From: Cornelia Huck <cohuck@redhat.com>
To: Siwei Liu <loseweigh@gmail.com>
Cc: "Samudrala, Sridhar" <sridhar.samudrala@intel.com>,
Alexander Duyck <alexander.h.duyck@intel.com>,
virtio-dev@lists.oasis-open.org, aaron.f.brown@intel.com,
Jiri Pirko <jiri@resnulli.us>,
"Michael S. Tsirkin" <mst@redhat.com>,
Jakub Kicinski <kubakici@wp.pl>, Netdev <netdev@vger.kernel.org>,
qemu-devel@nongnu.org, virtualization@lists.linux-foundation.org
Subject: Re: [Qemu-devel] [virtio-dev] Re: [PATCH] qemu: Introduce VIRTIO_NET_F_STANDBY feature bit to virtio_net
Date: Fri, 15 Jun 2018 13:48:15 +0200 [thread overview]
Message-ID: <20180615134815.6613620e.cohuck@redhat.com> (raw)
In-Reply-To: <CADGSJ23WnTmVKHezm3t0V6M2sWeHaOUoTjdXkmrvbO0EF83hMg@mail.gmail.com>
On Thu, 14 Jun 2018 18:57:11 -0700
Siwei Liu <loseweigh@gmail.com> wrote:
> Thank you for sharing your thoughts, Cornelia. With questions below, I
> think you raised really good points, some of which I don't have answer
> yet and would also like to explore here.
>
> First off, I don't want to push the discussion to the extreme at this
> point, or sell anything about having QEMU manage everything
> automatically. Don't get me wrong, it's not there yet. Let's don't
> assume we are tied to a specific or concerte solution. I think the key
> for our discussion might be to define or refine the boundary between
> VM and guest, e.g. what each layer is expected to control and manage
> exactly.
>
> In my view, there might be possibly 3 different options to represent
> the failover device conceipt to QEMU and libvirt (or any upper layer
> software):
>
> a. Seperate device: in this model, virtio and passthough remains
> separate devices just as today. QEMU exposes the standby feature bit
> for virtio, and publish status/event around the negotiation process of
> this feature bit for libvirt to react upon. Since Libvirt has the
> pairing relationship itself, maybe through MAC address or something
> else, it can control the presence of primary by hot plugging or
> unplugging the passthrough device, although it has to work tightly
> with virtio's feature negotation process. Not just for migration but
> also various corner scenarios (driver/feature ok, device reset,
> reboot, legacy guest etc) along virtio's feature negotiation.
Yes, that one has obvious tie-ins to virtio's modus operandi.
>
> b. Coupled device: in this model, virtio and passthough devices are
> weakly coupled using some group ID, i.e. QEMU match the passthough
> device for a standby virtio instance by comparing the group ID value
> present behind each device's bridge. Libvirt provides QEMU the group
> ID for both type of devices, and only deals with hot plug for
> migration, by checking some migration status exposed (e.g. the feature
> negotiation status on the virtio device) by QEMU. QEMU manages the
> visibility of the primary in guest along virtio's feature negotiation
> process.
I'm a bit confused here. What, exactly, ties the two devices together?
If libvirt already has the knowledge that it should manage the two as a
couple, why do we need the group id (or something else for other
architectures)? (Maybe I'm simply missing something because I'm not
that familiar with pci.)
>
> c. Fully combined device: in this model, virtio and passthough devices
> are viewed as a single VM interface altogther. QEMU not just controls
> the visibility of the primary in guest, but can also manage the
> exposure of the passthrough for migratability. It can be like that
> libvirt supplies the group ID to QEMU. Or libvirt does not even have
> to provide group ID for grouping the two devices, if just one single
> combined device is exposed by QEMU. In either case, QEMU manages all
> aspect of such internal construct, including virtio feature
> negotiation, presence of the primary, and live migration.
Same question as above.
>
> It looks like to me that, in your opinion, you seem to prefer go with
> (a). While I'm actually okay with either (b) or (c). Do I understand
> your point correctly?
I'm not yet preferring anything, as I'm still trying to understand how
this works :) I hope we can arrive at a model that covers the use case
and that is also flexible enough to be extended to other platforms.
>
> The reason that I feel that (a) might not be ideal, just as Michael
> alluded to (quoting below), is that as management stack, it really
> doesn't need to care about the detailed process of feature negotiation
> (if we view the guest presence of the primary as part of feature
> negotiation at an extended level not just virtio). All it needs to be
> done is to hand in the required devices to QEMU and that's all. Why do
> we need to addd various hooks, events for whichever happens internally
> within the guest?
>
> ''
> Primary device is added with a special "primary-failover" flag.
> A virtual machine is then initialized with just a standby virtio
> device. Primary is not yet added.
>
> Later QEMU detects that guest driver device set DRIVER_OK.
> It then exposes the primary device to the guest, and triggers
> a device addition event (hot-plug event) for it.
>
> If QEMU detects guest driver removal, it initiates a hot-unplug sequence
> to remove the primary driver. In particular, if QEMU detects guest
> re-initialization (e.g. by detecting guest reset) it immediately removes
> the primary device.
> ''
>
> and,
>
> ''
> management just wants to give the primary to guest and later take it back,
> it really does not care about the details of the process,
> so I don't see what does pushing it up the stack buy you.
>
> So I don't think it *needs* to be done in libvirt. It probably can if you
> add a bunch of hooks so it knows whenever vm reboots, driver binds and
> unbinds from device, and can check that backup flag was set.
> If you are pushing for a setup like that please get a buy-in
> from libvirt maintainers or better write a patch.
> ''
This actually seems to mean the opposite to me: We need to know what
the guest is doing and when, as it directly drives what we need to do
with the devices. If we switch to a visibility vs a hotplug model (see
the other mail), we might be able to handle that part within qemu.
However, I don't see how you get around needing libvirt to actually set
this up in the first place and to handle migration per se.
next prev parent reply other threads:[~2018-06-15 11:48 UTC|newest]
Thread overview: 94+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-07 23:09 [Qemu-devel] [PATCH] qemu: Introduce VIRTIO_NET_F_STANDBY feature bit to virtio_net Sridhar Samudrala
2018-06-05 1:41 ` Samudrala, Sridhar
2018-06-05 2:06 ` Jason Wang
2018-06-06 18:17 ` Samudrala, Sridhar
2018-06-06 18:52 ` [Qemu-devel] [libvirt] " Ján Tomko
2018-06-06 19:39 ` Samudrala, Sridhar
2018-06-06 18:53 ` [Qemu-devel] " Michael S. Tsirkin
2018-06-05 12:33 ` Michael S. Tsirkin
2018-06-05 20:20 ` Samudrala, Sridhar
2018-06-05 20:37 ` Michael S. Tsirkin
2018-06-05 21:16 ` [Qemu-devel] [virtio-dev] " Siwei Liu
2018-06-05 21:32 ` Michael S. Tsirkin
2018-06-05 22:09 ` Siwei Liu
2018-06-12 11:47 ` Michael S. Tsirkin
2018-06-14 0:56 ` Siwei Liu
2018-06-06 2:29 ` [Qemu-devel] " Jason Wang
2018-06-12 11:54 ` Michael S. Tsirkin
2018-06-13 0:20 ` Samudrala, Sridhar
2018-06-13 2:41 ` Jason Wang
2018-06-13 2:38 ` Jason Wang
2018-06-13 4:24 ` Samudrala, Sridhar
2018-06-13 5:40 ` Jason Wang
2018-06-21 18:14 ` Michael S. Tsirkin
2018-06-22 1:07 ` [Qemu-devel] [virtio-dev] " Siwei Liu
2018-06-22 2:30 ` Michael S. Tsirkin
2018-06-22 19:43 ` Siwei Liu
2018-06-22 21:47 ` Michael S. Tsirkin
2018-06-22 22:25 ` Siwei Liu
2018-06-22 22:28 ` Michael S. Tsirkin
2018-06-11 17:26 ` [Qemu-devel] " Michael S. Tsirkin
2018-06-12 1:54 ` Jason Wang
2018-06-12 2:17 ` Michael S. Tsirkin
2018-06-12 5:02 ` Samudrala, Sridhar
2018-06-12 11:34 ` Michael S. Tsirkin
2018-06-13 0:08 ` [Qemu-devel] [virtio-dev] " Samudrala, Sridhar
2018-06-14 1:02 ` Siwei Liu
2018-06-14 10:02 ` Cornelia Huck
2018-06-15 1:57 ` Siwei Liu
2018-06-15 11:48 ` Cornelia Huck [this message]
2018-06-15 17:06 ` Siwei Liu
2018-06-19 10:54 ` Cornelia Huck
2018-06-19 20:09 ` Siwei Liu
2018-06-20 14:34 ` Cornelia Huck
2018-06-20 19:59 ` Siwei Liu
2018-06-19 20:32 ` Michael S. Tsirkin
2018-06-20 9:53 ` Cornelia Huck
2018-06-20 14:11 ` Michael S. Tsirkin
2018-06-20 16:06 ` Cornelia Huck
2018-06-20 19:48 ` Michael S. Tsirkin
2018-06-21 14:59 ` Cornelia Huck
2018-06-21 18:20 ` Michael S. Tsirkin
2018-06-22 15:09 ` Cornelia Huck
2018-06-22 19:05 ` Michael S. Tsirkin
2018-06-22 20:21 ` Siwei Liu
2018-06-22 21:32 ` Michael S. Tsirkin
2018-06-22 21:57 ` Siwei Liu
2018-06-22 22:33 ` Michael S. Tsirkin
2018-06-23 0:05 ` Siwei Liu
2018-06-26 15:08 ` Cornelia Huck
2018-06-26 17:50 ` Michael S. Tsirkin
2018-06-27 9:11 ` Cornelia Huck
2018-06-25 9:55 ` Cornelia Huck
2018-06-26 1:46 ` Michael S. Tsirkin
2018-06-26 11:55 ` Cornelia Huck
2018-06-26 13:54 ` Michael S. Tsirkin
2018-06-22 21:43 ` Michael S. Tsirkin
2018-06-27 10:10 ` Cornelia Huck
2018-06-22 1:21 ` Siwei Liu
2018-06-22 2:25 ` Venu Busireddy
2018-06-22 2:32 ` Michael S. Tsirkin
2018-06-22 20:00 ` Siwei Liu
2018-06-22 20:03 ` Siwei Liu
2018-06-22 21:29 ` Michael S. Tsirkin
2018-06-22 21:51 ` Siwei Liu
2018-06-22 22:25 ` Michael S. Tsirkin
2018-06-22 23:40 ` Siwei Liu
2018-06-23 0:17 ` Siwei Liu
2018-06-24 1:45 ` Michael S. Tsirkin
2018-06-25 17:54 ` Samudrala, Sridhar
2018-06-26 1:50 ` Michael S. Tsirkin
2018-06-26 15:17 ` Cornelia Huck
2018-06-26 15:38 ` Michael S. Tsirkin
2018-06-26 16:03 ` Cornelia Huck
2018-06-26 17:42 ` Michael S. Tsirkin
2018-06-26 23:38 ` Siwei Liu
2018-06-27 0:29 ` Michael S. Tsirkin
2018-06-27 6:21 ` Siwei Liu
2018-06-27 6:49 ` Samudrala, Sridhar
2018-06-27 7:03 ` Siwei Liu
2018-06-15 2:34 ` Michael S. Tsirkin
2018-06-15 9:32 ` Cornelia Huck
2018-06-15 12:31 ` Michael S. Tsirkin
2018-06-18 13:27 ` Cornelia Huck
2018-06-14 12:50 ` Michael S. Tsirkin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180615134815.6613620e.cohuck@redhat.com \
--to=cohuck@redhat.com \
--cc=aaron.f.brown@intel.com \
--cc=alexander.h.duyck@intel.com \
--cc=jiri@resnulli.us \
--cc=kubakici@wp.pl \
--cc=loseweigh@gmail.com \
--cc=mst@redhat.com \
--cc=netdev@vger.kernel.org \
--cc=qemu-devel@nongnu.org \
--cc=sridhar.samudrala@intel.com \
--cc=virtio-dev@lists.oasis-open.org \
--cc=virtualization@lists.linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).