diff mbox

kvm: don't register smram_listener when smm is off

Message ID 1495865408-13848-1-git-send-email-arei.gonglei@huawei.com
State New
Headers show

Commit Message

Gonglei (Arei) May 27, 2017, 6:10 a.m. UTC
If the user set disable smm by '-machine smm=off', we
should not register smram_listener so that we can
avoid waster memory in kvm since the added sencond
address space.

Meanwhile we should assign value of the global kvm_state
before invoking the kvm_arch_init(), because
pc_machine_is_smm_enabled() may use it by kvm_has_mm().

Signed-off-by: Gonglei <arei.gonglei@huawei.com>
---
 kvm-all.c         | 4 ++--
 target/i386/kvm.c | 3 ++-
 2 files changed, 4 insertions(+), 3 deletions(-)

Comments

Gonglei (Arei) May 31, 2017, 9:36 a.m. UTC | #1
Soft ping... :)



Regards,
-Gonglei


> -----Original Message-----
> From: Gonglei (Arei)
> Sent: Saturday, May 27, 2017 2:10 PM
> To: qemu-devel@nongnu.org
> Cc: pbonzini@redhat.com; Yechuan; Gonglei (Arei)
> Subject: [PATCH] kvm: don't register smram_listener when smm is off
> 
> If the user set disable smm by '-machine smm=off', we
> should not register smram_listener so that we can
> avoid waster memory in kvm since the added sencond
> address space.
> 
> Meanwhile we should assign value of the global kvm_state
> before invoking the kvm_arch_init(), because
> pc_machine_is_smm_enabled() may use it by kvm_has_mm().
> 
> Signed-off-by: Gonglei <arei.gonglei@huawei.com>
> ---
>  kvm-all.c         | 4 ++--
>  target/i386/kvm.c | 3 ++-
>  2 files changed, 4 insertions(+), 3 deletions(-)
> 
> diff --git a/kvm-all.c b/kvm-all.c
> index 90b8573..92bdf2c 100644
> --- a/kvm-all.c
> +++ b/kvm-all.c
> @@ -1746,6 +1746,8 @@ static int kvm_init(MachineState *ms)
>      kvm_ioeventfd_any_length_allowed =
>          (kvm_check_extension(s, KVM_CAP_IOEVENTFD_ANY_LENGTH) >
> 0);
> 
> +    kvm_state = s;
> +
>      ret = kvm_arch_init(ms, s);
>      if (ret < 0) {
>          goto err;
> @@ -1755,8 +1757,6 @@ static int kvm_init(MachineState *ms)
>          kvm_irqchip_create(ms, s);
>      }
> 
> -    kvm_state = s;
> -
>      if (kvm_eventfds_allowed) {
>          s->memory_listener.listener.eventfd_add =
> kvm_mem_ioeventfd_add;
>          s->memory_listener.listener.eventfd_del =
> kvm_mem_ioeventfd_del;
> diff --git a/target/i386/kvm.c b/target/i386/kvm.c
> index 011d4a5..cb5b47e 100644
> --- a/target/i386/kvm.c
> +++ b/target/i386/kvm.c
> @@ -1254,7 +1254,8 @@ int kvm_arch_init(MachineState *ms, KVMState *s)
>          }
>      }
> 
> -    if (kvm_check_extension(s, KVM_CAP_X86_SMM)) {
> +    if (kvm_check_extension(s, KVM_CAP_X86_SMM) &&
> +            pc_machine_is_smm_enabled(PC_MACHINE(ms))) {
>          smram_machine_done.notify = register_smram_listener;
>          qemu_add_machine_init_done_notifier(&smram_machine_done);
>      }
> --
> 1.8.3.1
>
Paolo Bonzini June 1, 2017, 10:04 a.m. UTC | #2
On 27/05/2017 08:10, Gonglei wrote:
> If the user set disable smm by '-machine smm=off', we
> should not register smram_listener so that we can
> avoid waster memory in kvm since the added sencond
> address space.
> 
> Meanwhile we should assign value of the global kvm_state
> before invoking the kvm_arch_init(), because
> pc_machine_is_smm_enabled() may use it by kvm_has_mm().
> 
> Signed-off-by: Gonglei <arei.gonglei@huawei.com>
> ---
>  kvm-all.c         | 4 ++--
>  target/i386/kvm.c | 3 ++-
>  2 files changed, 4 insertions(+), 3 deletions(-)
> 
> diff --git a/kvm-all.c b/kvm-all.c
> index 90b8573..92bdf2c 100644
> --- a/kvm-all.c
> +++ b/kvm-all.c
> @@ -1746,6 +1746,8 @@ static int kvm_init(MachineState *ms)
>      kvm_ioeventfd_any_length_allowed =
>          (kvm_check_extension(s, KVM_CAP_IOEVENTFD_ANY_LENGTH) > 0);
>  
> +    kvm_state = s;
> +
>      ret = kvm_arch_init(ms, s);
>      if (ret < 0) {
>          goto err;
> @@ -1755,8 +1757,6 @@ static int kvm_init(MachineState *ms)
>          kvm_irqchip_create(ms, s);
>      }
>  
> -    kvm_state = s;
> -
>      if (kvm_eventfds_allowed) {
>          s->memory_listener.listener.eventfd_add = kvm_mem_ioeventfd_add;
>          s->memory_listener.listener.eventfd_del = kvm_mem_ioeventfd_del;
> diff --git a/target/i386/kvm.c b/target/i386/kvm.c
> index 011d4a5..cb5b47e 100644
> --- a/target/i386/kvm.c
> +++ b/target/i386/kvm.c
> @@ -1254,7 +1254,8 @@ int kvm_arch_init(MachineState *ms, KVMState *s)
>          }
>      }
>  
> -    if (kvm_check_extension(s, KVM_CAP_X86_SMM)) {
> +    if (kvm_check_extension(s, KVM_CAP_X86_SMM) &&
> +            pc_machine_is_smm_enabled(PC_MACHINE(ms))) {
>          smram_machine_done.notify = register_smram_listener;
>          qemu_add_machine_init_done_notifier(&smram_machine_done);
>      }
> 

I think this breaks

    x86_64-softmmu/qemu-system-x86_64 -M none -S --enable-kvm

You need to do a object_dynamic_cast before invoking PC_MACHINE(ms).

Thanks,

Paolo
Gonglei (Arei) June 1, 2017, 11:31 a.m. UTC | #3
> -----Original Message-----

> From: Paolo Bonzini [mailto:pbonzini@redhat.com]

> Sent: Thursday, June 01, 2017 6:04 PM

> To: Gonglei (Arei); qemu-devel@nongnu.org

> Cc: Yechuan

> Subject: Re: [PATCH] kvm: don't register smram_listener when smm is off

> 

> 

> 

> On 27/05/2017 08:10, Gonglei wrote:

> > If the user set disable smm by '-machine smm=off', we

> > should not register smram_listener so that we can

> > avoid waster memory in kvm since the added sencond

> > address space.

> >

> > Meanwhile we should assign value of the global kvm_state

> > before invoking the kvm_arch_init(), because

> > pc_machine_is_smm_enabled() may use it by kvm_has_mm().

> >

> > Signed-off-by: Gonglei <arei.gonglei@huawei.com>

> > ---

> >  kvm-all.c         | 4 ++--

> >  target/i386/kvm.c | 3 ++-

> >  2 files changed, 4 insertions(+), 3 deletions(-)

> >

> > diff --git a/kvm-all.c b/kvm-all.c

> > index 90b8573..92bdf2c 100644

> > --- a/kvm-all.c

> > +++ b/kvm-all.c

> > @@ -1746,6 +1746,8 @@ static int kvm_init(MachineState *ms)

> >      kvm_ioeventfd_any_length_allowed =

> >          (kvm_check_extension(s, KVM_CAP_IOEVENTFD_ANY_LENGTH) >

> 0);

> >

> > +    kvm_state = s;

> > +

> >      ret = kvm_arch_init(ms, s);

> >      if (ret < 0) {

> >          goto err;

> > @@ -1755,8 +1757,6 @@ static int kvm_init(MachineState *ms)

> >          kvm_irqchip_create(ms, s);

> >      }

> >

> > -    kvm_state = s;

> > -

> >      if (kvm_eventfds_allowed) {

> >          s->memory_listener.listener.eventfd_add =

> kvm_mem_ioeventfd_add;

> >          s->memory_listener.listener.eventfd_del =

> kvm_mem_ioeventfd_del;

> > diff --git a/target/i386/kvm.c b/target/i386/kvm.c

> > index 011d4a5..cb5b47e 100644

> > --- a/target/i386/kvm.c

> > +++ b/target/i386/kvm.c

> > @@ -1254,7 +1254,8 @@ int kvm_arch_init(MachineState *ms, KVMState

> *s)

> >          }

> >      }

> >

> > -    if (kvm_check_extension(s, KVM_CAP_X86_SMM)) {

> > +    if (kvm_check_extension(s, KVM_CAP_X86_SMM) &&

> > +            pc_machine_is_smm_enabled(PC_MACHINE(ms))) {

> >          smram_machine_done.notify = register_smram_listener;

> >

> qemu_add_machine_init_done_notifier(&smram_machine_done);

> >      }

> >

> 

> I think this breaks

> 

>     x86_64-softmmu/qemu-system-x86_64 -M none -S --enable-kvm

> 

> You need to do a object_dynamic_cast before invoking PC_MACHINE(ms).

> 

Good catch! V2 will be posted soon.

Thanks,
-Gonglei
diff mbox

Patch

diff --git a/kvm-all.c b/kvm-all.c
index 90b8573..92bdf2c 100644
--- a/kvm-all.c
+++ b/kvm-all.c
@@ -1746,6 +1746,8 @@  static int kvm_init(MachineState *ms)
     kvm_ioeventfd_any_length_allowed =
         (kvm_check_extension(s, KVM_CAP_IOEVENTFD_ANY_LENGTH) > 0);
 
+    kvm_state = s;
+
     ret = kvm_arch_init(ms, s);
     if (ret < 0) {
         goto err;
@@ -1755,8 +1757,6 @@  static int kvm_init(MachineState *ms)
         kvm_irqchip_create(ms, s);
     }
 
-    kvm_state = s;
-
     if (kvm_eventfds_allowed) {
         s->memory_listener.listener.eventfd_add = kvm_mem_ioeventfd_add;
         s->memory_listener.listener.eventfd_del = kvm_mem_ioeventfd_del;
diff --git a/target/i386/kvm.c b/target/i386/kvm.c
index 011d4a5..cb5b47e 100644
--- a/target/i386/kvm.c
+++ b/target/i386/kvm.c
@@ -1254,7 +1254,8 @@  int kvm_arch_init(MachineState *ms, KVMState *s)
         }
     }
 
-    if (kvm_check_extension(s, KVM_CAP_X86_SMM)) {
+    if (kvm_check_extension(s, KVM_CAP_X86_SMM) &&
+            pc_machine_is_smm_enabled(PC_MACHINE(ms))) {
         smram_machine_done.notify = register_smram_listener;
         qemu_add_machine_init_done_notifier(&smram_machine_done);
     }