Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753902AbaF3Bon (ORCPT ); Sun, 29 Jun 2014 21:44:43 -0400 Received: from cn.fujitsu.com ([59.151.112.132]:43540 "EHLO heian.cn.fujitsu.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1753796AbaF3Bol (ORCPT ); Sun, 29 Jun 2014 21:44:41 -0400 X-IronPort-AV: E=Sophos;i="5.00,803,1396972800"; d="scan'208";a="32595236" Message-ID: <53B0C13C.20206@cn.fujitsu.com> Date: Mon, 30 Jun 2014 09:45:32 +0800 From: Tang Chen User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1 MIME-Version: 1.0 To: Marcelo Tosatti CC: Gleb Natapov , , , , , , , , , , , , , , Avi Kivity , Tang Chen Subject: Re: [RFC PATCH 1/1] Move two pinned pages to non-movable node in kvm. References: <1403070600-6083-1-git-send-email-tangchen@cn.fujitsu.com> <20140618061230.GA10948@minantech.com> <53A136C4.5070206@cn.fujitsu.com> <20140619092031.GA429@minantech.com> <20140619190024.GA3887@amt.cnet> <20140620111509.GE20764@minantech.com> <20140620125326.GA22283@amt.cnet> <20140620142622.GA28698@minantech.com> <20140620203146.GA6580@amt.cnet> <20140620203903.GA7838@amt.cnet> In-Reply-To: <20140620203903.GA7838@amt.cnet> Content-Type: text/plain; charset="ISO-8859-1"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.167.226.99] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/21/2014 04:39 AM, Marcelo Tosatti wrote: > On Fri, Jun 20, 2014 at 05:31:46PM -0300, Marcelo Tosatti wrote: >>> IIRC your shadow page pinning patch series support flushing of ptes >>> by mmu notifier by forcing MMU reload and, as a result, faulting in of >>> pinned pages during next entry. Your patch series does not pin pages >>> by elevating their page count. >> >> No but PEBS series does and its required to stop swap-out >> of the page. > > Well actually no because of mmu notifiers. > > Tang, can you implement mmu notifiers for the other breaker of > mem hotplug ? Hi Marcelo, I made a patch to update ept and apic pages when finding them in the next ept violation. And I also updated the APIC_ACCESS_ADDR phys_addr. The pages can be migrated, but the guest crached. How do I stop guest from access apic pages in mmu_notifier when the page migration starts ? Do I need to stop all the vcpus by set vcpu state to KVM_MP_STATE_HALTED ? If so, the vcpu will not able to go to the next ept violation. So, may I write any specific value into APIC_ACCESS_ADDR to stop guest from access to apic page ? Thanks. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/