[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20191202215049.GB8120@linux.intel.com>
Date: Mon, 2 Dec 2019 13:50:49 -0800
From: Sean Christopherson <sean.j.christopherson@...el.com>
To: Peter Xu <peterx@...hat.com>
Cc: linux-kernel@...r.kernel.org, kvm@...r.kernel.org,
Paolo Bonzini <pbonzini@...hat.com>,
"Dr . David Alan Gilbert" <dgilbert@...hat.com>,
Vitaly Kuznetsov <vkuznets@...hat.com>
Subject: Re: [PATCH RFC 04/15] KVM: Implement ring-based dirty memory tracking
On Mon, Dec 02, 2019 at 04:16:40PM -0500, Peter Xu wrote:
> On Mon, Dec 02, 2019 at 12:10:36PM -0800, Sean Christopherson wrote:
> > On Fri, Nov 29, 2019 at 04:34:54PM -0500, Peter Xu wrote:
> > > Currently, we have N+1 rings for each VM of N vcpus:
> > >
> > > - for each vcpu, we have 1 per-vcpu dirty ring,
> > > - for each vm, we have 1 per-vm dirty ring
> >
> > Why? I assume the purpose of per-vcpu rings is to avoid contention between
> > threads, but the motiviation needs to be explicitly stated. And why is a
> > per-vm fallback ring needed?
>
> Yes, as explained in previous reply, the problem is there could have
> guest memory writes without vcpu contexts.
>
> >
> > If my assumption is correct, have other approaches been tried/profiled?
> > E.g. using cmpxchg to reserve N number of entries in a shared ring.
>
> Not yet, but I'd be fine to try anything if there's better
> alternatives. Besides, could you help explain why sharing one ring
> and let each vcpu to reserve a region in the ring could be helpful in
> the pov of performance?
The goal would be to avoid taking a lock, or at least to avoid holding a
lock for an extended duration, e.g. some sort of multi-step process where
entries in the ring are first reserved, then filled, and finally marked
valid. That'd allow the "fill" action to be done in parallel.
In case it isn't clear, I haven't thought through an actual solution :-).
My point is that I think it's worth exploring and profiling other
implementations because the dual per-vm and per-vcpu rings has a few warts
that we'd be stuck with forever.
> > IMO,
> > adding kvm_get_running_vcpu() is a hack that is just asking for future
> > abuse and the vcpu/vm/as_id interactions in mark_page_dirty_in_ring()
> > look extremely fragile.
>
> I agree. Another way is to put heavier traffic to the per-vm ring,
> but the downside could be that the per-vm ring could get full easier
> (but I haven't tested).
There's nothing that prevents increasing the size of the common ring each
time a new vCPU is added. Alternatively, userspace could explicitly
request or hint the desired ring size.
> > I also dislike having two different mechanisms
> > for accessing the ring (lock for per-vm, something else for per-vcpu).
>
> Actually I proposed to drop the per-vm ring (actually I had a version
> that implemented this.. and I just changed it back to the per-vm ring
> later on, see below) and when there's no vcpu context I thought about:
>
> (1) use vcpu0 ring
>
> (2) or a better algo to pick up a per-vcpu ring (like, the less full
> ring, we can do many things here, e.g., we can easily maintain a
> structure track this so we can get O(1) search, I think)
>
> I discussed this with Paolo, but I think Paolo preferred the per-vm
> ring because there's no good reason to choose vcpu0 as what (1)
> suggested. While if to choose (2) we probably need to lock even for
> per-cpu ring, so could be a bit slower.
Ya, per-vm is definitely better than dumping on vcpu0. I'm hoping we can
find a third option that provides comparable performance without using any
per-vcpu rings.
Powered by blists - more mailing lists