|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Re: [RFC]vmx: Enable direct hardware n/p fault injection
At 08:30 +0000 on 12 Feb (1202805015), Tim Deegan wrote:
> > Our test shows no obvious increase for some benchmark
> > scores, then with 0.9% improvement for PAE KB, and 0.7%
> > for PAE windows sysbench. It depends on frequency of
> > guest n/p fault.
>
> It's a clever idea, though it does add yet one more level of
> brain-twisting to the shadow code. :) I'm hoping to measure what this
> looks like on AMD machines this week; the extra code on hot paths will
> potentially make a measurable slowdown there.
Unfortunately, kernel compiles on AMD machines slow down by 0.7% with
this patch, so I don't think we can take it.
Cheers,
Tim.
--
Tim Deegan <Tim.Deegan@xxxxxxxxxx>
Principal Software Engineer, Citrix Systems (R&D) Ltd.
[Company #02300071, SL9 0DZ, UK.]
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|