[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH 7/8] VirtIOBlock: protect rq with its own lock
From: |
Emanuele Giuseppe Esposito |
Subject: |
[PATCH 7/8] VirtIOBlock: protect rq with its own lock |
Date: |
Thu, 9 Jun 2022 10:37:26 -0400 |
s->rq is pointing to the the VirtIOBlockReq list, and this list is
read/written in:
virtio_blk_reset = main loop, but caller calls ->stop_ioeventfd() and
drains, so no iothread runs in parallel
virtio_blk_save_device = main loop, but VM is stopped (migration), so
iothread has no work on request list
virtio_blk_load_device = same as save_device
virtio_blk_device_realize = iothread is not created yet
virtio_blk_handle_rw_error = io, here is why we need synchronization.
s is device state and is shared accross all queues. Right now there
is no problem, because iothread and main loop never access it at
the same time, but if we introduce 1 iothread -> n virtqueue and
1 virtqueue -> 1 iothread mapping we might have two iothreads
accessing the list at the same time
virtio_blk_process_queued_requests: io, same problem as above.
Therefore we need a virtio-blk to protect s->rq list.
Signed-off-by: Emanuele Giuseppe Esposito <eesposit@redhat.com>
---
hw/block/virtio-blk.c | 38 ++++++++++++++++++++++++++--------
include/hw/virtio/virtio-blk.h | 5 ++++-
2 files changed, 33 insertions(+), 10 deletions(-)
diff --git a/hw/block/virtio-blk.c b/hw/block/virtio-blk.c
index e1aaa606ba..88c61457e1 100644
--- a/hw/block/virtio-blk.c
+++ b/hw/block/virtio-blk.c
@@ -109,8 +109,10 @@ static int virtio_blk_handle_rw_error(VirtIOBlockReq *req,
int error,
/* Break the link as the next request is going to be parsed from the
* ring again. Otherwise we may end up doing a double completion! */
req->mr_next = NULL;
- req->next = s->rq;
- s->rq = req;
+ WITH_QEMU_LOCK_GUARD(&s->req_mutex) {
+ req->next = s->rq;
+ s->rq = req;
+ }
} else if (action == BLOCK_ERROR_ACTION_REPORT) {
virtio_blk_req_complete(req, VIRTIO_BLK_S_IOERR);
if (acct_failed) {
@@ -860,10 +862,16 @@ static void virtio_blk_handle_output(VirtIODevice *vdev,
VirtQueue *vq)
void virtio_blk_process_queued_requests(VirtIOBlock *s, bool is_bh)
{
- VirtIOBlockReq *req = s->rq;
+ VirtIOBlockReq *req;
MultiReqBuffer mrb = {};
- s->rq = NULL;
+ IO_CODE();
+
+ /* Detach queue from s->rq and process everything here */
+ WITH_QEMU_LOCK_GUARD(&s->req_mutex) {
+ req = s->rq;
+ s->rq = NULL;
+ }
aio_context_acquire(blk_get_aio_context(s->conf.conf.blk));
while (req) {
@@ -896,6 +904,7 @@ void virtio_blk_restart_bh(void *opaque)
{
VirtIOBlock *s = opaque;
+ IO_CODE();
qemu_bh_delete(s->bh);
s->bh = NULL;
@@ -946,17 +955,20 @@ static void virtio_blk_reset(VirtIODevice *vdev)
* stops all Iothreads.
*/
blk_drain(s->blk);
+ aio_context_release(ctx);
/* We drop queued requests after blk_drain() because blk_drain() itself can
* produce them. */
+ qemu_mutex_lock(&s->req_mutex);
while (s->rq) {
req = s->rq;
s->rq = req->next;
+ qemu_mutex_unlock(&s->req_mutex);
virtqueue_detach_element(req->vq, &req->elem, 0);
virtio_blk_free_request(req);
+ qemu_mutex_lock(&s->req_mutex);
}
-
- aio_context_release(ctx);
+ qemu_mutex_unlock(&s->req_mutex);
assert(!s->dataplane_started);
blk_set_enable_write_cache(s->blk, s->original_wce);
@@ -1120,10 +1132,14 @@ static void virtio_blk_set_status(VirtIODevice *vdev,
uint8_t status)
static void virtio_blk_save_device(VirtIODevice *vdev, QEMUFile *f)
{
VirtIOBlock *s = VIRTIO_BLK(vdev);
- VirtIOBlockReq *req = s->rq;
+ VirtIOBlockReq *req;
GLOBAL_STATE_CODE();
+ WITH_QEMU_LOCK_GUARD(&s->req_mutex) {
+ req = s->rq;
+ }
+
while (req) {
qemu_put_sbyte(f, 1);
@@ -1165,8 +1181,10 @@ static int virtio_blk_load_device(VirtIODevice *vdev,
QEMUFile *f,
req = qemu_get_virtqueue_element(vdev, f, sizeof(VirtIOBlockReq));
virtio_blk_init_request(s, virtio_get_queue(vdev, vq_idx), req);
- req->next = s->rq;
- s->rq = req;
+ WITH_QEMU_LOCK_GUARD(&s->req_mutex) {
+ req->next = s->rq;
+ s->rq = req;
+ }
}
return 0;
@@ -1272,6 +1290,7 @@ static void virtio_blk_device_realize(DeviceState *dev,
Error **errp)
virtio_init(vdev, VIRTIO_ID_BLOCK, s->config_size);
+ qemu_mutex_init(&s->req_mutex);
s->blk = conf->conf.blk;
s->rq = NULL;
s->sector_mask = (s->conf.conf.logical_block_size / BDRV_SECTOR_SIZE) - 1;
@@ -1318,6 +1337,7 @@ static void virtio_blk_device_unrealize(DeviceState *dev)
qemu_coroutine_dec_pool_size(conf->num_queues * conf->queue_size / 2);
qemu_del_vm_change_state_handler(s->change);
blockdev_mark_auto_del(s->blk);
+ qemu_mutex_destroy(&s->req_mutex);
virtio_cleanup(vdev);
}
diff --git a/include/hw/virtio/virtio-blk.h b/include/hw/virtio/virtio-blk.h
index c334353b5a..5cb59994a8 100644
--- a/include/hw/virtio/virtio-blk.h
+++ b/include/hw/virtio/virtio-blk.h
@@ -53,7 +53,6 @@ struct VirtIOBlockReq;
struct VirtIOBlock {
VirtIODevice parent_obj;
BlockBackend *blk;
- void *rq;
QEMUBH *bh;
VirtIOBlkConf conf;
unsigned short sector_mask;
@@ -64,6 +63,10 @@ struct VirtIOBlock {
struct VirtIOBlockDataPlane *dataplane;
uint64_t host_features;
size_t config_size;
+
+ /* While the VM is running, req_mutex protects rq. */
+ QemuMutex req_mutex;
+ struct VirtIOBlockReq *rq;
};
typedef struct VirtIOBlockReq {
--
2.31.1
- [PATCH 0/8] virtio-blk: removal of AioContext lock, Emanuele Giuseppe Esposito, 2022/06/09
- [PATCH 4/8] virtio: categorize callbacks in GS, Emanuele Giuseppe Esposito, 2022/06/09
- [PATCH 8/8] virtio-blk: remove unnecessary AioContext lock from function already safe, Emanuele Giuseppe Esposito, 2022/06/09
- [PATCH 7/8] VirtIOBlock: protect rq with its own lock,
Emanuele Giuseppe Esposito <=
- [PATCH 3/8] virtio_blk_process_queued_requests: always run in a bh, Emanuele Giuseppe Esposito, 2022/06/09
- [PATCH 2/8] block-backend: enable_write_cache should be atomic, Emanuele Giuseppe Esposito, 2022/06/09
- [PATCH 5/8] virtio-blk: mark GLOBAL_STATE_CODE functions, Emanuele Giuseppe Esposito, 2022/06/09
- [PATCH 1/8] virtio_queue_aio_attach_host_notifier: remove AioContext lock, Emanuele Giuseppe Esposito, 2022/06/09
- [PATCH 6/8] virtio-blk: mark IO_CODE functions, Emanuele Giuseppe Esposito, 2022/06/09