From nobody Fri May 3 21:19:29 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=gmail.com Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 15228425393796.655212981127534; Wed, 4 Apr 2018 04:48:59 -0700 (PDT) Received: from localhost ([::1]:51749 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1f3guJ-0003fZ-OV for importer@patchew.org; Wed, 04 Apr 2018 07:48:51 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:36071) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1f3gsq-0002w4-NT for qemu-devel@nongnu.org; Wed, 04 Apr 2018 07:47:22 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1f3gsm-0004Np-Va for qemu-devel@nongnu.org; Wed, 04 Apr 2018 07:47:20 -0400 Received: from mail-pl0-x242.google.com ([2607:f8b0:400e:c01::242]:37556) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1f3gsm-0004Ll-MT for qemu-devel@nongnu.org; Wed, 04 Apr 2018 07:47:16 -0400 Received: by mail-pl0-x242.google.com with SMTP id v5-v6so11590889plo.4 for ; Wed, 04 Apr 2018 04:47:16 -0700 (PDT) Received: from localhost ([199.245.57.242]) by smtp.gmail.com with ESMTPSA id u4sm10188967pfb.43.2018.04.04.04.47.14 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 04 Apr 2018 04:47:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=hv1y89fZM3Q293SleHvj4QabRKo1Hi3i33uMcJMXDxY=; b=n5WYWA7RikwsksdyhR+AL96Q705dLD+Yc+M8r+AsTdxmgvDXsm71zwLSqNV9xpz0lR ykvKT/MDxpZH78uP3Zo9NV0JJ+txbv9S/UqrDiqYd5v0ywxUsDc9MQT6wcusrv1JHmrJ Oua5/5uOA/orW5a6HkBdr4BhIKjt2DjMCtVbPAq30Hrs21tNqa1FczmpT3yNhVPi+nAu VG+9gqU9Jto0CdlrHVe7B6IASgal84Up+D6CPNNGErEyzjZj71Q/YmBu30KT2gnX1iZ7 jKgmEwakzs80uYBuzXmu//xqyi2L2TSOdHjwmDaV5RFoziKmlg7mWK2oSzC3rgAQmj/3 PsKg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=hv1y89fZM3Q293SleHvj4QabRKo1Hi3i33uMcJMXDxY=; b=cM7v28iIco835Yge7fVnCmF7Q1oHLYv4Bfoykvpt1WPnq0v5Pomc9JrO0yGddEOt+h seP8b7YhUC3uHVECgDuXzsH8i8sxZNHQNw8/ad72SiJo299ipXBWCDhM5vmOy/mdFIll 17HbvP6HuwxUi0kORtn40XmyOAGffhILHl5jIulgS8NPB42wJhDoOXsviEhRnMsY8+7Z 1Mtj+72HbE0b8sL3lE8Phxr4sAN/ayGYHJQl25L2eQ7Gc3Jgqq8xC4gQzbzz1HZk8BKu P5dUQjMHsm18U7OaSkQPpqA08q8m0WR+nb6QEybPCRr2bx+QkQSW9XKcQaP0BmsHp41C opLA== X-Gm-Message-State: AElRT7HqrHxljGsSeulGHa9Oz/bE1GJXwhxuxZwdc91J691RgcO9xyOh vx0Qec3NH/LnNiKkCnvRxEA= X-Google-Smtp-Source: AIpwx4+ZixODsGrH8GiaCALtqjllPhc9nkR779G7p6AjGUzEDv5OYlJrtVxMDisZii/1Sop82Nw2dQ== X-Received: by 2002:a17:902:2805:: with SMTP id e5-v6mr18600565plb.89.1522842435353; Wed, 04 Apr 2018 04:47:15 -0700 (PDT) From: Lai Jiangshan To: Date: Wed, 4 Apr 2018 19:47:09 +0800 Message-Id: <20180404114709.45118-1-jiangshanlai@gmail.com> X-Mailer: git-send-email 2.14.3 (Apple Git-98) In-Reply-To: <20180401084848.36725-1-jiangshanlai@gmail.com> References: <20180401084848.36725-1-jiangshanlai@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 2607:f8b0:400e:c01::242 Subject: [Qemu-devel] [PATCH V4] migration: add capability to bypass the shared memory X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Samuel Ortiz , Xu Wang , qemu-devel@nongnu.org, "James O . D . Hunt" , Peng Tao , Lai Jiangshan , "Dr. David Alan Gilbert" , Markus Armbruster , Juan Quintela , Sebastien Boeuf , Xiao Guangrong , Xiao Guangrong Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_0 Z_629925259 SPT_0 1) What's this When the migration capability 'bypass-shared-memory' is set, the shared memory will be bypassed when migration. It is the key feature to enable several excellent features for the qemu, such as qemu-local-migration, qemu-live-update, extremely-fast-save-restore, vm-template, vm-fast-live-clone, yet-another-post-copy-migration, etc.. The philosophy behind this key feature, including the resulting advanced key features, is that a part of the memory management is separated out from the qemu, and let the other toolkits such as libvirt, kata-containers (https://github.com/kata-containers) runv(https://github.com/hyperhq/runv/) or some multiple cooperative qemu commands directly access to it, manage it, provide features on it. 2) Status in real world The hyperhq(http://hyper.sh http://hypercontainer.io/) introduced the feature vm-template(vm-fast-live-clone) to the hyper container for several years, it works perfect. (see https://github.com/hyperhq/runv/pull/297). The feature vm-template makes the containers(VMs) can be started in 130ms and save 80M memory for every container(VM). So that the hyper containers are fast and high-density as normal containers. kata-containers project (https://github.com/kata-containers) which was launched by hyper, intel and friends and which descended from runv (and clear-container) should have this feature enabled. Unfortunately, due to the code confliction between runv&cc, this feature was temporary disabled and it is being brought back by hyper and intel team. 3) How to use and bring up advanced features. In current qemu command line, shared memory has to be configured via memory-object. a) feature: qemu-local-migration, qemu-live-update Set the mem-path on the tmpfs and set share=3Don for it when start the vm. example: -object \ memory-backend-file,id=3Dmem,size=3D128M,mem-path=3D/dev/shm/memory,share= =3Don \ -numa node,nodeid=3D0,cpus=3D0-7,memdev=3Dmem when you want to migrate the vm locally (after fixed a security bug of the qemu-binary, or other reason), you can start a new qemu with the same command line and -incoming, then you can migrate the vm from the old qemu to the new qemu with the migration capability 'bypass-shared-memory' set. The migration will migrate the device-state *ONLY*, the memory is the origin memory backed by tmpfs file. b) feature: extremely-fast-save-restore the same above, but the mem-path is on the persistent file system. c) feature: vm-template, vm-fast-live-clone the template vm is started as 1), and paused when the guest reaches the template point(example: the guest app is ready), then the template vm is saved. (the qemu process of the template can be killed now, because we need only the memory and the device state files (in tmpfs)). Then we can launch one or multiple VMs base on the template vm states, the new VMs are started without the =E2=80=9Cshare=3Don=E2=80=9D, all the n= ew VMs share the initial memory from the memory file, they save a lot of memory. all the new VMs start from the template point, the guest app can go to work quickly. The new VM booted from template vm can=E2=80=99t become template again, if you need this unusual chained-template feature, you can write a cloneable-tmpfs kernel module for it. The libvirt toolkit can=E2=80=99t manage vm-template currently, in the hyperhq/runv, we use qemu wrapper script to do it. I hope someone add =E2=80=9Clibvrit managed template=E2=80=9D feature to libvirt. d) feature: yet-another-post-copy-migration It is a possible feature, no toolkit can do it well now. Using nbd server/client on the memory file is reluctantly Ok but inconvenient. A special feature for tmpfs might be needed to fully complete this feature. No one need yet another post copy migration method, but it is possible when some crazy man need it. Cc: Samuel Ortiz Cc: Sebastien Boeuf Cc: James O. D. Hunt Cc: Xu Wang Cc: Peng Tao Cc: Xiao Guangrong Cc: Xiao Guangrong Signed-off-by: Lai Jiangshan Reviewed-by: Xiao Guangrong --- Changes in V4: fixes checkpatch.pl errors Changes in V3: rebased on upstream master update the available version of the capability to v2.13 Changes in V2: rebased on 2.11.1 migration/migration.c | 14 ++++++++++++++ migration/migration.h | 1 + migration/ram.c | 27 ++++++++++++++++++--------- qapi/migration.json | 6 +++++- 4 files changed, 38 insertions(+), 10 deletions(-) diff --git a/migration/migration.c b/migration/migration.c index 52a5092add..6a63102d7f 100644 --- a/migration/migration.c +++ b/migration/migration.c @@ -1509,6 +1509,20 @@ bool migrate_release_ram(void) return s->enabled_capabilities[MIGRATION_CAPABILITY_RELEASE_RAM]; } =20 +bool migrate_bypass_shared_memory(void) +{ + MigrationState *s; + + /* it is not workable with postcopy yet. */ + if (migrate_postcopy_ram()) { + return false; + } + + s =3D migrate_get_current(); + + return s->enabled_capabilities[MIGRATION_CAPABILITY_BYPASS_SHARED_MEMO= RY]; +} + bool migrate_postcopy_ram(void) { MigrationState *s; diff --git a/migration/migration.h b/migration/migration.h index 8d2f320c48..cfd2513ef0 100644 --- a/migration/migration.h +++ b/migration/migration.h @@ -206,6 +206,7 @@ MigrationState *migrate_get_current(void); =20 bool migrate_postcopy(void); =20 +bool migrate_bypass_shared_memory(void); bool migrate_release_ram(void); bool migrate_postcopy_ram(void); bool migrate_zero_blocks(void); diff --git a/migration/ram.c b/migration/ram.c index 0e90efa092..bca170c386 100644 --- a/migration/ram.c +++ b/migration/ram.c @@ -780,6 +780,11 @@ unsigned long migration_bitmap_find_dirty(RAMState *rs= , RAMBlock *rb, unsigned long *bitmap =3D rb->bmap; unsigned long next; =20 + /* when this ramblock is requested bypassing */ + if (!bitmap) { + return size; + } + if (rs->ram_bulk_stage && start > 0) { next =3D start + 1; } else { @@ -850,7 +855,9 @@ static void migration_bitmap_sync(RAMState *rs) qemu_mutex_lock(&rs->bitmap_mutex); rcu_read_lock(); RAMBLOCK_FOREACH(block) { - migration_bitmap_sync_range(rs, block, 0, block->used_length); + if (!migrate_bypass_shared_memory() || !qemu_ram_is_shared(block))= { + migration_bitmap_sync_range(rs, block, 0, block->used_length); + } } rcu_read_unlock(); qemu_mutex_unlock(&rs->bitmap_mutex); @@ -2132,18 +2139,12 @@ static int ram_state_init(RAMState **rsp) qemu_mutex_init(&(*rsp)->src_page_req_mutex); QSIMPLEQ_INIT(&(*rsp)->src_page_requests); =20 - /* - * Count the total number of pages used by ram blocks not including any - * gaps due to alignment or unplugs. - */ - (*rsp)->migration_dirty_pages =3D ram_bytes_total() >> TARGET_PAGE_BIT= S; - ram_state_reset(*rsp); =20 return 0; } =20 -static void ram_list_init_bitmaps(void) +static void ram_list_init_bitmaps(RAMState *rs) { RAMBlock *block; unsigned long pages; @@ -2151,9 +2152,17 @@ static void ram_list_init_bitmaps(void) /* Skip setting bitmap if there is no RAM */ if (ram_bytes_total()) { QLIST_FOREACH_RCU(block, &ram_list.blocks, next) { + if (migrate_bypass_shared_memory() && qemu_ram_is_shared(block= )) { + continue; + } pages =3D block->max_length >> TARGET_PAGE_BITS; block->bmap =3D bitmap_new(pages); bitmap_set(block->bmap, 0, pages); + /* + * Count the total number of pages used by ram blocks not + * including any gaps due to alignment or unplugs. + */ + rs->migration_dirty_pages +=3D pages; if (migrate_postcopy_ram()) { block->unsentmap =3D bitmap_new(pages); bitmap_set(block->unsentmap, 0, pages); @@ -2169,7 +2178,7 @@ static void ram_init_bitmaps(RAMState *rs) qemu_mutex_lock_ramlist(); rcu_read_lock(); =20 - ram_list_init_bitmaps(); + ram_list_init_bitmaps(rs); memory_global_dirty_log_start(); migration_bitmap_sync(rs); =20 diff --git a/qapi/migration.json b/qapi/migration.json index 9d0bf82cf4..45326480bd 100644 --- a/qapi/migration.json +++ b/qapi/migration.json @@ -357,13 +357,17 @@ # @dirty-bitmaps: If enabled, QEMU will migrate named dirty bitmaps. # (since 2.12) # +# @bypass-shared-memory: the shared memory region will be bypassed on migr= ation. +# This feature allows the memory region to be reused by new qemu(= s) +# or be migrated separately. (since 2.13) +# # Since: 1.2 ## { 'enum': 'MigrationCapability', 'data': ['xbzrle', 'rdma-pin-all', 'auto-converge', 'zero-blocks', 'compress', 'events', 'postcopy-ram', 'x-colo', 'release-ram', 'block', 'return-path', 'pause-before-switchover', 'x-multifd', - 'dirty-bitmaps' ] } + 'dirty-bitmaps', 'bypass-shared-memory' ] } =20 ## # @MigrationCapabilityStatus: --=20 2.14.3 (Apple Git-98)