From: Shivam Kumar <shivam.kumar1@nutanix.com>
To: Sean Christopherson <seanjc@google.com>
Cc: pbonzini@redhat.com, kvm@vger.kernel.org,
Anurag Madnawat <anurag.madnawat@nutanix.com>,
Shaju Abraham <shaju.abraham@nutanix.com>,
Manish Mishra <manish.mishra@nutanix.com>
Subject: Re: [PATCH 3/6] Add KVM_CAP_DIRTY_QUOTA_MIGRATION and handle vCPU page faults.
Date: Thu, 25 Nov 2021 14:13:36 +0530 [thread overview]
Message-ID: <d9129cda-ebd9-aec3-3f04-bb989c509ac1@nutanix.com> (raw)
In-Reply-To: <2a329e03-1b44-1cb3-f00c-1ee138bb74de@nutanix.com>
On 20/11/21 1:51 am, Shivam Kumar wrote:
>
> On 20/11/21 1:36 am, Sean Christopherson wrote:
>> On Sat, Nov 20, 2021, Shivam Kumar wrote:
>>> On 18/11/21 11:27 pm, Sean Christopherson wrote:
>>>>> + return -EINVAL;
>>>> Probably more idiomatic to return 0 if the desired value is the
>>>> current value.
>>> Keeping the case in mind when the userspace is trying to enable it
>>> while the
>>> migration is already going on(which shouldn't happen), we are returning
>>> -EINVAL. Please let me know if 0 still makes more sense.
>> If the semantics are not "enable/disable", but rather "(re)set the
>> quota",
>> then it makes sense to allow changing the quota arbitrarily.
> I agree that the semantics are not apt. Will modify it. Thanks.
>>
>>>>> + mutex_lock(&kvm->lock);
>>>>> + kvm->dirty_quota_migration_enabled = enabled;
>>>> Needs to check vCPU creation.
>>> In our current implementation, we are using the
>>> KVM_CAP_DIRTY_QUOTA_MIGRATION ioctl to start dirty logging (through
>>> dirty
>>> counter) on the kernel side. This ioctl is called each time a new
>>> migration
>>> starts and ends.
>> Ah, and from the cover letter discussion, you want the count and
>> quota to be
>> reset when a new migration occurs. That makes sense.
>>
>> Actually, if we go the route of using kvm_run to report and update
>> the count/quota,
>> we don't even need a capability. Userspace can signal each vCPU to
>> induce an exit
>> to userspace, e.g. at the start of migration, then set the desired
>> quota/count in
>> vcpu->kvm_run and stuff exit_reason so that KVM updates the
>> quota/count on the
>> subsequent KVM_RUN. No locking or requests needed, and userspace can
>> reset the
>> count at will, it just requires a signal.
>>
>> It's a little weird to overload exit_reason like that, but if that's
>> a sticking
>> point we could add a flag in kvm_run somewhere. Requiring an exit to
>> userspace
>> at the start of migration doesn't seem too onerous.
> Yes, this path looks flaw-free. We will explore the complexity and how
> we can simplify its implementation.
Is it okay to define the per-vcpu dirty quota and dirty count in the
kvm_run structure itself? It can save space and reduce the complexity of
the implemenation by large margin.
next prev parent reply other threads:[~2021-11-25 8:45 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-11-14 14:57 [PATCH 0/6] KVM: Dirty Quota-Based VM Live Migration Auto-Converge Shivam Kumar
2021-11-14 14:57 ` [PATCH 1/6] Define data structures for dirty quota migration Shivam Kumar
2021-11-14 14:57 ` [PATCH 2/6] Init dirty quota flag and allocate memory for vCPUdqctx Shivam Kumar
2021-11-14 14:57 ` [PATCH 3/6] Add KVM_CAP_DIRTY_QUOTA_MIGRATION and handle vCPU page faults Shivam Kumar
2021-11-18 17:57 ` Sean Christopherson
2021-11-19 20:03 ` Shivam Kumar
[not found] ` <02b8fa86-a86b-969e-2137-1953639cb6d2@nutanix.com>
[not found] ` <YZgD0D4536s2DMem@google.com>
2021-11-19 20:21 ` Shivam Kumar
2021-11-25 8:43 ` Shivam Kumar [this message]
2021-12-01 17:22 ` Sean Christopherson
2021-11-14 14:57 ` [PATCH 4/6] Increment dirty counter for vmexit due to page write fault Shivam Kumar
2021-11-18 17:48 ` Sean Christopherson
2021-11-19 19:54 ` Shivam Kumar
2021-11-14 14:57 ` [PATCH 5/6] Exit to userspace when dirty quota is full Shivam Kumar
2021-11-14 14:57 ` [PATCH 6/6] Free vCPUdqctx memory on vCPU destroy Shivam Kumar
2021-11-18 17:46 ` [PATCH 0/6] KVM: Dirty Quota-Based VM Live Migration Auto-Converge Sean Christopherson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d9129cda-ebd9-aec3-3f04-bb989c509ac1@nutanix.com \
--to=shivam.kumar1@nutanix.com \
--cc=anurag.madnawat@nutanix.com \
--cc=kvm@vger.kernel.org \
--cc=manish.mishra@nutanix.com \
--cc=pbonzini@redhat.com \
--cc=seanjc@google.com \
--cc=shaju.abraham@nutanix.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).