CompSC: Live Migration with Pass-through Devices

被引:16
作者
Pan, Zhenhao [1 ]
Dong, Yaozu [2 ]
Chen, Yu [1 ]
Zhang, Lei [1 ]
Zhang, Zhijiao [1 ]
机构
[1] Tsinghua Univ, Beijing 100084, Peoples R China
[2] Intel Asia Pacific Res & Dev Ltd, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Design; Performance; Virtualization; Live migration; Pass-through device; SR-IOV;
D O I
10.1145/2365864.2151040
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current network I/O virtualization (e. g. Para-virtualized I/O, VMDq) has a significant performance gap with native network I/O. Pass-through network devices have near native performance, however, they have thus far prevented live migration. No existing methods solve the problem of live migration with pass-through devices perfectly. In this paper, we propose CompSC: a solution of hardware state migration that will enable the live migration support of pass-through devices. We go on to apply CompSC to SR-IOV network interface controllers. We discuss the attributes of different hardware states in pass-through devices and migrate them with corresponding techniques. Our experiments show that CompSC enables live migration on an Intel 82599 VF with a throughput 282.66% higher than para-virtualized devices. In addition, service downtime during live migration is 42.9% less than para-virtualized devices.
引用
收藏
页码:109 / 120
页数:12
相关论文
共 26 条
[1]  
Abramson D., 2006, Intel Technology Journal
[2]   A comparison of software and hardware techniques for x86 virtualization [J].
Adams, Keith ;
Agesen, Ole .
ACM SIGPLAN NOTICES, 2006, 41 (11) :2-13
[3]  
[Anonymous], INT 82599 10 GBE CON
[4]  
[Anonymous], PROC 1ST CONF I O VI
[5]  
[Anonymous], 2006, USENIX ANN TECHN C A
[6]  
[Anonymous], 2003, ACM SIGOPS OPERATING
[7]  
[Anonymous], INT 82576 GIG ETH CO
[8]  
Armbrust M., 2009, ORAL HLTH STATUS ORA
[9]  
Avi K., 2007, P LIN S, P1
[10]  
Berger S, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P305