From mboxrd@z Thu Jan 1 00:00:00 1970 From: Gleb Natapov Subject: Re: [PATCHv2] KVM: optimize apic interrupt delivery Date: Wed, 12 Sep 2012 15:34:41 +0300 Message-ID: <20120912123441.GQ20907@redhat.com> References: <20120911130225.GN20907@redhat.com> <20120911141023.GB26031@redhat.com> <20120911171300.GJ4257@linux.vnet.ibm.com> <20120911223337.GA28821@redhat.com> <20120912010334.GK4257@linux.vnet.ibm.com> <50503D92.7090108@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: paulmck@linux.vnet.ibm.com, "Michael S. Tsirkin" , kvm@vger.kernel.org, mtosatti@redhat.com To: Avi Kivity Return-path: Received: from mx1.redhat.com ([209.132.183.28]:32371 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757496Ab2ILMeo (ORCPT ); Wed, 12 Sep 2012 08:34:44 -0400 Content-Disposition: inline In-Reply-To: <50503D92.7090108@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: On Wed, Sep 12, 2012 at 10:45:22AM +0300, Avi Kivity wrote: > On 09/12/2012 04:03 AM, Paul E. McKenney wrote: > >> > > Paul, I'd like to check something with you here: > >> > > this function can be triggered by userspace, > >> > > any number of times; we allocate > >> > > a 2K chunk of memory that is later freed by > >> > > kfree_rcu. > >> > > > >> > > Is there a risk of DOS if RCU is delayed while > >> > > lots of memory is queued up in this way? > >> > > If yes is this a generic problem with kfree_rcu > >> > > that should be addressed in core kernel? > >> > > >> > There is indeed a risk. > >> > >> In our case it's a 2K object. Is it a practical risk? > > > > How many kfree_rcu()s per second can a given user cause to happen? > > Not much more than a few hundred thousand per second per process (normal > operation is zero). > I managed to do 21466 per second. > > > >> > The kfree_rcu() implementation cannot really > >> > decide what to do here, especially given that it is callable with irqs > >> > disabled. > >> > > >> > The usual approach is to keep a per-CPU counter and count it down from > >> > some number for each kfree_rcu(). When it reaches zero, invoke > >> > synchronize_rcu() as well as kfree_rcu(), and then reset it to the > >> > "some number" mentioned above. > >> > >> It is a bit of a concern for me that this will hurt worst-case latency > >> for realtime guests. In our case, we return error and this will > >> fall back on not allocating memory and using slow all-CPU scan. > >> One possible scheme that relies on this is: > >> - increment an atomic counter, per vcpu. If above threshold -> > >> return with error > >> - call_rcu (+ barrier vcpu destruct) > >> - within callback decrement an atomic counter > > > > That certainly is a possibility, but... > > > >> > In theory, I could create an API that did this. In practice, I have no > >> > idea how to choose the number -- much depends on the size of the object > >> > being freed, for example. > >> > >> We could pass an object size, no problem :) > > > > ... before putting too much additional effort into possible solutions, > > why not force the problem to occur and see what actually happens? We > > would then be in a much better position to work out what should be done. > > Good idea. Michael, is should be easy to modify kvm-unit-tests to write > to the APIC ID register in a loop. > I did. Memory consumption does not grow on otherwise idle host. -- Gleb.