Re: [PATCH] KVM: VMX: Reintroduce I/O port 0x80 bypass

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 19/03/2018 16:29, Tim Shearer wrote:
> From: Tim Shearer <tshearer@xxxxxxxxxxxxxxx>
> 
> This reverts commit 8eb73e2d410f00d383023fe41c0c25c6195b7389. This
> reverts commit d59d51f088014f25c2562de59b9abff4f42a7468.
> Reintroducing the I/O port 0x80 bypass, the removal of which incurred
> a significant performance penalty for NFV guests due to excessive and
> time-consuming VMEXITs.

This obviously reintroduces the same issue noted in the second of these
commits: "If the guest floods this port with writes it generates
exceptions and instability in the host kernel, leading to a crash".  So
this patch is not acceptable.

What is exactly the use case where a VM is doing a lot of 0x80 accesses
at run-time?

Paolo



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux