[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1367246649.3142.316.camel@zakaz.uk.xensource.com>
Date: Mon, 29 Apr 2013 15:44:09 +0100
From: Ian Campbell <Ian.Campbell@...rix.com>
To: Daniel Kiper <daniel.kiper@...cle.com>
CC: "carsten@...iers.de" <carsten@...iers.de>,
"darren.s.shepherd@...il.com" <darren.s.shepherd@...il.com>,
David Vrabel <david.vrabel@...rix.com>,
"Ian Jackson" <Ian.Jackson@...citrix.com>,
"james-xen@...gwall.me.uk" <james-xen@...gwall.me.uk>,
"konrad.wilk@...cle.com" <konrad.wilk@...cle.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"xen-devel@...ts.xensource.com" <xen-devel@...ts.xensource.com>
Subject: Re: [PATCH v2 2/2] xen/balloon: Enforce various limits on target
On Mon, 2013-04-29 at 12:37 +0100, Daniel Kiper wrote:
> This patch enforces on target limit statically defined in Linux Kernel
> source and limit defined by hypervisor or host. This way the balloon
> driver should not attempt to populate pages above given limits
> because they may fail.
>
> Particularly this patch fixes bug which led to flood
> of dom0 kernel log with messages similar to:
>
> System RAM resource [mem 0x1b8000000-0x1bfffffff] cannot be added
> xen_balloon: reserve_additional_memory: add_memory() failed: -17
I think it would be OK to simply tone down this message (and perhaps add
the failed pages to the balloon, if that makes sense). This isn't
dissimilar to increase_reservation failing.
> +/*
> + * Extra internal memory reserved by libxl.
> + * Check tools/libxl/libxl_memory.txt file in Xen source for more details.
> + */
> +#define LIBXL_MAXMEM_CONSTANT_PAGES (1024 * 1024 / PAGE_SIZE)
I think we need to find a way to achieve your aims which doesn't require
leaking internal implementation details of libxl into the guest kernels.
What happens if libxl decides to double this?
> +
> #ifdef CONFIG_HIGHMEM
> #define inc_totalhigh_pages() (totalhigh_pages++)
> #define dec_totalhigh_pages() (totalhigh_pages--)
> @@ -491,11 +496,42 @@ static void balloon_process(struct work_struct *work)
> mutex_unlock(&balloon_mutex);
> }
>
> -/* Resets the Xen limit, sets new target, and kicks off processing. */
> +/* Enforce limits, set new target and kick off processing. */
> void balloon_set_new_target(unsigned long target)
> {
> + domid_t domid = DOMID_SELF;
> + int rc;
> +
> + /* Enforce statically defined limit. */
> + target = min(target, MAX_DOMAIN_PAGES);
> +
> + rc = HYPERVISOR_memory_op(XENMEM_maximum_reservation, &domid);
> +
> + if (xen_initial_domain()) {
> + if (rc <= 0) {
> + pr_debug("xen_balloon: %s: Initial domain target limit "
> + "could not be established: %i\n",
> + __func__, rc);
> + goto no_host_limit;
> + }
> + } else {
> + if (rc <= 0) {
> + pr_info("xen_balloon: %s: Guest domain target limit "
> + "could not be established: %i\n", __func__, rc);
> + goto no_host_limit;
> + }
> +
> + /* Do not take into account memory reserved for internal stuff. */
> + rc -= LIBXL_MAXMEM_CONSTANT_PAGES;
> + }
Why is this needed? Wouldn't it be a toolstack bug to set the target
greater than this limit? But if it did ask then it would no doubt be
expecting the guest to try and reach that limit (perhaps it intends to
raise the maximum later?).
In any case it should be handled the same way as a failure in
increase_reservation is always handled, shouldn't it? No need for a
special case.
I don't think this change has anything to do with the add_memory()
failure you mention in the commit message.
> +
> + /* Enforce hypervisor/host defined limit. */
> + target = min_t(unsigned long, target, rc);
> +
> +no_host_limit:
> /* No need for lock. Not read-modify-write updates. */
> balloon_stats.target_pages = target;
> +
> schedule_delayed_work(&balloon_worker, 0);
> }
> EXPORT_SYMBOL_GPL(balloon_set_new_target);
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists