[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v2 00/13] x86: more or less log-dirty related improvements


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Mon, 5 Jul 2021 17:09:30 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5buNUgj+0oVWdtvoqKZy3ZklKKtVIW8m9kzUCtBgzHw=; b=MllU1UZF7dAS8ngAhmZXe4gSN8HdRlugMitx3dL09/WzSeJMpSbiM4vh+gg2kg4kCkvI58hsmst8KBPolpU7dCWT/Txiy2aHW5KSoR9wh0U3fQUev0jbB9tBfdle4rH8nlbe+qVAsX2Y1C/lXV5cZwwB/lExFq0Lz0EjlruneIDkQQEyXF3L6BX+9eSfQkfENp4TLxF7lbWqOMYrFQf7qRlbkj3XO4s9t/2K8iCIAEcat2KREj2WcBeQmgDbZhSsTPab6d6sj46K0fzCaRLBf7EZv3MiZBxm0puvkJsqefmaPDgAjeRYKKpM5T3r2tits0gtbO1D6FsXn64+VUxbEQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jAyiqCDOQ7s6l35fvf3Ps6ZxyqfFzPPWX4z/6rzuBIhkib4a9xwCwKY7/Qx1Ha8thTAFKRYkbuUsHbJkr9ftaOMtoeSEu/Ruva9F+4eiHnRY1Uda2SwW5T6cBK/RsSx1W12AuXBKBjh0JEBJBuMlpPs5foO8cS8fM4BiF/7UziVlrI7b0ZZm+QipkhE5dtg0DB2fuukPlpNJTqJO4wAZH++0yiguef+foCo9K20Z6lgFw3HuM70di8C9s2uwWGUkB+YQ3aJgZXzSlX7k0I9FdX1cpJ+ltsJVMsGZsbTJWVpJH86R7pbwldY/boxJlLnTNoT6vMWlSN5WikcsXRxcIA==
  • Authentication-results: xenproject.org; dkim=none (message not signed) header.d=none;xenproject.org; dmarc=none action=none header.from=suse.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>
  • Delivery-date: Mon, 05 Jul 2021 15:09:55 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

... or so I hope. This series continues the attempt to deal with
the ovmf change putting the shared info page at a very high address
(which is now planned to get reverted there, but the general
problem doesn't go away by them doing so). There are further issues
with truncated value, which are being dealt with here. But there
are also not directly related changes, when I simply spotted things
that aren't very likely to be right the way they are. And then
there are also adjustments to the underlying hypervisor
implementation, with the goal of making the returned data more
useful to the consumers.

With these changes in place, a 1Gb guest which has "inflated"
itself by putting a page right below the 16Tb boundary migrates
successfully, albeit the process takes from some 20 minutes to over
half an hour on my test system.

In v2, besides integrating 2 patches that were previously sent,
there's one new patch and otherwise review feedback addressed
(albeit there wasn't any for a number of patches).

01: libxl/x86: check return value of SHADOW_OP_SET_ALLOCATION domctl
02: libxc: split xc_logdirty_control() from xc_shadow_control()
03: libxenguest: deal with log-dirty op stats overflow
04: libxenguest: short-circuit "all-dirty" handling
05: libxenguest: avoid allocating unused deferred-pages bitmap
06: libxenguest: complete loops in xc_map_domain_meminfo()
07: libxenguest: guard against overflow from too large p2m when checkpointing
08: libxenguest: fix off-by-1 in colo-secondary-bitmap merging
09: libxenguest: restrict PV guest size
10: libxc: simplify HYPERCALL_BUFFER()
11: x86/paging: supply more useful log-dirty page count
12: x86/mm: update log-dirty bitmap when manipulating P2M
13: SUPPORT.md: write down restriction of 32-bit tool stacks

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.