From owner-freebsd-virtualization@freebsd.org Mon Apr 20 08:53:11 2020 Return-Path: Delivered-To: freebsd-virtualization@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4FFF92BBA66 for ; Mon, 20 Apr 2020 08:53:11 +0000 (UTC) (envelope-from ml@netfence.it) Received: from soth.netfence.it (net-2-44-121-52.cust.vodafonedsl.it [2.44.121.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mailserver.netfence.it", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 495L7p1DRKz3xPW for ; Mon, 20 Apr 2020 08:53:09 +0000 (UTC) (envelope-from ml@netfence.it) Received: from guardian.ventu (net-93-70-118-123.cust.vodafonedsl.it [93.70.118.123]) (authenticated bits=0) by soth.netfence.it (8.15.2/8.15.2) with ESMTPSA id 03K8qs2H008437 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Mon, 20 Apr 2020 10:52:55 +0200 (CEST) (envelope-from ml@netfence.it) X-Authentication-Warning: soth.netfence.it: Host net-93-70-118-123.cust.vodafonedsl.it [93.70.118.123] claimed to be guardian.ventu Subject: Re: bhyve win-guest benchmark comparing To: freebsd-virtualization@freebsd.org Cc: Michael Reifenberger , Harry Schmalzbauer References: <9e7f4c01-6cd1-4045-1a5b-69c804b3881b@omnilan.de> <20200419172345.Horde.alwm2Bn67wrcUt5a0zVjQ9f@app.eeeit.de> From: Andrea Venturoli Message-ID: <69553fba-4ee5-67dc-a052-b58bb8100061@netfence.it> Date: Mon, 20 Apr 2020 10:53:00 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <20200419172345.Horde.alwm2Bn67wrcUt5a0zVjQ9f@app.eeeit.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Spam-Score: 5.249 (*****) KHOP_HELO_FCRDNS, RCVD_IN_PBL, RDNS_DYNAMIC, SPF_FAIL, T_SPF_HELO_TEMPERROR X-Scanned-By: MIMEDefang 2.83 X-Rspamd-Queue-Id: 495L7p1DRKz3xPW X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=pass (policy=none) header.from=netfence.it; spf=pass (mx1.freebsd.org: domain of ml@netfence.it designates 2.44.121.52 as permitted sender) smtp.mailfrom=ml@netfence.it X-Spamd-Result: default: False [-4.64 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[123.118.70.93.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.11]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:2.44.121.52]; FROM_HAS_DN(0.00)[]; MIME_GOOD(-0.10)[text/plain]; HAS_XAW(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DMARC_POLICY_ALLOW(-0.50)[netfence.it,none]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; IP_SCORE(-1.84)[ip: (-8.69), ipnet: 2.44.0.0/16(-4.34), asn: 30722(3.82), country: IT(0.03)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:30722, ipnet:2.44.0.0/16, country:IT]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 20 Apr 2020 08:53:11 -0000 On 2020-04-19 19:23, Michael Reifenberger wrote: > Hi, > r358848 has been MFC'd to stable/12 Hello. Can I ask some questions about this? First: this patch seems to apply cleanly to 12.1. Is it safe? At least worth testing? Second. IIUIC it's useless to test this on an AMD system, since the patch only involves Intel CPUs. Right? Xeon are not affected, since they have vAPIC, so they should be already running as fast as possible. Correct? The description says "APIC virtualization is a Xeon feature that is missing on most (all?) desktop CPUs". Is there a way to check? Should it be reported as a CPU feature at boot? With which string? bye & Thanks av.