Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752300AbbHaC74 (ORCPT ); Sun, 30 Aug 2015 22:59:56 -0400 Received: from mga02.intel.com ([134.134.136.20]:20254 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751919AbbHaC7y (ORCPT ); Sun, 30 Aug 2015 22:59:54 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.17,437,1437462000"; d="scan'208";a="794167500" Subject: Re: [PATCH RFC 1/3] vmx: allow ioeventfd for EPT violations To: "Michael S. Tsirkin" , linux-kernel@vger.kernel.org References: <1440925898-23440-1-git-send-email-mst@redhat.com> <1440925898-23440-2-git-send-email-mst@redhat.com> Cc: kvm@vger.kernel.org, Paolo Bonzini From: Xiao Guangrong Message-ID: <55E3C1C6.7030603@linux.intel.com> Date: Mon, 31 Aug 2015 10:53:58 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: <1440925898-23440-2-git-send-email-mst@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1799 Lines: 52 On 08/30/2015 05:12 PM, Michael S. Tsirkin wrote: > Even when we skip data decoding, MMIO is slightly slower > than port IO because it uses the page-tables, so the CPU > must do a pagewalk on each access. > > This overhead is normally masked by using the TLB cache: > but not so for KVM MMIO, where PTEs are marked as reserved > and so are never cached. > > As ioeventfd memory is never read, make it possible to use > RO pages on the host for ioeventfds, instead. I like this idea. > The result is that TLBs are cached, which finally makes MMIO > as fast as port IO. What does "TLBs are cached" mean? Even after applying the patch no new TLB type can be cached. > > Signed-off-by: Michael S. Tsirkin > --- > arch/x86/kvm/vmx.c | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index 9d1bfd3..ed44026 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -5745,6 +5745,11 @@ static int handle_ept_violation(struct kvm_vcpu *vcpu) > vmcs_set_bits(GUEST_INTERRUPTIBILITY_INFO, GUEST_INTR_STATE_NMI); > > gpa = vmcs_read64(GUEST_PHYSICAL_ADDRESS); > + if (!kvm_io_bus_write(vcpu, KVM_FAST_MMIO_BUS, gpa, 0, NULL)) { > + skip_emulated_instruction(vcpu); > + return 1; > + } > + I am afraid that the common page fault entry point is not a good place to do the work. Would move it to kvm_handle_bad_page()? The different is the workload of fast_page_fault() is included but it's light enough and MMIO-exit should not be very frequent, so i think it's okay. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/