From: Alexandru Elisei <alexandru.elisei@arm.com>
To: Andre Przywara <andre.przywara@arm.com>
Cc: will@kernel.org, julien.thierry.kdev@gmail.com, maz@kernel.org,
suzuki.poulose@arm.com, julien@xen.org,
linux-arm-kernel@lists.infradead.org,
kvmarm@lists.cs.columbia.edu, james.morse@arm.com
Subject: Re: [PATCH v3 kvmtool 09/13] builtin_run: Allow standard size specifiers for memory
Date: Wed, 1 Jun 2022 15:17:50 +0100 [thread overview]
Message-ID: <Ypd1DtVQwktvXITa@monolith.localdoman> (raw)
In-Reply-To: <20220601143955.55e00cfd@donnerap.cambridge.arm.com>
Hi,
Thank you for having a look! Replies below.
On Wed, Jun 01, 2022 at 02:39:55PM +0100, Andre Przywara wrote:
> On Wed, 25 May 2022 12:23:41 +0100
> Alexandru Elisei <alexandru.elisei@arm.com> wrote:
>
> Hi,
>
> > From: Suzuki K Poulose <suzuki.poulose@arm.com>
> >
> > Allow the user to use the standard B (bytes), K (kilobytes), M (megabytes),
> > G (gigabytes), T (terabytes) and P (petabytes) suffixes for memory size.
> > When none are specified, the default is megabytes.
> >
> > Also raise an error if the guest specifies 0 as the memory size, instead
> > of treating it as uninitialized, as kvmtool has done so far.
> >
> > Signed-off-by: Suzuki K Poulose <suzuki.poulose@arm.com>
> > Signed-off-by: Alexandru Elisei <alexandru.elisei@arm.com>
> > ---
> > builtin-run.c | 65 +++++++++++++++++++++++++++++++++++++++++++++++----
> > 1 file changed, 60 insertions(+), 5 deletions(-)
> >
> > diff --git a/builtin-run.c b/builtin-run.c
> > index 2ef159cdb2a3..a49698d5b2fe 100644
> > --- a/builtin-run.c
> > +++ b/builtin-run.c
> > @@ -49,9 +49,11 @@
> > #include <ctype.h>
> > #include <stdio.h>
> >
> > -#define MB_SHIFT (20)
> > #define KB_SHIFT (10)
> > +#define MB_SHIFT (20)
> > #define GB_SHIFT (30)
> > +#define TB_SHIFT (40)
> > +#define PB_SHIFT (50)
>
> Can we lose the parentheses?
Yes.
>
> >
> > __thread struct kvm_cpu *current_kvm_cpu;
> >
> > @@ -87,6 +89,60 @@ void kvm_run_set_wrapper_sandbox(void)
> > kvm_run_wrapper = KVM_RUN_SANDBOX;
> > }
> >
> > +static int parse_mem_unit(char **next)
> > +{
> > + int shift = -1;
> > +
> > + switch (**next) {
> > + case 'B': case 'b': shift = 0; break;
> > + case 'K': case 'k': shift = KB_SHIFT; break;
> > + case 'M': case 'm': shift = MB_SHIFT; break;
> > + case 'G': case 'g': shift = GB_SHIFT; break;
> > + case 'T': case 't': shift = TB_SHIFT; break;
> > + case 'P': case 'p': shift = PB_SHIFT; break;
> > + }
> > +
> > + if (shift == -1) {
> > + /* The default is megabytes. */
> > + shift = MB_SHIFT;
>
> Doesn't that look better inside the switch/case?
> default: return MB_SHIFT;
I think that change alone breaks the logic.
The code needs to advance next if and only if it matches on one of the
characters. I'll have a go at advancing next in each of the switch arms
above (with the exception of the default one, which I'll add) to see how it
ends up looking.
>
> > + } else {
> > + (*next)++;
> > + }
> > +
> > + return shift;
> > +}
> > +
> > +static u64 parse_mem_option(const char *nptr, char **next)
> > +{
> > + u64 shift;
> > + u64 val;
> > +
> > + val = strtoull(nptr, next, 10);
> > + if (errno == ERANGE)
> > + die("Memory too large: %s", nptr);
>
> strtoull does not clear errno if it succeeds, so it retains the
> previous error value. So we would need to set errno to 0 just before
> calling strtoull.
This was intentional on my part, because I was under the impression that
kvmtool treats all instances where errno != 0 as a fatal error. I think I
was wrong about that, I see at least one instance when that isn't the case,
in kvm_setup_guest_init -> extract_file. So it isn't a rule that a non-zero
errno is a fatal error.
I'll change the code to zero errno before calling strtoull.
>
> > + shift = parse_mem_unit(next);
> > +
> > + if ((val << shift) < val)
> > + die("Memory too large: %s", nptr);
> > +
> > + return val << shift;
> > +}
> > +
> > +static int mem_parser(const struct option *opt, const char *arg, int unset)
> > +{
> > + struct kvm *kvm = opt->ptr;
> > + char *next;
> > +
> > + kvm->cfg.ram_size = parse_mem_option(arg, &next);
> > + if (kvm->cfg.ram_size == 0)
> > + die("Invalid RAM size: %s", arg);
>
> Does 0 hold any significant value (anymore)? I think we die() if we
> encounter invalid values in parse_mem_option()?
strtoull does not consider an error to convert the string "0" to an
unsigned long long.
Thanks,
Alex
>
> Cheers,
> Andre
>
> > +
> > + if (*next != '\0')
> > + die("Invalid memory specifier: %s", arg);
> > +
> > + return 0;
> > +}
> > +
> > #ifndef OPT_ARCH_RUN
> > #define OPT_ARCH_RUN(...)
> > #endif
> > @@ -97,8 +153,9 @@ void kvm_run_set_wrapper_sandbox(void)
> > OPT_STRING('\0', "name", &(cfg)->guest_name, "guest name", \
> > "A name for the guest"), \
> > OPT_INTEGER('c', "cpus", &(cfg)->nrcpus, "Number of CPUs"), \
> > - OPT_U64('m', "mem", &(cfg)->ram_size, "Virtual machine memory" \
> > - " size in MB."), \
> > + OPT_CALLBACK('m', "mem", NULL, "size[BKMGTP]", \
> > + "Virtual machine memory size, by default measured" \
> > + " in megabytes (M)", mem_parser, kvm), \
> > OPT_CALLBACK('d', "disk", kvm, "image or rootfs_dir", "Disk " \
> > " image or rootfs directory", img_name_parser, \
> > kvm), \
> > @@ -522,8 +579,6 @@ static void kvm_run_validate_cfg(struct kvm *kvm)
> > pr_warning("Ignoring initrd file when loading a firmware image");
> >
> > if (kvm->cfg.ram_size) {
> > - /* User specifies RAM size in megabytes. */
> > - kvm->cfg.ram_size <<= MB_SHIFT;
> > available_ram = host_ram_size();
> > if (available_ram && kvm->cfg.ram_size > available_ram) {
> > pr_warning("Guest memory size %lluMB exceeds host physical RAM size %lluMB",
>
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2022-06-01 14:35 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-05-25 11:23 [PATCH v3 kvmtool 00/13] arm64: Allow the user to set RAM base address Alexandru Elisei
2022-05-25 11:23 ` [PATCH v3 kvmtool 01/13] Use MB for megabytes consistently Alexandru Elisei
2022-05-25 11:23 ` [PATCH v3 kvmtool 02/13] sizes.h: Make all sizes 64bit Alexandru Elisei
2022-05-30 15:05 ` Andre Przywara
2022-06-15 16:01 ` Alexandru Elisei
2022-05-25 11:23 ` [PATCH v3 kvmtool 03/13] builtin-run: Always use RAM size in bytes Alexandru Elisei
2022-05-25 11:23 ` [PATCH v3 kvmtool 04/13] builtin-run: Rework RAM size validation Alexandru Elisei
2022-05-30 17:13 ` Andre Przywara
2022-05-25 11:23 ` [PATCH v3 kvmtool 05/13] builtin-run: Add arch hook to validate VM configuration Alexandru Elisei
2022-05-25 11:23 ` [PATCH v3 kvmtool 06/13] arm/arm64: Fail if RAM size is too large for 32-bit guests Alexandru Elisei
2022-06-01 11:09 ` Andre Przywara
2022-05-25 11:23 ` [PATCH v3 kvmtool 07/13] arm/arm64: Kill the ARM_MAX_MEMORY() macro Alexandru Elisei
2022-06-01 11:14 ` Andre Przywara
2022-05-25 11:23 ` [PATCH v3 kvmtool 08/13] arm/arm64: Kill the ARM_HIMAP_MAX_MEMORY() macro Alexandru Elisei
2022-06-01 11:16 ` Andre Przywara
2022-05-25 11:23 ` [PATCH v3 kvmtool 09/13] builtin_run: Allow standard size specifiers for memory Alexandru Elisei
2022-06-01 13:39 ` Andre Przywara
2022-06-01 14:17 ` Alexandru Elisei [this message]
2022-06-01 16:14 ` Andre Przywara
2022-06-01 19:39 ` Alexandru Elisei
2022-06-01 19:42 ` Alexandru Elisei
2022-06-01 20:13 ` Alexandru Elisei
2022-06-06 10:53 ` Andre Przywara
2022-05-25 11:23 ` [PATCH v3 kvmtool 10/13] kvm__arch_init: Remove hugetlbfs_path and ram_size as parameters Alexandru Elisei
2022-06-01 13:13 ` Andre Przywara
2022-05-25 11:23 ` [PATCH v3 kvmtool 11/13] arm/arm64: Consolidate RAM initialization in kvm__init_ram() Alexandru Elisei
2022-06-01 13:20 ` Andre Przywara
2022-05-25 11:23 ` [PATCH v3 kvmtool 12/13] Introduce kvm__arch_default_ram_address() Alexandru Elisei
2022-06-01 13:21 ` Andre Przywara
2022-05-25 11:23 ` [PATCH v3 kvmtool 13/13] arm64: Allow the user to specify the RAM base address Alexandru Elisei
2022-06-01 13:39 ` Andre Przywara
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Ypd1DtVQwktvXITa@monolith.localdoman \
--to=alexandru.elisei@arm.com \
--cc=andre.przywara@arm.com \
--cc=james.morse@arm.com \
--cc=julien.thierry.kdev@gmail.com \
--cc=julien@xen.org \
--cc=kvmarm@lists.cs.columbia.edu \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=maz@kernel.org \
--cc=suzuki.poulose@arm.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox