|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v10 11/20] x86/VPMU: Interface for setting PMU mode and flags
>>> On 12.09.14 at 16:12, <boris.ostrovsky@xxxxxxxxxx> wrote:
> On 09/12/2014 02:49 AM, Jan Beulich wrote:
>>>>> On 11.09.14 at 18:10, <boris.ostrovsky@xxxxxxxxxx> wrote:
>>> On 09/11/2014 10:59 AM, Jan Beulich wrote:
>>>>>>> On 11.09.14 at 16:12, <boris.ostrovsky@xxxxxxxxxx> wrote:
>>>>> On 09/11/2014 02:44 AM, Jan Beulich wrote:
>>>>>>>>> On 10.09.14 at 19:37, <boris.ostrovsky@xxxxxxxxxx> wrote:
>>>>>>> On 09/10/2014 11:05 AM, Jan Beulich wrote:
>>>>>>>>>>> On 04.09.14 at 05:41, <boris.ostrovsky@xxxxxxxxxx> wrote:
>>>>> > > +long do_xenpmu_op(int op,
>>>>> XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg)
>>>>> > > +{
>>>>> > > + int ret = -EINVAL;
>>>>> > > + xen_pmu_params_t pmu_params;
>>>>> > > +
>>>>> > > + switch ( op )
>>>>> > > + {
>>>>> > > + case XENPMU_mode_set:
>>>>> > > + {
>>>>> > > + static DEFINE_SPINLOCK(xenpmu_mode_lock);
>>>>> > > + uint32_t current_mode;
>>>>> > > +
>>>>> > > + if ( !is_control_domain(current->domain) )
>>>>> > > + return -EPERM;
>>>>> > > +
>>>>> > > + if ( copy_from_guest(&pmu_params, arg, 1) )
>>>>> > > + return -EFAULT;
>>>>> > > +
>>>>> > > + if ( pmu_params.val & ~XENPMU_MODE_SELF )
>>>>> > > + return -EINVAL;
>>>>> > > +
>>>>> > > + /*
>>>>> > > + * Return error is someone else is in the middle of
>>>>> changing
>>> mode ---
>>>>> > > + * this is most likely indication of two system
>>>>> administrators
>>>>> > > + * working against each other
>>>>> > > + */
>>>>> > > + if ( !spin_trylock(&xenpmu_mode_lock) )
>>>>> > > + return -EAGAIN;
>>>>> >
>>>>> > So what happens if you can't take the lock in a continuation? If
>>>>> > returning -EAGAIN in that case is not a problem, what do you
>>>>> > need the continuation for in the first place?
>>>>>
>>>>> EAGAIN this case means that the caller was not able to initiate the
>>>>> operation. Continuation will allow the caller to finish operation in
>>>>> progress.
>>>> But that's only what you want, not what the code does. Also now
>>>> that I look again I don't think the comment really applies to this if().
>>> Oh, I see. Then both first and second will fail.
>>>
>>> I can make the second caller reset everything so that when continuation
>>> gets to run it will start anew. And if it (i.e. the first caller) did
>>> get -EAGAIN while trying to get the lock then it's just as well --- the
>>> state will be clean when user tries this again.
>>>
>>> As for the question why continuation is needed in the firs place ---
>>> it's to make sure this hypercall doesn't prevent other unrelated
>>> operations from executing. Not to manage simultaneous execution of this
>>> hypercall from multiple VCPUs (if this is what you were asking).
>> No, that's not what I was asking. The point I'm trying to make is - if
>> the caller is in need of dealing with -EAGAIN anyway (i.e. you
>> require it to retry), why can't you simply return -EAGAIN also for
>> the case where you currently use a continuation?
>
> You mean
>
> while ( atomic_read(&vpmu_sched_counter) != allbutself_num )
> {
> /* Give up after 5 seconds */
> if ( NOW() > start + SECONDS(5) )
> {
> printk(XENLOG_WARNING "vpmu_force_context_switch: failed to
> sync\n");
> ret = -EBUSY;
> break;
> }
> cpu_relax();
> if ( hypercall_preempt_check() ) {
> //return hypercall_create_continuation(
> // __HYPERVISOR_xenpmu_op, "ih", XENPMU_mode_set, arg);
> return -EAGAIN; // plus cleanup
> }
> }
>
> ?
Yes.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |