On Thu, Nov 07, 2024 at 09:04:02AM -0500, Steven Sistare wrote: > On 11/7/2024 8:05 AM, David Hildenbrand wrote: > > On 06.11.24 21:59, Steven Sistare wrote: > > > On 11/6/2024 3:41 PM, Peter Xu wrote: > > > > On Wed, Nov 06, 2024 at 03:12:20PM -0500, Steven Sistare wrote: > > > > > On 11/4/2024 4:36 PM, David Hildenbrand wrote: > > > > > > On 04.11.24 21:56, Steven Sistare wrote: > > > > > > > On 11/4/2024 3:15 PM, David Hildenbrand wrote: > > > > > > > > On 04.11.24 20:51, David Hildenbrand wrote: > > > > > > > > > On 04.11.24 18:38, Steven Sistare wrote: > > > > > > > > > > On 11/4/2024 5:39 AM, David Hildenbrand wrote: > > > > > > > > > > > On 01.11.24 14:47, Steve Sistare wrote: > > > > > > > > > > > > Allocate anonymous memory using mmap MAP_ANON or > > > > > > > > > > > > memfd_create depending > > > > > > > > > > > > on the value of the anon-alloc machine property. This > > > > > > > > > > > > option applies to > > > > > > > > > > > > memory allocated as a side effect of creating various > > > > > > > > > > > > devices. It does > > > > > > > > > > > > not apply to memory-backend-objects, whether explicitly > > > > > > > > > > > > specified on > > > > > > > > > > > > the command line, or implicitly created by the -m > > > > > > > > > > > > command line option. > > > > > > > > > > > > > > > > > > > > > > > > The memfd option is intended to support new migration > > > > > > > > > > > > modes, in which the > > > > > > > > > > > > memory region can be transferred in place to a new QEMU > > > > > > > > > > > > process, by sending > > > > > > > > > > > > the memfd file descriptor to the process. Memory > > > > > > > > > > > > contents are preserved, > > > > > > > > > > > > and if the mode also transfers device descriptors, then > > > > > > > > > > > > pages that are > > > > > > > > > > > > locked in memory for DMA remain locked. This behavior > > > > > > > > > > > > is a pre-requisite > > > > > > > > > > > > for supporting vfio, vdpa, and iommufd devices with the > > > > > > > > > > > > new modes. > > > > > > > > > > > > > > > > > > > > > > A more portable, non-Linux specific variant of this will > > > > > > > > > > > be using shm, > > > > > > > > > > > similar to backends/hostmem-shm.c. > > > > > > > > > > > > > > > > > > > > > > Likely we should be using that instead of memfd, or try > > > > > > > > > > > hiding the > > > > > > > > > > > details. See below. > > > > > > > > > > > > > > > > > > > > For this series I would prefer to use memfd and hide the > > > > > > > > > > details. It's a > > > > > > > > > > concise (and well tested) solution albeit linux only. The > > > > > > > > > > code you supply > > > > > > > > > > for posix shm would be a good follow on patch to support > > > > > > > > > > other unices. > > > > > > > > > > > > > > > > > > Unless there is reason to use memfd we should start with the > > > > > > > > > more > > > > > > > > > generic POSIX variant that is available even on systems > > > > > > > > > without memfd. > > > > > > > > > Factoring stuff out as I drafted does look quite compelling. > > > > > > > > > > > > > > > > > > I can help with the rework, and send it out separately, so > > > > > > > > > you can focus > > > > > > > > > on the "machine toggle" as part of this series. > > > > > > > > > > > > > > > > > > Of course, if we find out we need the memfd internally > > > > > > > > > instead under > > > > > > > > > Linux for whatever reason later, we can use that instead. > > > > > > > > > > > > > > > > > > But IIUC, the main selling point for memfd are additional > > > > > > > > > features > > > > > > > > > (hugetlb, memory sealing) that you aren't even using. > > > > > > > > > > > > > > > > FWIW, I'm looking into some details, and one difference is that > > > > > > > > shmem_open() under Linux (glibc) seems to go to /dev/shmem and > > > > > > > > memfd/SYSV go to the internal tmpfs mount. There is not a big > > > > > > > > difference, but there can be some difference (e.g., sizing of > > > > > > > > the /dev/shm mount). > > > > > > > > > > > > > > Sizing is a non-trivial difference. One can by default allocate > > > > > > > all memory using memfd_create. > > > > > > > To do so using shm_open requires configuration on the mount. One > > > > > > > step harder to use. > > > > > > > > > > > > Yes. > > > > > > > > > > > > > > > > > > > > This is a real issue for memory-backend-ram, and becomes an issue > > > > > > > for the internal RAM > > > > > > > if memory-backend-ram has hogged all the memory. > > > > > > > > > > > > > > > Regarding memory-backend-ram,share=on, I assume we can use > > > > > > > > memfd if available, but then fallback to shm_open(). > > > > > > > > > > > > > > Yes, and if that is a good idea, then the same should be done for > > > > > > > internal RAM > > > > > > > -- memfd if available and fallback to shm_open. > > > > > > > > > > > > Yes. > > > > > > > > > > > > > > > > > > > > > I'm hoping we can find a way where it just all is rather > > > > > > > > intuitive, like > > > > > > > > > > > > > > > > "default-ram-share=on": behave for internal RAM just like > > > > > > > > "memory-backend-ram,share=on" > > > > > > > > > > > > > > > > "memory-backend-ram,share=on": use whatever mechanism we have > > > > > > > > to give us "anonymous" memory that can be shared using an fd > > > > > > > > with another process. > > > > > > > > > > > > > > > > Thoughts? > > > > > > > > > > > > > > Agreed, though I thought I had already landed at the intuitive > > > > > > > specification in my patch. > > > > > > > The user must explicitly configure memory-backend-* to be usable > > > > > > > with CPR, and anon-alloc > > > > > > > controls everything else. Now we're just riffing on the details: > > > > > > > memfd vs shm_open, spelling > > > > > > > of options and words to describe them. > > > > > > > > > > > > Well, yes, and making it all a bit more consistent and the "machine > > > > > > option" behave just like "memory-backend-ram,share=on". > > > > > > > > > > Hi David and Peter, > > > > > > > > > > I have implemented and tested the following, for both > > > > > qemu_memfd_create > > > > > and qemu_shm_alloc. This is pseudo-code, with error conditions > > > > > omitted > > > > > for simplicity. > > > > > > > > I'm ok with either shm or memfd, as this feature only applies to Linux > > > > anyway. I'll leave that part to you and David to decide. > > > > > > > > > > > > > > Any comments before I submit a complete patch? > > > > > > > > > > ---- > > > > > qemu-options.hx: > > > > > ``aux-ram-share=on|off`` > > > > > Allocate auxiliary guest RAM as an anonymous file that is > > > > > shareable with an external process. This option applies to > > > > > memory allocated as a side effect of creating various > > > > > devices. > > > > > It does not apply to memory-backend-objects, whether > > > > > explicitly > > > > > specified on the command line, or implicitly created by the > > > > > -m > > > > > command line option. > > > > > > > > > > Some migration modes require aux-ram-share=on. > > > > > > > > > > qapi/migration.json: > > > > > @cpr-transfer: > > > > > ... > > > > > Memory-backend objects must have the share=on attribute, > > > > > but > > > > > memory-backend-epc is not supported. The VM must be > > > > > started > > > > > with the '-machine aux-ram-share=on' option. > > > > > > > > > > Define RAM_PRIVATE > > > > > > > > > > Define qemu_shm_alloc(), from David's tmp patch > > > > > > > > > > ram_backend_memory_alloc() > > > > > ram_flags = backend->share ? RAM_SHARED : RAM_PRIVATE; > > > > > memory_region_init_ram_flags_nomigrate(ram_flags) > > > > > > > > Looks all good until here. > > > > > > > > > > > > > > qemu_ram_alloc_internal() > > > > > ... > > > > > if (!host && !(ram_flags & RAM_PRIVATE) && > > > > > current_machine->aux_ram_share) > > > > > > > > Nitpick: could rely on flags-only, rather than testing "!host", AFAICT > > > > that's equal to RAM_PREALLOC. > > > > > > IMO testing host is clearer and more future proof, regardless of how flags > > > are currently used. If the caller passes host, then we should not > > > allocate > > > memory here, full stop. > > > > > > > Meanwhile I slightly prefer we don't touch > > > > anything if SHARED|PRIVATE is set. > > > > > > OK, if SHARED is already set I will not set it again. > > > > We only have to make sure that stuff like qemu_ram_is_shared() will > > continue working as expected. > > > > What I think we should do: > > > > We should probably assert that nobody passes in SHARED|PRIVATE. And we can > > use PRIVATE only as a parameter to the function, but never actually set it > > on the ramblock. > > > > If someone passes in PRIVATE, we don't include it in block->flags. > > (RMA_SHARED remains cleared) > > > > If someone passes in SHARED, we do set it in block->flags. > > If someone passes PRIVATE|SHARED, we assert. > > > > If someone passes in nothing: we set block->flags to SHARED with > > aux_ram_share=on. Otherwise, we do nothing (RAM_SHARED remains cleared) > > > > If that's also what you had in mind, great. > > Yes, my patch does that, but it also sets RAM_PRIVATE on the ramblock. > I will undo the latter.
David: why do we need to drop PRIVATE in ramblock flags? I thought it was pretty harmless. I suppose things like qemu_ram_is_shared() will even keep working as before? It looks ok to remove it too, but it adds logics that doesn't seem necessary to me, so just to double check if I missed something.. > > Do you plan to submit the part of your "tmp" patch that refactors > shm_backend_memory_alloc and defines qemu_shm_alloc? If you want, > I could include it in my series, with your Signed-off-by. > > Do you have any comments on my proposed name aux-ram-share, or my proposed > text > for qemu-options.hx and migration.json? Speaking now would prevent more > version > churn later. > > - Steve > > -- Peter Xu