isn't Intel/AMD's fault.
> >>>>>>
> >>>>>> And we can do it in C and don't have to fiddle with it in the ASM
> >>>>>> maze.
> >>>>>
> >>>>> Right; I'd still love to kill KVM_ASYNC_PF_SEND_ALWAYS though, even if
> >>>>> we do the save/restore in do_nmi(). That is some wild brain melt. Also,
> >>>>> AFAIK none of the distros are actually shipping a PREEMPT=y kernel
> >>>>> anyway, so killing it shouldn't matter much.
> >>>
> >>> It will be nice if we can retain KVM_ASYNC_PF_SEND_ALWAYS. I have another
> >>> use case outside CONFIG_PREEMPT.
> >>>
> >>> I am trying to extend async pf interface to also report page fault errors
> >>> to the guest.
> >>
> >> Then please start over and design a sane ParaVirt Fault interface. The
> >> current one is utter crap.
> >
> > Agreed. Donât extend the current mechanism. Replace it.
> >
> > I would be happy to review a replacement. Iâm not really excited to review an extension of the current mess. The current thing is barely, if at all, correct.
>
> I read your patch. It cannot possibly be correct. You need to decide what happens if you get a memory failure when guest interrupts are off. If this happens, you canât send #PF, but you also canât just swallow the error. The existing APF code is so messy that itâs not at all obvious what your code ends up doing, but Iâm pretty sure it doesnât do anything sensible, especially since the ABI doesnât have a sensible option.
Hi Andy,
I am not familiar with this KVM code and trying to understand it. I think
error exception gets queued and gets delivered at some point of time, even
if interrupts are disabled at the time of exception. Most likely at the time
of next VM entry.
Whether interrupts are enabled or not check only happens before we decide
if async pf protocol should be followed or not. Once we decide to
send PAGE_NOT_PRESENT, later notification PAGE_READY does not check
if interrupts are enabled or not. And it kind of makes sense otherwise
guest process will wait infinitely to receive PAGE_READY.
I modified the code a bit to disable interrupt and wait 10 seconds (after
getting PAGE_NOT_PRESENT message). And I noticed that error async pf
got delivered after 10 seconds after enabling interrupts. So error
async pf was not lost because interrupts were disabled.
Havind said that, I thought disabling interrupts does not mask exceptions.
So page fault exception should have been delivered even with interrupts
disabled. Is that correct? May be there was no vm exit/entry during
those 10 seconds and that's why.
Thanks
Vivek