WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Xen

xen-devel

[Top] [All Lists]

[Xen-devel] sparse M2P table

To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] sparse M2P table
From: "Jan Beulich" <JBeulich@xxxxxxxxxx>
Date: 2009年9月16日 11:04:02 +0100
Delivery-date: 2009年9月16日 03:07:42 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
I'm in the process of putting together patches to eliminate undue overhead
resulting from Xen's current assumption on a non-sparse machine address
map. After removing large holes (symmetric across all nodes) from the
machine address map and after also mapping the resulting (much smaller)
frame table sparsely (to account for smaller holes distinct for one or more
nodes), I intended to also map the P2M table sparsely. However, there's
a tools side assumption (for domain save) on this table being contiguously
populated.
While this could be relatively easily fixed in tools, I'm wondering if there
are other dependencies on this table (or its read-only equivalent readable
by all guests) to be non-sparse. In particular, while I can easily see that
Linux has always been careful to access the read-only copy of the table
with exception fixup, I don't know whether that would also apply to the
other PV OSes (Solaris, NetBSD, ???).
One alternative would be to dedicate a zero-filled 2M page for all these
holes, but I have to admit that this doesn't seem very attractive.
Another option would be to use a made-up MFN to represent the holes,
allowing Xen (once they get fed back into mmu_update) to recognize
this and simply ignore the mapping request (after all the tools should
not access these ranges anyway). This wouldn't address potential
issues of non-Linux guests with a sparse R/O M2P table though.
Other thoughts?
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
Previous by Date: Re: [Xen-devel] How to submit code changes for Xen? , George Dunlap
Next by Date: Re: [Xen-devel] Serial logs for 2.6.31 (commit 12e8537b6b29807cb9e13d728b2e5bab40424df7) under Xen Unstable on top of Ubuntu 9.04 Server , Pasi Kärkkäinen
Previous by Thread: [Xen-devel] Re: Xen: Hybrid extension patchset for hypervisor , Keir Fraser
Next by Thread: Re: [Xen-devel] sparse M2P table , Keir Fraser
Indexes: [Date] [Thread] [Top] [All Lists]

Copyright ©, Citrix Systems Inc. All rights reserved. Legal and Privacy
Citrix This site is hosted by Citrix

AltStyle によって変換されたページ (->オリジナル) /