mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-13 23:56:59 +07:00
a32a8813d0
lguest never checked for pending interrupts when enabling interrupts, and things still worked. However, it makes a significant difference to TCP performance, so it's time we fixed it by introducing a pending_irq flag and checking it on irq_restore and irq_enable. These two routines are now too big to patch into the 8/10 bytes patch space, so we drop that code. Note: The high latency on interrupt delivery had a very curious effect: once everything else was optimized, networking without GSO was faster than networking with GSO, since more interrupts were sent and hence a greater chance of one getting through to the Guest! Note2: (Almost) Closing the same loophole for iret doesn't have any measurable effect, so I'm leaving that patch for the moment. Before: 1GB tcpblast Guest->Host: 30.7 seconds 1GB tcpblast Guest->Host (no GSO): 76.0 seconds After: 1GB tcpblast Guest->Host: 6.8 seconds 1GB tcpblast Guest->Host (no GSO): 27.8 seconds Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
57 lines
1.8 KiB
C
57 lines
1.8 KiB
C
/* Architecture specific portion of the lguest hypercalls */
|
|
#ifndef _ASM_X86_LGUEST_HCALL_H
|
|
#define _ASM_X86_LGUEST_HCALL_H
|
|
|
|
#define LHCALL_FLUSH_ASYNC 0
|
|
#define LHCALL_LGUEST_INIT 1
|
|
#define LHCALL_SHUTDOWN 2
|
|
#define LHCALL_NEW_PGTABLE 4
|
|
#define LHCALL_FLUSH_TLB 5
|
|
#define LHCALL_LOAD_IDT_ENTRY 6
|
|
#define LHCALL_SET_STACK 7
|
|
#define LHCALL_TS 8
|
|
#define LHCALL_SET_CLOCKEVENT 9
|
|
#define LHCALL_HALT 10
|
|
#define LHCALL_SET_PTE 14
|
|
#define LHCALL_SET_PMD 15
|
|
#define LHCALL_LOAD_TLS 16
|
|
#define LHCALL_NOTIFY 17
|
|
#define LHCALL_LOAD_GDT_ENTRY 18
|
|
#define LHCALL_SEND_INTERRUPTS 19
|
|
|
|
#define LGUEST_TRAP_ENTRY 0x1F
|
|
|
|
/* Argument number 3 to LHCALL_LGUEST_SHUTDOWN */
|
|
#define LGUEST_SHUTDOWN_POWEROFF 1
|
|
#define LGUEST_SHUTDOWN_RESTART 2
|
|
|
|
#ifndef __ASSEMBLY__
|
|
#include <asm/hw_irq.h>
|
|
#include <asm/kvm_para.h>
|
|
|
|
/*G:031 But first, how does our Guest contact the Host to ask for privileged
|
|
* operations? There are two ways: the direct way is to make a "hypercall",
|
|
* to make requests of the Host Itself.
|
|
*
|
|
* We use the KVM hypercall mechanism. Eighteen hypercalls are
|
|
* available: the hypercall number is put in the %eax register, and the
|
|
* arguments (when required) are placed in %ebx, %ecx and %edx. If a return
|
|
* value makes sense, it's returned in %eax.
|
|
*
|
|
* Grossly invalid calls result in Sudden Death at the hands of the vengeful
|
|
* Host, rather than returning failure. This reflects Winston Churchill's
|
|
* definition of a gentleman: "someone who is only rude intentionally". */
|
|
/*:*/
|
|
|
|
/* Can't use our min() macro here: needs to be a constant */
|
|
#define LGUEST_IRQS (NR_IRQS < 32 ? NR_IRQS: 32)
|
|
|
|
#define LHCALL_RING_SIZE 64
|
|
struct hcall_args {
|
|
/* These map directly onto eax, ebx, ecx, edx in struct lguest_regs */
|
|
unsigned long arg0, arg1, arg2, arg3;
|
|
};
|
|
|
|
#endif /* !__ASSEMBLY__ */
|
|
#endif /* _ASM_X86_LGUEST_HCALL_H */
|