From: Shivam Kumar <shivam.kumar1@nutanix.com>
To: pbonzini@redhat.com, seanjc@google.com, maz@kernel.org,
james.morse@arm.com, borntraeger@linux.ibm.com, david@redhat.com
Cc: kvm@vger.kernel.org, Shaju Abraham <shaju.abraham@nutanix.com>,
Manish Mishra <manish.mishra@nutanix.com>,
Anurag Madnawat <anurag.madnawat@nutanix.com>
Subject: Re: [PATCH v6 1/5] KVM: Implement dirty quota-based throttling of vcpus
Date: Mon, 17 Oct 2022 10:58:46 +0530 [thread overview]
Message-ID: <1231809b-d214-ba10-784b-d2b015a69e09@nutanix.com> (raw)
In-Reply-To: <21fce8d9-489f-0d7e-b1a6-5598f92453fe@nutanix.com>
On 10/10/22 11:11 am, Shivam Kumar wrote:
>
>
> On 15/09/22 3:40 pm, Shivam Kumar wrote:
>> Define variables to track and throttle memory dirtying for every vcpu.
>>
>> dirty_count: Number of pages the vcpu has dirtied since its creation,
>> while dirty logging is enabled.
>> dirty_quota: Number of pages the vcpu is allowed to dirty. To dirty
>> more, it needs to request more quota by exiting to
>> userspace.
>>
>> Implement the flow for throttling based on dirty quota.
>>
>> i) Increment dirty_count for the vcpu whenever it dirties a page.
>> ii) Exit to userspace whenever the dirty quota is exhausted (i.e. dirty
>> count equals/exceeds dirty quota) to request more dirty quota.
>>
>> Suggested-by: Shaju Abraham <shaju.abraham@nutanix.com>
>> Suggested-by: Manish Mishra <manish.mishra@nutanix.com>
>> Co-developed-by: Anurag Madnawat <anurag.madnawat@nutanix.com>
>> Signed-off-by: Anurag Madnawat <anurag.madnawat@nutanix.com>
>> Signed-off-by: Shivam Kumar <shivam.kumar1@nutanix.com>
>> ---
>> Documentation/virt/kvm/api.rst | 35 ++++++++++++++++++++++++++++++++++
>> include/linux/kvm_host.h | 20 ++++++++++++++++++-
>> include/linux/kvm_types.h | 1 +
>> include/uapi/linux/kvm.h | 12 ++++++++++++
>> virt/kvm/kvm_main.c | 26 ++++++++++++++++++++++---
>> 5 files changed, 90 insertions(+), 4 deletions(-)
>>
>> diff --git a/Documentation/virt/kvm/api.rst
>> b/Documentation/virt/kvm/api.rst
>> index abd7c32126ce..97030a6a35b4 100644
>> --- a/Documentation/virt/kvm/api.rst
>> +++ b/Documentation/virt/kvm/api.rst
>> @@ -6614,6 +6614,26 @@ array field represents return values. The
>> userspace should update the return
>> values of SBI call before resuming the VCPU. For more details on
>> RISC-V SBI
>> spec refer, https://github.com/riscv/riscv-sbi-doc.
>> +::
>> +
>> + /* KVM_EXIT_DIRTY_QUOTA_EXHAUSTED */
>> + struct {
>> + __u64 count;
>> + __u64 quota;
>> + } dirty_quota_exit;
>> +
>> +If exit reason is KVM_EXIT_DIRTY_QUOTA_EXHAUSTED, it indicates that
>> the VCPU has
>> +exhausted its dirty quota. The 'dirty_quota_exit' member of kvm_run
>> structure
>> +makes the following information available to the userspace:
>> + count: the current count of pages dirtied by the VCPU, can be
>> + skewed based on the size of the pages accessed by each vCPU.
>> + quota: the observed dirty quota just before the exit to userspace.
>> +
>> +The userspace can design a strategy to allocate the overall scope of
>> dirtying
>> +for the VM among the vcpus. Based on the strategy and the current
>> state of dirty
>> +quota throttling, the userspace can make a decision to either update
>> (increase)
>> +the quota or to put the VCPU to sleep for some time.
>> +
>> ::
>> /* KVM_EXIT_NOTIFY */
>> @@ -6668,6 +6688,21 @@ values in kvm_run even if the corresponding bit
>> in kvm_dirty_regs is not set.
>> ::
>> + /*
>> + * Number of pages the vCPU is allowed to have dirtied over its
>> entire
>> + * lifetime. KVM_RUN exits with KVM_EXIT_DIRTY_QUOTA_EXHAUSTED
>> if the quota
>> + * is reached/exceeded.
>> + */
>> + __u64 dirty_quota;
>> +
>> +Please note that enforcing the quota is best effort, as the guest may
>> dirty
>> +multiple pages before KVM can recheck the quota. However, unless KVM
>> is using
>> +a hardware-based dirty ring buffer, e.g. Intel's Page Modification
>> Logging,
>> +KVM will detect quota exhaustion within a handful of dirtied pages.
>> If a
>> +hardware ring buffer is used, the overrun is bounded by the size of
>> the buffer
>> +(512 entries for PML).
>> +
>> +::
>> };
>> diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h
>> index f4519d3689e1..9acb28635d94 100644
>> --- a/include/linux/kvm_host.h
>> +++ b/include/linux/kvm_host.h
>> @@ -151,12 +151,13 @@ static inline bool is_error_page(struct page *page)
>> #define KVM_REQUEST_NO_ACTION BIT(10)
>> /*
>> * Architecture-independent vcpu->requests bit members
>> - * Bits 4-7 are reserved for more arch-independent bits.
>> + * Bits 5-7 are reserved for more arch-independent bits.
>> */
>> #define KVM_REQ_TLB_FLUSH (0 | KVM_REQUEST_WAIT |
>> KVM_REQUEST_NO_WAKEUP)
>> #define KVM_REQ_VM_DEAD (1 | KVM_REQUEST_WAIT |
>> KVM_REQUEST_NO_WAKEUP)
>> #define KVM_REQ_UNBLOCK 2
>> #define KVM_REQ_UNHALT 3
>> +#define KVM_REQ_DIRTY_QUOTA_EXIT 4
>> #define KVM_REQUEST_ARCH_BASE 8
>> /*
>> @@ -380,6 +381,8 @@ struct kvm_vcpu {
>> */
>> struct kvm_memory_slot *last_used_slot;
>> u64 last_used_slot_gen;
>> +
>> + u64 dirty_quota;
>> };
>> /*
>> @@ -542,6 +545,21 @@ static inline int
>> kvm_vcpu_exiting_guest_mode(struct kvm_vcpu *vcpu)
>> return cmpxchg(&vcpu->mode, IN_GUEST_MODE, EXITING_GUEST_MODE);
>> }
>> +static inline int kvm_vcpu_check_dirty_quota(struct kvm_vcpu *vcpu)
>> +{
>> + struct kvm_run *run = vcpu->run;
>> + u64 dirty_quota = READ_ONCE(run->dirty_quota);
>> + u64 pages_dirtied = vcpu->stat.generic.pages_dirtied;
>> +
>> + if (!dirty_quota || (pages_dirtied < dirty_quota))
>> + return 1;
>> +
>> + run->exit_reason = KVM_EXIT_DIRTY_QUOTA_EXHAUSTED;
>> + run->dirty_quota_exit.count = pages_dirtied;
>> + run->dirty_quota_exit.quota = dirty_quota;
>> + return 0;
>> +}
>> +
>> /*
>> * Some of the bitops functions do not support too long bitmaps.
>> * This number must be determined not to exceed such limits.
>> diff --git a/include/linux/kvm_types.h b/include/linux/kvm_types.h
>> index 3ca3db020e0e..263a588f3cd3 100644
>> --- a/include/linux/kvm_types.h
>> +++ b/include/linux/kvm_types.h
>> @@ -118,6 +118,7 @@ struct kvm_vcpu_stat_generic {
>> u64 halt_poll_fail_hist[HALT_POLL_HIST_COUNT];
>> u64 halt_wait_hist[HALT_POLL_HIST_COUNT];
>> u64 blocking;
>> + u64 pages_dirtied;
> I am reworking the QEMU patches and I am not sure how I can access the
> pages_dirtied info from the userspace side when the migration starts, i.e.
> without a dirty quota exit.
>
> I need this info to initialise the dirty quota. This is what I am looking
> to do on the userspace side at the start of dirty quota migration:
> dirty_quota = pages_dirtied + some initial quota
>
> Hoping if you could help, Sean. Thanks in advance.
I think I can set dirty_quota initially to 1 and let the vpcu exit with
exit reason KVM_EXIT_DIRTY_QUOTA_EXHAUSTED. Then, I can set the quota.
next prev parent reply other threads:[~2022-10-17 5:29 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-15 10:10 [PATCH v6 0/5] KVM: Dirty quota-based throttling Shivam Kumar
2022-09-15 10:10 ` [PATCH v6 1/5] KVM: Implement dirty quota-based throttling of vcpus Shivam Kumar
2022-09-15 13:21 ` Christian Borntraeger
2022-09-15 14:34 ` Christian Borntraeger
2022-10-07 18:18 ` Sean Christopherson
2022-10-09 18:36 ` Shivam Kumar
2022-10-10 6:12 ` Christian Borntraeger
2022-10-07 19:08 ` Sean Christopherson
2022-10-07 19:20 ` Sean Christopherson
2022-10-09 18:49 ` Shivam Kumar
2022-10-10 16:09 ` Sean Christopherson
2022-10-09 19:30 ` Shivam Kumar
2022-10-10 5:41 ` Shivam Kumar
2022-10-17 5:28 ` Shivam Kumar [this message]
2022-10-19 16:01 ` Sean Christopherson
2022-09-15 10:10 ` [PATCH v6 2/5] KVM: x86: Dirty " Shivam Kumar
2022-10-07 19:30 ` Sean Christopherson
2022-10-09 19:05 ` Shivam Kumar
2022-10-18 17:43 ` Shivam Kumar
2022-10-19 15:42 ` Sean Christopherson
2022-10-09 19:17 ` Shivam Kumar
2022-09-15 10:10 ` [PATCH v6 3/5] KVM: arm64: " Shivam Kumar
2022-09-15 10:10 ` [PATCH v6 4/5] KVM: s390x: " Shivam Kumar
2022-09-15 13:24 ` Christian Borntraeger
2022-09-15 10:10 ` [PATCH v6 5/5] KVM: selftests: Add selftests for dirty quota throttling Shivam Kumar
2022-10-07 18:29 ` Sean Christopherson
2022-10-09 19:26 ` Shivam Kumar
2022-10-10 15:47 ` Sean Christopherson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1231809b-d214-ba10-784b-d2b015a69e09@nutanix.com \
--to=shivam.kumar1@nutanix.com \
--cc=anurag.madnawat@nutanix.com \
--cc=borntraeger@linux.ibm.com \
--cc=david@redhat.com \
--cc=james.morse@arm.com \
--cc=kvm@vger.kernel.org \
--cc=manish.mishra@nutanix.com \
--cc=maz@kernel.org \
--cc=pbonzini@redhat.com \
--cc=seanjc@google.com \
--cc=shaju.abraham@nutanix.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).