[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 0/5] x86: properly propagate errors to hypercall callee
On 09/03/2011 11:21, "Jan Beulich" <JBeulich@xxxxxxxxxx> wrote: >>>> On 09.03.11 at 12:07, Keir Fraser <keir.xen@xxxxxxxxx> wrote: >> On 09/03/2011 10:53, "Jan Beulich" <JBeulich@xxxxxxxxxx> wrote: >> >>> This patch set makes it so that not only the offending BUG() gets >>> eliminated, but also properly propagates the error to the guest, >>> so that the latter can take action (which will itself require quite >>> some changes to prevent crashing the guest in that situation, >>> particularly where utilizing Xen's writeable page table support). >> >> Presumably this is from shattering superpage mappings when per-page cache >> attributes change in response to a guest mapping a page with, for example, >> non-WB attributes? > > Correct - observed with the radeon drm driver. > >> It seems unfortunate to propagate this to guests. Perhaps we should be >> making a memory pool for Xen's 1:1 mappings, big enough to allow a 4kB >> mapping of every page of RAM in the system, and allocate/free pagetables to >> that pool? The overhead of this would be no more than 0.2% of system memory, >> which seems reasonable to avoid an error case that is surely hard for a >> guest to react to or fix. > > I considered this too, but wasn't convinced that's a good thing to > do, no matter that the overhead is only a very small percentage. > After all, one of the two points to make use of superpages is to > not waste memory needlessly on page tables, the more that on a > typical server you'd unlikely see many RAM pages get non-WB > caching attributes set on them. > > That said, I nevertheless agree (and attempted to indicate that way > in the description) that the kernel side changes may be non-trivial. > Otoh, keeping the logic simple in Xen may also be beneficial. The further problem is that this would change the guest interface from pagetable updates from 'guaranteed to succeed if you have not made a guest-side mistake' to 'may spuriously fail in rare cases'. That's a big difference! I wonder what the scope of the problem really is. Mostly this cacheattr stuff applies to memory allocated by a graphics driver I suppose, and probably at boot time in dom0. I wonder how the bug was observed during dom0 boot given that Xen chooses a default dom0 memory allocation that leaves enough memory free for a decent-sized dom0 SWIOTLB plus some extra slack on top of that. Any idea how the Xen memory pool happened to be entirely empty at the time radeon drm driver caused the superpage shattering to occur? I'm not against turning the host crash into a guest crash (which I think is typically what is going to happen, although I suppose at least some Linux driver-related mapping/remapping functions can handle failure) as this might be an improvement when starting up non-dom0 driver domains for example. But I think we should consider punting a resource error up to the guest as a very bad thing and still WARN_ON or otherwise log the situation to Xen's own console. -- Keir > And, not the least, even if you indeed want to go with the pool > approach you suggest, the changes in this patch set are likely > good to have independently - just that they wouldn't need > backporting to 4.1 and 4.0 if they turn out to be mere cleanup. > > Jan > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |