Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3874729ybl; Mon, 13 Jan 2020 04:14:02 -0800 (PST) X-Google-Smtp-Source: APXvYqyHrjnTFBxcg0KKwgoLhYnnNV/stkTl+iYnB9cjirlMckxPT0uPNLFEtnpBJ7H2FPKVZHYV X-Received: by 2002:a9d:65cb:: with SMTP id z11mr11969572oth.348.1578917641927; Mon, 13 Jan 2020 04:14:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578917641; cv=none; d=google.com; s=arc-20160816; b=ObJRfPr+Su2LX66a/1qDgZf/DG2YIpNdkBRH2kb1Kcx8Sst47IOmG9m3/bfBSQ/3d3 cqV6L8O9ocqDw+LRpnXJgtEAzC+ZGc9VcwYHuh0f27/w7/syuhvyrUIqzizivG64OzKi VUrX1CUhrji4sKHjBkY3HVNjhtfbAWjNJYppr25U2JgkPW6e7qRhy0ktMOBBhZpUFPQl NW44lmnNF3QaYt7ddHV8OLu9TwJx+JCarWo9f0GG3DlHc+BesjrOAy+TG+dp4Zqg1183 YJO5mTuR7JgFlV2SpHVXWgHH+5kH3f5wUF9rsArXl0mnsLV8NhlDJbz9N3rxClF0MPRx zvyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=KVEC1M5rnPWyFP4WNO8lO3VWVi1ZsNkjtlMcltArMnk=; b=DMa8snj0t64sdrzw5dRrfHRUZFNdCucEgQIlaA1cBMcZJNC9J/FeDNoDs0IWDoseEN WzvP6co/RnFOblj14iiwLtUq26M5KWI00tfT1aaVc+xwHFT96VHqHJTSc+RgVIX3r+9M qF80fFX2o7oBSzmV27rd1xhzfiR00A9lKN8ocC6HEMrNzYOEYKrzSzmE0xTh3VIuvw5b aAQcTiL3MGmm2WJBBzKkZhKTOaP+YTqJmgkrgHBZGhq7dAuGDn7BCLOn8DWPE4tJia8U TV4Mf8Y/iSoh9FkawiTQgtPWUykjwwxh58NCdhqnohusJQIneT/vWz1xFWgaPyMu6eQ0 Fa/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kE2bX48I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r15si6455342ota.264.2020.01.13.04.13.49; Mon, 13 Jan 2020 04:14:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kE2bX48I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726480AbgAMMMs (ORCPT + 99 others); Mon, 13 Jan 2020 07:12:48 -0500 Received: from mail.kernel.org ([198.145.29.99]:52768 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725832AbgAMMMs (ORCPT ); Mon, 13 Jan 2020 07:12:48 -0500 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6A2602075B; Mon, 13 Jan 2020 12:12:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578917567; bh=jrKOx7fdYO/hgwOXZereFYrzknBNVlPV0cWc5JJ1418=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=kE2bX48Ij3Lcc8WQScofYgYFGjjwfqDqH83qLTdcOcI2aZ5mXA2CThEiocaWgQ+V5 WRtPBjxDkvffPZMCQIsNDIJVhxwT+WOOVIi9qDCDwlN6nxuJt2W12nScVYpTS+8AE7 pVt9HDLXBQPMkGUKJ5MBkeSkRs86GPSr4a7Fkk1Q= Date: Mon, 13 Jan 2020 12:12:41 +0000 From: Will Deacon To: Zengruan Ye Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-doc@vger.kernel.org, virtualization@lists.linux-foundation.org, maz@kernel.org, james.morse@arm.com, linux@armlinux.org.uk, suzuki.poulose@arm.com, julien.thierry.kdev@gmail.com, catalin.marinas@arm.com, mark.rutland@arm.com, steven.price@arm.com, daniel.lezcano@linaro.org, peterz@infradead.org Subject: Re: [PATCH v2 0/6] KVM: arm64: VCPU preempted check support Message-ID: <20200113121240.GC3260@willie-the-truck> References: <20191226135833.1052-1-yezengruan@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191226135833.1052-1-yezengruan@huawei.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [+PeterZ] On Thu, Dec 26, 2019 at 09:58:27PM +0800, Zengruan Ye wrote: > This patch set aims to support the vcpu_is_preempted() functionality > under KVM/arm64, which allowing the guest to obtain the VCPU is > currently running or not. This will enhance lock performance on > overcommitted hosts (more runnable VCPUs than physical CPUs in the > system) as doing busy waits for preempted VCPUs will hurt system > performance far worse than early yielding. > > We have observed some performace improvements in uninx benchmark tests. > > unix benchmark result: > host: kernel 5.5.0-rc1, HiSilicon Kunpeng920, 8 CPUs > guest: kernel 5.5.0-rc1, 16 VCPUs > > test-case | after-patch | before-patch > ----------------------------------------+-------------------+------------------ > Dhrystone 2 using register variables | 334600751.0 lps | 335319028.3 lps > Double-Precision Whetstone | 32856.1 MWIPS | 32849.6 MWIPS > Execl Throughput | 3662.1 lps | 2718.0 lps > File Copy 1024 bufsize 2000 maxblocks | 432906.4 KBps | 158011.8 KBps > File Copy 256 bufsize 500 maxblocks | 116023.0 KBps | 37664.0 KBps > File Copy 4096 bufsize 8000 maxblocks | 1432769.8 KBps | 441108.8 KBps > Pipe Throughput | 6405029.6 lps | 6021457.6 lps > Pipe-based Context Switching | 185872.7 lps | 184255.3 lps > Process Creation | 4025.7 lps | 3706.6 lps > Shell Scripts (1 concurrent) | 6745.6 lpm | 6436.1 lpm > Shell Scripts (8 concurrent) | 998.7 lpm | 931.1 lpm > System Call Overhead | 3913363.1 lps | 3883287.8 lps > ----------------------------------------+-------------------+------------------ > System Benchmarks Index Score | 1835.1 | 1327.6 Interesting, thanks for the numbers. So it looks like there is a decent improvement to be had from targetted vCPU wakeup, but I really dislike the explicit PV interface and it's already been shown to interact badly with the WFE-based polling in smp_cond_load_*(). Rather than expose a divergent interface, I would instead like to explore an improvement to smp_cond_load_*() and see how that performs before we commit to something more intrusive. Marc and I looked at this very briefly in the past, and the basic idea is to register all of the WFE sites with the hypervisor, indicating which register contains the address being spun on and which register contains the "bad" value. That way, you don't bother rescheduling a vCPU if the value at the address is still bad, because you know it will exit immediately. Of course, the devil is in the details because when I say "address", that's a guest virtual address, so you need to play some tricks in the hypervisor so that you have a separate mapping for the lockword (it's enough to keep track of the physical address). Our hacks are here but we basically ran out of time to work on them beyond an unoptimised and hacky prototype: https://git.kernel.org/pub/scm/linux/kernel/git/maz/arm-platforms.git/log/?h=kvm-arm64/pvcy Marc -- how would you prefer to handle this? Will