[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 3/3] VMX: Remove the vcpu from the per-cpu blocking list after domain termination
> -----Original Message----- > From: Jan Beulich [mailto:JBeulich@xxxxxxxx] > Sent: Monday, May 23, 2016 7:11 PM > To: Wu, Feng <feng.wu@xxxxxxxxx> > Cc: andrew.cooper3@xxxxxxxxxx; dario.faggioli@xxxxxxxxxx; > george.dunlap@xxxxxxxxxxxxx; Tian, Kevin <kevin.tian@xxxxxxxxx>; xen- > devel@xxxxxxxxxxxxx; konrad.wilk@xxxxxxxxxx; keir@xxxxxxx > Subject: RE: [PATCH 3/3] VMX: Remove the vcpu from the per-cpu blocking list > after domain termination > > >>> On 23.05.16 at 12:35, <feng.wu@xxxxxxxxx> wrote: > >> From: Wu, Feng > >> Sent: Monday, May 23, 2016 5:18 PM > >> > From: Jan Beulich [mailto:JBeulich@xxxxxxxx] > >> > Sent: Monday, May 23, 2016 5:08 PM > >> > To: Wu, Feng <feng.wu@xxxxxxxxx> > >> > >>> On 23.05.16 at 07:48, <feng.wu@xxxxxxxxx> wrote: > >> > > Yes, indeed it is more natural to add this function when vcpu is > >> > > destroyed, > >> > > however, the reason I add it here is I still have some concerns about > >> > > the > >> > > timing. > >> > > When the VM is destroyed, here is the calling path: > >> > > > >> > > - vmx_pi_hooks_deassign() --> > >> > > ...... > >> > > - vmx_vcpu_destroy() --> > >> > > ...... > >> > > - vmx_domain_destroy() > >> > > ...... > >> > > > >> > > As I replied in the previous mail, when we remove the vcpus from the > >> > > blocking > >> > > list, there might be some _in-flight_ call to the hooks, so I put the > >> > > cleanup > >> > > code in the vmx_domain_destroy(), which is a bit more far from > >> > > vmx_pi_hooks_deassign, > >> > > and hence safer. If you have any other good ideas, I am all ears!:) > >> > > >> > Well, either there is a possible race (then moving the addition > >> > later just reduces the chances, but doesn't eliminate it), or there > >> > isn't (in which case Kevin's suggestion should probably be followed). > >> > >> Yes, I agree, adding the cleanup code in domain destroy other than > >> vcpu destroy point just reduces the risk, but not eliminate. So far I don't > >> get a perfect solution to solve this possible race condition. > > > > After more thinking about this, I think this race condition can be resolve > > in the following way: > > 1. Define a per-vCPU flag, say, 'v->arch.hvm_vmx.pi_back_from_hotplug' > > 2. In vmx_pi_blocking_list_cleanup(), when we find the vCPU from an > > blocking list, after removing it, set the flag to 1 > > 3. In vmx_vcpu_block(), add the following check: > > > > spin_lock_irqsave(pi_blocking_list_lock, flags); > > + if ( unlikely(v->arch.hvm_vmx.pi_blocking_cleaned_up == 1) ) > > + { > > + /* > > + * The vcpu is to be destroyed and it has already been removed > > + * from the per-CPU list if it is blocking, we shouldn't add > > + * new vCPUs to the list. > > + */ > > + spin_unlock_irqrestore(pi_blocking_list_lock, flags); > > + return; > > + } > > + > > old_lock = cmpxchg(&v->arch.hvm_vmx.pi_blocking.lock, NULL, > > pi_blocking_list_lock); > > > > Then we can following Kevin's suggestion to move the addition > > to vmx_vcpu_destory(). > > Before adding yet another PI-related field, I'd really like to see other > alternatives explored. In particular - can determination be based on > some other state (considering the subject, e.g. per-domain one)? I think the point is we need to set some flag inside the spin_lock_irqsave()/spin_unlock_irqrestore() section in vmx_pi_blocking_list_cleanup() and check it after acquiring the lock in vmx_vcpu_block(), so the case condition can be eliminated, right? If that is the case, I am not sure how we can use other state. Thanks, Feng > > Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |