Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1322805ybt; Tue, 7 Jul 2020 12:51:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw72N8rpvgaSCiJDyfFEDvcFQbuKAJzs/z4B8jrk6syvoJ/ulspEzgtOX1NmCaZISBHrazn X-Received: by 2002:a05:6402:363:: with SMTP id s3mr50776472edw.238.1594151469498; Tue, 07 Jul 2020 12:51:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594151469; cv=none; d=google.com; s=arc-20160816; b=lgX8XgkQmqdZpjVxSXYkavos46w4qcdNOrwaryRVjWlyOuobwJvILXBdk/hGIYinbS PQKhx8A6oVyWwjKlCjPFy/ma1hnOezEVqHoxzw4p9vuLFcmJYgrzUDiyuS8ZhZ+wgOJP 8KN0lHEW0E9v3elIUHBjZeCUXZ0GVFH3Px8/TPibD9qVeFN8hD7ZJKmynEPTSXMCuqhR 0+MXFiU0Drns8liL3LIpVgfoGmQSombkkRdm9GwlJLr8sfAnLGsJtgtopmtu42OoVSZi bZ5C4A1yOh4lS65IkQA5BtpnTuDlWS9TKVEBiKAk3rSktXBTwenh2XrAnmz/Bzxu92kx YKrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=1MyiecDX95vYDn16o1AnLNPElpX9iu/bMS7QGJmoJuA=; b=keL+bAdhqlFy3iNnrQnR5kK+TYhnVK3ejeYK2nxvBvXfqhrJKJx2ORnMU3CJIkKymW VJB0s6QFM5C0fZBDTX+XuVKwfq2p/mnfs29ObtViw8z1hft0IqJD7q+Q0b3XLWA1lwuI i355AJ+2ONjCBwjbApVnpRD+OpjUeOeRRqB7UfTOH1NLxidcmwE7SRx8eESHj85CclG2 ASxN+Z+GFQXuC/DICdCFz57jZ7gUiTwIZyCfnV3XbaFG1FvCBRbkv1xhhW966bEdd8g6 3mwtK5wVKT8cakhB0RQgFTZ+sZStBfVkIiq02ctfnkOrdow9MzstU7PXaDb13FWz8Z30 XA6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Ezn5S6o1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v10si15704221edy.595.2020.07.07.12.50.46; Tue, 07 Jul 2020 12:51:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Ezn5S6o1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728489AbgGGTuQ (ORCPT + 99 others); Tue, 7 Jul 2020 15:50:16 -0400 Received: from us-smtp-1.mimecast.com ([205.139.110.61]:24679 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726951AbgGGTuQ (ORCPT ); Tue, 7 Jul 2020 15:50:16 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1594151414; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=1MyiecDX95vYDn16o1AnLNPElpX9iu/bMS7QGJmoJuA=; b=Ezn5S6o1mJtao82drG9DKUfIGEvcH6/qddkvT5XkH6r8sOkg6mDh9XBfhmeSQTTBCm/YS0 Yv7lKHFMnuxUCJ/omVEpVwc9Q6JQJJk6uOR+8qg+CX3VMIUjHbTPu+WZbJUBU31YIcH9vw n0HpTmVeQyeoXbFc+DG2FOSUB2gooO8= Received: from mail-qt1-f199.google.com (mail-qt1-f199.google.com [209.85.160.199]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-468-p9AkMfYZMTSdWbZ5mhhRcg-1; Tue, 07 Jul 2020 15:50:12 -0400 X-MC-Unique: p9AkMfYZMTSdWbZ5mhhRcg-1 Received: by mail-qt1-f199.google.com with SMTP id g6so31534133qtr.0 for ; Tue, 07 Jul 2020 12:50:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=1MyiecDX95vYDn16o1AnLNPElpX9iu/bMS7QGJmoJuA=; b=RUvGSw8jeLgDtXQtj2+D3hprmjHbTJr9wJxu656vi0vnd7j+yoSs00cfqKGXO/gkht EhLiu0VJUcyDxhknmFYrcMqqbEST1LbasUfThuphozpU5OMb3JRxPDkwrD4+nfV0vOnG gRhEslSPtwrkH3nouaw4jZy05E8m0NiP/wvzrkjy5yDwYs7srzFGtLAjKDCOGvFcCQS+ RgUCnto04fvD+87uhezkHJpgViSqgUSeMv1XFvhLFiXFHCO743uafSKJAu3L2fHCKnAt 8l0spVlsVtQ66pG7atLBWvOP2duSgDq+46caCzTI/eJEDHdcFw0m+UnuKsxfqYSDNhQW t2rQ== X-Gm-Message-State: AOAM533nEKULojWeZLjQW0RjQXNT+OIpcrSuI+CKiKohQHdzrXvLE6fF Mob4i9RvloZEWfqlpBy2BBZwX/vyAnYRjvr5Ta6PXBOtXMKIw821JpkA93hgdjQxuexNUqyXneO I4V6vxDbanDV+eHAjwZ22SFts X-Received: by 2002:aed:2fa1:: with SMTP id m30mr41633877qtd.306.1594151412052; Tue, 07 Jul 2020 12:50:12 -0700 (PDT) X-Received: by 2002:aed:2fa1:: with SMTP id m30mr41633836qtd.306.1594151411697; Tue, 07 Jul 2020 12:50:11 -0700 (PDT) Received: from xz-x1 ([2607:9880:19c0:32::2]) by smtp.gmail.com with ESMTPSA id o20sm28889533qtk.56.2020.07.07.12.50.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 07 Jul 2020 12:50:10 -0700 (PDT) Date: Tue, 7 Jul 2020 15:50:09 -0400 From: Peter Xu To: Sean Christopherson Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, "Dr . David Alan Gilbert" , Andrew Jones , Vitaly Kuznetsov , Paolo Bonzini , "Michael S . Tsirkin" , Jason Wang , Kevin Tian Subject: Re: [PATCH v10 02/14] KVM: Cache as_id in kvm_memory_slot Message-ID: <20200707195009.GE88106@xz-x1> References: <20200601115957.1581250-1-peterx@redhat.com> <20200601115957.1581250-3-peterx@redhat.com> <20200702230849.GL3575@linux.intel.com> <20200703184122.GF6677@xz-x1> <20200707061732.GI5208@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200707061732.GI5208@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 06, 2020 at 11:17:32PM -0700, Sean Christopherson wrote: > On Fri, Jul 03, 2020 at 02:41:22PM -0400, Peter Xu wrote: > > On Thu, Jul 02, 2020 at 04:08:49PM -0700, Sean Christopherson wrote: > > > On Mon, Jun 01, 2020 at 07:59:45AM -0400, Peter Xu wrote: > > > > Cache the address space ID just like the slot ID. It will be used in > > > > order to fill in the dirty ring entries. > > > > > > > > Suggested-by: Paolo Bonzini > > > > Suggested-by: Sean Christopherson > > > > Signed-off-by: Peter Xu > > > > --- > > > > include/linux/kvm_host.h | 1 + > > > > virt/kvm/kvm_main.c | 1 + > > > > 2 files changed, 2 insertions(+) > > > > > > > > diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h > > > > index 01276e3d01b9..5e7bbaf7a36b 100644 > > > > --- a/include/linux/kvm_host.h > > > > +++ b/include/linux/kvm_host.h > > > > @@ -346,6 +346,7 @@ struct kvm_memory_slot { > > > > unsigned long userspace_addr; > > > > u32 flags; > > > > short id; > > > > + u16 as_id; > > > > }; > > > > > > > > static inline unsigned long kvm_dirty_bitmap_bytes(struct kvm_memory_slot *memslot) > > > > diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c > > > > index 74bdb7bf3295..ebdd98a30e82 100644 > > > > --- a/virt/kvm/kvm_main.c > > > > +++ b/virt/kvm/kvm_main.c > > > > @@ -1243,6 +1243,7 @@ int __kvm_set_memory_region(struct kvm *kvm, > > > > if (!mem->memory_size) > > > > return kvm_delete_memslot(kvm, mem, &old, as_id); > > > > > > This technically needs to set as_id in the deleted memslot. I highly doubt > > > it will ever matter from a functionality perspective, but it'd be confusing > > > to encounter a memslot whose as_id did not match that of its owner. > > > > Yeah it shouldn't matter because as_id is directly passed in to look up the > > pointer of kvm_memslots in kvm_delete_memslot, and memslot->as_id shouldn't be > > further referenced. > > > > I can add a comment above if this can clarify things a bit: > > > > + u16 as_id; /* cache of as_id; only valid if npages != 0 */ > > Why not just set it? Because the value is useless even if set? :) You mean in kvm_delete_memslot(), am I right? > It's a single line of code, and there's more than one > "shouldn't" in the above. If you want, I can both set it and add the comment. Thanks, -- Peter Xu