From patchwork Fri Aug 14 10:08:34 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?b?UmFkaW0gS3LEjW3DocWZ?= X-Patchwork-Id: 7013811 Return-Path: X-Original-To: patchwork-kvm@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 9211C9F358 for ; Fri, 14 Aug 2015 10:12:59 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id A9D33202F2 for ; Fri, 14 Aug 2015 10:12:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id B616A202DD for ; Fri, 14 Aug 2015 10:12:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754703AbbHNKLm (ORCPT ); Fri, 14 Aug 2015 06:11:42 -0400 Received: from mx1.redhat.com ([209.132.183.28]:59125 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754494AbbHNKLk (ORCPT ); Fri, 14 Aug 2015 06:11:40 -0400 Received: from int-mx09.intmail.prod.int.phx2.redhat.com (int-mx09.intmail.prod.int.phx2.redhat.com [10.5.11.22]) by mx1.redhat.com (Postfix) with ESMTPS id 1A5B035417E; Fri, 14 Aug 2015 10:11:40 +0000 (UTC) Received: from potion (ovpn-204-19.brq.redhat.com [10.40.204.19]) by int-mx09.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with SMTP id t7EABbBJ005812; Fri, 14 Aug 2015 06:11:37 -0400 Received: by potion (sSMTP sendmail emulation); Fri, 14 Aug 2015 12:11:36 +0200 From: =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= To: linux-kernel@vger.kernel.org Cc: kvm@vger.kernel.org, Paolo Bonzini , Christian Borntraeger Subject: [PATCH v3 2/5] KVM: add KVM_REQ_EXIT request for userspace exit Date: Fri, 14 Aug 2015 12:08:34 +0200 Message-Id: <1439546917-17391-3-git-send-email-rkrcmar@redhat.com> In-Reply-To: <1439546917-17391-1-git-send-email-rkrcmar@redhat.com> References: <1439546917-17391-1-git-send-email-rkrcmar@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.68 on 10.5.11.22 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,HK_RANDOM_FROM, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP When userspace wants KVM to exit to userspace, it sends a signal. This has a disadvantage of requiring a change to the signal mask because the signal needs to be blocked in userspace to stay pending when sending to self. Using a request flag allows us to shave 200-300 cycles from every userspace exit and the speedup grows with NUMA because unblocking touches shared spinlock. The disadvantage is that it adds an overhead of one bit check for all kernel exits. A quick tracing shows that the ratio of userspace exits after boot is about 1/5 and in subsequent run of nmap and kernel compile has about 1/60, so the check should not regress global performance. All signal_pending() calls are userspace exit requests, so we add a check for KVM_REQ_EXIT there. There is one omitted call in kvm_vcpu_run because KVM_REQ_EXIT is implied in earlier check for requests. Signed-off-by: Radim Kr?má? --- arch/x86/kvm/vmx.c | 2 +- arch/x86/kvm/x86.c | 6 ++++++ include/linux/kvm_host.h | 8 +++++++- include/uapi/linux/kvm.h | 1 + virt/kvm/kvm_main.c | 2 +- 5 files changed, 16 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 40c6180a0ecb..2b789a869ef5 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -5833,7 +5833,7 @@ static int handle_invalid_guest_state(struct kvm_vcpu *vcpu) goto out; } - if (signal_pending(current)) + if (kvm_need_exit(vcpu)) goto out; if (need_resched()) schedule(); diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index e5850076bf7b..c3df7733af09 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -6548,6 +6548,11 @@ static int vcpu_run(struct kvm_vcpu *vcpu) ++vcpu->stat.signal_exits; break; } + if (unlikely(kvm_has_request(KVM_REQ_EXIT, vcpu))) { + r = 0; + vcpu->run->exit_reason = KVM_EXIT_REQUEST; + break; + } if (need_resched()) { srcu_read_unlock(&kvm->srcu, vcpu->srcu_idx); cond_resched(); @@ -6684,6 +6689,7 @@ out: post_kvm_run_save(vcpu); if (vcpu->sigset_active) sigprocmask(SIG_SETMASK, &sigsaved, NULL); + clear_bit(KVM_REQ_EXIT, &vcpu->requests); return r; } diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index 52e388367a26..dcc57171e3ec 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -121,7 +121,7 @@ static inline bool is_error_page(struct page *page) #define KVM_REQ_UNHALT 6 #define KVM_REQ_MMU_SYNC 7 #define KVM_REQ_CLOCK_UPDATE 8 -#define KVM_REQ_KICK 9 +#define KVM_REQ_EXIT 9 #define KVM_REQ_DEACTIVATE_FPU 10 #define KVM_REQ_EVENT 11 #define KVM_REQ_APF_HALT 12 @@ -1104,6 +1104,12 @@ static inline bool kvm_check_request(int req, struct kvm_vcpu *vcpu) } } +static inline bool kvm_need_exit(struct kvm_vcpu *vcpu) +{ + return signal_pending(current) || + kvm_has_request(KVM_REQ_EXIT, vcpu); +} + extern bool kvm_rebooting; struct kvm_device { diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 26daafbba9ec..d996a7cdb4d2 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -184,6 +184,7 @@ struct kvm_s390_skeys { #define KVM_EXIT_SYSTEM_EVENT 24 #define KVM_EXIT_S390_STSI 25 #define KVM_EXIT_IOAPIC_EOI 26 +#define KVM_EXIT_REQUEST 27 /* For KVM_EXIT_INTERNAL_ERROR */ /* Emulate instruction failed. */ diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index d8db2f8fce9c..347899966178 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -1914,7 +1914,7 @@ static int kvm_vcpu_check_block(struct kvm_vcpu *vcpu) } if (kvm_cpu_has_pending_timer(vcpu)) return -EINTR; - if (signal_pending(current)) + if (kvm_need_exit(vcpu)) return -EINTR; return 0;