Received: by 10.223.164.221 with SMTP id h29csp1211159wrb; Wed, 1 Nov 2017 12:19:32 -0700 (PDT) X-Google-Smtp-Source: ABhQp+SYP0lZ7aI5wocNzz5Y3N/PV+ocEti1Hv12Kcn0ROVKsFzk7lSpANFA+eYSNCBDmFeKcsuc X-Received: by 10.101.97.130 with SMTP id c2mr883093pgv.101.1509563972507; Wed, 01 Nov 2017 12:19:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1509563972; cv=none; d=google.com; s=arc-20160816; b=K5m5EzUeIjNe352j7pNHg0xPKd7ovLm7vW5w7t85qZBjvyeaLrx8DLkY2srzHVe3fS Oewqkzvksk3FiJNBzvY34QdIgbtAQB63ods5PrBQngNBI1a7vU1JL/8isO79rk0fpc1i fQWdQW5Hhi4hEbn+RcW7L9ICBhIV/mANKUWw2zd3tSVyIbmmH+q4C1eSjp4lD2XRMF+A CYQ4bXAJPVido2cvsSsN6Sg3lC3JcRGavtrjl489gDQQQgSikTI0lmjis32bhNuUlxt+ cCvqUcCefro1esAP8qxGyy2ZInk1LcbA4wsqXUVQo77mxh2J/4/+TYHqBv+TTdtI23tF npog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject:arc-authentication-results; bh=+GMsHGxOs9RutQvhAqxUa+9EISMf6U5MUdIbAdYWMR4=; b=B2734ReT/Haa2fQThuZaHcjWIhXv8BvpkwiDaUHxA3O9MTx29umqhRc1fqZTDYo1Ve K4N1yn/z5boY3RSlN4iZrmmEmYhh4ke3Jc5tFvf+XMrLIratBU1qod9vayF4iVmPL8fd WLQdR57KxiZV15YOI1d0BC/Op9NwPfzrn983VuCRmkwjth1OdTRuexCpwL12hkLqX8F0 9T/kfX9FU3VEIcjbdUKR2F22jjhUx7VAVxVIMm3IKwyqMQyn3WhgBixKaEIoWsIryTW2 glB+I2dhYmyDzqNLJZ/WNBX821UKPvhqlpqGDMIMz0JZ4WCvT/aD4FQL9Ux4PhZAg30f tjYA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w33si361491plb.567.2017.11.01.12.19.19; Wed, 01 Nov 2017 12:19:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754925AbdKATSb (ORCPT + 99 others); Wed, 1 Nov 2017 15:18:31 -0400 Received: from userp1040.oracle.com ([156.151.31.81]:46126 "EHLO userp1040.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754765AbdKATSa (ORCPT ); Wed, 1 Nov 2017 15:18:30 -0400 Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id vA1JINC8025901 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 1 Nov 2017 19:18:24 GMT Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id vA1JIM7L005713 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 1 Nov 2017 19:18:23 GMT Received: from abhmp0006.oracle.com (abhmp0006.oracle.com [141.146.116.12]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id vA1JIMtR016251; Wed, 1 Nov 2017 19:18:22 GMT Received: from dhcp-burlington7-2nd-B-east-10-152-55-162.usdhcp.oraclecorp.com (/10.152.32.65) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 01 Nov 2017 12:18:22 -0700 Subject: Re: [PATCH v6 1/1] xen/time: do not decrease steal time after live migration on xen To: Dongli Zhang , xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org References: <1509500793-9896-1-git-send-email-dongli.zhang@oracle.com> Cc: jgross@suse.com, joao.m.martins@oracle.com From: Boris Ostrovsky Message-ID: Date: Wed, 1 Nov 2017 15:19:54 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <1509500793-9896-1-git-send-email-dongli.zhang@oracle.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Source-IP: aserv0021.oracle.com [141.146.126.233] Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/31/2017 09:46 PM, Dongli Zhang wrote: > After guest live migration on xen, steal time in /proc/stat > (cpustat[CPUTIME_STEAL]) might decrease because steal returned by > xen_steal_lock() might be less than this_rq()->prev_steal_time which is > derived from previous return value of xen_steal_clock(). > > For instance, steal time of each vcpu is 335 before live migration. > > cpu 198 0 368 200064 1962 0 0 1340 0 0 > cpu0 38 0 81 50063 492 0 0 335 0 0 > cpu1 65 0 97 49763 634 0 0 335 0 0 > cpu2 38 0 81 50098 462 0 0 335 0 0 > cpu3 56 0 107 50138 374 0 0 335 0 0 > > After live migration, steal time is reduced to 312. > > cpu 200 0 370 200330 1971 0 0 1248 0 0 > cpu0 38 0 82 50123 500 0 0 312 0 0 > cpu1 65 0 97 49832 634 0 0 312 0 0 > cpu2 39 0 82 50167 462 0 0 312 0 0 > cpu3 56 0 107 50207 374 0 0 312 0 0 > > Since runstate times are cumulative and cleared during xen live migration > by xen hypervisor, the idea of this patch is to accumulate runstate times > to global percpu variables before live migration suspend. Once guest VM is > resumed, xen_get_runstate_snapshot_cpu() would always return the sum of new > runstate times and previously accumulated times stored in global percpu > variables. Comments before the call of HYPERVISOR_suspend() has been > removed as it is inaccurate. The call can return an error code (e.g., > possibly -EPERM in the future). I'd like split comment removal bit into a separate paragraph. I can do this when committing if you don't mind. > > Similar and more severe issue would impact prior linux 4.8-4.10 as > discussed by Michael Las at > https://0xstubs.org/debugging-a-flaky-cpu-steal-time-counter-on-a-paravirtualized-xen-guest, > which would overflow steal time and lead to 100% st usage in top command > for linux 4.8-4.10. A backport of this patch would fix that issue. > > References: https://0xstubs.org/debugging-a-flaky-cpu-steal-time-counter-on-a-paravirtualized-xen-guest > Signed-off-by: Dongli Zhang > > --- Reviewed-by: Boris Ostrovsky From 1582826394220322955@xxx Wed Nov 01 01:47:59 +0000 2017 X-GM-THRID: 1582826394220322955 X-Gmail-Labels: Inbox,Category Forums