Re: [Qemu-devel] Are there plans to achieve ram live Snapshot feature?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Aug 14, 2013 at 3:54 AM, Wenchao Xia <xiawenc@xxxxxxxxxxxxxxxxxx> wrote:
> 于 2013-8-13 16:21, Stefan Hajnoczi 写道:
>
>> On Tue, Aug 13, 2013 at 4:53 AM, Wenchao Xia <xiawenc@xxxxxxxxxxxxxxxxxx>
>> wrote:
>>>
>>> 于 2013-8-12 19:33, Stefan Hajnoczi 写道:
>>>
>>>> On Mon, Aug 12, 2013 at 12:26 PM, Alex Bligh <alex@xxxxxxxxxxx> wrote:
>>>>>
>>>>>
>>>>> --On 12 August 2013 11:59:03 +0200 Stefan Hajnoczi <stefanha@xxxxxxxxx>
>>>>> wrote:
>>>>>
>>>>>> The idea that was discussed on qemu-devel@xxxxxxxxxx uses fork(2) to
>>>>>> capture the state of guest RAM and then send it back to the parent
>>>>>> process.  The guest is only paused for a brief instant during fork(2)
>>>>>> and can continue to run afterwards.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> How would you capture the state of emulated hardware which might not
>>>>> be in the guest RAM?
>>>>
>>>>
>>>>
>>>> Exactly the same way vmsave works today.  It calls the device's save
>>>> functions which serialize state to file.
>>>>
>>>> The difference between today's vmsave and the fork(2) approach is that
>>>> QEMU does not need to wait for guest RAM to be written to file before
>>>> resuming the guest.
>>>>
>>>> Stefan
>>>>
>>>    I have a worry about what glib says:
>>>
>>> "On Unix, the GLib mainloop is incompatible with fork(). Any program
>>> using the mainloop must either exec() or exit() from the child without
>>> returning to the mainloop. "
>>
>>
>> This is fine, the child just writes out the memory pages and exits.
>> It never returns to the glib mainloop.
>>
>>>    There is another way to do it: intercept the write in kvm.ko(or other
>>> kernel code). Since the key is intercept the memory change, we can do
>>> it in userspace in TCG mode, thus we can add the missing part in KVM
>>> mode. Another benefit of this way is: the used memory can be
>>> controlled. For example, with ioctl(), set a buffer of a fixed size
>>> which keeps the intercepted write data by kernel code, which can avoid
>>> frequently switch back to user space qemu code. when it is full always
>>> return back to userspace's qemu code, let qemu code save the data into
>>> disk. I haven't check the exactly behavior of Intel guest mode about
>>> how to handle page fault, so can't estimate the performance caused by
>>> switching of guest mode and root mode, but it should not be worse than
>>> fork().
>>
>>
>> The fork(2) approach is portable, covers both KVM and TCG, and doesn't
>> require kernel changes.  A kvm.ko kernel change also won't be
>> supported on existing KVM hosts.  These are big drawbacks and the
>> kernel approach would need to be significantly better than plain old
>> fork(2) to make it worthwhile.
>>
>> Stefan
>>
>   I think advantage is memory usage is predictable, so memory usage
> peak can be avoided, by always save the changed pages first. fork()
> does not know which pages are changed. I am not sure if this would
> be a serious issue when server's memory is consumed much, for example,
> 24G host emulate 11G*2 guest to provide powerful virtual server.

Memory usage is predictable but guest uptime is unpredictable because
it waits until memory is written out.  This defeats the point of
"live" savevm.  The guest may be stalled arbitrarily.

The fork child can minimize the chance of out-of-memory by using
madvise(MADV_DONTNEED) after pages have been written out.

The way fork handles memory overcommit on Linux is configurable, but I
guess in a situation where memory runs out the Out-of-Memory Killer
will kill a process (probably QEMU since it is hogging so much
memory).

The risk of OOM can be avoided by running the traditional vmsave which
stops the guest instead of using "live" vmsave.

The other option is to live migrate to file but the disadvantage there
is that you cannot choose exactly when the state it saved, it happens
sometime after live migration is initiated.

There are trade-offs with all the approaches, it depends on what is
most important to you.

Stefan
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux