[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH linux-next v2] x86/xen/time: prefer tsc as clocksource when it is invariant


  • To: Krister Johansen <kjlx@xxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 13 Dec 2022 08:23:29 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Z2CwDtY0amO889UVeAN/5ezcpX9vWKAy1hKH5LfCURQ=; b=jtUepVVC06GmnBo/lcUOxO+RRLJJZQYNo12UKwJ6d3qdC4h9xYrRViD3ASe0qrdiaUiEi9hSGUGKTiYzg00oTasjvMEd4XfS5s9zDzd87NpyJDC0i3VCWtfE9ECzLaFM8nIRl+vpRbaAHUBDcIPB0e0HzKA5nQssC8plRe3xze0UC8L7FeJiqLFpke5b9T/fJIyf+H0fyMZSYXkFLjmVLTkt4+UIaSVDoLeq4lCnHTdIg/foDiHgmNuSRJCcRz5hq3HwsP5ZV/pJTioJPpG5eTTaLqyrN7zYBsYmo8p+shtd0EXAPUreBGmUJdupGybZw07TkFH1AU44ltZ2o6w7Kw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=McrD9DuznWtHEF2mpqRtiLhSU7s7Dj9eTiu1zTzqJJ5Dafcdddh+RuMeQ3Wjhs9v9E7JnjwpWY8yu1JjlTOxYKzq/N6pfLoOhU5ZDvGNnSB1iEwVFBENdpx5hqjRgNEU/QR6HCqla/FOKpyJv8gDis8lJOJZdEsdfiYrU400om7iN5+QGX9nGB7SqKgSiybEHissQre2Vj/8WHXGL6WRxs78DiR03czozXlEuP6yCrmlYvigmWYjBriENTivVT0EXJf0g8ZMy3OQ/zm5F2LtF1bEkXq/TcXDf7pgqcAAXrWM3FASuLxF/dE/P3ddEReVCi+l15EdDDfPsqWWajrEzA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Thomas Gleixner <tglx@xxxxxxxxxxxxx>, Ingo Molnar <mingo@xxxxxxxxxx>, Borislav Petkov <bp@xxxxxxxxx>, Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>, x86@xxxxxxxxxx, "H. Peter Anvin" <hpa@xxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, Marcelo Tosatti <mtosatti@xxxxxxxxxx>, Anthony Liguori <aliguori@xxxxxxxxxx>, David Reaver <me@xxxxxxxxxxxxxxx>, Brendan Gregg <brendan@xxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  • Delivery-date: Tue, 13 Dec 2022 07:23:42 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 12.12.2022 23:05, Krister Johansen wrote:
> On Mon, Dec 12, 2022 at 05:46:29PM +0100, Jan Beulich wrote:
>> On 12.12.2022 17:05, Krister Johansen wrote:
>>> Both the Intel SDM[4] and the Xen tsc documentation explain that marking
>>> a tsc as invariant means that it should be considered stable by the OS
>>> and is elibile to be used as a wall clock source.  The Xen documentation
>>> further clarifies that this is only reliable on HVM and PVH because PV
>>> cannot intercept a cpuid instruction.
>>
>> Without meaning to express a view on the argumentation as a whole, this
>> PV aspect is suspicious. Unless you open-code a use of the CPUID insn
>> in the kernel, all uses of CPUID are going to be processed by Xen by
>> virtue of the respective pvops hook. Documentation says what it says
>> for environments where this might not be the case.
> 
> Thanks, appreciate the clarification here. Just restating this for my
> own understanding: your advice would be to drop this check below?

No, I'm unconvinced of if/where this transformation is really appropriate.
My comment was merely to indicate that the justification for ...

>>> +   if (!(xen_hvm_domain() || xen_pvh_domain()))
>>> +           return 0;

... this isn't really correct.

> And then update the commit message to dispense with the distinction
> between HVM, PV, and PVH?
> 
>>> +   cpuid(xen_cpuid_base() + 3, &eax, &ebx, &ecx, &edx);
>>
>> Xen leaf 3 has sub-leaves, so I think you need to set ecx to zero before
>> this call.
> 
> The cpuid() inline in arch/x86/include/asm/processor.h assigns zero to
> ecx prior to calling __cpuid.  In arch/x86/boot/cpuflags.c the macros
> are a little different, but it looks like there too, the macro passes 0
> as an input argument to cpuid_count which ends up being %ecx.  Happy to
> fix this up if I'm looking at the wrong cpuid functions, though.

Oh, I didn't expect cpuid() to be more than a trivial wrapper around the
the pvops hook, and I merely looked at native_cpuid() and xen_cpuid().
I'm sorry for the noise then. Yet still, with there being sub-leaves, I'd
recommend switching to cpuid_count() just for clarity.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.