Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751876AbeAPN7F (ORCPT + 1 other); Tue, 16 Jan 2018 08:59:05 -0500 Received: from mx1.redhat.com ([209.132.183.28]:40546 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750954AbeAPN7D (ORCPT ); Tue, 16 Jan 2018 08:59:03 -0500 From: Vitaly Kuznetsov To: David Hildenbrand Cc: Wanpeng Li , kvm , the arch/x86 maintainers , Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= , "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , "Michael Kelley \(EOSG\)" , Mohammed Gamal , Cathy Avery , Bandan Das , linux-kernel@vger.kernel.org Subject: Re: [RFC 0/6] Enlightened VMCS support for KVM on Hyper-V References: <20180115173105.31845-1-vkuznets@redhat.com> <87inc2huux.fsf@vitty.brq.redhat.com> Date: Tue, 16 Jan 2018 14:58:50 +0100 In-Reply-To: (David Hildenbrand's message of "Tue, 16 Jan 2018 14:39:09 +0100") Message-ID: <87tvvlhplx.fsf@vitty.brq.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.28]); Tue, 16 Jan 2018 13:59:03 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: David Hildenbrand writes: > On 16.01.2018 13:05, Vitaly Kuznetsov wrote: >> Wanpeng Li writes: >> >>> 2018-01-16 1:30 GMT+08:00 Vitaly Kuznetsov : >>>> Early RFC. I'll refer to this patchset in my DevConf/FOSDEM >>>> presentations. >>>> >>>> When running nested KVM on Hyper-V it's possible to use so called >>>> 'Enlightened VMCS' and do normal memory reads/writes instead of >>>> doing VMWRITE/VMREAD instructions. Tests show that this speeds up >>>> tight CPUID loop almost 3 times: >>>> >>>> Before: >>>> ./cpuid_tight >>>> 20459 >>>> >>>> After: >>>> ./cpuid_tight >>>> 7698 >>> >>> Maybe you can apply a similar idea to kvm nested on kvm. >>> >> >> Yes we can. Basically, that would mean directly accessing 'struct >> vmcs12' from L1 hypervisor. >> > > Haven't looked into the details, but we have to watch out for other > VCPUs trying to modify that vmcs12. > > Basically because other VCPUs could try to modify values in vmcs12 while > we are currently building vmcs02. Nasty races could result in us copying > stuff (probably unchecked) into vmcs02 and therefore running something > that was not intended. > I don't think we share VMCS among vCPUs, do we? -- Vitaly