This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-devel] [Patch] Add VMX memory-mapped Local APIC access optimization

To: <xen-devel@xxxxxxxxxxxxxxxxxxx>, "Keir Fraser" <keir@xxxxxxxxxxxxx>
Subject: [Xen-devel] [Patch] Add VMX memory-mapped Local APIC access optimization
From: "Cui, Dexuan" <dexuan.cui@xxxxxxxxx>
Date: Thu, 17 May 2007 14:52:57 +0800
Cc: "Li, Xin B" <xin.b.li@xxxxxxxxx>, "Dong, Eddie" <eddie.dong@xxxxxxxxx>, "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>
Delivery-date: Wed, 16 May 2007 23:51:28 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcdrXcumBW0XNoFFTVuT/E21U2H6Bws8RBpQ
Thread-topic: [Patch] Add VMX memory-mapped Local APIC access optimization
Some operating systems access the local APIC TPR very frequently, and we
handle that using software-based local APIC virtualization in Xen today.
Such virtualization incurs a number of VM exits from the memory-access
instructions against the APIC page in the guest. 

The attached patch enables the TPR shadow feature that provides APIC TPR
virtualization in hardware. Our tests indicate it can significantly
boost the performance of such guests including 32-bit Windows XP/2003. 

Moreover, with the patch, local APIC accesses other than TPR in guests
are intercepted directly as APIC_ACCESS VM exits rather than PAGE_FAULT
VM exits; this can lower the emulation cost of such accesses.

Signed-off-by: Dexuan Cui <dexuan.cui@xxxxxxxxx>

PS, the related document is available in the latest Intel SDM 3B:

Attachment: vTPR-J3.patch
Description: vTPR-J3.patch

Xen-devel mailing list
<Prev in Thread] Current Thread [Next in Thread>