Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753302AbdHQQuz (ORCPT ); Thu, 17 Aug 2017 12:50:55 -0400 Received: from mx1.redhat.com ([209.132.183.28]:44431 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751575AbdHQQuw (ORCPT ); Thu, 17 Aug 2017 12:50:52 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 2E041C047B6A Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=rkrcmar@redhat.com Date: Thu, 17 Aug 2017 18:50:44 +0200 From: Radim =?utf-8?B?S3LEjW3DocWZ?= To: David Hildenbrand Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-mips@linux-mips.org, kvm-ppc@vger.kernel.org, linux-s390@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Paolo Bonzini , Christoffer Dall , Marc Zyngier , Christian Borntraeger , Cornelia Huck , James Hogan , Paul Mackerras , Alexander Graf Subject: Re: [PATCH RFC 2/2] KVM: RCU protected dynamic vcpus array Message-ID: <20170817165044.GF2566@flask> References: <20170816194037.9460-1-rkrcmar@redhat.com> <20170816194037.9460-3-rkrcmar@redhat.com> <7cb42373-355c-7cb3-2979-9529aef0641c@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7cb42373-355c-7cb3-2979-9529aef0641c@redhat.com> X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Thu, 17 Aug 2017 16:50:52 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2248 Lines: 65 2017-08-17 13:14+0200, David Hildenbrand: > > atomic_set(&kvm->online_vcpus, 0); > > mutex_unlock(&kvm->lock); > > diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h > > index c8df733eed41..eb9fb5b493ac 100644 > > --- a/include/linux/kvm_host.h > > +++ b/include/linux/kvm_host.h > > @@ -386,12 +386,17 @@ struct kvm_memslots { > > int used_slots; > > }; > > > > +struct kvm_vcpus { > > + u32 online; > > + struct kvm_vcpu *array[]; > > On option could be to simply chunk it: > > +struct kvm_vcpus { > + struct kvm_vcpu vcpus[32]; I'm thinking of 128/256. > +}; > + > /* > * Note: > * memslots are not sorted by id anymore, please use id_to_memslot() > @@ -391,7 +395,7 @@ struct kvm { > struct mutex slots_lock; > struct mm_struct *mm; /* userspace tied to this vm */ > struct kvm_memslots __rcu *memslots[KVM_ADDRESS_SPACE_NUM]; > - struct kvm_vcpu *vcpus[KVM_MAX_VCPUS]; > + struct kvm_vcpus vcpus[(KVM_MAX_VCPUS + 31) / 32]; > /* > * created_vcpus is protected by kvm->lock, and is incremented > @@ -483,12 +487,14 @@ static inline struct kvm_io_bus > *kvm_get_bus(struct kvm *kvm, enum kvm_bus idx) > > > 1. make nobody access kvm->vcpus directly (factor out) > 2. allocate next chunk if necessary when creating a VCPU and store > pointer using WRITE_ONCE > 3. use READ_ONCE to test for availability of the current chunk We can also use kvm->online_vcpus exactly like we did now. > kvm_for_each_vcpu just has to use READ_ONCE to access/test for the right > chunk. Pointers never get invalid. No RCU needed. Sleeping in the loop > is possible. I like this better than SRCU because it keeps the internal code mostly intact, even though it is compromise solution with a tunable. (SRCU gives us more protection than we need.) It is very similar to (3). Chunks will usually take memory and have slower access to the first chunk than an extendable list would, but is faster from the third chunk, which is a reasonable deal. We are just postponing the problem until a higher number of VCPUs, but then we can extend it into more levels using the same principle and I think it will still get a better trade-offs than SRCU. I'd do this for v2, thanks.