[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221011195809.557016-1-peterx@redhat.com>
Date: Tue, 11 Oct 2022 15:58:05 -0400
From: Peter Xu <peterx@...hat.com>
To: kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Cc: Sean Christopherson <seanjc@...gle.com>, peterx@...hat.com,
John Hubbard <jhubbard@...dia.com>,
Paolo Bonzini <pbonzini@...hat.com>,
David Matlack <dmatlack@...gle.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Andrea Arcangeli <aarcange@...hat.com>,
"Dr . David Alan Gilbert" <dgilbert@...hat.com>,
David Hildenbrand <david@...hat.com>,
Linux MM Mailing List <linux-mm@...ck.org>,
Mike Kravetz <mike.kravetz@...cle.com>
Subject: [PATCH v4 0/4] kvm/mm: Allow GUP to respond to non fatal signals
v4:
- Split patch 2+3 into three patches [Sean]
rfc: https://lore.kernel.org/r/20220617014147.7299-1-peterx@redhat.com
v1: https://lore.kernel.org/r/20220622213656.81546-1-peterx@redhat.com
v2: https://lore.kernel.org/r/20220721000318.93522-1-peterx@redhat.com
v3: https://lore.kernel.org/r/20220817003614.58900-1-peterx@redhat.com
One issue was reported that libvirt won't be able to stop the virtual
machine using QMP command "stop" during a paused postcopy migration [1].
It won't work because "stop the VM" operation requires the hypervisor to
kick all the vcpu threads out using SIG_IPI in QEMU (which is translated to
a SIGUSR1). However since during a paused postcopy, the vcpu threads are
hang death at handle_userfault() so there're simply not responding to the
kicks. Further, the "stop" command will further hang the QMP channel.
The mm has facility to process generic signal (FAULT_FLAG_INTERRUPTIBLE),
however it's only used in the PF handlers only, not in GUP. Unluckily, KVM
is a heavy GUP user on guest page faults. It means we won't be able to
interrupt a long page fault for KVM fetching guest pages with what we have
right now.
I think it's reasonable for GUP to only listen to fatal signals, as most of
the GUP users are not really ready to handle such case. But actually KVM
is not such an user, and KVM actually has rich infrastructure to handle
even generic signals, and properly deliver the signal to the userspace.
Then the page fault can be retried in the next KVM_RUN.
This patchset added FOLL_INTERRUPTIBLE to enable FAULT_FLAG_INTERRUPTIBLE,
and let KVM be the first one to use it. KVM and mm/gup can always be able
to respond to fatal signals, but not non-fatal ones until this patchset.
One thing to mention is that this is not allowing all KVM paths to be able
to respond to non fatal signals, but only on x86 slow page faults. In the
future when more code is ready for handling signal interruptions, we can
explore possibility to have more gup callers using FOLL_INTERRUPTIBLE.
Tests
=====
I created a postcopy environment, pause the migration by shutting down the
network to emulate a network failure (so the handle_userfault() will stuck
for a long time), then I tried three things:
(1) Sending QMP command "stop" to QEMU monitor,
(2) Hitting Ctrl-C from QEMU cmdline,
(3) GDB attach to the dest QEMU process.
Before this patchset, all three use case hang. After the patchset, all
work just like when there's not network failure at all.
Please have a look, thanks.
[1] https://gitlab.com/qemu-project/qemu/-/issues/1052
Peter Xu (4):
mm/gup: Add FOLL_INTERRUPTIBLE
kvm: Add KVM_PFN_ERR_SIGPENDING
kvm: Add interruptible flag to __gfn_to_pfn_memslot()
kvm: x86: Allow to respond to generic signals during slow PF
arch/arm64/kvm/mmu.c | 2 +-
arch/powerpc/kvm/book3s_64_mmu_hv.c | 2 +-
arch/powerpc/kvm/book3s_64_mmu_radix.c | 2 +-
arch/x86/kvm/mmu/mmu.c | 18 ++++++++++----
include/linux/kvm_host.h | 14 +++++++++--
include/linux/mm.h | 1 +
mm/gup.c | 33 ++++++++++++++++++++++----
mm/hugetlb.c | 5 +++-
virt/kvm/kvm_main.c | 30 ++++++++++++++---------
virt/kvm/kvm_mm.h | 4 ++--
virt/kvm/pfncache.c | 2 +-
11 files changed, 85 insertions(+), 28 deletions(-)
--
2.37.3
Powered by blists - more mailing lists