kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Joerg Roedel <joro@8bytes.org>
To: Alexander Graf <agraf@suse.de>
Cc: kvm@vger.kernel.org, anthony@codemonkey.ws, avi@qumranet.com
Subject: Re: [PATCH 4/9] Implement GIF, clgi and stgi v3
Date: Thu, 25 Sep 2008 20:47:59 +0200	[thread overview]
Message-ID: <20080925184759.GL27426@8bytes.org> (raw)
In-Reply-To: <1221658886-14109-5-git-send-email-agraf@suse.de>

I had another possible idea for performance improvement here. Since we
only inject normal interrupts and exceptions (and not NMI and such) we
can patch clgi to cli and stgi to sti to save these two intercepts in
the guests vmrun path.
Any objections/problems with this?

On Wed, Sep 17, 2008 at 03:41:21PM +0200, Alexander Graf wrote:
> This patch implements the GIF flag and the clgi and stgi instructions that
> set this flag. Only if the flag is set (default), interrupts can be received by
> the CPU.
> 
> To keep the information about that somewhere, this patch adds a new hidden
> flags vector. that is used to store information that does not go into the
> vmcb, but is SVM specific.
> 
> v2 moves the hflags to x86 generic code
> v3 makes use of the new permission helper
> 
> Signed-off-by: Alexander Graf <agraf@suse.de>
> ---
>  arch/x86/kvm/svm.c         |   42 +++++++++++++++++++++++++++++++++++++++---
>  include/asm-x86/kvm_host.h |    3 +++
>  2 files changed, 42 insertions(+), 3 deletions(-)
> 
> diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
> index c72e728..469ecc5 100644
> --- a/arch/x86/kvm/svm.c
> +++ b/arch/x86/kvm/svm.c
> @@ -612,6 +612,8 @@ static void init_vmcb(struct vcpu_svm *svm)
>  		save->cr4 = 0;
>  	}
>  	force_new_asid(&svm->vcpu);
> +
> +	svm->vcpu.arch.hflags = HF_GIF_MASK;
>  }
>  
>  static int svm_vcpu_reset(struct kvm_vcpu *vcpu)
> @@ -1227,6 +1229,36 @@ static int nested_svm_do(struct vcpu_svm *svm,
>  	return retval;
>  }
>  
> +static int stgi_interception(struct vcpu_svm *svm, struct kvm_run *kvm_run)
> +{
> +	if (nested_svm_check_permissions(svm))
> +		return 1;
> +
> +	svm->next_rip = kvm_rip_read(&svm->vcpu) + 3;
> +	skip_emulated_instruction(&svm->vcpu);
> +
> +	svm->vcpu.arch.hflags |= HF_GIF_MASK;
> +
> +	return 1;
> +}
> +
> +static int clgi_interception(struct vcpu_svm *svm, struct kvm_run *kvm_run)
> +{
> +	if (nested_svm_check_permissions(svm))
> +		return 1;
> +
> +	svm->next_rip = kvm_rip_read(&svm->vcpu) + 3;
> +	skip_emulated_instruction(&svm->vcpu);
> +
> +	svm->vcpu.arch.hflags &= ~HF_GIF_MASK;
> +
> +	/* After a CLGI no interrupts should come */
> +	svm_clear_vintr(svm);
> +	svm->vmcb->control.int_ctl &= ~V_IRQ_MASK;
> +
> +	return 1;
> +}
> +
>  static int invalid_op_interception(struct vcpu_svm *svm,
>  				   struct kvm_run *kvm_run)
>  {
> @@ -1521,8 +1553,8 @@ static int (*svm_exit_handlers[])(struct vcpu_svm *svm,
>  	[SVM_EXIT_VMMCALL]			= vmmcall_interception,
>  	[SVM_EXIT_VMLOAD]			= invalid_op_interception,
>  	[SVM_EXIT_VMSAVE]			= invalid_op_interception,
> -	[SVM_EXIT_STGI]				= invalid_op_interception,
> -	[SVM_EXIT_CLGI]				= invalid_op_interception,
> +	[SVM_EXIT_STGI]				= stgi_interception,
> +	[SVM_EXIT_CLGI]				= clgi_interception,
>  	[SVM_EXIT_SKINIT]			= invalid_op_interception,
>  	[SVM_EXIT_WBINVD]                       = emulate_on_interception,
>  	[SVM_EXIT_MONITOR]			= invalid_op_interception,
> @@ -1669,6 +1701,9 @@ static void svm_intr_assist(struct kvm_vcpu *vcpu)
>  	if (!kvm_cpu_has_interrupt(vcpu))
>  		goto out;
>  
> +	if (!(svm->vcpu.arch.hflags & HF_GIF_MASK))
> +		goto out;
> +
>  	if (!(vmcb->save.rflags & X86_EFLAGS_IF) ||
>  	    (vmcb->control.int_state & SVM_INTERRUPT_SHADOW_MASK) ||
>  	    (vmcb->control.event_inj & SVM_EVTINJ_VALID)) {
> @@ -1720,7 +1755,8 @@ static void do_interrupt_requests(struct kvm_vcpu *vcpu,
>  
>  	svm->vcpu.arch.interrupt_window_open =
>  		(!(control->int_state & SVM_INTERRUPT_SHADOW_MASK) &&
> -		 (svm->vmcb->save.rflags & X86_EFLAGS_IF));
> +		 (svm->vmcb->save.rflags & X86_EFLAGS_IF) &&
> +		 (svm->vcpu.arch.hflags & HF_GIF_MASK));
>  
>  	if (svm->vcpu.arch.interrupt_window_open && svm->vcpu.arch.irq_summary)
>  		/*
> diff --git a/include/asm-x86/kvm_host.h b/include/asm-x86/kvm_host.h
> index 982b6b2..3e25004 100644
> --- a/include/asm-x86/kvm_host.h
> +++ b/include/asm-x86/kvm_host.h
> @@ -245,6 +245,7 @@ struct kvm_vcpu_arch {
>  	unsigned long cr3;
>  	unsigned long cr4;
>  	unsigned long cr8;
> +	u32 hflags;
>  	u64 pdptrs[4]; /* pae */
>  	u64 shadow_efer;
>  	u64 apic_base;
> @@ -734,6 +735,8 @@ enum {
>  	TASK_SWITCH_GATE = 3,
>  };
>  
> +#define HF_GIF_MASK		(1 << 0)
> +
>  /*
>   * Hardware virtualization extension instructions may fault if a
>   * reboot turns off virtualization while processes are running.
> -- 
> 1.5.6

  parent reply	other threads:[~2008-09-25 18:48 UTC|newest]

Thread overview: 30+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-09-17 13:41 [PATCH 0/9] Add support for nested SVM (kernel) v3 Alexander Graf
2008-09-17 13:41 ` [PATCH 1/9] Add CPUID feature flag for SVM v3 Alexander Graf
2008-09-17 13:41   ` [PATCH 2/9] Clean up VINTR setting v3 Alexander Graf
2008-09-17 13:41     ` [PATCH 3/9] Add helper functions for nested SVM v3 Alexander Graf
2008-09-17 13:41       ` [PATCH 4/9] Implement GIF, clgi and stgi v3 Alexander Graf
2008-09-17 13:41         ` [PATCH 5/9] Implement hsave v3 Alexander Graf
2008-09-17 13:41           ` [PATCH 6/9] Add VMLOAD and VMSAVE handlers v3 Alexander Graf
2008-09-17 13:41             ` [PATCH 7/9] Add VMRUN handler v3 Alexander Graf
2008-09-17 13:41               ` [PATCH 8/9] Add VMEXIT handler and intercepts v3 Alexander Graf
2008-09-17 13:41                 ` [PATCH 9/9] Allow setting the SVME bit v3 Alexander Graf
2008-09-19 15:59               ` [PATCH 7/9] Add VMRUN handler v3 Joerg Roedel
2008-09-25 17:32                 ` Alexander Graf
2008-09-25 17:37                   ` Joerg Roedel
2008-09-25 20:00                     ` Alexander Graf
2008-09-25 21:22                       ` joro
2008-09-27 12:59                         ` Avi Kivity
2008-09-27 12:58                       ` Avi Kivity
2008-09-25 18:47         ` Joerg Roedel [this message]
2008-09-25 19:55           ` [PATCH 4/9] Implement GIF, clgi and stgi v3 Alexander Graf
2008-09-25 21:27             ` Joerg Roedel
2008-09-26  9:01               ` Alexander Graf
2008-09-27 12:55                 ` Avi Kivity
2008-09-27 12:52           ` Avi Kivity
2008-09-19 14:36 ` [PATCH 0/9] Add support for nested SVM (kernel) v3 Joerg Roedel
2008-09-19 14:39   ` Joerg Roedel
2008-09-19 15:56   ` Joerg Roedel
2008-10-15 17:07     ` Alexander Graf
2008-09-19 21:48 ` First performance numbers Joerg Roedel
2008-09-20  1:30   ` Avi Kivity
2008-09-20  6:55     ` Joerg Roedel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20080925184759.GL27426@8bytes.org \
    --to=joro@8bytes.org \
    --cc=agraf@suse.de \
    --cc=anthony@codemonkey.ws \
    --cc=avi@qumranet.com \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).