Received: by 2002:ac0:950e:0:0:0:0:0 with SMTP id f14csp1347133imc; Sun, 17 Mar 2019 11:15:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqzn7467KRhQgUn9jS85TQ7p2BWDGBTjPKR0ADlWbBI0jOSXsXapGBkiEsq22mwHywOWE7hv X-Received: by 2002:a62:5959:: with SMTP id n86mr15045089pfb.237.1552846537513; Sun, 17 Mar 2019 11:15:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552846537; cv=none; d=google.com; s=arc-20160816; b=tffXEA5AJeLbVw+blwnbnboVUk8glp9yDQrYi9x0lw84GcwFsmg5dZWrqUTPLS5pOZ 8QoLKxHo3mXT62Bu5QpDqZWLqccl8uRUxvs9UzH0+KG1pwKlPLol/umXJjD0iMhCeLB/ ykpxI3zPtMkncpwLwEh00Rsam2mYS9kURjBi49Q4KrkweYplk0hDGFdljXLWdiZqmaMd EZQkR20gqtejWnKbYywPxdVbAoKFbs1ioDNlLMWUKd7COv4/zUj4qlM1PEk9Hyd9NETN EeipfEAP2VKXmT7p+WvPt+06f765BGYLgYorX+k5BsvvqkJvNybHIHplN+nG76k+wyHw 0cGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=pHmmydOdoz/WBRIjTCSK9p7z9jMXtjR+asY9qHgY6BM=; b=TcwriY6yQoVXeqbe4VBJALiqZ3uW6DkSLRNTA4pQfhipPi40If5C+yvbl4lTzmiLwP k54LUv1qdEpgxozMqIolRctcackUkuyXmZC2C/xzrLYphG8QId8bJMq3e8pHRXUt+UPE FI94R2VKI9f9uwrxttbCYjCoTREYD+4/uvTYGadkC2UPBjVgKaa4urGtpuIO4PV+MjF/ cVRV6YcoV2Wqi1qbIpxwH5PUkB7KTjv9h+Cwjr4l4NaLp9RBGei+WujmK3r+YH1vJe46 ycDmwZr68D3sjS7F5cKoMgVZ0SooWOBec94563ySWC6wWdcRy4puAz3ttloSvwHlwdll acjw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d40si7623262pla.114.2019.03.17.11.15.20; Sun, 17 Mar 2019 11:15:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727329AbfCQSFT (ORCPT + 99 others); Sun, 17 Mar 2019 14:05:19 -0400 Received: from mx1.redhat.com ([209.132.183.28]:53124 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725914AbfCQSFT (ORCPT ); Sun, 17 Mar 2019 14:05:19 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 7D2F6C049E38; Sun, 17 Mar 2019 18:05:18 +0000 (UTC) Received: from [10.36.116.102] (ovpn-116-102.ams2.redhat.com [10.36.116.102]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 44D1F1001E6A; Sun, 17 Mar 2019 18:05:12 +0000 (UTC) Subject: Re: [RFC PATCH] KVM: arm/arm64: Enable direct irqfd MSI injection To: "Raslan, KarimAllah" , "marc.zyngier@arm.com" , "yuzenghui@huawei.com" , "christoffer.dall@arm.com" , "andre.przywara@arm.com" Cc: "kvm@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "kvmarm@lists.cs.columbia.edu" , "james.morse@arm.com" , "mst@redhat.com" , "suzuki.poulose@arm.com" , "pbonzini@redhat.com" , "linux-arm-kernel@lists.infradead.org" , "julien.thierry@arm.com" , "rkrcmar@redhat.com" , "wanghaibin.wang@huawei.com" References: <1552833373-19828-1-git-send-email-yuzenghui@huawei.com> <1552834226.19343.1.camel@amazon.de> From: Auger Eric Message-ID: Date: Sun, 17 Mar 2019 19:05:10 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: <1552834226.19343.1.camel@amazon.de> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Sun, 17 Mar 2019 18:05:18 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 3/17/19 3:50 PM, Raslan, KarimAllah wrote: > On Sun, 2019-03-17 at 14:36 +0000, Zenghui Yu wrote: >> Currently, IRQFD on arm still uses the deferred workqueue mechanism >> to inject interrupts into guest, which will likely lead to a busy >> context-switching from/to the kworker thread. This overhead is for >> no purpose (only in my view ...) and will result in an interrupt >> performance degradation. >> >> Implement kvm_arch_set_irq_inatomic() for arm/arm64 to support direct >> irqfd MSI injection, by which we can get rid of the annoying latency. >> As a result, irqfd MSI intensive scenarios (e.g., DPDK with high packet >> processing workloads) will benefit from it. >> >> Signed-off-by: Zenghui Yu >> --- >> >> It seems that only MSI will follow the IRQFD path, did I miss something? >> >> This patch is still under test and sent out for early feedback. If I have >> any mis-understanding, please fix me up and let me know. Thanks! >> >> --- >> virt/kvm/arm/vgic/trace.h | 22 ++++++++++++++++++++++ >> virt/kvm/arm/vgic/vgic-irqfd.c | 21 +++++++++++++++++++++ >> 2 files changed, 43 insertions(+) >> >> diff --git a/virt/kvm/arm/vgic/trace.h b/virt/kvm/arm/vgic/trace.h >> index 55fed77..bc1f4db 100644 >> --- a/virt/kvm/arm/vgic/trace.h >> +++ b/virt/kvm/arm/vgic/trace.h >> @@ -27,6 +27,28 @@ >> __entry->vcpu_id, __entry->irq, __entry->level) >> ); >> >> +TRACE_EVENT(kvm_arch_set_irq_inatomic, >> + TP_PROTO(u32 gsi, u32 type, int level, int irq_source_id), >> + TP_ARGS(gsi, type, level, irq_source_id), >> + >> + TP_STRUCT__entry( >> + __field( u32, gsi ) >> + __field( u32, type ) >> + __field( int, level ) >> + __field( int, irq_source_id ) >> + ), >> + >> + TP_fast_assign( >> + __entry->gsi = gsi; >> + __entry->type = type; >> + __entry->level = level; >> + __entry->irq_source_id = irq_source_id; >> + ), >> + >> + TP_printk("gsi %u type %u level %d source %d", __entry->gsi, >> + __entry->type, __entry->level, __entry->irq_source_id) >> +); >> + >> #endif /* _TRACE_VGIC_H */ >> >> #undef TRACE_INCLUDE_PATH >> diff --git a/virt/kvm/arm/vgic/vgic-irqfd.c b/virt/kvm/arm/vgic/vgic-irqfd.c >> index 99e026d..4cfc3f4 100644 >> --- a/virt/kvm/arm/vgic/vgic-irqfd.c >> +++ b/virt/kvm/arm/vgic/vgic-irqfd.c >> @@ -19,6 +19,7 @@ >> #include >> #include >> #include "vgic.h" >> +#include "trace.h" >> >> /** >> * vgic_irqfd_set_irq: inject the IRQ corresponding to the >> @@ -105,6 +106,26 @@ int kvm_set_msi(struct kvm_kernel_irq_routing_entry *e, >> return vgic_its_inject_msi(kvm, &msi); >> } >> >> +/** >> + * kvm_arch_set_irq_inatomic: fast-path for irqfd injection >> + * >> + * Currently only direct MSI injecton is supported. >> + */ >> +int kvm_arch_set_irq_inatomic(struct kvm_kernel_irq_routing_entry *e, >> + struct kvm *kvm, int irq_source_id, int level, >> + bool line_status) >> +{ >> + int ret; >> + >> + trace_kvm_arch_set_irq_inatomic(e->gsi, e->type, level, irq_source_id); >> + >> + if (unlikely(e->type != KVM_IRQ_ROUTING_MSI)) >> + return -EWOULDBLOCK; >> + >> + ret = kvm_set_msi(e, kvm, irq_source_id, level, line_status); > > The implementation of kvm_set_msi is not atomic. There is a mutex held in one > of the execution paths. That is why it can not be used directly in this atomic  > context. Yep, vgic_its_trigger_msi call is protected by the its->its_lock. Thanks Eric > >> + return ret; >> +} >> + >> int kvm_vgic_setup_default_irq_routing(struct kvm *kvm) >> { >> struct kvm_irq_routing_entry *entries; > > > > Amazon Development Center Germany GmbH > Krausenstr. 38 > 10117 Berlin > Geschaeftsfuehrer: Christian Schlaeger, Ralf Herbrich > Ust-ID: DE 289 237 879 > Eingetragen am Amtsgericht Charlottenburg HRB 149173 B >