|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v7 3/3] x86/hvm: Indicate avaliability of HW support of APIC virtualization to HVM guests
On 03/25/2014 09:03 PM, Zhang, Yang Z wrote: Boris Ostrovsky wrote on 2014-03-25:On 03/25/2014 05:45 AM, Jan Beulich wrote:On 25.03.14 at 00:18, <boris.ostrovsky@xxxxxxxxxx> wrote: Yang and I talked a bit off-list and I don't think there was an agreement on this. Here is a simple experiment to demonstrate why exposing virtualize_x2apic_mode is important (with one correction to what I said earlier: PVHVM guest will actualy default to x2apic, at least on Intel CPUs): With existing code (using pirqs, i.e. no APIC/x2apic accesses), VMEXIT stats look as follows:
14397 HLT
22420 INJ_VIRQ
8551 INTR
29849 INTR_WINDOW
4 MMIO_READ
2 MMIO_WRITE
628 TRAP
2 unknown
78157 VMENTRY
78157 VMEXIT
29299 VMMCALL
Without pirqs (i.e. guest using x2APIC), and with virtualized x2apic,
virtualized APIC register accesses:
15572 HLT
164 INJ_VIRQ
4218 INTR
184 INTR_WINDOW
624 TRAP
23199 VMENTRY
23198 VMEXIT
2607 VMMCALL
Without pirqs (again, guest uses x2APIC), without virtualized x2apic
support but with virtualized APIC register access (which can be
simulated by having msr_high of MSR_IA32_VMX_PROCBASED_CTLS2 clear bit 4):
53 cpu_change
18674 HLT
226 INJ_VIRQ
11702 INTR
294 INTR_WINDOW
35186 MSR_WRITE
791 TRAP
70441 VMENTRY
70440 VMEXIT
3823 VMMCALL
In other words, if the guest is unaware of the fact that x2apic is not
virtualized, it will disable pirqs for no good reason.
-boris _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |