From patchwork Fri Sep 23 10:42:45 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Joao Martins X-Patchwork-Id: 9347881 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 0A35C607D0 for ; Fri, 23 Sep 2016 10:43:39 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id ECF6E2AB0A for ; Fri, 23 Sep 2016 10:43:38 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id E1DB02AB27; Fri, 23 Sep 2016 10:43:38 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id D6A092AB0A for ; Fri, 23 Sep 2016 10:43:37 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1bnNv8-00080d-GS; Fri, 23 Sep 2016 10:41:30 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1bnNv7-00080A-Kb for xen-devel@lists.xenproject.org; Fri, 23 Sep 2016 10:41:29 +0000 Received: from [193.109.254.147] by server-6.bemta-6.messagelabs.com id A9/35-11175-8D605E75; Fri, 23 Sep 2016 10:41:28 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrNLMWRWlGSWpSXmKPExsXSO6nOVfcG29N wg1m/2Cy+b5nM5MDocfjDFZYAxijWzLyk/IoE1ow5D7ULHtVVrP6xmb2B8WJqFyMXh5DAZCaJ 2e/3sEM4fxklJnw+xtLFyAnkbGSUuNmYD5FoZJSYfmgCWIJNQE+i9fxnZhBbREBJ4t6qyUwgR cwCHYwSX86fAnI4OIQF7CSmXM4DqWERUJWYtuIuI4jNK+AhseRoO1ivhICcxPnjP8FsTgFPiV dNn9ggFntIvHrRwwRRYyzR/vYi2wRGvgWMDKsYNYpTi8pSi3QNLfWSijLTM0pyEzNzdA0NzPR yU4uLE9NTcxKTivWS83M3MQIDhQEIdjD+WBZwiFGSg0lJlLdx35NwIb6k/JTKjMTijPii0pzU 4kOMMhwcShK8E1mfhgsJFqWmp1akZeYAQxYmLcHBoyTCOwUkzVtckJhbnJkOkTrFqCglzusHk hAASWSU5sG1weLkEqOslDAvI9AhQjwFqUW5mSWo8q8YxTkYlYR5N4JM4cnMK4Gb/gpoMRPQ4m 93noAsLklESEk1MCYVnImsjvR9e/LblOU+F+8d/B4v+5HjHueCC1YbLnt1bcm7/PiKb9WpAxa Gl3dfW8V9q8f5abL+kVsb6nNmSGqtWjpJRkVWcMPFa5b/JrDnMK0K6Qnfbrll7+T4yl9X/inn qPvO/FcpY172R/rVw1nrSmS9ZL75mnj7PePc1yn7SVZsQW3wgS4lluKMREMt5qLiRACjH6H9j gIAAA== X-Env-Sender: joao.m.martins@oracle.com X-Msg-Ref: server-10.tower-27.messagelabs.com!1474627286!61000812!1 X-Originating-IP: [141.146.126.69] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogMTQxLjE0Ni4xMjYuNjkgPT4gMjc3MjE4\n X-StarScan-Received: X-StarScan-Version: 8.84; banners=-,-,- X-VirusChecked: Checked Received: (qmail 26935 invoked from network); 23 Sep 2016 10:41:27 -0000 Received: from aserp1040.oracle.com (HELO aserp1040.oracle.com) (141.146.126.69) by server-10.tower-27.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 23 Sep 2016 10:41:27 -0000 Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by aserp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id u8NAfL0C026802 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 23 Sep 2016 10:41:21 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id u8NAfL38017433 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 23 Sep 2016 10:41:21 GMT Received: from abhmp0006.oracle.com (abhmp0006.oracle.com [141.146.116.12]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id u8NAfLAI022357; Fri, 23 Sep 2016 10:41:21 GMT Received: from paddy.lan (/89.114.92.174) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 23 Sep 2016 03:41:20 -0700 From: Joao Martins To: xen-devel@lists.xenproject.org Date: Fri, 23 Sep 2016 11:42:45 +0100 Message-Id: <1474627367-8185-4-git-send-email-joao.m.martins@oracle.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1474627367-8185-1-git-send-email-joao.m.martins@oracle.com> References: <1474627367-8185-1-git-send-email-joao.m.martins@oracle.com> X-Source-IP: aserv0022.oracle.com [141.146.126.234] Cc: Andrew Cooper , Joao Martins , Jan Beulich Subject: [Xen-devel] [PATCH v5 3/5] x86/time: implement tsc as clocksource X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Recent x86/time changes improved a lot of the monotonicity in xen timekeeping, making it much harder to observe time going backwards. Although platform timer can't be expected to be perfectly in sync with TSC and so get_s_time won't be guaranteed to always return monotonically increasing values across cpus. This is the case in some of the boxes I am testing with, observing sometimes ~100 warps (of very few nanoseconds each) after a few hours. This patch introduces support for using TSC as platform time source which is the highest resolution time and most performant to get. Though there are also several problems associated with its usage, and there isn't a complete (and architecturally defined) guarantee that all machines will provide reliable and monotonic TSC in all cases (I believe Intel to be the only that can guarantee that?). For this reason it's not used unless administrator changes "clocksource" boot option to "tsc". Initializing TSC clocksource requires all CPUs up to have the tsc reliability checks performed. init_xen_time is called before all CPUs are up, so for example we would start with HPET (or ACPI, PIT) at boot time, and switch later to TSC. The switch then happens on verify_tsc_reliability initcall that is invoked when all CPUs are up. When attempting to initialize TSC we also check for time warps and if it has invariant TSC. Note that while we deem reliable a CONSTANT_TSC with no deep C-states, it might not always be the case, so we're conservative and allow TSC to be used as platform timer only with invariant TSC. Additionally we check if CPU Hotplug isn't meant to be performed on the host which will either be when max vcpus and num_present_cpu are the same. This is because a newly hotplugged CPU may not satisfy the condition of having all TSCs synchronized - so when having tsc clocksource being used we allow offlining CPUs but not onlining any ones back. Finally we prevent TSC from being used as clocksource on multiple sockets because it isn't guaranteed to be invariant. Further relaxing of this last requirement is added in a separate patch, such that we allow vendors with such guarantee to use TSC as clocksource. In case any of these conditions is not met, we keep the clocksource that was previously initialized on init_xen_time. Since b64438c7c ("x86/time: use correct (local) time stamp in constant-TSC calibration fast path") updates to cpu time use local stamps, which means platform timer is only used to seed the initial cpu time. We further introduce a new rendezvous function (nop_rendezvous) which doesn't require synchronization between master and slave CPUS and just reads calibration_rendezvous struct and writes it down the stime and stamp to the cpu_calibration struct to be used later on. With clocksource=tsc there is no need to be in sync with another clocksource, so we reseed the local/master stamps to be values of TSC and update the platform time stamps accordingly. Time calibration is set to 1sec after we switch to TSC, thus these stamps are reseeded to also ensure monotonic returning values right after the point we switch to TSC. This is to remove the possibility of having inconsistent readings in this short period (i.e. until calibration fires). Signed-off-by: Joao Martins Reviewed-by: Jan Beulich --- Cc: Jan Beulich Cc: Andrew Cooper Changes sinve v4: - Moved nop_rendezvous to this patch and along with its mention in the commit message. - Remove mention of HPET priority vs other clocksources. - Change "to avoid the possibility" into "to remove (...)" - Change TSC init messages to use warning log level and leave the last one as debug. - Change "Switched to Platform timer" message to same loglevel as the one in init_platform_timer() - Introduce "late" boolean function parameter in try_platform_timer_tail. - Do not split the if (checking for clocksource=tsc) into two lines. - Add brief comment about why TSC .counter_bits is not 64 Changes since v3: - Really fix "HPET switching to TSC" comment. Despite mentioned in the in previous version, the change wasn't there. - Remove parenthesis around the function call in init_platform_timer - Merge if on verify_tsc_reliability with opt_clocksource check - Removed comment above ".init = init_tsctimer" - Fixup docs updated into this patch. - Move host_tsc_is_clocksource() and CPU hotplug possibility check to this patch. - s/host_tsc_is_clocksource/clocksource_is_tsc - Use bool instead of bool_t - Add a comment above init_tsctimer() declaration mentioning the reliable TSC checks on verify_tsc_reliability(), under which the function is invoked. - Prevent clocksource=tsc on platforms with multiple-sockets. Further relaxing of this requirement is added in a separate patch, as extension of "tsc" boot parameter. - Removed control group to update cpu_time and do instead with on_selected_cpus to avoid any potential races. - Accomodate common path between init_xen_time and TSC switch into try_platform_timer_tail, such that finishing platform timer initialization is done in the same place (including platform timer overflow which was previously was removed in previous versions). - Changed TSC counter_bits 63 to avoid mishandling of TSC counter wrap-around in platform timer overflow timer. - Moved paragraph CPU Hotplug from last patch and add comment on commit message about multiple sockets TSC sync. - s/init_tsctimer/init_tsc/g to be consistent with other TSC platform timer functions. Changes since v2: - Suggest "HPET switching to TSC" only as an example as otherwise it would be misleading on platforms not having one. - Change init_tsctimer to skip all the tests and assume it's called only on reliable TSC conditions and no warps observed. Tidy initialization on verify_tsc_reliability as suggested by Konrad. - CONSTANT_TSC and max_cstate <= 2 case removed and only allow tsc clocksource in invariant TSC boxes. - Prefer omit !=0 on init_platform_timer for tsc case. - Change comment on init_platform_timer. - Add comment on plt_tsc declaration. - Reinit CPU time for all online cpus instead of just CPU 0. - Use rdtsc_ordered() as opposed to rdtsc() - Remove tsc_freq variable and set plt_tsc clocksource frequency with the refined tsc calibration. - Rework a bit the commit message. Changes since v1: - s/printk/printk(XENLOG_INFO - Remove extra space on inner brackets - Add missing space around brackets - Defer TSC initialization when all CPUs are up. Changes since RFC: - Spelling fixes in the commit message. - Remove unused clocksource_is_tsc variable and introduce it instead on the patch that uses it. - Move plt_tsc from second to last in the available clocksources. --- docs/misc/xen-command-line.markdown | 6 +- xen/arch/x86/platform_hypercall.c | 3 +- xen/arch/x86/time.c | 161 +++++++++++++++++++++++++++++++++--- xen/include/asm-x86/time.h | 1 + 4 files changed, 159 insertions(+), 12 deletions(-) diff --git a/docs/misc/xen-command-line.markdown b/docs/misc/xen-command-line.markdown index 3a250cb..f92fb3f 100644 --- a/docs/misc/xen-command-line.markdown +++ b/docs/misc/xen-command-line.markdown @@ -264,9 +264,13 @@ minimum of 32M, subject to a suitably aligned and sized contiguous region of memory being available. ### clocksource -> `= pit | hpet | acpi` +> `= pit | hpet | acpi | tsc` If set, override Xen's default choice for the platform timer. +Having TSC as platform timer requires being explicitly set. This is because +TSC can only be safely used if CPU hotplug isn't performed on the system. In +some platforms, "maxcpus" parameter may require further adjustment to the +number of online cpus. ### cmci-threshold > `= ` diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c index 780f22d..0879e19 100644 --- a/xen/arch/x86/platform_hypercall.c +++ b/xen/arch/x86/platform_hypercall.c @@ -631,7 +631,8 @@ ret_t do_platform_op(XEN_GUEST_HANDLE_PARAM(xen_platform_op_t) u_xenpf_op) if ( ret ) break; - if ( cpu >= nr_cpu_ids || !cpu_present(cpu) ) + if ( cpu >= nr_cpu_ids || !cpu_present(cpu) || + clocksource_is_tsc() ) { ret = -EINVAL; break; diff --git a/xen/arch/x86/time.c b/xen/arch/x86/time.c index 6305a84..128e653 100644 --- a/xen/arch/x86/time.c +++ b/xen/arch/x86/time.c @@ -475,6 +475,55 @@ uint64_t ns_to_acpi_pm_tick(uint64_t ns) } /************************************************************ + * PLATFORM TIMER 4: TSC + */ + +/* + * Called in verify_tsc_reliability() under reliable TSC conditions + * thus reusing all the checks already performed there. + */ +static s64 __init init_tsc(struct platform_timesource *pts) +{ + u64 ret = pts->frequency; + + if ( nr_cpu_ids != num_present_cpus() ) + { + printk(XENLOG_WARNING "TSC: CPU Hotplug intended\n"); + ret = 0; + } + + if ( nr_sockets > 1 ) + { + printk(XENLOG_WARNING "TSC: Not invariant across sockets\n"); + ret = 0; + } + + if ( !ret ) + printk(XENLOG_DEBUG "TSC: Not setting it as clocksource\n"); + + return ret; +} + +static u64 read_tsc(void) +{ + return rdtsc_ordered(); +} + +static struct platform_timesource __initdata plt_tsc = +{ + .id = "tsc", + .name = "TSC", + .read_counter = read_tsc, + /* + * Calculations for platform timer overflow assume u64 boundary. + * Hence we set to less than 64, such that the TSC wraparound is + * correctly checked and handled. + */ + .counter_bits = 63, + .init = init_tsc, +}; + +/************************************************************ * GENERIC PLATFORM TIMER INFRASTRUCTURE */ @@ -580,6 +629,21 @@ static void resume_platform_timer(void) plt_stamp = plt_src.read_counter(); } +static void __init reset_platform_timer(void) +{ + /* Deactivate any timers running */ + kill_timer(&plt_overflow_timer); + kill_timer(&calibration_timer); + + /* Reset counters and stamps */ + spin_lock_irq(&platform_timer_lock); + plt_stamp = 0; + plt_stamp64 = 0; + platform_timer_stamp = 0; + stime_platform_stamp = 0; + spin_unlock_irq(&platform_timer_lock); +} + static s64 __init try_platform_timer(struct platform_timesource *pts) { s64 rc = pts->init(pts); @@ -587,6 +651,10 @@ static s64 __init try_platform_timer(struct platform_timesource *pts) if ( rc <= 0 ) return rc; + /* We have a platform timesource already so reset it */ + if ( plt_src.counter_bits != 0 ) + reset_platform_timer(); + plt_mask = (u64)~0ull >> (64 - pts->counter_bits); set_time_scale(&plt_scale, pts->frequency); @@ -608,7 +676,8 @@ static u64 __init init_platform_timer(void) unsigned int i; s64 rc = -1; - if ( opt_clocksource[0] != '\0' ) + /* clocksource=tsc is initialized via __initcalls (when CPUs are up). */ + if ( (opt_clocksource[0] != '\0') && strcmp(opt_clocksource, "tsc") ) { for ( i = 0; i < ARRAY_SIZE(plt_timers); i++ ) { @@ -1344,6 +1413,22 @@ static void time_calibration_std_rendezvous(void *_r) time_calibration_rendezvous_tail(r); } +/* + * Rendezvous function used when clocksource is TSC and + * no CPU hotplug will be performed. + */ +static void time_calibration_nop_rendezvous(void *rv) +{ + const struct calibration_rendezvous *r = rv; + struct cpu_time_stamp *c = &this_cpu(cpu_calibration); + + c->local_tsc = r->master_tsc_stamp; + c->local_stime = r->master_stime; + c->master_stime = r->master_stime; + + raise_softirq(TIME_CALIBRATE_SOFTIRQ); +} + static void (*time_calibration_rendezvous_fn)(void *) = time_calibration_std_rendezvous; @@ -1353,6 +1438,13 @@ static void time_calibration(void *unused) .semaphore = ATOMIC_INIT(0) }; + if ( clocksource_is_tsc() ) + { + local_irq_disable(); + r.master_stime = read_platform_stime(&r.master_tsc_stamp); + local_irq_enable(); + } + cpumask_copy(&r.cpu_calibration_map, &cpu_online_map); /* @wait=1 because we must wait for all cpus before freeing @r. */ @@ -1467,6 +1559,31 @@ static void __init tsc_check_writability(void) disable_tsc_sync = 1; } +static void __init reset_percpu_time(void *unused) +{ + struct cpu_time *t = &this_cpu(cpu_time); + + t->stamp.local_tsc = boot_tsc_stamp; + t->stamp.local_stime = 0; + t->stamp.local_stime = get_s_time_fixed(boot_tsc_stamp); + t->stamp.master_stime = t->stamp.local_stime; +} + +static void __init try_platform_timer_tail(bool late) +{ + init_timer(&plt_overflow_timer, plt_overflow, NULL, 0); + plt_overflow(NULL); + + platform_timer_stamp = plt_stamp64; + stime_platform_stamp = NOW(); + + if ( !late ) + init_percpu_time(); + + init_timer(&calibration_timer, time_calibration, NULL, 0); + set_timer(&calibration_timer, NOW() + EPOCH); +} + /* Late init function, after all cpus have booted */ static int __init verify_tsc_reliability(void) { @@ -1484,6 +1601,32 @@ static int __init verify_tsc_reliability(void) printk("TSC warp detected, disabling TSC_RELIABLE\n"); setup_clear_cpu_cap(X86_FEATURE_TSC_RELIABLE); } + else if ( !strcmp(opt_clocksource, "tsc") && + (try_platform_timer(&plt_tsc) > 0) ) + { + /* + * Platform timer has changed and CPU time will only be updated + * after we set again the calibration timer, which means we need to + * seed again each local CPU time. At this stage TSC is known to be + * reliable i.e. monotonically increasing across all CPUs so this + * lets us remove the skew between platform timer and TSC, since + * these are now effectively the same. + */ + on_selected_cpus(&cpu_online_map, reset_percpu_time, NULL, 1); + + /* + * We won't do CPU Hotplug and TSC clocksource is being used which + * means we have a reliable TSC, plus we don't sync with any other + * clocksource so no need for rendezvous. + */ + time_calibration_rendezvous_fn = time_calibration_nop_rendezvous; + + /* Finish platform timer switch. */ + try_platform_timer_tail(true); + + printk("Switched to Platform timer %s TSC\n", + freq_string(plt_src.frequency)); + } } return 0; @@ -1509,15 +1652,7 @@ int __init init_xen_time(void) do_settime(get_cmos_time(), 0, NOW()); /* Finish platform timer initialization. */ - init_timer(&plt_overflow_timer, plt_overflow, NULL, 0); - plt_overflow(NULL); - platform_timer_stamp = plt_stamp64; - stime_platform_stamp = NOW(); - - init_percpu_time(); - - init_timer(&calibration_timer, time_calibration, NULL, 0); - set_timer(&calibration_timer, NOW() + EPOCH); + try_platform_timer_tail(false); return 0; } @@ -1531,6 +1666,7 @@ void __init early_time_init(void) preinit_pit(); tmp = init_platform_timer(); + plt_tsc.frequency = tmp; set_time_scale(&t->tsc_scale, tmp); t->stamp.local_tsc = boot_tsc_stamp; @@ -1779,6 +1915,11 @@ void pv_soft_rdtsc(struct vcpu *v, struct cpu_user_regs *regs, int rdtscp) (d->arch.tsc_mode == TSC_MODE_PVRDTSCP) ? d->arch.incarnation : 0; } +bool clocksource_is_tsc(void) +{ + return plt_src.read_counter == read_tsc; +} + int host_tsc_is_safe(void) { return boot_cpu_has(X86_FEATURE_TSC_RELIABLE); diff --git a/xen/include/asm-x86/time.h b/xen/include/asm-x86/time.h index 971883a..6d704b4 100644 --- a/xen/include/asm-x86/time.h +++ b/xen/include/asm-x86/time.h @@ -69,6 +69,7 @@ void tsc_get_info(struct domain *d, uint32_t *tsc_mode, uint64_t *elapsed_nsec, void force_update_vcpu_system_time(struct vcpu *v); +bool clocksource_is_tsc(void); int host_tsc_is_safe(void); void cpuid_time_leaf(uint32_t sub_idx, uint32_t *eax, uint32_t *ebx, uint32_t *ecx, uint32_t *edx);