Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp1045904rdb; Wed, 1 Nov 2023 09:46:46 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFv/Du/PwjqExQjAB5Njg57Km8B9qDDX1quy8n84c3V/aD6vZhtR7p8JTfO7kqXRR22S1Jk X-Received: by 2002:a05:6a21:7985:b0:181:8c24:80d7 with SMTP id bh5-20020a056a21798500b001818c2480d7mr94528pzc.35.1698857205765; Wed, 01 Nov 2023 09:46:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698857205; cv=none; d=google.com; s=arc-20160816; b=js0F9SteHGwnwHDmMwpkSgTYGJlZ9cdtqc2GmjQ8P5mtcRB/GbBY3RZHKgRqof5KSV oYCstGoQDPBr4t2t4SI5qiUMq8hdJMzD1UwCHDXBohMqBArX5ogW39pmH8QW20mvvovc t3JJfjOzjta020g8DDExUvzZWyN3OkkXQyNRVmSmVyK7C4+FqNrW5KDaFk+UgYx+iT+l mB2SXVZC/gq8NKAubc3aV2NgDENfkZHYMr0piMn7RVNGruNeZESeNTK1Xbp5EIGchwrX uPHMR1k1zCC7Vxo8ujcHa6cvITp6QvTiGLa37ruTUsooezIM2rGLjtQKsfTCOxnrthro AfvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=TK6zRbNRnaaGZQru6tpn4DJQzZiGHhIaVNTtMzEhwHs=; fh=bRwdyKJhQoWgJWpaaWz1VwYSS4ftk48674EhpLrN0r4=; b=FD+/li/Q1bNcbWOYGRu27n3rKeLz0kGgNE4TTFqcKjop60By9lG0vsM9Lf27maemxB qQ8EFw+3hdwVEaDbVlXIMJqAchbLtB8R2VIkmhEfMO5vbkPZV13qbxZLF0gPXksJKADO YxecjOyVpt9ZEm38/2lJezmxfDY+UOcxCcwPsleRBeasYXL/t4SNjT41W2bWWr+qdENX fRouLB9N5a58zXFZXRgj7s235vKT+EBMFsK9rWg5waWK6zRkDv5oTOtYFHtIxaEJ+1TO PqiGmXK4cp2aPVWrxkRFYxJQsueqeoPIWKpqCDa9d9+QVU/2fqdsxdW0TzWgiLKAm/hQ VPiA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=GbmChK2+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id ca40-20020a056a0206a800b005892fd16947si261220pgb.546.2023.11.01.09.46.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Nov 2023 09:46:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=GbmChK2+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 8F45380C5988; Wed, 1 Nov 2023 09:46:19 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232244AbjKAQqM (ORCPT + 99 others); Wed, 1 Nov 2023 12:46:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57354 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232145AbjKAQqK (ORCPT ); Wed, 1 Nov 2023 12:46:10 -0400 Received: from mail-yw1-x1149.google.com (mail-yw1-x1149.google.com [IPv6:2607:f8b0:4864:20::1149]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 85679101 for ; Wed, 1 Nov 2023 09:46:06 -0700 (PDT) Received: by mail-yw1-x1149.google.com with SMTP id 00721157ae682-5af9ad9341fso73658417b3.2 for ; Wed, 01 Nov 2023 09:46:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1698857165; x=1699461965; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=TK6zRbNRnaaGZQru6tpn4DJQzZiGHhIaVNTtMzEhwHs=; b=GbmChK2++j9Z0JUs0KsrZHv0aPtsBHfQ0LvOKWrnYyC+OIcBG/jf0zqKdDGrmK1dkR lEoqiLdsmhTrvJzGEtUBgACUoyQko7v1lYUAwq61Z0S8BQZI5VFhr9Bp6t9nmB2sCFK6 4VHft0h0xIwFXgELuGQTNBblAB8Nysjmzz4+gZPi01nbB8+lN+MTgZIAny0qcxYfz2ru rIy5oTNyaWUUxA97ABomiUqQO1LiYLGGXbtB15VA9Qn/gLJjd2voWNeyhOp/H5Kajepr Ngw8wDy4Nerq8zm8YywlCqJjyjm1WmSjnAPPtJKFkkkICxYDI3Cf0KM5bf3N4vhrjfnc r/UQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698857165; x=1699461965; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=TK6zRbNRnaaGZQru6tpn4DJQzZiGHhIaVNTtMzEhwHs=; b=JtTXFyTgZtfAcuWBr0+j6G6b1uYhpbx/PldG77PMxIdVShY6A/ks8guGRXY2Rkjf6+ YoB4x7HN2vr7MIGF4BE/4v3fYwbpsnqRCfYXe4+0QYP2v6N6lSaHxJPmkXPFLPFLlRFP SKI44leE1E7QNSj22+Zh1C/AuSWN7iOJ1XMh8kSWzVYptcWW6y0IkK3Uz92BlDVXpTsH 0izUuPpJlLt30a4/QpNZgaR8G1Z2UbN1UFFbXTYKsY8XqJkv7v7OgATmW6Iiv8ZKlo+t Pdm72KLyzt7jRHs2BboFOGhUKikahgf9T9SYXTawClsUGvaHzx+M6yWE8wI/GCkKhE8d GeAA== X-Gm-Message-State: AOJu0Yxs6xTheDvi8gTDbMU8lhdgFZRqOMmV2ScNS5CcEzb0F+Z3yonD T6KRCNX8CG1y9ZEP2x1nD1UJrXcozB0= X-Received: from zagreus.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5c37]) (user=seanjc job=sendgmr) by 2002:a25:abcd:0:b0:da0:42f3:6ce4 with SMTP id v71-20020a25abcd000000b00da042f36ce4mr277219ybi.7.1698857165733; Wed, 01 Nov 2023 09:46:05 -0700 (PDT) Date: Wed, 1 Nov 2023 09:46:04 -0700 In-Reply-To: <20231101112934.631344-1-paul@xen.org> Mime-Version: 1.0 References: <20231101112934.631344-1-paul@xen.org> Message-ID: Subject: Re: [PATCH v3] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT From: Sean Christopherson To: Paul Durrant Cc: Paolo Bonzini , Jonathan Corbet , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , David Woodhouse , kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="us-ascii" X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Wed, 01 Nov 2023 09:46:19 -0700 (PDT) On Wed, Nov 01, 2023, Paul Durrant wrote: > @@ -3231,12 +3245,15 @@ static int kvm_guest_time_update(struct kvm_vcpu *v) > vcpu->hv_clock.flags = pvclock_flags; > > if (vcpu->pv_time.active) > - kvm_setup_guest_pvclock(v, &vcpu->pv_time, 0); > + kvm_setup_guest_pvclock(v, &vcpu->pv_time, 0, false); > + > if (vcpu->xen.vcpu_info_cache.active) > kvm_setup_guest_pvclock(v, &vcpu->xen.vcpu_info_cache, > - offsetof(struct compat_vcpu_info, time)); > + offsetof(struct compat_vcpu_info, time), > + xen_pvclock_tsc_unstable); > if (vcpu->xen.vcpu_time_info_cache.active) > - kvm_setup_guest_pvclock(v, &vcpu->xen.vcpu_time_info_cache, 0); > + kvm_setup_guest_pvclock(v, &vcpu->xen.vcpu_time_info_cache, 0, > + xen_pvclock_tsc_unstable); > kvm_hv_setup_tsc_page(v->kvm, &vcpu->hv_clock); > return 0; Please rebase, this conflicts with commit ee11ab6bb04e ("KVM: X86: Reduce size of kvm_vcpu_arch structure when CONFIG_KVM_XEN=n"). I can solve the conflict, but I really shouldn't have to. Also, your version of git should support --base, which makes life much easier for others when non-trivial conflicts are encountered. From maintainer-kvm-x86.rst: : Git Base : ~~~~~~~~ : If you are using git version 2.9.0 or later (Googlers, this is all of you!), : use ``git format-patch`` with the ``--base`` flag to automatically include the : base tree information in the generated patches. : : Note, ``--base=auto`` works as expected if and only if a branch's upstream is : set to the base topic branch, e.g. it will do the wrong thing if your upstream : is set to your personal repository for backup purposes. An alternative "auto" : solution is to derive the names of your development branches based on their : KVM x86 topic, and feed that into ``--base``. E.g. ``x86/pmu/my_branch_name``, : and then write a small wrapper to extract ``pmu`` from the current branch name : to yield ``--base=x/pmu``, where ``x`` is whatever name your repository uses to : track the KVM x86 remote. > @@ -4531,7 +4548,8 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) > KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | > KVM_XEN_HVM_CONFIG_SHARED_INFO | > KVM_XEN_HVM_CONFIG_EVTCHN_2LEVEL | > - KVM_XEN_HVM_CONFIG_EVTCHN_SEND; > + KVM_XEN_HVM_CONFIG_EVTCHN_SEND | > + KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE; > if (sched_info_on()) > r |= KVM_XEN_HVM_CONFIG_RUNSTATE | > KVM_XEN_HVM_CONFIG_RUNSTATE_UPDATE_FLAG; > diff --git a/arch/x86/kvm/xen.c b/arch/x86/kvm/xen.c > index 40edf4d1974c..7699d94f190b 100644 > --- a/arch/x86/kvm/xen.c > +++ b/arch/x86/kvm/xen.c > @@ -1111,9 +1111,12 @@ int kvm_xen_write_hypercall_page(struct kvm_vcpu *vcpu, u64 data) > > int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc) > { > + bool update_pvclock = false; > + > /* Only some feature flags need to be *enabled* by userspace */ > u32 permitted_flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | > - KVM_XEN_HVM_CONFIG_EVTCHN_SEND; > + KVM_XEN_HVM_CONFIG_EVTCHN_SEND | > + KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE; > > if (xhc->flags & ~permitted_flags) > return -EINVAL; > @@ -1134,9 +1137,19 @@ int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc) > else if (!xhc->msr && kvm->arch.xen_hvm_config.msr) > static_branch_slow_dec_deferred(&kvm_xen_enabled); > > + if ((kvm->arch.xen_hvm_config.flags & > + KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE) != > + (xhc->flags & > + KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE)) > + update_pvclock = true; Rather than a boolean and the above, which is a bit hard to parse, what about taking a snapshot of the old flags and then doing an XOR? /* Only some feature flags need to be *enabled* by userspace */ u32 permitted_flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | KVM_XEN_HVM_CONFIG_EVTCHN_SEND | KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE; u32 old_flags; if (xhc->flags & ~permitted_flags) return -EINVAL; /* * With hypercall interception the kernel generates its own * hypercall page so it must not be provided. */ if ((xhc->flags & KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL) && (xhc->blob_addr_32 || xhc->blob_addr_64 || xhc->blob_size_32 || xhc->blob_size_64)) return -EINVAL; mutex_lock(&kvm->arch.xen.xen_lock); if (xhc->msr && !kvm->arch.xen_hvm_config.msr) static_branch_inc(&kvm_xen_enabled.key); else if (!xhc->msr && kvm->arch.xen_hvm_config.msr) static_branch_slow_dec_deferred(&kvm_xen_enabled); old_flags = kvm->arch.xen_hvm_config.flags; memcpy(&kvm->arch.xen_hvm_config, xhc, sizeof(*xhc)); mutex_unlock(&kvm->arch.xen.xen_lock); if ((old_flags ^ xhc->flags) & KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE) kvm_make_all_cpus_request(kvm, KVM_REQ_CLOCK_UPDATE); return 0;