[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v5 6/8] xen: add new domctl hypercall to set grant table resource limits
>>> On 11.09.17 at 12:48, <jgross@xxxxxxxx> wrote: > On 08/09/17 17:55, Jan Beulich wrote: >>>>> On 08.09.17 at 08:56, <jgross@xxxxxxxx> wrote: >>> --- a/xen/common/grant_table.c >>> +++ b/xen/common/grant_table.c >>> @@ -3667,6 +3667,32 @@ void grant_table_init_vcpu(struct vcpu *v) >>> v->maptrack_tail = MAPTRACK_TAIL; >>> } >>> >>> +int grant_table_set_limits(struct domain *d, unsigned int grant_frames, >>> + unsigned int maptrack_frames) >>> +{ >>> + struct grant_table *gt = d->grant_table; >>> + int ret = -EBUSY; >>> + >>> + if ( !gt ) >>> + return -EEXIST; >> >> How does EEXIST represent the error condition? > > Yes, this was a bad choice. What about ENOENT? Fine with me. Or ENODEV. >>> + ret = 0; >>> + if ( grant_frames ) >>> + gt->max_grant_frames = grant_frames; >>> + if ( maptrack_frames ) >>> + gt->max_maptrack_frames = maptrack_frames; >> >> Together with what I have said regarding making the invocation >> of this domctl mandatory, I think these two shouldn't be conditional. >> In particular for maptrack I also don't see why a domain couldn't >> do with a limit of zero, as long as it's not serving as a backend for >> another guest. > > Okay, then I'd need to specify a "take hypervisor default" value (e.g. > ~0) in order to handle the case where no value was specified in the > domain's config file. Well, part of the point I was trying to make in earlier replies on other patches of this series is that I think the lack of a guest config file setting should not invoke a _hypervisor_ default. Instead, the tool stack should establish a sensible one. > The question would be then: do we want to set maptrack to 0 as default > and require it to be specified for backend domains (driver domains, > stubdoms)? I think so, yes. Question is whether there's a way for the tool stack to easily recognize a driver domain when it's being created. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |