|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2] x86/PV: remove unnecessary toggle_guest_pt() overhead
On 02.04.2020 21:27, Andrew Cooper wrote:
> On 20/12/2019 14:06, Jan Beulich wrote:
>> While the mere updating of ->pv_cr3 and ->root_pgt_changed aren't overly
>> expensive (but still needed only for the toggle_guest_mode() path), the
>> effect of the latter on the exit-to-guest path is not insignificant.
>> Move the logic into toggle_guest_mode(), on the basis that
>> toggle_guest_pt() will always be invoked in pairs, yet we can't safely
>> undo the setting of root_pgt_changed during the second of these
>> invocations.
>>
>> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
>
> Ohhhhh.
>
> I think this is the first time I've actually understood the "overhead"
> you're talking about here, but honestly, I still had to work very hard
> to figure it out.
>
> If I were writing the commit message, it would be something like this:
>
> Logic such as guest_io_okay() and guest_get_eff_kern_l1e() calls
> toggle_guest_pt() in pairs to pull a value out of guest kernel memory,
> then return to the previous pagetable context.
>
> This is transparent and doesn't modify the pagetables, so there is no
> need to undergo an expensive resync on the return-to-guest path
> triggered by setting cpu_info->root_pgt_changed.
>
> Move the logic from _toggle_guest_pt() to toggle_guest_mode(), which is
> intending to return to guest context in a different pagetable context.
Well, I think all of what you say is also being said by my variant,
just in a different way. I'd prefer to stick to my version, but I
could live with using yours if this helps finally getting this in.
>> --- a/xen/arch/x86/pv/domain.c
>> +++ b/xen/arch/x86/pv/domain.c
>> @@ -365,18 +365,10 @@ bool __init xpti_pcid_enabled(void)
>>
>> static void _toggle_guest_pt(struct vcpu *v)
>> {
>> - const struct domain *d = v->domain;
>> - struct cpu_info *cpu_info = get_cpu_info();
>> unsigned long cr3;
>>
>> v->arch.flags ^= TF_kernel_mode;
>> update_cr3(v);
>> - if ( d->arch.pv.xpti )
>> - {
>> - cpu_info->root_pgt_changed = true;
>> - cpu_info->pv_cr3 = __pa(this_cpu(root_pgt)) |
>> - (d->arch.pv.pcid ? get_pcid_bits(v, true) : 0);
>> - }
>>
>> /*
>> * Don't flush user global mappings from the TLB. Don't tick TLB clock.
>> @@ -384,15 +376,11 @@ static void _toggle_guest_pt(struct vcpu
>> * In shadow mode, though, update_cr3() may need to be accompanied by a
>> * TLB flush (for just the incoming PCID), as the top level page table
>> may
>> * have changed behind our backs. To be on the safe side, suppress the
>> - * no-flush unconditionally in this case. The XPTI CR3 write, if
>> enabled,
>> - * will then need to be a flushing one too.
>> + * no-flush unconditionally in this case.
>> */
>> cr3 = v->arch.cr3;
>> - if ( shadow_mode_enabled(d) )
>> - {
>> + if ( shadow_mode_enabled(v->domain) )
>> cr3 &= ~X86_CR3_NOFLUSH;
>> - cpu_info->pv_cr3 &= ~X86_CR3_NOFLUSH;
>> - }
>> write_cr3(cr3);
>>
>> if ( !(v->arch.flags & TF_kernel_mode) )
>> @@ -408,6 +396,8 @@ static void _toggle_guest_pt(struct vcpu
>>
>> void toggle_guest_mode(struct vcpu *v)
>> {
>> + const struct domain *d = v->domain;
>> +
>> ASSERT(!is_pv_32bit_vcpu(v));
>>
>> /* %fs/%gs bases can only be stale if WR{FS,GS}BASE are usable. */
>> @@ -421,6 +411,21 @@ void toggle_guest_mode(struct vcpu *v)
>> asm volatile ( "swapgs" );
>>
>> _toggle_guest_pt(v);
>> +
>> + if ( d->arch.pv.xpti )
>> + {
>> + struct cpu_info *cpu_info = get_cpu_info();
>> +
>> + cpu_info->root_pgt_changed = true;
>> + cpu_info->pv_cr3 = __pa(this_cpu(root_pgt)) |
>> + (d->arch.pv.pcid ? get_pcid_bits(v, true) : 0);
>> + /*
>> + * As in _toggle_guest_pt() the XPTI CR3 write needs to be a TLB-
>> + * flushing one too for shadow mode guests.
>> + */
>> + if ( shadow_mode_enabled(d) )
>> + cpu_info->pv_cr3 &= ~X86_CR3_NOFLUSH;
>> + }
>> }
>>
>
> I think this wants a note for anyone trying to follow the logic.
>
> /* Must be called in matching pairs without returning to guest context
> inbetween. */
>
>> void toggle_guest_pt(struct vcpu *v)
Despite your comment being ahead of it, I understand you mean
it to apply to this line? I'm certainly fine to add this comment,
but it's unrelated to the change at hand - the requirement has
been there before afaict.
> If the callers were more complicated than they are, or we might credibly
> gain more users, I would suggest it would be worth trying to assert the
> "called in pairs" aspect.
>
> However, I can't think of any trivial way to check this, and I don't
> think it is worth a complicated check.
Indeed I've been trying to think of some reasonable way of doing
so years ago.
Jan
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |