Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1026619pxk; Thu, 3 Sep 2020 20:49:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxL1PJq8mngLLON0z+ZgB2GgPbGOwLd+C5xSulxHFPxXt1445EoC5VBWY2l7e4QXUIw45A8 X-Received: by 2002:a17:907:7090:: with SMTP id yj16mr5332720ejb.73.1599191356906; Thu, 03 Sep 2020 20:49:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599191356; cv=none; d=google.com; s=arc-20160816; b=vGPc6UAO9A8qnEcrIYBGsTF41enxfs2NsLH49gClfnU32nXu/F3M569Huk5z5/QEWt 4JHgu4J/wFcbGgf6hRRd3MXuC62qHRgTKyFO8EEucadN7LZ0f2aFAjnGMytHPnhfS6M/ y7BdjQ89Nmkh+3C6tXg+g3nywY8MrfLCtiGNFMRIHhe4Av88vDmwMEyiSDkUkwDhxKv9 SKisvBPV3WZ/g0v363Z3fRARs3cnzdYDSpdVX202LKQZCdAZLHT5rMUwjCdjkE6nBxP0 x2uv2V8bpL+vLRqwhJ77tyjcg5Jl0EGa/nOmnTNp/RLOktJI55gzGHzwstYqJPPMTdsE W11A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=vo9dMII8sgdMJIvRZPT/GFao9TDZZxkzQenpAOJ4HAs=; b=x3yBbD4KxDRBTAcAVm2T82rLVwAYyIPhK81hJLqzeyeYEYHlR5ML0BOfbjWA+Z06SU VGCmSm/jiz9TB02QxZfIzV7zYOncPpFanw5aomUWw/pmIpC8Kxjd8Dm7/YStgNpyGjsH oHpc9BKYJRS7vNRAegTgV7O1AVg/VhjleSzZ7OtmWRofH6K/v/RQQ+bekh0DZYQPEMyA WEkI6TtrJnzzQUqRJaWjnrR75Nqkf+dwpLtbMbvVzKynZ2VzfzAWQ0X4BOU+0rSv9bRY JgMBosuEn3vGqgBZnzLvktQ7CLna6TleShNogYRKXXtvPQIrnU7SiokBNGI8RwG2GIjm lgrg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j11si3026367edy.393.2020.09.03.20.48.51; Thu, 03 Sep 2020 20:49:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729655AbgIDDrT (ORCPT + 99 others); Thu, 3 Sep 2020 23:47:19 -0400 Received: from mga17.intel.com ([192.55.52.151]:5919 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729550AbgIDDrS (ORCPT ); Thu, 3 Sep 2020 23:47:18 -0400 IronPort-SDR: QG8vhPin+sU3aLuNrRl+gtUFRTomoJHmfiQhf78D+CB2vfGCo7uKue4eiUKnDrEr9V0CDw9hXj L//3GSH+Wp/Q== X-IronPort-AV: E=McAfee;i="6000,8403,9733"; a="137741692" X-IronPort-AV: E=Sophos;i="5.76,388,1592895600"; d="scan'208";a="137741692" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Sep 2020 20:47:17 -0700 IronPort-SDR: l80ZKwhyHrrNVLW2qWFsR+EQpGT1/DUhufk6hBFi7IfbRxdUGVll6g8fe5DQptPXoM3Iz4g8lR 8RVhfqTAMG0g== X-IronPort-AV: E=Sophos;i="5.76,388,1592895600"; d="scan'208";a="478304823" Received: from sjchrist-ice.jf.intel.com (HELO sjchrist-ice) ([10.54.31.34]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Sep 2020 20:47:17 -0700 Date: Thu, 3 Sep 2020 20:47:16 -0700 From: Sean Christopherson To: Vitaly Kuznetsov Cc: kvm@vger.kernel.org, Paolo Bonzini , Wanpeng Li , Jim Mattson , Peter Xu , Michael Tsirkin , Julia Suvorova , Andy Lutomirski , Andrew Jones , linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 1/3] KVM: x86: move kvm_vcpu_gfn_to_memslot() out of try_async_pf() Message-ID: <20200904034714.GA22394@sjchrist-ice> References: <20200807141232.402895-1-vkuznets@redhat.com> <20200807141232.402895-2-vkuznets@redhat.com> <20200814014014.GA4845@linux.intel.com> <87k0xdwplg.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87k0xdwplg.fsf@vitty.brq.redhat.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 01, 2020 at 04:15:07PM +0200, Vitaly Kuznetsov wrote: > Sean Christopherson writes: > > > On Fri, Aug 07, 2020 at 04:12:30PM +0200, Vitaly Kuznetsov wrote: > >> No functional change intended. Slot flags will need to be analyzed > >> prior to try_async_pf() when KVM_MEM_PCI_HOLE is implemented. > > > > (Sorry it took me so long to reply. No, I wasn't hoping for Paolo's > magical "queued, thanks", I just tried to not read my email while on > vacation). > > > Why? Wouldn't it be just as easy, and arguably more appropriate, to add > > KVM_PFN_ERR_PCI_HOLE and update handle_abornmal_pfn() accordinaly? > > > > Yes, we can do that, but what I don't quite like here is that > try_async_pf() does much more than 'trying async PF'. In particular, it > extracts 'pfn' and this is far from being obvious. Maybe we can rename > try_async_pf() somewhat smartly (e.g. 'try_handle_pf()')? Your > suggestion will make perfect sense to me then. Ya, try_async_pf() is a horrible name. try_handle_pf() isn't bad, but it's not technically handling the fault. Maybe try_get_pfn() with an inverted return? if (!try_get_pfn(...)) return RET_PF_RETRY;