[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4 02/21] xen: make two memory hypercalls vNUMA-aware
On Fri, Jan 23, 2015 at 01:16:19PM +0000, Jan Beulich wrote: > >>> On 23.01.15 at 12:13, <wei.liu2@xxxxxxxxxx> wrote: > > Make XENMEM_increase_reservation and XENMEM_populate_physmap > > vNUMA-aware. > > > > That is, if guest requests Xen to allocate memory for specific vnode, > > Xen can translate vnode to pnode using vNUMA information of that guest. > > > > XENMEMF_vnode is introduced for the guest to mark the node number is in > > fact virtual node number and should be translated by Xen. > > > > XENFEAT_memory_op_vnode_supported is introduced to indicate that Xen is > > able to translate virtual node to physical node. > > > > Signed-off-by: Wei Liu <wei.liu2@xxxxxxxxxx> > > Acked-by: Jan Beulich <JBeulich@xxxxxxxx> > > I'm afraid there's another change needed for this to hold: > > > --- a/xen/common/memory.c > > +++ b/xen/common/memory.c > > @@ -692,6 +692,50 @@ out: > > return rc; > > } > > > > +static int translate_vnode_to_pnode(struct domain *d, > > + struct xen_memory_reservation *r, > > + struct memop_args *a) > > +{ > > + int rc = 0; > > + unsigned int vnode, pnode; > > + > > + /* > > + * Note: we don't strictly require non-supported bits set to zero, > > + * so we may have exact_vnode bit set for old guests that don't > > + * support vNUMA. > > + * > > + * To distinguish spurious vnode request v.s. real one, check if > > + * d->vnuma exists. > > + */ > > + if ( r->mem_flags & XENMEMF_vnode ) > > + { > > + read_lock(&d->vnuma_rwlock); > > + if ( d->vnuma ) > > if r->mem_flags has XENMEMF_vnode set but d->vnuma is NULL, > you need to clear the node from the flags. > As said in the comment, we don't seem to enforce non-supported bits set to zero (IIRC you told me that). So an old guest that sets XENMEMF_vnode by accident will get its other flags cleared if I follow your suggestion. > > + { > > + vnode = XENMEMF_get_node(r->mem_flags); > > + > > + if ( vnode < d->vnuma->nr_vnodes ) > > + { > > + pnode = d->vnuma->vnode_to_pnode[vnode]; > > + > > + a->memflags &= > > + ~MEMF_node(XENMEMF_get_node(r->mem_flags)); > > I.e. this one needs to be pulled up, and probably include > MEMF_exact_node. > > > @@ -747,6 +787,16 @@ long do_memory_op(unsigned long cmd, > > XEN_GUEST_HANDLE_PARAM(void) arg) > > return start_extent; > > args.domain = d; > > > > + args.memflags |= > > MEMF_node(XENMEMF_get_node(reservation.mem_flags)); > > + if ( reservation.mem_flags & XENMEMF_exact_node_request ) > > + args.memflags |= MEMF_exact_node; > > Since you force MEMF_exact_node when XENMEMF_vnode (and the > necessary data is available), I also wonder whether the combination > of both flags in what the caller requests should be forbidden (to > potentially obtain some specific meaning in the future). Or > alternatively don't enforce the former? > We can't forbid guests from setting both flags, the reason is the same as above. So don't enforce the MEMF_exact_node seems when XENMEMF_vnode seems the way to go. Wei. > Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |