relegating those virtual machines that have a high I/O-to-compute ratio to the main
processor, and those virtual machines that have a high compute-to-I/O ratio to the
attached processor. Such decisions should be carefully weighed as every virtual
machine is in contention with other virtual machines for resources of the system.
A system programmer can improve a virtual machine's performance on a multi
processor where the path(s) to a user's primary minidisks exist from one processor
only. In such cases, the system programmer could set the user's affinity to that
processor.
A more important use of the affinity setting would be in applications where there
are virtual machine program requirements for special hardware features that are
available on one processor and not the other. Such features could be a perform
ance enhancement such as virtual machine assist (described later in the text) or a
special RPQ that is a requirement for a particular program's execution.
Multiple Shadow Table Support
Shadow Table Bypass
To reduce the number of purges when the virtual machine changes control register
1 (CRl) values,VM/SP maintains a queue of segment table origins (STO) and
associated shadow tables for the virtual machine. Thus, each time an MVS or SVS
system dispatches a new address space (changes CRl),VM/SP can dispatch the
proper shadow table.
Multiple shadow table support adds one control block toVM/SP, the segment
table origin control block (STOBLOK) pointed to by the ECBLOK. The
STOBLOK, created by DMKVAT, contains all information pertaining to the shad
ow segment table, the shadow segment table itself and the virtual CRl value. It
also provides forward and backward queue pointers to the nextSTOBLOK on the
queue. The firstSTOBLOK on the queue always contains the shadow STO to be
loaded into CRl when the virtual machine is dispatched in translation mode. The
queue of STOBLOKs is maintained by DMKV AT in the following manner:
1. If a new CRl value is loaded by the virtual machine, then the queue of
STOBLOKs is searched for the virtual CRl value.
2. If the properSTO is found, then the STOBLOK is ordered first on the queue.
3. If the properSTO is not found, then the maximum STO count is checked.
4. If the number of STOBLOKs equals the maximumSTO count, then the last STOBLOK is stolen, the shadow tables are purged, and the STOBLOK is reini
tialized and reused by being chained first on the queue with the new virtual
CRl value.
5. If the number of STOBLOKs is less than the maximumSTO count, then free
storage is obtained fromVM/SP, and the STOBLOK is reinitialized and
chained first on the queue.
Multiple shadow table support is controlled by the SET STMUL TI command. The
default shadow table count is 3 and the maximum is 6 per virtual machine.
Shadow table bypass is controlled by the SETSTBYP ASS command.
Performance Guidelines 35
processor, and those virtual machines that have a high compute-to-I/O ratio to the
attached processor. Such decisions should be carefully weighed as every virtual
machine is in contention with other virtual machines for resources of the system.
A system programmer can improve a virtual machine's performance on a multi
processor where the path(s) to a user's primary minidisks exist from one processor
only. In such cases, the system programmer could set the user's affinity to that
processor.
A more important use of the affinity setting would be in applications where there
are virtual machine program requirements for special hardware features that are
available on one processor and not the other. Such features could be a perform
ance enhancement such as virtual machine assist (described later in the text) or a
special RPQ that is a requirement for a particular program's execution.
Multiple Shadow Table Support
Shadow Table Bypass
To reduce the number of purges when the virtual machine changes control register
1 (CRl) values,
associated shadow tables for the virtual machine. Thus, each time an MVS or SVS
system dispatches a new address space (changes CRl),
proper shadow table.
Multiple shadow table support adds one control block to
table origin control block (STOBLOK) pointed to by the ECBLOK. The
STOBLOK, created by DMKVAT, contains all information pertaining to the shad
ow segment table, the shadow segment table itself and the virtual CRl value. It
also provides forward and backward queue pointers to the next
queue. The first
loaded into CRl when the virtual machine is dispatched in translation mode. The
queue of STOBLOKs is maintained by DMKV AT in the following manner:
1. If a new CRl value is loaded by the virtual machine, then the queue of
STOBLOKs is searched for the virtual CRl value.
2. If the proper
3. If the proper
4. If the number of STOBLOKs equals the maximum
tialized and reused by being chained first on the queue with the new virtual
CRl value.
5. If the number of STOBLOKs is less than the maximum
storage is obtained from
chained first on the queue.
Multiple shadow table support is controlled by the SET STMUL TI command. The
default shadow table count is 3 and the maximum is 6 per virtual machine.
Shadow table bypass is controlled by the SET
Performance Guidelines 35