[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 0/5] x86: properly propagate errors to hypercall callee
>>> On 09.03.11 at 12:07, Keir Fraser <keir.xen@xxxxxxxxx> wrote: > On 09/03/2011 10:53, "Jan Beulich" <JBeulich@xxxxxxxxxx> wrote: > >> This patch set makes it so that not only the offending BUG() gets >> eliminated, but also properly propagates the error to the guest, >> so that the latter can take action (which will itself require quite >> some changes to prevent crashing the guest in that situation, >> particularly where utilizing Xen's writeable page table support). > > Presumably this is from shattering superpage mappings when per-page cache > attributes change in response to a guest mapping a page with, for example, > non-WB attributes? Correct - observed with the radeon drm driver. > It seems unfortunate to propagate this to guests. Perhaps we should be > making a memory pool for Xen's 1:1 mappings, big enough to allow a 4kB > mapping of every page of RAM in the system, and allocate/free pagetables to > that pool? The overhead of this would be no more than 0.2% of system memory, > which seems reasonable to avoid an error case that is surely hard for a > guest to react to or fix. I considered this too, but wasn't convinced that's a good thing to do, no matter that the overhead is only a very small percentage. After all, one of the two points to make use of superpages is to not waste memory needlessly on page tables, the more that on a typical server you'd unlikely see many RAM pages get non-WB caching attributes set on them. That said, I nevertheless agree (and attempted to indicate that way in the description) that the kernel side changes may be non-trivial. Otoh, keeping the logic simple in Xen may also be beneficial. And, not the least, even if you indeed want to go with the pool approach you suggest, the changes in this patch set are likely good to have independently - just that they wouldn't need backporting to 4.1 and 4.0 if they turn out to be mere cleanup. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |