[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC PATCH] dpci: Put the dpci back on the list if running on another CPU.
On Wed, Mar 18, 2015 at 04:43:40PM +0000, Jan Beulich wrote: > >>> On 18.03.15 at 15:06, <konrad.wilk@xxxxxxxxxx> wrote: > > On Wed, Mar 18, 2015 at 07:41:55AM +0000, Jan Beulich wrote: > >> >>> On 17.03.15 at 18:44, <konrad.wilk@xxxxxxxxxx> wrote: > >> > As you can see to preserve the existing functionality such as > >> > being able to schedule N amount of interrupt injections > >> > for the N interrupts we might get - I modified '->masked' > >> > to be an atomic counter. > >> > >> Why would that be? When an earlier interrupt wasn't fully handled, > >> real hardware wouldn't latch more than one further instance either. > > > > We acknowledge the interrupt in the hypervisor - as in we call > > ->ack on the handler (which for MSI is an nop anyhow). > > The case where ->ack is a nop (for the purposes here) is specifically > not a problem, as that means we defer ack-ing the LAPIC (hence > further instances can't show up). > > > If the device is misconfigured and keeps on sending burst of > > interrupts every 10 msec for 1msec we can dead-lock. > > How is this different from the hypervisor itself not being fast > enough to handle one instance before the next one shows up? If by 'handle' you mean process it to the guest (so update guest vAPIC and so on), then yes - this is exactly the case I am describing. > I've been trying to reconstruct the rationale for our current > treatment of maskable MSI sources (in that we ack them at the > LAPIC right away), but so far wasn't really successful (sadly > commit 5f4c1bb65e lacks any word of description other than > its title). > > (Ill behaved devices shouldn't be handed to guests anyway.) They might become ill-behaved if the guest OS becomes compromised. > > > Either way we should tell the guest about those interrupts. > >> > >> > The end result is that we can still live-lock. Unless we: > >> > - Drop on the floor the injection of N interrupts and > >> > just deliever at max one per VMX_EXIT (and not bother > >> > with interrupts arriving when we are in the VMX handler). > >> > >> I'm afraid I again don't see the point here. > > > > I am basing all of this on the assumption that we have > > many interrupts for the same device coming it - and we have > > not been able to tell the guest about it (the guest could > > be descheduled, too slow, etc) so that it can do what it > > needs to silence the device. > > But that's the same as with the native hardware case: When there > are new interrupt instances before the earlier one was acked, at > most one will be seen at the point the interrupt becomes unmasked > again. Correct. However we split the 'handling' of an interrupt in two stages. First stage is Acking it and activating an softirq to process this dpci. The second stage is running the softirq handler (processing)- and right then we can get interrupted by the same interrupt (we have Acked it - so the device is OK to send another one). The interrupt handler (do_IRQ) will try to tell the softirq to process it. And in here - depending on which flavour of RFC patches I've posted - we could deadlock. The deadlocks arise if we explicitly wait for the softirq to finish in raise_softirq_for - as in we spin in raise_softirq_for for the dpci to be out of running - while we have just stomped over the softirq that was processing the dpci! The live-lock scenario is also possible - if the device sends an interrupt right as dpci_softirq is in hvm_dirq_assist - and it does at such regular intervals that dpci_softirq ends up rescheduling its dpci every time. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |