Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S970617AbdIZXXD (ORCPT ); Tue, 26 Sep 2017 19:23:03 -0400 Received: from mx1.redhat.com ([209.132.183.28]:56802 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S968752AbdIZXW4 (ORCPT ); Tue, 26 Sep 2017 19:22:56 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com AC347883B9 Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx02.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=mtosatti@redhat.com Date: Tue, 26 Sep 2017 20:22:30 -0300 From: Marcelo Tosatti To: Peter Zijlstra Cc: Paolo Bonzini , Konrad Rzeszutek Wilk , mingo@redhat.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Thomas Gleixner Subject: Re: [patch 3/3] x86: kvm guest side support for KVM_HC_RT_PRIO hypercall Message-ID: <20170926232230.GA8962@amt.cnet> References: <20170922011039.GB20133@amt.cnet> <20170922100004.ydmaxvgpc2zx7j25@hirez.programming.kicks-ass.net> <20170922105609.deln6kylvvpaijg7@hirez.programming.kicks-ass.net> <20170922123305.GB29608@amt.cnet> <20170922125556.cyzybj6c7jqypbmo@hirez.programming.kicks-ass.net> <951aaa3f-b20d-6f67-9454-f193f4445fc7@redhat.com> <20170923134114.qdfdegrd6afqrkut@hirez.programming.kicks-ass.net> <855950672.7912001.1506258344142.JavaMail.zimbra@redhat.com> <20170925025751.GB30813@amt.cnet> <20170925091316.bnwpiscs2bvpdxk5@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170925091316.bnwpiscs2bvpdxk5@hirez.programming.kicks-ass.net> User-Agent: Mutt/1.5.21 (2010-09-15) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Tue, 26 Sep 2017 23:22:56 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1601 Lines: 43 On Mon, Sep 25, 2017 at 11:13:16AM +0200, Peter Zijlstra wrote: > On Sun, Sep 24, 2017 at 11:57:53PM -0300, Marcelo Tosatti wrote: > > I think you are missing the following point: > > > > "vcpu0 can be interrupted when its not in a spinlock protected section, > > otherwise it can't." > > > > So you _have_ to communicate to the host when the guest enters/leaves a > > critical section. > > > > So this point of "everything needs to be RT and the priorities must be > > designed carefully", is this: > > > > WHEN in spinlock protected section (more specifically, when > > spinlock protected section _shared with realtime vcpus_), > > > > priority of vcpu0 > priority of emulator thread > > > > OTHERWISE > > > > priority of vcpu0 < priority of emulator thread. > > > > (*) > > > > So emulator thread can interrupt and inject interrupts to vcpu0. > > spinlock protected regions are not everything. What about lock-free > constructs where CPU's spin-wait on one another (there's plenty). True. Could add the "i am in a critical section" notifier to those constructs as well, which would call the hypercall. > And I'm clearly ignorant of how this emulation thread works, but why > would it run for a long time? Either it is needed for forward progress > of the VCPU or its not. If its not, it shouldn't run. It is needed only when not in a critical section. And when in a critical section, the vcpu should not get interrupted. But the solution to reserve one pCPU per socket, to run all emulator threads, achieves reasonable packing numbers without the downsides of the hypercall.