On Thu, Feb 01, 2018 at 02:57:59PM +0100, Tomasz Nowicki wrote:
> Hi Christoffer,
> 
> I created simple module for VM kernel. It is spinning on PSCI version
> hypercall to measure the base exit cost as you suggested. Also, I measured
> CPU cycles for each loop and here are my results:
> 
> My setup:
> 1-socket ThunderX2 running VM - 1VCPU
> 
> Tested baselines:
> a) host kernel v4.15-rc3 and VM kernel v4.15-rc3
> b) host kernel v4.15-rc3 + vhe-optimize-v3-with-fixes and VM kernel
> v4.15-rc3
> 
> Module was loaded from VM and the results are presented in [%] relative to
> average CPU cycles spending on PSCI version hypercall for vanilla VHE host
> kernel v4.15-rc3:
> 
>              VHE  |  nVHE
> =========================
> baseline a)  100% |  130%
> =========================
> baseline a)  36%  |  123%
> 
> So I confirm significant performance improvement, especially for VHE case.
> Additionally, I run network throughput tests with vhost-net but for that
> case no differences.

Hi Tomasz,

Can you share your test?

Yury
 
> Thanks,
> Tomasz
> 
> On 12.01.2018 13:07, Christoffer Dall wrote:
> > This series redesigns parts of KVM/ARM to optimize the performance on
> > VHE systems.  The general approach is to try to do as little work as
> > possible when transitioning between the VM and the hypervisor.  This has
> > the benefit of lower latency when waiting for interrupts and delivering
> > virtual interrupts, and reduces the overhead of emulating behavior and
> > I/O in the host kernel.
> > 
> > Patches 01 through 06 are not VHE specific, but rework parts of KVM/ARM
> > that can be generally improved.  We then add infrastructure to move more
> > logic into vcpu_load and vcpu_put, we improve handling of VFP and debug
> > registers.
> > 
> > We then introduce a new world-switch function for VHE systems, which we
> > can tweak and optimize for VHE systems.  To do that, we rework a lot of
> > the system register save/restore handling and emulation code that may
> > need access to system registers, so that we can defer as many system
> > register save/restore operations to vcpu_load and vcpu_put, and move
> > this logic out of the VHE world switch function.
> > 
> > We then optimize the configuration of traps.  On non-VHE systems, both
> > the host and VM kernels run in EL1, but because the host kernel should
> > have full access to the underlying hardware, but the VM kernel should
> > not, we essentially make the host kernel more privileged than the VM
> > kernel despite them both running at the same privilege level by enabling
> > VE traps when entering the VM and disabling those traps when exiting the
> > VM.  On VHE systems, the host kernel runs in EL2 and has full access to
> > the hardware (as much as allowed by secure side software), and is
> > unaffected by the trap configuration.  That means we can configure the
> > traps for VMs running in EL1 once, and don't have to switch them on and
> > off for every entry/exit to/from the VM.
> > 
> > Finally, we improve our VGIC handling by moving all save/restore logic
> > out of the VHE world-switch, and we make it possible to truly only
> > evaluate if the AP list is empty and not do *any* VGIC work if that is
> > the case, and only do the minimal amount of work required in the course
> > of the VGIC processing when we have virtual interrupts in flight.
> > 
> > The patches are based on v4.15-rc3, v9 of the level-triggered mapped
> > interrupts support series [1], and the first five patches of James' SDEI
