Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp176564pxb; Wed, 3 Feb 2021 02:46:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJyezKWxsRaMwjqQHhG02Y9NqP2oKXqIm/5wQncPC+IF0+zdI4zWm9gaCHgFeCAoGeViRbUf X-Received: by 2002:aa7:d651:: with SMTP id v17mr2280659edr.91.1612349203278; Wed, 03 Feb 2021 02:46:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612349203; cv=none; d=google.com; s=arc-20160816; b=etUk4Z1LhZTq6/cISR4l2dTM6hTx3Lamoa01dgQkL/4EfDr4CcSxF+my23JDjUrgnc nFrJjt1msA7OvCLZz6RuXHxc2vWORuBAK3jxqrKeAbnRNSrtQMDl7in9TaGQxO09UFr8 +Bc0YL+4Ioi//S2yZRASpuQX6ZStUHTp7W929ouL8S8vSa6GCEV/FWJFNMMU0nzPyOJD K2yxegEcqtAh9aHb5pNuvvOncfRl7JeopUdiIK2lC09DUkFbfb2sqEnBPCLWjtdnU7yM CHEwG8W4XjFn2n7MiniGgItYfZjO9s5QkHBbAWyOiANbNGIrjvpGRsrQpml4ZrBdoIUX YNZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:subject:from :references:cc:to; bh=TJu2Ah8nxs2Kb6xeY4D+zzMqYK83Zn9lUfrT79w5L9s=; b=hxJKyJ+8LtC78XCvc3xHMtIfnLWR5RB5JMlKUMT7SrJQtbM3S6FaffzKOb1g7r7/5f NSQN7yRGa8UcVMtSFrpgJAu0AgtP4Rg7OkTBeMOQorBv7WUX6IwDSiXSRiSNYRmR1hew Z+aGs2RBPFrOrgBIEp6VE/YEwW46ySTQJqF7Ay3fQJw2rKAIl8pxUuQ8iGCiIsQkqHdQ l5zWwse3tGCd5U7aIALOV7qKdK6yezpwcQ7M9GRS8fL4FXeAjJQet5bB+1o2pUnRxJPn XGFMlwcEIGBqA/xdto0dY+IJCl/Bzk/xpp5ovV1dv8GqmS9ztcjyD3uX1dYVAPlWaEvd o9MA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si889186edu.188.2021.02.03.02.46.18; Wed, 03 Feb 2021 02:46:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233958AbhBCKp1 (ORCPT + 99 others); Wed, 3 Feb 2021 05:45:27 -0500 Received: from vps-vb.mhejs.net ([37.28.154.113]:47078 "EHLO vps-vb.mhejs.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233879AbhBCKpZ (ORCPT ); Wed, 3 Feb 2021 05:45:25 -0500 Received: from MUA by vps-vb.mhejs.net with esmtps (TLS1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.93.0.4) (envelope-from ) id 1l7FeA-0004PP-Vv; Wed, 03 Feb 2021 11:44:31 +0100 To: Sean Christopherson Cc: Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Igor Mammedov , Marc Zyngier , James Morse , Julien Thierry , Suzuki K Poulose , Huacai Chen , Aleksandar Markovic , Paul Mackerras , Christian Borntraeger , Janosch Frank , David Hildenbrand , Cornelia Huck , Claudio Imbrenda , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org References: <4d748e0fd50bac68ece6952129aed319502b6853.1612140117.git.maciej.szmigiero@oracle.com> <9e6ca093-35c3-7cca-443b-9f635df4891d@maciej.szmigiero.name> From: "Maciej S. Szmigiero" Subject: Re: [PATCH 2/2] KVM: Scalable memslots implementation Message-ID: Date: Wed, 3 Feb 2021 11:44:24 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03.02.2021 00:43, Sean Christopherson wrote: > On Tue, Feb 02, 2021, Maciej S. Szmigiero wrote: >> On 02.02.2021 02:33, Sean Christopherson wrote: >>>> Making lookup and memslot management operations O(log(n)) brings >>>> some performance benefits (tested on a Xeon 8167M machine): >>>> 509 slots in use: >>>> Test Before After Improvement >>>> Map 0,0246s 0,0240s 2% >>>> Unmap 0,0833s 0,0318s 62% >>>> Unmap 2M 0,00177s 0,000917s 48% >>>> Move active 0,0000959s 0,0000816s 15% >>>> Move inactive 0,0000960s 0,0000799s 17% >>> >>> I assume "move" refers to the gfn? If so, I believe this can be ignored for the >>> most part as it's not a common operation, and already has a lot of leading zeros :-) >> >> Even if it is not a common operation (today) making it better is >> still a good thing. >> >> The move test result has a lot of leading zeros since it is moving just >> a single memslot and that does not take a lot of time in the absolute >> sense. > > Yes, that's my point. The absolute time is barely measurable, this is an > extremely rare operation, and the optimal approach isn't orders of magnitude > faster, i.e. we can comfortably ignore the "move" performance when weighing > options. I agree that it isn't the main deciding factor but it still good to make it scale better rather than worse, if possible. >>>> Slot setup 0,0107s 0,00825s 23% >>> >>> What does "slot setup" measure? I assume it's one-time pain? If so, then we >>> can probably ignore this as use cases that care about millisecond improvements >>> in boot time are unlikely to have 50 memslots, let alone 500+ memslots. >> >> This value shows how long it took the test to add all these memslots. >> >> Strictly speaking, it also includes the time spent allocating >> the backing memory and time spent in the (userspace) selftest framework >> vm_userspace_mem_region_add() function, but since these operations are >> exactly the same for both in-kernel memslots implementations the >> difference in results is all due to the new kernel code (that is, this >> patch). >> >> The result also shows how the performance of the create memslot operation >> scales with various count of memslots in use (the measurement is always >> done with the same guest memory size). >> >> Hyper-V SynIC may require up to two additional slots per vCPU. >> A large guest with with 128 vCPUs will then use 256 memslots for this >> alone. >> Also, performance improvements add up. > > I generally agree, but if this is literally a one time savings of a millisecond > or so, for VM with a boot time measured in seconds or even tends of seconds... > >> At (guest) runtime live migration uses the memslot set flags operation >> to turn on and off dirty pages logging. > > Do you have numbers for the overhead of enabling dirty logging? I assume the > per-memslot overhead will be similr to the "move" microbenchmark? Will try to measure this, it's not quite the same operation as a move since it doesn't need to install a KVM_MEMSLOT_INVALID temporary slot and, because the gfn doesn't change, the code uses O(1) rb_replace_node() instead of (two) O(log(n)) tree operations. >> Hot{un,}plug of memory and some other devices (like GPUs) create and >> delete memslots, too. >> >>> I'm not nitpicking the benchmarks to discredit your measurements, rather to >>> point out that I suspect the only thing that's "broken" and that anyone truly >>> cares about is unmapping, i.e. hva->memslot lookups. If that is indeed the >>> case, would it be sufficient to focus on speeding up _just_ the hva lookups?> >>> Specifically, I think we can avoid copying the "active vs. inactive" scheme that >>> is used for the main gfn-based array by having the hva tree resolve to an _id_, >>> not to the memslot itself. I.e. bounce through id_to_index, which is coupled >>> with the main array, so that lookups are always done on the "active" memslots, >>> without also having to implement an "inactive" hva tree. >> >> I guess you mean to still turn id_to_index into a hash table, since >> otherwise a VMM which uses just two memslots but numbered 0 and 508 >> will have a 509-entry id_to_index array allocated. > > That should be irrelevant for the purposes of optimizing hva lookups, and mostly > irrelevant for optimizing memslot updates. Using a hash table is almost a pure > a memory optimization, it really only matters when the max number of memslots > skyrockets, which is a separate discussion from optimizing hva lookups. While I agree this is a separate thing from scalable hva lookups it still matters for the overall design. The current id_to_index array is fundamentally "pay the cost of max number of memslots possible regardless how many you use". And it's not only that it takes more memory it also forces memslot create / delete / move operations to be O(n) since the indices have to be updated. By the way, I think nobody argues here for a bazillion of memslots. It is is enough to simply remove the current cap and allow the maximum number permitted by the existing KVM API, that is 32k as Vitaly's patches recently did. Even with 2 MiB blocks this translates into 64 GiB of guest memory. >>> For deletion, seeing the defunct/invalid memslot is not a functional problem; >>> it's technically a performance "problem", but one that we already have. For >>> creation, id_to_index will be -1, and so the memslot lookup will return NULL >>> until the new memslot is visible. >> >> This sounds like you would keep the id_to_index array / hash table >> separate from the main array as it is in the old code (I read "coupled >> with the main array" above as a suggestion to move it to the part that >> gets resized when memslots are created or deleted in the current code, >> that is struct kvm_memslots). > > What I meant by "coupled" is that, in the current code, the id_to_index and > main memslots array are updated in tandem, it's impossible for readers to see > unsynchronized arrays. > >> Then if you create or delete a memslot the memslots located further in >> the memslot array (with lower gfn that the processed slot) will have >> their indices shifted - you can't atomically update all of them. >> >> But overall, this solution (and the one with id_to_index moved into the >> main array, too) is still O(n) per memslot operation as you still need to >> copy the array to either make space for the new memslot or to remove the >> hole from the removed memslot. > > Yes, but that problem that can be solved separately from the performance issue > with hva lookups. > >> Due to that scaling issue it's rather hard to use 32k memslots with the >> old code, the improvement was like 20+ times there on an early version >> of this code. >> >> And if we start adding special cases for things like flags change or >> gfn moves to workaround their scaling issues the code will quickly grow >> even more complicated. >> >>> >>> All hva lookups would obviously need to be changed, but the touchpoint for the >>> write would be quite small, e.g. >>> >>> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c >>> index 8367d88ce39b..c03beb4833b2 100644 >>> --- a/virt/kvm/kvm_main.c >>> +++ b/virt/kvm/kvm_main.c >>> @@ -1220,6 +1220,20 @@ static int kvm_set_memslot(struct kvm *kvm, >>> if (r) >>> goto out_slots; >>> >>> + /* >>> + * Update the hva=>id tree if a memslot is being deleted or created. >>> + * No update is required for moving a memslot or changing its flags, >>> + * as those don't affect its _id_. For deletion, the memslot has been >>> + * zapped and flushed, fast hva lookups are guaranteed to be nops. For >>> + * creation, the new memslot isn't visible until the final installation >>> + * is complete. Fast hva lookups may prematurely see the entry, but >>> + * id_to_memslot() will return NULL upon seeing id_to_index[id] == -1. >>> + */ >>> + if (change == KVM_MR_DELETE) >>> + kvm_hva_tree_remove(...); >>> + else if (change == KVM_MR_CREATE) >>> + kvm_hva_tree_insert(...); >>> + >>> update_memslots(slots, new, change); >>> slots = install_new_memslots(kvm, as_id, slots); >>> >>> >>> I'm not opposed to using more sophisticated storage for the gfn lookups, but >>> only if there's a good reason for doing so. IMO, the rbtree isn't simpler, just >>> different. Memslot modifications are unlikely to be a hot path (and if it is, >>> x86's "zap everything" implementation is a far bigger problem), and it's hard to >>> beat the memory footprint of a raw array. That doesn't leave much motivation >>> for such a big change to some of KVM's scariest (for me) code. >>> >> >> Improvements can be done step-by-step, >> kvm_mmu_invalidate_zap_pages_in_memslot() can be rewritten, too in the >> future, if necessary. >> After all, complains are that this change alone is too big. > > It's not simply that it's too big, it's that it solves several problems in > a single patch that can, and should, be done in separate patches. > > Dumping everything into a single patch makes bisecting nearly worthless, e.g. if > fast hva lookups breaks a non-x86 architecture, we should able to bisect to > exactly that, not a massive patch that completely rewrites all of the memslot > code in one fell swoop. > > Mega patches with multiple logical changes are also extremely difficult to > review. > > See 'Patch preparation' in Documentation/process/5.Posting.rst for more info on > splitting up patches. > >> I think that if you look not at the patch itself but at the resulting >> code the new implementation looks rather straightforward, > > Sorry to be blunt, but that's just not how Linux kernel development works. > Again, I am not opposed to any particular idea/approach in this patch, but the > individual enhancements absolutely need to be split into separate patches. I have said I will split these patches in my previous e-mail (see all these "will do" after your "E.g. changes that can easily be split out:"). My comments were / are about the whole general design, not that it has to be introduced in one patch. > I focused on the hva tree because I think that has, by far, the best bang for > the buck. The performance benefits are clear, the changes can be done with > minimal impact to existing code, and each architcture can opt-in one at a time. > What I'm suggesting is that we first get the fast hva lookups merged, and then > worry about getting KVM to play nice with tens of thousands of memslots. As I wrote above I will split the patch, but I will work on the whole series to make sure that the end result still works well. Maciej