Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp1056063rdb; Wed, 1 Nov 2023 10:02:48 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHa6t3WtFgW/SjkDdRy9D27O3MMVGWBTjMWOwzB4BDwQIZBtJ3HGTpy06Pj9FN7WsO2aRhK X-Received: by 2002:a17:903:22d1:b0:1cc:66d5:4942 with SMTP id y17-20020a17090322d100b001cc66d54942mr7366506plg.22.1698858168096; Wed, 01 Nov 2023 10:02:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698858168; cv=none; d=google.com; s=arc-20160816; b=xbPeJZJvKLSGj0YQ1Jbdx1S9M7aJGyva2kJTL77t1avq1fORqtBPEI3AV2l7hlk68t cNc8sNgCRFInxU3L0sLt9sb0SXO6BMm+vdlGGJ93BL1K2UQQvG6lRWtaJYezjdle+rNj zMhp/Gb7oH8EmF8qI49QRFRAulC5gaT+Dn/PonXWLZDF/guX0AePDrRYaHgndgskpq/Q +yhaUQZYMFywFtNy+jiQZz0j2y+T2cIQwc6pB75HOYHw/aeroP8slvolrwj9dboY+KxD 9D50RBbaAbsSgdE7eYezvzze4BVcI7tepdYdmup+F/MZMkHkFKQDjT560juw8aM0x2mW O7rw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :organization:content-language:references:cc:to:subject:reply-to :user-agent:mime-version:date:message-id:from:dkim-signature; bh=+CMbhE83gVdE7/6b871iYz3oVRssgurvombxQrmFMGA=; fh=E+MDon2jpPoZ5rOndeCdgV1sjs7dy5O+Won4lAVhGJg=; b=z80ZegfV3ZZJcCMBHHNJamWGX0YLm0EAecvUleVGKJiRwXWotsg8C106um7BblwT1E FpkmXqwuaMIDVWnyNQzx0RvPBSa/gfeBWUPUx8WxI2QZDa8PCtd0t94U9uFfuBMm8x/m WBT5rjM0F+3xVs/xypJIcbg60RwodfPGz9g+i3xyX0vtBALn3mv8NaIRRsiEOFYWIVXK 9epD+P9Sr8MXjq3RWcG/Rkca7QzktUzNG3ne1pvu7KTOt1eN3IffbvOq342A7Ncq6uxb HyvzuAytFrRWftzsTBOIGfeeSQZKlopqewy7F5QCQsMPiizwp56iNfPhr5LxzSjfBvq2 cVAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=MIFUX4b+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id j8-20020a170902da8800b001cc3480e703si3678958plx.517.2023.11.01.10.02.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Nov 2023 10:02:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=MIFUX4b+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 6CA6B80CC134; Wed, 1 Nov 2023 10:02:45 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344277AbjKARCb (ORCPT + 99 others); Wed, 1 Nov 2023 13:02:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41726 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231233AbjKARCa (ORCPT ); Wed, 1 Nov 2023 13:02:30 -0400 Received: from mail-wm1-x333.google.com (mail-wm1-x333.google.com [IPv6:2a00:1450:4864:20::333]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A8D9FD; Wed, 1 Nov 2023 10:02:27 -0700 (PDT) Received: by mail-wm1-x333.google.com with SMTP id 5b1f17b1804b1-4084b0223ccso57975e9.2; Wed, 01 Nov 2023 10:02:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1698858146; x=1699462946; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:organization:content-language :references:cc:to:subject:reply-to:user-agent:mime-version:date :message-id:from:from:to:cc:subject:date:message-id:reply-to; bh=+CMbhE83gVdE7/6b871iYz3oVRssgurvombxQrmFMGA=; b=MIFUX4b+NiW5ZuVc4kXsUXi0R6CJD9RJcHaYDScjm6JI4L+UwEzEKyU+TMEeoXJFd7 rXCJFc7LN6BWa39ILHKtzSIRPCtUF6mCkf2AmxgP657sXfAr/lNhW3ZdSabPPHldNGXa +s2/JRA/lcvN91aLvDD44VZmKEUraoS+LHL7vmcEJ5xDm8NcmMZdQ2PLinTWHqK0S8cf vp468gzJG1DtI3ij6+9w8WngpdRYn5+j+C7OhuJ5/xNsj3bkocOZ354avilG3BMstnoq yccD+LXMo73+Xua7gbcsqa5lX89fkq8RWhvw4AxUy9JmUNLdvXtfNl/f58jFnCzOOsO/ iqEw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698858146; x=1699462946; h=content-transfer-encoding:in-reply-to:organization:content-language :references:cc:to:subject:reply-to:user-agent:mime-version:date :message-id:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=+CMbhE83gVdE7/6b871iYz3oVRssgurvombxQrmFMGA=; b=mD16JIKf7KejNf6SvTVMIcqDoSeQbgQS2IcsRP9Trf8cHRequcta+KH4qHWJ3xnc3S bc/R4RjjL5Q8Bb2NoK7dqeIVXLpwj/7beYPszQulOK5nPtfvdmYIrIKBAXvNujI5XnqH y1iPISY15UjzKRBbx+S3Fn7Ie4TpgoKvHKKX/M2Utaco4XERVzWseJOaiCikl/E5FqnR ad9Lkdzpg3J/DojNX3dOjbIv8WVTlYjPgZRYDUN3AqE2bJVQ4EXiCxqubu0gInr8A8Y5 70UPaq030kbB3iq92lWZlif2dW9K4iNLa7PDg1+lMu2qsVm9HyaWuYHFu6fF7I5S+5J3 LO8w== X-Gm-Message-State: AOJu0Yy4nXTXfd08SGaU4g9eyqzHv7bopZaqVAomnby7QhMuRmdXIEBh QyOkI2Np2WSsu4RH8YqsKskH+6AFVXmKgA== X-Received: by 2002:a05:600c:3d0e:b0:408:3bbd:4a82 with SMTP id bh14-20020a05600c3d0e00b004083bbd4a82mr13715339wmb.15.1698858145536; Wed, 01 Nov 2023 10:02:25 -0700 (PDT) Received: from [192.168.14.111] (54-240-197-236.amazon.com. [54.240.197.236]) by smtp.gmail.com with ESMTPSA id h12-20020a05600c314c00b0040641a9d49bsm239900wmo.17.2023.11.01.10.02.24 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 01 Nov 2023 10:02:24 -0700 (PDT) From: Paul Durrant X-Google-Original-From: Paul Durrant Message-ID: <8b4fda17-07c3-4633-bf61-8b3829384c29@xen.org> Date: Wed, 1 Nov 2023 17:02:23 +0000 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Reply-To: paul@xen.org Subject: Re: [PATCH v3] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT To: Sean Christopherson Cc: Paolo Bonzini , Jonathan Corbet , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , David Woodhouse , kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org References: <20231101112934.631344-1-paul@xen.org> Content-Language: en-US Organization: Xen Project In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Wed, 01 Nov 2023 10:02:45 -0700 (PDT) On 01/11/2023 16:46, Sean Christopherson wrote: > On Wed, Nov 01, 2023, Paul Durrant wrote: >> @@ -3231,12 +3245,15 @@ static int kvm_guest_time_update(struct kvm_vcpu *v) >> vcpu->hv_clock.flags = pvclock_flags; >> >> if (vcpu->pv_time.active) >> - kvm_setup_guest_pvclock(v, &vcpu->pv_time, 0); >> + kvm_setup_guest_pvclock(v, &vcpu->pv_time, 0, false); >> + >> if (vcpu->xen.vcpu_info_cache.active) >> kvm_setup_guest_pvclock(v, &vcpu->xen.vcpu_info_cache, >> - offsetof(struct compat_vcpu_info, time)); >> + offsetof(struct compat_vcpu_info, time), >> + xen_pvclock_tsc_unstable); >> if (vcpu->xen.vcpu_time_info_cache.active) >> - kvm_setup_guest_pvclock(v, &vcpu->xen.vcpu_time_info_cache, 0); >> + kvm_setup_guest_pvclock(v, &vcpu->xen.vcpu_time_info_cache, 0, >> + xen_pvclock_tsc_unstable); >> kvm_hv_setup_tsc_page(v->kvm, &vcpu->hv_clock); >> return 0; > > Please rebase, this conflicts with commit ee11ab6bb04e ("KVM: X86: Reduce size of > kvm_vcpu_arch structure when CONFIG_KVM_XEN=n"). I can solve the conflict, but > I really shouldn't have to. > > Also, your version of git should support --base, which makes life much easier for > others when non-trivial conflicts are encountered. From maintainer-kvm-x86.rst: > > : Git Base > : ~~~~~~~~ > : If you are using git version 2.9.0 or later (Googlers, this is all of you!), > : use ``git format-patch`` with the ``--base`` flag to automatically include the > : base tree information in the generated patches. > : > : Note, ``--base=auto`` works as expected if and only if a branch's upstream is > : set to the base topic branch, e.g. it will do the wrong thing if your upstream > : is set to your personal repository for backup purposes. An alternative "auto" > : solution is to derive the names of your development branches based on their > : KVM x86 topic, and feed that into ``--base``. E.g. ``x86/pmu/my_branch_name``, > : and then write a small wrapper to extract ``pmu`` from the current branch name > : to yield ``--base=x/pmu``, where ``x`` is whatever name your repository uses to > : track the KVM x86 remote. > Ok, I'll sort that out. Thanks for the tip. >> @@ -4531,7 +4548,8 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) >> KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | >> KVM_XEN_HVM_CONFIG_SHARED_INFO | >> KVM_XEN_HVM_CONFIG_EVTCHN_2LEVEL | >> - KVM_XEN_HVM_CONFIG_EVTCHN_SEND; >> + KVM_XEN_HVM_CONFIG_EVTCHN_SEND | >> + KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE; >> if (sched_info_on()) >> r |= KVM_XEN_HVM_CONFIG_RUNSTATE | >> KVM_XEN_HVM_CONFIG_RUNSTATE_UPDATE_FLAG; >> diff --git a/arch/x86/kvm/xen.c b/arch/x86/kvm/xen.c >> index 40edf4d1974c..7699d94f190b 100644 >> --- a/arch/x86/kvm/xen.c >> +++ b/arch/x86/kvm/xen.c >> @@ -1111,9 +1111,12 @@ int kvm_xen_write_hypercall_page(struct kvm_vcpu *vcpu, u64 data) >> >> int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc) >> { >> + bool update_pvclock = false; >> + >> /* Only some feature flags need to be *enabled* by userspace */ >> u32 permitted_flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | >> - KVM_XEN_HVM_CONFIG_EVTCHN_SEND; >> + KVM_XEN_HVM_CONFIG_EVTCHN_SEND | >> + KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE; >> >> if (xhc->flags & ~permitted_flags) >> return -EINVAL; >> @@ -1134,9 +1137,19 @@ int kvm_xen_hvm_config(struct kvm *kvm, struct kvm_xen_hvm_config *xhc) >> else if (!xhc->msr && kvm->arch.xen_hvm_config.msr) >> static_branch_slow_dec_deferred(&kvm_xen_enabled); >> >> + if ((kvm->arch.xen_hvm_config.flags & >> + KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE) != >> + (xhc->flags & >> + KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE)) >> + update_pvclock = true; > > Rather than a boolean and the above, which is a bit hard to parse, what about > taking a snapshot of the old flags and then doing an XOR? > > /* Only some feature flags need to be *enabled* by userspace */ > u32 permitted_flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | > KVM_XEN_HVM_CONFIG_EVTCHN_SEND | > KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE; > u32 old_flags; > > if (xhc->flags & ~permitted_flags) > return -EINVAL; > > /* > * With hypercall interception the kernel generates its own > * hypercall page so it must not be provided. > */ > if ((xhc->flags & KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL) && > (xhc->blob_addr_32 || xhc->blob_addr_64 || > xhc->blob_size_32 || xhc->blob_size_64)) > return -EINVAL; > > mutex_lock(&kvm->arch.xen.xen_lock); > > if (xhc->msr && !kvm->arch.xen_hvm_config.msr) > static_branch_inc(&kvm_xen_enabled.key); > else if (!xhc->msr && kvm->arch.xen_hvm_config.msr) > static_branch_slow_dec_deferred(&kvm_xen_enabled); > > old_flags = kvm->arch.xen_hvm_config.flags; > memcpy(&kvm->arch.xen_hvm_config, xhc, sizeof(*xhc)); > > mutex_unlock(&kvm->arch.xen.xen_lock); > > if ((old_flags ^ xhc->flags) & KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE) > kvm_make_all_cpus_request(kvm, KVM_REQ_CLOCK_UPDATE); > > return 0; Sure, I can do it that way if you prefer. Paul