[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2 of 2] xenpaging:change page-in process to speed up page-in in xenpaging
> Date: Thu, 5 Jan 2012 09:05:16 +0000 > From: Tim Deegan <tim@xxxxxxx> > To: hongkaixing@xxxxxxxxxx > Cc: Olaf Hering <olaf@xxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx > Subject: Re: [Xen-devel] [PATCH 2 of 2] xenpaging:change page-in > process to speed up page-in in xenpaging > Message-ID: <20120105090516.GE15595@xxxxxxxxxxxxxxxxxxxxx> > Content-Type: text/plain; charset=iso-8859-1 > > Hello, > > At 03:50 +0000 on 05 Jan (1325735430), hongkaixing@xxxxxxxxxx wrote: >> xenpaging:change page-in process to speed up page-in in xenpaging >> In this patch,we change the page-in process.Firstly,we add a new >> function paging_in_trigger_sync >> to handle page-in requests directly.and when the requests' count is up >> to 32,then handle them >> batchly;Most importantly,we use an increasing gfn to test_bit,which >> saves much time. >> In p2m.c,we changes p2m_mem_paging_populate() to return a value; >> The following is a xenpaging test on suse11-64 with 4G memory. >> >> Nums of page_out pages Page out time Page in time(in unstable code) >> Page >> in time(apply this patch) >> 512M(131072) 2.6s 540s >> 4.7s >> 2G(524288) 15.5s 2088s >> 17.7s >> > > Thanks for the patch! That's an impressive difference. You're changing > quite a few things in this patch, though. Can you send them as separate > patches so they can be reviewed one at a time? Is one of them in > particular making the difference? I suspect it's mostly the change to > test_bit(), and the rest is not necessary. Second that, on all counts. Impressive numbers, and, a bit puzzled as to what actually made the difference. I would also like to see changes to xenpaging teased out from changes to the hypervisor. I've been sitting on a patch to page-in synchronously, which shortcuts even more aggressively the page-in path: instead of calling populate, we go straight into paging_load. This does not necessitate an additional domctl, and would save even more hypervisor<->pager control round-trips. Do you foresee any conflicts with your current approach? Thanks! Andres > > Cheers, > > Tim. > >> Signed-off-by??hongkaixing<hongkaixing@xxxxxxxxxx>,shizhen<bicky.shi@xxxxxxxxxx> >> >> diff -r 052727b8165c -r 978daceef147 tools/libxc/xc_mem_paging.c >> --- a/tools/libxc/xc_mem_paging.c Thu Dec 29 17:08:24 2011 +0800 >> +++ b/tools/libxc/xc_mem_paging.c Thu Dec 29 19:41:39 2011 +0800 >> @@ -73,6 +73,13 @@ >> NULL, NULL, gfn); >> } >> >> +int xc_mem_paging_in(xc_interface *xch, domid_t domain_id, unsigned >> long gfn) >> +{ >> + return xc_mem_event_control(xch, domain_id, >> + XEN_DOMCTL_MEM_EVENT_OP_PAGING_IN, >> + XEN_DOMCTL_MEM_EVENT_OP_PAGING, >> + NULL, NULL, gfn); >> +} >> >> /* >> * Local variables: >> diff -r 052727b8165c -r 978daceef147 tools/libxc/xenctrl.h >> --- a/tools/libxc/xenctrl.h Thu Dec 29 17:08:24 2011 +0800 >> +++ b/tools/libxc/xenctrl.h Thu Dec 29 19:41:39 2011 +0800 >> @@ -1841,6 +1841,7 @@ >> int xc_mem_paging_prep(xc_interface *xch, domid_t domain_id, unsigned >> long gfn); >> int xc_mem_paging_resume(xc_interface *xch, domid_t domain_id, >> unsigned long gfn); >> +int xc_mem_paging_in(xc_interface *xch, domid_t domain_id,unsigned long >> gfn); >> >> int xc_mem_access_enable(xc_interface *xch, domid_t domain_id, >> void *shared_page, void *ring_page); >> diff -r 052727b8165c -r 978daceef147 tools/xenpaging/xenpaging.c >> --- a/tools/xenpaging/xenpaging.c Thu Dec 29 17:08:24 2011 +0800 >> +++ b/tools/xenpaging/xenpaging.c Thu Dec 29 19:41:39 2011 +0800 >> @@ -594,6 +594,13 @@ >> return ret; >> } >> >> +static int paging_in_trigger_sync(xenpaging_t *paging,unsigned long >> gfn) >> +{ >> + int rc = 0; >> + rc = xc_mem_paging_in(paging->xc_handle, >> paging->mem_event.domain_id,gfn); >> + return rc; >> +} > > This function is > >> + >> int main(int argc, char *argv[]) >> { >> struct sigaction act; >> @@ -605,6 +612,9 @@ >> int i; >> int rc = -1; >> int rc1; >> + int request_count = 0; >> + unsigned long page_in_start_gfn = 0; >> + unsigned long real_page = 0; >> xc_interface *xch; >> >> int open_flags = O_CREAT | O_TRUNC | O_RDWR; >> @@ -773,24 +783,51 @@ >> /* Write all pages back into the guest */ >> if ( interrupted == SIGTERM || interrupted == SIGINT ) >> { >> - int num = 0; >> + request_count = 0; >> for ( i = 0; i < paging->domain_info->max_pages; i++ ) >> { >> - if ( test_bit(i, paging->bitmap) ) >> + real_page = i + page_in_start_gfn; >> + real_page %= paging->domain_info->max_pages; >> + if ( test_bit(real_page, paging->bitmap) ) >> { >> - paging->pagein_queue[num] = i; >> - num++; >> - if ( num == XENPAGING_PAGEIN_QUEUE_SIZE ) >> - break; >> + rc = paging_in_trigger_sync(paging,real_page); >> + if ( 0 == rc ) >> + { >> + request_count++; >> + /* If page_in requests up to 32 then handle >> them */ >> + if( request_count >= 32 ) >> + { >> + page_in_start_gfn=real_page + 1; >> + break; >> + } >> + } >> + else >> + { >> + /* If IO ring is full then handle requests to >> free space */ >> + if( ENOSPC == errno ) >> + { >> + page_in_start_gfn = real_page; >> + break; >> + } >> + /* If p2mt is not p2m_is_paging,then clear >> bitmap; >> + * e.g. a page is paged then it is dropped by >> balloon. >> + */ >> + else if ( EINVAL == errno ) >> + { >> + clear_bit(i,paging->bitmap); >> + policy_notify_paged_in(i); >> + } >> + /* If hypercall fails then go to teardown >> xenpaging */ >> + else >> + { >> + ERROR("Error paging in page"); >> + goto out; >> + } >> + } >> } >> } >> - /* >> - * One more round if there are still pages to process. >> - * If no more pages to process, exit loop. >> - */ >> - if ( num ) >> - page_in_trigger(); >> - else if ( i == paging->domain_info->max_pages ) >> + if( (i==paging->domain_info->max_pages) && >> + >> !RING_HAS_UNCONSUMED_REQUESTS(&paging->mem_event.back_ring) ) >> break; >> } >> else >> diff -r 052727b8165c -r 978daceef147 xen/arch/x86/mm/mem_paging.c >> --- a/xen/arch/x86/mm/mem_paging.c Thu Dec 29 17:08:24 2011 +0800 >> +++ b/xen/arch/x86/mm/mem_paging.c Thu Dec 29 19:41:39 2011 +0800 >> @@ -57,7 +57,14 @@ >> return 0; >> } >> break; >> - >> + >> + case XEN_DOMCTL_MEM_EVENT_OP_PAGING_IN: >> + { >> + unsigned long gfn = mec->gfn; >> + return p2m_mem_paging_populate(d, gfn); >> + } >> + break; >> + >> default: >> return -ENOSYS; >> break; >> diff -r 052727b8165c -r 978daceef147 xen/arch/x86/mm/p2m.c >> --- a/xen/arch/x86/mm/p2m.c Thu Dec 29 17:08:24 2011 +0800 >> +++ b/xen/arch/x86/mm/p2m.c Thu Dec 29 19:41:39 2011 +0800 >> @@ -874,7 +874,7 @@ >> * already sent to the pager. In this case the caller has to try again >> until the >> * gfn is fully paged in again. >> */ >> -void p2m_mem_paging_populate(struct domain *d, unsigned long gfn) >> +int p2m_mem_paging_populate(struct domain *d, unsigned long gfn) >> { >> struct vcpu *v = current; >> mem_event_request_t req; >> @@ -882,10 +882,12 @@ >> p2m_access_t a; >> mfn_t mfn; >> struct p2m_domain *p2m = p2m_get_hostp2m(d); >> + int ret; >> >> /* Check that there's space on the ring for this request */ >> + ret = -ENOSPC; >> if ( mem_event_check_ring(d, &d->mem_paging) ) >> - return; >> + goto out; >> >> memset(&req, 0, sizeof(req)); >> req.type = MEM_EVENT_TYPE_PAGING; >> @@ -905,19 +907,27 @@ >> } >> p2m_unlock(p2m); >> >> + ret = -EINVAL; >> /* Pause domain if request came from guest and gfn has paging type >> */ >> - if ( p2m_is_paging(p2mt) && v->domain->domain_id == d->domain_id ) >> + if ( p2m_is_paging(p2mt) && v->domain->domain_id == d->domain_id ) >> { >> vcpu_pause_nosync(v); >> req.flags |= MEM_EVENT_FLAG_VCPU_PAUSED; >> } >> /* No need to inform pager if the gfn is not in the page-out path >> */ >> - else if ( p2mt != p2m_ram_paging_out && p2mt != p2m_ram_paged ) >> + else if ( p2mt == p2m_ram_paging_in_start || p2mt == >> p2m_ram_paging_in ) >> { >> /* gfn is already on its way back and vcpu is not paused */ >> mem_event_put_req_producers(&d->mem_paging); >> - return; >> + return 0; >> } >> + else if ( !p2m_is_paging(p2mt) ) >> + { >> + /* please clear the bit in paging->bitmap; */ >> + mem_event_put_req_producers(&d->mem_paging); >> + goto out; >> + } >> + >> >> /* Send request to pager */ >> req.gfn = gfn; >> @@ -925,8 +935,13 @@ >> req.vcpu_id = v->vcpu_id; >> >> mem_event_put_request(d, &d->mem_paging, &req); >> + >> + ret = 0; >> + out: >> + return ret; >> } >> >> + >> /** >> * p2m_mem_paging_prep - Allocate a new page for the guest >> * @d: guest domain >> diff -r 052727b8165c -r 978daceef147 xen/include/asm-x86/p2m.h >> --- a/xen/include/asm-x86/p2m.h Thu Dec 29 17:08:24 2011 +0800 >> +++ b/xen/include/asm-x86/p2m.h Thu Dec 29 19:41:39 2011 +0800 >> @@ -485,7 +485,7 @@ >> /* Tell xenpaging to drop a paged out frame */ >> void p2m_mem_paging_drop_page(struct domain *d, unsigned long gfn); >> /* Start populating a paged out frame */ >> -void p2m_mem_paging_populate(struct domain *d, unsigned long gfn); >> +int p2m_mem_paging_populate(struct domain *d, unsigned long gfn); >> /* Prepare the p2m for paging a frame in */ >> int p2m_mem_paging_prep(struct domain *d, unsigned long gfn); >> /* Resume normal operation (in case a domain was paused) */ >> diff -r 052727b8165c -r 978daceef147 xen/include/public/domctl.h >> --- a/xen/include/public/domctl.h Thu Dec 29 17:08:24 2011 +0800 >> +++ b/xen/include/public/domctl.h Thu Dec 29 19:41:39 2011 +0800 >> @@ -721,6 +721,7 @@ >> #define XEN_DOMCTL_MEM_EVENT_OP_PAGING_EVICT 3 >> #define XEN_DOMCTL_MEM_EVENT_OP_PAGING_PREP 4 >> #define XEN_DOMCTL_MEM_EVENT_OP_PAGING_RESUME 5 >> +#define XEN_DOMCTL_MEM_EVENT_OP_PAGING_IN 6 >> >> /* >> * Access permissions. >> > >> _______________________________________________ >> Xen-devel mailing list >> Xen-devel@xxxxxxxxxxxxxxxxxxx >> http://lists.xensource.com/xen-devel > > > > > ------------------------------ > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-devel > > > End of Xen-devel Digest, Vol 83, Issue 39 > ***************************************** > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |