WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] Seamlessly sharing identical memory pages among domains

To: "Scheer, Roque" <roque.scheer@xxxxxx>
Subject: Re: [Xen-devel] Seamlessly sharing identical memory pages among domains
From: Steven Hand <Steven.Hand@xxxxxxxxxxxx>
Date: Fri, 21 May 2004 13:08:04 +0100
Cc: "Ian Pratt" <Ian.Pratt@xxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxxx
Delivery-date: Fri, 21 May 2004 13:10:25 +0100
Envelope-to: steven.hand@xxxxxxxxxxxx
In-reply-to: Your message of "Fri, 21 May 2004 08:56:04 -0300." <8D41D1F60264314591FA7C0B012EB7BB5864F9@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-archive: <http://sourceforge.net/mailarchive/forum.php?forum=xen-devel>
List-help: <mailto:xen-devel-request@lists.sourceforge.net?subject=help>
List-id: List for Xen developers <xen-devel.lists.sourceforge.net>
List-post: <mailto:xen-devel@lists.sourceforge.net>
List-subscribe: <https://lists.sourceforge.net/lists/listinfo/xen-devel>, <mailto:xen-devel-request@lists.sourceforge.net?subject=subscribe>
List-unsubscribe: <https://lists.sourceforge.net/lists/listinfo/xen-devel>, <mailto:xen-devel-request@lists.sourceforge.net?subject=unsubscribe>
Sender: xen-devel-admin@xxxxxxxxxxxxxxxxxxxxx
> >> I'm not convinced there's that much sharing to be had between
> >> VMs
> 
> In the paper Carl Waldspurger reports some worthwhile sharing under
> certain real world workloads:
> 
>            | Total| Shared   |Reclaimed   |
> Guest Types|  MB  | MB |  %  | MB  |   %  |
> -----------+------+----+-----+-----+------+
> A)10 WinNT | 2048 | 880| 42.9| 673 | 32.9 |
> B) 9 Linux | 1846 | 539| 29.2| 345 | 18.7 |
> C) 5 Linux | 1658 | 165| 10.0| 120 | 7.2  |

Yes; and we may do some shared text support at some point. Not clear
how much additional benefit comes from the "scanning" they did; a 
simpler approach to detect read-only sharing is to explicitly check 
for resident versions of a certain text segment across VMs. Having
some "look-aside" in the block device interface (partic if also 
doing sharing at that level as per our current CoW implementation) 
might get considerable benefit for little cost. 


> >> Doing a proper shared cache is slightly trickier given the
> >> paravirtualised memory interface -- we'd have to introduce guests 
> >>to a new kind of write fault
> 
> Wouldn't it be possible for XEN to share the pages tranparently, without
> the guest OSes needing to know it?

Possibly. One challenge here is to maintain partitioning (hard guarantees) 
while providing sharing. Depending on how important isolation is to you, 
this is relatively less or more difficult. 

Something we'll be considering post OSDI anyway..


cheers,

S.

 


-------------------------------------------------------
This SF.Net email is sponsored by: Oracle 10g
Get certified on the hottest thing ever to hit the market... Oracle 10g. 
Take an Oracle 10g class now, and we'll give you the exam FREE.
http://ads.osdn.com/?ad_id=3149&alloc_id=8166&op=click
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel