Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp5800534ybg; Tue, 22 Oct 2019 08:33:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqwsmv7oTc64kvsyIxIEejgNfC1m9zBtShOmm477fW1Ck2Nyeyc6GoKCw11iY4k6NMEnvmED X-Received: by 2002:a17:906:5e07:: with SMTP id n7mr27999148eju.271.1571758412925; Tue, 22 Oct 2019 08:33:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571758412; cv=none; d=google.com; s=arc-20160816; b=Z7ZdGHm+C6V/cN38z2UIdA2acCpvu5MJNBA3YGjlCcASsA9yh03LOXD2CXafMRcXnT tQAaIkLOBSK4l4Ap9bjgvSjxp5VVyStp3zS0ml0gpLB/lrZGzQ96qVmFoNOEX6mxwcDS v3rTkH11jv0fQ+zgJBCCUuUTkA5mhNnUa/yJ6aSezqJU2z0KFCkUjC9qFL7TqJE36rVh lZCcilP6brdSWJ9i/q9iWU0z9FBVisqPkMbMKNiuF+nqJWgqsn/+2WWo0t7Yo25Lx1we ZWs7py4I7qQP4YnK7RzAlxvquLZ69bHuK1JEZ6MS7g6FtJRReoYExJmUREoNd7FG0YSb 2gdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=kKHA6flWf0G8Fdm0vhhTmG1WkPKIYwXzvitwyQ9sCbs=; b=rc2hzEmV1p3kfcHyOA2yFEwjDdOgKYx2wkC37VgaugJW2Zn1lheyuGhSN8jGECohTO fQmwiAaVsFYFwc7lmlqwljlixSVbN0bPaIeKUykFw48nbioSNEnqHuW28Ssb8ShVM+mx 2xiQ9REgr04YXPsrpUJAYuuk1lWi1naiRyIkqe4C5Wrps/5n0mbG+dXjmtvUemPT71KG WSz3Io6toLbEEvJ9xIf7IxRIa8D7U8vJ5Xr7mH7Xu8oRF/lNAYUKKVlP8JH4ZLGlSPZv 6WLafqfvRDL1yPzFUlnjctf1Lr7rGdFrNnEGP28MwOn9BJg9nmQDymS9bAgjGuV74b2J +XwQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h23si11294308ejc.1.2019.10.22.08.33.08; Tue, 22 Oct 2019 08:33:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388866AbfJVLwR (ORCPT + 99 others); Tue, 22 Oct 2019 07:52:17 -0400 Received: from [217.140.110.172] ([217.140.110.172]:50406 "EHLO foss.arm.com" rhost-flags-FAIL-FAIL-OK-OK) by vger.kernel.org with ESMTP id S2388204AbfJVLwR (ORCPT ); Tue, 22 Oct 2019 07:52:17 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 11D8F1045; Tue, 22 Oct 2019 04:51:54 -0700 (PDT) Received: from localhost (e113682-lin.copenhagen.arm.com [10.32.145.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 98A073F71F; Tue, 22 Oct 2019 04:51:53 -0700 (PDT) Date: Tue, 22 Oct 2019 13:51:52 +0200 From: Christoffer Dall To: Sean Christopherson Cc: Marc Zyngier , James Hogan , Paul Mackerras , Christian Borntraeger , Janosch Frank , Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= , kvm-ppc@vger.kernel.org, Wanpeng Li , kvm@vger.kernel.org, David Hildenbrand , Joerg Roedel , Cornelia Huck , linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Vitaly Kuznetsov , kvmarm@lists.cs.columbia.edu, Jim Mattson Subject: Re: [PATCH 00/45] KVM: Refactor vCPU creation Message-ID: <20191022115152.GC2652@e113682-lin.lund.arm.com> References: <20191022015925.31916-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191022015925.31916-1-sean.j.christopherson@intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Sean, On Mon, Oct 21, 2019 at 06:58:40PM -0700, Sean Christopherson wrote: > *************************** DISCLAIMER ********************************** > The non-x86 arch specific patches are completely untested. Although the > changes are conceptually straightforward, I'm not remotely confident that > the patches are bug free, e.g. checkpatch caught several blatant typos > that would break compilation. > ************************************************************************* > > The end goal of this series is to strip down the interface between common > KVM code and arch specific code so that there is precisely one arch hook > for creating a vCPU and one hook for destroying a vCPU. In addition to > cleaning up the code base, simplifying the interface gives architectures > more freedom to organize their vCPU creation code. > > KVM's vCPU creation code is comically messy. kvm_vm_ioctl_create_vcpu() > calls three separate arch hooks: init(), create() and setup(). The init() > call is especially nasty as it's hidden away in a common KVM function, > kvm_init_vcpu(), that for all intents and purposes must be immediately > invoked after the vcpu object is allocated. > > Not to be outdone, vCPU destruction also has three arch hooks: uninit(), > destroy() and free(), the latter of which isn't actually invoked by common > KVM code, but the hook declaration still exists because architectures are > relying on its forward declaration. > > Eliminating the extra arch hooks is relatively straightforward, just > tedious. For the most part, there is no fundamental constraint that > necessitated the proliferation of arch hooks, rather they crept in over > time, usually when x86-centric code was moved out of generic KVM and into > x86 code. > > E.g. kvm_arch_vcpu_setup() was added to allow x86 to do vcpu_load(), which > can only be done after preempt_notifier initialization, but adding setup() > overlooked the fact that the preempt_notifier was only initialized after > kvm_arch_vcpu_create() because preemption support was added when x86's MMU > setup (the vcpu_load() user) was called from common KVM code. > > For all intents and purposes, there is no true functional change in this > series. The order of some allocations will change, and a few memory leaks > are fixed, but the actual functionality of a guest should be unaffected. > > Patches 01-03 are bug fixes in error handling paths that were found by > inspection when refactoring the associated code. > > Patches 04-43 refactor each arch implementation so that the unwanted arch > hooks can be dropped without a functional change, e.g. move code out of > kvm_arch_vcpu_setup() so that all implementations are empty, then drop the > functions and caller. > > Patches 44-45 are minor clean up to eliminate kvm_vcpu_uninit(). > > > The net result is to go from this: > > vcpu = kvm_arch_vcpu_create(kvm, id); > | > |-> kvm_vcpu_init() > | > |-> kvm_arch_vcpu_init() > > if (IS_ERR(vcpu)) { > r = PTR_ERR(vcpu); > goto vcpu_decrement; > } > > preempt_notifier_init(&vcpu->preempt_notifier, &kvm_preempt_ops); > > r = kvm_arch_vcpu_setup(vcpu); > if (r) > goto vcpu_destroy; > > to this: > > r = kvm_arch_vcpu_precreate(kvm, id); > if (r) > goto vcpu_decrement; > > vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL); > if (!vcpu) { > r = -ENOMEM; > goto vcpu_decrement; > } > > page = alloc_page(GFP_KERNEL | __GFP_ZERO); > if (!page) { > r = -ENOMEM; > goto vcpu_free; > } > vcpu->run = page_address(page); > > kvm_vcpu_init(vcpu, kvm, id); > > r = kvm_arch_vcpu_create(vcpu); > if (r) > goto vcpu_free_run_page; > What a fantastically welcome piece of work! Thanks for doing this, many's the time I waded through all those calls to ensure a patch was doing the right thing. Modulo the nit in patch 42, the arm64 changes survive a guest boot + hackbench and build fine. The lack of changing the arm-specific destroy function to a void also causes a series of warnings for a 32-bit arm build, but otherwise builds fine. You can add my: Acked-by: Christoffer Dall To the arm/arm64 and generic parts. Thanks, Christoffer