On Thu, Mar 12, 2015 at 12:30 PM, Ian Campbell <ian.campb...@citrix.com>
wrote:

> On Fri, 2015-03-06 at 22:24 +0100, Tamas K Lengyel wrote:
> > The ARM virtualization extension provides 2-stage paging, a similar
> mechanisms
> > to Intel's EPT, which can be used to trace the memory accesses performed
> by
> > the guest systems. This series sets up the necessary infrastructure in
> the
> > ARM code to deliver the event on R/W/X traps. Finally, we turn on the
> > compilation of mem_access and mem_event on ARM and perform the necessary
> > changes to the tools side.
> >
> > This version of the series is based on master and each patch in the
> series has
> > been compile tested on both ARM and x86.
> >
> > The following benchmarks have been completed on an Arndale board before
> and
> > after applying this entire series in dom0, which had 2 vCPUs available
> > pinned. No regressions are evident based on these benchmarks.
> >
> >                         | f0ffd60 | AFTER
> > --------------------------------------------
> > hackbench               | 1.604   | 1.618
> > hackbench -pT           | 1.170   | 1.126
> > hardinfo CPU Blowfish   | 43.252  | 43.323
> > hardinfo CPU CryptoHash | 40.935  | 40.893
> > hardinfo CPU Fibonacci  | 10.358  | 10.360
> > hardinfo CPU N-Queens   | 25.773  | 25.894
> > hardinfo FPU FFT        | 20.332  | 20.325
> > hardinfo FPU Raytracing | 73.017  | 73.104
>
> Thanks for these, they are very reassuring.
>
> More for curiosities sake than anything else: Do you have any figures
> for the overhead of enabling memaccess?
>

I can gather some figures if needed but it is very use-case specific
depending on which pages are being trapped and how.

Tamas
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to