From nobody Fri Apr 19 20:42:19 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=citrix.com ARC-Seal: i=1; a=rsa-sha256; t=1578587079; cv=none; d=zohomail.com; s=zohoarc; b=Ei68u27Sj1YNC4ZcHQ/ktXxp/wkLa1yPDW9xOBtwfHh182yri1Yb79ibuRVAZNKFRh8wxKcetTMBeb2/8yNlCyEIJSXuDxzwJMcNdBw3jx7LLlr4QKq9VfPjk7nvr8pK8gHIBNZr1vCpSjtNo1ggYfOHtU+YoWyuhj1ZWBNB4pY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1578587079; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=PKm2reM6mCM5RTkIBR5Ii7A2Z0IwCunso1UN1jdixQw=; b=UPrunkSaapn1NMHUGZDiUZNo6/pz+9GNAHy+qHBIHczl1ff48XLd3m2DpLCuv/IC9j/CLKJhQGVdFepGPxd8Kxc14cUQRdq74AUTLV8TmIWV3uz1FDmAOjipz9ofc3Km/uh7XOIqKg0hetM4G0Wb3dIsgViV4L2YwTh4Nr6B+n8= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail; spf=none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1578587079749775.6949078227967; Thu, 9 Jan 2020 08:24:39 -0800 (PST) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1ipaaT-0002KR-AN; Thu, 09 Jan 2020 16:23:09 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1ipaaR-0002KK-PJ for xen-devel@lists.xenproject.org; Thu, 09 Jan 2020 16:23:07 +0000 Received: from esa5.hc3370-68.iphmx.com (unknown [216.71.155.168]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 4c283996-32fc-11ea-a985-bc764e2007e4; Thu, 09 Jan 2020 16:22:58 +0000 (UTC) X-Inumbo-ID: 4c283996-32fc-11ea-a985-bc764e2007e4 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1578586978; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=pYtSnceMKC1gf3OSvgZpJ6uF+rdQoD3M4mDu1ASClGs=; b=JTqGRNQem+xvvXmiHlF0nID37YmatHtJRCNHZHV0KY96YwOetRXBuf60 qTWutp/4dVDEtfx1BmprsINbK5PPR7MrqKFEdRxJnvWAi4hYi8Qos2/vv ztcGphFt9D7HwhDaBLNfd2SferZNpYXcRc3W9Q2Z8ogvyR+PzbMLAdot0 I=; Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=roger.pau@citrix.com; spf=Pass smtp.mailfrom=roger.pau@citrix.com; spf=None smtp.helo=postmaster@mail.citrix.com Received-SPF: none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: None (esa5.hc3370-68.iphmx.com: no sender authenticity information available from domain of roger.pau@citrix.com) identity=pra; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="roger.pau@citrix.com"; x-conformance=sidf_compatible Received-SPF: Pass (esa5.hc3370-68.iphmx.com: domain of roger.pau@citrix.com designates 162.221.158.21 as permitted sender) identity=mailfrom; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="roger.pau@citrix.com"; x-conformance=sidf_compatible; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:209.167.231.154 ip4:178.63.86.133 ip4:195.66.111.40/30 ip4:85.115.9.32/28 ip4:199.102.83.4 ip4:192.28.146.160 ip4:192.28.146.107 ip4:216.52.6.88 ip4:216.52.6.188 ip4:162.221.158.21 ip4:162.221.156.83 ip4:168.245.78.127 ~all" Received-SPF: None (esa5.hc3370-68.iphmx.com: no sender authenticity information available from domain of postmaster@mail.citrix.com) identity=helo; client-ip=162.221.158.21; receiver=esa5.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="postmaster@mail.citrix.com"; x-conformance=sidf_compatible IronPort-SDR: HSphvmr5bxEQV0/Wt3n0KGB6zD++tqQxE2miPJoPAH8AveSjR17dEI+SYJ2F+aroLQzOxqM664 D9NQxJNfXXWlrP3oiruiTxu49HZQepV1xWGtQPmOcr9Wl5tgNbrcg5kDqpobVTocdfMqrP9Pw0 2404Ps7Dpg/CrZAeIh1J6HR6oyHu/gGDaaUCPuXQfcA5+R6ux6QFB4edcmZqad7OvkSWKYTtQr SHquaK54LA/LNP5J61d86o2KEL4YhgETgD89/kUS/trEaRpzzFRVrGwEcUIQ/vO1p2OUJDssui /v8= X-SBRS: 2.7 X-MesageID: 11069518 X-Ironport-Server: esa5.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.69,414,1571716800"; d="scan'208";a="11069518" From: Roger Pau Monne To: Date: Thu, 9 Jan 2020 17:22:32 +0100 Message-ID: <20200109162232.82782-1-roger.pau@citrix.com> X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Subject: [Xen-devel] [PATCH] x86/smp: use APIC ALLBUT destination shorthand when possible X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Andrew Cooper , Wei Liu , Jan Beulich , Roger Pau Monne Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) If the IPI destination mask matches the mask of online CPUs use the APIC ALLBUT destination shorthand in order to send an IPI to all CPUs on the system except the current one. This can only be safely used when no CPU hotplug or unplug operations are taking place, no offline CPUs or those have been onlined and parked and finally when all CPUs in the system have been accounted for (ie: the number of CPUs doesn't exceed NR_CPUS and APIC IDs are below MAX_APICS). This is specially beneficial when using the PV shim, since using the shorthand avoids performing an APIC register write (or multiple ones if using xAPIC mode) for each destination when doing a global TLB flush. The lock time of flush_lock on a 32 vCPU guest using the shim without the shorthand is: Global lock flush_lock: addr=3Dffff82d0804b21c0, lockval=3Df602f602, not lo= cked lock:228455938(79406065573135), block:205908580(556416605761539) Average lock time: 347577ns While the same guest using the shorthand: Global lock flush_lock: addr=3Dffff82d0804b41c0, lockval=3Dd9c4d9bc, cpu=3D= 12 lock:1890775(416719148054), block:1663958(2500161282949) Average lock time: 220395ns Approximately a 1/3 improvement in the lock time. Note that this requires locking the CPU maps (get_cpu_maps) which uses a trylock. This is currently safe as all users of cpu_add_remove_lock do a trylock, but will need reevaluating if non-trylock users appear. Also there's some code movement of __prepare_ICR and __default_send_IPI_shortcut, which is a non-functional change but I didn't feel like it should be split to a separate patch. Signed-off-by: Roger Pau Monn=C3=A9 --- Changes since v1: - Move the shorthand logic to send_IPI_mask. - Check interrupts are enabled before trying to get the cpu maps lock. - Move __prepare_ICR and __default_send_IPI_shortcut. --- xen/arch/x86/acpi/boot.c | 1 + xen/arch/x86/mpparse.c | 5 +++ xen/arch/x86/smp.c | 86 +++++++++++++++++++++++++++------------ xen/include/asm-x86/smp.h | 2 + 4 files changed, 68 insertions(+), 26 deletions(-) diff --git a/xen/arch/x86/acpi/boot.c b/xen/arch/x86/acpi/boot.c index 15542a9bdf..88e1a89ff0 100644 --- a/xen/arch/x86/acpi/boot.c +++ b/xen/arch/x86/acpi/boot.c @@ -103,6 +103,7 @@ acpi_parse_x2apic(struct acpi_subtable_header *header, = const unsigned long end) processor->lapic_flags & ACPI_MADT_ENABLED ? KERN_WARNING "WARNING: " : KERN_INFO, processor->local_apic_id, processor->uid); + cpu_overflow =3D true; /* * Must not return an error here, to prevent * acpi_table_parse_entries() from terminating early. diff --git a/xen/arch/x86/mpparse.c b/xen/arch/x86/mpparse.c index f057d9162f..8d7739fbf4 100644 --- a/xen/arch/x86/mpparse.c +++ b/xen/arch/x86/mpparse.c @@ -66,6 +66,9 @@ static unsigned int __initdata disabled_cpus; /* Bitmask of physically existing CPUs */ physid_mask_t phys_cpu_present_map; =20 +/* Record whether CPUs haven't been added due to overflows. */ +bool __read_mostly cpu_overflow; + void __init set_nr_cpu_ids(unsigned int max_cpus) { unsigned int tot_cpus =3D num_processors + disabled_cpus; @@ -160,6 +163,7 @@ static int MP_processor_info_x(struct mpc_config_proces= sor *m, printk_once(XENLOG_WARNING "WARNING: NR_CPUS limit of %u reached - ignoring further processors= \n", nr_cpu_ids); + cpu_overflow =3D true; return -ENOSPC; } =20 @@ -167,6 +171,7 @@ static int MP_processor_info_x(struct mpc_config_proces= sor *m, && genapic.name =3D=3D apic_default.name) { printk_once(XENLOG_WARNING "WARNING: CPUs limit of 8 reached - ignoring futher processors\n"); + cpu_overflow =3D true; return -ENOSPC; } =20 diff --git a/xen/arch/x86/smp.c b/xen/arch/x86/smp.c index c8e5913e47..6510dd84ab 100644 --- a/xen/arch/x86/smp.c +++ b/xen/arch/x86/smp.c @@ -8,6 +8,7 @@ * later. */ =20 +#include #include #include #include @@ -23,6 +24,31 @@ #include #include =20 +static inline int __prepare_ICR(unsigned int shortcut, int vector) +{ + return APIC_DM_FIXED | shortcut | vector; +} + +static void __default_send_IPI_shortcut(unsigned int shortcut, int vector, + unsigned int dest) +{ + unsigned int cfg; + + /* + * Wait for idle. + */ + apic_wait_icr_idle(); + + /* + * prepare target chip field + */ + cfg =3D __prepare_ICR(shortcut, vector) | dest; + /* + * Send the IPI. The write to APIC_ICR fires this off. + */ + apic_write(APIC_ICR, cfg); +} + /* * send_IPI_mask(cpumask, vector): sends @vector IPI to CPUs in @cpumask, * excluding the local CPU. @cpumask may be empty. @@ -30,7 +56,40 @@ =20 void send_IPI_mask(const cpumask_t *mask, int vector) { - alternative_vcall(genapic.send_IPI_mask, mask, vector); + bool cpus_locked =3D false; + + /* + * Prevent any CPU hot{un}plug while sending the IPIs if we are to use + * a shorthand, also refuse to use a shorthand if not all CPUs are + * online or have been parked. + */ + if ( system_state > SYS_STATE_smp_boot && !cpu_overflow && + /* NB: get_cpu_maps lock requires enabled interrupts. */ + local_irq_is_enabled() && (cpus_locked =3D get_cpu_maps()) && + (park_offline_cpus || + cpumask_equal(&cpu_online_map, &cpu_present_map)) ) + { + cpumask_copy(this_cpu(scratch_cpumask), &cpu_online_map); + cpumask_clear_cpu(smp_processor_id(), this_cpu(scratch_cpumask)); + } + else + { + if ( cpus_locked ) + { + put_cpu_maps(); + cpus_locked =3D false; + } + cpumask_clear(this_cpu(scratch_cpumask)); + } + + if ( cpumask_equal(mask, this_cpu(scratch_cpumask)) ) + __default_send_IPI_shortcut(APIC_DEST_ALLBUT, vector, + APIC_DEST_PHYSICAL); + else + alternative_vcall(genapic.send_IPI_mask, mask, vector); + + if ( cpus_locked ) + put_cpu_maps(); } =20 void send_IPI_self(int vector) @@ -80,11 +139,6 @@ void send_IPI_self(int vector) * The following functions deal with sending IPIs between CPUs. */ =20 -static inline int __prepare_ICR (unsigned int shortcut, int vector) -{ - return APIC_DM_FIXED | shortcut | vector; -} - static inline int __prepare_ICR2 (unsigned int mask) { return SET_xAPIC_DEST_FIELD(mask); @@ -99,26 +153,6 @@ void apic_wait_icr_idle(void) cpu_relax(); } =20 -static void __default_send_IPI_shortcut(unsigned int shortcut, int vector, - unsigned int dest) -{ - unsigned int cfg; - - /* - * Wait for idle. - */ - apic_wait_icr_idle(); - - /* - * prepare target chip field - */ - cfg =3D __prepare_ICR(shortcut, vector) | dest; - /* - * Send the IPI. The write to APIC_ICR fires this off. - */ - apic_write(APIC_ICR, cfg); -} - void send_IPI_self_legacy(uint8_t vector) { __default_send_IPI_shortcut(APIC_DEST_SELF, vector, APIC_DEST_PHYSICAL= ); diff --git a/xen/include/asm-x86/smp.h b/xen/include/asm-x86/smp.h index dbeed2fd41..3df4185744 100644 --- a/xen/include/asm-x86/smp.h +++ b/xen/include/asm-x86/smp.h @@ -84,6 +84,8 @@ extern cpumask_t **socket_cpumask; #define get_cpu_current(cpu) \ (get_cpu_info_from_stack((unsigned long)stack_base[cpu])->current_vcpu) =20 +extern bool cpu_overflow; + #endif /* !__ASSEMBLY__ */ =20 #endif --=20 2.24.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel