From: Janosch Frank <frankja@linux.ibm.com>
To: Nico Boehr <nrb@linux.ibm.com>,
borntraeger@linux.ibm.com, imbrenda@linux.ibm.com
Cc: kvm@vger.kernel.org, linux-s390@vger.kernel.org
Subject: Re: [PATCH v1] KVM: s390: disable migration mode when dirty tracking is disabled
Date: Thu, 26 Jan 2023 10:48:43 +0100 [thread overview]
Message-ID: <73262865-5f3e-d90d-b4c0-32349960c421@linux.ibm.com> (raw)
In-Reply-To: <167472247246.63544.9612120960891768862@t14-nrb.local>
On 1/26/23 09:41, Nico Boehr wrote:
> Quoting Janosch Frank (2023-01-25 14:55:59)
>> On 1/20/23 08:54, Nico Boehr wrote:
>>> Migration mode is a VM attribute which enables tracking of changes in
>>> storage attributes (PGSTE). It assumes dirty tracking is enabled on all
>>> memslots to keep a dirty bitmap of pages with changed storage attributes.
>>>
>>> When enabling migration mode, we currently check that dirty tracking is
>>> enabled for all memslots. However, userspace can disable dirty tracking
>>> without disabling migration mode.
>>>
>>> Since migration mode is pointless with dirty tracking disabled, disable
>>> migration mode whenever userspace disables dirty tracking on any slot.
>>
>> Will userspace be able to handle the sudden -EINVAL rcs on
>> KVM_S390_GET_CMMA_BITS and KVM_S390_SET_CMMA_BITS?
>
> QEMU has proper error handling on the GET_CMMA_BITS code path and will not
> attempt GET_CMMA_BITS after it disabled dirty tracking. So yes, userspace can
> handle this fine. In addition, as mentioned in the commit, it was never allowed
> to have migration mode without dirty tracking. It was checked when migration
> mode is enabled, just wasn't enforced when dirty tracking went off. The
> alternative would be to refuse disabling dirty tracking when migration mode is
> on; and that would _really_ break userspace.
>
> Or we just leave migration mode on and check on every emulation/ioctl that a
> dirty bitmap is still there, which would change absolutely nothing about the
> return value of GET_CMMA_BITS.
>
> Or we allocate the dirty bitmap for storage attributes independent of the dirty
> bitmap for pages, which increases memory usage and makes this patch quite a bit
> more complex, risking that we break more than what is already broken.
>
> This approach really seems like the sane option to me.
Jup, I'm just trying to consider all possibilities to find the best one
and that includes asking all the questions.
>>>
>>> +Dirty tracking must be enabled on all memslots, else -EINVAL is returned. When
>>> +dirty tracking is disabled on any memslot, migration mode is automatically
>>> +stopped.
>>
>> Do we also need to add a warning to the CMMA IOCTLs?
>
> No, it is already documented there:
>
>> This ioctl can fail with [...] > -EINVAL if KVM_S390_CMMA_PEEK is not set
>> but migration mode was not enabled
That's fine but doesn't include the part where migration mode can
suddenly be disabled via a memory region change.
If we implicitly change migration mode disablement then we need to
document that as much as possible to cover all bases.
>
> [...]
>>> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c
>>> index e4890e04b210..4785f002cd93 100644
>>> --- a/arch/s390/kvm/kvm-s390.c
>>> +++ b/arch/s390/kvm/kvm-s390.c
>>> @@ -5628,28 +5628,43 @@ int kvm_arch_prepare_memory_region(struct kvm *kvm,
>>> enum kvm_mr_change change)
>>> {
>>> gpa_t size;
>>> + int rc;
>>
>> Not sure why you added rc even though it doesn't need to be used.
>
> You prefer a line which is 100 chars wide over a new variable? OK fine for me.
I'm not sure how you manage to get over 100 chars, did I miss something?
if (!kvm->arch.migration_mode)
return 0;
if ((old->flags & KVM_MEM_LOG_DIRTY_PAGES) &&
!(new->flags & KVM_MEM_LOG_DIRTY_PAGES)) {
WARN(kvm_s390_vm_stop_migration(kvm),
"Migration mode could not be disabled");
return 0;
prev parent reply other threads:[~2023-01-26 9:48 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-20 7:54 [PATCH v1] KVM: s390: disable migration mode when dirty tracking is disabled Nico Boehr
2023-01-23 10:29 ` Claudio Imbrenda
2023-01-25 13:55 ` Janosch Frank
2023-01-25 15:53 ` Claudio Imbrenda
2023-01-26 8:41 ` Nico Boehr
2023-01-26 9:48 ` Janosch Frank [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=73262865-5f3e-d90d-b4c0-32349960c421@linux.ibm.com \
--to=frankja@linux.ibm.com \
--cc=borntraeger@linux.ibm.com \
--cc=imbrenda@linux.ibm.com \
--cc=kvm@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
--cc=nrb@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox