From patchwork Mon Sep 16 16:57:40 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Shivank Garg X-Patchwork-Id: 13805650 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 62B16C3ABA2 for ; Mon, 16 Sep 2024 16:58:25 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B74C56B0088; Mon, 16 Sep 2024 12:58:24 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B257A6B008A; Mon, 16 Sep 2024 12:58:24 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 99E4D6B008C; Mon, 16 Sep 2024 12:58:24 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 7DBAD6B0088 for ; Mon, 16 Sep 2024 12:58:24 -0400 (EDT) Received: from smtpin22.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 29E6D14067C for ; Mon, 16 Sep 2024 16:58:24 +0000 (UTC) X-FDA: 82571209728.22.0BBBFE8 Received: from NAM04-DM6-obe.outbound.protection.outlook.com (mail-dm6nam04on2049.outbound.protection.outlook.com [40.107.102.49]) by imf19.hostedemail.com (Postfix) with ESMTP id 22BB91A0004 for ; Mon, 16 Sep 2024 16:58:20 +0000 (UTC) Authentication-Results: imf19.hostedemail.com; dkim=pass header.d=amd.com header.s=selector1 header.b="AMGHk/96"; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=quarantine) header.from=amd.com; spf=pass (imf19.hostedemail.com: domain of shivankg@amd.com designates 40.107.102.49 as permitted sender) smtp.mailfrom=shivankg@amd.com ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1726505812; a=rsa-sha256; cv=pass; b=qbFl2P7DINN49g5w3KA962YrjkfbBLTIHKyHlbHnWSoAKsdWYJyZLRdTL+1rnuTRTD6yij SYEwExCkRfYARGcM/7WJoY0Xatq/G1kAyr6ftOVOvKapvpsennMpq0c7EJgPU0JCj1dwav Xn8VXLxqyITv1lJFUN2OxndlvLvFaNM= ARC-Authentication-Results: i=2; imf19.hostedemail.com; dkim=pass header.d=amd.com header.s=selector1 header.b="AMGHk/96"; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=quarantine) header.from=amd.com; spf=pass (imf19.hostedemail.com: domain of shivankg@amd.com designates 40.107.102.49 as permitted sender) smtp.mailfrom=shivankg@amd.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1726505812; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=ubS2tFOUtJAvpXXDPXQi0C6ol4vzx/+49QbQRu3P0nM=; b=5Eeg2DGKZBM+5LemyM3OFnCBhsHwUB1V3Y7lHtFdBjDBVKbIhXX9atSq0oR+ydbSnHFFZM zaa5TCVUcADOv2XCr4LHt6S+VVLaEN9LfQ8161r/0Gn8KUTCxlDbQZ0y27CYwKoqFTsKSq vhzQSNmuczMpSiBdvD01Q7t7UCQFLxY= ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=j/i/VQTps2qgEHlS6j/nRB+IQI53QLK3X/c1Y6AImMbaAgbcDljKDw6DYHBWFWTxkhrMZagTz8JUr+1MUnPIANTeL2htlhso6J/FCYQogbcp9NqD8I+wui4Fe2LSWY/tPfmR/t4x8NXuB/qBRHT4W+Um0Ryk1hJi8wmo9YG02M0Yye8Nxu5nKqhcryRUiYcRL9heKWYueLYTZNTQRUgS0z3dv2DG8uAHZH1qtJy6Rfgz9ZhoEs2rjHy8EwbvpygfuSkoO6Rp47KAVj/G1k1Khvu493ENhqMQ401kiG+HxKLTz5eS5ySXmkZ5aWpNn1bwTx+c06aCssQ9BkrgUOS7Ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ubS2tFOUtJAvpXXDPXQi0C6ol4vzx/+49QbQRu3P0nM=; b=WQtDE7y4C2Z4VohUhThqpRFAOpIVdXbq765mnjs77J1+lr4wBW0L7j4/rzNG0U9/2Lxztbnu+wuEa0uw8xpi41CLQcTWBQ4P6OmWXIyrBHar1hwFbZ4eVYmtY+auF+Qrj3MdE3aiaJmXHybpxKsThNVWacwrwxsajhGpI+4OqjKv27azusgYujUJ6pBzZVfmT79wwybpMozscyV2r0hiJy+MXFcla26txlwDQzg9U5O+H2UpPot5+M5AVP/TZK2BtZBHAwzNn1rWviPMtwJpDGnYB6OJDlOjjB0IN+G7qJYf96YLChxEeo/fBlUqy04OnPZESZogPSycHvyVLKubig== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=redhat.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ubS2tFOUtJAvpXXDPXQi0C6ol4vzx/+49QbQRu3P0nM=; b=AMGHk/96OeFDhygdQcxsuIefcXH6EkjKV4KU5Y+zokBKX6aTFn588cbMiBl/p64rtuXzdhH55Vz5KkHCO3orL2NbPmLUjj2r1LpcrML9OkmgQzhShpK9b22GHTi4sLHn9ksiagGdxh0Q/GFk8uojFiUo+CkllDbgz4V5W1QKCg8= Received: from SA0PR11CA0112.namprd11.prod.outlook.com (2603:10b6:806:d1::27) by PH0PR12MB5606.namprd12.prod.outlook.com (2603:10b6:510:141::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7962.24; Mon, 16 Sep 2024 16:58:10 +0000 Received: from SN1PEPF000252A1.namprd05.prod.outlook.com (2603:10b6:806:d1:cafe::e4) by SA0PR11CA0112.outlook.office365.com (2603:10b6:806:d1::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7939.30 via Frontend Transport; Mon, 16 Sep 2024 16:58:10 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by SN1PEPF000252A1.mail.protection.outlook.com (10.167.242.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7918.13 via Frontend Transport; Mon, 16 Sep 2024 16:58:10 +0000 Received: from kaveri.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Mon, 16 Sep 2024 11:58:05 -0500 From: Shivank Garg To: , , , CC: , , , , , , , , , , , , , Subject: [PATCH RFC 0/3] Add NUMA mempolicy support for KVM guest_memfd Date: Mon, 16 Sep 2024 16:57:40 +0000 Message-ID: <20240916165743.201087-1-shivankg@amd.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF000252A1:EE_|PH0PR12MB5606:EE_ X-MS-Office365-Filtering-Correlation-Id: 42eb57f6-d429-49c8-4d87-08dcd670beca X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|7416014|36860700013|82310400026; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(36860700013)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Sep 2024 16:58:10.4440 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 42eb57f6-d429-49c8-4d87-08dcd670beca X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF000252A1.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR12MB5606 X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: 22BB91A0004 X-Stat-Signature: zw7ojnu7h6qzu5k6z4p6g4gf8y1tsn1w X-Rspam-User: X-HE-Tag: 1726505900-71570 X-HE-Meta: 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 0CjTT8yb X5YbrnHPp8QcvtXZzQ4dIXdPFxMuuIaCZVdFzy/ziPkA+bkBO7iGddhVbybznhcJWbM7Cd6MHbDJ+Ngx8/iQovYy+YpTR3VwYF8wz4kP3EvdTtpCstJ0AvaO/BobZDwg7RPGgBVSqD4Gp1Xk20Q2jT/13HhHyGAPZVmpBEJHmESjLzzTpJa1sQByQ8FeglfwooZpVidu57ZsKdN9T1OIsuqWIk58HXaSi6uFCmKpK6wbK4CDgvQw/Nu+lvfJud31ZUmiF1CCgMcgJ35iHsWM4yIsgDIM4w7ZNDeJNnaX9+yaunQnTlKthFlC0s1RmX0Hs08ngoz7LSZ8YnxniIKStnIIJzxpvXOylTHu5LuN0/SYExlzEQZHV6OzTZAm2AGpQpOOVTGMA1bQJbmSfCSodr2CmulaSyCkftaoGMPTT0qmj3g8/CvcLHw2PczxA5Mz2gdk8olOMCMveIBRMt2tJPxaKqVdY0I76PFNli5pSffH3VX0= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: The current implementation of KVM guest-memfd does not honor the settings provided by VMM. While mbind() can be used for NUMA policy support in userspace applications, it is not functional for guest-memfd as the memory is not mapped to userspace. This patch-series adds support to specify NUMA memory policy for guests with private guest-memfd memory backend. KVM guest-memfd support for memory backend is already available in QEMU RAMBlock. However, the NUMA support was missing. This cause memory allocation from guest to randomly allocate on host NUMA nodes even when passing policy and host-nodes in the QEMU command. It ensures that VMM provided NUMA policy is adhered. This feature is particularly useful for SEV-SNP guests as they require guest_memfd memory backend for allocations. Workloads with high memory- locality are likely to benefit with this change. Users can provide a policy mode such as default, bind, interleave, or preferred along with a list of node IDs from the host machine. To try this patch-series, build the custom QEMU with NUMA supported KVM guest-memfd: QEMU tree- https://github.com/AMDESE/qemu/tree/NUMA_guest_memfd For instance, to run a SEV-SNP guest bound to NUMA Node 0 of the host, the corresponding QEMU command would be: $ qemu-system-x86_64 \ -enable-kvm \ ... -machine memory-encryption=sev0,vmport=off \ -object sev-snp-guest,id=sev0,cbitpos=51,reduced-phys-bits=1 \ -numa node,nodeid=0,memdev=ram0,cpus=0-15 \ -object memory-backend-memfd,id=ram0,policy=bind,host-nodes=0,size=1024M,share=true,prealloc=false Shivansh Dhiman (3): KVM: guest_memfd: Extend creation API to support NUMA mempolicy mm: add mempolicy support to the filemap layer KVM: guest_memfd: Enforce NUMA mempolicy if available Documentation/virt/kvm/api.rst | 13 ++++++++- include/linux/mempolicy.h | 4 +++ include/linux/pagemap.h | 30 +++++++++++++++++++ include/uapi/linux/kvm.h | 5 +++- mm/filemap.c | 30 +++++++++++++++---- mm/mempolicy.c | 53 ++++++++++++++++++++++++++++++++++ tools/include/uapi/linux/kvm.h | 5 +++- virt/kvm/guest_memfd.c | 28 ++++++++++++++---- virt/kvm/kvm_mm.h | 3 ++ 9 files changed, 158 insertions(+), 13 deletions(-)