From: Steven Sistare <steven.sistare@oracle.com>
To: Alex Williamson <alex.williamson@redhat.com>
Cc: "Jason Zeng" <jason.zeng@linux.intel.com>,
"Juan Quintela" <quintela@redhat.com>,
"Eric Blake" <eblake@redhat.com>,
"Michael S. Tsirkin" <mst@redhat.com>,
qemu-devel@nongnu.org,
"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
"Zheng Chuan" <zhengchuan@huawei.com>,
"Paolo Bonzini" <pbonzini@redhat.com>,
"Stefan Hajnoczi" <stefanha@redhat.com>,
"Marc-André Lureau" <marcandre.lureau@redhat.com>,
"Daniel P. Berrange" <berrange@redhat.com>,
"Philippe Mathieu-Daudé" <philmd@redhat.com>,
"Alex Bennée" <alex.bennee@linaro.org>,
"Markus Armbruster" <armbru@redhat.com>
Subject: Re: [PATCH V7 19/29] vfio-pci: cpr part 1 (fd and dma)
Date: Fri, 11 Mar 2022 11:22:01 -0500 [thread overview]
Message-ID: <c1d37dbf-6a2e-01c7-4eaa-9809d54f1897@oracle.com> (raw)
In-Reply-To: <20220310153039.454fd21b.alex.williamson@redhat.com>
On 3/10/2022 5:30 PM, Alex Williamson wrote:
> On Thu, 10 Mar 2022 14:55:50 -0500
> Steven Sistare <steven.sistare@oracle.com> wrote:
>
>> On 3/10/2022 1:35 PM, Alex Williamson wrote:
>>> On Thu, 10 Mar 2022 10:00:29 -0500
>>> Steven Sistare <steven.sistare@oracle.com> wrote:
>>>
>>>> On 3/7/2022 5:16 PM, Alex Williamson wrote:
>>>>> On Wed, 22 Dec 2021 11:05:24 -0800
>>>>> Steve Sistare <steven.sistare@oracle.com> wrote:
>>>>> [...]
>>>>>> diff --git a/migration/cpr.c b/migration/cpr.c
>>>>>> index 37eca66..cee82cf 100644
>>>>>> --- a/migration/cpr.c
>>>>>> +++ b/migration/cpr.c
>>>>>> @@ -7,6 +7,7 @@
>>>>>>
>>>>>> #include "qemu/osdep.h"
>>>>>> #include "exec/memory.h"
>>>>>> +#include "hw/vfio/vfio-common.h"
>>>>>> #include "io/channel-buffer.h"
>>>>>> #include "io/channel-file.h"
>>>>>> #include "migration.h"
>>>>>> @@ -101,7 +102,9 @@ void qmp_cpr_exec(strList *args, Error **errp)
>>>>>> error_setg(errp, "cpr-exec requires cpr-save with restart mode");
>>>>>> return;
>>>>>> }
>>>>>> -
>>>>>> + if (cpr_vfio_save(errp)) {
>>>>>> + return;
>>>>>> + }
>>>>>
>>>>> Why is vfio so unique that it needs separate handlers versus other
>>>>> devices? Thanks,
>>>>
>>>> In earlier patches these functions fiddled with more objects, but at this point
>>>> they are simple enough to convert to pre_save and post_load vmstate handlers for
>>>> the container and group objects. However, we would still need to call special
>>>> functons for vfio from qmp_cpr_exec:
>>>>
>>>> * validate all containers support CPR before we start blasting vaddrs
>>>> However, I could validate all, in every call to pre_save for each container.
>>>> That would be less efficient, but fits the vmstate model.
>>>
>>> Would it be a better option to mirror the migration blocker support, ie.
>>> any device that doesn't support cpr registers a blocker and generic
>>> code only needs to keep track of whether any blockers are registered.
>>
>> We cannot specifically use migrate_add_blocker(), because it is checked in
>> the migration specific function migrate_prepare(), in a layer of functions
>> above the simpler qemu_save_device_state() used in cpr. But yes, we could
>> do something similar for vfio. Increment a global counter in vfio_realize
>> if the container does not support cpr, and decrement it when the container is
>> destroyed. pre_save could just check the counter.
>
> Right, not suggesting to piggyback on migrate_add_blocker() only to use
> a similar mechanism. Only drivers that can't support cpr need register
> a blocker but testing for blockers is done generically, not just for
> vfio devices.
>
>>>> * restore all vaddr's if qemu_save_device_state fails.
>>>> However, I could recover for all containers inside pre_save when one container fails.
>>>> Feels strange touching all objects in a function for one, but there is no real
>>>> downside.
>>>
>>> I'm not as familiar as I should be with migration callbacks, thanks to
>>> mostly not supporting it for vfio devices, but it seems strange to me
>>> that there's no existing callback or notifier per device to propagate
>>> save failure. Do we not at least get some sort of resume callback in
>>> that case?
>>
>> We do not:
>> struct VMStateDescription {
>> int (*pre_load)(void *opaque);
>> int (*post_load)(void *opaque, int version_id);
>> int (*pre_save)(void *opaque);
>> int (*post_save)(void *opaque);
>>
>> The handler returns an error, which stops further saves and is propagated back
>> to the top level caller qemu_save_device_state().
>>
>> The vast majority of handlers do not have side effects, with no need to unwind
>> anything on failure.
>>
>> This raises another point. If pre_save succeeds for all the containers,
>> but fails for some non-vfio object, then the overall operation is abandoned,
>> but we do not restore the vaddr's. To plug that hole, we need to call the
>> unwind code from qmp_cpr_save, or implement your alternative below.
>
> We're trying to reuse migration interfaces, are we also triggering
> migration state change notifiers? ie.
> MIGRATION_STATUS_{CANCELLING,CANCELLED,FAILED}
No. That happens in the migration layer which we do not use.
> We already hook vfio
> devices supporting migration into that notifier to tell the driver to
> move the device back to the running state on failure, which seems a bit
> unique to vfio devices. Containers could maybe register their own
> callbacks.
>
>>> As an alternative, maybe each container could register a vm change
>>> handler that would trigger reloading vaddrs if we move to a running
>>> state and a flag on the container indicates vaddrs were invalidated?
>>> Thanks,
>>
>> That works and is modular, but I dislike that it adds checks on the
>> happy path for a case that will rarely happen, and it pushes recovery from
>> failure further away from the original failure, which would make debugging
>> cascading failures more difficult.
>
> Would using the migration notifier move us sufficiently closer to the
> failure point? Otherwise I think you're talking about unwinding all
> the containers when any one fails, where you didn't like that object
> overreach, or maybe adding an optional callback... but I wonder if the
> above notifier essentially already does that.
>
> In any case, I think we have options to either implement new or use
> existing notifier-like functionality to avoid all these vfio specific
> callouts. Thanks,
Yes, defining a cpr notifier for failure and cleanup is a good solution.
I'll work on that and a cpr blocker. I'll use the latter for vfio and
the chardevs.
- Steve
next prev parent reply other threads:[~2022-03-11 16:23 UTC|newest]
Thread overview: 96+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-12-22 19:05 [PATCH V7 00/29] Live Update Steve Sistare
2021-12-22 19:05 ` [PATCH V7 01/29] memory: qemu_check_ram_volatile Steve Sistare
2022-02-24 18:28 ` Dr. David Alan Gilbert
2022-03-03 15:55 ` Steven Sistare
2022-03-04 12:47 ` Philippe Mathieu-Daudé
2021-12-22 19:05 ` [PATCH V7 02/29] migration: fix populate_vfio_info Steve Sistare
2022-02-24 18:42 ` Peter Maydell
2022-03-03 15:55 ` Steven Sistare
2022-03-03 16:21 ` Peter Maydell
2022-03-03 16:38 ` Steven Sistare
2021-12-22 19:05 ` [PATCH V7 03/29] migration: qemu file wrappers Steve Sistare
2022-02-24 18:21 ` Dr. David Alan Gilbert
2022-03-03 15:55 ` Steven Sistare
2021-12-22 19:05 ` [PATCH V7 04/29] migration: simplify savevm Steve Sistare
2022-02-24 18:25 ` Dr. David Alan Gilbert
2022-03-03 15:55 ` Steven Sistare
2021-12-22 19:05 ` [PATCH V7 05/29] vl: start on wakeup request Steve Sistare
2022-02-24 18:51 ` Dr. David Alan Gilbert
2022-03-03 15:56 ` Steven Sistare
2021-12-22 19:05 ` [PATCH V7 06/29] cpr: reboot mode Steve Sistare
2021-12-22 19:05 ` [PATCH V7 07/29] cpr: reboot HMP interfaces Steve Sistare
2021-12-22 19:05 ` [PATCH V7 08/29] memory: flat section iterator Steve Sistare
2022-03-04 12:48 ` Philippe Mathieu-Daudé
2022-03-07 14:42 ` Steven Sistare
2022-03-09 14:18 ` Marc-André Lureau
2021-12-22 19:05 ` [PATCH V7 09/29] oslib: qemu_clear_cloexec Steve Sistare
2021-12-22 19:05 ` [PATCH V7 10/29] machine: memfd-alloc option Steve Sistare
2022-02-18 8:05 ` Guoyi Tu
2022-03-03 15:55 ` Steven Sistare
2022-02-24 17:56 ` Dr. David Alan Gilbert
2022-03-03 15:56 ` Steven Sistare
2022-03-03 17:21 ` Michael S. Tsirkin
2022-03-04 10:41 ` Igor Mammedov
2022-03-07 14:41 ` Steven Sistare
2022-03-08 6:50 ` Michael S. Tsirkin
2022-03-08 7:20 ` Igor Mammedov
2022-03-10 15:36 ` Steven Sistare
2022-03-10 16:00 ` Igor Mammedov
2022-03-10 17:28 ` Steven Sistare
2022-03-10 18:18 ` Steven Sistare
2022-03-11 9:42 ` Igor Mammedov
2022-03-29 17:43 ` Steven Sistare
2022-03-11 10:08 ` Daniel P. Berrangé
2022-03-11 10:25 ` David Hildenbrand
2022-03-11 9:54 ` David Hildenbrand
2021-12-22 19:05 ` [PATCH V7 11/29] qapi: list utility functions Steve Sistare
2022-03-09 14:11 ` Marc-André Lureau
2022-03-11 16:45 ` Steven Sistare
2022-03-11 21:59 ` Marc-André Lureau
2021-12-22 19:05 ` [PATCH V7 12/29] vl: helper to request re-exec Steve Sistare
2022-03-09 14:16 ` Marc-André Lureau
2022-03-11 16:45 ` Steven Sistare
2021-12-22 19:05 ` [PATCH V7 13/29] cpr: preserve extra state Steve Sistare
2021-12-22 19:05 ` [PATCH V7 14/29] cpr: restart mode Steve Sistare
2021-12-22 19:05 ` [PATCH V7 15/29] cpr: restart HMP interfaces Steve Sistare
2021-12-22 19:05 ` [PATCH V7 16/29] hostmem-memfd: cpr for memory-backend-memfd Steve Sistare
2021-12-22 19:05 ` [PATCH V7 17/29] pci: export functions for cpr Steve Sistare
2021-12-22 23:07 ` Michael S. Tsirkin
2022-01-05 17:22 ` Steven Sistare
2022-01-05 20:16 ` Michael S. Tsirkin
2022-01-06 22:48 ` Steven Sistare
2022-01-07 10:03 ` Michael S. Tsirkin
2021-12-22 19:05 ` [PATCH V7 18/29] vfio-pci: refactor " Steve Sistare
2022-03-03 23:21 ` Alex Williamson
2022-03-07 14:42 ` Steven Sistare
2021-12-22 19:05 ` [PATCH V7 19/29] vfio-pci: cpr part 1 (fd and dma) Steve Sistare
2021-12-22 23:15 ` Michael S. Tsirkin
2022-01-05 17:24 ` Steven Sistare
2022-01-05 21:14 ` Michael S. Tsirkin
2022-01-05 21:40 ` Steven Sistare
2022-01-05 23:09 ` Michael S. Tsirkin
2022-01-05 23:24 ` Steven Sistare
2022-01-06 9:12 ` Michael S. Tsirkin
2022-01-06 19:13 ` Steven Sistare
2022-03-07 22:16 ` Alex Williamson
2022-03-10 15:00 ` Steven Sistare
2022-03-10 18:35 ` Alex Williamson
2022-03-10 19:55 ` Steven Sistare
2022-03-10 22:30 ` Alex Williamson
2022-03-11 16:22 ` Steven Sistare [this message]
2021-12-22 19:05 ` [PATCH V7 20/29] vfio-pci: cpr part 2 (msi) Steve Sistare
2021-12-22 19:05 ` [PATCH V7 21/29] vfio-pci: cpr part 3 (intx) Steve Sistare
2021-12-22 19:05 ` [PATCH V7 22/29] vfio-pci: recover from unmap-all-vaddr failure Steve Sistare
2021-12-22 19:05 ` [PATCH V7 23/29] vhost: reset vhost devices for cpr Steve Sistare
2021-12-22 19:05 ` [PATCH V7 24/29] loader: suppress rom_reset during cpr Steve Sistare
2021-12-22 19:05 ` [PATCH V7 25/29] chardev: cpr framework Steve Sistare
2021-12-22 19:05 ` [PATCH V7 26/29] chardev: cpr for simple devices Steve Sistare
2021-12-22 19:05 ` [PATCH V7 27/29] chardev: cpr for pty Steve Sistare
2021-12-22 19:05 ` [PATCH V7 28/29] chardev: cpr for sockets Steve Sistare
2022-02-18 9:03 ` Guoyi Tu
2022-03-03 15:55 ` Steven Sistare
2021-12-22 19:05 ` [PATCH V7 29/29] cpr: only-cpr-capable option Steve Sistare
2022-02-18 9:43 ` Guoyi Tu
2022-03-03 15:54 ` Steven Sistare
2022-01-07 18:45 ` [PATCH V7 00/29] Live Update Steven Sistare
2022-02-18 13:36 ` Steven Sistare
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=c1d37dbf-6a2e-01c7-4eaa-9809d54f1897@oracle.com \
--to=steven.sistare@oracle.com \
--cc=alex.bennee@linaro.org \
--cc=alex.williamson@redhat.com \
--cc=armbru@redhat.com \
--cc=berrange@redhat.com \
--cc=dgilbert@redhat.com \
--cc=eblake@redhat.com \
--cc=jason.zeng@linux.intel.com \
--cc=marcandre.lureau@redhat.com \
--cc=mst@redhat.com \
--cc=pbonzini@redhat.com \
--cc=philmd@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=quintela@redhat.com \
--cc=stefanha@redhat.com \
--cc=zhengchuan@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).