From mboxrd@z Thu Jan 1 00:00:00 1970 From: Marcelo Tosatti Subject: Re: [PATCH 5/9] KVM: MMU: fask check write-protect for direct mmu Date: Fri, 20 Jul 2012 08:09:08 -0300 Message-ID: <20120720110908.GB16859@amt.cnet> References: <50056DB8.7080702@linux.vnet.ibm.com> <50056E59.4090003@linux.vnet.ibm.com> <20120720003917.GA8951@amt.cnet> <5008C3B4.1070006@linux.vnet.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Avi Kivity , LKML , KVM To: Xiao Guangrong Return-path: Received: from mx1.redhat.com ([209.132.183.28]:11403 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752723Ab2GTMCO (ORCPT ); Fri, 20 Jul 2012 08:02:14 -0400 Content-Disposition: inline In-Reply-To: <5008C3B4.1070006@linux.vnet.ibm.com> Sender: kvm-owner@vger.kernel.org List-ID: On Fri, Jul 20, 2012 at 10:34:28AM +0800, Xiao Guangrong wrote: > On 07/20/2012 08:39 AM, Marcelo Tosatti wrote: > > On Tue, Jul 17, 2012 at 09:53:29PM +0800, Xiao Guangrong wrote: > >> If it have no indirect shadow pages we need not protect any gfn, > >> this is always true for direct mmu without nested > >> > >> Signed-off-by: Xiao Guangrong > > > > Xiao, > > > > What is the motivation? Numbers please. > > > > mmu_need_write_protect is the common path for both soft-mmu and > hard-mmu, checking indirect_shadow_pages can skip hash-table walking > for the case which is tdp is enabled without nested guest. I mean motivation as observation that it is a bottleneck. > I will post the Number after I do the performance test. > > > In fact, what case was the original indirect_shadow_pages conditional in > > kvm_mmu_pte_write optimizing again? > > > > They are the different paths, mmu_need_write_protect is the real > page fault path, and kvm_mmu_pte_write is caused by mmio emulation. Sure. What i am asking is, what use case is the indirect_shadow_pages optimizing? What scenario, what workload? See the "When to optimize" section of http://en.wikipedia.org/wiki/Program_optimization. Can't remember why indirect_shadow_pages was introduced in kvm_mmu_pte_write.