[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <53A3A864.3020708@cn.fujitsu.com>
Date: Fri, 20 Jun 2014 11:20:04 +0800
From: Tang Chen <tangchen@...fujitsu.com>
To: Marcelo Tosatti <mtosatti@...hat.com>
CC: Gleb Natapov <gleb@...nel.org>, <pbonzini@...hat.com>,
<tglx@...utronix.de>, <mingo@...hat.com>, <hpa@...or.com>,
<mgorman@...e.de>, <yinghai@...nel.org>,
<isimatu.yasuaki@...fujitsu.com>, <guz.fnst@...fujitsu.com>,
<laijs@...fujitsu.com>, <kvm@...r.kernel.org>,
<linux-mm@...ck.org>, <x86@...nel.org>,
<linux-kernel@...r.kernel.org>, Avi Kivity <avi.kivity@...il.com>,
Tang Chen <tangchen@...fujitsu.com>
Subject: Re: [RFC PATCH 1/1] Move two pinned pages to non-movable node in
kvm.
Hi Marcelo,
Thanks for your reply. Please see below.
On 06/20/2014 03:00 AM, Marcelo Tosatti wrote:
......
>> Remove pinning is preferable. In fact looks like for identity pagetable
>> it should be trivial, just don't pin. APIC access page is a little bit
>> more complicated since its physical address needs to be tracked to be
>> updated in VMCS.
>
> Yes, and there are new users of page pinning as well soon (see PEBS
> threads on kvm-devel).
>
> Was thinking of notifiers scheme. Perhaps:
>
> ->begin_page_unpin(struct page *page)
> - Remove any possible access to page.
>
> ->end_page_unpin(struct page *page)
> - Reinstantiate any possible access to page.
>
> For KVM:
>
> ->begin_page_unpin()
> - Remove APIC-access page address from VMCS.
> or
> - Remove spte translation to pinned page.
>
> - Put vcpu in state where no VM-entries are allowed.
>
> ->end_page_unpin()
> - Setup APIC-access page, ...
> - Allow vcpu to VM-entry.
>
>
> Because allocating APIC access page from distant NUMA node can
> be a performance problem, i believe.
Yes, I understand this.
>
> I'd be happy to know why notifiers are overkill.
The notifiers are not overkill. I have been thinking about a similar idea.
In fact, we have met the same pinned pages problem in AIO subsystem.
The aio ring pages are pinned in memory, and cannot be migrated.
And in kernel, I believe, there are some other places where pages are
pinned.
So I was thinking a notifier framework to solve this problem.
But I can see some problems:
1. When getting a page, migration thread doesn't know who is using this
page
and how. So we need a callback for each page to be called before and
after
it is migrated.
(A little over thinking, maybe. Please see below.)
2. When migrating a shared page, one callback is not enouch because the
page
could be shared by different subsystems. They may have different
ways to
pin and unpin the page.
3. Where should we put the callback? Only file backing pages have one
and only one
address_space->address_space_operations->migratepage(). For
anonymous pages,
nowhere to put the callback.
(A basic idea: define a global radix tree or hash table to manage
the pinned
pages and their callbacks. Mel Gorman mentioned this idea when
handling
the aio ring page problem. I'm not sure if this is acceptable.)
The idea above may be a little over thinking. Actually we can reuse the
memory hotplug notify chain if the pinned page migration is only used by
memory hotplug subsystem.
The basic idea is: Each subsystem register a callback to memory hotplug
notify
chain, and unpin and repin the pages before and after page migration.
But I think, finally we will met this problem: How to remember/manage the
pinned pages in each subsystem.
For example, for kvm, ept identity pagetable page and apic page are pinned.
Since these two pages' struct_page pointer and user_addr are remember in
kvm,
they are easy to handle. If we pin a page and remember it only in a stack
variable, it could be difficult to handle.
For now for kvm, I think notifiers can solve this problem.
Thanks for the advice. If you guys have any idea about this probelm, please
share with me.
Thanks.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists