On 14/11/19 16:22, Sean Christopherson wrote: >> Instead of a separate vcpu->fast_vmexit, perhaps you can set exit_reason >> to vmx->exit_reason to -1 if the fast path succeeds. > > Actually, rather than make this super special case, what about moving the > handling into vmx_handle_exit_irqoff()? Practically speaking that would > only add ~50 cycles (two VMREADs) relative to the code being run right > after kvm_put_guest_xcr0(). It has the advantage of restoring the host's > hardware breakpoints, preserving a semi-accurate last_guest_tsc, and > running with vcpu->mode set back to OUTSIDE_GUEST_MODE. Hopefully it'd > also be more intuitive for people unfamiliar with the code. Yes, that's a good idea. The expensive bit between handle_exit_irqoff and handle_exit is srcu_read_lock, which has two memory barriers in it. >>> + if (ret == 0) >>> + ret = kvm_skip_emulated_instruction(vcpu); >> Please move the "kvm_skip_emulated_instruction(vcpu)" to >> vmx_handle_exit, so that this basically is >> >> #define EXIT_REASON_NEED_SKIP_EMULATED_INSN -1 >> >> if (ret == 0) >> vcpu->exit_reason = EXIT_REASON_NEED_SKIP_EMULATED_INSN; >> >> and handle_ipi_fastpath can return void. > > I'd rather we add a dedicated variable to say the exit has already been > handled. Overloading exit_reason is bound to cause confusion, and that's > probably a best case scenario. I proposed the fake exit reason to avoid a ternary return code from handle_ipi_fastpath (return to guest, return to userspace, call kvm_x86_ops->handle_exit), which Wanpeng's patch was mishandling. To ensure confusion does not become the best case scenario, perhaps it is worth trying to push exit_reason into vcpu_enter_guest's stack. vcpu_enter_guest can pass a pointer to it, and then it can be passed back into kvm_x86_ops->handle_exit{,_irqoff}. It could be a struct too, instead of just a bare u32. This would ensure at compile-time that exit_reason is not accessed outside the short path from vmexit to kvm_x86_ops->handle_exit. Paolo