Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751661AbdHPNh4 (ORCPT ); Wed, 16 Aug 2017 09:37:56 -0400 Received: from mx1.redhat.com ([209.132.183.28]:54620 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751089AbdHPNhy (ORCPT ); Wed, 16 Aug 2017 09:37:54 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com F0611C05A1C0 Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=pbonzini@redhat.com Subject: Re: [PATCH] kvm: x86: disable KVM_FAST_MMIO_BUS To: =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, "Michael S . Tsirkin" , stable@vger.kernel.org References: <20170816112249.28939-1-pbonzini@redhat.com> <20170816120702.GC6408@flask> From: Paolo Bonzini Message-ID: <49976600-3d63-5ac4-cc13-1465b0ecf9f5@redhat.com> Date: Wed, 16 Aug 2017 15:37:47 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <20170816120702.GC6408@flask> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Wed, 16 Aug 2017 13:37:54 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2039 Lines: 44 On 16/08/2017 14:07, Radim Krčmář wrote: > 2017-08-16 13:22+0200, Paolo Bonzini: >> Microsoft pointed out privately to me that KVM's handling of >> KVM_FAST_MMIO_BUS is invalid. Using skip_emulation_instruction is invalid >> in EPT misconfiguration vmexit handlers, because neither EPT violations >> nor misconfigurations are listed in the manual among the VM exits that >> set the VM-exit instruction length field. >> >> While physical processors seem to set the field, this is not architectural >> and is just a side effect of the implementation. I couldn't convince >> myself of any condition on the exit qualification where VM-exit >> instruction length "has" to be defined; there are no trap-like VM-exits >> that can be repurposed; and fault-like VM-exits such as descriptor-table >> exits provide no decoding information. So I don't really see any elegant >> way to fix it except by disabling KVM_FAST_MMIO_BUS, which means virtio >> 1 will go slower. > > Do you have some numbers? Raw number from vmexit.flat on Haswell-EP: mmio-no-eventfd:pci-mem 5793 mmio-wildcard-eventfd:pci-mem 1395 mmio-datamatch-eventfd:pci-mem 2268 So roughly 900 clock cycles. Most of the work is the four memory reads done by x86_decode_insn, three to walk the page tables and one to fetch the instruction. > We could keep the ugliness in KVM and add a new skip function with > emulate_instruction(vcpu, EMULTYPE_SKIP) to decode the length of the > instruction. (Adding a condition just for EPT violation exit reason to > the existing skip function would be a dirtier solution.) > Slower than what we have now, but faster than full emulation. This is actually a good idea, and not ugly at all! The main cost is translating the physical address of the instruction and fetching the bytes, so only 200 clock cycles are saved. However, the eventfd is written before decoding, while full emulation would write it after. So while VCPU thread latency is worse compared to skip_emulated_instruction, latency to the iothread remains small. Paolo