WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Re: [GIT PULL] Xen APIC hooks (with io_apic_ops)

To: Ingo Molnar <mingo@xxxxxxx>
Subject: [Xen-devel] Re: [GIT PULL] Xen APIC hooks (with io_apic_ops)
From: Avi Kivity <avi@xxxxxxxxxx>
Date: Sun, 24 May 2009 23:10:12 +0300
Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, Jeremy Fitzhardinge <jeremy@xxxxxxxx>, the arch/x86 maintainers <x86@xxxxxxxxxx>, Linux Kernel Mailing List <linux-kernel@xxxxxxxxxxxxxxx>
Delivery-date: Sun, 24 May 2009 13:11:43 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20090519123548.GA26439@xxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <1242170724-13349-1-git-send-email-jeremy@xxxxxxxx> <20090519123548.GA26439@xxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Thunderbird 2.0.0.21 (X11/20090320)
Ingo Molnar wrote:
IO APIC operations are not even slightly performance critical? Are they ever used on the interrupt delivery path?

Since they are not performance critical, then why doesnt Xen catch the IO-APIC accesses, and virtualizes the device?

If you want to hook into the IO-APIC code at such a low level, why dont you hook into the _hardware_ API - i.e. catch those setup/routing modifications to the IO-APIC space. No Linux changes are needed in that case.

When x2apic is enabled, and EOI broadcast is disabled, then the io apic does become a hot path - it needs to be written for each level-triggered interrupt EOI. In this case I might want to paravirtualize the EOI write to exit only if an interrupt is pending; otherwise communicate via shared memory.

We do something similar for Windows (by patching it) very successfully; Windows likes to touch the APIC TPR ~ 100,000 times per second, usually without triggering an interrupt. We hijack these writes, do the checks in guest context, and only exit if the TPR write would trigger an interrupt.

(kvm will likely gain x2apic support in 2.6.32; patches have already been posted)

--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel