Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp187442ybc; Mon, 18 Nov 2019 23:04:11 -0800 (PST) X-Google-Smtp-Source: APXvYqzi/6PmG0ttvIrq3yFDc4M8MJ/jrffq15shhJpSJlaOKfkImQm7sJpOFeyRM/Qa8gzED9nI X-Received: by 2002:a17:906:f18b:: with SMTP id gs11mr2248396ejb.2.1574147051389; Mon, 18 Nov 2019 23:04:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574147051; cv=none; d=google.com; s=arc-20160816; b=h7NzpW4Tg2t/H45XeKU9J09CxMfxk0g39+pbRg6X96oGckNvD4JhKe3UWlJBbazRUo jQEhmTGjLFOw1q3itfhq9CSmyxLDEg7LEjeDFe9MhInsLpHKuLJBusdM1t0aV/jqwmjb SRqgEyQRGYZIxVUtM8VX0oE/tVxwIH5ItaXBxGVWVFhcoYyZsU7b6StJwKiYpbKxz+8q rw/xiE2j6WRQmQlHLtQpn0vICZ+Cj+O1lYhl6zHIAjzYjmLNzbufQNHVWDCand77kO1e afHcO2jb6G0Aw9BRmw/mDwjjfArYyrAjUYbgCNqsgKmq498xdC1ZZV0TRH/q08qASdvs e5iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=qz77BFNx7Mzy/MD1o3YVo9rJMBCL9I3q5BZGdkzee6E=; b=w2vc5zQnobQuDemFB+2nKbJtPoCPb7bmeVEJnNUUA0GO17/A1W0fFaEh1YlH+3MB5t pTjCdiSQsvHDYp9OWsSElsl08v2Ls8D7GyJbqNbTmuw9N8PHgI3tD+D20/2irkDUC86K xuVbghfdjNct41H2T9ZhlNRnGZrYt9kG/Q/2qV0pEXLHIXDc7g5KXuULyKTA7p8Tr3g0 IyrrfbuX2SmT8jchiEdHOHvYYWJ+8RmoyzqCF88vBHwEoH+M5w3dhOQNRtQTZLbILCHn LxLqFXmVUeLfTgzFwTqpiOIC/7SMX57eJDp/M3FRLfLT69ULiGa7tED9CiLF/KtYYGPX H6pA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ft+p6Pvx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bs2si13832371edb.354.2019.11.18.23.03.46; Mon, 18 Nov 2019 23:04:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ft+p6Pvx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727237AbfKSHBz (ORCPT + 99 others); Tue, 19 Nov 2019 02:01:55 -0500 Received: from mail-oi1-f195.google.com ([209.85.167.195]:43680 "EHLO mail-oi1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725878AbfKSHBy (ORCPT ); Tue, 19 Nov 2019 02:01:54 -0500 Received: by mail-oi1-f195.google.com with SMTP id l20so17900402oie.10; Mon, 18 Nov 2019 23:01:54 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qz77BFNx7Mzy/MD1o3YVo9rJMBCL9I3q5BZGdkzee6E=; b=ft+p6PvxpkSpqyVCfKBkwoJ9cWG+lIgZDlW4rBbYsNdr/my6ZIlaxRNhEawqAOx24E JU2bg5u8gnVxdGZmJlE0h2iYcEccL1YM5MAdvz1/30irCnM5CnWS/XvMC+igIQPIf9zD 3IG4Wy6Wrss1w+MARmW437uRb8gDXPKxtO9NQvDpEeuy1AGu/MhZvtrWq1tGb6d51+Ts KWOzkPl3VYVC7GPcfnYbxEP6036+OIugWfRvP1AmqUvppEGo20h+7rwiTCPgLC2jJ77I D0EmrbS9yKHXawP+2gtee8WPxFYiRZpDaIWu2E+EXu1Kjgahx/euS/f1iXMxf89iHBZE 1qmQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qz77BFNx7Mzy/MD1o3YVo9rJMBCL9I3q5BZGdkzee6E=; b=SlAAS7N1bzc9Gb/7ewXsSk3Xmn0FVy5piY82nbsIY6yjZ/+c0VDFu5S1bhFvXaY37h v7L3SnscZUumlxAYJ845S/DoeauwkGVACTbNm6o8azCwES4UNSEPZYsGe306TUQdsrlJ BSp4BNPjB2iFpFYlDpeF+HNVVGbEXsJQ7Q4avEcNwwj+yYGu+JIu/c5L/E4tTOSZQUtO qG83KlLkfDvx96N73afELmUfaudxTlPmDLYBeqTxnrmU6I5tWZTkFUFZzyolFZhvj2/V +QzSegIDsq2M9AVZLKHWO4vtRs94fDXOIpEHu7uETTlvxPwFpRnwcCk+D2MBJxAyMxqj BvRA== X-Gm-Message-State: APjAAAUPn3hgtkP/GB0FlPWKdTLI6SHe10xNgNOqDxXKd8+arqugNEna gNFzKL9pPiQgB+avdn5zJspzrdfTtXRDMdMOkCo= X-Received: by 2002:aca:5015:: with SMTP id e21mr2814500oib.174.1574146913825; Mon, 18 Nov 2019 23:01:53 -0800 (PST) MIME-Version: 1.0 References: <1571829384-5309-1-git-send-email-zhenzhong.duan@oracle.com> <1571829384-5309-4-git-send-email-zhenzhong.duan@oracle.com> In-Reply-To: <1571829384-5309-4-git-send-email-zhenzhong.duan@oracle.com> From: Wanpeng Li Date: Tue, 19 Nov 2019 15:01:45 +0800 Message-ID: Subject: Re: [PATCH v8 3/5] x86/kvm: Add "nopvspin" parameter to disable PV spinlocks To: Zhenzhong Duan Cc: LKML , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "the arch/x86 maintainers" , Paolo Bonzini , Radim Krcmar , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Boris Ostrovsky , Juergen Gross , Peter Zijlstra , will@kernel.org, linux-hyperv@vger.kernel.org, kvm , mikelley@microsoft.com, "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Sasha Levin , Jonathan Corbet , "H. Peter Anvin" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 23 Oct 2019 at 19:21, Zhenzhong Duan wrote: > > There are cases where a guest tries to switch spinlocks to bare metal > behavior (e.g. by setting "xen_nopvspin" on XEN platform and > "hv_nopvspin" on HYPER_V). > > That feature is missed on KVM, add a new parameter "nopvspin" to disable > PV spinlocks for KVM guest. > > The new 'nopvspin' parameter will also replace Xen and Hyper-V specific > parameters in future patches. > > Define variable nopvsin as global because it will be used in future > patches as above. > > Signed-off-by: Zhenzhong Duan > Reviewed-by: Vitaly Kuznetsov > Cc: Jonathan Corbet > Cc: Thomas Gleixner > Cc: Ingo Molnar > Cc: Borislav Petkov > Cc: "H. Peter Anvin" > Cc: Paolo Bonzini > Cc: Radim Krcmar > Cc: Sean Christopherson > Cc: Vitaly Kuznetsov > Cc: Wanpeng Li > Cc: Jim Mattson > Cc: Joerg Roedel > Cc: Peter Zijlstra > Cc: Will Deacon Reviewed-by: Wanpeng Li > --- > Documentation/admin-guide/kernel-parameters.txt | 5 ++++ > arch/x86/include/asm/qspinlock.h | 1 + > arch/x86/kernel/kvm.c | 39 ++++++++++++++++++++----- > kernel/locking/qspinlock.c | 7 +++++ > 4 files changed, 45 insertions(+), 7 deletions(-) > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > index a84a83f..bd49ed2 100644 > --- a/Documentation/admin-guide/kernel-parameters.txt > +++ b/Documentation/admin-guide/kernel-parameters.txt > @@ -5334,6 +5334,11 @@ > as generic guest with no PV drivers. Currently support > XEN HVM, KVM, HYPER_V and VMWARE guest. > > + nopvspin [X86,KVM] > + Disables the qspinlock slow path using PV optimizations > + which allow the hypervisor to 'idle' the guest on lock > + contention. > + > xirc2ps_cs= [NET,PCMCIA] > Format: > ,,,,,[,[,[,]]] > diff --git a/arch/x86/include/asm/qspinlock.h b/arch/x86/include/asm/qspinlock.h > index 444d6fd..d86ab94 100644 > --- a/arch/x86/include/asm/qspinlock.h > +++ b/arch/x86/include/asm/qspinlock.h > @@ -32,6 +32,7 @@ static __always_inline u32 queued_fetch_set_pending_acquire(struct qspinlock *lo > extern void __pv_init_lock_hash(void); > extern void __pv_queued_spin_lock_slowpath(struct qspinlock *lock, u32 val); > extern void __raw_callee_save___pv_queued_spin_unlock(struct qspinlock *lock); > +extern bool nopvspin; > > #define queued_spin_unlock queued_spin_unlock > /** > diff --git a/arch/x86/kernel/kvm.c b/arch/x86/kernel/kvm.c > index 6562886..9834737 100644 > --- a/arch/x86/kernel/kvm.c > +++ b/arch/x86/kernel/kvm.c > @@ -825,18 +825,36 @@ __visible bool __kvm_vcpu_is_preempted(long cpu) > */ > void __init kvm_spinlock_init(void) > { > - /* Does host kernel support KVM_FEATURE_PV_UNHALT? */ > - if (!kvm_para_has_feature(KVM_FEATURE_PV_UNHALT)) > + /* > + * In case host doesn't support KVM_FEATURE_PV_UNHALT there is still an > + * advantage of keeping virt_spin_lock_key enabled: virt_spin_lock() is > + * preferred over native qspinlock when vCPU is preempted. > + */ > + if (!kvm_para_has_feature(KVM_FEATURE_PV_UNHALT)) { > + pr_info("PV spinlocks disabled, no host support\n"); > return; > + } > > + /* > + * Disable PV spinlocks and use native qspinlock when dedicated pCPUs > + * are available. > + */ > if (kvm_para_has_hint(KVM_HINTS_REALTIME)) { > - static_branch_disable(&virt_spin_lock_key); > - return; > + pr_info("PV spinlocks disabled with KVM_HINTS_REALTIME hints\n"); > + goto out; > } > > - /* Don't use the pvqspinlock code if there is only 1 vCPU. */ > - if (num_possible_cpus() == 1) > - return; > + if (num_possible_cpus() == 1) { > + pr_info("PV spinlocks disabled, single CPU\n"); > + goto out; > + } > + > + if (nopvspin) { > + pr_info("PV spinlocks disabled, forced by \"nopvspin\" parameter\n"); > + goto out; > + } > + > + pr_info("PV spinlocks enabled\n"); > > __pv_init_lock_hash(); > pv_ops.lock.queued_spin_lock_slowpath = __pv_queued_spin_lock_slowpath; > @@ -849,6 +867,13 @@ void __init kvm_spinlock_init(void) > pv_ops.lock.vcpu_is_preempted = > PV_CALLEE_SAVE(__kvm_vcpu_is_preempted); > } > + /* > + * When PV spinlock is enabled which is preferred over > + * virt_spin_lock(), virt_spin_lock_key's value is meaningless. > + * Just disable it anyway. > + */ > +out: > + static_branch_disable(&virt_spin_lock_key); > } > > #endif /* CONFIG_PARAVIRT_SPINLOCKS */ > diff --git a/kernel/locking/qspinlock.c b/kernel/locking/qspinlock.c > index 2473f10..75193d6 100644 > --- a/kernel/locking/qspinlock.c > +++ b/kernel/locking/qspinlock.c > @@ -580,4 +580,11 @@ void queued_spin_lock_slowpath(struct qspinlock *lock, u32 val) > #include "qspinlock_paravirt.h" > #include "qspinlock.c" > > +bool nopvspin __initdata; > +static __init int parse_nopvspin(char *arg) > +{ > + nopvspin = true; > + return 0; > +} > +early_param("nopvspin", parse_nopvspin); > #endif > -- > 1.8.3.1 >