cdcf766d0b
It is not safe to pretend that emulated NVDIMM supports persistence while backend actually failed to enable it and used non-persistent mapping as fall back. Instead of falling-back, QEMU should be more strict and error out with clear message that it's not supported. So if user asks for persistence (pmem=on), they should store backing file on NVDIMM. Signed-off-by: Igor Mammedov <imammedo@redhat.com> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Message-Id: <20210111203332.740815-1-imammedo@redhat.com> Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
307 lines
9.1 KiB
C
307 lines
9.1 KiB
C
/*
|
|
* Support for RAM backed by mmaped host memory.
|
|
*
|
|
* Copyright (c) 2015 Red Hat, Inc.
|
|
*
|
|
* Authors:
|
|
* Michael S. Tsirkin <mst@redhat.com>
|
|
*
|
|
* This work is licensed under the terms of the GNU GPL, version 2 or
|
|
* later. See the COPYING file in the top-level directory.
|
|
*/
|
|
|
|
#ifdef CONFIG_LINUX
|
|
#include <linux/mman.h>
|
|
#else /* !CONFIG_LINUX */
|
|
#define MAP_SYNC 0x0
|
|
#define MAP_SHARED_VALIDATE 0x0
|
|
#endif /* CONFIG_LINUX */
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "qemu/mmap-alloc.h"
|
|
#include "qemu/host-utils.h"
|
|
#include "qemu/cutils.h"
|
|
#include "qemu/error-report.h"
|
|
|
|
#define HUGETLBFS_MAGIC 0x958458f6
|
|
|
|
#ifdef CONFIG_LINUX
|
|
#include <sys/vfs.h>
|
|
#endif
|
|
|
|
size_t qemu_fd_getpagesize(int fd)
|
|
{
|
|
#ifdef CONFIG_LINUX
|
|
struct statfs fs;
|
|
int ret;
|
|
|
|
if (fd != -1) {
|
|
do {
|
|
ret = fstatfs(fd, &fs);
|
|
} while (ret != 0 && errno == EINTR);
|
|
|
|
if (ret == 0 && fs.f_type == HUGETLBFS_MAGIC) {
|
|
return fs.f_bsize;
|
|
}
|
|
}
|
|
#ifdef __sparc__
|
|
/* SPARC Linux needs greater alignment than the pagesize */
|
|
return QEMU_VMALLOC_ALIGN;
|
|
#endif
|
|
#endif
|
|
|
|
return qemu_real_host_page_size;
|
|
}
|
|
|
|
size_t qemu_mempath_getpagesize(const char *mem_path)
|
|
{
|
|
#ifdef CONFIG_LINUX
|
|
struct statfs fs;
|
|
int ret;
|
|
|
|
if (mem_path) {
|
|
do {
|
|
ret = statfs(mem_path, &fs);
|
|
} while (ret != 0 && errno == EINTR);
|
|
|
|
if (ret != 0) {
|
|
fprintf(stderr, "Couldn't statfs() memory path: %s\n",
|
|
strerror(errno));
|
|
exit(1);
|
|
}
|
|
|
|
if (fs.f_type == HUGETLBFS_MAGIC) {
|
|
/* It's hugepage, return the huge page size */
|
|
return fs.f_bsize;
|
|
}
|
|
}
|
|
#ifdef __sparc__
|
|
/* SPARC Linux needs greater alignment than the pagesize */
|
|
return QEMU_VMALLOC_ALIGN;
|
|
#endif
|
|
#endif
|
|
|
|
return qemu_real_host_page_size;
|
|
}
|
|
|
|
#define OVERCOMMIT_MEMORY_PATH "/proc/sys/vm/overcommit_memory"
|
|
static bool map_noreserve_effective(int fd, uint32_t qemu_map_flags)
|
|
{
|
|
#if defined(__linux__)
|
|
const bool readonly = qemu_map_flags & QEMU_MAP_READONLY;
|
|
const bool shared = qemu_map_flags & QEMU_MAP_SHARED;
|
|
gchar *content = NULL;
|
|
const char *endptr;
|
|
unsigned int tmp;
|
|
|
|
/*
|
|
* hugeltb accounting is different than ordinary swap reservation:
|
|
* a) Hugetlb pages from the pool are reserved for both private and
|
|
* shared mappings. For shared mappings, all mappers have to specify
|
|
* MAP_NORESERVE.
|
|
* b) MAP_NORESERVE is not affected by /proc/sys/vm/overcommit_memory.
|
|
*/
|
|
if (qemu_fd_getpagesize(fd) != qemu_real_host_page_size) {
|
|
return true;
|
|
}
|
|
|
|
/*
|
|
* Accountable mappings in the kernel that can be affected by MAP_NORESEVE
|
|
* are private writable mappings (see mm/mmap.c:accountable_mapping() in
|
|
* Linux). For all shared or readonly mappings, MAP_NORESERVE is always
|
|
* implicitly active -- no reservation; this includes shmem. The only
|
|
* exception is shared anonymous memory, it is accounted like private
|
|
* anonymous memory.
|
|
*/
|
|
if (readonly || (shared && fd >= 0)) {
|
|
return true;
|
|
}
|
|
|
|
/*
|
|
* MAP_NORESERVE is globally ignored for applicable !hugetlb mappings when
|
|
* memory overcommit is set to "never". Sparse memory regions aren't really
|
|
* possible in this system configuration.
|
|
*
|
|
* Bail out now instead of silently committing way more memory than
|
|
* currently desired by the user.
|
|
*/
|
|
if (g_file_get_contents(OVERCOMMIT_MEMORY_PATH, &content, NULL, NULL) &&
|
|
!qemu_strtoui(content, &endptr, 0, &tmp) &&
|
|
(!endptr || *endptr == '\n')) {
|
|
if (tmp == 2) {
|
|
error_report("Skipping reservation of swap space is not supported:"
|
|
" \"" OVERCOMMIT_MEMORY_PATH "\" is \"2\"");
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
/* this interface has been around since Linux 2.6 */
|
|
error_report("Skipping reservation of swap space is not supported:"
|
|
" Could not read: \"" OVERCOMMIT_MEMORY_PATH "\"");
|
|
return false;
|
|
#endif
|
|
/*
|
|
* E.g., FreeBSD used to define MAP_NORESERVE, never implemented it,
|
|
* and removed it a while ago.
|
|
*/
|
|
error_report("Skipping reservation of swap space is not supported");
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* Reserve a new memory region of the requested size to be used for mapping
|
|
* from the given fd (if any).
|
|
*/
|
|
static void *mmap_reserve(size_t size, int fd)
|
|
{
|
|
int flags = MAP_PRIVATE;
|
|
|
|
#if defined(__powerpc64__) && defined(__linux__)
|
|
/*
|
|
* On ppc64 mappings in the same segment (aka slice) must share the same
|
|
* page size. Since we will be re-allocating part of this segment
|
|
* from the supplied fd, we should make sure to use the same page size, to
|
|
* this end we mmap the supplied fd. In this case, set MAP_NORESERVE to
|
|
* avoid allocating backing store memory.
|
|
* We do this unless we are using the system page size, in which case
|
|
* anonymous memory is OK.
|
|
*/
|
|
if (fd == -1 || qemu_fd_getpagesize(fd) == qemu_real_host_page_size) {
|
|
fd = -1;
|
|
flags |= MAP_ANONYMOUS;
|
|
} else {
|
|
flags |= MAP_NORESERVE;
|
|
}
|
|
#else
|
|
fd = -1;
|
|
flags |= MAP_ANONYMOUS;
|
|
#endif
|
|
|
|
return mmap(0, size, PROT_NONE, flags, fd, 0);
|
|
}
|
|
|
|
/*
|
|
* Activate memory in a reserved region from the given fd (if any), to make
|
|
* it accessible.
|
|
*/
|
|
static void *mmap_activate(void *ptr, size_t size, int fd,
|
|
uint32_t qemu_map_flags, off_t map_offset)
|
|
{
|
|
const bool noreserve = qemu_map_flags & QEMU_MAP_NORESERVE;
|
|
const bool readonly = qemu_map_flags & QEMU_MAP_READONLY;
|
|
const bool shared = qemu_map_flags & QEMU_MAP_SHARED;
|
|
const bool sync = qemu_map_flags & QEMU_MAP_SYNC;
|
|
const int prot = PROT_READ | (readonly ? 0 : PROT_WRITE);
|
|
int map_sync_flags = 0;
|
|
int flags = MAP_FIXED;
|
|
void *activated_ptr;
|
|
|
|
if (noreserve && !map_noreserve_effective(fd, qemu_map_flags)) {
|
|
return MAP_FAILED;
|
|
}
|
|
|
|
flags |= fd == -1 ? MAP_ANONYMOUS : 0;
|
|
flags |= shared ? MAP_SHARED : MAP_PRIVATE;
|
|
flags |= noreserve ? MAP_NORESERVE : 0;
|
|
if (shared && sync) {
|
|
map_sync_flags = MAP_SYNC | MAP_SHARED_VALIDATE;
|
|
}
|
|
|
|
activated_ptr = mmap(ptr, size, prot, flags | map_sync_flags, fd,
|
|
map_offset);
|
|
if (activated_ptr == MAP_FAILED && map_sync_flags) {
|
|
if (errno == ENOTSUP) {
|
|
char *proc_link = g_strdup_printf("/proc/self/fd/%d", fd);
|
|
char *file_name = g_malloc0(PATH_MAX);
|
|
int len = readlink(proc_link, file_name, PATH_MAX - 1);
|
|
|
|
if (len < 0) {
|
|
len = 0;
|
|
}
|
|
file_name[len] = '\0';
|
|
fprintf(stderr, "Warning: requesting persistence across crashes "
|
|
"for backend file %s failed. Proceeding without "
|
|
"persistence, data might become corrupted in case of host "
|
|
"crash.\n", file_name);
|
|
g_free(proc_link);
|
|
g_free(file_name);
|
|
warn_report("Using non DAX backing file with 'pmem=on' option"
|
|
" is deprecated");
|
|
}
|
|
/*
|
|
* If mmap failed with MAP_SHARED_VALIDATE | MAP_SYNC, we will try
|
|
* again without these flags to handle backwards compatibility.
|
|
*/
|
|
activated_ptr = mmap(ptr, size, prot, flags, fd, map_offset);
|
|
}
|
|
return activated_ptr;
|
|
}
|
|
|
|
static inline size_t mmap_guard_pagesize(int fd)
|
|
{
|
|
#if defined(__powerpc64__) && defined(__linux__)
|
|
/* Mappings in the same segment must share the same page size */
|
|
return qemu_fd_getpagesize(fd);
|
|
#else
|
|
return qemu_real_host_page_size;
|
|
#endif
|
|
}
|
|
|
|
void *qemu_ram_mmap(int fd,
|
|
size_t size,
|
|
size_t align,
|
|
uint32_t qemu_map_flags,
|
|
off_t map_offset)
|
|
{
|
|
const size_t guard_pagesize = mmap_guard_pagesize(fd);
|
|
size_t offset, total;
|
|
void *ptr, *guardptr;
|
|
|
|
/*
|
|
* Note: this always allocates at least one extra page of virtual address
|
|
* space, even if size is already aligned.
|
|
*/
|
|
total = size + align;
|
|
|
|
guardptr = mmap_reserve(total, fd);
|
|
if (guardptr == MAP_FAILED) {
|
|
return MAP_FAILED;
|
|
}
|
|
|
|
assert(is_power_of_2(align));
|
|
/* Always align to host page size */
|
|
assert(align >= guard_pagesize);
|
|
|
|
offset = QEMU_ALIGN_UP((uintptr_t)guardptr, align) - (uintptr_t)guardptr;
|
|
|
|
ptr = mmap_activate(guardptr + offset, size, fd, qemu_map_flags,
|
|
map_offset);
|
|
if (ptr == MAP_FAILED) {
|
|
munmap(guardptr, total);
|
|
return MAP_FAILED;
|
|
}
|
|
|
|
if (offset > 0) {
|
|
munmap(guardptr, offset);
|
|
}
|
|
|
|
/*
|
|
* Leave a single PROT_NONE page allocated after the RAM block, to serve as
|
|
* a guard page guarding against potential buffer overflows.
|
|
*/
|
|
total -= offset;
|
|
if (total > size + guard_pagesize) {
|
|
munmap(ptr + size + guard_pagesize, total - size - guard_pagesize);
|
|
}
|
|
|
|
return ptr;
|
|
}
|
|
|
|
void qemu_ram_munmap(int fd, void *ptr, size_t size)
|
|
{
|
|
if (ptr) {
|
|
/* Unmap both the RAM block and the guard page */
|
|
munmap(ptr, size + mmap_guard_pagesize(fd));
|
|
}
|
|
}
|