[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 0/5] allow xc_domain_maximum_gpfn() to observe full GFN value


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Fri, 18 Jun 2021 12:20:58 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dAYCbiHz5W5de7kCOn2UsXKOpDE9eB18Ff1fPYV212I=; b=DJ7BH0L9TrbJR8pt4ex5xyySk/lVI118/aeHq+9kImMUVdDhzoLSUfzcvmackcyGEEgkYy7h3nFUsSeYfBjmWqCYApN3fn+fo2gYnsDJDzaaexdXPcTIyA/6krKeIAgxbiAJ9l4fAjbYME7+pXu8wUzl7f8VIJW1MhnxlKVZOLiCe6Srz9lgBsUbz4ENJ7eHw1rSBduUhM0UYkSuIWwsn95SHtfNDzU0D8lVFKcBjYWy7F371sieHGLQVXGUwSqPyRg2LoHU1aJsiYL7gMns+AAe24tSj5GzGgMm0GqDbtQfSAiMy/M0aotHgjWIINwHLu8dbQp2atsT25Eu9q+T5w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=J1nhdtDduAVF4aythp+atH//rtvnSiSOvZb6nWjvrrpI5PadJ+0jLvyxJRauY2QxFDLwM/39SClHRYDRtVa9YfJ4tSyDD8Fju0W4vcu/WNXKmLWbWjjowXmtMWxdSfMGaQzBXS4zyZ0Rwgsqlpmnjh+dXT97I2otquA0jTU90El2lOWzvln+sUkBp78vUvNkPSOnJ7krLQkMLYwzz5DwSMfI7oj+H/CZc4QrwCFYbbh6hkzA3lTrPd3bpszRp9tkDiK2fbY4e165g9sf+TFh1R94Nz2zOjhZIXIUawNTXGjlXMDN13YPHyE+YSYCkeE1K5QVgElfDUTl7zsYl2ucPA==
  • Authentication-results: suse.com; dkim=none (message not signed) header.d=none;suse.com; dmarc=none action=none header.from=suse.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>
  • Delivery-date: Fri, 18 Jun 2021 10:21:11 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

The present remaining osstest failures are due to truncation of the GFN
resulting from the hypercall return value being passed back through the
ioctl() return value (on Linux and Solaris), which is "int", plus the
same for some further internal interfaces (osdep_hypercall(),
xencall<N>()). Some of the memory-op sub-ops, like the one involved
here, may pass back values which don't fit into "int".

Different effects can be observed with a 32- and 64-bit tool stack,
each causing one test to fail. The changes here will only deal with
the truncation resulting when sizeof(int) < sizeof(long), i.e. only on
64-bit. For the 32-bit tool stack case to work in such a situation,
yet uglier hackery would be needed. But even if the full value got
passed back, we'd then hit:

#ifdef __i386__
    /* Very large domains (> 1TB) will exhaust virtual address space. */
    if ( nr_pfns > 0x0fffffff )
    {
        errno = E2BIG;
        PERROR("Cannot save this big a guest");
        return -1;
    }
#endif

in xg_sr_save_x86_hvm.c:x86_hvm_setup() (and there's a similar check
on the restore path).

I wonder in how far a guest property can legitimately cause an osstest
push to be prevented by causing a failure like this one. And of course
I'm also puzzled by the ovmf change having managed to make it through
its push gate.

Note that I can't tell at this point whether there aren't further
issues, as I've not actually tried the ovmf case. I could easily see
there being oom issues there then, once to full value gets used for
setting up the p2m monitoring during migration. Or processing might
then take overly long.

1: x86/HVM: wire up multicalls
2: libxencall: osdep_hypercall() should return long
3: libxencall: introduce variant of xencall2() returning long
4: libxc: use multicall for memory-op on Linux (and Solaris)
5: libxc: make xc_domain_maximum_gpfn() endianness-agnostic

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.