> > series [2].
> > 
> > I've given the patches a fair amount of testing on Thunder-X, Mustang,
> > Seattle, and TC2 (32-bit) for non-VHE testing, and tested VHE
> > functionality on the Foundation model, running both 64-bit VMs and
> > 32-bit VMs side-by-side and using both GICv3-on-GICv3 and
> > GICv2-on-GICv3.
> > 
> > The patches are also available in the vhe-optimize-v3 branch on my
> > kernel.org repository [3].  The vhe-optimize-v3-base branch contains
> > prerequisites of this series.
> > 
> > Changes since v2:
> >   - Rebased on v4.15-rc3.
> >   - Includes two additional patches that only does vcpu_load after
> >     kvm_vcpu_first_run_init and only for KVM_RUN.
> >   - Addressed review comments from v2 (detailed changelogs are in the
> >     individual patches).
> > 
> > Thanks,
> > -Christoffer
> > 
> > [1]: git://git.kernel.org/pub/scm/linux/kernel/git/cdall/linux.git 
> > level-mapped-v9
> > [2]: git://linux-arm.org/linux-jm.git sdei/v5/base
> > [3]: git://git.kernel.org/pub/scm/linux/kernel/git/cdall/linux.git 
> > vhe-optimize-v3
> > 
> > Christoffer Dall (40):
> >    KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN
> >    KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init
> >    KVM: arm64: Avoid storing the vcpu pointer on the stack
> >    KVM: arm64: Rework hyp_panic for VHE and non-VHE
> >    KVM: arm/arm64: Get rid of vcpu->arch.irq_lines
> >    KVM: arm/arm64: Add kvm_vcpu_load_sysregs and kvm_vcpu_put_sysregs
> >    KVM: arm/arm64: Introduce vcpu_el1_is_32bit
> >    KVM: arm64: Defer restoring host VFP state to vcpu_put
> >    KVM: arm64: Move debug dirty flag calculation out of world switch
> >    KVM: arm64: Slightly improve debug save/restore functions
> >    KVM: arm64: Improve debug register save/restore flow
> >    KVM: arm64: Factor out fault info population and gic workarounds
> >    KVM: arm64: Introduce VHE-specific kvm_vcpu_run
> >    KVM: arm64: Remove kern_hyp_va() use in VHE switch function
> >    KVM: arm64: Don't deactivate VM on VHE systems
> >    KVM: arm64: Remove noop calls to timer save/restore from VHE switch
> >    KVM: arm64: Move userspace system registers into separate function
> >    KVM: arm64: Rewrite sysreg alternatives to static keys
> >    KVM: arm64: Introduce separate VHE/non-VHE sysreg save/restore
> >      functions
> >    KVM: arm/arm64: Remove leftover comment from kvm_vcpu_run_vhe
> >    KVM: arm64: Unify non-VHE host/guest sysreg save and restore functions
> >    KVM: arm64: Don't save the host ELR_EL2 and SPSR_EL2 on VHE systems
> >    KVM: arm64: Change 32-bit handling of VM system registers
> >    KVM: arm64: Rewrite system register accessors to read/write functions
> >    KVM: arm64: Introduce framework for accessing deferred sysregs
> >    KVM: arm/arm64: Prepare to handle deferred save/restore of SPSR_EL1
> >    KVM: arm64: Prepare to handle deferred save/restore of ELR_EL1
> >    KVM: arm64: Defer saving/restoring 64-bit sysregs to vcpu load/put on
> >      VHE
> >    KVM: arm64: Prepare to handle deferred save/restore of 32-bit
> >      registers
> >    KVM: arm64: Defer saving/restoring 32-bit sysregs to vcpu load/put
> >    KVM: arm64: Move common VHE/non-VHE trap config in separate functions
> >    KVM: arm64: Configure FPSIMD traps on vcpu load/put
> >    KVM: arm64: Configure c15, PMU, and debug register traps on cpu
> >      load/put for VHE
> >    KVM: arm64: Separate activate_traps and deactive_traps for VHE and
> >      non-VHE
> >    KVM: arm/arm64: Get rid of vgic_elrsr
> >    KVM: arm/arm64: Handle VGICv2 save/restore from the main VGIC code
> >    KVM: arm/arm64: Move arm64-only vgic-v2-sr.c file to arm64
> >    KVM: arm/arm64: Handle VGICv3 save/restore from the main VGIC code on
> >      VHE
> >    KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load
> >    KVM: arm/arm64: Avoid VGICv3 save/restore on VHE with no IRQs
> > 
> > Shih-Wei Li (1):
> >    KVM: arm64: Move HCR_INT_OVERRIDE to default HCR_EL2 guest flag
> > 
> >   arch/arm/include/asm/kvm_asm.h                    |   5 +-
> >   arch/arm/include/asm/kvm_emulate.h                |  21 +-
> >   arch/arm/include/asm/kvm_host.h                   |   6 +-
> >   arch/arm/include/asm/kvm_hyp.h                    |   4 +
> >   arch/arm/kvm/emulate.c                            |   4 +-
> >   arch/arm/kvm/hyp/Makefile                         |   1 -
> >   arch/arm/kvm/hyp/switch.c                         |  16 +-
> >   arch/arm64/include/asm/kvm_arm.h                  |   4 +-
> >   arch/arm64/include/asm/kvm_asm.h                  |  18 +-
> >   arch/arm64/include/asm/kvm_emulate.h              |  74 +++-
> >   arch/arm64/include/asm/kvm_host.h                 |  49 ++-
> >   arch/arm64/include/asm/kvm_hyp.h                  |  32 +-
> >   arch/arm64/include/asm/kvm_mmu.h                  |   2 +-
> >   arch/arm64/kernel/asm-offsets.c                   |   2 +
> >   arch/arm64/kvm/debug.c                            |  28 +-
> >   arch/arm64/kvm/guest.c                            |   3 -
> >   arch/arm64/kvm/hyp/Makefile                       |   2 +-
> >   arch/arm64/kvm/hyp/debug-sr.c                     |  88 +++--
> >   arch/arm64/kvm/hyp/entry.S                        |   9 +-
> >   arch/arm64/kvm/hyp/hyp-entry.S                    |  41 +--
> >   arch/arm64/kvm/hyp/switch.c                       | 404 
> > +++++++++++++---------
> >   arch/arm64/kvm/hyp/sysreg-sr.c                    | 192 ++++++++--
> >   {virt/kvm/arm => arch/arm64/kvm}/hyp/vgic-v2-sr.c |  81 -----
> >   arch/arm64/kvm/inject_fault.c                     |  24 +-
> >   arch/arm64/kvm/regmap.c                           |  65 +++-
> >   arch/arm64/kvm/sys_regs.c                         | 247 +++++++++++--
> >   arch/arm64/kvm/sys_regs.h                         |   4 +-
> >   arch/arm64/kvm/sys_regs_generic_v8.c              |   4 +-
> >   include/kvm/arm_vgic.h                            |   2 -
> >   virt/kvm/arm/aarch32.c                            |   2 +-
> >   virt/kvm/arm/arch_timer.c                         |   7 -
> >   virt/kvm/arm/arm.c                                |  50 ++-
> >   virt/kvm/arm/hyp/timer-sr.c                       |  44 +--
> >   virt/kvm/arm/hyp/vgic-v3-sr.c                     | 244 +++++++------
> >   virt/kvm/arm/mmu.c                                |   6 +-
> >   virt/kvm/arm/pmu.c                                |  37 +-
> >   virt/kvm/arm/vgic/vgic-init.c                     |  11 -
> >   virt/kvm/arm/vgic/vgic-v2.c                       |  61 +++-
> >   virt/kvm/arm/vgic/vgic-v3.c                       |  12 +-
> >   virt/kvm/arm/vgic/vgic.c                          |  21 ++
> >   virt/kvm/arm/vgic/vgic.h                          |   3 +
> >   41 files changed, 1229 insertions(+), 701 deletions(-)
> >   rename {virt/kvm/arm => arch/arm64/kvm}/hyp/vgic-v2-sr.c (50%)
> > 
_______________________________________________
kvmarm mailing list
kvmarm@lists.cs.columbia.edu
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm

Reply via email to