[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3 4/7] x86: collect CQM information from all sockets
On 29/11/13 05:48, dongxiao.xu@xxxxxxxxx wrote: > From: Dongxiao Xu <dongxiao.xu@xxxxxxxxx> > > Collect CQM information (L3 cache occupancy) from all sockets. > Upper layer application can parse the data structure to get the > information of guest's L3 cache occupancy on certain sockets. > > Signed-off-by: Jiongxi Li <jiongxi.li@xxxxxxxxx> > Signed-off-by: Dongxiao Xu <dongxiao.xu@xxxxxxxxx> > --- > xen/arch/x86/pqos.c | 59 ++++++++++++++++++++++++++ > xen/arch/x86/sysctl.c | 89 > +++++++++++++++++++++++++++++++++++++++ > xen/include/asm-x86/msr-index.h | 4 ++ > xen/include/asm-x86/pqos.h | 8 ++++ > xen/include/public/domctl.h | 9 ++++ > xen/include/public/sysctl.h | 11 +++++ > 6 files changed, 180 insertions(+) > > diff --git a/xen/arch/x86/pqos.c b/xen/arch/x86/pqos.c > index 1148f3b..615c5ea 100644 > --- a/xen/arch/x86/pqos.c > +++ b/xen/arch/x86/pqos.c > @@ -19,6 +19,7 @@ > * Place - Suite 330, Boston, MA 02111-1307 USA. > */ > #include <asm/processor.h> > +#include <asm/msr.h> > #include <xen/init.h> > #include <xen/spinlock.h> > #include <asm/pqos.h> > @@ -91,6 +92,26 @@ bool_t system_supports_cqm(void) > return cqm_enabled; > } > > +unsigned int get_cqm_count(void) > +{ > + return cqm_rmid_count; > +} > + > +unsigned int get_cqm_avail(void) > +{ > + unsigned int rmid, cqm_avail = 0; > + unsigned long flags; > + > + spin_lock_irqsave(&cqm_lock, flags); > + /* RMID=0 is reserved, enumerate from 1 */ > + for ( rmid = 1; rmid < cqm_rmid_count; rmid++ ) > + if ( cqm_rmid_array[rmid] == DOMID_INVALID ) > + cqm_avail++; > + spin_unlock_irqrestore(&cqm_lock, flags); > + > + return cqm_avail; This cqm_avail is stale as soon as you release the lock. > +} > + > int alloc_cqm_rmid(struct domain *d) > { > int rc = 0; > @@ -139,6 +160,44 @@ void free_cqm_rmid(struct domain *d) > d->arch.pqos_cqm_rmid = 0; > } > > +static void read_cqm_data(void *arg) > +{ > + uint64_t cqm_data; > + unsigned int rmid; > + int socket = cpu_to_socket(smp_processor_id()); > + struct xen_socket_cqmdata *data = arg; > + unsigned long flags, i; > + > + if ( socket < 0 ) > + return; > + > + spin_lock_irqsave(&cqm_lock, flags); > + /* RMID=0 is reserved, enumerate from 1 */ > + for ( rmid = 1; rmid < cqm_rmid_count; rmid++ ) > + { > + if ( cqm_rmid_array[rmid] == DOMID_INVALID ) > + continue; > + > + wrmsr(MSR_IA32_QOSEVTSEL, QOS_MONITOR_EVTID_L3, rmid); > + rdmsrl(MSR_IA32_QMC, cqm_data); > + > + i = socket * cqm_rmid_count + rmid; > + data[i].valid = !(cqm_data & IA32_QM_CTR_ERROR_MASK); > + if ( data[i].valid ) > + { > + data[i].l3c_occupancy = cqm_data * cqm_upscaling_factor; > + data[i].socket = socket; > + data[i].domid = cqm_rmid_array[rmid]; > + } > + } > + spin_unlock_irqrestore(&cqm_lock, flags); > +} > + > +void get_cqm_info(cpumask_t *cpu_cqmdata_map, struct xen_socket_cqmdata > *data) > +{ > + on_selected_cpus(cpu_cqmdata_map, read_cqm_data, data, 1); > +} > + > /* > * Local variables: > * mode: C > diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c > index 15d4b91..f916fe6 100644 > --- a/xen/arch/x86/sysctl.c > +++ b/xen/arch/x86/sysctl.c > @@ -28,6 +28,7 @@ > #include <xen/nodemask.h> > #include <xen/cpu.h> > #include <xsm/xsm.h> > +#include <asm/pqos.h> > > #define get_xen_guest_handle(val, hnd) do { val = (hnd).p; } while (0) > > @@ -66,6 +67,47 @@ void arch_do_physinfo(xen_sysctl_physinfo_t *pi) > pi->capabilities |= XEN_SYSCTL_PHYSCAP_hvm_directio; > } > > +/* Select one random CPU for each socket */ I know this is not specifically a fault of your code, but these masks of cpus on specific sockets is really information which should be set up on boot and tweaked on cpu_up/down. It should certainly not be recalculated from scratch every time this hypercall is made. (And that would prevent needing to make an xalloc/xfree on the hypercall path) ~Andrew > +static void select_socket_cpu(cpumask_t *cpu_bitmap) > +{ > + int i; > + unsigned int cpu; > + cpumask_t *socket_cpuset; > + int max_socket = 0; > + unsigned int num_cpus = num_online_cpus(); > + DECLARE_BITMAP(sockets, num_cpus); > + > + cpumask_clear(cpu_bitmap); > + > + for_each_online_cpu(cpu) > + { > + i = cpu_to_socket(cpu); > + if ( i < 0 || test_and_set_bit(i, sockets) ) > + continue; > + max_socket = max(max_socket, i); > + } > + > + socket_cpuset = xzalloc_array(cpumask_t, max_socket + 1); > + if ( !socket_cpuset ) > + return; > + > + for_each_online_cpu(cpu) > + { > + i = cpu_to_socket(cpu); > + if ( i < 0 ) > + continue; > + cpumask_set_cpu(cpu, &socket_cpuset[i]); > + } > + > + for ( i = 0; i <= max_socket; i++ ) > + { > + cpu = cpumask_any(&socket_cpuset[i]); > + cpumask_set_cpu(cpu, cpu_bitmap); > + } > + > + xfree(socket_cpuset); > +} > + > long arch_do_sysctl( > struct xen_sysctl *sysctl, XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl) > { > @@ -101,6 +143,53 @@ long arch_do_sysctl( > } > break; > > + case XEN_SYSCTL_getcqminfo: > + { > + struct xen_socket_cqmdata *info; > + uint32_t num_sockets; > + uint32_t num_rmid; > + cpumask_t cpu_cqmdata_map; > + > + if ( !system_supports_cqm() ) > + { > + ret = -ENODEV; > + break; > + } > + > + select_socket_cpu(&cpu_cqmdata_map); > + > + num_sockets = min((unsigned int)cpumask_weight(&cpu_cqmdata_map), > + sysctl->u.getcqminfo.num_sockets); > + num_rmid = get_cqm_count(); > + info = xzalloc_array(struct xen_socket_cqmdata, > + num_rmid * num_sockets); > + if ( !info ) > + { > + ret = -ENOMEM; > + break; > + } > + > + get_cqm_info(&cpu_cqmdata_map, info); > + > + if ( copy_to_guest_offset(sysctl->u.getcqminfo.buffer, > + 0, info, num_rmid * num_sockets) ) > + { > + ret = -EFAULT; > + xfree(info); > + break; > + } > + > + sysctl->u.getcqminfo.num_rmid = num_rmid; > + sysctl->u.getcqminfo.num_rmid_avail = get_cqm_avail(); > + sysctl->u.getcqminfo.num_sockets = num_sockets; > + > + if ( copy_to_guest(u_sysctl, sysctl, 1) ) > + ret = -EFAULT; > + > + xfree(info); > + } > + break; > + > default: > ret = -ENOSYS; > break; > diff --git a/xen/include/asm-x86/msr-index.h b/xen/include/asm-x86/msr-index.h > index e597a28..46ef165 100644 > --- a/xen/include/asm-x86/msr-index.h > +++ b/xen/include/asm-x86/msr-index.h > @@ -488,4 +488,8 @@ > /* Geode defined MSRs */ > #define MSR_GEODE_BUSCONT_CONF0 0x00001900 > > +/* Platform QoS register */ > +#define MSR_IA32_QOSEVTSEL 0x00000c8d > +#define MSR_IA32_QMC 0x00000c8e > + > #endif /* __ASM_MSR_INDEX_H */ > diff --git a/xen/include/asm-x86/pqos.h b/xen/include/asm-x86/pqos.h > index c54905b..2ab9277 100644 > --- a/xen/include/asm-x86/pqos.h > +++ b/xen/include/asm-x86/pqos.h > @@ -21,6 +21,8 @@ > #ifndef ASM_PQOS_H > #define ASM_PQOS_H > #include <xen/sched.h> > +#include <xen/cpumask.h> > +#include <public/domctl.h> > > /* QoS Resource Type Enumeration */ > #define QOS_MONITOR_TYPE_L3 0x2 > @@ -28,10 +30,16 @@ > /* QoS Monitoring Event ID */ > #define QOS_MONITOR_EVTID_L3 0x1 > > +/* IA32_QM_CTR */ > +#define IA32_QM_CTR_ERROR_MASK (0x3ul << 62) > + > void init_platform_qos(void); > > bool_t system_supports_cqm(void); > int alloc_cqm_rmid(struct domain *d); > void free_cqm_rmid(struct domain *d); > +unsigned int get_cqm_count(void); > +unsigned int get_cqm_avail(void); > +void get_cqm_info(cpumask_t *cpu_cqmdata_map, struct xen_socket_cqmdata > *data); > > #endif > diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h > index 800b2f4..53c740e 100644 > --- a/xen/include/public/domctl.h > +++ b/xen/include/public/domctl.h > @@ -883,6 +883,15 @@ struct xen_domctl_qos_type { > typedef struct xen_domctl_qos_type xen_domctl_qos_type_t; > DEFINE_XEN_GUEST_HANDLE(xen_domctl_qos_type_t); > > +struct xen_socket_cqmdata { > + uint64_t l3c_occupancy; > + uint32_t socket; > + domid_t domid; > + uint8_t valid; > +}; > +typedef struct xen_socket_cqmdata xen_socket_cqmdata_t; > +DEFINE_XEN_GUEST_HANDLE(xen_socket_cqmdata_t); > + > struct xen_domctl { > uint32_t cmd; > #define XEN_DOMCTL_createdomain 1 > diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h > index 8437d31..85eee16 100644 > --- a/xen/include/public/sysctl.h > +++ b/xen/include/public/sysctl.h > @@ -632,6 +632,15 @@ struct xen_sysctl_coverage_op { > typedef struct xen_sysctl_coverage_op xen_sysctl_coverage_op_t; > DEFINE_XEN_GUEST_HANDLE(xen_sysctl_coverage_op_t); > > +/* XEN_SYSCTL_getcqminfo */ > +struct xen_sysctl_getcqminfo { > + XEN_GUEST_HANDLE_64(xen_socket_cqmdata_t) buffer; /* OUT */ > + uint32_t num_sockets; /* IN/OUT */ > + uint32_t num_rmid; /* OUT */ > + uint32_t num_rmid_avail; /* OUT */ > +}; > +typedef struct xen_sysctl_getcqminfo xen_sysctl_getcqminfo_t; > +DEFINE_XEN_GUEST_HANDLE(xen_sysctl_getcqminfo_t); > > struct xen_sysctl { > uint32_t cmd; > @@ -654,6 +663,7 @@ struct xen_sysctl { > #define XEN_SYSCTL_cpupool_op 18 > #define XEN_SYSCTL_scheduler_op 19 > #define XEN_SYSCTL_coverage_op 20 > +#define XEN_SYSCTL_getcqminfo 21 > uint32_t interface_version; /* XEN_SYSCTL_INTERFACE_VERSION */ > union { > struct xen_sysctl_readconsole readconsole; > @@ -675,6 +685,7 @@ struct xen_sysctl { > struct xen_sysctl_cpupool_op cpupool_op; > struct xen_sysctl_scheduler_op scheduler_op; > struct xen_sysctl_coverage_op coverage_op; > + struct xen_sysctl_getcqminfo getcqminfo; > uint8_t pad[128]; > } u; > }; _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |