Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1123983ybb; Fri, 20 Mar 2020 13:51:19 -0700 (PDT) X-Google-Smtp-Source: ADFU+vt1wJeFgDmReeV6svPaxYqMmjDZyaPE/Xi052Y+RcJM4klrNN4A7H4jMAGLGi7ssWOrVEWZ X-Received: by 2002:a05:6830:1d64:: with SMTP id l4mr8311149oti.36.1584737479308; Fri, 20 Mar 2020 13:51:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584737479; cv=none; d=google.com; s=arc-20160816; b=R2IF7cKI0O6Fmt9aPe94BRfh2KXJ9aZHAJuFOlEeT9c7yws+BihaJrWYr51St1FZL3 yW0q3r0dGs+3xFEoySbae51jZAvVjZNjl5vBnuTn3Nop3Vxr5EryYXU3ZMlCazohyS6S aP1nFgerWY+1GJ5X/Que7oTpAMTFUsSSt70cQmUKgXOui8Ezjl8v4sX9x7/vigVT8IlG LSYZn/IbHsrCsp2guKCecerIQ68ue30JQD41faKOSdlB1ewPD3+/34Vb8jF6k9lbl9kB L8w+8QS2TDbEsF6vbDDeYYKdqJCDHaknLWkms7HIHuKhLvAVG5hTxh98GT+KOWAl+frr 9Mag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=RCNxn0dk0+/L+my0gWQPQwMFKuhgwZMKjWZBQGiApoQ=; b=NcYz6nKc3ukk7ZwASCxijaSEPKX1Ei881fWLoDR9gIhYPUKi4Qzt8//Ex17t+ZGyzf j246NbWNOzcdQp/EPUcedgCaK+yDSneGJSSwNxpOJPflHvljLtrEn+tjR8h+AERihv9s 3utWHsAtHg6AC6dxWYmLh/psXsT/1f8+aZ3BRbXzRv4HkGknFTKsLaqX+p638GaHserl aFN2f78hqJXLx+EaLnZ5rQ7oTKj4pG5ZPl6BeNX7ZQ4F3pKQP3pxEAXDlavWEIaJJdK/ ZA+K2HGh+gegUdzsdfXPpn9Tb1knds78HDZIUuqxrg2TNuHSVhgn5ZuXm0yep+w1D6Z/ Hsdg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r29si3886054oth.324.2020.03.20.13.51.06; Fri, 20 Mar 2020 13:51:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727211AbgCTUuP (ORCPT + 99 others); Fri, 20 Mar 2020 16:50:15 -0400 Received: from ex13-edg-ou-002.vmware.com ([208.91.0.190]:35623 "EHLO EX13-EDG-OU-002.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726982AbgCTUuH (ORCPT ); Fri, 20 Mar 2020 16:50:07 -0400 X-Greylist: delayed 902 seconds by postgrey-1.27 at vger.kernel.org; Fri, 20 Mar 2020 16:50:04 EDT Received: from sc9-mailhost2.vmware.com (10.113.161.72) by EX13-EDG-OU-002.vmware.com (10.113.208.156) with Microsoft SMTP Server id 15.0.1156.6; Fri, 20 Mar 2020 13:34:55 -0700 Received: from localhost.localdomain (unknown [10.118.101.94]) by sc9-mailhost2.vmware.com (Postfix) with ESMTP id 9B71CB1505; Fri, 20 Mar 2020 16:34:59 -0400 (EDT) From: Alexey Makhalov To: CC: , Jonathan Corbet , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Mauro Carvalho Chehab , Josh Poimboeuf , Greg Kroah-Hartman , Pawan Gupta , Juergen Gross , Alexey Makhalov Subject: [PATCH 0/5] x86/vmware: Steal time accounting support Date: Fri, 20 Mar 2020 20:34:38 +0000 Message-ID: <20200320203443.27742-1-amakhalov@vmware.com> X-Mailer: git-send-email 2.14.2 MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX13-EDG-OU-002.vmware.com: amakhalov@vmware.com does not designate permitted sender hosts) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, This patchset introduces steal time accounting support for the VMware guest. The idea and implementation of guest steal time support is similar to KVM ones and it is based on steal clock. The steal clock is a per CPU structure in a shared memory between hypervisor and guest, initialized by each CPU through hypercall. Steal clock is got updated by the hypervisor and read by the guest. The patchset consists of 5 items: 1. x86/vmware: Make vmware_select_hypercall() __init Minor clean up. 2. x86/vmware: Remove vmware_sched_clock_setup() Preparation for the main patch. 3. x86/vmware: Steal time clock for VMware guest Core steal time support functionality. 4. x86/vmware: Enable steal time accounting Support for steal time accounting used by update_rq_clock(). 5. x86/vmware: Use bool type for vmw_sched_clock Minor clean up. Alexey Makhalov (5): x86/vmware: Make vmware_select_hypercall() __init x86/vmware: Remove vmware_sched_clock_setup() x86/vmware: Steal time clock for VMware guest x86/vmware: Enable steal time accounting x86/vmware: Use bool type for vmw_sched_clock Documentation/admin-guide/kernel-parameters.txt | 2 +- arch/x86/kernel/cpu/vmware.c | 227 +++++++++++++++++++++++- 2 files changed, 220 insertions(+), 9 deletions(-) -- 2.14.2