[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH RFC V3 2/4] kvm hypervisor : Add a hypercall to KVM hypervisor to support pv-ticketlocks



[ CCing Jeremy's new email ID ]
Hi Avi,
Thanks for review and inputs.

On 12/01/2011 04:41 PM, Avi Kivity wrote:
On 11/30/2011 10:59 AM, Raghavendra K T wrote:

The hypercall needs to be documented in
Documentation/virtual/kvm/hypercalls.txt.


Yes, Sure 'll document. hypercalls.txt is a new file right?. also I have to document APIs in Documentation/virtual/kvm/api.txt.

Have you tested it on AMD machines?  There are some differences in the
hypercall infrastructure there.

Yes. 'll test on AMD machine and update on that.


  /* This indicates that the new set of kvmclock msrs
   * are available. The use of 0x11 and 0x12 is deprecated
   */
  #define KVM_FEATURE_CLOCKSOURCE2        3
  #define KVM_FEATURE_ASYNC_PF          4
  #define KVM_FEATURE_STEAL_TIME                5
+#define KVM_FEATURE_KICK_VCPU          6

Documentation/virtual/kvm/cpuid.txt.

Yes. 'll do that.



  /* The last 8 bits are used to indicate how to interpret the flags field
   * in pvclock structure. If no bits are set, all flags are ignored.
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index c38efd7..6e1c8b4 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -2103,6 +2103,7 @@ int kvm_dev_ioctl_check_extension(long ext)
        case KVM_CAP_XSAVE:
        case KVM_CAP_ASYNC_PF:
        case KVM_CAP_GET_TSC_KHZ:
+       case KVM_CAP_KICK_VCPU:

This is redundant with the feature bit?  In general, KVM_CAP is for the
host API, while KVM_FEATURE is for the guest API.


No its not. I have to check the flow again. I understood that this completes the guest querying, that checks for KVM_FEATURE availability.
Did I miss something? I need a little deep dive though.


+/*
+ * kvm_pv_kick_cpu_op:  Kick a vcpu.
+ *
+ * @cpu - vcpu to be kicked.
+ */
+static void kvm_pv_kick_cpu_op(struct kvm *kvm, int cpu)
+{
+       struct kvm_vcpu *vcpu = kvm_get_vcpu(kvm, cpu);

There is no guarantee that guest cpu numbers match host vcpu numbers.
Use APIC IDs, and kvm_apic_match_dest().

Okay. I have to dig more on this.


+       struct kvm_mp_state mp_state;
+
+       mp_state.mp_state = KVM_MP_STATE_RUNNABLE;
+       if (vcpu) {
+               vcpu->kicked = 1;
+               /* Ensure kicked is always set before wakeup */
+               barrier();
+       }
+       kvm_arch_vcpu_ioctl_set_mpstate(vcpu,&mp_state);

This must only be called from the vcpu thread.

Hmm. Okay. 'll check this.


+       kvm_vcpu_kick(vcpu);
+}
+

        struct kvm_vcpu_arch arch;
+
+       /*
+        * blocked vcpu wakes up by checking this flag set by unlocker.
+        */
+       int kicked;


Write only variable.

Yes 'll remove comments.


An alternative approach is to use an MSR protocol like x2apic ICR.


'll explore on this too.


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.