|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2 3/8] xen: delay allocation of grant table sub structures
Delay the allocation of the grant table sub structures in order to
allow modifying parameters needed for sizing of these structures at a
per domain basis. Either do it from gnttab_setup_table() or just
before the domain is started the first time.
Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
---
xen/common/domain.c | 17 +++++-
xen/common/grant_table.c | 139 ++++++++++++++++++++++++------------------
xen/include/xen/grant_table.h | 2 +
3 files changed, 97 insertions(+), 61 deletions(-)
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 5aebcf265f..11eb1778a3 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -363,6 +363,9 @@ struct domain *domain_create(domid_t domid, unsigned int
domcr_flags,
goto fail;
init_status |= INIT_gnttab;
+ if ( domid == 0 && grant_table_init(d) )
+ goto fail;
+
poolid = 0;
err = -ENOMEM;
@@ -998,7 +1001,8 @@ int __domain_pause_by_systemcontroller(struct domain *d,
prev = cmpxchg(&d->controller_pause_count, old, new);
} while ( prev != old );
- pause_fn(d);
+ if ( pause_fn )
+ pause_fn(d);
return 0;
}
@@ -1006,6 +1010,7 @@ int __domain_pause_by_systemcontroller(struct domain *d,
int domain_unpause_by_systemcontroller(struct domain *d)
{
int old, new, prev = d->controller_pause_count;
+ int ret;
do
{
@@ -1029,8 +1034,16 @@ int domain_unpause_by_systemcontroller(struct domain *d)
* Creation is considered finished when the controller reference count
* first drops to 0.
*/
- if ( new == 0 )
+ if ( new == 0 && !d->creation_finished )
+ {
+ ret = grant_table_init(d);
+ if ( ret )
+ {
+ __domain_pause_by_systemcontroller(d, NULL);
+ return ret;
+ }
d->creation_finished = true;
+ }
domain_unpause(d);
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index a94dfdda7b..b50c334f70 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -1719,6 +1719,78 @@ active_alloc_failed:
return 0;
}
+int
+grant_table_init(struct domain *d)
+{
+ struct grant_table *gt = d->grant_table;
+ unsigned int i, j;
+
+ if ( gt->nr_grant_frames )
+ return 0;
+
+ gt->nr_grant_frames = INITIAL_NR_GRANT_FRAMES;
+
+ /* Active grant table. */
+ if ( (gt->active = xzalloc_array(struct active_grant_entry *,
+ max_nr_active_grant_frames)) == NULL )
+ goto no_mem_1;
+ for ( i = 0;
+ i < num_act_frames_from_sha_frames(INITIAL_NR_GRANT_FRAMES); i++ )
+ {
+ if ( (gt->active[i] = alloc_xenheap_page()) == NULL )
+ goto no_mem_2;
+ clear_page(gt->active[i]);
+ for ( j = 0; j < ACGNT_PER_PAGE; j++ )
+ spin_lock_init(>->active[i][j].lock);
+ }
+
+ /* Tracking of mapped foreign frames table */
+ gt->maptrack = vzalloc(max_maptrack_frames * sizeof(*gt->maptrack));
+ if ( gt->maptrack == NULL )
+ goto no_mem_2;
+
+ /* Shared grant table. */
+ if ( (gt->shared_raw = xzalloc_array(void *, max_grant_frames)) == NULL )
+ goto no_mem_3;
+ for ( i = 0; i < INITIAL_NR_GRANT_FRAMES; i++ )
+ {
+ if ( (gt->shared_raw[i] = alloc_xenheap_page()) == NULL )
+ goto no_mem_4;
+ clear_page(gt->shared_raw[i]);
+ }
+
+ /* Status pages for grant table - for version 2 */
+ gt->status = xzalloc_array(grant_status_t *,
+ grant_to_status_frames(max_grant_frames));
+ if ( gt->status == NULL )
+ goto no_mem_4;
+
+ for ( i = 0; i < INITIAL_NR_GRANT_FRAMES; i++ )
+ gnttab_create_shared_page(d, gt, i);
+
+ gt->nr_status_frames = 0;
+
+ return 0;
+
+ no_mem_4:
+ for ( i = 0; i < INITIAL_NR_GRANT_FRAMES; i++ )
+ free_xenheap_page(gt->shared_raw[i]);
+ xfree(gt->shared_raw);
+ gt->shared_raw = NULL;
+ no_mem_3:
+ vfree(gt->maptrack);
+ gt->maptrack = NULL;
+ no_mem_2:
+ for ( i = 0;
+ i < num_act_frames_from_sha_frames(INITIAL_NR_GRANT_FRAMES); i++ )
+ free_xenheap_page(gt->active[i]);
+ xfree(gt->active);
+ gt->active = NULL;
+ no_mem_1:
+ gt->nr_grant_frames = 0;
+ return -ENOMEM;
+}
+
static long
gnttab_setup_table(
XEN_GUEST_HANDLE_PARAM(gnttab_setup_table_t) uop, unsigned int count)
@@ -1764,7 +1836,14 @@ gnttab_setup_table(
grant_write_lock(gt);
if ( gt->gt_version == 0 )
+ {
+ if ( grant_table_init(d) )
+ {
+ op.status = GNTST_general_error;
+ goto unlock;
+ }
gt->gt_version = 1;
+ }
if ( (op.nr_frames > nr_grant_frames(gt) ||
((gt->gt_version > 1) &&
@@ -3378,75 +3457,17 @@ grant_table_create(
struct domain *d)
{
struct grant_table *t;
- unsigned int i, j;
if ( (t = xzalloc(struct grant_table)) == NULL )
- goto no_mem_0;
+ return -ENOMEM;
/* Simple stuff. */
percpu_rwlock_resource_init(&t->lock, grant_rwlock);
spin_lock_init(&t->maptrack_lock);
- t->nr_grant_frames = INITIAL_NR_GRANT_FRAMES;
-
- /* Active grant table. */
- if ( (t->active = xzalloc_array(struct active_grant_entry *,
- max_nr_active_grant_frames)) == NULL )
- goto no_mem_1;
- for ( i = 0;
- i < num_act_frames_from_sha_frames(INITIAL_NR_GRANT_FRAMES); i++ )
- {
- if ( (t->active[i] = alloc_xenheap_page()) == NULL )
- goto no_mem_2;
- clear_page(t->active[i]);
- for ( j = 0; j < ACGNT_PER_PAGE; j++ )
- spin_lock_init(&t->active[i][j].lock);
- }
-
- /* Tracking of mapped foreign frames table */
- t->maptrack = vzalloc(max_maptrack_frames * sizeof(*t->maptrack));
- if ( t->maptrack == NULL )
- goto no_mem_2;
-
- /* Shared grant table. */
- if ( (t->shared_raw = xzalloc_array(void *, max_grant_frames)) == NULL )
- goto no_mem_3;
- for ( i = 0; i < INITIAL_NR_GRANT_FRAMES; i++ )
- {
- if ( (t->shared_raw[i] = alloc_xenheap_page()) == NULL )
- goto no_mem_4;
- clear_page(t->shared_raw[i]);
- }
-
- /* Status pages for grant table - for version 2 */
- t->status = xzalloc_array(grant_status_t *,
- grant_to_status_frames(max_grant_frames));
- if ( t->status == NULL )
- goto no_mem_4;
-
- for ( i = 0; i < INITIAL_NR_GRANT_FRAMES; i++ )
- gnttab_create_shared_page(d, t, i);
-
- t->nr_status_frames = 0;
/* Okay, install the structure. */
d->grant_table = t;
return 0;
-
- no_mem_4:
- for ( i = 0; i < INITIAL_NR_GRANT_FRAMES; i++ )
- free_xenheap_page(t->shared_raw[i]);
- xfree(t->shared_raw);
- no_mem_3:
- vfree(t->maptrack);
- no_mem_2:
- for ( i = 0;
- i < num_act_frames_from_sha_frames(INITIAL_NR_GRANT_FRAMES); i++ )
- free_xenheap_page(t->active[i]);
- xfree(t->active);
- no_mem_1:
- xfree(t);
- no_mem_0:
- return -ENOMEM;
}
void
diff --git a/xen/include/xen/grant_table.h b/xen/include/xen/grant_table.h
index 43b07e60c5..84a8d61616 100644
--- a/xen/include/xen/grant_table.h
+++ b/xen/include/xen/grant_table.h
@@ -35,6 +35,8 @@ extern unsigned int max_grant_frames;
/* Create/destroy per-domain grant table context. */
int grant_table_create(
struct domain *d);
+int grant_table_init(
+ struct domain *d);
void grant_table_destroy(
struct domain *d);
void grant_table_init_vcpu(struct vcpu *v);
--
2.12.3
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |