public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Avi Kivity <avi@redhat.com>
To: Lai Jiangshan <laijs@cn.fujitsu.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>, kvm@vger.kernel.org
Subject: Re: [RFC PATCH 2/2] kvm, x86: use ro page and don't copy shared page
Date: Wed, 09 Jun 2010 12:28:11 +0300	[thread overview]
Message-ID: <4C0F5EAB.3030401@redhat.com> (raw)
In-Reply-To: <4C0F4883.3010100@cn.fujitsu.com>

On 06/09/2010 10:53 AM, Lai Jiangshan wrote:
> When page fault, we always call get_user_pages(write=1).
>
> Actually, we don't need to do this when it is not write fault.
> get_user_pages(write=1) will cause shared page(ksm) copied.
> If this page is not modified in future, this copying and the copied page
> are just wasted. Ksm may scan and merge them and may cause thrash.
>
> This patch is not for inclusion, because I know nothing about mmio
> and this patch includes a "workaround" which ensures mmio pfns
> are always writable in tdp_page_fault().
> The guest can't even boot up without this workaround.
>    

mmio pfns are used for device assignment.  These are host pfns that 
don't have a struct page, instead they belong to a device BAR.

I don't understand why you see a failure since they aren't even present 
on guests without assigned devices.

> @@ -2357,7 +2359,12 @@ static int tdp_page_fault(struct kvm_vcpu *vcpu, gva_t gpa,
>
>   	mmu_seq = vcpu->kvm->mmu_notifier_seq;
>   	smp_rmb();
> -	pfn = kvm_get_pfn_for_gfn(vcpu->kvm, gfn, 1);
> +	pfn = kvm_get_pfn_for_gfn(vcpu->kvm, gfn, error_code&  PFERR_WRITE_MASK);
>    

This is a pessimization, since now we may need two faults per page, one 
to page it in read-only and another to establish write access.

May not be so bad for tdp, but will surely reduce performance on shadow.

The way I think it should be improved, is to extend 
get_user_pages_fast() to also return the pte.  So now, if we get a page 
for read, but it happens to have a writeable/dirty pte, we can still 
allow write access in the spte.

> +	if (!(error_code&  PFERR_WRITE_MASK)&&  kvm_is_mmio_pfn(pfn)) {
> +		kvm_release_pfn_clean(pfn);
> +		/* I don't know why we have to ensure mmio pfns are always writable. */
> +		pfn = kvm_get_pfn_for_gfn(vcpu->kvm, gfn, 1);
> +	}
>    

Wierd.  For what gfn/pfns does this trigger?

In general this is a great optimization.

-- 
error compiling committee.c: too many arguments to function


  reply	other threads:[~2010-06-09  9:28 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-06-09  7:53 [RFC PATCH 2/2] kvm, x86: use ro page and don't copy shared page Lai Jiangshan
2010-06-09  9:28 ` Avi Kivity [this message]
2010-06-10  2:47   ` Lai Jiangshan
2010-06-10 11:19   ` Lai Jiangshan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4C0F5EAB.3030401@redhat.com \
    --to=avi@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=laijs@cn.fujitsu.com \
    --cc=mtosatti@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox