|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH RFC 2/4] xen: add bitmap to indicate per-domain state changes
On 14.09.2021 14:35, Juergen Gross wrote:
> Add a bitmap with one bit per possible domid indicating the respective
> domain has changed its state (created, deleted, dying, crashed,
> shutdown).
>
> Registering the VIRQ_DOM_EXC event will result in setting the bits for
> all existing domains and resetting all other bits.
Generally I view VIRQ_DOM_EXC as overly restrictive already - what if both
a xenstore domain and a control domain want respective notification? Hence
similarly I'm not convinced a single, global instance will do here. Which
in turn raises the question whether the approach chosen may not take us
far enough, and we wouldn't instead want a more precise notification model
(i.e. not just "something has changed").
> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -87,6 +87,22 @@ bool __read_mostly vmtrace_available;
> /* Unique domain identifier, protected by domctl lock. */
> static uint64_t unique_id;
>
> +static DECLARE_BITMAP(dom_state_changed, DOMID_MASK + 1);
While not really making a difference to the size of the bitmap, afaict up
to DOMID_FIRST_RESERVED would do. Neither system domains nor idle ones
will reach, in particular, the set_bit() in domain_create(). And none of
them can be subject to destruction.
Also I think this could do with a brief comment as to what causes bits
to be set. This would avoid readers having to go hunt down all the
set_bit() (or the commit introducing the bitmap).
> +void domain_reset_states(void)
> +{
> + struct domain *d;
> +
> + bitmap_zero(dom_state_changed, DOMID_MASK + 1);
While this looks to be fine with the present updates of the bitmap, I
still wonder about the non-atomicity here vs the atomic updates
everywhere else. It feels like there's some locking needed to be future
proof. Since you come here from VIRQ_DOM_EXC binding, it could be that
domain's per-domain lock.
> @@ -1141,6 +1161,8 @@ static void complete_domain_destroy(struct rcu_head
> *head)
>
> xfree(d->vcpu);
>
> + set_bit(d->domain_id, dom_state_changed);
> +
> _domain_destroy(d);
>
> send_global_virq(VIRQ_DOM_EXC);
Wouldn't this better be in domain_destroy() immediately after the domain
has been taken off the list, and hence is no longer "discoverable"?
Jan
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |