virtualization.lists.linux-foundation.org archive mirror
 help / color / mirror / Atom feed
From: Stefan Hajnoczi <stefanha@redhat.com>
To: "Michael S. Tsirkin" <mst@redhat.com>
Cc: virtio-dev@lists.oasis-open.org,
	Claudio Imbrenda <imbrenda@linux.vnet.ibm.com>,
	Christian Borntraeger <borntraeger@de.ibm.com>,
	Matt Benjamin <mbenjamin@redhat.com>,
	virtualization@lists.linux-foundation.org,
	Christoffer Dall <christoffer.dall@linaro.org>
Subject: Re: [virtio-dev] virtio-vsock live migration
Date: Wed, 16 Mar 2016 14:32:00 +0000	[thread overview]
Message-ID: <20160316143200.GA689@stefanha-x1.localdomain> (raw)
In-Reply-To: <20160315180916-mutt-send-email-mst@redhat.com>


[-- Attachment #1.1: Type: text/plain, Size: 3907 bytes --]

On Tue, Mar 15, 2016 at 06:12:55PM +0200, Michael S. Tsirkin wrote:
> On Tue, Mar 15, 2016 at 03:15:29PM +0000, Stefan Hajnoczi wrote:
> > On Mon, Mar 14, 2016 at 01:13:24PM +0200, Michael S. Tsirkin wrote:
> > > On Thu, Mar 03, 2016 at 03:37:37PM +0000, Stefan Hajnoczi wrote:
> > > > Michael pointed out that the virtio-vsock draft specification does not
> > > > address live migration and in fact currently precludes migration.
> > > > 
> > > > Migration is fundamental so the device specification at least mustn't
> > > > preclude it.  Having brainstormed migration with Matthew Benjamin and
> > > > Michael Tsirkin, I am now summarizing the approach that I want to
> > > > include in the next draft specification.
> > > > 
> > > > Feedback and comments welcome!  In the meantime I will implement this in
> > > > code and update the draft specification.
> > > 
> > > Most of the issue seems to be a consequence of using a 4 byte CID.
> > > 
> > > I think the right thing to do is just to teach guests
> > > about 64 bit CIDs.
> > > 
> > > For now, can we drop guest CID from guest to host communication completely,
> > > making CID only host-visible? Maybe leave the space
> > > in the packet so we can add CID there later.
> > > It seems that in theory this will allow changing CID
> > > during migration, transparently to the guest.
> > > 
> > > Guest visible CID is required for guest to guest communication -
> > > but IIUC that is not currently supported.
> > > Maybe that can be made conditional on 64 bit addressing.
> > > Alternatively, it seems much easier to accept that these channels get broken
> > > across migration.
> > 
> > I reached the conclusion that channels break across migration because:
> > 
> > 1. 32-bit CIDs are in sockaddr_vm and we'd break AF_VSOCK ABI by
> >    changing it to 64-bit.  Application code would be specific
> >    virtio-vsock and wouldn't work with other AF_VSOCK transports that
> >    use the 32-bit sockaddr_vm struct.
> 
> You don't have to repeat the IPv6 mistake.  Make all 32 bit CIDs
> 64 bit CIDs by padding with 0s, then 64 bit apps can use
> any CID.
> 
> Old 32 bit CID applications will not be able to use the extended
> addresses, but hardcoding bugs
> does not seem sane.

A mixed 32-bit and 64-bit CID world is complex.  The host doesn't know
in advance whether all applications (especially inside the guest) will
support 64-bit CIDs or not.  32-bit CID applications won't work if a
64-bit CID has been assigned.

It also opens up the question how unique CIDs are allocated across
hosts.

Given that AF_VSOCK in Linux already exists in the 32-bit CID version,
I'd prefer to make virtio-vsock compatible with that for the time being.
Extensions can be added in the future but just implementing existing
AF_VSOCK semantics will already allow the applications to run.

> > 2. Dropping guest CIDs from the protocol breaks network protocols that
> >    send addresses.
> 
> Stick it in config space if you really have to.
> But why do you need it on each packet?

If packets are implicitly guest<->host then adding guest<->guest
communication requires a virtio spec change.  If packets contain
source/destination CIDs then allowing/forbidding guest<->host or
guest<->guest communication is purely a host policy decision.  I think
it's worth keeping that in from the start.

> >  NFS and netperf are the first two protocols I looked
> >    at and both transmit address information across the connection...
> 
> 
> Does netperf really attempt to get local IP
> and then send that inline within the connection?

Yes, netperf has separate control and data sockets.  I think part of the
reason for this split is that the control connection can communicate the
address details for the data connection over a different protocol (TCP +
RDMA?), but I'm not sure.

Stefan

[-- Attachment #1.2: signature.asc --]
[-- Type: application/pgp-signature, Size: 473 bytes --]

[-- Attachment #2: Type: text/plain, Size: 183 bytes --]

_______________________________________________
Virtualization mailing list
Virtualization@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/virtualization

  parent reply	other threads:[~2016-03-16 14:32 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-03-03 15:37 virtio-vsock live migration Stefan Hajnoczi
2016-03-10 23:56 ` Michael S. Tsirkin
2016-03-14 11:13 ` [virtio-dev] " Michael S. Tsirkin
     [not found] ` <20160311014147-mutt-send-email-mst@redhat.com>
2016-03-15 15:10   ` Stefan Hajnoczi
     [not found] ` <20160314130150-mutt-send-email-mst@redhat.com>
2016-03-15 15:15   ` [virtio-dev] " Stefan Hajnoczi
     [not found]   ` <20160315151529.GB26263@stefanha-x1.localdomain>
2016-03-15 16:12     ` Michael S. Tsirkin
     [not found]     ` <20160315180916-mutt-send-email-mst@redhat.com>
2016-03-16 14:32       ` Stefan Hajnoczi [this message]
2016-03-16 14:58         ` Matt Benjamin
2016-03-16 15:05         ` Michael S. Tsirkin
     [not found]         ` <20160316163344-mutt-send-email-mst@redhat.com>
2016-04-06 12:55           ` Stefan Hajnoczi
     [not found]           ` <20160406125550.GB17538@stefanha-x1.localdomain>
2016-04-06 13:17             ` Michael S. Tsirkin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20160316143200.GA689@stefanha-x1.localdomain \
    --to=stefanha@redhat.com \
    --cc=borntraeger@de.ibm.com \
    --cc=christoffer.dall@linaro.org \
    --cc=imbrenda@linux.vnet.ibm.com \
    --cc=mbenjamin@redhat.com \
    --cc=mst@redhat.com \
    --cc=virtio-dev@lists.oasis-open.org \
    --cc=virtualization@lists.linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).