[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Limitations for Running Xen on KVM Arm64


  • To: Julien Grall <julien@xxxxxxx>, Mohamed Mediouni <mohamed@xxxxxxxxxxxxxxxx>
  • From: "haseeb.ashraf@xxxxxxxxxxx" <haseeb.ashraf@xxxxxxxxxxx>
  • Date: Wed, 5 Nov 2025 13:39:33 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HBdoUnBFTYdqfZaHh9SgfeSv12uYNIWkb5hMhg+9dAQ=; b=Dx0zrqOlfChiirFK5LBpOhNjlwFpJrneJT/N14qrrXAzcSiJmiwcnO4PrRglyjW6BNo+SRqM2pYH9xLoDGWPQ/bzGAwOuO6GTuB1plm4zTLsjtnM/0GpcWAzZdDe5UKMFZqfeN0Wv3LxI04GBbGRR8O2LdrvSckgfgA4CR00Un13aZZ+RuBiT6MK3mQKF/iwwlVFYj1qlc4D1Nc3ByItWpInImqEgen5WWE+QQf0B1+jBbfqn0YwCS9QVrVCn8PqqZzjEu3ORTvMSYZWQ+mlEwPdqMv6hdWcYtxTx0gG9cYDG0sCh7EgW8uK+q9WjJWR8lwPTcqtHP5BeIsup4Wbpw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=O297pGzk0pfx6dod8SFsnAgfHH2EMEk4ZC07Nc6PiVz8zKuRNJd6OFPUFIun3EK2TgPJ7bLXutEoaMm8I9QywDe6LKhG58S9ePSh/s4XfDReIsU+VDcWFKajjOsMYkpYRK1qoQOful18pXU2thvJ41x0BozgmKTYUWq2VJuEMZj3QR96yh9JWa0MysDsN+s6PUT+SPRFRdTOKj/4AEcQcND/cHZQgel2jxwlPliBwA2XBt1/vTFMf4RaRzlxJJze92iUpASLEw8SGTmJaDj4SzyYEyECOiqK/bqmXfOkUxQE6WnxXo3hQqgeIFUZRqtBp/Yb5NH2oge5uRjfd+FCIQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "Volodymyr_Babchuk@xxxxxxxx" <Volodymyr_Babchuk@xxxxxxxx>, "Driscoll, Dan" <dan.driscoll@xxxxxxxxxxx>, "Bachtel, Andrew" <andrew.bachtel@xxxxxxxxxxx>, "fahad.arslan@xxxxxxxxxxx" <fahad.arslan@xxxxxxxxxxx>, "noor.ahsan@xxxxxxxxxxx" <noor.ahsan@xxxxxxxxxxx>, "brian.sheppard@xxxxxxxxxxx" <brian.sheppard@xxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>
  • Delivery-date: Wed, 05 Nov 2025 13:40:00 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Msip_labels: MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Enabled=True;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_SetDate=2025-11-05T13:39:32.545Z;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Name=C1 - Restricted;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_ContentBits=1;MSIP_Label_9d258917-277f-42cd-a3cd-14c4e9ee58bc_Method=Standard;
  • Thread-index: AQHcSVi3paxtnyIgIkOf6jhuJCbvfrTalv6cgABtkgCAAFoJgIAABxcAgACWJ4CAABonw4ACEJkAgAKjdLSAAEALAIABEzaEgAIAPuE=
  • Thread-topic: Limitations for Running Xen on KVM Arm64

Hi,

I have sent out a patch using IPAS2E1IS. The R version RIPAS2E1IS would only be helpful if we have to invalidate more than one page at a time and this is not possible unless a batch version of hypercall is implemented because otherwise there is only one page removed per hypercall. Although IPAS2E1IS can be used and the number of invocations is still same as VMALLS12E1IS, but the execution time is much smaller. With Ftrace I got:
handle_ipas2e1is: min-max: 17.580 - 68.260 us.

Thanks again for your great suggestions. Please review my patch, you should've received an email. 

Regards,
Haseeb

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.