Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1848307ybz; Thu, 30 Apr 2020 06:36:36 -0700 (PDT) X-Google-Smtp-Source: APiQypKVQvWTRCVv/3AZEfVxULJpeAEJrzsDT80SxWijklfMUuZq6/FAqsLuAFJmf8t0JY2d+xS+ X-Received: by 2002:a50:fc06:: with SMTP id i6mr2592813edr.110.1588253796491; Thu, 30 Apr 2020 06:36:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588253796; cv=none; d=google.com; s=arc-20160816; b=HFxuCDVveM5h0jfTglZ6EX8SRd1WJAOytSWQGsSSUWZuoSBT4g/gq4x26B3gpQFjT/ cBRFQwo3Fg2t7z1JRhXn6/3tWKTJP44m019Ahf1PvSUT7IF8lFAKQjhMZzWYIKgkG4tL vUxPWgmwa/LqEMYMaotQ6HuxTmehFEglS5seNoVEBYvX5TJPZliN6lhDJd52PY7b8GgI vf0VGRmx3qAcpRXLraPa9jxWZOh/7PY6POup5S8cpy6F/MHqHEHHtUD2I/cKlk0F9fNX nIsQSlxffMnKlR/N+jrtwd0yLA7M7hULarXMN+iOPm0GM717fET1MDfBdQMBxswP1wjL XZvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=L25mv4WATkCBD6beOc1gHUKVW8B48wx+KY4Q0xxB/bg=; b=qwHCTO9jthsXF09tUqwjS0L7/zn/xRXXHJdnntaZ62FrUgZVXotIv/ztefl8VI+ms6 TU2OeZ0lU1UKlhBoSGWWQz42IPG6mgH/pL3x5B0oO06uOpryjnZmOzGBBAHQQl1i6Vur 2uDzbSukrWhd+b5Mj/X3sDso4l4nPz5otmw2zCL9S1I6F9MxZl93GHmy39AhXRlYWUJu 8NnWlvZhMz2khytkmOTHvqFTP7JU7sai8OyEfNeOAHvETUk8AZ5RD2w+LsvwKCU6sGFI w+u1m8WTJZV5bNQdF3AhAYfC+de+FYzlCUgEnuOOueh6cASvQv5f7SmxY66Us73Z/VxB oEFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=YmTEFhiT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gs23si5965886ejb.207.2020.04.30.06.36.08; Thu, 30 Apr 2020 06:36:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=YmTEFhiT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726577AbgD3NeP (ORCPT + 99 others); Thu, 30 Apr 2020 09:34:15 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:54851 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726770AbgD3NeO (ORCPT ); Thu, 30 Apr 2020 09:34:14 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1588253652; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=L25mv4WATkCBD6beOc1gHUKVW8B48wx+KY4Q0xxB/bg=; b=YmTEFhiTjoViIVGkCPiLAIWQw4qoomGHvjVanx/CaDT0brVTb6MNDvhDvGTf5J/xrI6tjg sKITS3Z+BQygdZhWt+PvUCKXznpfgmgFdOdyawF0TuHAlfm7mZBcmODc0BaFbq1CI8jCGR t4ma9Gl4DOvtz41yhR7mvLTVnn9nQ5I= Received: from mail-wr1-f70.google.com (mail-wr1-f70.google.com [209.85.221.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-323-voY4aANAPBGDejxXVDruvg-1; Thu, 30 Apr 2020 09:34:11 -0400 X-MC-Unique: voY4aANAPBGDejxXVDruvg-1 Received: by mail-wr1-f70.google.com with SMTP id j16so3849640wrw.20 for ; Thu, 30 Apr 2020 06:34:10 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=L25mv4WATkCBD6beOc1gHUKVW8B48wx+KY4Q0xxB/bg=; b=r3B1++r0TOcOSyYTJPs/IwLDSjUIq9+SluTNnKbhKF37AW39G15Qmp03ewfNtOPz8F S4I0ZG7yBfy8stmdmiiVg7sMqhId5gMdU8pZyvYQOJPbZcgf1vioOpGLZDWcubTkQXpy 1dCZEcE4OBY6WSgIfOIx30pdWW/Gpwbuimsd2EJygekYRCZ0zs/EmzixqelePOmMbSUd VP4tG868jlI3bN0qHiaDilW6A+a6NgjNkTpZna1iW86ZzOIRNCR5Rsc2UcIGKAzu1rE1 uP/qbfDpmjzqHbk+Yi7C9eNjMkrE7++DzFjiLNGBRQn0fkE4iYAmTCbILvqPID8SwBdS NKLA== X-Gm-Message-State: AGi0PuZD00R0x3o3oRVQ0VmnLELH4ZRzxCQTPgAb6UXqV050l1Lz1VLU FGrz3dMZUZC2BjRER99yqrBxrxLZ0z50+r2jtMFmXLI6pkmGXXSQ1jBB4gqdQ3OPnq7dIDRzofX YV+FY3jBVnZDSSnKKTVSgRNeU X-Received: by 2002:a7b:c642:: with SMTP id q2mr3140487wmk.41.1588253649882; Thu, 30 Apr 2020 06:34:09 -0700 (PDT) X-Received: by 2002:a7b:c642:: with SMTP id q2mr3140465wmk.41.1588253649651; Thu, 30 Apr 2020 06:34:09 -0700 (PDT) Received: from vitty.brq.redhat.com (g-server-2.ign.cz. [91.219.240.2]) by smtp.gmail.com with ESMTPSA id v7sm11562227wmg.3.2020.04.30.06.34.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Apr 2020 06:34:08 -0700 (PDT) From: Vitaly Kuznetsov To: Wanpeng Li , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Paolo Bonzini , Sean Christopherson , Wanpeng Li , Jim Mattson , Joerg Roedel , Haiwei Li Subject: Re: [PATCH v4 2/7] KVM: X86: Enable fastpath when APICv is enabled In-Reply-To: <1588055009-12677-3-git-send-email-wanpengli@tencent.com> References: <1588055009-12677-1-git-send-email-wanpengli@tencent.com> <1588055009-12677-3-git-send-email-wanpengli@tencent.com> Date: Thu, 30 Apr 2020 15:34:06 +0200 Message-ID: <87a72tf67l.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Wanpeng Li writes: > From: Wanpeng Li > > We can't observe benefit from single target IPI fastpath when APICv is > disabled, let's just enable IPI and Timer fastpath when APICv is enabled > for now. > > Tested-by: Haiwei Li > Cc: Haiwei Li > Signed-off-by: Wanpeng Li > --- > arch/x86/kvm/svm/svm.c | 2 +- > arch/x86/kvm/vmx/vmx.c | 2 +- > 2 files changed, 2 insertions(+), 2 deletions(-) > > diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c > index 8f8fc65..1e7220e 100644 > --- a/arch/x86/kvm/svm/svm.c > +++ b/arch/x86/kvm/svm/svm.c > @@ -3344,7 +3344,7 @@ static void svm_cancel_injection(struct kvm_vcpu *vcpu) > > static enum exit_fastpath_completion svm_exit_handlers_fastpath(struct kvm_vcpu *vcpu) > { > - if (!is_guest_mode(vcpu) && > + if (!is_guest_mode(vcpu) && vcpu->arch.apicv_active && > to_svm(vcpu)->vmcb->control.exit_code == SVM_EXIT_MSR && > to_svm(vcpu)->vmcb->control.exit_info_1) > return handle_fastpath_set_msr_irqoff(vcpu); > diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c > index 9b5adb4..f207004 100644 > --- a/arch/x86/kvm/vmx/vmx.c > +++ b/arch/x86/kvm/vmx/vmx.c > @@ -6585,7 +6585,7 @@ void vmx_update_host_rsp(struct vcpu_vmx *vmx, unsigned long host_rsp) > > static enum exit_fastpath_completion vmx_exit_handlers_fastpath(struct kvm_vcpu *vcpu) > { > - if (!is_guest_mode(vcpu)) { > + if (!is_guest_mode(vcpu) && vcpu->arch.apicv_active) { > switch (to_vmx(vcpu)->exit_reason) { > case EXIT_REASON_MSR_WRITE: > return handle_fastpath_set_msr_irqoff(vcpu); I think that apicv_active checks are specific to APIC MSRs but handle_fastpath_set_msr_irqoff() can handle any other MSR as well. I'd suggest to move the check inside handle_fastpath_set_msr_irqoff(). Also, enabling Hyper-V SynIC leads to disabling apicv. It it still pointless to keep fastpath enabled? -- Vitaly