From patchwork Wed May 3 15:58:01 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Jan Beulich X-Patchwork-Id: 13230300 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id D8BD6C77B7F for ; Wed, 3 May 2023 15:58:29 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.529342.823673 (Exim 4.92) (envelope-from ) id 1puErs-0005GW-A4; Wed, 03 May 2023 15:58:12 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 529342.823673; Wed, 03 May 2023 15:58:12 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1puErs-0005Fz-48; Wed, 03 May 2023 15:58:12 +0000 Received: by outflank-mailman (input) for mailman id 529342; Wed, 03 May 2023 15:58:11 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1puErr-0004ZO-Ar for xen-devel@lists.xenproject.org; Wed, 03 May 2023 15:58:11 +0000 Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-he1eur04on2042.outbound.protection.outlook.com [40.107.7.42]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 4cfa37bf-e9cb-11ed-b225-6b7b168915f2; Wed, 03 May 2023 17:58:09 +0200 (CEST) Received: from AM6PR04MB6551.eurprd04.prod.outlook.com (2603:10a6:20b:fa::20) by AM9PR04MB8290.eurprd04.prod.outlook.com (2603:10a6:20b:3e3::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6363.21; Wed, 3 May 2023 15:58:03 +0000 Received: from AM6PR04MB6551.eurprd04.prod.outlook.com ([fe80::768c:6df7:9afb:acd7]) by AM6PR04MB6551.eurprd04.prod.outlook.com ([fe80::768c:6df7:9afb:acd7%6]) with mapi id 15.20.6340.031; Wed, 3 May 2023 15:58:03 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 4cfa37bf-e9cb-11ed-b225-6b7b168915f2 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DWQ3OkdIcWpnojaH7W+ucsbUWR1ZTeRXk5MK8lmHmASi3pmiabuGpCVVT8WhdErXDqBa4BxJCJ1Alt17mH8fg248Xic8TrMIJ++LrScAGsEwlll0b6TfeOOaLY01SA0PS5k2iVMN18pKgOIzCwdmULN3hBwcdh0EuFYxWKen9PRoixnOkv1nOOGWlQRY04I1ShT2hEXzgbRDQsCixQt4+rR5vfeFZ0mjS6tfqwMez3mMqH0HiAL6oOqD3V5K4Zg7m8Gv4P4sxaaFRdSePHnvsvTXHGqFt54HS6WQvZWHaGPXmmXnpNUPOR0GPGiaTkp6jdEw2CCIMgb3BTcNJoygJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6IQwYv9j9TS5s8pPI31juObfMSOZTWBzzVzQE/pCSAE=; b=JezfK0d/OwXAuSHXH42UrRKDhCwMCqcO7K2vS5uJyVBzBcwnKpxZvQ8D1eIlfGjAHsYzegb/2g8p/GuIckjqP/B5jNCywu/riXvX5Ngwqv7Ssdv5N7wum62mSKsPv7pc+TrAmBVrHTDL8EkPeYBd30evFQgys4vE7PjEnqJ/pGrepvThyoudQ/Gq3q+duZaxXbu9oU+jwijYWDxyIk/PdOXv1OhJfR2s/EVsF8RQOpV7+RRzmqK+wpP4a7dx5kEyqnOMebC7VSnmrC+MHhqOsaG70oubSciRIfv8w2M3LMYJTlqxP/Tpc+umpMfhNw0FvexYy+VIINgj8PwFLHhF6Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6IQwYv9j9TS5s8pPI31juObfMSOZTWBzzVzQE/pCSAE=; b=0YW3mguoNtsxk604tYbrugzbScH4vqZrqMg1kaVOUPjNZArkBc8pAhDEoTDdtodKMCe5LtlzaZHttuoPb8apcOUbYMT0Wnc86JwxNaJLlHiUaelFOFVCRNdtS+Mq3Y2ySaR7AWXjDceYgc5zkcDojgW4osb8kCcPe2qBv1AsnOWNaRkxEwXLL/vn1hX/NOd3KXRKC+2TwcILbIx3VFaUqlD2jkr/5wUzaw3ni3NUfgx7UJvNci+tCVmmeW8BrR+oOlRfUjLlFNKqaPOHMuMxhMdXNc5pWltg5l/Tzmms7WErcg/UN3/hYb6aHchx/KRVgy8OCQwdiNFRteQdm1MgMQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com; Message-ID: <77218fb0-5e96-4ecb-c2b0-4fe8c3ba683f@suse.com> Date: Wed, 3 May 2023 17:58:01 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.10.1 Subject: [PATCH v3 7/8] x86: introduce GADDR based secondary time area registration alternative Content-Language: en-US From: Jan Beulich To: "xen-devel@lists.xenproject.org" Cc: Andrew Cooper , George Dunlap , Julien Grall , Stefano Stabellini , Wei Liu , =?utf-8?q?Roger_Pau_Monn=C3=A9?= References: <472f8314-9ad7-523a-32dc-d5c2138c2c8c@suse.com> In-Reply-To: <472f8314-9ad7-523a-32dc-d5c2138c2c8c@suse.com> X-ClientProxiedBy: FRYP281CA0014.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10::24) To AM6PR04MB6551.eurprd04.prod.outlook.com (2603:10a6:20b:fa::20) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AM6PR04MB6551:EE_|AM9PR04MB8290:EE_ X-MS-Office365-Filtering-Correlation-Id: 8adacc83-d5b0-4ccc-3c71-08db4bef2d0e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR04MB6551.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(376002)(366004)(39860400002)(346002)(396003)(136003)(451199021)(2906002)(38100700002)(8936002)(8676002)(5660300002)(31696002)(36756003)(86362001)(6486002)(478600001)(54906003)(186003)(6512007)(26005)(6506007)(31686004)(2616005)(83380400001)(41300700001)(66556008)(66946007)(66476007)(6916009)(4326008)(316002)(43740500002)(45980500001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?gnECT93hIL1V1lRekNO+1fSAlBx1?= =?utf-8?q?AK+Za6hSaXegsZYIFeIqoBHw57EIQ4QvS6wkxvw/Ol3Sl93kH+aCGBK1dCVIzkGmm?= =?utf-8?q?EDUbuSVHpIhXtrfFrANcW/4Kg+7MXIMCxMoL/2V0chugG6lkLv01ukM3u3AQ+QN7F?= =?utf-8?q?eJVi3Vp0URwjW+yY9QeRP6QUfjDuULrWQoITmpFGw3Xt+WFFQFJ+ptizj8onSysHb?= =?utf-8?q?oa7J4rsaKJBv5H7k0lSLJyiJDGU2Q65UBXqp30IH+F64JQaQ5Zz98A/+t116qcjF4?= =?utf-8?q?YZLYjI3cNPEpTUlgNQuq/oIhjh3ljGwCFLbSZH99g81qIb3hKXe0fWhwBbwzB6OEk?= =?utf-8?q?KAQRdlk6b8ywrcG1oTJi5opdypQtCGSryuKXzvUwP1GdUP5dtXZzxNl0hn/Eqs8Co?= =?utf-8?q?oL1uoU/kTfP1wvaItuxPte4/8jmXIFK2e/3cZpqfE/S35xkFwS98KP28/hTnGOhAt?= =?utf-8?q?a9LBV9nw9Rf9ebBk7YMqfPtJb3BkRS3HDiYBnW1kdHjCuO2/IEbh9idoaHc6p06xJ?= =?utf-8?q?ZHnvYmhxpBxX4RClGjKdvuopwpwIZ2Or+5bOYNcPOlJP+8myJT+nDKKd6a5N8mjru?= =?utf-8?q?e+G8ZjbyiQmCommlHIG2fTPHwcNAFvoAywpOzWfH3G1n+y2buMUl3DjZb4D9IuBRB?= =?utf-8?q?wsyefVNTermoN2SmL87BrZyI1cXGn/gWubanpbLD1l1Mk+0M6E53P9JJ/VlQK3S5f?= =?utf-8?q?gYa8Tsqf074hQ95EWOV1a11I3YKfWR+EDDkbWqM6ITLMZOWpjtQc8xuJdRAatFD3v?= =?utf-8?q?at9FONp/WDqxmKNA/RssYRkiYnxzAI+Lht8C6JwRE7kdeBX46F6Ak/CFt0RnN3Tj2?= =?utf-8?q?wrlS1qdyhrk71XB60bLJbcJM0ds/LQDyoY0RYq7S+B1FYxwuB+o2v0sZjQmtJ/udY?= =?utf-8?q?NqUaeQ5LnJISfLGHHb+oiqoDFSe7pdoLPZJrqLHDctw5jn/RQLSJrGs1Wl0NOXqHl?= =?utf-8?q?eqAGzuaS07bx9FH09Qmp71r3As4+BHhPq/DCde9p/jEVJ6CGDyjbQquy7kWxSUHah?= =?utf-8?q?GEMu8vdY/Kkq98WCSELqtTFJwE35KaWHpeidF3jtDX2vPA7GPL8ZOvKELsNFPAZ0m?= =?utf-8?q?slFyYhtzKqHJHnBTvce6RqXaKUOCGVqEM5dmW/BrpJT64eABuIi7gIzIjxf5OHgj0?= =?utf-8?q?svQQYnssmJi2I9bA4nCE4trZgX9nmLqGNfsGAr+Uq7OCHpAARuySWtSPM8xxeFkW8?= =?utf-8?q?z5b9Vqy94IS9hi/uu4nrzNfoLhTLNJgtQV1n8oVMf3hy85B8ljkE1uD3wrh4goJFg?= =?utf-8?q?kd4cbsLW9lFPQ+a9kXZ38LIjbE0wFWwuiH7inwQBECDThhYHYr41mh7g0xSY/6dx1?= =?utf-8?q?IT4SmUZZgmwnrGx7CB4YbRCyNxCqABRREho5b86Wkpcxtsk18ocHLqJ1o9LuE2xT1?= =?utf-8?q?YVs9TbFfT0U1Xjn1r016FCW2WtoNlnoMq4n0QMn+ok+tMgPbJbdgsXDCKHfcWCjbz?= =?utf-8?q?U6V5IUY00AAkA1lNg+gQgo8rFA462S7FkZDqImIx/xEsr10YNzeqXIuaRkbVaIWiy?= =?utf-8?q?qxtnUYQ4tp74?= X-OriginatorOrg: suse.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8adacc83-d5b0-4ccc-3c71-08db4bef2d0e X-MS-Exchange-CrossTenant-AuthSource: AM6PR04MB6551.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 May 2023 15:58:02.9418 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: zeKTkZKAXxPcnWAwQHiplkpt2tWBC3ott9VQCqULVr/4I+nw8db2Y0Y2YBBXEDzEnjkTaTxz7vFA7+37YSJmDA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8290 The registration by virtual/linear address has downsides: The access is expensive for HVM/PVH domains. Furthermore for 64-bit PV domains the area is inaccessible (and hence cannot be updated by Xen) when in guest-user mode. Introduce a new vCPU operation allowing to register the secondary time area by guest-physical address. An at least theoretical downside to using physically registered areas is that PV then won't see dirty (and perhaps also accessed) bits set in its respective page table entries. Signed-off-by: Jan Beulich Reviewed-by: Roger Pau Monné --- v3: Re-base. v2: Forge version in force_update_secondary_system_time(). --- a/xen/arch/x86/domain.c +++ b/xen/arch/x86/domain.c @@ -1504,6 +1504,15 @@ int arch_vcpu_reset(struct vcpu *v) return 0; } +static void cf_check +time_area_populate(void *map, struct vcpu *v) +{ + if ( is_pv_vcpu(v) ) + v->arch.pv.pending_system_time.version = 0; + + force_update_secondary_system_time(v, map); +} + long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg) { long rc = 0; @@ -1541,6 +1550,25 @@ long do_vcpu_op(int cmd, unsigned int vc break; } + + case VCPUOP_register_vcpu_time_phys_area: + { + struct vcpu_register_time_memory_area area; + + rc = -EFAULT; + if ( copy_from_guest(&area.addr.p, arg, 1) ) + break; + + rc = map_guest_area(v, area.addr.p, + sizeof(vcpu_time_info_t), + &v->arch.time_guest_area, + time_area_populate); + if ( rc == -ERESTART ) + rc = hypercall_create_continuation(__HYPERVISOR_vcpu_op, "iih", + cmd, vcpuid, arg); + + break; + } case VCPUOP_get_physid: { --- a/xen/arch/x86/include/asm/domain.h +++ b/xen/arch/x86/include/asm/domain.h @@ -692,6 +692,8 @@ void domain_cpu_policy_changed(struct do bool update_secondary_system_time(struct vcpu *, struct vcpu_time_info *); +void force_update_secondary_system_time(struct vcpu *, + struct vcpu_time_info *); void vcpu_show_registers(const struct vcpu *); --- a/xen/arch/x86/time.c +++ b/xen/arch/x86/time.c @@ -1633,6 +1633,16 @@ void force_update_vcpu_system_time(struc __update_vcpu_system_time(v, 1); } +void force_update_secondary_system_time(struct vcpu *v, + struct vcpu_time_info *map) +{ + struct vcpu_time_info u; + + collect_time_info(v, &u); + u.version = -1; /* Compensate for version_update_end(). */ + write_time_guest_area(map, &u); +} + static void update_domain_rtc(void) { struct domain *d; --- a/xen/arch/x86/x86_64/domain.c +++ b/xen/arch/x86/x86_64/domain.c @@ -115,6 +115,7 @@ compat_vcpu_op(int cmd, unsigned int vcp case VCPUOP_send_nmi: case VCPUOP_get_physid: + case VCPUOP_register_vcpu_time_phys_area: rc = do_vcpu_op(cmd, vcpuid, arg); break; --- a/xen/include/public/vcpu.h +++ b/xen/include/public/vcpu.h @@ -233,6 +233,7 @@ DEFINE_XEN_GUEST_HANDLE(vcpu_register_ti * VMASST_TYPE_runstate_update_flag engaged by the domain. */ #define VCPUOP_register_runstate_phys_area 14 +#define VCPUOP_register_vcpu_time_phys_area 15 #endif /* __XEN_PUBLIC_VCPU_H__ */