From nobody Sun Nov 17 17:47:20 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1584893225; cv=none; d=zohomail.com; s=zohoarc; b=DjR4GtSHkS3y5PthQ8sq+do8d+I2h4vltrJt6WBgem0upXVu6iPwN1ECXfVQcY+EGjzwax9MwO3LehyoSwXNS/gGR8E90Bpk01CucYCwehGYcXvOs53RHWPeO+UmCEdkl0lh8asg0zUTgUBv5S8SBHDtO9fWQ6KKWtTF2aWO2tU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1584893225; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To; bh=GP44hjxdSnYIoe0WwL9s/f+OcUttsGcdUNtlYOjfRy0=; b=b5n7WzRi9CdXJLH83ZoHVHBpjoaA9gxdQIYshx47Sto5bZK4FgFGteLuN2hJRqt5KyOl2zzW9/c2YKGPra0EnA6HuzuUiA2QMHjJJQpEDEukrUgw1czOvAtfyX1m+9B4YP2jmIzzW1/HSkQX6H5L5Xn+a5Reo0k4d93xDfYaG4M= ARC-Authentication-Results: i=1; mx.zohomail.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1584893225521637.8307314964089; Sun, 22 Mar 2020 09:07:05 -0700 (PDT) Received: from localhost ([::1]:47908 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jG37u-000193-R4 for importer@patchew.org; Sun, 22 Mar 2020 12:07:03 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:44626) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jG36j-0000AF-Ph for qemu-devel@nongnu.org; Sun, 22 Mar 2020 12:05:51 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1jG36f-0007Bl-Q7 for qemu-devel@nongnu.org; Sun, 22 Mar 2020 12:05:47 -0400 Received: from out4436.biz.mail.alibaba.com ([47.88.44.36]:57268) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1jG36e-0007Au-1U for qemu-devel@nongnu.org; Sun, 22 Mar 2020 12:05:45 -0400 Received: from localhost(mailfrom:teawaterz@linux.alibaba.com fp:SMTPD_---0TtH5FIv_1584893121) by smtp.aliyun-inc.com(127.0.0.1); Mon, 23 Mar 2020 00:05:28 +0800 X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R201e4; CH=green; DM=||false|; DS=||; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e01e04400; MF=teawaterz@linux.alibaba.com; NM=1; PH=DS; RN=14; SR=0; TI=SMTPD_---0TtH5FIv_1584893121; From: Hui Zhu To: mst@redhat.com, jasowang@redhat.com, akpm@linux-foundation.org, mojha@codeaurora.org, pagupta@redhat.com, aquini@redhat.com, namit@vmware.com, david@redhat.com, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, qemu-devel@nongnu.org Subject: [PATCH for QEMU v2] virtio-balloon: Add option cont-pages to set VIRTIO_BALLOON_VQ_INFLATE_CONT Date: Mon, 23 Mar 2020 00:04:57 +0800 Message-Id: <1584893097-12317-2-git-send-email-teawater@gmail.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1584893097-12317-1-git-send-email-teawater@gmail.com> References: <1584893097-12317-1-git-send-email-teawater@gmail.com> X-detected-operating-system: by eggs.gnu.org: GNU/Linux 3.x X-Received-From: 47.88.44.36 X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Hui Zhu , Hui Zhu Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" If the guest kernel has many fragmentation pages, use virtio_balloon will split THP of QEMU when it calls MADV_DONTNEED madvise to release the balloon pages. Set option cont-pages to on will open flags VIRTIO_BALLOON_VQ_INFLATE_CONT and set continuous pages order to THP order. Then It will get continuous pages PFN from VQ icvq use use madvise MADV_DONTNEED release the THP page. This will handle the THP split issue. Signed-off-by: Hui Zhu --- hw/virtio/virtio-balloon.c | 32 +++++++++++++++++++++= ---- include/hw/virtio/virtio-balloon.h | 4 +++- include/standard-headers/linux/virtio_balloon.h | 4 ++++ 3 files changed, 35 insertions(+), 5 deletions(-) diff --git a/hw/virtio/virtio-balloon.c b/hw/virtio/virtio-balloon.c index a4729f7..88bdaca 100644 --- a/hw/virtio/virtio-balloon.c +++ b/hw/virtio/virtio-balloon.c @@ -34,6 +34,7 @@ #include "hw/virtio/virtio-access.h" =20 #define BALLOON_PAGE_SIZE (1 << VIRTIO_BALLOON_PFN_SHIFT) +#define CONT_PAGES_ORDER 9 =20 typedef struct PartiallyBalloonedPage { ram_addr_t base_gpa; @@ -65,7 +66,8 @@ static bool virtio_balloon_pbp_matches(PartiallyBallooned= Page *pbp, =20 static void balloon_inflate_page(VirtIOBalloon *balloon, MemoryRegion *mr, hwaddr mr_offset, - PartiallyBalloonedPage *pbp) + PartiallyBalloonedPage *pbp,=20 + bool is_cont_pages) { void *addr =3D memory_region_get_ram_ptr(mr) + mr_offset; ram_addr_t rb_offset, rb_aligned_offset, base_gpa; @@ -76,6 +78,13 @@ static void balloon_inflate_page(VirtIOBalloon *balloon, /* XXX is there a better way to get to the RAMBlock than via a * host address? */ rb =3D qemu_ram_block_from_host(addr, false, &rb_offset); + + if (is_cont_pages) { + ram_block_discard_range(rb, rb_offset, + BALLOON_PAGE_SIZE << CONT_PAGES_ORDER); + return; + } + rb_page_size =3D qemu_ram_pagesize(rb); =20 if (rb_page_size =3D=3D BALLOON_PAGE_SIZE) { @@ -361,9 +370,10 @@ static void virtio_balloon_handle_output(VirtIODevice = *vdev, VirtQueue *vq) trace_virtio_balloon_handle_output(memory_region_name(section.= mr), pa); if (!qemu_balloon_is_inhibited()) { - if (vq =3D=3D s->ivq) { + if (vq =3D=3D s->ivq || vq =3D=3D s->icvq) { balloon_inflate_page(s, section.mr, - section.offset_within_region, &pb= p); + section.offset_within_region, &pb= p, + vq =3D=3D s->icvq); } else if (vq =3D=3D s->dvq) { balloon_deflate_page(s, section.mr, section.offset_wit= hin_region); } else { @@ -618,9 +628,12 @@ static size_t virtio_balloon_config_size(VirtIOBalloon= *s) if (s->qemu_4_0_config_size) { return sizeof(struct virtio_balloon_config); } - if (virtio_has_feature(features, VIRTIO_BALLOON_F_PAGE_POISON)) { + if (virtio_has_feature(s->host_features, VIRTIO_BALLOON_F_CONT_PAGES))= { return sizeof(struct virtio_balloon_config); } + if (virtio_has_feature(features, VIRTIO_BALLOON_F_PAGE_POISON)) { + return offsetof(struct virtio_balloon_config, pages_order); + } if (virtio_has_feature(features, VIRTIO_BALLOON_F_FREE_PAGE_HINT)) { return offsetof(struct virtio_balloon_config, poison_val); } @@ -646,6 +659,10 @@ static void virtio_balloon_get_config(VirtIODevice *vd= ev, uint8_t *config_data) cpu_to_le32(VIRTIO_BALLOON_CMD_ID_DONE); } =20 + if (virtio_has_feature(dev->host_features, VIRTIO_BALLOON_F_CONT_PAGES= )) { + config.pages_order =3D cpu_to_le32(CONT_PAGES_ORDER); + } + trace_virtio_balloon_get_config(config.num_pages, config.actual); memcpy(config_data, &config, virtio_balloon_config_size(dev)); } @@ -816,6 +833,11 @@ static void virtio_balloon_device_realize(DeviceState = *dev, Error **errp) virtio_error(vdev, "iothread is missing"); } } + + if (virtio_has_feature(s->host_features, VIRTIO_BALLOON_F_CONT_PAGES))= { + s->icvq =3D virtio_add_queue(vdev, 128, virtio_balloon_handle_outp= ut); + } + reset_stats(s); } =20 @@ -916,6 +938,8 @@ static Property virtio_balloon_properties[] =3D { VIRTIO_BALLOON_F_DEFLATE_ON_OOM, false), DEFINE_PROP_BIT("free-page-hint", VirtIOBalloon, host_features, VIRTIO_BALLOON_F_FREE_PAGE_HINT, false), + DEFINE_PROP_BIT("cont-pages", VirtIOBalloon, host_features, + VIRTIO_BALLOON_F_CONT_PAGES, false), /* QEMU 4.0 accidentally changed the config size even when free-page-h= int * is disabled, resulting in QEMU 3.1 migration incompatibility. This * property retains this quirk for QEMU 4.1 machine types. diff --git a/include/hw/virtio/virtio-balloon.h b/include/hw/virtio/virtio-= balloon.h index d1c968d..61d2419 100644 --- a/include/hw/virtio/virtio-balloon.h +++ b/include/hw/virtio/virtio-balloon.h @@ -42,7 +42,7 @@ enum virtio_balloon_free_page_report_status { =20 typedef struct VirtIOBalloon { VirtIODevice parent_obj; - VirtQueue *ivq, *dvq, *svq, *free_page_vq; + VirtQueue *ivq, *dvq, *svq, *free_page_vq, *icvq; uint32_t free_page_report_status; uint32_t num_pages; uint32_t actual; @@ -70,6 +70,8 @@ typedef struct VirtIOBalloon { uint32_t host_features; =20 bool qemu_4_0_config_size; + + uint32_t pages_order; } VirtIOBalloon; =20 #endif diff --git a/include/standard-headers/linux/virtio_balloon.h b/include/stan= dard-headers/linux/virtio_balloon.h index 9375ca2..ee18be7 100644 --- a/include/standard-headers/linux/virtio_balloon.h +++ b/include/standard-headers/linux/virtio_balloon.h @@ -36,6 +36,8 @@ #define VIRTIO_BALLOON_F_DEFLATE_ON_OOM 2 /* Deflate balloon on OOM */ #define VIRTIO_BALLOON_F_FREE_PAGE_HINT 3 /* VQ to report free pages */ #define VIRTIO_BALLOON_F_PAGE_POISON 4 /* Guest is using page poisoning */ +#define VIRTIO_BALLOON_F_CONT_PAGES 5 /* VQ to report continuous pages */ + =20 /* Size of a PFN in the balloon interface. */ #define VIRTIO_BALLOON_PFN_SHIFT 12 @@ -51,6 +53,8 @@ struct virtio_balloon_config { uint32_t free_page_report_cmd_id; /* Stores PAGE_POISON if page poisoning is in use */ uint32_t poison_val; + /* Pages order if VIRTIO_BALLOON_F_CONT_PAGES is set */ + uint32_t pages_order; }; =20 #define VIRTIO_BALLOON_S_SWAP_IN 0 /* Amount of memory swapped in */ --=20 2.7.4