From patchwork Thu Mar 10 12:55:57 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Vrabel X-Patchwork-Id: 8557061 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 044EC9F7CA for ; Thu, 10 Mar 2016 12:59:23 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 0AEF220306 for ; Thu, 10 Mar 2016 12:59:22 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B16092034A for ; Thu, 10 Mar 2016 12:59:20 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xen.org with esmtp (Exim 4.84) (envelope-from ) id 1ae08V-00065K-Dc; Thu, 10 Mar 2016 12:56:15 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.84) (envelope-from ) id 1ae08U-00065E-PF for xen-devel@lists.xenproject.org; Thu, 10 Mar 2016 12:56:14 +0000 Received: from [85.158.139.211] by server-1.bemta-5.messagelabs.com id 42/26-29419-EEE61E65; Thu, 10 Mar 2016 12:56:14 +0000 X-Env-Sender: prvs=870d2e9a1=david.vrabel@citrix.com X-Msg-Ref: server-2.tower-206.messagelabs.com!1457614572!12039843!1 X-Originating-IP: [66.165.176.63] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni42MyA9PiAzMDYwNDg=\n, received_headers: No Received headers X-StarScan-Received: X-StarScan-Version: 8.11; banners=-,-,- X-VirusChecked: Checked Received: (qmail 30134 invoked from network); 10 Mar 2016 12:56:13 -0000 Received: from smtp02.citrix.com (HELO SMTP02.CITRIX.COM) (66.165.176.63) by server-2.tower-206.messagelabs.com with RC4-SHA encrypted SMTP; 10 Mar 2016 12:56:13 -0000 X-IronPort-AV: E=Sophos;i="5.24,315,1454976000"; d="scan'208";a="344618023" From: David Vrabel To: Date: Thu, 10 Mar 2016 12:55:57 +0000 Message-ID: <1457614557-2264-1-git-send-email-david.vrabel@citrix.com> X-Mailer: git-send-email 2.1.4 MIME-Version: 1.0 X-DLP: MIA2 Cc: Andrew Cooper , David Vrabel , Jan Beulich Subject: [Xen-devel] [PATCHv3] x86: don't flush the whole cache when changing cachability X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Introduce the FLUSH_VA_VALID flag to flush_area_mask() and friends to say that it is safe to use CLFLUSH (i.e., the virtual address is still valid). Use this when changing the cachability of the Xen direct mappings (in response to the guest changing the cachability of its mappings). This significantly improves performance by avoiding an expensive WBINVD. This fixes a performance regression introduced by c61a6f74f80eb36ed83a82f713db3143159b9009 (x86: enforce consistent cachability of MMIO mappings), the fix for XSA-154. e.g., A set_memory_wc() call in Linux: before: 4097 us after: 47 us Signed-off-by: David Vrabel --- v3: - Only set FLUSH_VA_VALID if virt is in [DIRECTMAP_VIRT_START, HYPERVISORP_VIRT_END). v2: - Only set FLUSH_VA_VALID if virt is in [DIRECTMAP_VIRT_START, DIRECTMAP_VIRT_END). --- xen/arch/x86/flushtlb.c | 3 ++- xen/arch/x86/mm.c | 5 +++++ xen/include/asm-x86/flushtlb.h | 2 ++ 3 files changed, 9 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/flushtlb.c b/xen/arch/x86/flushtlb.c index 582a1e2..ee61aab 100644 --- a/xen/arch/x86/flushtlb.c +++ b/xen/arch/x86/flushtlb.c @@ -140,7 +140,8 @@ unsigned int flush_area_local(const void *va, unsigned int flags) if ( order < (BITS_PER_LONG - PAGE_SHIFT) ) sz = 1UL << (order + PAGE_SHIFT); - if ( !(flags & (FLUSH_TLB|FLUSH_TLB_GLOBAL)) && + if ( (!(flags & (FLUSH_TLB|FLUSH_TLB_GLOBAL)) || + (flags & FLUSH_VA_VALID)) && c->x86_clflush_size && c->x86_cache_size && sz && ((sz >> 10) < c->x86_cache_size) ) { diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 36c4487..c997b53 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -5641,7 +5641,12 @@ int map_pages_to_xen( flush_flags |= FLUSH_TLB_GLOBAL; \ if ( (flags & _PAGE_PRESENT) && \ (((o_) ^ flags) & PAGE_CACHE_ATTRS) ) \ + { \ flush_flags |= FLUSH_CACHE; \ + if ( virt >= DIRECTMAP_VIRT_START && \ + virt < HYPERVISOR_VIRT_END ) \ + flush_flags |= FLUSH_VA_VALID; \ + } \ } while (0) while ( nr_mfns != 0 ) diff --git a/xen/include/asm-x86/flushtlb.h b/xen/include/asm-x86/flushtlb.h index 4ea31c2..2e7ed6b 100644 --- a/xen/include/asm-x86/flushtlb.h +++ b/xen/include/asm-x86/flushtlb.h @@ -85,6 +85,8 @@ void write_cr3(unsigned long cr3); #define FLUSH_TLB_GLOBAL 0x200 /* Flush data caches */ #define FLUSH_CACHE 0x400 + /* VA for the flush has a valid mapping */ +#define FLUSH_VA_VALID 0x800 /* Flush local TLBs/caches. */ unsigned int flush_area_local(const void *va, unsigned int flags);