Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp1011173rdd; Wed, 10 Jan 2024 06:14:51 -0800 (PST) X-Google-Smtp-Source: AGHT+IHHp7t/V3rEyMW+fHMYsC+xNP+OTDeYyxz9vayYCNkTAZ4u+legTR4vgoPcBCx3tbsIIWmU X-Received: by 2002:a17:90a:e386:b0:28c:e568:5ebd with SMTP id b6-20020a17090ae38600b0028ce5685ebdmr704569pjz.37.1704896091447; Wed, 10 Jan 2024 06:14:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704896091; cv=none; d=google.com; s=arc-20160816; b=rUL3wVV+fmdtLzkNzwEBW2JxjVKsquunwbudbxBWj68bi0as7RAZxSbZENhUsWKs0B pSi2f3Ho30ewpmIIDHWJS1lI2jgJPe8ZzyQYKIYTJIlcKCxSnB65VHy+0CC770l65uZ4 h+Qrk36eSIftDCoSl4ibU+1k0aXf/Ha6IuZ4PkYb0AO4n2iB+zHl+VLMhuk4KMXzth5q EUxhAspJPgbB432Dn/8s5sjZK/+1J7khcuhu4rI/gTIH16TMTrm9iVXIMbXW1OkiOOYB k2YKBzSGSUp+SREiaz1C6+ii9stVfEyy2/gCy5fItaYpfyL/6nhYAq/vhAIU/VyZRZsK /fLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:organization:references :in-reply-to:message-id:subject:cc:to:from:date; bh=m91PtpAbBiQms+WY6UorbiFhoYpaG9Ld4gN2iezWIfM=; fh=ZVfvpFID3jQlC8B/ysPRSNImJCOPc/XYe1XMlOZgdd4=; b=xrGNWQwOwBzY5Ce1tSlJIkr7LEZQz9HiRpJo4JPGgpK0plIRqFZ3R7zgftTWmlXxr4 W4y+P0nuQxumbK5kXb7WDakPtrtOwKYxk7tOh2TF/+i1IEGSDUeD+3NFh4syCntIc6uK rVpH+Ki5j+sVY9fHnIvFhMbM3LaPlc42q6lwbPhNqxsp3ea00rtP8Wreag/uzdYp7inB mnJIgDX8fjaV/UDiSMcByRyvam3hYJu7A+iYFubdk+PhBPU++eo1esjlh7EEtd505WOm /t0/YvQI600k+X0o6FRaqgJJc552LmTr4Gn1roVZrdpvP7P2lOfY66pUzSrOi3ZzJH4t flvg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-22325-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-22325-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id f6-20020a170902ce8600b001d0187da0a0si4048866plg.292.2024.01.10.06.14.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Jan 2024 06:14:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-22325-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-22325-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-22325-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id E30CA285675 for ; Wed, 10 Jan 2024 14:14:30 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id ED9424A9AD; Wed, 10 Jan 2024 14:11:39 +0000 (UTC) Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A8E064A9A1; Wed, 10 Jan 2024 14:11:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=Huawei.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=huawei.com Received: from mail.maildlp.com (unknown [172.18.186.31]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4T98mS4mQzz6K97H; Wed, 10 Jan 2024 22:08:56 +0800 (CST) Received: from lhrpeml500005.china.huawei.com (unknown [7.191.163.240]) by mail.maildlp.com (Postfix) with ESMTPS id 90357140B2F; Wed, 10 Jan 2024 22:11:32 +0800 (CST) Received: from localhost (10.202.227.76) by lhrpeml500005.china.huawei.com (7.191.163.240) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 10 Jan 2024 14:11:31 +0000 Date: Wed, 10 Jan 2024 14:11:30 +0000 From: Jonathan Cameron To: Gregory Price CC: "Huang, Ying" , Srinivasulu Thanneeru , Srinivasulu Opensrc , "linux-cxl@vger.kernel.org" , "linux-mm@kvack.org" , "aneesh.kumar@linux.ibm.com" , "dan.j.williams@intel.com" , "mhocko@suse.com" , "tj@kernel.org" , "john@jagalactic.com" , Eishan Mirakhur , "Vinicius Tavares Petrucci" , Ravis OpenSrc , "linux-kernel@vger.kernel.org" , Johannes Weiner , "Wei Xu" , Hao Xiang , "Ho-Ren (Jack) Chuang" Subject: Re: [EXT] Re: [RFC PATCH v2 0/2] Node migration between memory tiers Message-ID: <20240110141130.0000035c@Huawei.com> In-Reply-To: References: <87fs00njft.fsf@yhuang6-desk2.ccr.corp.intel.com> <87edezc5l1.fsf@yhuang6-desk2.ccr.corp.intel.com> <87a5pmddl5.fsf@yhuang6-desk2.ccr.corp.intel.com> <87wmspbpma.fsf@yhuang6-desk2.ccr.corp.intel.com> <87o7dv897s.fsf@yhuang6-desk2.ccr.corp.intel.com> <20240109155049.00003f13@Huawei.com> Organization: Huawei Technologies Research and Development (UK) Ltd. X-Mailer: Claws Mail 4.1.0 (GTK 3.24.33; x86_64-w64-mingw32) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-ClientProxiedBy: lhrpeml100001.china.huawei.com (7.191.160.183) To lhrpeml500005.china.huawei.com (7.191.163.240) On Tue, 9 Jan 2024 12:59:19 -0500 Gregory Price wrote: > On Tue, Jan 09, 2024 at 03:50:49PM +0000, Jonathan Cameron wrote: > > On Tue, 09 Jan 2024 11:41:11 +0800 > > "Huang, Ying" wrote: > > > Gregory Price writes: > > > > On Thu, Jan 04, 2024 at 02:05:01PM +0800, Huang, Ying wrote: > > > It's possible to change the performance of a NUMA node changed, if we > > > hot-remove a memory device, then hot-add another different memory > > > device. It's hoped that the CDAT changes too. > > > > Not supported, but ACPI has _HMA methods to in theory allow changing > > HMAT values based on firmware notifications... So we 'could' make > > it work for HMAT based description. > > > > Ultimately my current thinking is we'll end up emulating CXL type3 > > devices (hiding topology complexity) and you can update CDAT but > > IIRC that is only meant to be for degraded situations - so if you > > want multiple performance regions, CDAT should describe them form the start. > > > > That was my thought. I don't think it's particularly *realistic* for > HMAT/CDAT values to change at runtime, but I can imagine a case where > it could be valuable. For now I'm thinking we might spit that CDAT info via a tracepoint if it happens, but given it's degraded perf only maybe we don't care. HMAT is more interesting because it may be used by a firmware first model to paper over some weird hardware being hotplugged, or for giggles a hypervisor moving memory around under the hood (think powering down whole DRAM controllers etc). Anyhow, that's highly speculative and whoever cares about it can make it work! :) > > > > > https://lore.kernel.org/linux-cxl/CAAYibXjZ0HSCqMrzXGv62cMLncS_81R3e1uNV5Fu4CPm0zAtYw@mail.gmail.com/ > > > > > > > > This group wants to enable passing CXL memory through to KVM/QEMU > > > > (i.e. host CXL expander memory passed through to the guest), and > > > > allow the guest to apply memory tiering. > > > > > > > > There are multiple issues with this, presently: > > > > > > > > 1. The QEMU CXL virtual device is not and probably never will be > > > > performant enough to be a commodity class virtualization. > > > > I'd flex that a bit - we will end up with a solution for virtualization but > > it isn't the emulation that is there today because it's not possible to > > emulate some of the topology in a peformant manner (interleaving with sub > > page granularity / interleaving at all (to a lesser degree)). There are > > ways to do better than we are today, but they start to look like > > software dissagregated memory setups (think lots of page faults in the host). > > > > Agreed, the emulated device as-is can't be the virtualization device, > but it doesn't mean it can't be the basis for it. > > My thought is, if you want to pass host CXL *memory* through to the > guest, you don't actually care to pass CXL *control* through to the > guest. That control lies pretty squarely with the host/hypervisor. > > So, at least in theory, you can just cut the type3 device out of the > QEMU configuration entirely and just pass it through as a distinct numa > node with specific hmat qualities. > > Barring that, if we must go through the type3 device, the question is > how difficult would it be to just make a stripped down type3 device > to provide the informational components, but hack off anything > topology/interleave related? Then you just do direct passthrough as you > described below. Not stripped down as such, just lock the decoders as if a firmware had configured it (in reality the config will be really really simple). The kernel stack handles that fine today. The only dynamic bit would be the DC related part. Not sure our lockdown support in the emulated device is complete (some of it is there but might have missed some registers). > > qemu/kvm would report errors if you tried to touch the naughty bits. Might do that a temporary step along way to enabling thing but given CXL assumes that the host firmware 'might' have configured everything and locked it (kernel may be booting out of CXL memory for instance) it should 'just work' without needing this. > The second question is... is that device "compliant" or does it need > super special handling from the kernel driver :D? If what i described > is not "compliant", then it's probably a bad idea, and KVM/QEMU should > just hide the CXL device entirely from the guest (for this use case) > and just pass the memory through as a numa node. Would need to be compliant or very nearly so - I can see we might advertise no interleave support even though not setting any of the interleave address bits is technically a spec violation. However, don't think we need to do that because of decoder locking. We advertise interleave options but don't allow current setting to be changed. If someone manually resets the bus they are on their own though :( (that will clear the lock registers as it's the same as removing power). > > Which gets us back to: The memory-tiering component needs a way to > place nodes in different tiers based on HMAT/CDAT/User Whim. All three > of those seem like totally valid ways to go about it. > > > > > > > > > 2. When passing memory through as an explicit NUMA node, but not as > > > > part of a CXL memory device, the nodes are lumped together in the > > > > DRAM tier. > > > > > > > > None of this has to do with firmware. > > > > > > > > Memory-type is an awful way of denoting membership of a tier, but we > > > > have HMAT information that can be passed through via QEMU: > > > > > > > > -object memory-backend-ram,size=4G,id=ram-node0 \ > > > > -object memory-backend-ram,size=4G,id=ram-node1 \ > > > > -numa node,nodeid=0,cpus=0-4,memdev=ram-node0 \ > > > > -numa node,initiator=0,nodeid=1,memdev=ram-node1 \ > > > > -numa hmat-lb,initiator=0,target=0,hierarchy=memory,data-type=access-latency,latency=10 \ > > > > -numa hmat-lb,initiator=0,target=0,hierarchy=memory,data-type=access-bandwidth,bandwidth=10485760 \ > > > > -numa hmat-lb,initiator=0,target=1,hierarchy=memory,data-type=access-latency,latency=20 \ > > > > -numa hmat-lb,initiator=0,target=1,hierarchy=memory,data-type=access-bandwidth,bandwidth=5242880 > > > > > > > > Not only would it be nice if we could change tier membership based on > > > > this data, it's realistically the only way to allow guests to accomplish > > > > memory tiering w/ KVM/QEMU and CXL memory passed through to the guest. > > > > This I fully agree with. There will be systems with a bunch of normal DDR with different > > access characteristics irrespective of CXL. + likely HMAT solutions will be used > > before we get anything more complex in place for CXL. > > > > Had not even considered this, but that's completely accurate as well. > > And more discretely: What of devices that don't provide HMAT/CDAT? That > isn't necessarily a violation of any standard. There probably could be > a release valve for us to still make those devices useful. I'd argue any such device needs some driver support. Release valve is they provide the info from that driver, just like the CDAT solution is doing. If they don't then meh, their system is borked so they'll will add it fairly quickly! > > The concern I have with not implementing a movement mechanism *at all* > is that a one-size-fits-all initial-placement heuristic feels gross > when we're, at least ideologically, moving toward "software defined memory". > > Personally I think the movement mechanism is a good idea that gets folks > where they're going sooner, and it doesn't hurt anything by existing. We > can change the initial placement mechanism too. I've no problem with a movement mechanism. Hopefully in the long run it never gets used though! Maybe in short term it's out of tree code. Jonathan > > > > ~Gregory