Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp943741imm; Fri, 11 May 2018 08:41:39 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrAhSz/Xb4sPwqabbPmgGlpwfbWNlB1+bwIY4joVTQ9cFtWdxuddvDBHBnsyXzNUPmtt9tu X-Received: by 2002:a62:ab10:: with SMTP id p16-v6mr5936597pff.211.1526053299040; Fri, 11 May 2018 08:41:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526053298; cv=none; d=google.com; s=arc-20160816; b=cUn00RraO0BIo+M3yN/8O8HEfYnOhc6RM9hAMs4T338FnNO+30DJ4y3msb/wowwEft Tm6g2YHhuavzz1VKY2nCtrNHkBxcD7fbQ0B+hthzs0NAgDWbW3nShuVzjlOKrZ/aYyE6 tzJGfPDojf8psloguZJoPg4JeKb+KiMlT9PvSoWzTRMQOxAQD7G6j+NpKUJNKE4M78Z7 DSkrUwVZu9e5VpRBQKYabf6rTDCxGB3ZVX6Ei7yPjNyhvC4nXGf2BzPQrmMKZ1lTvH3I mAbR/KMzxH8aueJksPkzhLRvpIWTskCl+hM/rNIVDX+YM/wcyUcqWeBGgT2tPQQKjjfT lbFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=IRE8x49ymiUy2ncF+ODcIob8i+YXRKMq9caZuYEoAgM=; b=MrB+5PhFOoGF/FOsywtAsEnpMQOp60tWb2UyMhElXNEI8ke/35bPssy6w2+kG8y3pP z3L82oNNESZjQ8FQHcN12GyAEh45CgbY2Ghpjy3jIvWmHLgVK7F9Q6V3tL3WbJwL4n6M aeMSmLLLHk8aPLYdKzeIISHb6YIFdgJQ1qNkFalUVsWdr842d0M3BIIsm9KZfZx50q1t aCvpRqZHM1QaU9IRHJaNmGHxAKcC2+eGQJCgrKi0kWGyK1MVCvyjx+w7LwYn6pN458Vr b68BxDTbWgLuGVriH+pwYSNJLLpEvRBvjvMvDQb+CFgZfKssDgVtD/y5pNFg4Pu2lj3P mIhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=B0ArkqAZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x127-v6si2716565pgb.651.2018.05.11.08.41.24; Fri, 11 May 2018 08:41:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=B0ArkqAZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752015AbeEKPkv (ORCPT + 99 others); Fri, 11 May 2018 11:40:51 -0400 Received: from userp2130.oracle.com ([156.151.31.86]:54802 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751839AbeEKPkt (ORCPT ); Fri, 11 May 2018 11:40:49 -0400 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w4BFZfDI121592; Fri, 11 May 2018 15:40:22 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=date : from : to : cc : subject : message-id : references : mime-version : content-type : in-reply-to; s=corp-2017-10-26; bh=IRE8x49ymiUy2ncF+ODcIob8i+YXRKMq9caZuYEoAgM=; b=B0ArkqAZnEK8y1i0FfkVGqXdM2ZYdrzxBLa7i5riTU0vUV+YnbyLlvpLF9oUDkmWLm5r LBslZkkUlQSLhj7Ll/PZATKVsBLG5Y4XrIhxoM9uc1dDzDqIGIVrKHSxKlfz2gpbEcuM nTlDcXbN7ESeTNxaSsP/venCMhy90QLicOMQ0tQLt+ghGXZI/pUf01gse4ywwUfy+IaU w/aErBOO9GRdn8ZJdG9VuW3YDB8LLpz5L6Gtk+3ne620d/Jdis1BibLy03sFmDYLSWUp +cldn+Bh7b41ueKe811qpStDTkJz01hE1ZXMIvqM4Uu3AXIQiZO9tXqIMdZ0dwjjBKDh OQ== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by userp2130.oracle.com with ESMTP id 2hwabcs03c-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 11 May 2018 15:40:22 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w4BFeLU6023758 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 11 May 2018 15:40:21 GMT Received: from abhmp0003.oracle.com (abhmp0003.oracle.com [141.146.116.9]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w4BFeKTu013728; Fri, 11 May 2018 15:40:20 GMT Received: from char.us.oracle.com (/10.137.176.158) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 11 May 2018 08:40:20 -0700 Received: by char.us.oracle.com (Postfix, from userid 1000) id 787C46A00C1; Fri, 11 May 2018 11:40:19 -0400 (EDT) Date: Fri, 11 May 2018 11:40:19 -0400 From: Konrad Rzeszutek Wilk To: Wanpeng Li Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= , Tim Shearer , Liran Alon Subject: Re: [PATCH 0/3] KVM: VMX: Allow to disable ioport intercept per-VM by userspace Message-ID: <20180511154019.GG27459@char.us.oracle.com> References: <1523943962-25415-1-git-send-email-wanpengli@tencent.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1523943962-25415-1-git-send-email-wanpengli@tencent.com> User-Agent: Mutt/1.8.3 (2017-05-23) X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8890 signatures=668698 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=793 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1805110148 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 16, 2018 at 10:45:59PM -0700, Wanpeng Li wrote: > Tim Shearer reported that "There is a guest which is running a packet > forwarding app based on the DPDK (dpdk.org). The packet receive routine > writes to 0xc070 using glibc's "outw_p" function which does an additional > write to I/O port 0x80. It does this write for every packet that's > received, causing a flood of KVM userspace context switches". He uses > mpstat to observe a CPU performing L2 packet forwarding on a pinned > guest vCPU, the guest time is 95 percent when allowing I/O port 0x80 > bypass, however, it is 65.78 percent when I/O port 0x80 bypss is > disabled. > > This patchset introduces per-VM I/O permission bitmaps, the userspace > can disable the ioport intercept when they are more concern the > performance than the security. Could you kindly also add: Suggested-by: Konrad Rzeszutek Wilk Thank you.