[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Sources of page dirtying for HVM domains in Xen 3.2.x
> And in Xen 3.2 DMA accesses from qemu were completely un-marked (which I > believe has either been fixed in xen-unstable or else there's a patch on > the way). Since qemu already has a wrapper function for its writes to > guest RAM it's easy to add a hypercall at the top of it. Meaning that they're not marked dirty at all? My understanding was that qemu-dm marked them dirty and that this dirty bitmap for DMA writes could be accessed. It seems like that's what the live migration code uses to check for dirtied pages from qemu dma (init_qemu_maps(), qemu_flip_buffer()). I can see a need for a hypercall when qemu does the dirty marking in its code. I may just save myself some trouble and pre-copy those memory pages instead of letting them be CoW. > Here's a harder question: What do you do if you hit a copy-on-write > fault and don't have any memory available to copy into? Or are you > planning to allocate a full domain of memory up-front for VM fork? I'm actually not aiming for a VM fork, it's for a checkpoint. Yup, I'm having dom0 allocate a large enough buffer which I pass to the hypervisor. It's a crude approach for now, but I'll optimze it later with some sort of circular buffer which the checkpoint agent in dom0 can ensure there's always available buffer space. You've been tremendously helpful in clarifying things for me. Thanks again for the help! Mike _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |