-
Notifications
You must be signed in to change notification settings - Fork 879
Dirty page logging #6
Comments
You are right. This feature is in our plans, and I'd like to work on it soon. |
Hi @raphaelning, are there any updates on this feature request since last year? I'm willing to help implement parts of this (time permitting), but I don't want to interfere if there is existing work in this area and it is planned. I have some thoughts about how to go about implementing this feature. Based on a cursory inspection of how KVM accomplishes this, generally speaking there are two methods:
I think we will probably want to have support for both methods in HAXM, but perhaps we can start with the first one to support older generations of processors. Thanks! |
Thanks in advance! We've been prioritizing other work over this feature, so I'm really glad that you have offered to help :-) Speaking of potential conflicts, I think the first method may interfere a little bit with the GPA protection API which we want to improve in Q4. Earlier this year, we merged 0a40260 to enable protection of a GPA range, and the only protection modes implemented are "full" (no access) and "none" (RWX access). This If both userfault and dirty page tracking features are based on write-protecting a GPA range, there must be some overlap between the two tasks. My advice would be to put the first method on standby until after we are done with the userfault API enhancement--hopefully by that time the first method will be easier to implement. Admittedly, the second method does not benefit pre-2015 CPUs, but I hope it's still useful for your purpose. In addition, I'm working on a patch set to enhance the VMX feature detection API for HAXM. So if you decide to go for the second method, please don't worry about detecting host support for the EPT Accessed/Dirty bits; you can just assume PML is usable. |
@raphaelning When I wrote my comment above, I wasn't aware of the |
(Feature request)
KVM allows dirty page logging through the
KVM_GET_DIRTY_LOG
vm ioctl.See https://www.kernel.org/doc/Documentation/virtual/kvm/api.txt for details.
To my knowledge this is currently not implemented in HAXM.
Reasoning
A similar feature for HAXM would allow speedup in emulation of certain systems.
If the guest system is sharing memory between the GPU and CPU, the emulation host could know which resources used in the GPU have to be updated by inspecting the dirty page log.
Without such logging, the emulator or virtualization environment has to rely on either guessing (which might break graphics), hashing (which is considerable amount of additional work for the host) or more invasive techniques such as using the guest pagetable (which depends on knowledge about the guest code).
The text was updated successfully, but these errors were encountered: