[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-devel] [PATCH V11 2/3] i386: Add a Virtual Machine Generation
From: |
Michael S. Tsirkin |
Subject: |
Re: [Qemu-devel] [PATCH V11 2/3] i386: Add a Virtual Machine Generation ID device |
Date: |
Wed, 4 Feb 2015 17:07:02 +0100 |
On Wed, Feb 04, 2015 at 04:53:54PM +0100, Igor Mammedov wrote:
> > > > Isn't this will cause a VMEXIT when the guest is reading the GUID? If it
> > > > is then this idea was already presented and Michael didn't approve it.
> > > It will, but is it performance critical? VM supposed to read it
> > > at start-up and on getting notification. So I think VMEXIT in this case
> > > is not sufficient to drop simple and strait-forward design.
> >
> > I agree with you on that and one of the previous patches did used a
> > fixed-address to store the GUID while read/write access were handled by
> > qemu driver code. But as I wrote before, it was Michael who didn't approved
> > it so I proposed this method although it is a bit more complicated.
> >
> > I don't know how to break out of this dead-lock... :(
> Could you post a link to driver based version of series.
> Perhaps we could address Michael's comments and still stay
> with a simple implementation.
The point is to keep all allocations in guest.
I don't want to "steal" a page from guest.
> >
> > >
> > > BTW:
> > > For start-up fw_cfg file is not any way better, it's also causes VMEXIT
> > > for every byte it reads from it.
> >
> > I don't understand your claim. Accessing the fw_cfg "file" doesn't cause
> > VMEXIT as it located somewhere in the guest's memory range.
> As far as I'm aware MMIO or ioport is used for reading fw_cfg contents
> on guest side, one byte at a time and every such access causes VMEXIT
> into QEMU callback.
It's highly unlikely to be measureable. Prove me wrong if you like.
--
MST