From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4AD3BC32750 for ; Tue, 13 Aug 2019 08:33:44 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 2686420663 for ; Tue, 13 Aug 2019 08:33:44 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727623AbfHMIdn (ORCPT ); Tue, 13 Aug 2019 04:33:43 -0400 Received: from mail-wm1-f67.google.com ([209.85.128.67]:38117 "EHLO mail-wm1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727129AbfHMIdn (ORCPT ); Tue, 13 Aug 2019 04:33:43 -0400 Received: by mail-wm1-f67.google.com with SMTP id m125so688168wmm.3 for ; Tue, 13 Aug 2019 01:33:42 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version:content-transfer-encoding; bh=i0/UjSTsRJKJbyjXWi8yfVIZ9WUaTfbBMXtRMChek+4=; b=WrUZs1pc6OsTjg0qIUQnD7DmIZ4BO4f+bMHMyWhV32EHdnEmsk26IYclpeu9Fx7Rm4 piyjx5BFkKcOlJSI2bA8CQuVw14+CQHW53O7RZ4up7yAfrobea9qY6a+e2QsLR2cBC4r tbmLOgjnX8b3ot8lwfWKoRpUBpyzGkbSUED/2HwoKwYmrXSwFEvDN1opkUbH+9gvVCJW C6UwilKBmcN+icL8Hf1B77qVBcQCnv8Ir0b0GdQfJD+I00pWuEfT5vaQL+vjVadrzkSz Jh/Gfoa8Hl+wDXOTOu2I4GguEV5SNVY3yJ+R3X+73Nfbdwy6gX85iF20Mz0JjAFQgrWl DC5A== X-Gm-Message-State: APjAAAXO+Rp2CM/lg7761SOAaqNKWrf+dU/0PMwU30iwfIInVIEsyOmd ecf79Bks/eg15rOy/qAQBgrx+Q== X-Google-Smtp-Source: APXvYqyUfqZfLtR2Esa+Td8DFXYYAp7MU1a2o74SoqdyLzHA14yv0VpukFvmQdgqpzYxsXYqDLPgnA== X-Received: by 2002:a05:600c:296:: with SMTP id 22mr1658378wmk.148.1565685221880; Tue, 13 Aug 2019 01:33:41 -0700 (PDT) Received: from vitty.brq.redhat.com (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id 4sm1438988wmd.26.2019.08.13.01.33.40 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Tue, 13 Aug 2019 01:33:41 -0700 (PDT) From: Vitaly Kuznetsov To: Michael Kelley , Tianyu Lan Cc: Peter Zijlstra , Tianyu Lan , "linux-arch\@vger.kernel.org" , "linux-hyperv\@vger.kernel.org" , "linux-kernel\@vger kernel org" , Andy Lutomirski , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , the arch/x86 maintainers , KY Srinivasan , Haiyang Zhang , Stephen Hemminger , Sasha Levin , Daniel Lezcano , Arnd Bergmann , "ashal\@kernel.org" Subject: RE: [PATCH 0/2] clocksource/Hyper-V: Add Hyper-V specific sched clock function In-Reply-To: References: <20190729075243.22745-1-Tianyu.Lan@microsoft.com> <87zhkxksxd.fsf@vitty.brq.redhat.com> <20190729110927.GC31398@hirez.programming.kicks-ass.net> <87wog1kpib.fsf@vitty.brq.redhat.com> Date: Tue, 13 Aug 2019 10:33:37 +0200 Message-ID: <87sgq5a2hq.fsf@vitty.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Sender: linux-hyperv-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-hyperv@vger.kernel.org Michael Kelley writes: > From: Tianyu Lan Sent: Tuesday, July 30, 2019 6:41 AM >> >> On Mon, Jul 29, 2019 at 8:13 PM Vitaly Kuznetsov wrote: >> > >> > Peter Zijlstra writes: >> > >> > > On Mon, Jul 29, 2019 at 12:59:26PM +0200, Vitaly Kuznetsov wrote: >> > >> lantianyu1986@gmail.com writes: >> > >> >> > >> > From: Tianyu Lan >> > >> > >> > >> > Hyper-V guests use the default native_sched_clock() in pv_ops.time.sched_clock >> > >> > on x86. But native_sched_clock() directly uses the raw TSC value, which >> > >> > can be discontinuous in a Hyper-V VM. Add the generic hv_setup_sched_clock() >> > >> > to set the sched clock function appropriately. On x86, this sets >> > >> > pv_ops.time.sched_clock to read the Hyper-V reference TSC value that is >> > >> > scaled and adjusted to be continuous. >> > >> >> > >> Hypervisor can, in theory, disable TSC page and then we're forced to use >> > >> MSR-based clocksource but using it as sched_clock() can be very slow, >> > >> I'm afraid. >> > >> >> > >> On the other hand, what we have now is probably worse: TSC can, >> > >> actually, jump backwards (e.g. on migration) and we're breaking the >> > >> requirements for sched_clock(). >> > > >> > > That (obviously) also breaks the requirements for using TSC as >> > > clocksource. >> > > >> > > IOW, it breaks the entire purpose of having TSC in the first place. >> > >> > Currently, we mark raw TSC as unstable when running on Hyper-V (see >> > 88c9281a9fba6), 'TSC page' (which is TSC * scale + offset) is being used >> > instead. The problem is that 'TSC page' can be disabled by the >> > hypervisor and in that case the only remaining clocksource is MSR-based >> > (slow). >> > >> >> Yes, that will be slow if Hyper-V doesn't expose hv tsc page and >> kernel uses MSR based >> clocksource. Each MSR read will trigger one VM-EXIT. This also happens on other >> hypervisors (e,g, KVM doesn't expose KVM clock). Hypervisor should >> take this into >> account and determine which clocksource should be exposed or not. >> > > We've confirmed with the Hyper-V team that the TSC page is always available > on Hyper-V 2016 and later, and on Hyper-V 2012 R2 when the physical > hardware presents an InvariantTSC. Currently we check that TSC page is valid on every read and it seems this is redundant, right? It is either available on boot or not. I can only imagine migrating a VM to a non-InvariantTSC host when Hyper-V will likely disable the page (and we can get reenlightenment notification then). > But the Linux Kconfig's are set up so > the TSC page is not used for 32-bit guests -- all clock reads are synthetic MSR > reads. For 32-bit, this set of changes will add more overhead because the > sched clock reads will now be MSR reads. > > I would be inclined to fix the problem, even with the perf hit on 32-bit Linux. > I don’t have any data on 32-bit Linux being used in a Hyper-V guest, but it's not > supported in Azure so usage is pretty small. The alternative would be to continue > to use the raw TSC value on 32-bit, even with the risk of a discontinuity in case of > live migration or similar scenarios. The issue needs fixing, I agree, however using MSR based clocksource as sched clock may give us too big of a performance hit (not sure who cares about 32 bit guest performance nowadays but still). What stops us from enabling TSC page for 32 bit guests if it is available? -- Vitaly