[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] Prevent changing a memory size of Domain-0 evenif users make a careless mistake
>>> Masaki Kanno <kanno.masaki@xxxxxxxxxxxxxx> 04.04.08 12:06 >>> >If users accidentally change a memory size of Domain-0 to very small >memory size by xm mem-set command, users will be not able to operate >Domain-0. I think that Domain-0 is important for Xen, so I'd like to >prevent the accident by xm mem-set command. Each domain, in my opinion, should also be able to protect itself from being ballooned down too much. We have been carrying a respective patch for quite a while. Since originally it wasn't written by me, I never tried to push it. Nevertheless, I'm showing it below to see whether others would think it makes sense. Jan From: ksrinivasan@xxxxxxxxxx Subject: Don't allow ballooning down a domain below a reasonable limit. References: 172482 Reasonable is hard to judge; we don't want to disallow small domains. But the system needs a reasonable amount of memory to perform its duties, set up tables, etc. If on the other hand, the admin is able to set up and boot up correctly a very small domain, there's no point in forcing it to be larger. We end up with some kind of logarithmic function, approximated. Memory changes are logged, so making domains too small should at least result in a trace. Signed-off-by: Kurt Garloff <garloff@xxxxxxx> Index: head-2008-02-20/drivers/xen/balloon/balloon.c =================================================================== --- head-2008-02-20.orig/drivers/xen/balloon/balloon.c 2008-02-20 10:32:43.000000000 +0100 +++ head-2008-02-20/drivers/xen/balloon/balloon.c 2008-02-20 10:40:54.000000000 +0100 @@ -194,6 +194,42 @@ static unsigned long current_target(void return target; } +static unsigned long minimum_target(void) +{ + unsigned long min_pages; + unsigned long curr_pages = current_target(); +#ifndef CONFIG_XEN +#define max_pfn totalram_pages +#endif + +#define MB2PAGES(mb) ((mb) << (20 - PAGE_SHIFT)) + /* Simple continuous piecewiese linear function: + * max MiB -> min MiB gradient + * 0 0 + * 16 16 + * 32 24 + * 128 72 (1/2) + * 512 168 (1/4) + * 2048 360 (1/8) + * 8192 552 (1/32) + * 32768 1320 + * 131072 4392 + */ + if (max_pfn < MB2PAGES(128)) + min_pages = MB2PAGES(8) + (max_pfn >> 1); + else if (max_pfn < MB2PAGES(512)) + min_pages = MB2PAGES(40) + (max_pfn >> 2); + else if (max_pfn < MB2PAGES(2048)) + min_pages = MB2PAGES(104) + (max_pfn >> 3); + else + min_pages = MB2PAGES(296) + (max_pfn >> 5); +#undef MB2PAGES + + /* Don't enforce growth */ + return min_pages < curr_pages ? min_pages : curr_pages; +#undef max_pfn +} + static int increase_reservation(unsigned long nr_pages) { unsigned long pfn, i, flags; @@ -382,6 +418,17 @@ static void balloon_process(struct work_ /* Resets the Xen limit, sets new target, and kicks off processing. */ void balloon_set_new_target(unsigned long target) { + /* First make sure that we are not lowering the value below the + * "minimum". + */ + unsigned long min_pages = minimum_target(); + + if (target < min_pages) + target = min_pages; + + printk(KERN_INFO "Setting mem allocation to %lu kiB\n", + PAGES2KB(target)); + /* No need for lock. Not read-modify-write updates. */ bs.hard_limit = ~0UL; bs.target_pages = target; _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |