lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 21 Jun 2010 11:19:36 -0300
From:	Luiz Capitulino <lcapitulino@...hat.com>
To:	Fernando Luis Vazquez Cao <fernando@....ntt.co.jp>
Cc:	kvm@...r.kernel.org,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	mori.keisuke@....ntt.co.jp,
	Takuya Yoshikawa <yoshikawa.takuya@....ntt.co.jp>,
	Chris Wright <chrisw@...hat.com>, Dor Laor <dlaor@...hat.com>,
	Lon Hohberger <lhh@...hat.com>,
	"Perry N. Myers" <pmyers@...hat.com>, berrange@...hat.com
Subject: Re: [RFC] High availability in KVM

On Thu, 17 Jun 2010 12:15:20 +0900
Fernando Luis Vazquez Cao <fernando@....ntt.co.jp> wrote:

>   * qemu-kvm
> 
>   Currently KVM is only notified about memory errors detected by the
>   MCE subsystem. When running on newer x86 hardware, if MCE detects an
>   error on user-space it signals the corresponding process with
>   SIGBUS. Qemu, upon receiving the signal, checks the problematic
>   address which the kernel stored in siginfo and decides whether to
>   inject the MCE to the virtual machine.
> 
>   An obvious limitation is that we would like to be notified about
>   other types of error too and, as suggested before, a file-based
>   interface that can be sys_poll'ed might be needed for that.  
> 
>   On a different note, in a HA environment the qemu policy described
>   above is not adequate; when a notification of a hardware error that
>   our policy determines to be serious arrives the first thing we want
>   to do is to put the virtual machine in a quiesced state to avoid
>   further wreckage. If we injected the error into the guest we would
>   risk a guest panic that might detectable only by polling or, worse,
>   being killed by the kernel, which means that postmortem analysis of
>   the guest is not possible. Once we had the guests in a quiesced
>   state, where all the buffers have been flushed and the hardware
>   sources released, we would have two modes of operation that can be
>   used together and complement each other.
> 
>     - Proactive: A qmp event describing the error (severity, topology,
>       etc) is emitted. The HA software would have to register to
>       receive hardware error events, possibly using the libvirt
>       bindings. Upon receiving the event the HA software would know
>       that the guest is in a failover-safe quiesced state so it could
>       do without fencing and proceed to the failover stage directly.

This seems to match the BLOCK_IO_ERROR event we have today: when a disk error
happens, an event is emitted and the virtual machine can be automatically
stopped (there's a configuration option for this).

On the other hand, there's a number of ways to do this differently. I think
the first thing to do is to agree on what qemu's behavior is going to be, then
we decide how to expose this info to qmp clients.

>     - Passive: Polling resource agents that need to check the state of
>       the guest generally use libvirt or a wrapper such as virsh. When
>       the state is SHUTOFF or CRASHED the resource agent proceeds to
>       the facing stage, which might be expensive and usually involves
>       killing the qemu process. We propose adding a new state that
>       indicates the failover-safe state described before. In this
>       state the HA software would not need to use fencing techniques
>       and since the qemu process is not killed postmortem analysis of
>       the virtual machine is still possible.

It wouldn't be polling, I guess. We already have events for most state changes.
So, when the machine stops, reboots, etc.. the client would be notified and
then it could inspect the virtual machine by using query commands.

This method would be preferable in case we also want this information available
in the user Monitor and/or if the event gets too messy because of the amount of
information we want to put in it.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