From: Christoffer Dall <cdall@linaro.org>
To: Christian Borntraeger <borntraeger@de.ibm.com>
Cc: linux-mips@linux-mips.org, kvm@vger.kernel.org,
Marc Zyngier <marc.zyngier@arm.com>,
James Hogan <jhogan@kernel.org>,
Cornelia Huck <cohuck@redhat.com>,
kvm-ppc@vger.kernel.org, Alexander Graf <agraf@suse.com>,
linux-arm-kernel@lists.infradead.org,
Paolo Bonzini <pbonzini@redhat.com>,
linux-s390@vger.kernel.org, kvmarm@lists.cs.columbia.edu
Subject: Re: [RFC PATCH] KVM: Only register preempt notifiers and load arch cpu state as needed
Date: Thu, 23 Nov 2017 19:32:55 +0100 [thread overview]
Message-ID: <20171123183255.GD28855@cbox> (raw)
In-Reply-To: <57693a50-e682-9b3b-7d8c-c46b66e33d84@de.ibm.com>
On Thu, Nov 23, 2017 at 07:05:07PM +0100, Christian Borntraeger wrote:
>
>
> On 11/23/2017 06:06 PM, Christoffer Dall wrote:
> > On Thu, Nov 23, 2017 at 05:17:00PM +0100, Paolo Bonzini wrote:
> >> On 23/11/2017 17:05, Christoffer Dall wrote:
> >>> For example,
> >>> arm64 is about to do significant work in vcpu load/put when running a
> >>> vcpu, but not when doing things like KVM_SET_ONE_REG or
> >>> KVM_SET_MP_STATE.
> >>
> >> Out of curiosity, in what circumstances are these ioctls a hot path?
> >> Especially KVM_SET_MP_STATE.
> >>
> >
> > Perhaps my commit message was misleading; we only want to do that for
> > KVM_RUN, and not for anything else. We're already doing things like
> > potentially jumping to hyp mode and flushing VMIDs which really
> > shouldn't be done unless we actually plan on running a VCPU, and we're
> > going to do things like setting up the timer to handle timer interrupts
> > in an ISR, which doesn't make sense unless the VCPU is running.
> >
> > Add to that, that loading an entire VM's state onto hardware, only to
> > read back a single register from hardware and returning it to user
> > space, doesn't really fall within optimization vs. non-optimization in
> > the critical path, but is just wrong, IMHO.
> >
> >>> Hi all,
> >>>
> >>> Drew suggested this as an alternative approach to recording the ioctl
> >>> number on the vcpu struct [1] as it may benefit other architectures in
> >>> general.
> >>>
> >>> I had a look at some of the specific ioctls across architectures, but
> >>> must admit that I can't easily tell which architecture specific logic
> >>> relies on having registered preempt notifiers and having called the
> >>> architecture specific load function.
> >>>
> >>> It would be great if you would let me know if you think this is
> >>> generally useful or if you prefer the less invasive approach, and in
> >>> case this is useful, if you could have a look at all the vcpu ioctls for
> >>> your architecture and let me know if I am being too loose or too
> >>> careful in calling __vcpu_load() in this patch.
> >>
> >> I can suggest a third approach:
> >>
> >> if (ioctl == KVM_GET_ONE_REG || ioctl == KVM_SET_ONE_REG)
> >> return kvm_arch_vcpu_ioctl(filp, ioctl, arg);
> >>
> >> in kvm_vcpu_ioctl before "r = vcpu_load(vcpu);", or even better:
> >>
> >> if (ioctl == KVM_GET_ONE_REG)
> >> // call kvm_arch_vcpu_get_one_reg_ioctl(vcpu, ®);
> >> // and do copy_to_user
> >> return kvm_vcpu_get_one_reg_ioctl(vcpu, arg);
> >> if (ioctl == KVM_SET_ONE_REG)
> >> // do copy_from_user then call
> >> // kvm_arch_vcpu_set_one_reg_ioctl(vcpu, ®);
> >> return kvm_vcpu_set_one_reg_ioctl(vcpu, arg);
> >>
> >> so that the kvm_arch_vcpu_get/set_one_reg_ioctl functions are called
> >> without the lock.
> >>
> >> Then all architectures except ARM can be switched to do
> >> vcpu_load/vcpu_put in kvm_arch_vcpu_get/set_one_reg_ioctl
> >
> > That doesn't solve my need as I want to *only* do the arch vcpu_load for
> > KVM_RUN, I should have been more clear in the commit message.
>
> What about splitting arch_vcpu_load/put into two callbacks and call the 2nd
> one only for VCPU_run? e.g. keep arch_vcpu_load and add arch_vcpu_load_run
> and arch_vcpu_unload_run
>
> Then every architecture can move things from arch_vcpu_load into arch_vcpu_load_run
> if its only necessary for RUN.
>
Unfortunately that doesn't work because the preempt notifiers don't know
which of the two functions they should call.
Thanks,
-Christoffer
prev parent reply other threads:[~2017-11-23 18:32 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-11-23 16:05 [RFC PATCH] KVM: Only register preempt notifiers and load arch cpu state as needed Christoffer Dall
2017-11-23 16:17 ` Paolo Bonzini
2017-11-23 17:06 ` Christoffer Dall
2017-11-23 17:12 ` Paolo Bonzini
2017-11-23 17:48 ` Christoffer Dall
2017-11-23 18:16 ` Paolo Bonzini
2017-11-23 18:32 ` Christoffer Dall
2017-11-23 18:43 ` Paolo Bonzini
2017-11-23 18:05 ` Christian Borntraeger
2017-11-23 18:32 ` Christoffer Dall [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20171123183255.GD28855@cbox \
--to=cdall@linaro.org \
--cc=agraf@suse.com \
--cc=borntraeger@de.ibm.com \
--cc=cohuck@redhat.com \
--cc=jhogan@kernel.org \
--cc=kvm-ppc@vger.kernel.org \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.cs.columbia.edu \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-mips@linux-mips.org \
--cc=linux-s390@vger.kernel.org \
--cc=marc.zyngier@arm.com \
--cc=pbonzini@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).