[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2] x86/viridian: Add Partition Reference Time enlightenment



Sorry, this should have been v3. I'll re-post.

  Paul

> -----Original Message-----
> From: Paul Durrant [mailto:paul.durrant@xxxxxxxxxx]
> Sent: 13 October 2014 15:24
> To: xen-devel@xxxxxxxxxxxxxxxxxxxx
> Cc: Paul Durrant; Keir (Xen.org); Jan Beulich; Ian Campbell; Ian Jackson;
> Stefano Stabellini; Christoph Egger
> Subject: [PATCH v2] x86/viridian: Add Partition Reference Time
> enlightenment
> 
> The presence of the partition reference time enlightenment persuades
> newer
> versions of Windows to prefer the TSC as their primary time source. Hence,
> if rdtsc is not being emulated and is invariant then many vmexits (for
> alternative time sources such as the HPET or reference counter MSR) can
> be avoided.
> 
> The implementation is not yet complete as no attempt is made to prevent
> emulation of rdtsc if the enlightenment is active and guest and host
> TSC frequencies differ. To do that requires invasive changes in the core
> x86 time code and hence a lot more testing.
> 
> This patch avoids the issue by disabling the enlightenment if rdtsc is
> being emulated, causing Windows to choose another time source. This is
> safe, but may cause a big variation in performance of guests migrated
> between hosts of differing TSC frequency. Thus the enlightenment is not
> enabled in the default set, but may be enabled to improve guest
> performance
> where such migrations are not a concern.
> 
> See section 15.4 of the Microsoft Hypervisor Top Level Functional
> Specification v4.0a for details.
> 
> Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx>
> Cc: Keir Fraser <keir@xxxxxxx>
> Cc: Jan Beulich <jbeulich@xxxxxxxx>
> Cc: Ian Campbell <ian.campbell@xxxxxxxxxx>
> Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
> Cc: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
> Cc: Christoph Egger <chegger@xxxxxxxxx>
> ---
> v2:
>  - Prevent TscSequence increment loop from being exposed to a running
>    domain
> 
>  docs/man/xl.cfg.pod.5                  |    6 ++
>  tools/libxl/libxl_dom.c                |    3 +
>  tools/libxl/libxl_types.idl            |    1 +
>  xen/arch/x86/hvm/viridian.c            |  116
> +++++++++++++++++++++++++++++++-
>  xen/include/asm-x86/hvm/viridian.h     |   35 ++++++++++
>  xen/include/public/arch-x86/hvm/save.h |   11 +++
>  xen/include/public/hvm/params.h        |    7 +-
>  7 files changed, 177 insertions(+), 2 deletions(-)
> 
> diff --git a/docs/man/xl.cfg.pod.5 b/docs/man/xl.cfg.pod.5
> index 8bba21c..925adbb 100644
> --- a/docs/man/xl.cfg.pod.5
> +++ b/docs/man/xl.cfg.pod.5
> @@ -1163,6 +1163,12 @@ This group incorporates Partition Time Reference
> Counter MSR. This
>  enlightenment can improve performance of Windows 8 and Windows
>  Server 2012 onwards.
> 
> +=item B<reference_tsc>
> +
> +This set incorporates the Partition Reference TSC MSR. This
> +enlightenment can improve performance of Windows 7 and Windows
> +Server 2008 R2 onwards.
> +
>  =item B<defaults>
> 
>  This is a special value that enables the default set of groups, which
> diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
> index bd21841..d04fc0d 100644
> --- a/tools/libxl/libxl_dom.c
> +++ b/tools/libxl/libxl_dom.c
> @@ -262,6 +262,9 @@ static int hvm_set_viridian_features(libxl__gc *gc,
> uint32_t domid,
>      if (libxl_bitmap_test(&enlightenments,
> LIBXL_VIRIDIAN_ENLIGHTENMENT_TIME_REF_COUNT))
>          mask |= HVMPV_time_ref_count;
> 
> +    if (libxl_bitmap_test(&enlightenments,
> LIBXL_VIRIDIAN_ENLIGHTENMENT_REFERENCE_TSC))
> +        mask |= HVMPV_reference_tsc;
> +
>      if (mask != 0 &&
>          xc_hvm_param_set(CTX->xch,
>                           domid,
> diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> index 90d152f..da75a40 100644
> --- a/tools/libxl/libxl_types.idl
> +++ b/tools/libxl/libxl_types.idl
> @@ -183,6 +183,7 @@ libxl_viridian_enlightenment =
> Enumeration("viridian_enlightenment", [
>      (0, "base"),
>      (1, "freq"),
>      (2, "time_ref_count"),
> +    (3, "reference_tsc"),
>      ])
> 
>  #
> diff --git a/xen/arch/x86/hvm/viridian.c b/xen/arch/x86/hvm/viridian.c
> index 6726168..528bb8b 100644
> --- a/xen/arch/x86/hvm/viridian.c
> +++ b/xen/arch/x86/hvm/viridian.c
> @@ -21,6 +21,7 @@
>  #define VIRIDIAN_MSR_HYPERCALL                  0x40000001
>  #define VIRIDIAN_MSR_VP_INDEX                   0x40000002
>  #define VIRIDIAN_MSR_TIME_REF_COUNT             0x40000020
> +#define VIRIDIAN_MSR_REFERENCE_TSC              0x40000021
>  #define VIRIDIAN_MSR_TSC_FREQUENCY              0x40000022
>  #define VIRIDIAN_MSR_APIC_FREQUENCY             0x40000023
>  #define VIRIDIAN_MSR_EOI                        0x40000070
> @@ -40,6 +41,7 @@
>  #define CPUID3A_MSR_APIC_ACCESS    (1 << 4)
>  #define CPUID3A_MSR_HYPERCALL      (1 << 5)
>  #define CPUID3A_MSR_VP_INDEX       (1 << 6)
> +#define CPUID3A_MSR_REFERENCE_TSC  (1 << 9)
>  #define CPUID3A_MSR_FREQ           (1 << 11)
> 
>  /* Viridian CPUID 4000004, Implementation Recommendations. */
> @@ -95,6 +97,8 @@ int cpuid_viridian_leaves(unsigned int leaf, unsigned int
> *eax,
>              *eax |= CPUID3A_MSR_FREQ;
>          if ( viridian_feature_mask(d) & HVMPV_time_ref_count )
>              *eax |= CPUID3A_MSR_TIME_REF_COUNT;
> +        if ( viridian_feature_mask(d) & HVMPV_reference_tsc )
> +            *eax |= CPUID3A_MSR_REFERENCE_TSC;
>          break;
>      case 4:
>          /* Recommended hypercall usage. */
> @@ -155,6 +159,17 @@ static void dump_apic_assist(const struct vcpu *v)
>             v, aa->fields.enabled, (unsigned long)aa->fields.pfn);
>  }
> 
> +static void dump_reference_tsc(const struct domain *d)
> +{
> +    const union viridian_reference_tsc *rt;
> +
> +    rt = &d->arch.hvm_domain.viridian.reference_tsc;
> +
> +    printk(XENLOG_G_INFO "d%d: VIRIDIAN REFERENCE_TSC: enabled: %x
> pfn: %lx\n",
> +           d->domain_id,
> +           rt->fields.enabled, (unsigned long)rt->fields.pfn);
> +}
> +
>  static void enable_hypercall_page(struct domain *d)
>  {
>      unsigned long gmfn = d-
> >arch.hvm_domain.viridian.hypercall_gpa.fields.pfn;
> @@ -224,6 +239,81 @@ static void initialize_apic_assist(struct vcpu *v)
>      put_page_and_type(page);
>  }
> 
> +static void update_reference_tsc(struct domain *d, bool_t initialize)
> +{
> +    unsigned long gmfn = d-
> >arch.hvm_domain.viridian.reference_tsc.fields.pfn;
> +    struct page_info *page = get_page_from_gfn(d, gmfn, NULL,
> P2M_ALLOC);
> +    HV_REFERENCE_TSC_PAGE *p;
> +
> +    if ( !page || !get_page_type(page, PGT_writable_page) )
> +    {
> +        if ( page )
> +            put_page(page);
> +        gdprintk(XENLOG_WARNING, "Bad GMFN %lx (MFN %lx)\n", gmfn,
> +                 page ? page_to_mfn(page) : INVALID_MFN);
> +        return;
> +    }
> +
> +    p = __map_domain_page(page);
> +
> +    if ( initialize )
> +        clear_page(p);
> +
> +    /*
> +     * This enlightenment must be disabled is the host TSC is not invariant.
> +     * However it is also disabled if vtsc is true (which means rdtsc is 
> being
> +     * emulated). This generally happens when guest TSC freq and host TSC
> freq
> +     * don't match. The TscScale value could be adjusted to cope with this,
> +     * allowing vtsc to be turned off, but support for this is not yet 
> present
> +     * in the hypervisor. Thus is it is possible that migrating a Windows VM
> +     * between hosts of differing TSC frequencies may result in large
> +     * differences in guest performance.
> +     */
> +    if ( !host_tsc_is_safe() || d->arch.vtsc )
> +    {
> +        /*
> +         * The specification states that valid values of TscSequence range
> +         * from 0 to 0xFFFFFFFE. The value 0xFFFFFFFF is used to indicate
> +         * this mechanism is no longer a reliable source of time and that
> +         * the VM should fall back to a different source.
> +         *
> +         * Server 2012 (6.2 kernel) and 2012 R2 (6.3 kernel) actually violate
> +         * the spec. and rely on a value of 0 to indicate that this
> +         * enlightenment should no longer be used. These two kernel
> +         * versions are currently the only ones to make use of this
> +         * enlightenment, so just use 0 here.
> +         */
> +        p->TscSequence = 0;
> +
> +        printk(XENLOG_G_INFO "d%d: VIRIDIAN REFERENCE_TSC:
> invalidated\n",
> +               d->domain_id);
> +        return;
> +    }
> +
> +    /*
> +     * The guest will calculate reference time according to the following
> +     * formula:
> +     *
> +     * ReferenceTime = ((RDTSC() * TscScale) >> 64) + TscOffset
> +     *
> +     * Windows uses a 100ns tick, so we need a scale which is cpu
> +     * ticks per 100ns shifted left by 64.
> +     */
> +    p->TscScale = ((10000ul << 32) / d->arch.tsc_khz) << 32;
> +
> +    if ( initialize )
> +        p->TscSequence = 1;
> +    else /* guest is paused */
> +        do {
> +            p->TscSequence++;
> +        } while ( p->TscSequence == 0xFFFFFFFF ||
> +                  p->TscSequence == 0 ); /* Avoid both 'invalid' values */
> +
> +    unmap_domain_page(p);
> +
> +    put_page_and_type(page);
> +}
> +
>  int wrmsr_viridian_regs(uint32_t idx, uint64_t val)
>  {
>      struct vcpu *v = current;
> @@ -282,6 +372,17 @@ int wrmsr_viridian_regs(uint32_t idx, uint64_t val)
>              initialize_apic_assist(v);
>          break;
> 
> +    case VIRIDIAN_MSR_REFERENCE_TSC:
> +        if ( !(viridian_feature_mask(d) & HVMPV_reference_tsc) )
> +            return 0;
> +
> +        perfc_incr(mshv_wrmsr_tsc_msr);
> +        d->arch.hvm_domain.viridian.reference_tsc.raw = val;
> +        dump_reference_tsc(d);
> +        if ( d->arch.hvm_domain.viridian.reference_tsc.fields.enabled )
> +            update_reference_tsc(d, 1);
> +        break;
> +
>      default:
>          return 0;
>      }
> @@ -346,6 +447,14 @@ int rdmsr_viridian_regs(uint32_t idx, uint64_t *val)
>          *val = v->arch.hvm_vcpu.viridian.apic_assist.raw;
>          break;
> 
> +    case VIRIDIAN_MSR_REFERENCE_TSC:
> +        if ( !(viridian_feature_mask(d) & HVMPV_reference_tsc) )
> +            return 0;
> +
> +        perfc_incr(mshv_rdmsr_tsc_msr);
> +        *val = d->arch.hvm_domain.viridian.reference_tsc.raw;
> +        break;
> +
>      case VIRIDIAN_MSR_TIME_REF_COUNT:
>      {
>          uint64_t tsc;
> @@ -452,6 +561,7 @@ static int viridian_save_domain_ctxt(struct domain
> *d, hvm_domain_context_t *h)
> 
>      ctxt.hypercall_gpa = d->arch.hvm_domain.viridian.hypercall_gpa.raw;
>      ctxt.guest_os_id   = d->arch.hvm_domain.viridian.guest_os_id.raw;
> +    ctxt.reference_tsc = d->arch.hvm_domain.viridian.reference_tsc.raw;
> 
>      return (hvm_save_entry(VIRIDIAN_DOMAIN, 0, h, &ctxt) != 0);
>  }
> @@ -460,11 +570,15 @@ static int viridian_load_domain_ctxt(struct domain
> *d, hvm_domain_context_t *h)
>  {
>      struct hvm_viridian_domain_context ctxt;
> 
> -    if ( hvm_load_entry(VIRIDIAN_DOMAIN, h, &ctxt) != 0 )
> +    if ( hvm_load_entry_zeroextend(VIRIDIAN_DOMAIN, h, &ctxt) != 0 )
>          return -EINVAL;
> 
>      d->arch.hvm_domain.viridian.hypercall_gpa.raw = ctxt.hypercall_gpa;
>      d->arch.hvm_domain.viridian.guest_os_id.raw   = ctxt.guest_os_id;
> +    d->arch.hvm_domain.viridian.reference_tsc.raw = ctxt.reference_tsc;
> +
> +    if ( d->arch.hvm_domain.viridian.reference_tsc.fields.enabled )
> +        update_reference_tsc(d, 0);
> 
>      return 0;
>  }
> diff --git a/xen/include/asm-x86/hvm/viridian.h b/xen/include/asm-
> x86/hvm/viridian.h
> index 496da33..35a22f5 100644
> --- a/xen/include/asm-x86/hvm/viridian.h
> +++ b/xen/include/asm-x86/hvm/viridian.h
> @@ -48,10 +48,35 @@ union viridian_hypercall_gpa
>      } fields;
>  };
> 
> +union viridian_reference_tsc
> +{
> +    uint64_t raw;
> +    struct
> +    {
> +        uint64_t enabled:1;
> +        uint64_t reserved_preserved:11;
> +        uint64_t pfn:48;
> +    } fields;
> +};
> +
> +/*
> + * Type defintion as in Microsoft Hypervisor Top-Level Functional
> + * Specification v4.0a, section 15.4.2.
> + */
> +typedef struct _HV_REFERENCE_TSC_PAGE
> +{
> +    uint32_t TscSequence;
> +    uint32_t Reserved1;
> +    uint64_t TscScale;
> +    int64_t  TscOffset;
> +    uint64_t Reserved2[509];
> +} HV_REFERENCE_TSC_PAGE, *PHV_REFERENCE_TSC_PAGE;
> +
>  struct viridian_domain
>  {
>      union viridian_guest_os_id guest_os_id;
>      union viridian_hypercall_gpa hypercall_gpa;
> +    union viridian_reference_tsc reference_tsc;
>  };
> 
>  int
> @@ -76,3 +101,13 @@ int
>  viridian_hypercall(struct cpu_user_regs *regs);
> 
>  #endif /* __ASM_X86_HVM_VIRIDIAN_H__ */
> +
> +/*
> + * Local variables:
> + * mode: C
> + * c-file-style: "BSD"
> + * c-basic-offset: 4
> + * tab-width: 4
> + * indent-tabs-mode: nil
> + * End:
> + */
> diff --git a/xen/include/public/arch-x86/hvm/save.h
> b/xen/include/public/arch-x86/hvm/save.h
> index 16d85a3..006924b 100644
> --- a/xen/include/public/arch-x86/hvm/save.h
> +++ b/xen/include/public/arch-x86/hvm/save.h
> @@ -568,6 +568,7 @@ struct hvm_hw_cpu_xsave {
>  struct hvm_viridian_domain_context {
>      uint64_t hypercall_gpa;
>      uint64_t guest_os_id;
> +    uint64_t reference_tsc;
>  };
> 
>  DECLARE_HVM_SAVE_TYPE(VIRIDIAN_DOMAIN, 15, struct
> hvm_viridian_domain_context);
> @@ -616,3 +617,13 @@ struct hvm_msr {
>  #define HVM_SAVE_CODE_MAX 20
> 
>  #endif /* __XEN_PUBLIC_HVM_SAVE_X86_H__ */
> +
> +/*
> + * Local variables:
> + * mode: C
> + * c-file-style: "BSD"
> + * c-basic-offset: 4
> + * tab-width: 4
> + * indent-tabs-mode: nil
> + * End:
> + */
> diff --git a/xen/include/public/hvm/params.h
> b/xen/include/public/hvm/params.h
> index 3c51072..a2d43bc 100644
> --- a/xen/include/public/hvm/params.h
> +++ b/xen/include/public/hvm/params.h
> @@ -92,10 +92,15 @@
>  #define _HVMPV_time_ref_count 2
>  #define HVMPV_time_ref_count  (1 << _HVMPV_time_ref_count)
> 
> +/* Enable Reference TSC Page (HV_X64_MSR_REFERENCE_TSC) */
> +#define _HVMPV_reference_tsc 3
> +#define HVMPV_reference_tsc  (1 << _HVMPV_reference_tsc)
> +
>  #define HVMPV_feature_mask \
>       (HVMPV_base_freq | \
>        HVMPV_no_freq | \
> -      HVMPV_time_ref_count)
> +      HVMPV_time_ref_count | \
> +      HVMPV_reference_tsc)
> 
>  #endif
> 
> --
> 1.7.10.4


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.