Re: [PATCH RFC] kvm: add PV MMIO EVENTFD

From: Alexander Graf
Date: Thu Apr 04 2013 - 08:39:58 EST



On 04.04.2013, at 14:38, Gleb Natapov wrote:

> On Thu, Apr 04, 2013 at 02:32:08PM +0200, Alexander Graf wrote:
>>
>> On 04.04.2013, at 14:08, Gleb Natapov wrote:
>>
>>> On Thu, Apr 04, 2013 at 01:57:34PM +0200, Alexander Graf wrote:
>>>>
>>>> On 04.04.2013, at 12:50, Michael S. Tsirkin wrote:
>>>>
>>>>> With KVM, MMIO is much slower than PIO, due to the need to
>>>>> do page walk and emulation. But with EPT, it does not have to be: we
>>>>> know the address from the VMCS so if the address is unique, we can look
>>>>> up the eventfd directly, bypassing emulation.
>>>>>
>>>>> Add an interface for userspace to specify this per-address, we can
>>>>> use this e.g. for virtio.
>>>>>
>>>>> The implementation adds a separate bus internally. This serves two
>>>>> purposes:
>>>>> - minimize overhead for old userspace that does not use PV MMIO
>>>>> - minimize disruption in other code (since we don't know the length,
>>>>> devices on the MMIO bus only get a valid address in write, this
>>>>> way we don't need to touch all devices to teach them handle
>>>>> an dinvalid length)
>>>>>
>>>>> At the moment, this optimization is only supported for EPT on x86 and
>>>>> silently ignored for NPT and MMU, so everything works correctly but
>>>>> slowly.
>>>>>
>>>>> TODO: NPT, MMU and non x86 architectures.
>>>>>
>>>>> The idea was suggested by Peter Anvin. Lots of thanks to Gleb for
>>>>> pre-review and suggestions.
>>>>>
>>>>> Signed-off-by: Michael S. Tsirkin <mst@xxxxxxxxxx>
>>>>
>>>> This still uses page fault intercepts which are orders of magnitudes slower than hypercalls. Why don't you just create a PV MMIO hypercall that the guest can use to invoke MMIO accesses towards the host based on physical addresses with explicit length encodings?
>>>>
>>> It is slower, but not an order of magnitude slower. It become faster
>>> with newer HW.
>>>
>>>> That way you simplify and speed up all code paths, exceeding the speed of PIO exits even. It should also be quite easily portable, as all other platforms have hypercalls available as well.
>>>>
>>> We are trying to avoid PV as much as possible (well this is also PV,
>>> but not guest visible
>>
>> Also, how is this not guest visible? Who sets KVM_IOEVENTFD_FLAG_PV_MMIO? The comment above its definition indicates that the guest does so, so it is guest visible.
>>
> QEMU sets it.

How does QEMU know?

>
>> +/*
>> + * PV_MMIO - Guest can promise us that all accesses touching this address
>> + * are writes of specified length, starting at the specified address.
>> + * If not - it's a Guest bug.
>> + * Can not be used together with either PIO or DATAMATCH.
>> + */
>>
> Virtio spec will state that access to a kick register needs to be of
> specific length. This is reasonable thing for HW to ask.

This is a spec change. So the guest would have to indicate that it adheres to a newer spec. Thus it's a guest visible change.


Alex

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/