From: Jon Kohler <jon@nutanix.com>
To: Sean Christopherson <seanjc@google.com>,
Paolo Bonzini <pbonzini@redhat.com>,
Thomas Gleixner <tglx@linutronix.de>,
Ingo Molnar <mingo@redhat.com>, Borislav Petkov <bp@alien8.de>,
Dave Hansen <dave.hansen@linux.intel.com>,
x86@kernel.org, "H. Peter Anvin" <hpa@zytor.com>,
kvm@vger.kernel.org, linux-kernel@vger.kernel.org
Cc: Jon Kohler <jon@nutanix.com>
Subject: [PATCH] KVM: X86: set EXITING_GUEST_MODE as soon as vCPU exits
Date: Tue, 29 Nov 2022 13:22:25 -0500 [thread overview]
Message-ID: <20221129182226.82087-1-jon@nutanix.com> (raw)
Set vcpu->mode to EXITING_GUEST_MODE as soon vCPU exits to reflect
that we are indeed exiting guest mode, but not quite out of guest
mode yet. Note: This is done lazily without an explicit memory
barrier so that we do not regress the cost in the critical path
of going from the exit to the exit handler.
Flip back to IN_GUEST_MODE for exits that use
EXIT_FASTPATH_REENTER_GUEST, such that we are IN_GUEST_MODE upon
reentry.
Changing vcpu->mode away from IN_GUEST_MODE as early as possible
gives IPI senders as much runway as possible to avoid ringing
doorbell or sending posted interrupt IPI in AMD and Intel,
respectively. Since this is done without an explicit memory
barrier, the worst case is that the IPI sender sees IN_GUEST_MODE
still and sends a spurious event, which is the behavior prior
to this patch.
Signed-off-by: Jon Kohler <jon@nutanix.com>
---
arch/x86/kvm/svm/svm.c | 7 +++++++
arch/x86/kvm/vmx/vmx.c | 23 +++++++++++++++++++++++
arch/x86/kvm/x86.c | 8 ++++++++
3 files changed, 38 insertions(+)
diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c
index ce362e88a567..5f0c118a3ffd 100644
--- a/arch/x86/kvm/svm/svm.c
+++ b/arch/x86/kvm/svm/svm.c
@@ -3907,6 +3907,13 @@ static noinstr void svm_vcpu_enter_exit(struct kvm_vcpu *vcpu, bool spec_ctrl_in
else
__svm_vcpu_run(svm, spec_ctrl_intercepted);
+ /* Optimize IPI reduction by setting mode immediately after vmexit
+ * without a memmory barrier as this as not paired anywhere. vcpu->mode
+ * is will be set to OUTSIDE_GUEST_MODE in x86 common code with a memory
+ * barrier, after the host is done fully restoring various host states.
+ */
+ vcpu->mode = EXITING_GUEST_MODE;
+
guest_state_exit_irqoff();
}
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 63247c57c72c..243dcb87c727 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -5878,6 +5878,17 @@ static fastpath_t handle_fastpath_preemption_timer(struct kvm_vcpu *vcpu)
if (!vmx->req_immediate_exit &&
!unlikely(vmx->loaded_vmcs->hv_timer_soft_disabled)) {
+ /* Reset IN_GUEST_MODE since we're going to reenter
+ * guest as part of this fast path. This is done as
+ * an optimization without a memory barrier since
+ * EXITING_GUEST_MODE is also set without a memory
+ * barrier. This also needs to be reset prior to
+ * calling apic_timer_expired() so that
+ * kvm_use_posted_timer_interrupt() returns the proper
+ * value.
+ */
+ if (vcpu->mode == EXITING_GUEST_MODE)
+ vcpu->mode = IN_GUEST_MODE;
kvm_lapic_expired_hv_timer(vcpu);
return EXIT_FASTPATH_REENTER_GUEST;
}
@@ -7031,6 +7042,18 @@ void noinstr vmx_update_host_rsp(struct vcpu_vmx *vmx, unsigned long host_rsp)
void noinstr vmx_spec_ctrl_restore_host(struct vcpu_vmx *vmx,
unsigned int flags)
{
+ struct kvm_vcpu *vcpu = &vmx->vcpu;
+
+ /* Optimize IPI reduction by setting mode immediately after vmexit
+ * without a memmory barrier as this as not paired anywhere. vcpu->mode
+ * is will be set to OUTSIDE_GUEST_MODE in x86 common code with a memory
+ * barrier, after the host is done fully restoring various host states.
+ * Since the rdmsr and wrmsr below are expensive, this must be done
+ * first, so that the IPI suppression window covers the time dealing
+ * with fixing up SPEC_CTRL.
+ */
+ vcpu->mode = EXITING_GUEST_MODE;
+
u64 hostval = this_cpu_read(x86_spec_ctrl_current);
if (!cpu_feature_enabled(X86_FEATURE_MSR_SPEC_CTRL))
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 2835bd796639..0e0d228f3fa5 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -2160,6 +2160,14 @@ fastpath_t handle_fastpath_set_msr_irqoff(struct kvm_vcpu *vcpu)
data = kvm_read_edx_eax(vcpu);
if (!handle_fastpath_set_tscdeadline(vcpu, data)) {
kvm_skip_emulated_instruction(vcpu);
+ /* Reset IN_GUEST_MODE since we're going to reenter
+ * guest as part of this fast path. This is done as
+ * an optimization without a memory barrier since
+ * EXITING_GUEST_MODE is also set without a memory
+ * barrier.
+ */
+ if (vcpu->mode == EXITING_GUEST_MODE)
+ vcpu->mode = IN_GUEST_MODE;
ret = EXIT_FASTPATH_REENTER_GUEST;
}
break;
--
2.30.1 (Apple Git-130)
next reply other threads:[~2022-11-29 18:23 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-29 18:22 Jon Kohler [this message]
2022-11-29 19:47 ` [PATCH] KVM: X86: set EXITING_GUEST_MODE as soon as vCPU exits Maxim Levitsky
2022-11-29 19:56 ` Jon Kohler
2022-12-01 15:45 ` Maxim Levitsky
2022-11-30 6:29 ` Chao Gao
2022-11-30 14:07 ` Jon Kohler
2022-12-01 4:55 ` Chao Gao
2022-12-01 14:57 ` Jon Kohler
2022-12-01 19:17 ` Sean Christopherson
2022-12-05 15:09 ` Jon Kohler
2022-12-07 20:18 ` Sean Christopherson
2022-12-09 8:06 ` Paolo Bonzini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221129182226.82087-1-jon@nutanix.com \
--to=jon@nutanix.com \
--cc=bp@alien8.de \
--cc=dave.hansen@linux.intel.com \
--cc=hpa@zytor.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=pbonzini@redhat.com \
--cc=seanjc@google.com \
--cc=tglx@linutronix.de \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox