Displaying 10 results from an estimated 10 matches for "rcuify".
2014 Feb 26
2
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
...;>
>>> Thoughts?
>>>
>>
>> Agree, vhost net removal should not be blocked by a skb. But since the
>> skbs could be queued may places, just destroy them may need extra locks.
>>
>> Haven't thought this deeply, but another possible sloution is to rcuify
>> destructor_arg and assign it to NULL during vhost_net removing.
>
> Xen treat it by a timer, for those skbs which has been delivered for a
> while, netback would exchange page of zero_copy's skb with dom0's page.
>
> but there is still a race between host's anoth...
2014 Feb 26
2
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
...;>
>>> Thoughts?
>>>
>>
>> Agree, vhost net removal should not be blocked by a skb. But since the
>> skbs could be queued may places, just destroy them may need extra locks.
>>
>> Haven't thought this deeply, but another possible sloution is to rcuify
>> destructor_arg and assign it to NULL during vhost_net removing.
>
> Xen treat it by a timer, for those skbs which has been delivered for a
> while, netback would exchange page of zero_copy's skb with dom0's page.
>
> but there is still a race between host's anoth...
2014 Feb 26
2
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
...stead?
> I think this happens when a device is removed.
>
> Thoughts?
>
Agree, vhost net removal should not be blocked by a skb. But since the
skbs could be queued may places, just destroy them may need extra locks.
Haven't thought this deeply, but another possible sloution is to rcuify
destructor_arg and assign it to NULL during vhost_net removing.
>> ---
>> drivers/vhost/net.c | 17 +++++++----------
>> 1 file changed, 7 insertions(+), 10 deletions(-)
>>
>> diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c
>> index a0fa5de..3e96e47 10...
2014 Feb 26
2
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
...stead?
> I think this happens when a device is removed.
>
> Thoughts?
>
Agree, vhost net removal should not be blocked by a skb. But since the
skbs could be queued may places, just destroy them may need extra locks.
Haven't thought this deeply, but another possible sloution is to rcuify
destructor_arg and assign it to NULL during vhost_net removing.
>> ---
>> drivers/vhost/net.c | 17 +++++++----------
>> 1 file changed, 7 insertions(+), 10 deletions(-)
>>
>> diff --git a/drivers/vhost/net.c b/drivers/vhost/net.c
>> index a0fa5de..3e96e47 10...
2014 Feb 27
1
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
...e, vhost net removal should not be blocked by a skb. But since the
>>>> > >>skbs could be queued may places, just destroy them may need extra locks.
>>>> > >>
>>>> > >>Haven't thought this deeply, but another possible sloution is to rcuify
>>>> > >>destructor_arg and assign it to NULL during vhost_net removing.
>>> > >
>>> > >Xen treat it by a timer, for those skbs which has been delivered for a
>>> > >while, netback would exchange page of zero_copy's skb with dom0...
2014 Feb 27
1
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
...e, vhost net removal should not be blocked by a skb. But since the
>>>> > >>skbs could be queued may places, just destroy them may need extra locks.
>>>> > >>
>>>> > >>Haven't thought this deeply, but another possible sloution is to rcuify
>>>> > >>destructor_arg and assign it to NULL during vhost_net removing.
>>> > >
>>> > >Xen treat it by a timer, for those skbs which has been delivered for a
>>> > >while, netback would exchange page of zero_copy's skb with dom0...
2014 Feb 26
0
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
...?
> >>>
> >>
> >>Agree, vhost net removal should not be blocked by a skb. But since the
> >>skbs could be queued may places, just destroy them may need extra locks.
> >>
> >>Haven't thought this deeply, but another possible sloution is to rcuify
> >>destructor_arg and assign it to NULL during vhost_net removing.
> >
> >Xen treat it by a timer, for those skbs which has been delivered for a
> >while, netback would exchange page of zero_copy's skb with dom0's page.
> >
> >but there is still a rac...
2014 Feb 26
0
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
...hen a device is removed.
>>
>> Thoughts?
>>
>
> Agree, vhost net removal should not be blocked by a skb. But since the
> skbs could be queued may places, just destroy them may need extra locks.
>
> Haven't thought this deeply, but another possible sloution is to rcuify
> destructor_arg and assign it to NULL during vhost_net removing.
Xen treat it by a timer, for those skbs which has been delivered for a
while, netback would exchange page of zero_copy's skb with dom0's page.
but there is still a race between host's another process handle the skb
a...
2014 Feb 25
2
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
We used to stop the handling of tx when the number of pending DMAs
exceeds VHOST_MAX_PEND. This is used to reduce the memory occupation
of both host and guest. But it was too aggressive in some cases, since
any delay or blocking of a single packet may delay or block the guest
transmission. Consider the following setup:
+-----+ +-----+
| VM1 | | VM2 |
+--+--+
2014 Feb 25
2
[PATCH net] vhost: net: switch to use data copy if pending DMAs exceed the limit
We used to stop the handling of tx when the number of pending DMAs
exceeds VHOST_MAX_PEND. This is used to reduce the memory occupation
of both host and guest. But it was too aggressive in some cases, since
any delay or blocking of a single packet may delay or block the guest
transmission. Consider the following setup:
+-----+ +-----+
| VM1 | | VM2 |
+--+--+