Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935574AbdIYPMs (ORCPT ); Mon, 25 Sep 2017 11:12:48 -0400 Received: from mx1.redhat.com ([209.132.183.28]:41036 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932107AbdIYPMq (ORCPT ); Mon, 25 Sep 2017 11:12:46 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 89CD0806B3 Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=pbonzini@redhat.com Subject: Re: [patch 3/3] x86: kvm guest side support for KVM_HC_RT_PRIO hypercall To: Peter Zijlstra , Marcelo Tosatti Cc: Konrad Rzeszutek Wilk , mingo@redhat.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Thomas Gleixner References: <20170921113835.031375194@redhat.com> <20170922011039.GB20133@amt.cnet> <20170922100004.ydmaxvgpc2zx7j25@hirez.programming.kicks-ass.net> <20170922105609.deln6kylvvpaijg7@hirez.programming.kicks-ass.net> <20170922123305.GB29608@amt.cnet> <20170922125556.cyzybj6c7jqypbmo@hirez.programming.kicks-ass.net> <951aaa3f-b20d-6f67-9454-f193f4445fc7@redhat.com> <20170923134114.qdfdegrd6afqrkut@hirez.programming.kicks-ass.net> <855950672.7912001.1506258344142.JavaMail.zimbra@redhat.com> <20170925025751.GB30813@amt.cnet> <20170925091316.bnwpiscs2bvpdxk5@hirez.programming.kicks-ass.net> From: Paolo Bonzini Message-ID: <00ff8cbf-4e41-a950-568c-3bd95e155d4b@redhat.com> Date: Mon, 25 Sep 2017 17:12:42 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20170925091316.bnwpiscs2bvpdxk5@hirez.programming.kicks-ass.net> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Mon, 25 Sep 2017 15:12:46 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1864 Lines: 48 On 25/09/2017 11:13, Peter Zijlstra wrote: > On Sun, Sep 24, 2017 at 11:57:53PM -0300, Marcelo Tosatti wrote: >> I think you are missing the following point: >> >> "vcpu0 can be interrupted when its not in a spinlock protected section, >> otherwise it can't." Who says that? Certainly a driver can dedicate a single VCPU to periodic polling of the device, in such a way that the polling does not require a spinlock. >> So you _have_ to communicate to the host when the guest enters/leaves a >> critical section. >> >> So this point of "everything needs to be RT and the priorities must be >> designed carefully", is this: >> >> WHEN in spinlock protected section (more specifically, when >> spinlock protected section _shared with realtime vcpus_), >> >> priority of vcpu0 > priority of emulator thread >> >> OTHERWISE >> >> priority of vcpu0 < priority of emulator thread. This is _not_ designed carefully, this is messy. The emulator thread can interrupt the VCPU thread, so it has to be at higher RT priority (+ priority inheritance of mutexes). Once you have done that we can decide on other approaches that e.g. let you get more sharing by placing housekeeping VCPUs at SCHED_NORMAL or SCHED_RR. >> So emulator thread can interrupt and inject interrupts to vcpu0. > > spinlock protected regions are not everything. What about lock-free > constructs where CPU's spin-wait on one another (there's plenty). > > And I'm clearly ignorant of how this emulation thread works, but why > would it run for a long time? Either it is needed for forward progress > of the VCPU or its not. If its not, it shouldn't run. The emulator thread 1) should not run for long period of times indeed, and 2) it is needed for forward progress of the VCPU. So it has to be at higher RT priority. I agree with Peter, sorry. Spinlocks are a red herring here. Paolo