WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

Re: [Xen-ia64-devel][PATCH] Enable SMP on VTI domain.

To: "Xu, Anthony" <anthony.xu@xxxxxxxxx>
Subject: Re: [Xen-ia64-devel][PATCH] Enable SMP on VTI domain.
From: Isaku Yamahata <yamahata@xxxxxxxxxxxxx>
Date: Thu, 29 Jun 2006 17:03:20 +0900
Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Thu, 29 Jun 2006 01:04:04 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <01913ADC4FF97E40AE0E2B001574AEE1188D44@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
References: <01913ADC4FF97E40AE0E2B001574AEE1188D44@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.4.2.1i
Hi Anthony.

On Thu, Jun 29, 2006 at 02:21:48PM +0800, Xu, Anthony wrote:
> >From: Isaku Yamahata [mailto:yamahata@xxxxxxxxxxxxx]
> >Sent: 2006?6?21? 17:25
> >To: Xu, Anthony
> >Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
> >Subject: Re: [Xen-ia64-devel][PATCH] Enable SMP on VTI domain.
> >
> >
> >On Thu, Jun 01, 2006 at 12:55:08PM +0800, Xu, Anthony wrote:
> >
> >> >> Or you mean the protection of global purge.
> >> >> When a vcpu get IPI to purge TLB,
> >> >> What it does is to invalid the TLB entry in VHPT,
> >> >> but not remove the TLB entry.
> >> >> There is no race condition.
> >> >
> >> >Is there any gurantee that the vcpu which recives IPI isn't touching VHPT?
> >>
> >> The vcpu which receives IPI can touch VHPT in the same time.
> >> Because purge operation only sets the TLB entry invalid, like entry->ti=1.
> >> That has the same philosophy with Tristan's direct purge
> >
> >Could you review the two attached patches?
> >Purge function traverses the collision chain when IPI is sent.
> >But there is a window when the assumption of the collision chain
> >is broken.
> >vmx_hpw_miss() has a race. ia64_do_page_fault() had a similar race before.
> >
> >--
> 
> Sorry for late response.
> 
> The second patch is good cleanup and improvement.

The second patch is also a bug fix patch.


> I don't understand the race condition the first patch fixes.
> 
> Could you please elaborate this?

The patch fixes two races.
- a race in vmx_process() of vmx_process.c
  The same race was there in ia64_do_page_fault() before.
  The check, (fault == IA64_USE_TLB && !current->arch.dtlb.pte.p), in
  ia64_do_page_fault() avoids this race.

- a race in vtlb.c
  vmx_vcpu_ptc_l() needs a certain condition on the collision chain
  to traverse collision chains and purge entries correctly.
  But there are windows when the condision is broken.
  The critical areas are surrounded by local_irq_save() and local_irq_restore()
  with the patch.
  If a vcpu send a IPI to another vcpu for ptc.ga when another vcpu is
  in the critical area, things goes bad.


  Actually the patch assumes that the targeted vcpu is still
  on the physical cpu which received IPI.
  It might be reasonable to assume so before credit scheduler was
  introduced...

  If the targeted vcpu moved to another physical cpu,
  the collision chain is traversed on the IPI'ed physical cpu and
  the collision chain is modified on the physical cpu on which the
  targeted vcpu runs at the same time.
  The collision chain modification/traverse code doesn't seem to
  be lock-free. Something bad would happen.
  

In fact I suspect that there still remains a problem.
I haven't checked the generated assembler code and I'm not sure though.
- vmx_vcpu_ptc_ga()
  while (proc != v->processor);

  v->processor's type is int.
  However v->processor might be changed asynchronously by vcpu scheduler
  on another physical cpu.
  Compiler barrier and memory barrier might be needed somewhere.

-- 
yamahata

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel