[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] [PATCH 04/12] Nested Virtualization: core
Glad to see that you eventually take our proposal. Simple is beautiful, that is my truth. BTW, comments to your previous question in case you are still interested in them. >> >> It will be much simple. You don't need the >> nestedhvm_vcpu_iomap_get/put api, nor the refcnt. > > It is intended that the api behaves like a pool from the caller site > while it is implemented as a singleton. > The refcnt (or should I call it usagecnt) is needed by the singleton > design pattern. > > When I remove the refcnt then I have to implement the api as a real > pool which will result in allocating an io bitmap for each vcpu for > each l1 guest at runtime. You don't need the apis w/ pre-allocated pages. > >> >> The thing more important is policy: If you are in favoring of memory >> size or simplicity. If it is for memory size, then you should only >> allocate 2 io_bitmap pages for VMX. >> >>> I appreciate opinions from other people on this. >> >> Besides, ideally we should implement per guest io bitmap page, by >> reusing L1 guest io_bitmap + write protection of the page table. > > That will work fine with 4kb pages but I guess it won't be very > efficient with 2MB and 1GB pages. Most time will be spent with > emulating write accesses to the address ranges outside of the io > bitmaps with large pages. That is not true. Even the guest got contuguous machine large pages, but the host should still be able to handle mixed page size. a typical usage for this is that host may not always be able to get contiguous large page such as after migration. In this case, of course we only protect 2* 4K pages. That doesn't introduce any additional issues. > >> At least for both Xen & KVM, the io bitmap is not modified at >> runtime once it is initialized. > > Yep, that's why we only need to deal with four possible patterns of > shadow io bitmaps in Xen. We can't assume the l1 guest is not > modifying it. While, for performance, we can assume. For correctness, we need to handle the rare situation. That is also why we need to write-protect the bitmap pages, and create another seperate shadow io bitmap pages if the guest want to do that for correctness. However in dominant case, the host can reuse guest io butmap pages for host usage with 2 bits indicating original guest state. Four pattern really is not related with the topic. > >> The readibility can be improved & the memory page can be saved. We >> only need 2 bits per L1 guest. >> >> But if we want simplicity, I am ok too, however the current patch >> doesn't fit for either of the goal. > > hmm... I think, I need to move that part of common logic into SVM to > reach consensus... pity. > My idea was given twice before you publically post it :( Thx, Eddie _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |