Received: by 10.223.176.5 with SMTP id f5csp2187447wra; Sun, 4 Feb 2018 23:00:44 -0800 (PST) X-Google-Smtp-Source: AH8x226N/sM8il1JU9Cm5ezzsEnr2mfb03+IH3RdYnbEy4slfeScpmkg18TzAraGlcSh+EDw5fPK X-Received: by 10.98.172.7 with SMTP id v7mr8022022pfe.66.1517814044393; Sun, 04 Feb 2018 23:00:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517814044; cv=none; d=google.com; s=arc-20160816; b=NTFji/tWShJRWDWA1uJLE8rBIQmG5TErP3NYeCpUUduXfA3J+iie5i25MEBV7iBCnG RQ6rzkzrrBkTSSJlMHcfedDJfsIk+ICXIqn5JWMEZDWwXEuGg57nG/KqIk/aFbcwMyUv 35bf3jTVkkes0bk3RXWzgwWn4kFDxmpnw70R4i/P0BdqDzFhqqczZWpr5B1mvPpEp6RU 2e77MvNK6X6HrSAPpYw2nQBPnsX+qfGgm18sveIVnUD1+W5sfJbuv+78jLxhF/P3azU1 lWsInv9iOUj00/KqqLDIU/ajn8eShyNWjxu0HSpfAZxsW1J4eJkD6Eqi/BwwREhtTakn k1ZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=IIDgXQkrrcSMvvaOaaiM49aolgoCRWoumjojKzTaoVY=; b=Hc0gUyZX/556vbGro+oQ1xFpr/PbAVmhWlx/DTeP7vv445lvUcCktZR+RIb4BXmFJ4 /aFQ26PT/i1VhUwWQeABQkalScPNKUqc25F2KLB93w+pTLF6tG+zMFs9SfA/ackEnXm/ OXvUkhUTIe5MsyuSk5x164U0gdwRhn1yEZYAUcdQ98e/MmqrnYoPkGY4a7xN6JH4J+WI jM8AjZLjKpg1BOBZFvFXCjV66TTbWQshxTUK+26LbT3OL141FoOCxZqPDo1LPBEwUZ4O 16EoXtAwLG4YLV13Iuqc9/2F519ilsyZp7Ssw1L6Z0/Ves6cvRuhocUWw0UNuDxlgisW YC0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=IrFry1ZG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v1-v6si278471plb.466.2018.02.04.23.00.29; Sun, 04 Feb 2018 23:00:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=IrFry1ZG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752603AbeBEG6z (ORCPT + 99 others); Mon, 5 Feb 2018 01:58:55 -0500 Received: from mail-it0-f65.google.com ([209.85.214.65]:34775 "EHLO mail-it0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750949AbeBEG6r (ORCPT ); Mon, 5 Feb 2018 01:58:47 -0500 Received: by mail-it0-f65.google.com with SMTP id j21-v6so7176208ita.1; Sun, 04 Feb 2018 22:58:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=IIDgXQkrrcSMvvaOaaiM49aolgoCRWoumjojKzTaoVY=; b=IrFry1ZGJCXN2bHXfaBbi6tRSpIG9yLW96zlK4T96ZsUAV1qyRScGbZOJS/s9cwo2u xjIZ49U04+uLTa9UZY2gtjCpO29u2VHcVBe6jR79IjA58S6qeJ6IGOWIw/wjMMAOlGaI hr/qK3k9Dme1UfiVvRhR1QUgaNR/+ZiAj5CiVLJMJafDIr23rcZlK4xoOBPbyirLANcA Bg4PT760fQoEcUvb80lS5DZ3S6PSGqVPvKP7qPKYToytgUes+DlBLNSp38mVEptGtUM1 +xHmcokcRwN2L/+N/83oi7PxtqJY+fU8N687B1eqjvw8JhwHc34Jqo6wBTwx2Fz2RBg9 Y5SA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=IIDgXQkrrcSMvvaOaaiM49aolgoCRWoumjojKzTaoVY=; b=ZumkkJhjiiI6+xknyRyQldvHKfHfnY1MpuvCOot6fA9/aEH2dD6cx2lKzY8q1u3ugE yKqh+7RyVNH7vwMtcTtQhx1wRXfcZLAbkDcYqDGVSsDhzQK/vyajjT8p2NzVWSZpdpAR dkfayWpBYrveHl2HBlKtrz27eZX/lgvQOuVd4N2RtF0lHugAZV0Y/MsmyX58rrmLaPso QTcIbtw8FUzMKLZ/xN/8f+kzmoVmH1t25UQw0iUIcw4ahdakZaHkIgSBk7gbOcTdr31N O610tKumcvfEhF8cWR3+1fFE8BjUJ2/2kPUwEuGgIRoUDHO3QldQVETuhAz0lP8KjxdO vTXQ== X-Gm-Message-State: APf1xPC6qkDTbbOVxvvpXHVXP11IfNTF8tT5H+Ww2vmd8a8ZeTp1kQCy CJivUSut42uMtg0FQp9UvYIc8w== X-Received: by 10.36.213.212 with SMTP id a203mr7707484itg.86.1517813926760; Sun, 04 Feb 2018 22:58:46 -0800 (PST) Received: from localhost.localdomain ([203.205.141.123]) by smtp.googlemail.com with ESMTPSA id w132sm5096424iow.51.2018.02.04.22.58.44 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sun, 04 Feb 2018 22:58:46 -0800 (PST) From: Wanpeng Li X-Google-Original-From: Wanpeng Li To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= Subject: [PATCH v2 1/2] KVM: X86: Add per-VM no-HLT-exiting capability Date: Sun, 4 Feb 2018 22:57:57 -0800 Message-Id: <1517813878-22248-1-git-send-email-wanpengli@tencent.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Wanpeng Li If host CPUs are dedicated to a VM, we can avoid VM exits on HLT. This patch adds the per-VM non-HLT-exiting capability. Cc: Paolo Bonzini Cc: Radim Krčmář Signed-off-by: Wanpeng Li --- v1 -> v2: * vmx_clear_hlt() around INIT handling * vmx_clear_hlt() upon SMI and implement auto halt restart Documentation/virtual/kvm/api.txt | 11 +++++++++++ arch/x86/include/asm/kvm_emulate.h | 1 + arch/x86/include/asm/kvm_host.h | 7 +++++++ arch/x86/kvm/emulate.c | 2 ++ arch/x86/kvm/vmx.c | 38 ++++++++++++++++++++++++++++++++++++++ arch/x86/kvm/x86.c | 27 +++++++++++++++++++++++---- arch/x86/kvm/x86.h | 5 +++++ include/uapi/linux/kvm.h | 1 + 8 files changed, 88 insertions(+), 4 deletions(-) diff --git a/Documentation/virtual/kvm/api.txt b/Documentation/virtual/kvm/api.txt index 023da07..865b029 100644 --- a/Documentation/virtual/kvm/api.txt +++ b/Documentation/virtual/kvm/api.txt @@ -4302,6 +4302,17 @@ enables QEMU to build error log and branch to guest kernel registered machine check handling routine. Without this capability KVM will branch to guests' 0x200 interrupt vector. +7.13 KVM_CAP_X86_GUEST_HLT + +Architectures: x86 +Parameters: none +Returns: 0 on success + +This capability indicates that a guest using HLT to stop a virtual CPU +will not cause a VM exit. As such, time spent while a virtual CPU is +halted in this way will then be accounted for as guest running time on +the host, KVM_FEATURE_PV_UNHALT should be disabled. + 8. Other capabilities. ---------------------- diff --git a/arch/x86/include/asm/kvm_emulate.h b/arch/x86/include/asm/kvm_emulate.h index b24b1c8..78cfe8ca 100644 --- a/arch/x86/include/asm/kvm_emulate.h +++ b/arch/x86/include/asm/kvm_emulate.h @@ -225,6 +225,7 @@ struct x86_emulate_ops { unsigned (*get_hflags)(struct x86_emulate_ctxt *ctxt); void (*set_hflags)(struct x86_emulate_ctxt *ctxt, unsigned hflags); int (*pre_leave_smm)(struct x86_emulate_ctxt *ctxt, u64 smbase); + void (*smm_auto_halt_restart)(struct x86_emulate_ctxt *ctxt); }; diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h index 8f0f09a..95b2c44 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h @@ -623,6 +623,11 @@ struct kvm_vcpu_arch { unsigned nmi_pending; /* NMI queued after currently running handler */ bool nmi_injected; /* Trying to inject an NMI this entry */ bool smi_pending; /* SMI queued after currently running handler */ + /* + * bit 0 is set if Value of Auto HALT Restart after Entry to SMM is true + * bit 1 is set if Value of Auto HALT Restart When Exiting SMM is true + */ + int smm_auto_halt_restart; struct kvm_mtrr mtrr_state; u64 pat; @@ -806,6 +811,8 @@ struct kvm_arch { gpa_t wall_clock; + bool hlt_in_guest; + bool ept_identity_pagetable_done; gpa_t ept_identity_map_addr; diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index d91eaeb..ee5bc65 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@ -2597,6 +2597,8 @@ static int em_rsm(struct x86_emulate_ctxt *ctxt) smbase = ctxt->ops->get_smbase(ctxt); + if (GET_SMSTATE(u16, smbase, 0x7f02) & 0x1) + ctxt->ops->smm_auto_halt_restart(ctxt); /* * Give pre_leave_smm() a chance to make ISA-specific changes to the * vCPU state (e.g. enter guest mode) before loading state from the SMM diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 3e71086..23789c9 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -2474,6 +2474,24 @@ static int nested_vmx_check_exception(struct kvm_vcpu *vcpu, unsigned long *exit return 0; } +static bool vmx_need_clear_hlt(struct kvm_vcpu *vcpu) +{ + return kvm_hlt_in_guest(vcpu->kvm) && + vmcs_read32(GUEST_ACTIVITY_STATE) == GUEST_ACTIVITY_HLT; +} + +static void vmx_clear_hlt(struct kvm_vcpu *vcpu) +{ + /* + * Ensure that we clear the HLT state in the VMCS. We don't need to + * explicitly skip the instruction because if the HLT state is set, + * then the instruction is already executing and RIP has already been + * advanced. + */ + if (vmx_need_clear_hlt(vcpu)) + vmcs_write32(GUEST_ACTIVITY_STATE, GUEST_ACTIVITY_ACTIVE); +} + static void vmx_queue_exception(struct kvm_vcpu *vcpu) { struct vcpu_vmx *vmx = to_vmx(vcpu); @@ -2504,6 +2522,8 @@ static void vmx_queue_exception(struct kvm_vcpu *vcpu) intr_info |= INTR_TYPE_HARD_EXCEPTION; vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); + + vmx_clear_hlt(vcpu); } static bool vmx_rdtscp_supported(void) @@ -5359,6 +5379,8 @@ static u32 vmx_exec_control(struct vcpu_vmx *vmx) exec_control |= CPU_BASED_CR3_STORE_EXITING | CPU_BASED_CR3_LOAD_EXITING | CPU_BASED_INVLPG_EXITING; + if (kvm_hlt_in_guest(vmx->vcpu.kvm)) + exec_control &= ~CPU_BASED_HLT_EXITING; return exec_control; } @@ -5716,6 +5738,8 @@ static void vmx_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event) update_exception_bitmap(vcpu); vpid_sync_context(vmx->vpid); + if (init_event) + vmx_clear_hlt(vcpu); } /* @@ -5787,6 +5811,8 @@ static void vmx_inject_irq(struct kvm_vcpu *vcpu) } else intr |= INTR_TYPE_EXT_INTR; vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr); + + vmx_clear_hlt(vcpu); } static void vmx_inject_nmi(struct kvm_vcpu *vcpu) @@ -5817,6 +5843,8 @@ static void vmx_inject_nmi(struct kvm_vcpu *vcpu) vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, INTR_TYPE_NMI_INTR | INTR_INFO_VALID_MASK | NMI_VECTOR); + + vmx_clear_hlt(vcpu); } static bool vmx_get_nmi_mask(struct kvm_vcpu *vcpu) @@ -12048,6 +12076,10 @@ static int vmx_pre_enter_smm(struct kvm_vcpu *vcpu, char *smstate) vmx->nested.smm.vmxon = vmx->nested.vmxon; vmx->nested.vmxon = false; + if (vmx_need_clear_hlt(vcpu)) { + vmcs_write32(GUEST_ACTIVITY_STATE, GUEST_ACTIVITY_ACTIVE); + vcpu->arch.smm_auto_halt_restart = 0x1; + } return 0; } @@ -12056,6 +12088,12 @@ static int vmx_pre_leave_smm(struct kvm_vcpu *vcpu, u64 smbase) struct vcpu_vmx *vmx = to_vmx(vcpu); int ret; + if (vcpu->arch.smm_auto_halt_restart & 0x3) + vmcs_write32(GUEST_ACTIVITY_STATE, GUEST_ACTIVITY_HLT); + else if (vcpu->arch.smm_auto_halt_restart & 0x1) + skip_emulated_instruction(vcpu); + vcpu->arch.smm_auto_halt_restart = 0; + if (vmx->nested.smm.vmxon) { vmx->nested.vmxon = true; vmx->nested.smm.vmxon = false; diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 05dbdba..1bdfdcf 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -2785,6 +2785,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) case KVM_CAP_SET_BOOT_CPU_ID: case KVM_CAP_SPLIT_IRQCHIP: case KVM_CAP_IMMEDIATE_EXIT: + case KVM_CAP_X86_GUEST_HLT: r = 1; break; case KVM_CAP_ADJUST_CLOCK: @@ -4106,6 +4107,10 @@ static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, r = 0; break; + case KVM_CAP_X86_GUEST_HLT: + kvm->arch.hlt_in_guest = cap->args[0]; + r = 0; + break; default: r = -EINVAL; break; @@ -5417,6 +5422,11 @@ static int emulator_pre_leave_smm(struct x86_emulate_ctxt *ctxt, u64 smbase) return kvm_x86_ops->pre_leave_smm(emul_to_vcpu(ctxt), smbase); } +static void emulator_smm_auto_halt_restart(struct x86_emulate_ctxt *ctxt) +{ + emul_to_vcpu(ctxt)->arch.smm_auto_halt_restart = 0x2; +} + static const struct x86_emulate_ops emulate_ops = { .read_gpr = emulator_read_gpr, .write_gpr = emulator_write_gpr, @@ -5457,6 +5467,7 @@ static const struct x86_emulate_ops emulate_ops = { .get_hflags = emulator_get_hflags, .set_hflags = emulator_set_hflags, .pre_leave_smm = emulator_pre_leave_smm, + .smm_auto_halt_restart = emulator_smm_auto_halt_restart, }; static void toggle_interruptibility(struct kvm_vcpu *vcpu, u32 mask) @@ -6757,6 +6768,9 @@ static void enter_smm_save_state_32(struct kvm_vcpu *vcpu, char *buf) put_smstate(u32, buf, 0x7f14, kvm_read_cr4(vcpu)); + if (vcpu->arch.smm_auto_halt_restart) + put_smstate(u16, buf, 0x7f02, 0x1); + /* revision id */ put_smstate(u32, buf, 0x7efc, 0x00020000); put_smstate(u32, buf, 0x7ef8, vcpu->arch.smbase); @@ -6785,6 +6799,9 @@ static void enter_smm_save_state_64(struct kvm_vcpu *vcpu, char *buf) put_smstate(u64, buf, 0x7f50, kvm_read_cr3(vcpu)); put_smstate(u64, buf, 0x7f48, kvm_read_cr4(vcpu)); + if (vcpu->arch.smm_auto_halt_restart) + put_smstate(u16, buf, 0x7f02, 0x1); + put_smstate(u32, buf, 0x7f00, vcpu->arch.smbase); /* revision id */ @@ -6828,10 +6845,6 @@ static void enter_smm(struct kvm_vcpu *vcpu) trace_kvm_enter_smm(vcpu->vcpu_id, vcpu->arch.smbase, true); memset(buf, 0, 512); - if (guest_cpuid_has(vcpu, X86_FEATURE_LM)) - enter_smm_save_state_64(vcpu, buf); - else - enter_smm_save_state_32(vcpu, buf); /* * Give pre_enter_smm() a chance to make ISA-specific changes to the @@ -6840,6 +6853,11 @@ static void enter_smm(struct kvm_vcpu *vcpu) */ kvm_x86_ops->pre_enter_smm(vcpu, buf); + if (guest_cpuid_has(vcpu, X86_FEATURE_LM)) + enter_smm_save_state_64(vcpu, buf); + else + enter_smm_save_state_32(vcpu, buf); + vcpu->arch.hflags |= HF_SMM_MASK; kvm_vcpu_write_guest(vcpu, vcpu->arch.smbase + 0xfe00, buf, sizeof(buf)); @@ -8029,6 +8047,7 @@ void kvm_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event) vcpu->arch.smi_pending = 0; vcpu->arch.smi_count = 0; + vcpu->arch.smm_auto_halt_restart = 0; atomic_set(&vcpu->arch.nmi_queued, 0); vcpu->arch.nmi_pending = 0; vcpu->arch.nmi_injected = false; diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h index b91215d..96fe84e 100644 --- a/arch/x86/kvm/x86.h +++ b/arch/x86/kvm/x86.h @@ -270,4 +270,9 @@ static inline bool kvm_mwait_in_guest(void) !boot_cpu_has_bug(X86_BUG_MONITOR); } +static inline bool kvm_hlt_in_guest(struct kvm *kvm) +{ + return kvm->arch.hlt_in_guest; +} + #endif diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index ed5fb32..1a2b2da 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -935,6 +935,7 @@ struct kvm_ppc_resize_hpt { #define KVM_CAP_PPC_GET_CPU_CHAR 151 #define KVM_CAP_S390_BPB 152 #define KVM_CAP_HYPERV_EVENTFD 153 +#define KVM_CAP_X86_GUEST_HLT 154 #ifdef KVM_CAP_IRQ_ROUTING -- 2.7.4