From: Andrew Cooper <andrew.cooper3@citrix.com>
To: "Roger Pau Monné" <roger.pau@citrix.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <stefano.stabellini@citrix.com>,
Ian Campbell <ian.campbell@citrix.com>,
Jan Beulich <jbeulich@suse.com>
Subject: Re: [PATCH v5 24/28] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs
Date: Mon, 24 Aug 2015 12:57:41 +0100 [thread overview]
Message-ID: <55DB06B5.8030406@citrix.com> (raw)
In-Reply-To: <55DAF554.7080003@citrix.com>
On 24/08/15 11:43, Roger Pau Monné wrote:
> El 21/08/15 a les 22.36, Andrew Cooper ha escrit:
>> On 21/08/15 17:53, Roger Pau Monne wrote:
>>> Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
>>> VCPUOP_is_up hypercalls from HVM guests.
>>>
>>> This patch introduces a new structure (vcpu_hvm_context) that should be used
>>> in conjuction with the VCPUOP_initialise hypercall in order to initialize
>>> vCPUs for HVM guests.
>>>
>>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
>>> Cc: Jan Beulich <jbeulich@suse.com>
>>> Cc: Andrew Cooper <andrew.cooper3@citrix.com>
>>> Cc: Ian Campbell <ian.campbell@citrix.com>
>>> Cc: Stefano Stabellini <stefano.stabellini@citrix.com>
>>> ---
>>> Changes since v4:
>>> - Don't assume mode is 64B, add an explicit check.
>>> - Don't set TF_kernel_mode, it is only needed for PV guests.
>>> - Don't set CR0_ET unconditionally.
>>> ---
>>> xen/arch/arm/domain.c | 24 ++++++
>>> xen/arch/x86/domain.c | 164 +++++++++++++++++++++++++++++++++++++
>>> xen/arch/x86/hvm/hvm.c | 8 ++
>>> xen/common/domain.c | 16 +---
>>> xen/include/public/hvm/hvm_vcpu.h | 168 ++++++++++++++++++++++++++++++++++++++
>>> xen/include/xen/domain.h | 2 +
>>> 6 files changed, 367 insertions(+), 15 deletions(-)
>>> create mode 100644 xen/include/public/hvm/hvm_vcpu.h
>>>
>>> diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
>>> index b2bfc7d..b20035d 100644
>>> --- a/xen/arch/arm/domain.c
>>> +++ b/xen/arch/arm/domain.c
>>> @@ -752,6 +752,30 @@ int arch_set_info_guest(
>>> return 0;
>>> }
>>>
>>> +int arch_initialize_vcpu(struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
>>> +{
>>> + struct vcpu_guest_context *ctxt;
>>> + struct domain *d = current->domain;
>>> + int rc;
>>> +
>>> + if ( (ctxt = alloc_vcpu_guest_context()) == NULL )
>>> + return -ENOMEM;
>> I have posted my "remove alloc_vcpu_guest_context()" patch to the list
>> for reference as it interacts with this patch. I don't mind rebasing
>> it, but it might also influence this patch.
> Thanks, I was planning to add such a patch to the series because of your
> comments in the previous round, but completely forgot about it, sorry.
>
> I don't mind picking it up and adding it to my series if now it's too
> late in the release process to commit it.
The patch in definitely 4.7 material at this point. I will respin it
with an improved commit message, per konrads implied request.
>>> +
>>> + memset(&seg, 0, sizeof(seg));
>>> +
>>> + if ( !paging_mode_hap(v->domain) )
>>> + v->arch.guest_table = pagetable_null();
>>> +
>>> + v->arch.user_regs.rax = get_context_gpr(ctx, ax);
>>> + v->arch.user_regs.rcx = get_context_gpr(ctx, cx);
>>> + v->arch.user_regs.rdx = get_context_gpr(ctx, dx);
>>> + v->arch.user_regs.rbx = get_context_gpr(ctx, bx);
>>> + v->arch.user_regs.rsp = get_context_gpr(ctx, sp);
>>> + v->arch.user_regs.rbp = get_context_gpr(ctx, bp);
>>> + v->arch.user_regs.rsi = get_context_gpr(ctx, si);
>>> + v->arch.user_regs.rdi = get_context_gpr(ctx, di);
>>> + v->arch.user_regs.rip = get_context_gpr(ctx, ip);
>>> + v->arch.user_regs.rflags = get_context_gpr(ctx, flags);
>> All these hidden conditionals cause the compiler to generate a 2K
>> function, a large quantity of which are conditional jumps.
> I was expecting the compiler to be clever here and realize ctx->mode is
> always the same and perform some kind of clever optimization, but I
> guess this is too much.
C may not assume that ctx->$FOO it doesn't alias v->$BAR, and therefore
that ctx->mode doesn't change as a result of writing into v.
I tried experimenting with a "const uint32_t mode = ctx->mode" but even
that wasn't sufficient for the compiler to optimise the branches away.
Perhaps some C11 "restrict" keywords might have helped. I didn't
investigate.
>
>> I did some experimentation, available from
>> git://xenbits.xen.org/people/andrewcoop/xen.git wip-dmlite-v5-refactor
>>
>> Bloat-o-meter indicates:
>>
>> add/remove: 0/0 grow/shrink: 0/1 up/down: 0/-559 (-559)
>> function old new delta
>> arch_set_info_hvm_guest 2209 1650 -559
>>
>> And looking at the disassembly, those -559 are mostly cmp/jXX
>> constructs, and the dead panic() calls.
>>
>> The code is now longer, but I don't think it detracts from the
>> readability, and it will certainly be faster to execute.
>>
>> What do you think? If others agree, you are welcome to fold the patch
>> into your series.
> That looks fine IMHO, I can fold it into this patch and add your SoB if
> that's fine.
Completely fine.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
next prev parent reply other threads:[~2015-08-24 11:58 UTC|newest]
Thread overview: 46+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-08-21 16:53 [PATCH v5 00/28] Introduce HVM without dm and new boot ABI Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 01/28] libxc: split x86 HVM setup_guest into smaller logical functions Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 02/28] libxc: unify xc_dom_p2m_{host/guest} Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 03/28] libxc: introduce the notion of a container type Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 04/28] libxc: introduce a domain loader for HVM guest firmware Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 05/28] libxc: make arch_setup_meminit a xc_dom_arch hook Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 06/28] libxc: make arch_setup_boot{init/late} xc_dom_arch hooks Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 07/28] libxc: rework BSP initialization Roger Pau Monne
2015-08-24 18:26 ` Konrad Rzeszutek Wilk
2015-08-25 8:33 ` Roger Pau Monné
2015-08-25 9:02 ` Wei Liu
2015-08-25 9:22 ` Roger Pau Monné
2015-08-25 9:32 ` Wei Liu
2015-08-25 9:35 ` Andrew Cooper
2015-08-21 16:53 ` [PATCH v5 08/28] libxc: introduce a xc_dom_arch for hvm-3.0-x86_32 guests Roger Pau Monne
2015-08-25 9:17 ` Wei Liu
2015-08-21 16:53 ` [PATCH v5 09/28] libxl: switch HVM domain building to use xc_dom_* helpers Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 10/28] libxc: remove dead HVM building code Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 11/28] xen/x86: add bitmap of enabled emulated devices Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 12/28] xen/x86: allow disabling the emulated local apic Roger Pau Monne
2015-08-31 21:55 ` Boris Ostrovsky
2015-08-21 16:53 ` [PATCH v5 13/28] xen/x86: allow disabling the emulated HPET Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 14/28] xen/x86: allow disabling the pmtimer Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 15/28] xen/x86: allow disabling the emulated RTC Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 16/28] xen/x86: allow disabling the emulated IO APIC Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 17/28] xen/x86: allow disabling the emulated PIC Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 18/28] xen/x86: allow disabling the emulated pmu Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 19/28] xen/x86: allow disabling the emulated VGA Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 20/28] xen/x86: allow disabling the emulated IOMMU Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 21/28] xen/x86: allow disabling all emulated devices inside of Xen Roger Pau Monne
2015-08-21 17:19 ` Andrew Cooper
2015-08-21 16:53 ` [PATCH v5 22/28] elfnotes: intorduce a new PHYS_ENTRY elfnote Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 23/28] libxc: allow creating domains without emulated devices Roger Pau Monne
2015-08-21 17:42 ` Andrew Cooper
2015-08-21 16:53 ` [PATCH v5 24/28] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs Roger Pau Monne
2015-08-21 20:36 ` Andrew Cooper
2015-08-24 10:43 ` Roger Pau Monné
2015-08-24 11:57 ` Andrew Cooper [this message]
2015-08-21 16:53 ` [PATCH v5 25/28] xenconsole: try to attach to PV console if HVM fails Roger Pau Monne
2015-08-21 16:53 ` [PATCH v5 26/28] libxc/xen: introduce a start info structure for HVMlite guests Roger Pau Monne
2015-08-21 21:00 ` Andrew Cooper
2015-08-24 15:24 ` Roger Pau Monné
2015-08-21 16:53 ` [PATCH v5 27/28] libxc: switch xc_dom_elfloader to be used with HVMlite domains Roger Pau Monne
2015-08-25 9:32 ` Wei Liu
2015-08-21 16:53 ` [PATCH v5 28/28] libxl: allow the creation of HVM domains without a device model Roger Pau Monne
2015-08-25 9:30 ` Wei Liu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=55DB06B5.8030406@citrix.com \
--to=andrew.cooper3@citrix.com \
--cc=ian.campbell@citrix.com \
--cc=jbeulich@suse.com \
--cc=roger.pau@citrix.com \
--cc=stefano.stabellini@citrix.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).