Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp2880139rdb; Fri, 22 Sep 2023 10:47:28 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGKuW4wdFbEoJ7dRCIeCL3iDmJ9x/NzR0chIYYDDjqKNGnk8J/p33CPmxNZrEvi57ku3l57 X-Received: by 2002:a05:6a00:2e8b:b0:68f:f741:57a1 with SMTP id fd11-20020a056a002e8b00b0068ff74157a1mr193301pfb.7.1695404848061; Fri, 22 Sep 2023 10:47:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695404848; cv=none; d=google.com; s=arc-20160816; b=sz+NhuVf1NdnynG3bBUKD+dG9UHiy2uyq38IEMr3m0waAzZJB/0a8bPEplKed0SX/n gWLq45tS26hTmXv8bGwI5H8PPIJ1LX4GoSBqs61F6Aru7rtSJiTuMV/ci1zGKZs/Sscv XVF3EidVgV7NaI5+Y7exlP/3c2q9g04JiJy0CO76VEvi85zoyMGQjY7D9MCH9nHQvBJA x6TXAW0veHAsGHWEJZcCRZM5GTm/SZbO+QRsbGFzytBNZ4LzedIOebUXJF5UwfNdmOsF SzdPk61iptYIqJ2y/6ZMAltcZ6nIAVl4igQgLnXtqhGIiPqbtv+/ZgKt3EStfECBCOd6 S3ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :organization:references:cc:to:content-language:subject:reply-to :user-agent:mime-version:date:message-id:from:dkim-signature; bh=WiLmRa8gWPpCuxu6i5MOMtXJ7QzKKG7kw7FfmIemUBk=; fh=AJsWfcfWca0pMVN9dMJoy5VTZuzPV1uSxAhPRn4a4iM=; b=XEvmxDuWok599w3LHeASRbonZmX/718b2HScOGRyYCLmoKqFwCJFxTH1L2/r13RFp3 6SgfWwbFpY+kkJ0ze1A9pC4kva3My5pcBcSp5f+sVefmnjDiAs8cHbyefxko9dEkESni yOJ98zYAff7q0scfVCXFYFF3nGbL95dZrF/K5QZiycnsZBjWQY+75ip4oCV+deSk2dWo 2GRCKGZ9VT1R+nHnR6pem4+JGZOkDeTL7q6ue6pC2FdN3hPqkWGLrjhyw/lmk0LF/Urr fx49tIsBXw+edayVhNzAf4a4pqSv2XDyj6YZrgqua+5VAYZHfUFWTezILc4H2lTfEnnE 5I3g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b="BhK3d0/k"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id u41-20020a056a0009a900b0068fdeb84453si4549466pfg.265.2023.09.22.10.47.27 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Sep 2023 10:47:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b="BhK3d0/k"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id BD72D8073DD7; Fri, 22 Sep 2023 02:41:33 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232943AbjIVJld (ORCPT + 99 others); Fri, 22 Sep 2023 05:41:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35410 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229539AbjIVJl3 (ORCPT ); Fri, 22 Sep 2023 05:41:29 -0400 Received: from mail-wr1-x433.google.com (mail-wr1-x433.google.com [IPv6:2a00:1450:4864:20::433]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1AFF794; Fri, 22 Sep 2023 02:41:23 -0700 (PDT) Received: by mail-wr1-x433.google.com with SMTP id ffacd0b85a97d-32008e339adso1837637f8f.2; Fri, 22 Sep 2023 02:41:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1695375681; x=1695980481; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:organization:references:cc:to :content-language:subject:reply-to:user-agent:mime-version:date :message-id:from:from:to:cc:subject:date:message-id:reply-to; bh=WiLmRa8gWPpCuxu6i5MOMtXJ7QzKKG7kw7FfmIemUBk=; b=BhK3d0/kH7SbVHibZXZ0pyt1Dr3mF4hq83C5eu0KYBKDH396coxrFHAi+vL+RYVORL XsT2c8GLWEoAl6N0/EhFG8e/tlOneDoLHMIjzFFERbvbN4QD8URJ/SxSVNOC+J+wmnCq tLCAFRWKC+bYyGMDqlbhUKKX8DTA4H6A3ZHYAYdsDa7qv/va6S5O6+tNRfGa/FqC1XAW CiGO7tF7Qevu3VzamOuB43n/FKQZMcbWIlhMAdUtDh/L2lRDESutOnWB9t6eQdrciEX2 yHZ2EDblWIil1TCesEkm4uxu+dGqDdjyiP4EG9wpsYznUp2I8H9oorDiAoZ1DKXi3tUS l4UA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695375681; x=1695980481; h=content-transfer-encoding:in-reply-to:organization:references:cc:to :content-language:subject:reply-to:user-agent:mime-version:date :message-id:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=WiLmRa8gWPpCuxu6i5MOMtXJ7QzKKG7kw7FfmIemUBk=; b=JggYU3vThruBC+MHYPH9R8DnPZRXDpB9ZMaajSV6gltTB5LGs8h/wWWafdhEf8/WZJ DELWyBKgTA15XSflE1zfAMj3cB8xt1ZzfqK1aDn6tI6K/LVhupm8GVZbyuO82jbxvRch ZmNgY1fYJ6jMV/s/Dw8LxFzHIIdVnAmdAHv3wbUXXGqJKl5iEFq7mG2F5D7DvzXLf3Wk VtRK5/oQE+JgQFAd/kkJzrRprZvRS0jyN38wqYaTYMxRBmkbMaFasmcMUL2FSBsUTEo3 rBmm6sd5vi47lIPU6YfAR+c8bOJVe1KTa5/CiwIi5bQNYe7V+F3IubOSATOdiIlTlD5/ sveg== X-Gm-Message-State: AOJu0YwY4lkqE51SAPSGuQL5eWO7mBNsb0Wpdnv3o/d5VUYn58XUA4MJ Qha50COacAsI036IJjTVCrMTG/va9OMFyQ== X-Received: by 2002:a5d:5005:0:b0:31a:d9bc:47a2 with SMTP id e5-20020a5d5005000000b0031ad9bc47a2mr7346538wrt.53.1695375681234; Fri, 22 Sep 2023 02:41:21 -0700 (PDT) Received: from [192.168.4.149] (54-240-197-234.amazon.com. [54.240.197.234]) by smtp.gmail.com with ESMTPSA id o13-20020adfeacd000000b00317f3fd21b7sm4002202wrn.80.2023.09.22.02.41.20 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 22 Sep 2023 02:41:20 -0700 (PDT) From: Paul Durrant X-Google-Original-From: Paul Durrant Message-ID: Date: Fri, 22 Sep 2023 10:41:19 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Reply-To: paul@xen.org Subject: Re: [PATCH] KVM: x86: Use fast path for Xen timer delivery Content-Language: en-US To: David Woodhouse , kvm Cc: Sean Christopherson , Paolo Bonzini , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , linux-kernel@vger.kernel.org, "Griffoul, Fred" References: <445abd6377cf1621a2d306226cab427820583967.camel@infradead.org> Organization: Xen Project In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Fri, 22 Sep 2023 02:41:33 -0700 (PDT) On 22/09/2023 10:29, David Woodhouse wrote: > On Fri, 2023-09-22 at 10:22 +0100, Paul Durrant wrote: >> On 22/09/2023 10:20, David Woodhouse wrote: >>> From: David Woodhouse >>> >>> Most of the time there's no need to kick the vCPU and deliver the timer >>> event through kvm_xen_inject_timer_irqs(). Use kvm_xen_set_evtchn_fast() >>> directly from the timer callback, and only fall back to the slow path >>> when it's necessary to do so. >>> >>> This gives a significant improvement in timer latency testing (using >>> nanosleep() for various periods and then measuring the actual time >>> elapsed). >>> >>> Signed-off-by: David Woodhouse >>> --- >>>   arch/x86/kvm/xen.c | 17 ++++++++++++++--- >>>   1 file changed, 14 insertions(+), 3 deletions(-) >>> >>> diff --git a/arch/x86/kvm/xen.c b/arch/x86/kvm/xen.c >>> index 40edf4d1974c..66c4cf93a55c 100644 >>> --- a/arch/x86/kvm/xen.c >>> +++ b/arch/x86/kvm/xen.c >>> @@ -134,12 +134,23 @@ static enum hrtimer_restart xen_timer_callback(struct hrtimer *timer) >>>   { >>>         struct kvm_vcpu *vcpu = container_of(timer, struct kvm_vcpu, >>>                                              arch.xen.timer); >>> +       struct kvm_xen_evtchn e; >>> +       int rc; >>> + >>>         if (atomic_read(&vcpu->arch.xen.timer_pending)) >>>                 return HRTIMER_NORESTART; >>> >>> -       atomic_inc(&vcpu->arch.xen.timer_pending); >>> -       kvm_make_request(KVM_REQ_UNBLOCK, vcpu); >>> -       kvm_vcpu_kick(vcpu); >>> +       e.vcpu_id = vcpu->vcpu_id; >>> +       e.vcpu_idx = vcpu->vcpu_idx; >>> +       e.port = vcpu->arch.xen.timer_virq; >> >> Don't you need to check the port for validity? The VMM may not have set >> it (and hence be delivering timer VIRQ events itself). > > Nah, the kvm_xen_timer_enabled() check which gates all the kernel > interception of timer hypercalls is already testing precisely that. > > If the TIMER_VIRQ isn't set, none of this code runs. And when userspace > tears down TIMER_VIRQ, the hrtimer is cancelled. So none of this code > (then) runs. Ok. Good :-) Reviewed-by: Paul Durrant