From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559544825; cv=none; d=zoho.com; s=zohoarc; b=VMFd4k6YmOkzjynNY6SUP6C8WoxUc0YhwNn51xVFEEj8PVWqZL3zAo4VwWnvhFP3av/CATAyiTdtN+2Xaw1xH/oQxJbneMFqGVvI0e91bU7ekRLo72h8XmFdYfqWd9aI+ONHiHJV/zo8NY7m8name/piCCFjXZ6XQjWT3HGDngM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559544825; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=MStAaa0p0+Gz3QfGLto6fZesEaFu9VgFh6lg/v/vtRU=; b=JyA8jWkNgEkvrrDPvWzZq6QlXipVUEyF2w2ZhLYYRbPUE7Bb92/4PPmleWLhkYKHyk4OYbYcXz4u/yFdcdTkVBqoPRiptyAsSO41hRmfUthJxFLLG+IN4jeoE8zrwZteVpyvWbdoVGQw8xPufEuEPuVWzzAq2yZ2rW0E1OE2LJY= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559544825551532.7544741929054; Sun, 2 Jun 2019 23:53:45 -0700 (PDT) Received: from localhost ([127.0.0.1]:58690 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgqO-0000Hl-ND for importer@patchew.org; Mon, 03 Jun 2019 02:53:20 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49444) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoE-0007I4-T9 for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:07 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgoD-0001uc-SS for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:06 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55608) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgoD-0001ti-NE for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:05 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 027CB3082AFF for ; Mon, 3 Jun 2019 06:51:05 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id ED099648B5; Mon, 3 Jun 2019 06:51:02 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:46 +0800 Message-Id: <20190603065056.25211-2-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Mon, 03 Jun 2019 06:51:05 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 01/11] migration: No need to take rcu during sync_dirty_bitmap X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" cpu_physical_memory_sync_dirty_bitmap() has one RAMBlock* as parameter, which means that it must be with RCU read lock held already. Taking it again inside seems redundant. Removing it. Instead comment on the functions about the RCU read lock. Reviewed-by: Paolo Bonzini Reviewed-by: Juan Quintela Signed-off-by: Peter Xu --- include/exec/ram_addr.h | 5 +---- migration/ram.c | 1 + 2 files changed, 2 insertions(+), 4 deletions(-) diff --git a/include/exec/ram_addr.h b/include/exec/ram_addr.h index 139ad79390..6fc49e5db5 100644 --- a/include/exec/ram_addr.h +++ b/include/exec/ram_addr.h @@ -408,6 +408,7 @@ static inline void cpu_physical_memory_clear_dirty_rang= e(ram_addr_t start, } =20 =20 +/* Called with RCU critical section */ static inline uint64_t cpu_physical_memory_sync_dirty_bitmap(RAMBlock *rb, ram_addr_t start, @@ -431,8 +432,6 @@ uint64_t cpu_physical_memory_sync_dirty_bitmap(RAMBlock= *rb, DIRTY_MEMORY_BLOCK_SIZE); unsigned long page =3D BIT_WORD(start >> TARGET_PAGE_BITS); =20 - rcu_read_lock(); - src =3D atomic_rcu_read( &ram_list.dirty_memory[DIRTY_MEMORY_MIGRATION])->blocks; =20 @@ -452,8 +451,6 @@ uint64_t cpu_physical_memory_sync_dirty_bitmap(RAMBlock= *rb, idx++; } } - - rcu_read_unlock(); } else { ram_addr_t offset =3D rb->offset; =20 diff --git a/migration/ram.c b/migration/ram.c index 4c60869226..dc916042fb 100644 --- a/migration/ram.c +++ b/migration/ram.c @@ -1678,6 +1678,7 @@ static inline bool migration_bitmap_clear_dirty(RAMSt= ate *rs, return ret; } =20 +/* Called with RCU critical section */ static void migration_bitmap_sync_range(RAMState *rs, RAMBlock *rb, ram_addr_t length) { --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559544810; cv=none; d=zoho.com; s=zohoarc; b=U9mGOnJ05LoJXCGuQXDnEYrNpT19NavrOpluN5LdMqQLUCZ+WmM0Ebmxa8sXqArD+kihH6HntOXW9gAX5WTnvzeSrP3JlVKIbRz4yX3xmlwN+2SSe0fNwzkI4jeqyXtORN+AlW6sKN4dPVcvtvQEHV8wazXFQ4ic2YCho4NhH9U= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559544810; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=nY2Q/w7YIax8+Zzs2aWLJ7WK4JqG6GXGHFRA4l0HAIA=; b=C87zIG/wfunc5owq3ac0qS230SZgFQwbTDidZ23ltkbIcxqnRkEgBgLiU2a3H0Id0Cz5KNsu2GZK6KEQW6TMikxm5a5P/k7yo2qKb3CzMjXGugDNFzq0sDNXn++CJJtWYMFzb2d4lZ9jqqzlD2auAkQ47axhMRnr3xKtPwI2Muk= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559544810822879.618510257771; Sun, 2 Jun 2019 23:53:30 -0700 (PDT) Received: from localhost ([127.0.0.1]:58692 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgqR-0000Kn-NT for importer@patchew.org; Mon, 03 Jun 2019 02:53:23 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49455) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoH-0007Js-9b for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:10 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgoG-0001xW-9n for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:09 -0400 Received: from mx1.redhat.com ([209.132.183.28]:58556) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgoG-0001wj-4s for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:08 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 7FAFEC058CBA for ; Mon, 3 Jun 2019 06:51:07 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id 76A48648BA; Mon, 3 Jun 2019 06:51:05 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:47 +0800 Message-Id: <20190603065056.25211-3-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Mon, 03 Jun 2019 06:51:07 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 02/11] memory: Remove memory_region_get_dirty() X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" It's never used anywhere. Reviewed-by: Paolo Bonzini Reviewed-by: Juan Quintela Signed-off-by: Peter Xu --- include/exec/memory.h | 17 ----------------- memory.c | 8 -------- 2 files changed, 25 deletions(-) diff --git a/include/exec/memory.h b/include/exec/memory.h index 9144a47f57..e6140e8a04 100644 --- a/include/exec/memory.h +++ b/include/exec/memory.h @@ -1254,23 +1254,6 @@ void memory_region_ram_resize(MemoryRegion *mr, ram_= addr_t newsize, */ void memory_region_set_log(MemoryRegion *mr, bool log, unsigned client); =20 -/** - * memory_region_get_dirty: Check whether a range of bytes is dirty - * for a specified client. - * - * Checks whether a range of bytes has been written to since the last - * call to memory_region_reset_dirty() with the same @client. Dirty loggi= ng - * must be enabled. - * - * @mr: the memory region being queried. - * @addr: the address (relative to the start of the region) being queried. - * @size: the size of the range being queried. - * @client: the user of the logging information; %DIRTY_MEMORY_MIGRATION or - * %DIRTY_MEMORY_VGA. - */ -bool memory_region_get_dirty(MemoryRegion *mr, hwaddr addr, - hwaddr size, unsigned client); - /** * memory_region_set_dirty: Mark a range of bytes as dirty in a memory reg= ion. * diff --git a/memory.c b/memory.c index 3071c4bdad..0920c105aa 100644 --- a/memory.c +++ b/memory.c @@ -2027,14 +2027,6 @@ void memory_region_set_log(MemoryRegion *mr, bool lo= g, unsigned client) memory_region_transaction_commit(); } =20 -bool memory_region_get_dirty(MemoryRegion *mr, hwaddr addr, - hwaddr size, unsigned client) -{ - assert(mr->ram_block); - return cpu_physical_memory_get_dirty(memory_region_get_ram_addr(mr) + = addr, - size, client); -} - void memory_region_set_dirty(MemoryRegion *mr, hwaddr addr, hwaddr size) { --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559544994; cv=none; d=zoho.com; s=zohoarc; b=KWXBWI+v1wER7ml+1iR3bK/6qndnftaDIMzA9AeGNMLHIkKM9GAjJqFBaFvR5f7bTO0Au95d1WC+3sOBmHNvewEFpJKxh1iM9Y0jDpv/AjwAaHpx5+Mz4nzxJldXtzWYgOyAUVSYujF0UIQY7vc9Tj6XqEfC7Ax4hLfJhd5r6pk= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559544994; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=hvKNG59eZ5+poBwIzvUjQ8pQuIwYlKuZN8SYLpUaazk=; b=ofLpHHFDajqZ0+F5zxcYioHB5QlUAODibp9T4Q2eEYchm7gESSysFgckgqu+iSspljMsX71k95Q5Cfc+6z4yfRjsV9uuMnSt1wGJrNDyqXTahqOIZnS+45h0N0V6INeX0T6a5rtwBttI6ju2C1B+Uo+mN/i0AoTnPyVLrT/J9ec= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559544994232190.17413667034373; Sun, 2 Jun 2019 23:56:34 -0700 (PDT) Received: from localhost ([127.0.0.1]:58748 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgtK-0002kb-46 for importer@patchew.org; Mon, 03 Jun 2019 02:56:22 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49474) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoL-0007RF-Tz for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:15 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgoK-00022X-Qg for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:13 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55638) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgoK-00021f-LL for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:12 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 056C33082AFF for ; Mon, 3 Jun 2019 06:51:12 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id F403F648AA; Mon, 3 Jun 2019 06:51:07 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:48 +0800 Message-Id: <20190603065056.25211-4-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Mon, 03 Jun 2019 06:51:12 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 03/11] memory: Don't set migration bitmap when without migration X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Similar to 9460dee4b2 ("memory: do not touch code dirty bitmap unless TCG is enabled", 2015-06-05) but for the migration bitmap - we can skip the MIGRATION bitmap update if migration not enabled. Reviewed-by: Paolo Bonzini Reviewed-by: Juan Quintela Signed-off-by: Peter Xu --- include/exec/memory.h | 2 ++ include/exec/ram_addr.h | 12 +++++++++++- memory.c | 2 +- 3 files changed, 14 insertions(+), 2 deletions(-) diff --git a/include/exec/memory.h b/include/exec/memory.h index e6140e8a04..f29300c54d 100644 --- a/include/exec/memory.h +++ b/include/exec/memory.h @@ -46,6 +46,8 @@ OBJECT_GET_CLASS(IOMMUMemoryRegionClass, (obj), \ TYPE_IOMMU_MEMORY_REGION) =20 +extern bool global_dirty_log; + typedef struct MemoryRegionOps MemoryRegionOps; typedef struct MemoryRegionMmio MemoryRegionMmio; =20 diff --git a/include/exec/ram_addr.h b/include/exec/ram_addr.h index 6fc49e5db5..79e70a96ee 100644 --- a/include/exec/ram_addr.h +++ b/include/exec/ram_addr.h @@ -348,8 +348,13 @@ static inline void cpu_physical_memory_set_dirty_lebit= map(unsigned long *bitmap, if (bitmap[k]) { unsigned long temp =3D leul_to_cpu(bitmap[k]); =20 - atomic_or(&blocks[DIRTY_MEMORY_MIGRATION][idx][offset], te= mp); atomic_or(&blocks[DIRTY_MEMORY_VGA][idx][offset], temp); + + if (global_dirty_log) { + atomic_or(&blocks[DIRTY_MEMORY_MIGRATION][idx][offset], + temp); + } + if (tcg_enabled()) { atomic_or(&blocks[DIRTY_MEMORY_CODE][idx][offset], tem= p); } @@ -366,6 +371,11 @@ static inline void cpu_physical_memory_set_dirty_lebit= map(unsigned long *bitmap, xen_hvm_modified_memory(start, pages << TARGET_PAGE_BITS); } else { uint8_t clients =3D tcg_enabled() ? DIRTY_CLIENTS_ALL : DIRTY_CLIE= NTS_NOCODE; + + if (!global_dirty_log) { + clients &=3D ~(1 << DIRTY_MEMORY_MIGRATION); + } + /* * bitmap-traveling is faster than memory-traveling (for addr...) * especially when most of the memory is not dirty. diff --git a/memory.c b/memory.c index 0920c105aa..cff0ea8f40 100644 --- a/memory.c +++ b/memory.c @@ -38,7 +38,7 @@ static unsigned memory_region_transaction_depth; static bool memory_region_update_pending; static bool ioeventfd_update_pending; -static bool global_dirty_log =3D false; +bool global_dirty_log; =20 static QTAILQ_HEAD(, MemoryListener) memory_listeners =3D QTAILQ_HEAD_INITIALIZER(memory_listeners); --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559545006; cv=none; d=zoho.com; s=zohoarc; b=QpKBSzlPhaxUdjuMtcD0yvdZF+ZNtKlXKj4fxKzuJKqJknsvYNkoLFKv13KK/TpZY6yxM3+Exh/oDglbrJEnlddjpPtHrWLcBpzRgHI2ycOENPo2BXnVuL6hFauI28rRj5yQVcE/+lmIjhFbzAxuW9TOaupSBy0AL3IK/YbDPBE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559545006; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=CwT1nkWkGuuItOXZkiDYz1Q79GP040CNLdxCDksO1Mc=; b=VIgKKIUzlgN9YHP13Vvx2+d+rTAd02ZZ3qTkHU8jHbB1zln52EbOqOBigNhMsjI2V39/ySCd5xBxbzPcAeofvwi+7ne0lP4QPX6zflLnwFj/X8hnU5DPPVKnZ1o11NoTN66Jo4g0arTkNVhb6MZ4fyTqLFRGX2Gkh+wr8LY4awg= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559545006286363.9324791850984; Sun, 2 Jun 2019 23:56:46 -0700 (PDT) Received: from localhost ([127.0.0.1]:58743 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgtC-0002dl-JC for importer@patchew.org; Mon, 03 Jun 2019 02:56:14 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49489) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoO-0007Vt-U9 for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:18 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgoN-00025J-DG for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:16 -0400 Received: from mx1.redhat.com ([209.132.183.28]:57788) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgoN-00024D-5V for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:15 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 835FE356DB for ; Mon, 3 Jun 2019 06:51:14 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id 78E64648B0; Mon, 3 Jun 2019 06:51:12 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:49 +0800 Message-Id: <20190603065056.25211-5-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Mon, 03 Jun 2019 06:51:14 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 04/11] bitmap: Add bitmap_copy_with_{src|dst}_offset() X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" These helpers copy the source bitmap to destination bitmap with a shift either on the src or dst bitmap. Meanwhile, we never have bitmap tests but we should. This patch also introduces the initial test cases for utils/bitmap.c but it only tests the newly introduced functions. Signed-off-by: Peter Xu Reviewed-by: Dr. David Alan Gilbert --- include/qemu/bitmap.h | 9 +++++ tests/Makefile.include | 2 + tests/test-bitmap.c | 72 +++++++++++++++++++++++++++++++++++ util/bitmap.c | 85 ++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 168 insertions(+) create mode 100644 tests/test-bitmap.c diff --git a/include/qemu/bitmap.h b/include/qemu/bitmap.h index 5c313346b9..82a1d2f41f 100644 --- a/include/qemu/bitmap.h +++ b/include/qemu/bitmap.h @@ -41,6 +41,10 @@ * bitmap_find_next_zero_area(buf, len, pos, n, mask) Find bit free area * bitmap_to_le(dst, src, nbits) Convert bitmap to little endian * bitmap_from_le(dst, src, nbits) Convert bitmap from little endian + * bitmap_copy_with_src_offset(dst, src, offset, nbits) + * *dst =3D *src (with an offset into s= rc) + * bitmap_copy_with_dst_offset(dst, src, offset, nbits) + * *dst =3D *src (with an offset into d= st) */ =20 /* @@ -271,4 +275,9 @@ void bitmap_to_le(unsigned long *dst, const unsigned lo= ng *src, void bitmap_from_le(unsigned long *dst, const unsigned long *src, long nbits); =20 +void bitmap_copy_with_src_offset(unsigned long *dst, const unsigned long *= src, + unsigned long offset, unsigned long nbits= ); +void bitmap_copy_with_dst_offset(unsigned long *dst, const unsigned long *= src, + unsigned long shift, unsigned long nbits); + #endif /* BITMAP_H */ diff --git a/tests/Makefile.include b/tests/Makefile.include index 1865f6b322..5e2d7dddff 100644 --- a/tests/Makefile.include +++ b/tests/Makefile.include @@ -64,6 +64,7 @@ check-unit-y +=3D tests/test-opts-visitor$(EXESUF) check-unit-$(CONFIG_BLOCK) +=3D tests/test-coroutine$(EXESUF) check-unit-y +=3D tests/test-visitor-serialization$(EXESUF) check-unit-y +=3D tests/test-iov$(EXESUF) +check-unit-y +=3D tests/test-bitmap$(EXESUF) check-unit-$(CONFIG_BLOCK) +=3D tests/test-aio$(EXESUF) check-unit-$(CONFIG_BLOCK) +=3D tests/test-aio-multithread$(EXESUF) check-unit-$(CONFIG_BLOCK) +=3D tests/test-throttle$(EXESUF) @@ -529,6 +530,7 @@ tests/test-image-locking$(EXESUF): tests/test-image-loc= king.o $(test-block-obj-y tests/test-thread-pool$(EXESUF): tests/test-thread-pool.o $(test-block-obj= -y) tests/test-iov$(EXESUF): tests/test-iov.o $(test-util-obj-y) tests/test-hbitmap$(EXESUF): tests/test-hbitmap.o $(test-util-obj-y) $(tes= t-crypto-obj-y) +tests/test-bitmap$(EXESUF): tests/test-bitmap.o $(test-util-obj-y) tests/test-x86-cpuid$(EXESUF): tests/test-x86-cpuid.o tests/test-xbzrle$(EXESUF): tests/test-xbzrle.o migration/xbzrle.o migrati= on/page_cache.o $(test-util-obj-y) tests/test-cutils$(EXESUF): tests/test-cutils.o util/cutils.o $(test-util-= obj-y) diff --git a/tests/test-bitmap.c b/tests/test-bitmap.c new file mode 100644 index 0000000000..43f7ba26c5 --- /dev/null +++ b/tests/test-bitmap.c @@ -0,0 +1,72 @@ +/* + * SPDX-License-Identifier: GPL-2.0-or-later + * + * Bitmap.c unit-tests. + * + * Copyright (C) 2019, Red Hat, Inc. + * + * Author: Peter Xu + */ + +#include +#include "qemu/osdep.h" +#include "qemu/bitmap.h" + +#define BMAP_SIZE 1024 + +static void check_bitmap_copy_with_offset(void) +{ + unsigned long *bmap1, *bmap2, *bmap3, total; + + bmap1 =3D bitmap_new(BMAP_SIZE); + bmap2 =3D bitmap_new(BMAP_SIZE); + bmap3 =3D bitmap_new(BMAP_SIZE); + + bmap1[0] =3D random(); + bmap1[1] =3D random(); + bmap1[2] =3D random(); + bmap1[3] =3D random(); + total =3D BITS_PER_LONG * 4; + + /* Shift 115 bits into bmap2 */ + bitmap_copy_with_dst_offset(bmap2, bmap1, 115, total); + /* Shift another 85 bits into bmap3 */ + bitmap_copy_with_dst_offset(bmap3, bmap2, 85, total + 115); + /* Shift back 200 bits back */ + bitmap_copy_with_src_offset(bmap2, bmap3, 200, total); + + g_assert_cmpmem(bmap1, total / sizeof(unsigned long), + bmap2, total / sizeof(unsigned long)); + + bitmap_clear(bmap1, 0, BMAP_SIZE); + /* Set bits in bmap1 are 100-245 */ + bitmap_set(bmap1, 100, 145); + + /* Set bits in bmap2 are 60-205 */ + bitmap_copy_with_src_offset(bmap2, bmap1, 40, 250); + g_assert_cmpint(find_first_bit(bmap2, 60), =3D=3D, 60); + g_assert_cmpint(find_next_zero_bit(bmap2, 205, 60), =3D=3D, 205); + g_assert(test_bit(205, bmap2) =3D=3D 0); + + /* Set bits in bmap3 are 135-280 */ + bitmap_copy_with_dst_offset(bmap3, bmap1, 35, 250); + g_assert_cmpint(find_first_bit(bmap3, 135), =3D=3D, 135); + g_assert_cmpint(find_next_zero_bit(bmap3, 280, 135), =3D=3D, 280); + g_assert(test_bit(280, bmap3) =3D=3D 0); + + g_free(bmap1); + g_free(bmap2); + g_free(bmap3); +} + +int main(int argc, char **argv) +{ + g_test_init(&argc, &argv, NULL); + + g_test_add_func("/bitmap/bitmap_copy_with_offset", + check_bitmap_copy_with_offset); + + g_test_run(); + + return 0; +} diff --git a/util/bitmap.c b/util/bitmap.c index cb618c65a5..1753ff7f5b 100644 --- a/util/bitmap.c +++ b/util/bitmap.c @@ -402,3 +402,88 @@ void bitmap_to_le(unsigned long *dst, const unsigned l= ong *src, { bitmap_to_from_le(dst, src, nbits); } + +/* + * Copy "src" bitmap with a positive offset and put it into the "dst" + * bitmap. The caller needs to make sure the bitmap size of "src" + * is bigger than (shift + nbits). + */ +void bitmap_copy_with_src_offset(unsigned long *dst, const unsigned long *= src, + unsigned long shift, unsigned long nbits) +{ + unsigned long left_mask, right_mask, last_mask; + + /* Proper shift src pointer to the first word to copy from */ + src +=3D BIT_WORD(shift); + shift %=3D BITS_PER_LONG; + + if (!shift) { + /* Fast path */ + bitmap_copy(dst, src, nbits); + return; + } + + right_mask =3D (1ul << shift) - 1; + left_mask =3D ~right_mask; + + while (nbits >=3D BITS_PER_LONG) { + *dst =3D (*src & left_mask) >> shift; + *dst |=3D (src[1] & right_mask) << (BITS_PER_LONG - shift); + dst++; + src++; + nbits -=3D BITS_PER_LONG; + } + + if (nbits > BITS_PER_LONG - shift) { + *dst =3D (*src & left_mask) >> shift; + nbits -=3D BITS_PER_LONG - shift; + last_mask =3D (1ul << nbits) - 1; + *dst |=3D (src[1] & last_mask) << (BITS_PER_LONG - shift); + } else if (nbits) { + last_mask =3D (1ul << nbits) - 1; + *dst =3D (*src >> shift) & last_mask; + } +} + +/* + * Copy "src" bitmap into the "dst" bitmap with an offset in the + * "dst". The caller needs to make sure the bitmap size of "dst" is + * bigger than (shift + nbits). + */ +void bitmap_copy_with_dst_offset(unsigned long *dst, const unsigned long *= src, + unsigned long shift, unsigned long nbits) +{ + unsigned long left_mask, right_mask, last_mask; + + /* Proper shift dst pointer to the first word to copy from */ + dst +=3D BIT_WORD(shift); + shift %=3D BITS_PER_LONG; + + if (!shift) { + /* Fast path */ + bitmap_copy(dst, src, nbits); + return; + } + + right_mask =3D (1ul << (BITS_PER_LONG - shift)) - 1; + left_mask =3D ~right_mask; + + *dst &=3D (1ul << shift) - 1; + while (nbits >=3D BITS_PER_LONG) { + *dst |=3D (*src & right_mask) << shift; + dst[1] =3D (*src & left_mask) >> (BITS_PER_LONG - shift); + dst++; + src++; + nbits -=3D BITS_PER_LONG; + } + + if (nbits > BITS_PER_LONG - shift) { + *dst |=3D (*src & right_mask) << shift; + nbits -=3D BITS_PER_LONG - shift; + last_mask =3D ((1ul << nbits) - 1) << (BITS_PER_LONG - shift); + dst[1] =3D (*src & last_mask) >> (BITS_PER_LONG - shift); + } else if (nbits) { + last_mask =3D (1ul << nbits) - 1; + *dst |=3D (*src & last_mask) << shift; + } +} --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559545134; cv=none; d=zoho.com; s=zohoarc; b=bkwR+J8cSmwHLdlFuI9SgcUssfhdIYencGJVR8WjavWNcmAlGBk+GovUBKRxYMfAw2IbHskg0vtmMUuNGjs75pE6pTYycHSJ1Mz8CyDS9GkeenG9KLOVc5x0c3fAiP5hckNXBRVVjOtqqUPVyMpDbdCeeqXt86Jsjge1PE+ZmTI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559545134; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=B1heOFmsogUo0iVsodhO6/GCW7rkkobVzTT9L+v7pBY=; b=MrWPvQBHJEY+2Xxe8/py5ZjMzvamXW5TP9TYqpkIzrp2qdzXhdSQtXGVpa8xY+l72TpzJMCSITst7+oJ/C0EhrUWd3QaDvLiGl5YFL/gRgwDTXDuDrXU9pJdwLFsuyv4BPH+6Stnvf80HA6x/XzusxnJKMyUx8+BLKj7JObOa+c= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559545134094998.4078823997511; Sun, 2 Jun 2019 23:58:54 -0700 (PDT) Received: from localhost ([127.0.0.1]:58767 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgvg-0004qt-RX for importer@patchew.org; Mon, 03 Jun 2019 02:58:48 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49511) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoR-0007bV-0n for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:20 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgoP-00028w-Um for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:18 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55656) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgoP-00027q-Oz for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:17 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 0F2993082B13 for ; Mon, 3 Jun 2019 06:51:17 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id 03F5D648AA; Mon, 3 Jun 2019 06:51:14 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:50 +0800 Message-Id: <20190603065056.25211-6-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Mon, 03 Jun 2019 06:51:17 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 05/11] memory: Pass mr into snapshot_and_clear_dirty X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Also we change the 2nd parameter of it to be the relative offset within the memory region. This is to be used in follow up patches. Signed-off-by: Peter Xu Reviewed-by: Dr. David Alan Gilbert --- exec.c | 3 ++- include/exec/ram_addr.h | 2 +- memory.c | 3 +-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/exec.c b/exec.c index 4e734770c2..815e4f48b9 100644 --- a/exec.c +++ b/exec.c @@ -1387,9 +1387,10 @@ bool cpu_physical_memory_test_and_clear_dirty(ram_ad= dr_t start, } =20 DirtyBitmapSnapshot *cpu_physical_memory_snapshot_and_clear_dirty - (ram_addr_t start, ram_addr_t length, unsigned client) + (MemoryRegion *mr, hwaddr offset, hwaddr length, unsigned client) { DirtyMemoryBlocks *blocks; + ram_addr_t start =3D memory_region_get_ram_addr(mr) + offset; unsigned long align =3D 1UL << (TARGET_PAGE_BITS + BITS_PER_LEVEL); ram_addr_t first =3D QEMU_ALIGN_DOWN(start, align); ram_addr_t last =3D QEMU_ALIGN_UP(start + length, align); diff --git a/include/exec/ram_addr.h b/include/exec/ram_addr.h index 79e70a96ee..a4456f3615 100644 --- a/include/exec/ram_addr.h +++ b/include/exec/ram_addr.h @@ -403,7 +403,7 @@ bool cpu_physical_memory_test_and_clear_dirty(ram_addr_= t start, unsigned client); =20 DirtyBitmapSnapshot *cpu_physical_memory_snapshot_and_clear_dirty - (ram_addr_t start, ram_addr_t length, unsigned client); + (MemoryRegion *mr, hwaddr offset, hwaddr length, unsigned client); =20 bool cpu_physical_memory_snapshot_get_dirty(DirtyBitmapSnapshot *snap, ram_addr_t start, diff --git a/memory.c b/memory.c index cff0ea8f40..84bba7b65c 100644 --- a/memory.c +++ b/memory.c @@ -2071,8 +2071,7 @@ DirtyBitmapSnapshot *memory_region_snapshot_and_clear= _dirty(MemoryRegion *mr, { assert(mr->ram_block); memory_region_sync_dirty_bitmap(mr); - return cpu_physical_memory_snapshot_and_clear_dirty( - memory_region_get_ram_addr(mr) + addr, size, client); + return cpu_physical_memory_snapshot_and_clear_dirty(mr, addr, size, cl= ient); } =20 bool memory_region_snapshot_get_dirty(MemoryRegion *mr, DirtyBitmapSnapsho= t *snap, --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559544876; cv=none; d=zoho.com; s=zohoarc; b=MVUSsFU+gPXLGHfFigOMWmH6y1dzNxUPfSh+gpETnLg7L0PfK6Qm9rrMHi/IOPGFI7md6GNex80ZJOfe3A1iUiIxo3bs+uOs9CGmf15hq4QuOSFYyM32SrhHyrThnUqFZTKxhT4qeYXDGOuc5RNskxDPkdVYm0bTG60ld9pJ4Ds= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559544876; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=Ld30eRdKZQtmnoXNn6JX8qlL4cNY04utlUdZ+3Oh6ec=; b=bAynPNa3HUPDLPAaP62liiPYFZmOk0DF4B+8EAcar4NuxwXq89kd1TlhGJvyip5HOC7fwoazp6UinUPPZihEtpH0vhVB+GUAdiZU8rxk7ELeh9XzQyHTWFTzWwaDBv1fZg8wv1pm9lN9Chd8WRkfuV95Pgrvk32p5969vSsjPLQ= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559544876315984.8578309474087; Sun, 2 Jun 2019 23:54:36 -0700 (PDT) Received: from localhost ([127.0.0.1]:58695 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgrZ-0001ES-74 for importer@patchew.org; Mon, 03 Jun 2019 02:54:33 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49531) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoW-0007ms-9V for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:28 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgoU-0002Fr-P6 for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:24 -0400 Received: from mx1.redhat.com ([209.132.183.28]:57090) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgoU-0002Ev-HM for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:22 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id DA1C83086258 for ; Mon, 3 Jun 2019 06:51:21 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id 834E04E6AA; Mon, 3 Jun 2019 06:51:17 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:51 +0800 Message-Id: <20190603065056.25211-7-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.49]); Mon, 03 Jun 2019 06:51:21 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 06/11] memory: Introduce memory listener hook log_clear() X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Introduce a new memory region listener hook log_clear() to allow the listeners to hook onto the points where the dirty bitmap is cleared by the bitmap users. Previously log_sync() contains two operations: - dirty bitmap collection, and, - dirty bitmap clear on remote site. Let's take KVM as example - log_sync() for KVM will first copy the kernel dirty bitmap to userspace, and at the same time we'll clear the dirty bitmap there along with re-protecting all the guest pages again. We add this new log_clear() interface only to split the old log_sync() into two separated procedures: - use log_sync() to collect the collection only, and, - use log_clear() to clear the remote dirty bitmap. With the new interface, the memory listener users will still be able to decide how to implement the log synchronization procedure, e.g., they can still only provide log_sync() method only and put all the two procedures within log_sync() (that's how the old KVM works before KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 is introduced). However with this new interface the memory listener users will start to have a chance to postpone the log clear operation explicitly if the module supports. That can really benefit users like KVM at least for host kernels that support KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2. There are three places that can clear dirty bits in any one of the dirty bitmap in the ram_list.dirty_memory[3] array: cpu_physical_memory_snapshot_and_clear_dirty cpu_physical_memory_test_and_clear_dirty cpu_physical_memory_sync_dirty_bitmap Currently we hook directly into each of the functions to notify about the log_clear(). Reviewed-by: Dr. David Alan Gilbert Signed-off-by: Peter Xu --- exec.c | 12 ++++++++++ include/exec/memory.h | 17 ++++++++++++++ include/exec/ram_addr.h | 3 +++ memory.c | 51 +++++++++++++++++++++++++++++++++++++++++ 4 files changed, 83 insertions(+) diff --git a/exec.c b/exec.c index 815e4f48b9..9e13b4f200 100644 --- a/exec.c +++ b/exec.c @@ -1355,6 +1355,8 @@ bool cpu_physical_memory_test_and_clear_dirty(ram_add= r_t start, DirtyMemoryBlocks *blocks; unsigned long end, page; bool dirty =3D false; + RAMBlock *ramblock; + uint64_t mr_offset, mr_size; =20 if (length =3D=3D 0) { return false; @@ -1366,6 +1368,10 @@ bool cpu_physical_memory_test_and_clear_dirty(ram_ad= dr_t start, rcu_read_lock(); =20 blocks =3D atomic_rcu_read(&ram_list.dirty_memory[client]); + ramblock =3D qemu_get_ram_block(start); + /* Range sanity check on the ramblock */ + assert(start >=3D ramblock->offset && + start + length <=3D ramblock->offset + ramblock->used_length); =20 while (page < end) { unsigned long idx =3D page / DIRTY_MEMORY_BLOCK_SIZE; @@ -1377,6 +1383,10 @@ bool cpu_physical_memory_test_and_clear_dirty(ram_ad= dr_t start, page +=3D num; } =20 + mr_offset =3D (ram_addr_t)(page << TARGET_PAGE_BITS) - ramblock->offse= t; + mr_size =3D (end - page) << TARGET_PAGE_BITS; + memory_region_clear_dirty_bitmap(ramblock->mr, mr_offset, mr_size); + rcu_read_unlock(); =20 if (dirty && tcg_enabled()) { @@ -1432,6 +1442,8 @@ DirtyBitmapSnapshot *cpu_physical_memory_snapshot_and= _clear_dirty tlb_reset_dirty_range_all(start, length); } =20 + memory_region_clear_dirty_bitmap(mr, offset, length); + return snap; } =20 diff --git a/include/exec/memory.h b/include/exec/memory.h index f29300c54d..d752b2a758 100644 --- a/include/exec/memory.h +++ b/include/exec/memory.h @@ -416,6 +416,7 @@ struct MemoryListener { void (*log_stop)(MemoryListener *listener, MemoryRegionSection *sectio= n, int old, int new); void (*log_sync)(MemoryListener *listener, MemoryRegionSection *sectio= n); + void (*log_clear)(MemoryListener *listener, MemoryRegionSection *secti= on); void (*log_global_start)(MemoryListener *listener); void (*log_global_stop)(MemoryListener *listener); void (*eventfd_add)(MemoryListener *listener, MemoryRegionSection *sec= tion, @@ -1269,6 +1270,22 @@ void memory_region_set_log(MemoryRegion *mr, bool lo= g, unsigned client); void memory_region_set_dirty(MemoryRegion *mr, hwaddr addr, hwaddr size); =20 +/** + * memory_region_clear_dirty_bitmap - clear dirty bitmap for memory range + * + * This function is called when the caller wants to clear the remote + * dirty bitmap of a memory range within the memory region. This can + * be used by e.g. KVM to manually clear dirty log when + * KVM_CAP_MANUAL_DIRTY_LOG_PROTECT is declared support by the host + * kernel. + * + * @mr: the memory region to clear the dirty log upon + * @start: start address offset within the memory region + * @len: length of the memory region to clear dirty bitmap + */ +void memory_region_clear_dirty_bitmap(MemoryRegion *mr, hwaddr start, + hwaddr len); + /** * memory_region_snapshot_and_clear_dirty: Get a snapshot of the dirty * bitmap and clear it. diff --git a/include/exec/ram_addr.h b/include/exec/ram_addr.h index a4456f3615..34141060e1 100644 --- a/include/exec/ram_addr.h +++ b/include/exec/ram_addr.h @@ -461,6 +461,9 @@ uint64_t cpu_physical_memory_sync_dirty_bitmap(RAMBlock= *rb, idx++; } } + + /* TODO: split the huge bitmap into smaller chunks */ + memory_region_clear_dirty_bitmap(rb->mr, start, length); } else { ram_addr_t offset =3D rb->offset; =20 diff --git a/memory.c b/memory.c index 84bba7b65c..a051025dd1 100644 --- a/memory.c +++ b/memory.c @@ -2064,6 +2064,57 @@ static void memory_region_sync_dirty_bitmap(MemoryRe= gion *mr) } } =20 +void memory_region_clear_dirty_bitmap(MemoryRegion *mr, hwaddr start, + hwaddr len) +{ + MemoryRegionSection mrs; + MemoryListener *listener; + AddressSpace *as; + FlatView *view; + FlatRange *fr; + hwaddr sec_start, sec_end, sec_size; + + QTAILQ_FOREACH(listener, &memory_listeners, link) { + if (!listener->log_clear) { + continue; + } + as =3D listener->address_space; + view =3D address_space_get_flatview(as); + FOR_EACH_FLAT_RANGE(fr, view) { + if (!fr->dirty_log_mask || fr->mr !=3D mr) { + /* + * Clear dirty bitmap operation only applies to those + * regions whose dirty logging is at least enabled + */ + continue; + } + + mrs =3D section_from_flat_range(fr, view); + + sec_start =3D MAX(mrs.offset_within_region, start); + sec_end =3D mrs.offset_within_region + int128_get64(mrs.size); + sec_end =3D MIN(sec_end, start + len); + + if (sec_start >=3D sec_end) { + /* + * If this memory region section has no intersection + * with the requested range, skip. + */ + continue; + } + + /* Valid case; shrink the section if needed */ + mrs.offset_within_address_space +=3D + sec_start - mrs.offset_within_region; + mrs.offset_within_region =3D sec_start; + sec_size =3D sec_end - sec_start; + mrs.size =3D int128_make64(sec_size); + listener->log_clear(listener, &mrs); + } + flatview_unref(view); + } +} + DirtyBitmapSnapshot *memory_region_snapshot_and_clear_dirty(MemoryRegion *= mr, hwaddr addr, hwaddr size, --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559544992; cv=none; d=zoho.com; s=zohoarc; b=WXZbfIbKRRCBjE738PkHRu6YxEaqtzV6stAl7fbsUEIjyUOk63Jmp+PbR+dhJgfpguadjYFwx5KTlU0EhRukcfZlgkAcwBA3l/a/o4nrjHE/1kYGSJsvTDnQMojV+M692pdDFn9HxfgSiiam0dX5bEjAHTYm//veYoVxKITHOeM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559544992; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=og20E3wdbANUmZCjUQ92SPPWgafJrnViwGppUA3nhJU=; b=lxkXwvbaxRpuctw84SQ5VJiRbOUsFeUGU+7q7SvClUG8Go+K+96KBoXwrCvGKPeedM/i4JbcSw3nlXvSmUgaCO8nNYduGvz57kjOwosa6zWRarcjGtWi48U+vCAUaR6tTshCd/ZUSIKsDnOysIN8QM/e419x1ezzQCCnVeJwWCU= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (209.51.188.17 [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559544992289894.3198792465876; Sun, 2 Jun 2019 23:56:32 -0700 (PDT) Received: from localhost ([127.0.0.1]:58745 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgtG-0002hE-8z for importer@patchew.org; Mon, 03 Jun 2019 02:56:18 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49572) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoa-0007nf-2J for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:29 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgoZ-0002L1-2p for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:28 -0400 Received: from mx1.redhat.com ([209.132.183.28]:32788) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgoY-0002KQ-Tr for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:27 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 3F7B8330259 for ; Mon, 3 Jun 2019 06:51:26 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id 599A64E6AA; Mon, 3 Jun 2019 06:51:22 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:52 +0800 Message-Id: <20190603065056.25211-8-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Mon, 03 Jun 2019 06:51:26 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 07/11] kvm: Update comments for sync_dirty_bitmap X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" It's obviously obsolete. Do some update. Signed-off-by: Peter Xu --- accel/kvm/kvm-all.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c index 524c4ddfbd..b686531586 100644 --- a/accel/kvm/kvm-all.c +++ b/accel/kvm/kvm-all.c @@ -473,13 +473,13 @@ static int kvm_get_dirty_pages_log_range(MemoryRegion= Section *section, #define ALIGN(x, y) (((x)+(y)-1) & ~((y)-1)) =20 /** - * kvm_physical_sync_dirty_bitmap - Grab dirty bitmap from kernel space - * This function updates qemu's dirty bitmap using - * memory_region_set_dirty(). This means all bits are set - * to dirty. + * kvm_physical_sync_dirty_bitmap - Sync dirty bitmap from kernel space * - * @start_add: start of logged region. - * @end_addr: end of logged region. + * This function will first try to fetch dirty bitmap from the kernel, + * and then updates qemu's dirty bitmap. + * + * @kml: the KVM memory listener object + * @section: the memory section to sync the dirty bitmap with */ static int kvm_physical_sync_dirty_bitmap(KVMMemoryListener *kml, MemoryRegionSection *section) --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559545049; cv=none; d=zoho.com; s=zohoarc; b=ODjo/gxiyqHvT+n+aSMXiV+u5gjOXy551S6BvftyWpaYzTtB83DwHoAA360mqcJfDyGVJLG6EJzAci2vzA14bGwyF2vQqGQAxF/kQ+uqYAol70f5PMAKXu5ke1e+RljGmcbfpoCzcvoYXkWppCKqkF8BXwykLYeXNTW9AXbXo4I= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559545049; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=ZRZKVbzBj9EnDUzSfowi4M6mv50owjaRIlFN5FME+h0=; b=lyj+XEcbsm2yHqEhJ1QfEVIi07ZI0lWC1HA+IXoI1YdScRhk0xI7YZSuFF2yABFOP5Zi/C0b2sNLU3V3p2wS59H4EmnPxt5Ltzm+TvmD9X8HU/oOPZxNxjrdfSHwgDTTdVkCQYJv1dls7DX3vkdRK+9eh+J09qlaiqqtEvTBGu0= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 15595450494382.409640620646087; Sun, 2 Jun 2019 23:57:29 -0700 (PDT) Received: from localhost ([127.0.0.1]:58750 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXguL-0003lA-DK for importer@patchew.org; Mon, 03 Jun 2019 02:57:25 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49599) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoc-0007qV-MB for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:31 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgob-0002Nw-IN for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:30 -0400 Received: from mx1.redhat.com ([209.132.183.28]:47494) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgob-0002N5-DO for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:29 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id BE63659468 for ; Mon, 3 Jun 2019 06:51:28 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id B4B23648B3; Mon, 3 Jun 2019 06:51:26 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:53 +0800 Message-Id: <20190603065056.25211-9-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Mon, 03 Jun 2019 06:51:28 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 08/11] kvm: Persistent per kvmslot dirty bitmap X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" When synchronizing dirty bitmap from kernel KVM we do it in a per-kvmslot fashion and we allocate the userspace bitmap for each of the ioctl. This patch instead make the bitmap cache be persistent then we don't need to g_malloc0() every time. More importantly, the cached per-kvmslot dirty bitmap will be further used when we want to add support for the KVM_CLEAR_DIRTY_LOG and this cached bitmap will be used to guarantee we won't clear any unknown dirty bits otherwise that can be a severe data loss issue for migration code. Signed-off-by: Peter Xu Reviewed-by: Dr. David Alan Gilbert --- accel/kvm/kvm-all.c | 10 +++++++--- include/sysemu/kvm_int.h | 2 ++ 2 files changed, 9 insertions(+), 3 deletions(-) diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c index b686531586..9fb0694772 100644 --- a/accel/kvm/kvm-all.c +++ b/accel/kvm/kvm-all.c @@ -511,17 +511,19 @@ static int kvm_physical_sync_dirty_bitmap(KVMMemoryLi= stener *kml, */ size =3D ALIGN(((mem->memory_size) >> TARGET_PAGE_BITS), /*HOST_LONG_BITS*/ 64) / 8; - d.dirty_bitmap =3D g_malloc0(size); + if (!mem->dirty_bmap) { + /* Allocate on the first log_sync, once and for all */ + mem->dirty_bmap =3D g_malloc0(size); + } =20 + d.dirty_bitmap =3D mem->dirty_bmap; d.slot =3D mem->slot | (kml->as_id << 16); if (kvm_vm_ioctl(s, KVM_GET_DIRTY_LOG, &d) =3D=3D -1) { DPRINTF("ioctl failed %d\n", errno); - g_free(d.dirty_bitmap); return -1; } =20 kvm_get_dirty_pages_log_range(section, d.dirty_bitmap); - g_free(d.dirty_bitmap); } =20 return 0; @@ -796,6 +798,8 @@ static void kvm_set_phys_mem(KVMMemoryListener *kml, } =20 /* unregister the slot */ + g_free(mem->dirty_bmap); + mem->dirty_bmap =3D NULL; mem->memory_size =3D 0; mem->flags =3D 0; err =3D kvm_set_user_memory_region(kml, mem, false); diff --git a/include/sysemu/kvm_int.h b/include/sysemu/kvm_int.h index f838412491..687a2ee423 100644 --- a/include/sysemu/kvm_int.h +++ b/include/sysemu/kvm_int.h @@ -21,6 +21,8 @@ typedef struct KVMSlot int slot; int flags; int old_flags; + /* Dirty bitmap cache for the slot */ + unsigned long *dirty_bmap; } KVMSlot; =20 typedef struct KVMMemoryListener { --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559545288; cv=none; d=zoho.com; s=zohoarc; b=QJNF19FTKAi0vYtAukitL4a/nUvcJCpYkNoqz3uWkax3ncAymygfsnX1QDPm2CREV63YBvg9N8ObK+sT9mSAp96TRZjTAK4O/eXcEGm5YGAvo5co7oaNl5LMi3M4ihWnn1ps267C6ySR1blgLBYl7EkNVuLtO/lSCJNav6MQHH8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559545288; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=UjRzU92gU+uvoMJ07IpP+/FH1etmfQWjm7oMOiU+lV8=; b=cPlaU7oDOs32tqpiqLNxmQZZm4vXQEzgZcYWYxz8+xAHBoedpirXy1q8ADP/icS6AHfctpCduVDJLfn7wyd+L5zo3EIJlHW7f8raSRgx13/BirZ4xLOSsuHPBk5zBhgwbuysDpltx+7WHFlhtQ5ZLmpkawtr2sHJxyzGtV/YAqM= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559545288812343.5998716395119; Mon, 3 Jun 2019 00:01:28 -0700 (PDT) Received: from localhost ([127.0.0.1]:58822 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgyA-0006qF-N9 for importer@patchew.org; Mon, 03 Jun 2019 03:01:22 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49623) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgog-0007uf-QC for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:36 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgof-0002Rz-9R for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:34 -0400 Received: from mx1.redhat.com ([209.132.183.28]:56534) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgof-0002Qn-1g for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:33 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5AD38308402F for ; Mon, 3 Jun 2019 06:51:32 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id 3EFE5648B0; Mon, 3 Jun 2019 06:51:29 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:54 +0800 Message-Id: <20190603065056.25211-10-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Mon, 03 Jun 2019 06:51:32 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 09/11] kvm: Introduce slots lock for memory listener X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Introduce KVMMemoryListener.slots_lock to protect the slots inside the kvm memory listener. Currently it is close to useless because all the KVM code path now is always protected by the BQL. But it'll start to make sense in follow up patches where we might do remote dirty bitmap clear and also we'll update the per-slot cached dirty bitmap even without the BQL. So let's prepare for it. We can also use per-slot lock for above reason but it seems to be an overkill. Let's just use this bigger one (which covers all the slots of a single address space) but anyway this lock is still much smaller than the BQL. Reviewed-by: Dr. David Alan Gilbert Signed-off-by: Peter Xu --- accel/kvm/kvm-all.c | 58 +++++++++++++++++++++++++++++++--------- include/sysemu/kvm_int.h | 2 ++ 2 files changed, 48 insertions(+), 12 deletions(-) diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c index 9fb0694772..e3006006ea 100644 --- a/accel/kvm/kvm-all.c +++ b/accel/kvm/kvm-all.c @@ -138,6 +138,9 @@ static const KVMCapabilityInfo kvm_required_capabilites= [] =3D { KVM_CAP_LAST_INFO }; =20 +#define kvm_slots_lock(kml) qemu_mutex_lock(&(kml)->slots_lock) +#define kvm_slots_unlock(kml) qemu_mutex_unlock(&(kml)->slots_lock) + int kvm_get_max_memslots(void) { KVMState *s =3D KVM_STATE(current_machine->accelerator); @@ -165,6 +168,7 @@ int kvm_memcrypt_encrypt_data(uint8_t *ptr, uint64_t le= n) return 1; } =20 +/* Called with KVMMemoryListener.slots_lock held */ static KVMSlot *kvm_get_free_slot(KVMMemoryListener *kml) { KVMState *s =3D kvm_state; @@ -182,10 +186,17 @@ static KVMSlot *kvm_get_free_slot(KVMMemoryListener *= kml) bool kvm_has_free_slot(MachineState *ms) { KVMState *s =3D KVM_STATE(ms->accelerator); + bool result; + KVMMemoryListener *kml =3D &s->memory_listener; + + kvm_slots_lock(kml); + result =3D !!kvm_get_free_slot(kml); + kvm_slots_unlock(kml); =20 - return kvm_get_free_slot(&s->memory_listener); + return result; } =20 +/* Called with KVMMemoryListener.slots_lock held */ static KVMSlot *kvm_alloc_slot(KVMMemoryListener *kml) { KVMSlot *slot =3D kvm_get_free_slot(kml); @@ -244,18 +255,21 @@ int kvm_physical_memory_addr_from_host(KVMState *s, v= oid *ram, hwaddr *phys_addr) { KVMMemoryListener *kml =3D &s->memory_listener; - int i; + int i, ret =3D 0; =20 + kvm_slots_lock(kml); for (i =3D 0; i < s->nr_slots; i++) { KVMSlot *mem =3D &kml->slots[i]; =20 if (ram >=3D mem->ram && ram < mem->ram + mem->memory_size) { *phys_addr =3D mem->start_addr + (ram - mem->ram); - return 1; + ret =3D 1; + break; } } + kvm_slots_unlock(kml); =20 - return 0; + return ret; } =20 static int kvm_set_user_memory_region(KVMMemoryListener *kml, KVMSlot *slo= t, bool new) @@ -391,6 +405,7 @@ static int kvm_mem_flags(MemoryRegion *mr) return flags; } =20 +/* Called with KVMMemoryListener.slots_lock held */ static int kvm_slot_update_flags(KVMMemoryListener *kml, KVMSlot *mem, MemoryRegion *mr) { @@ -409,19 +424,26 @@ static int kvm_section_update_flags(KVMMemoryListener= *kml, { hwaddr start_addr, size; KVMSlot *mem; + int ret =3D 0; =20 size =3D kvm_align_section(section, &start_addr); if (!size) { return 0; } =20 + kvm_slots_lock(kml); + mem =3D kvm_lookup_matching_slot(kml, start_addr, size); if (!mem) { /* We don't have a slot if we want to trap every access. */ - return 0; + goto out; } =20 - return kvm_slot_update_flags(kml, mem, section->mr); + ret =3D kvm_slot_update_flags(kml, mem, section->mr); + +out: + kvm_slots_unlock(kml); + return ret; } =20 static void kvm_log_start(MemoryListener *listener, @@ -478,6 +500,8 @@ static int kvm_get_dirty_pages_log_range(MemoryRegionSe= ction *section, * This function will first try to fetch dirty bitmap from the kernel, * and then updates qemu's dirty bitmap. * + * NOTE: caller must be with kml->slots_lock held. + * * @kml: the KVM memory listener object * @section: the memory section to sync the dirty bitmap with */ @@ -488,13 +512,14 @@ static int kvm_physical_sync_dirty_bitmap(KVMMemoryLi= stener *kml, struct kvm_dirty_log d =3D {}; KVMSlot *mem; hwaddr start_addr, size; + int ret =3D 0; =20 size =3D kvm_align_section(section, &start_addr); if (size) { mem =3D kvm_lookup_matching_slot(kml, start_addr, size); if (!mem) { /* We don't have a slot if we want to trap every access. */ - return 0; + goto out; } =20 /* XXX bad kernel interface alert @@ -520,13 +545,14 @@ static int kvm_physical_sync_dirty_bitmap(KVMMemoryLi= stener *kml, d.slot =3D mem->slot | (kml->as_id << 16); if (kvm_vm_ioctl(s, KVM_GET_DIRTY_LOG, &d) =3D=3D -1) { DPRINTF("ioctl failed %d\n", errno); - return -1; + ret =3D -1; + goto out; } =20 kvm_get_dirty_pages_log_range(section, d.dirty_bitmap); } - - return 0; +out: + return ret; } =20 static void kvm_coalesce_mmio_region(MemoryListener *listener, @@ -788,10 +814,12 @@ static void kvm_set_phys_mem(KVMMemoryListener *kml, ram =3D memory_region_get_ram_ptr(mr) + section->offset_within_region + (start_addr - section->offset_within_address_space); =20 + kvm_slots_lock(kml); + if (!add) { mem =3D kvm_lookup_matching_slot(kml, start_addr, size); if (!mem) { - return; + goto out; } if (mem->flags & KVM_MEM_LOG_DIRTY_PAGES) { kvm_physical_sync_dirty_bitmap(kml, section); @@ -808,7 +836,7 @@ static void kvm_set_phys_mem(KVMMemoryListener *kml, __func__, strerror(-err)); abort(); } - return; + goto out; } =20 /* register the new slot */ @@ -824,6 +852,9 @@ static void kvm_set_phys_mem(KVMMemoryListener *kml, strerror(-err)); abort(); } + +out: + kvm_slots_unlock(kml); } =20 static void kvm_region_add(MemoryListener *listener, @@ -850,7 +881,9 @@ static void kvm_log_sync(MemoryListener *listener, KVMMemoryListener *kml =3D container_of(listener, KVMMemoryListener, l= istener); int r; =20 + kvm_slots_lock(kml); r =3D kvm_physical_sync_dirty_bitmap(kml, section); + kvm_slots_unlock(kml); if (r < 0) { abort(); } @@ -930,6 +963,7 @@ void kvm_memory_listener_register(KVMState *s, KVMMemor= yListener *kml, { int i; =20 + qemu_mutex_init(&kml->slots_lock); kml->slots =3D g_malloc0(s->nr_slots * sizeof(KVMSlot)); kml->as_id =3D as_id; =20 diff --git a/include/sysemu/kvm_int.h b/include/sysemu/kvm_int.h index 687a2ee423..31df465fdc 100644 --- a/include/sysemu/kvm_int.h +++ b/include/sysemu/kvm_int.h @@ -27,6 +27,8 @@ typedef struct KVMSlot =20 typedef struct KVMMemoryListener { MemoryListener listener; + /* Protects the slots and all inside them */ + QemuMutex slots_lock; KVMSlot *slots; int as_id; } KVMMemoryListener; --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559545135; cv=none; d=zoho.com; s=zohoarc; b=XCXfkXPmo1gld3LeI5JZc2NU//RzTKlvlokS5wjUFD6cLOu2o1wFpxa0/769FP9L3Rmkf+ipZGnBM6EjkBW4Ask1QnD2tWrcKW45wU5uMTJqmki0EU8YQx7Br6LT5RSxCPIuJR0b4fQNErw9XfNAQVEkcmUr/nrGuqd5Na2ZzoA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559545135; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=4h4mqkKs568hyjtOOPxmji1yqVuSuik69TrRFf9EB4w=; b=cQ+jYQ0mNjmfyTeUjFVDlgP6L+0ZZ3+FkWt4IM4Qi9U333RQ2y9ixAqmCrqnVg/bZOuPJzSsD0G5yZ1elyKT4JilkYrXqWi1ABxb9axXNcVDbBnRPuxaxv2DrfgjBbg+VkkXpUyT4SlR8exM55V64skdgfiJPegh+VGo+SzfDC8= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559545135147962.8601850957525; Sun, 2 Jun 2019 23:58:55 -0700 (PDT) Received: from localhost ([127.0.0.1]:58769 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgvj-0004us-Vr for importer@patchew.org; Mon, 03 Jun 2019 02:58:52 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49643) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgoj-0007ww-EK for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:39 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgoh-0002Ud-Nr for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:37 -0400 Received: from mx1.redhat.com ([209.132.183.28]:33800) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgoh-0002To-Gj for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:35 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id DB6F9309265A for ; Mon, 3 Jun 2019 06:51:34 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id CF0E3648B0; Mon, 3 Jun 2019 06:51:32 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:55 +0800 Message-Id: <20190603065056.25211-11-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.43]); Mon, 03 Jun 2019 06:51:34 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 10/11] kvm: Support KVM_CLEAR_DIRTY_LOG X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Firstly detect the interface using KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 and mark it. When failed to enable the new feature we'll fall back to the old sync. Provide the log_clear() hook for the memory listeners for both address spaces of KVM (normal system memory, and SMM) and deliever the clear message to kernel. Reviewed-by: Dr. David Alan Gilbert Signed-off-by: Peter Xu --- accel/kvm/kvm-all.c | 182 +++++++++++++++++++++++++++++++++++++++++ accel/kvm/trace-events | 1 + 2 files changed, 183 insertions(+) diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c index e3006006ea..5511550d21 100644 --- a/accel/kvm/kvm-all.c +++ b/accel/kvm/kvm-all.c @@ -91,6 +91,7 @@ struct KVMState int many_ioeventfds; int intx_set_mask; bool sync_mmu; + bool manual_dirty_log_protect; /* The man page (and posix) say ioctl numbers are signed int, but * they're not. Linux, glibc and *BSD all treat ioctl numbers as * unsigned, and treating them as signed here can break things */ @@ -555,6 +556,159 @@ out: return ret; } =20 +/* Alignment requirement for KVM_CLEAR_DIRTY_LOG - 64 pages */ +#define KVM_CLEAR_LOG_SHIFT 6 +#define KVM_CLEAR_LOG_ALIGN (qemu_real_host_page_size << KVM_CLEAR_LOG_SH= IFT) +#define KVM_CLEAR_LOG_MASK (-KVM_CLEAR_LOG_ALIGN) + +/** + * kvm_physical_log_clear - Clear the kernel's dirty bitmap for range + * + * NOTE: this will be a no-op if we haven't enabled manual dirty log + * protection in the host kernel because in that case this operation + * will be done within log_sync(). + * + * @kml: the kvm memory listener + * @section: the memory range to clear dirty bitmap + */ +static int kvm_physical_log_clear(KVMMemoryListener *kml, + MemoryRegionSection *section) +{ + KVMState *s =3D kvm_state; + struct kvm_clear_dirty_log d; + uint64_t start, end, bmap_start, start_delta, bmap_npages, size; + unsigned long *bmap_clear =3D NULL, psize =3D qemu_real_host_page_size; + KVMSlot *mem =3D NULL; + int ret, i; + + if (!s->manual_dirty_log_protect) { + /* No need to do explicit clear */ + return 0; + } + + start =3D section->offset_within_address_space; + size =3D int128_get64(section->size); + + if (!size) { + /* Nothing more we can do... */ + return 0; + } + + kvm_slots_lock(kml); + + /* Find any possible slot that covers the section */ + for (i =3D 0; i < s->nr_slots; i++) { + mem =3D &kml->slots[i]; + if (mem->start_addr <=3D start && + start + size <=3D mem->start_addr + mem->memory_size) { + break; + } + } + + /* + * We should always find one memslot until this point, otherwise + * there could be something wrong from the upper layer + */ + assert(mem && i !=3D s->nr_slots); + + /* + * We need to extend either the start or the size or both to + * satisfy the KVM interface requirement. Firstly, do the start + * page alignment on 64 host pages + */ + bmap_start =3D (start - mem->start_addr) & KVM_CLEAR_LOG_MASK; + start_delta =3D start - mem->start_addr - bmap_start; + bmap_start /=3D psize; + + /* + * The kernel interface has restriction on the size too, that either: + * + * (1) the size is 64 host pages aligned (just like the start), or + * (2) the size fills up until the end of the KVM memslot. + */ + bmap_npages =3D DIV_ROUND_UP(size + start_delta, KVM_CLEAR_LOG_ALIGN) + << KVM_CLEAR_LOG_SHIFT; + end =3D mem->memory_size / psize; + if (bmap_npages > end - bmap_start) { + bmap_npages =3D end - bmap_start; + } + start_delta /=3D psize; + + /* + * Prepare the bitmap to clear dirty bits. Here we must guarantee + * that we won't clear any unknown dirty bits otherwise we might + * accidentally clear some set bits which are not yet synced from + * the kernel into QEMU's bitmap, then we'll lose track of the + * guest modifications upon those pages (which can directly lead + * to guest data loss or panic after migration). + * + * Layout of the KVMSlot.dirty_bmap: + * + * |<-------- bmap_npages -----------..>| + * [1] + * start_delta size + * |----------------|-------------|------------------|------------| + * ^ ^ ^ ^ + * | | | | + * start bmap_start (start) end + * of memslot of memslot + * + * [1] bmap_npages can be aligned to either 64 pages or the end of slot + */ + + assert(bmap_start % BITS_PER_LONG =3D=3D 0); + /* We should never do log_clear before log_sync */ + assert(mem->dirty_bmap); + if (start_delta) { + /* Slow path - we need to manipulate a temp bitmap */ + bmap_clear =3D bitmap_new(bmap_npages); + bitmap_copy_with_src_offset(bmap_clear, mem->dirty_bmap, + bmap_start, start_delta + size / psize= ); + /* + * We need to fill the holes at start because that was not + * specified by the caller and we extended the bitmap only for + * 64 pages alignment + */ + bitmap_clear(bmap_clear, 0, start_delta); + d.dirty_bitmap =3D bmap_clear; + } else { + /* Fast path - start address aligns well with BITS_PER_LONG */ + d.dirty_bitmap =3D mem->dirty_bmap + BIT_WORD(bmap_start); + } + + d.first_page =3D bmap_start; + /* It should never overflow. If it happens, say something */ + assert(bmap_npages <=3D UINT32_MAX); + d.num_pages =3D bmap_npages; + d.slot =3D mem->slot | (kml->as_id << 16); + + if (kvm_vm_ioctl(s, KVM_CLEAR_DIRTY_LOG, &d) =3D=3D -1) { + ret =3D -errno; + error_report("%s: KVM_CLEAR_DIRTY_LOG failed, slot=3D%d, " + "start=3D0x%"PRIx64", size=3D0x%"PRIx32", errno=3D%d", + __func__, d.slot, (uint64_t)d.first_page, + (uint32_t)d.num_pages, ret); + } else { + ret =3D 0; + trace_kvm_clear_dirty_log(d.slot, d.first_page, d.num_pages); + } + + /* + * After we have updated the remote dirty bitmap, we update the + * cached bitmap as well for the memslot, then if another user + * clears the same region we know we shouldn't clear it again on + * the remote otherwise it's data loss as well. + */ + bitmap_clear(mem->dirty_bmap, bmap_start + start_delta, + size / psize); + /* This handles the NULL case well */ + g_free(bmap_clear); + + kvm_slots_unlock(kml); + + return ret; +} + static void kvm_coalesce_mmio_region(MemoryListener *listener, MemoryRegionSection *secion, hwaddr start, hwaddr size) @@ -889,6 +1043,22 @@ static void kvm_log_sync(MemoryListener *listener, } } =20 +static void kvm_log_clear(MemoryListener *listener, + MemoryRegionSection *section) +{ + KVMMemoryListener *kml =3D container_of(listener, KVMMemoryListener, l= istener); + int r; + + r =3D kvm_physical_log_clear(kml, section); + if (r < 0) { + error_report_once("%s: kvm log clear failed: mr=3D%s " + "offset=3D%"HWADDR_PRIx" size=3D%"PRIx64, __func= __, + section->mr->name, section->offset_within_region, + int128_get64(section->size)); + abort(); + } +} + static void kvm_mem_ioeventfd_add(MemoryListener *listener, MemoryRegionSection *section, bool match_data, uint64_t data, @@ -976,6 +1146,7 @@ void kvm_memory_listener_register(KVMState *s, KVMMemo= ryListener *kml, kml->listener.log_start =3D kvm_log_start; kml->listener.log_stop =3D kvm_log_stop; kml->listener.log_sync =3D kvm_log_sync; + kml->listener.log_clear =3D kvm_log_clear; kml->listener.priority =3D 10; =20 memory_listener_register(&kml->listener, as); @@ -1700,6 +1871,17 @@ static int kvm_init(MachineState *ms) s->coalesced_pio =3D s->coalesced_mmio && kvm_check_extension(s, KVM_CAP_COALESCED_PIO); =20 + s->manual_dirty_log_protect =3D + kvm_check_extension(s, KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2); + if (s->manual_dirty_log_protect) { + ret =3D kvm_vm_enable_cap(s, KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2, 0,= 1); + if (ret) { + warn_report("Trying to enable KVM_CAP_MANUAL_DIRTY_LOG_PROTECT= 2 " + "but failed. Falling back to the legacy mode. "); + s->manual_dirty_log_protect =3D false; + } + } + #ifdef KVM_CAP_VCPU_EVENTS s->vcpu_events =3D kvm_check_extension(s, KVM_CAP_VCPU_EVENTS); #endif diff --git a/accel/kvm/trace-events b/accel/kvm/trace-events index 33c5b1b3af..4fb6e59d19 100644 --- a/accel/kvm/trace-events +++ b/accel/kvm/trace-events @@ -15,4 +15,5 @@ kvm_irqchip_release_virq(int virq) "virq %d" kvm_set_ioeventfd_mmio(int fd, uint64_t addr, uint32_t val, bool assign, u= int32_t size, bool datamatch) "fd: %d @0x%" PRIx64 " val=3D0x%x assign: %d = size: %d match: %d" kvm_set_ioeventfd_pio(int fd, uint16_t addr, uint32_t val, bool assign, ui= nt32_t size, bool datamatch) "fd: %d @0x%x val=3D0x%x assign: %d size: %d m= atch: %d" kvm_set_user_memory(uint32_t slot, uint32_t flags, uint64_t guest_phys_add= r, uint64_t memory_size, uint64_t userspace_addr, int ret) "Slot#%d flags= =3D0x%x gpa=3D0x%"PRIx64 " size=3D0x%"PRIx64 " ua=3D0x%"PRIx64 " ret=3D%d" +kvm_clear_dirty_log(uint32_t slot, uint64_t start, uint32_t size) "slot#%"= PRId32" start 0x%"PRIx64" size 0x%"PRIx32 =20 --=20 2.17.1 From nobody Thu May 16 07:49:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1559545426; cv=none; d=zoho.com; s=zohoarc; b=YpKIb++j5JFve9w9YQd1H6rWP7LinexmOGsZcYFE2joFTcLkTKwu2xj+n/ODQQdqt5el3Wd72yfzX+SFARfs4uhVdOct8NR6WE3CePCjAKwfipHk4qFg0tnG6sVpgkVEcAw1A60yP6fFQRL90Vh+qFSp5+B0wDaVCfauDEMedRY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559545426; h=Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=khH5rHMpQz7g00/5tVGqv0GpEscvIoBHT6yMwNLezQo=; b=CUl+EJ2RKFNt6jRNnDV0qlpv0SHez55G3M/mbwMpQBbZUvqfuli6vsSB/8+gpbJby5wQRn+vCX1Qzqop/tY2rdwdsyi744UnU3XM04aPuckMHSaOsNM7PFnzPcKDDn/24kvt8ztoPisf7rQPgMf8Pdtp+MCY0KN/koqJf+P4fZk= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1559545426028101.41284659967926; Mon, 3 Jun 2019 00:03:46 -0700 (PDT) Received: from localhost ([127.0.0.1]:58842 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXh0M-0000Rr-VM for importer@patchew.org; Mon, 03 Jun 2019 03:03:39 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49665) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hXgom-0007zf-7x for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:41 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hXgok-0002Ym-B4 for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:40 -0400 Received: from mx1.redhat.com ([209.132.183.28]:57946) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hXgok-0002XP-39 for qemu-devel@nongnu.org; Mon, 03 Jun 2019 02:51:38 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 6556B356C4 for ; Mon, 3 Jun 2019 06:51:37 +0000 (UTC) Received: from xz-x1.nay.redhat.com (dhcp-15-205.nay.redhat.com [10.66.15.205]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5A11E6403A; Mon, 3 Jun 2019 06:51:35 +0000 (UTC) From: Peter Xu To: qemu-devel@nongnu.org Date: Mon, 3 Jun 2019 14:50:56 +0800 Message-Id: <20190603065056.25211-12-peterx@redhat.com> In-Reply-To: <20190603065056.25211-1-peterx@redhat.com> References: <20190603065056.25211-1-peterx@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Mon, 03 Jun 2019 06:51:37 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v4 11/11] migration: Split log_clear() into smaller chunks X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Laurent Vivier , Paolo Bonzini , "Dr . David Alan Gilbert" , peterx@redhat.com, Juan Quintela Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Currently we are doing log_clear() right after log_sync() which mostly keeps the old behavior when log_clear() was still part of log_sync(). This patch tries to further optimize the migration log_clear() code path to split huge log_clear()s into smaller chunks. We do this by spliting the whole guest memory region into memory chunks, whose size is decided by MigrationState.clear_bitmap_shift (an example will be given below). With that, we don't do the dirty bitmap clear operation on the remote node (e.g., KVM) when we fetch the dirty bitmap, instead we explicitly clear the dirty bitmap for the memory chunk for each of the first time we send a page in that chunk. Here comes an example. Assuming the guest has 64G memory, then before this patch the KVM ioctl KVM_CLEAR_DIRTY_LOG will be a single one covering 64G memory. If after the patch, let's assume when the clear bitmap shift is 18, then the memory chunk size on x86_64 will be 1UL<<18 * 4K =3D 1GB. Then instead of sending a big 64G ioctl, we'll send 64 small ioctls, each of the ioctl will cover 1G of the guest memory. For each of the 64 small ioctls, we'll only send if any of the page in that small chunk was going to be sent right away. Signed-off-by: Peter Xu --- include/exec/ram_addr.h | 76 +++++++++++++++++++++++++++++++++++++++-- migration/migration.c | 4 +++ migration/migration.h | 27 +++++++++++++++ migration/ram.c | 44 ++++++++++++++++++++++++ migration/trace-events | 1 + 5 files changed, 150 insertions(+), 2 deletions(-) diff --git a/include/exec/ram_addr.h b/include/exec/ram_addr.h index 34141060e1..bb92b4c32c 100644 --- a/include/exec/ram_addr.h +++ b/include/exec/ram_addr.h @@ -50,8 +50,70 @@ struct RAMBlock { unsigned long *unsentmap; /* bitmap of already received pages in postcopy */ unsigned long *receivedmap; + + /* + * bitmap to track already cleared dirty bitmap. When the bit is + * set, it means the corresponding memory chunk needs a log-clear. + * Set this up to non-NULL to enable the capability to postpone + * and split clearing of dirty bitmap on the remote node (e.g., + * KVM). The bitmap will be set only when doing global sync. + * + * NOTE: this bitmap is different comparing to the other bitmaps + * in that one bit can represent multiple guest pages (which is + * decided by the `clear_bmap_shift' variable below). On + * destination side, this should always be NULL, and the variable + * `clear_bmap_shift' is meaningless. + */ + unsigned long *clear_bmap; + uint8_t clear_bmap_shift; }; =20 +/** + * clear_bmap_size: calculate clear bitmap size + * + * @pages: number of guest pages + * @shift: guest page number shift + * + * Returns: number of bits for the clear bitmap + */ +static inline long clear_bmap_size(uint64_t pages, uint8_t shift) +{ + return DIV_ROUND_UP(pages, 1UL << shift); +} + +/** + * clear_bmap_set: set clear bitmap for the page range + * + * @rb: the ramblock to operate on + * @start: the start page number + * @size: number of pages to set in the bitmap + * + * Returns: None + */ +static inline void clear_bmap_set(RAMBlock *rb, uint64_t start, + uint64_t npages) +{ + uint8_t shift =3D rb->clear_bmap_shift; + + bitmap_set_atomic(rb->clear_bmap, start >> shift, + clear_bmap_size(npages, shift)); +} + +/** + * clear_bmap_test_and_clear: test clear bitmap for the page, clear if set + * + * @rb: the ramblock to operate on + * @page: the page number to check + * + * Returns: true if the bit was set, false otherwise + */ +static inline bool clear_bmap_test_and_clear(RAMBlock *rb, uint64_t page) +{ + uint8_t shift =3D rb->clear_bmap_shift; + + return bitmap_test_and_clear_atomic(rb->clear_bmap, page >> shift, 1); +} + static inline bool offset_in_ramblock(RAMBlock *b, ram_addr_t offset) { return (b && b->host && offset < b->used_length) ? true : false; @@ -462,8 +524,18 @@ uint64_t cpu_physical_memory_sync_dirty_bitmap(RAMBloc= k *rb, } } =20 - /* TODO: split the huge bitmap into smaller chunks */ - memory_region_clear_dirty_bitmap(rb->mr, start, length); + if (rb->clear_bmap) { + /* + * Postpone the dirty bitmap clear to the point before we + * really send the pages, also we will split the clear + * dirty procedure into smaller chunks. + */ + clear_bmap_set(rb, start >> TARGET_PAGE_BITS, + length >> TARGET_PAGE_BITS); + } else { + /* Slow path - still do that in a huge chunk */ + memory_region_clear_dirty_bitmap(rb->mr, start, length); + } } else { ram_addr_t offset =3D rb->offset; =20 diff --git a/migration/migration.c b/migration/migration.c index 2865ae3fa9..8a607fe1e2 100644 --- a/migration/migration.c +++ b/migration/migration.c @@ -3362,6 +3362,8 @@ void migration_global_dump(Monitor *mon) ms->send_section_footer ? "on" : "off"); monitor_printf(mon, "decompress-error-check: %s\n", ms->decompress_error_check ? "on" : "off"); + monitor_printf(mon, "clear-bitmap-shift: %u\n", + ms->clear_bitmap_shift); } =20 #define DEFINE_PROP_MIG_CAP(name, x) \ @@ -3376,6 +3378,8 @@ static Property migration_properties[] =3D { send_section_footer, true), DEFINE_PROP_BOOL("decompress-error-check", MigrationState, decompress_error_check, true), + DEFINE_PROP_UINT8("x-clear-bitmap-shift", MigrationState, + clear_bitmap_shift, CLEAR_BITMAP_SHIFT_DEFAULT), =20 /* Migration parameters */ DEFINE_PROP_UINT8("x-compress-level", MigrationState, diff --git a/migration/migration.h b/migration/migration.h index 780a096857..6e3178d8b2 100644 --- a/migration/migration.h +++ b/migration/migration.h @@ -27,6 +27,23 @@ struct PostcopyBlocktimeContext; =20 #define MIGRATION_RESUME_ACK_VALUE (1) =20 +/* + * 1<<6=3D64 pages -> 256K chunk when page size is 4K. This gives us + * the benefit that all the chunks are 64 pages aligned then the + * bitmaps are always aligned to LONG. + */ +#define CLEAR_BITMAP_SHIFT_MIN 6 +/* + * 1<<18=3D256K pages -> 1G chunk when page size is 4K. This is the + * default value to use if no one specified. + */ +#define CLEAR_BITMAP_SHIFT_DEFAULT 18 +/* + * 1<<31=3D2G pages -> 8T chunk when page size is 4K. This should be + * big enough and make sure we won't overflow easily. + */ +#define CLEAR_BITMAP_SHIFT_MAX 31 + /* State for the incoming migration */ struct MigrationIncomingState { QEMUFile *from_src_file; @@ -233,6 +250,16 @@ struct MigrationState * do not trigger spurious decompression errors. */ bool decompress_error_check; + + /* + * This decides the size of guest memory chunk that will be used + * to track dirty bitmap clearing. The size of memory chunk will + * be GUEST_PAGE_SIZE << N. Say, N=3D0 means we will clear dirty + * bitmap for each page to send (1<<0=3D1); N=3D10 means we will clear + * dirty bitmap only once for 1<<10=3D1K continuous guest pages + * (which is in 4M chunk). + */ + uint8_t clear_bitmap_shift; }; =20 void migrate_set_state(int *state, int old_state, int new_state); diff --git a/migration/ram.c b/migration/ram.c index dc916042fb..632bf02575 100644 --- a/migration/ram.c +++ b/migration/ram.c @@ -1668,6 +1668,33 @@ static inline bool migration_bitmap_clear_dirty(RAMS= tate *rs, bool ret; =20 qemu_mutex_lock(&rs->bitmap_mutex); + + /* + * Clear dirty bitmap if needed. This _must_ be called before we + * send any of the page in the chunk because we need to make sure + * we can capture further page content changes when we sync dirty + * log the next time. So as long as we are going to send any of + * the page in the chunk we clear the remote dirty bitmap for all. + * Clearing it earlier won't be a problem, but too late will. + */ + if (rb->clear_bmap && clear_bmap_test_and_clear(rb, page)) { + uint8_t shift =3D rb->clear_bmap_shift; + hwaddr size =3D 1ULL << (TARGET_PAGE_BITS + shift); + hwaddr start =3D (page << TARGET_PAGE_BITS) & (-size); + + /* + * CLEAR_BITMAP_SHIFT_MIN should always guarantee this... this + * can make things easier sometimes since then start address + * of the small chunk will always be 64 pages aligned so the + * bitmap will always be aligned to unsigned long. We should + * even be able to remove this restriction but I'm simply + * keeping it. + */ + assert(shift >=3D 6); + trace_migration_bitmap_clear_dirty(rb->idstr, start, size, page); + memory_region_clear_dirty_bitmap(rb->mr, start, size); + } + ret =3D test_and_clear_bit(page, rb->bmap); =20 if (ret) { @@ -2685,6 +2712,8 @@ static void ram_save_cleanup(void *opaque) memory_global_dirty_log_stop(); =20 RAMBLOCK_FOREACH_NOT_IGNORED(block) { + g_free(block->clear_bmap); + block->clear_bmap =3D NULL; g_free(block->bmap); block->bmap =3D NULL; g_free(block->unsentmap); @@ -3195,15 +3224,30 @@ static int ram_state_init(RAMState **rsp) =20 static void ram_list_init_bitmaps(void) { + MigrationState *ms =3D migrate_get_current(); RAMBlock *block; unsigned long pages; + uint8_t shift; =20 /* Skip setting bitmap if there is no RAM */ if (ram_bytes_total()) { + shift =3D ms->clear_bitmap_shift; + if (shift > CLEAR_BITMAP_SHIFT_MAX) { + error_report("clear_bitmap_shift (%u) too big, using " + "max value (%u)", shift, CLEAR_BITMAP_SHIFT_MAX); + shift =3D CLEAR_BITMAP_SHIFT_MAX; + } else if (shift < CLEAR_BITMAP_SHIFT_MIN) { + error_report("clear_bitmap_shift (%u) too small, using " + "min value (%u)", shift, CLEAR_BITMAP_SHIFT_MIN); + shift =3D CLEAR_BITMAP_SHIFT_MIN; + } + RAMBLOCK_FOREACH_NOT_IGNORED(block) { pages =3D block->max_length >> TARGET_PAGE_BITS; block->bmap =3D bitmap_new(pages); bitmap_set(block->bmap, 0, pages); + block->clear_bmap_shift =3D shift; + block->clear_bmap =3D bitmap_new(clear_bmap_size(pages, shift)= ); if (migrate_postcopy_ram()) { block->unsentmap =3D bitmap_new(pages); bitmap_set(block->unsentmap, 0, pages); diff --git a/migration/trace-events b/migration/trace-events index de2e136e57..2c45974330 100644 --- a/migration/trace-events +++ b/migration/trace-events @@ -79,6 +79,7 @@ get_queued_page(const char *block_name, uint64_t tmp_offs= et, unsigned long page_ get_queued_page_not_dirty(const char *block_name, uint64_t tmp_offset, uns= igned long page_abs, int sent) "%s/0x%" PRIx64 " page_abs=3D0x%lx (sent=3D%= d)" migration_bitmap_sync_start(void) "" migration_bitmap_sync_end(uint64_t dirty_pages) "dirty_pages %" PRIu64 +migration_bitmap_clear_dirty(char *str, uint64_t start, uint64_t size, uns= igned long page) "rb %s start 0x%"PRIx64" size 0x%"PRIx64" page 0x%lx" migration_throttle(void) "" multifd_recv(uint8_t id, uint64_t packet_num, uint32_t used, uint32_t flag= s, uint32_t next_packet_size) "channel %d packet number %" PRIu64 " pages %= d flags 0x%x next packet size %d" multifd_recv_sync_main(long packet_num) "packet num %ld" --=20 2.17.1