On Thu, Dec 01, 2011 at 12:43:08AM +0200, Ohad Ben-Cohen wrote: > On Wed, Nov 30, 2011 at 4:50 PM, Michael S. Tsirkin <mst@xxxxxxxxxx> wrote: > > make headers_install > > make -C tools/virtio/ > > (you'll need an empty stub for tools/virtio/linux/module.h, > > I just sent a patch to add that) > > sudo insmod tools/virtio/vhost_test/vhost_test.ko > > ./tools/virtio/virtio_test > > Ok, I gave this a spin. > > I've tried to see if reverting d57ed95 has any measurable effect on > the execution time of virtio_test's run_test(), but I couldn't see any > (several attempts with and without d57ed95 yielded very similar range > of execution times). > > YMMV though, especially with real workloads. > > > Real virtualization/x86 can keep using current smp_XX barriers, right? > > Yes, sure. ARM virtualization can too, since smp_XX barriers are > enough for that scenario. > > > We can have some config for your kind of setup. > > Please note that it can't be a compile-time decision though (unless > we're willing to effectively revert d57ed95 when this config kicks > in): it's not unlikely that one would want to have both use cases > running on the same time. > > Thanks, > Ohad. For x86, stores into memory are ordered. So I think that yes, smp_XXX can be selected at compile time. So let's forget the virtio strangeness for a minute, To me it starts looking like we need some new kind of barrier that handles accesses to DMA coherent memory. dma_Xmb()? dma_coherent_Xmb()? For example, on x86, dma_wmb() can be barrier(), but on your system it needs to do DSB. We can set the rule that dma barriers are guaranteed stronger than smp ones, and we can just use dma_ everywhere. So the strength will be: smp < dma < mandatory And now virtio can use DMA barriers and instead of adding overhead for x86, x86 will actually gain from this, as we'll drop mandatory barriers on UP systems. Hmm? -- MST -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html