[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: memory overcomittment with sr-iov device assighment


  • To: alex.nlnnfn@xxxxxxxxx
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 7 Jun 2022 09:11:21 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1m9caj292I9jJ9mors5WTYZu/hAOyMyrDXa4+M9U+Jo=; b=k7nAoP7C2iLnMxpJvOPMMUj8H95ykXQHstyhd/flTRnw+C4T2e5QwGSkCS3f78jcs6bWFAA5ujQ7VLUO6QiPNoy+ewggDSi9dpRqJRVRzNAYwijD46a/kLNRWQmBy98k/hv1+kfcYepG2jlhdTCIcFdFdRT9Ic0ZKYcrDccHwJkeFNJGsZeGZnE7mFdhBDhTr0fdOL/mrv+l/3U03Ca4hCW2p5jqyzWI55a3Ri4wC+p2eQyRuABthUhQb9KryGJEOfhchGSJ29YQs3qW6c74O/VXoZGTeRXULU+dzdyTUR3LSRyAkfTPvKId1VyTLjH5MxMoVHnEEcTVqN0MwgXW+g==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BSDWEpTIN6r/uFW8ePl9iAILK6zpXBK2t8UQAWsfvD2ZxG10uLGghs7Ebg1UcxOxYtsay0k13RldGTK7jIcZwnk7dH25RUdpIfW08kQRQHgdLpST+jFK09tN7ubqp6Q4NdgJo2sFNqVzEiex+kJmggI0/vOVWEKVe/xTW6L+k3v6xqy/bIW5yoJTkOWo9Ffy4mq8NL2GnS181JfZdAgGO0lQihTOcZqZ3l+nAbKjJnmKdgW5t3U5kkrmnnrQd5WCkM7o3EorNSDnmooQhXVu9uIGOfvQC+M6Uc4JtvDVr3tMHOmQhzBrua9kmebK/uv5i/U9oTVpEzqHX7sdETiovQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 07 Jun 2022 07:11:31 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 07.06.2022 05:59, alex.nlnnfn@xxxxxxxxx wrote:
> I looked into Xen documentation and also Xen wiki and I could't find a 
> definitive answer if Xen supports memory over-commitment when VMs use SR-IOV 
> device assignment (passthrough). Memory over-commitment I mean giving VMs 
> more RAM than is available in the host.
> 
> I know that ESX doesn't support it, and also QEMU/KVM pins all RAM when a 
> device is directly assigned to a VM (VFIO_IOMMU_MAP_DMA ioctl). I have two 
> questions:
> 
> 1. Does Xen supports memory over commitment when all VMs are using direct 
> device assignment e.g., SR-IOV?

What you describe looks to match mem-paging / mem-sharing in Xen. Neither is
compatible with device pass-through (SR-IOV or not is irrelevant), and both
are only in "experimental" state anyway.

> 2. Would you please point me to the code that does the pinning?

That's a KVM concept with no direct equivalent in Xen (largely due to Xen
being a type-1 hypervisor, while KVM is a type-2 one).

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.