[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] xen/arm: avoid extra caclulations when setting vtimer in context switch


  • To: Jiamei Xie <Jiamei.Xie@xxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Tue, 28 Jun 2022 07:29:21 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6XOUgNQhhdpx8lS4C8GrtRkhs9t6JQRMFzK7XI5APXg=; b=RmpmpTxvN2mPxGzfMdh8SnEcAKqaGrwzzaz+nEC0slD+qGSWT2tl3ZGWds+ut1bTz+5NrFZGkuFjBULS1tJdZqMhNKEdc1NhYmuMMAbTEOVg9kVJ6khuqdlJOvFmRP2nqdh3oryZuV/68UEVI+HQJkU0ffDBL3HbBOKCeFXQkclS1OKPNQaBT2T9iOcuHBeRWqf+Pam26+nJaHCZ1cl8zxnFpyrQ9dpTnP996ZDiFXaMzYyDQzQlIzziyDm50l7yxpWB612K3qxaFmOCTrzendcRB39HFEiy2mPKwa3sXANDIbJ202yvhd1prUYXzHov1hlp7MCkm2vKWhAYt7jdsQ==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6XOUgNQhhdpx8lS4C8GrtRkhs9t6JQRMFzK7XI5APXg=; b=hv3gxJFUWQ9nz/8Ow9+flKjnHf3cP1D85Y/9Hdg4riZcoh26NpXiJP6D5pzOOgGwA2ys8wJJrzs4SltrBflaYN0AROCV1x+9hC9tnvi+Zagnd58M5iB3uuJW0j15H6nr7SDYatPvj+snPY7ajc0c2sd7lYE8B26aTkdmalY96cGpCCXVuwoTcRXr6t9NoYcAFMY7jgCLW/o5Sc+yaH2BL3p7yxBEYoSvj5/EQER+1H8dn9CoByRlON65nLUZjR+Oi/FQNL+Wa+bx/N9LTmqMFYHnUsrNa3RJRIOlmA79g4ojVdNw1me+PTEbAMKDvTaBBnAn9mREWLGGSlPvcPSKgg==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=EmT+NiVruQBaT2VZAu24oTlamV+iEIRcEfldtRKoAxcHXnY6K41853kIzOMMkY2UBa/6IaN21dGW8c4441fN+1I6rwv43lexbTkhJqtOXnccRqYBgfGj38C1N7ToaXyRfxSGR+rSHEWUF2fc3QLQoDpszP3zKh+eK1YHcj5PLXAPuL5YJZ35ZXRyMxPx5xaF9GRm/i0skA/rEFrcz586Vp2DadTkOP9zUQ6Ey2q3ufUMJT2PqXQ1e5cJ9wKXhZuD7OxI2/+WjgBWEB7pzFtKnmVyIxHi4QgXGml/ae4qKOwSIHJIYr/dyGRkbNQTHxLqKVmYvAEkjwsJhvXfBRR3vg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CZ5GSMhLuffUNVYJOBkdmgQdV58RP/awwsEn5Sm4+KF3/wSuV27ZRey4XuowGxvHQFZ+HYloxCc+BEU/k1TD3RLRTy87/9JP9wmIlbuXwAA7oYF84GnqnjIEf32PI7mepfaOGw1/4L4iPBLhjOnGu0a2iLN1vI2YSjMXmyzeGp4/oBqCwyHILi/W0epJ7PFe/efbVJQ/SznlH8LCQvyr6ZqY4dy+ZmWeO9PyE/jicSW0/sJweLjSzv0Q2326WqUmXJbYJKDSrT+6KuJ1CmvDxpeWg/UDZ3/iJTklgLjUwovalCXtmFpQqgEPbB6x75PevbSEENGYUU+zRN0Gs2BeZg==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Julien Grall <julien@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Wei Chen <Wei.Chen@xxxxxxx>
  • Delivery-date: Tue, 28 Jun 2022 07:29:59 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYidHe3XYB0asC1UCP3Ythq1qeCq1jD7IAgAFPFoCAAA8lgA==
  • Thread-topic: [PATCH] xen/arm: avoid extra caclulations when setting vtimer in context switch

Hi Jiamei,

> On 28 Jun 2022, at 07:35, Jiamei Xie <Jiamei.Xie@xxxxxxx> wrote:
> 
> Hi Julien,
> 
>> -----Original Message-----
>> From: Julien Grall <julien@xxxxxxx>
>> Sent: 2022年6月27日 18:36
>> To: Jiamei Xie <Jiamei.Xie@xxxxxxx>; xen-devel@xxxxxxxxxxxxxxxxxxxx
>> Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>; Bertrand Marquis
>> <Bertrand.Marquis@xxxxxxx>; Volodymyr Babchuk
>> <Volodymyr_Babchuk@xxxxxxxx>; Wei Chen <Wei.Chen@xxxxxxx>
>> Subject: Re: [PATCH] xen/arm: avoid extra caclulations when setting vtimer
>> in context switch
>> 
>> Hi Jiami
>> 
>> Title: s/caclulations/calculations/
>> 
>> However, I think the title should mention the overflow rather than the
>> extra calculations. The former is more important the latter.
>> 
> I will change the title to " xen/arm: avoid overflow when setting vtimer in 
> context switch"
> 
>> On 27/06/2022 03:58, Jiamei Xie wrote:
>>> virt_vtimer_save is calculating the new time for the vtimer in:
>>> "v->arch.virt_timer.cval + v->domain->arch.virt_timer_base.offset
>>> - boot_count".
>>> In this formula, "cval + offset" might cause uint64_t overflow.
>>> Changing it to "v->domain->arch.virt_timer_base.offset - boot_count +
>>> v->arch.virt_timer.cval" can reduce the possibility of overflow
>> 
>> This read strange to me. We want to remove the overflow completely not
>> reducing it. The overflow is completely removed by converting the
>> "offset - bount_count" to ns upfront.
>> 
>> AFAICT, the commit message doesn't explain that.
> Thanks for pointing out that. How about putting the commit message like the 
> below:
> xen/arm: avoid overflow when setting vtimer in context switch
> 
> virt_vtimer_save is calculating the new time for the vtimer in:
> "v->arch.virt_timer.cval + v->domain->arch.virt_timer_base.offset
> - boot_count".
> In this formula, "cval + offset" might cause uint64_t overflow.
> Changing it to "ticks_to_ns(v->domain->arch.virt_timer_base.offset -
> boot_count) + ticks_to_ns(v->arch.virt_timer.cval)" can avoid overflow,
> and "ticks_to_ns(arch.virt_timer_base.offset - boot_count)" will be
> always the same, which has been caculated in domain_vtimer_init.
> Introduce a new field virt_timer_base.nanoseconds to store this value
> for arm in struct arch_domain, so we can use it directly.
>> 
>>> , and
>>> "arch.virt_timer_base.offset - boot_count" will be always the same,
>>> which has been caculated in domain_vtimer_init. Introduce a new field
>>> vtimer_offset.nanoseconds to store this value for arm in struct
>>> arch_domain, so we can use it directly and extra caclulations can be
>>> avoided.
>>> 
>>> This patch is enlightened from [1].
>>> 
>>> Signed-off-by: Jiamei Xie <jiamei.xie@xxxxxxx>
>>> 
>>> [1] https://www.mail-archive.com/xen-
>> devel@xxxxxxxxxxxxxxxxxxxx/msg123139.htm
>> 
>> This link doesn't work. But I would personally remove it from the commit
>> message (or add ---) because it doesn't bring value (this patch looks
>> like a v2 to me).
> Sorry, a 'l' is missing at the end of the link. The link is 
> https://www.mail-archive.com/xen-devel@xxxxxxxxxxxxxxxxxxxx/msg123139.html .
> I will put it after --- in v3.
>> 
>>> ---
>>> xen/arch/arm/include/asm/domain.h | 4 ++++
>>> xen/arch/arm/vtimer.c | 6 ++++--
>>> 2 files changed, 8 insertions(+), 2 deletions(-)
>>> 
>>> diff --git a/xen/arch/arm/include/asm/domain.h
>> b/xen/arch/arm/include/asm/domain.h
>>> index ed63c2b6f9..94fe5b6444 100644
>>> --- a/xen/arch/arm/include/asm/domain.h
>>> +++ b/xen/arch/arm/include/asm/domain.h
>>> @@ -73,6 +73,10 @@ struct arch_domain
>>> uint64_t offset;
>>> } virt_timer_base;
>>> 
>>> + struct {
>>> + int64_t nanoseconds;
>> 
>> This should be s_time_t to match the argument of set_timer() and return
>> of ticks_to_ns().
>> 
>>> + } vtimer_offset;
>> 
>> Why are you adding a new structure rather than re-using virt_timer_base?
> Sure, I'll add this field in virt_timer_base.
> struct {
> uint64_t offset;
> s_time_t nanoseconds;
> } virt_timer_base;
>> 
>>> +
>>> struct vgic_dist vgic;
>>> 
>>> struct vuart {
>>> diff --git a/xen/arch/arm/vtimer.c b/xen/arch/arm/vtimer.c
>>> index 6b78fea77d..54161e5fea 100644
>>> --- a/xen/arch/arm/vtimer.c
>>> +++ b/xen/arch/arm/vtimer.c
>>> @@ -64,6 +64,7 @@ int domain_vtimer_init(struct domain *d, struct
>> xen_arch_domainconfig *config)
>>> {
>>> d->arch.virt_timer_base.offset = get_cycles();
>>> d->time_offset.seconds = ticks_to_ns(d->arch.virt_timer_base.offset -
>> boot_count);
>>> + d->arch.vtimer_offset.nanoseconds = d->time_offset.seconds;
>> 
>> Hmmm... I find odd to assign a field "nanoseconds" to "seconds". I would
>> suggest to re-order so you first set nanoseconds and then set seconds.
>> 
>> This will make more obvious that this is not a mistake and "seconds"
>> will be closer to the do_div() below.
> Is it ok to remove do_div and write like below?
> d->arch.virt_timer_base.nanoseconds =
> ticks_to_ns(d->arch.virt_timer_base.offset - boot_count);
> d->time_offset.seconds = d->arch.virt_timer_base.nanoseconds /
> 1000000000;

The implementation must use do_div to properly handle the division from a
64bit by a 32bit on arm32 otherwise the code will be a lot slower.

Cheers
Bertrand


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.