diff options
author | Kevin Wolf <kwolf@redhat.com> | 2021-02-12 18:20:27 +0100 |
---|---|---|
committer | Kevin Wolf <kwolf@redhat.com> | 2021-02-15 15:10:14 +0100 |
commit | c81219a7dd36a815bd85beed9932fc973d4f5d51 (patch) | |
tree | b3a4890962fba3772758b2ca08e83d304b9bcdf6 /monitor/monitor.c | |
parent | 6094cbeb72117204f3302a4581415ee1dc33a879 (diff) | |
download | qemu-c81219a7dd36a815bd85beed9932fc973d4f5d51.zip qemu-c81219a7dd36a815bd85beed9932fc973d4f5d51.tar.gz qemu-c81219a7dd36a815bd85beed9932fc973d4f5d51.tar.bz2 |
monitor: Fix assertion failure on shutdown
Commit 357bda95 already tried to fix the order in monitor_cleanup() by
moving shutdown of the dispatcher coroutine further to the start.
However, it didn't go far enough:
iothread_stop() makes sure that all pending work (bottom halves) in the
AioContext of the monitor iothread is completed. iothread_destroy()
depends on this and fails an assertion if there is still a pending BH.
While the dispatcher coroutine is running, it will try to resume the
monitor after taking a request out of the queue, which involves a BH.
The dispatcher is run until it terminates in the AIO_WAIT_WHILE() loop.
However, adding new BHs between iothread_stop() and iothread_destroy()
is forbidden.
Fix this by stopping the dispatcher first before shutting down the other
parts of the monitor. This means we can now receive requests that aren't
handled any more when QEMU is shutting down, but this is unlikely to be
a problem for QMP clients.
Fixes: 357bda9590784ff75803d52de43150d4107ed98e
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Message-Id: <20210212172028.288825-2-kwolf@redhat.com>
Tested-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Diffstat (limited to 'monitor/monitor.c')
-rw-r--r-- | monitor/monitor.c | 25 |
1 files changed, 15 insertions, 10 deletions
diff --git a/monitor/monitor.c b/monitor/monitor.c index 1e4a6b3..e94f532 100644 --- a/monitor/monitor.c +++ b/monitor/monitor.c @@ -619,16 +619,6 @@ void monitor_data_destroy(Monitor *mon) void monitor_cleanup(void) { /* - * We need to explicitly stop the I/O thread (but not destroy it), - * clean up the monitor resources, then destroy the I/O thread since - * we need to unregister from chardev below in - * monitor_data_destroy(), and chardev is not thread-safe yet - */ - if (mon_iothread) { - iothread_stop(mon_iothread); - } - - /* * The dispatcher needs to stop before destroying the monitor and * the I/O thread. * @@ -637,6 +627,11 @@ void monitor_cleanup(void) * eventually terminates. qemu_aio_context is automatically * polled by calling AIO_WAIT_WHILE on it, but we must poll * iohandler_ctx manually. + * + * Letting the iothread continue while shutting down the dispatcher + * means that new requests may still be coming in. This is okay, + * we'll just leave them in the queue without sending a response + * and monitor_data_destroy() will free them. */ qmp_dispatcher_co_shutdown = true; if (!qatomic_xchg(&qmp_dispatcher_co_busy, true)) { @@ -647,6 +642,16 @@ void monitor_cleanup(void) (aio_poll(iohandler_get_aio_context(), false), qatomic_mb_read(&qmp_dispatcher_co_busy))); + /* + * We need to explicitly stop the I/O thread (but not destroy it), + * clean up the monitor resources, then destroy the I/O thread since + * we need to unregister from chardev below in + * monitor_data_destroy(), and chardev is not thread-safe yet + */ + if (mon_iothread) { + iothread_stop(mon_iothread); + } + /* Flush output buffers and destroy monitors */ qemu_mutex_lock(&monitor_lock); monitor_destroyed = true; |