Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1890786imm; Tue, 22 May 2018 10:59:55 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrYBA6GW36u+ifm87mj4cPQNrMfTVoS4lGox3AcG+uUjN9hOBmSan1cxYLHRy8qWKO0WhfH X-Received: by 2002:a17:902:7008:: with SMTP id y8-v6mr25516998plk.141.1527011995467; Tue, 22 May 2018 10:59:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527011995; cv=none; d=google.com; s=arc-20160816; b=GuoRMci5YP0XmxnPiqAZfNoRKdkpSBRRRxu54DYNbJ89bCaTu/cZu2VvfNlVGaQV7+ jp3sVoovLp4eOTHreIzEz1lWQJtsgIP2ZLUaJ7DR8lhYYj8i79St3uNObNeDhU0HTzXy QPzbuEY5fFJmdiDGsKGLELDaIo9Ky28s0Cw+K6rtjL+sf2ekfP/MX76cyM/iH1e4Id1k 22vtTmSdBUaO+PyXINhqx4kQ4oSJFDIXp6DW3qVg3C/lX3GeuZojcstKg11k53QoF7Dk OSCOn/PmS6l9Q5bxhup03NIaINH/A/ZQrkQRAo5q4O9AjxzpGixyB5rdQY+lBAFgtP9b 7Z8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject :dkim-signature:arc-authentication-results; bh=R0MKjLB00k5RlbqWbVXovpszUpiUYvqTzXdarBDX0I0=; b=KvEm6rwbivdka1JQ3dNQzyVG2rD0+wJep9WKVPZy8cspazSrLfg05dWFl5+CtfxjB3 kR7Coa59LP4jw+ddYDuHOmXR5tP1cGkMssk6nRBYJegxezRlU7gy8J9e3J5xoDF521gt iNYP8cv5+1+tX2+LcSgRQ6qbwkOJh9P72TX0gbkFVKx+ky9UxMrIRgmhy0fJw6NgGz7Q EsH695ZxDNBalhpS3QQnAKT1s95ffNtrEhTFzIGOrJOBfI6bAUeuQn1wsDHomptz0gdn 7SsyZfp7x2uyutqfnIlwY+uEAqe+D4YO9q6Uqr4xZBQz0aHzPx9lYQYISQVS/R8Kyh/6 dR0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=ZvA/N72N; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a98-v6si16782463pla.239.2018.05.22.10.59.40; Tue, 22 May 2018 10:59:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=ZvA/N72N; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752599AbeEVR7A (ORCPT + 99 others); Tue, 22 May 2018 13:59:00 -0400 Received: from userp2130.oracle.com ([156.151.31.86]:40022 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752512AbeEVR66 (ORCPT ); Tue, 22 May 2018 13:58:58 -0400 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w4MHouuE187121; Tue, 22 May 2018 17:58:46 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2017-10-26; bh=R0MKjLB00k5RlbqWbVXovpszUpiUYvqTzXdarBDX0I0=; b=ZvA/N72NFpetVcy6S/bEQwfwFgfdUx7OFNH/KWz/pvkY24LgAeSRzwaTsMkEirfq8gZa O8/y+XmMEiscRBFhySKO4pEoq6LRj/EaWqah86EJ7Coh8taMK0927VcBFEQSp2q6M+5q WNTjRH7KfX0K2ulKR1Sw9oyuFkvKwoKPU9sUdcy9KOfzx/sxFxOSi/ToA5psykjVbh38 Sf5yAVlErDVrLkX0//PaOiIYdvWPm4wOgL40L5WMFRCc3TYAPqFJFxBI9wRU/RjI0dLZ iTIV9tOYtGgsQUXJf0pb68XHiAKrmlH0nhO6uObPl3Vzu+ANPJHZhHH6PyUPvZJ3PB43 iA== Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by userp2130.oracle.com with ESMTP id 2j4nh7guy4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 22 May 2018 17:58:46 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w4MHwklY026761 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 22 May 2018 17:58:46 GMT Received: from abhmp0002.oracle.com (abhmp0002.oracle.com [141.146.116.8]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w4MHwjCS025176; Tue, 22 May 2018 17:58:45 GMT Received: from dhcp-burlington7-2nd-B-east-10-152-55-162.usdhcp.oraclecorp.com (/10.152.32.65) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 22 May 2018 10:58:45 -0700 Subject: Re: [Xen-devel] [RFC 1/3] xen/balloon: Allow allocating DMA buffers To: Oleksandr Andrushchenko , Oleksandr Andrushchenko , xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, jgross@suse.com, konrad.wilk@oracle.com Cc: daniel.vetter@intel.com, matthew.d.roper@intel.com, dongwon.kim@intel.com References: <20180517082604.14828-1-andr2000@gmail.com> <20180517082604.14828-2-andr2000@gmail.com> <6a108876-19b7-49d0-3de2-9e10f984736c@oracle.com> <9541926e-001a-e41e-317c-dbff6d687761@gmail.com> <218e2bf7-490d-f89e-9866-27b7e3dbc835@oracle.com> <77c20852-b9b8-c35a-26b0-b0317e6aba09@gmail.com> <2a88de28-27ef-8fe4-ddc1-35eb9e698567@gmail.com> From: Boris Ostrovsky Openpgp: preference=signencrypt Autocrypt: addr=boris.ostrovsky@oracle.com; prefer-encrypt=mutual; keydata= xsFNBFH8CgsBEAC0KiOi9siOvlXatK2xX99e/J3OvApoYWjieVQ9232Eb7GzCWrItCzP8FUV PQg8rMsSd0OzIvvjbEAvaWLlbs8wa3MtVLysHY/DfqRK9Zvr/RgrsYC6ukOB7igy2PGqZd+M MDnSmVzik0sPvB6xPV7QyFsykEgpnHbvdZAUy/vyys8xgT0PVYR5hyvhyf6VIfGuvqIsvJw5 C8+P71CHI+U/IhsKrLrsiYHpAhQkw+Zvyeml6XSi5w4LXDbF+3oholKYCkPwxmGdK8MUIdkM d7iYdKqiP4W6FKQou/lC3jvOceGupEoDV9botSWEIIlKdtm6C4GfL45RD8V4B9iy24JHPlom woVWc0xBZboQguhauQqrBFooHO3roEeM1pxXjLUbDtH4t3SAI3gt4dpSyT3EvzhyNQVVIxj2 FXnIChrYxR6S0ijSqUKO0cAduenhBrpYbz9qFcB/GyxD+ZWY7OgQKHUZMWapx5bHGQ8bUZz2 SfjZwK+GETGhfkvNMf6zXbZkDq4kKB/ywaKvVPodS1Poa44+B9sxbUp1jMfFtlOJ3AYB0WDS Op3d7F2ry20CIf1Ifh0nIxkQPkTX7aX5rI92oZeu5u038dHUu/dO2EcuCjl1eDMGm5PLHDSP 0QUw5xzk1Y8MG1JQ56PtqReO33inBXG63yTIikJmUXFTw6lLJwARAQABzTNCb3JpcyBPc3Ry b3Zza3kgKFdvcmspIDxib3Jpcy5vc3Ryb3Zza3lAb3JhY2xlLmNvbT7CwXgEEwECACIFAlH8 CgsCGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEIredpCGysGyasEP/j5xApopUf4g 9Fl3UxZuBx+oduuw3JHqgbGZ2siA3EA4bKwtKq8eT7ekpApn4c0HA8TWTDtgZtLSV5IdH+9z JimBDrhLkDI3Zsx2CafL4pMJvpUavhc5mEU8myp4dWCuIylHiWG65agvUeFZYK4P33fGqoaS VGx3tsQIAr7MsQxilMfRiTEoYH0WWthhE0YVQzV6kx4wj4yLGYPPBtFqnrapKKC8yFTpgjaK jImqWhU9CSUAXdNEs/oKVR1XlkDpMCFDl88vKAuJwugnixjbPFTVPyoC7+4Bm/FnL3iwlJVE qIGQRspt09r+datFzPqSbp5Fo/9m4JSvgtPp2X2+gIGgLPWp2ft1NXHHVWP19sPgEsEJXSr9 tskM8ScxEkqAUuDs6+x/ISX8wa5Pvmo65drN+JWA8EqKOHQG6LUsUdJolFM2i4Z0k40BnFU/ kjTARjrXW94LwokVy4x+ZYgImrnKWeKac6fMfMwH2aKpCQLlVxdO4qvJkv92SzZz4538az1T m+3ekJAimou89cXwXHCFb5WqJcyjDfdQF857vTn1z4qu7udYCuuV/4xDEhslUq1+GcNDjAhB nNYPzD+SvhWEsrjuXv+fDONdJtmLUpKs4Jtak3smGGhZsqpcNv8nQzUGDQZjuCSmDqW8vn2o hWwveNeRTkxh+2x1Qb3GT46uzsFNBFH8CgsBEADGC/yx5ctcLQlB9hbq7KNqCDyZNoYu1HAB Hal3MuxPfoGKObEktawQPQaSTB5vNlDxKihezLnlT/PKjcXC2R1OjSDinlu5XNGc6mnky03q yymUPyiMtWhBBftezTRxWRslPaFWlg/h/Y1iDuOcklhpr7K1h1jRPCrf1yIoxbIpDbffnuyz kuto4AahRvBU4Js4sU7f/btU+h+e0AcLVzIhTVPIz7PM+Gk2LNzZ3/on4dnEc/qd+ZZFlOQ4 KDN/hPqlwA/YJsKzAPX51L6Vv344pqTm6Z0f9M7YALB/11FO2nBB7zw7HAUYqJeHutCwxm7i BDNt0g9fhviNcJzagqJ1R7aPjtjBoYvKkbwNu5sWDpQ4idnsnck4YT6ctzN4I+6lfkU8zMzC gM2R4qqUXmxFIS4Bee+gnJi0Pc3KcBYBZsDK44FtM//5Cp9DrxRQOh19kNHBlxkmEb8kL/pw XIDcEq8MXzPBbxwHKJ3QRWRe5jPNpf8HCjnZz0XyJV0/4M1JvOua7IZftOttQ6KnM4m6WNIZ 2ydg7dBhDa6iv1oKdL7wdp/rCulVWn8R7+3cRK95SnWiJ0qKDlMbIN8oGMhHdin8cSRYdmHK kTnvSGJNlkis5a+048o0C6jI3LozQYD/W9wq7MvgChgVQw1iEOB4u/3FXDEGulRVko6xCBU4 SQARAQABwsFfBBgBAgAJBQJR/AoLAhsMAAoJEIredpCGysGyfvMQAIywR6jTqix6/fL0Ip8G jpt3uk//QNxGJE3ZkUNLX6N786vnEJvc1beCu6EwqD1ezG9fJKMl7F3SEgpYaiKEcHfoKGdh 30B3Hsq44vOoxR6zxw2B/giADjhmWTP5tWQ9548N4VhIZMYQMQCkdqaueSL+8asp8tBNP+TJ PAIIANYvJaD8xA7sYUXGTzOXDh2THWSvmEWWmzok8er/u6ZKdS1YmZkUy8cfzrll/9hiGCTj u3qcaOM6i/m4hqtvsI1cOORMVwjJF4+IkC5ZBoeRs/xW5zIBdSUoC8L+OCyj5JETWTt40+lu qoqAF/AEGsNZTrwHJYu9rbHH260C0KYCNqmxDdcROUqIzJdzDKOrDmebkEVnxVeLJBIhYZUd t3Iq9hdjpU50TA6sQ3mZxzBdfRgg+vaj2DsJqI5Xla9QGKD+xNT6v14cZuIMZzO7w0DoojM4 ByrabFsOQxGvE0w9Dch2BDSI2Xyk1zjPKxG1VNBQVx3flH37QDWpL2zlJikW29Ws86PHdthh Fm5PY8YtX576DchSP6qJC57/eAAe/9ztZdVAdesQwGb9hZHJc75B+VNm4xrh/PJO6c1THqdQ 19WVJ+7rDx3PhVncGlbAOiiiE3NOFPJ1OQYxPKtpBUukAlOTnkKE6QcA4zckFepUkfmBV1wM Jg6OxFYd01z+a+oL Message-ID: Date: Tue, 22 May 2018 14:02:00 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <2a88de28-27ef-8fe4-ddc1-35eb9e698567@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8901 signatures=668700 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1805220192 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/22/2018 11:00 AM, Oleksandr Andrushchenko wrote: > On 05/22/2018 05:33 PM, Boris Ostrovsky wrote: >> On 05/22/2018 01:55 AM, Oleksandr Andrushchenko wrote: >>> On 05/21/2018 11:36 PM, Boris Ostrovsky wrote: >>>> On 05/21/2018 03:13 PM, Oleksandr Andrushchenko wrote: >>>>> On 05/21/2018 09:53 PM, Boris Ostrovsky wrote: >>>>>> On 05/21/2018 01:32 PM, Oleksandr Andrushchenko wrote: >>>>>>> On 05/21/2018 07:35 PM, Boris Ostrovsky wrote: >>>>>>>> On 05/21/2018 01:40 AM, Oleksandr Andrushchenko wrote: >>>>>>>>> On 05/19/2018 01:04 AM, Boris Ostrovsky wrote: >>>>>>>>>> On 05/17/2018 04:26 AM, Oleksandr Andrushchenko wrote: >>>>>>>>>>> From: Oleksandr Andrushchenko >>>>>>>>>>> >>>>>>>>>> A commit message would be useful. >>>>>>>>> Sure, v1 will have it >>>>>>>>>>> Signed-off-by: Oleksandr Andrushchenko >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>>           for (i = 0; i < nr_pages; i++) { >>>>>>>>>>> -        page = alloc_page(gfp); >>>>>>>>>>> -        if (page == NULL) { >>>>>>>>>>> -            nr_pages = i; >>>>>>>>>>> -            state = BP_EAGAIN; >>>>>>>>>>> -            break; >>>>>>>>>>> +        if (ext_pages) { >>>>>>>>>>> +            page = ext_pages[i]; >>>>>>>>>>> +        } else { >>>>>>>>>>> +            page = alloc_page(gfp); >>>>>>>>>>> +            if (page == NULL) { >>>>>>>>>>> +                nr_pages = i; >>>>>>>>>>> +                state = BP_EAGAIN; >>>>>>>>>>> +                break; >>>>>>>>>>> +            } >>>>>>>>>>>               } >>>>>>>>>>>               scrub_page(page); >>>>>>>>>>>               list_add(&page->lru, &pages); >>>>>>>>>>> @@ -529,7 +565,7 @@ static enum bp_state >>>>>>>>>>> decrease_reservation(unsigned long nr_pages, gfp_t gfp) >>>>>>>>>>>           i = 0; >>>>>>>>>>>           list_for_each_entry_safe(page, tmp, &pages, lru) { >>>>>>>>>>>               /* XENMEM_decrease_reservation requires a GFN */ >>>>>>>>>>> -        frame_list[i++] = xen_page_to_gfn(page); >>>>>>>>>>> +        frames[i++] = xen_page_to_gfn(page); >>>>>>>>>>>         #ifdef CONFIG_XEN_HAVE_PVMMU >>>>>>>>>>>               /* >>>>>>>>>>> @@ -552,18 +588,22 @@ static enum bp_state >>>>>>>>>>> decrease_reservation(unsigned long nr_pages, gfp_t gfp) >>>>>>>>>>>       #endif >>>>>>>>>>>               list_del(&page->lru); >>>>>>>>>>>       -        balloon_append(page); >>>>>>>>>>> +        if (!ext_pages) >>>>>>>>>>> +            balloon_append(page); >>>>>>>>>> So what you are proposing is not really ballooning. You are just >>>>>>>>>> piggybacking on existing interfaces, aren't you? >>>>>>>>> Sort of. Basically I need to {increase|decrease}_reservation, not >>>>>>>>> actually >>>>>>>>> allocating ballooned pages. >>>>>>>>> Do you think I can simply EXPORT_SYMBOL for >>>>>>>>> {increase|decrease}_reservation? >>>>>>>>> Any other suggestion? >>>>>>>> I am actually wondering how much of that code you end up reusing. >>>>>>>> You >>>>>>>> pretty much create new code paths in both routines and common code >>>>>>>> ends >>>>>>>> up being essentially the hypercall. >>>>>>> Well, I hoped that it would be easier to maintain if I modify >>>>>>> existing >>>>>>> code >>>>>>> to support both use-cases, but I am also ok to create new >>>>>>> routines if >>>>>>> this >>>>>>> seems to be reasonable - please let me know >>>>>>>>      So the question is --- would it make >>>>>>>> sense to do all of this separately from the balloon driver? >>>>>>> This can be done, but which driver will host this code then? If we >>>>>>> move from >>>>>>> the balloon driver, then this could go to either gntdev or >>>>>>> grant-table. >>>>>>> What's your preference? >>>>>> A separate module? >>>>>> Is there any use for this feature outside of your zero-copy DRM >>>>>> driver? >>>>> Intel's hyper dma-buf (Dongwon/Matt CC'ed), V4L/GPU at least. >>>>> >>>>> At the time I tried to upstream zcopy driver it was discussed and >>>>> decided that >>>>> it would be better if I remove all DRM specific code and move it to >>>>> Xen drivers. >>>>> Thus, this RFC. >>>>> >>>>> But it can also be implemented as a dedicated Xen dma-buf driver >>>>> which >>>>> will have all the >>>>> code from this RFC + a bit more (char/misc device handling at least). >>>>> This will also require a dedicated user-space library, just like >>>>> libxengnttab.so >>>>> for gntdev (now I have all new IOCTLs covered there). >>>>> >>>>> If the idea of a dedicated Xen dma-buf driver seems to be more >>>>> attractive we >>>>> can work toward this solution. BTW, I do support this idea, but >>>>> was not >>>>> sure if Xen community accepts yet another driver which duplicates >>>>> quite some code >>>>> of the existing gntdev/balloon/grant-table. And now after this RFC I >>>>> hope that all cons >>>>> and pros of both dedicated driver and gntdev/balloon/grant-table >>>>> extension are >>>>> clearly seen and we can make a decision. >>>> IIRC the objection for a separate module was in the context of gntdev >>>> was discussion, because (among other things) people didn't want to >>>> have >>>> yet another file in /dev/xen/ >>>> >>>> Here we are talking about (a new) balloon-like module which doesn't >>>> create any new user-visible interfaces. And as for duplicating code >>>> --- >>>> as I said, I am not convinced there is much of duplication. >>>> >>>> I might even argue that we should add a new config option for this >>>> module. >>> I am not quite sure I am fully following you here: so, you suggest >>> that we have balloon.c unchanged, but instead create a new >>> module (namely a file under the same folder as balloon.c, e.g. >>> dma-buf-reservation.c) and move those {increase|decrease}_reservation >>> routines (specific to dma-buf) to that new file? And make it selectable >>> via Kconfig? If so, then how about the changes to grant-table and >>> gntdev? >>> Those will look inconsistent then. >> Inconsistent with what? The changes to grant code will also be under the >> new config option. > Ah, ok. > > Option 1. We will have Kconfig option which will cover dma-buf > changes in balloon, I really don't think your changes to balloon driver belong there. The have nothing to do with ballooning, > grant-table and gntdev. And for that we will > create dedicated routines in balloon and grant-table (copy of > the existing ones, but modified to fit dma-buf use-case) and > those under something like "#if CONFIG_XEN_DMABUF"? > This is relatively easy to do for balloon/grant-table, but not that > easy for gntdev: there still seems to be lots of code which can be > reused, > so I'll have to put lots of "#if CONFIG_XEN_DMABUF" there. Even more, > I change > interfaces of the existing gntdev routines which won't look cute with > #if's, IMO. > > Option 2. Try moving dma-buf related changes from balloon and > grant-table to a new file. Then gntdev's Kconfig concerns from above > will still > be there, but balloon/grant-table functionality will be localized in a > new module. I don't see a problem with leaving your code (from patch 2) where it is now, in grant table. It's a small change and it seems to me a single #ifdef/#endif would cover it, even if you factor out common code there as we've discussed. To my eye it logically belongs there. Just like your gntdev changes belong to gntdev file. (Presumably, because I haven't actually looked at them ;-)) So my suggestion is - separate module for your changes in balloon.c - keep grant-table changes, with config option - keep gntdev changes, with config option. (but when you get to post actual patches I would appreciate if you could split this into a series of logical changes and not post a one giant patch). -boris > > I am still missing your point here? > >> >>> If you suggest a new kernel driver module: >>> IMO, there is nothing bad if we create a dedicated kernel module >>> (driver) for Xen dma-buf handling selectable under Kconfig option. >>> Yes, this will create a yet another device under /dev/xen, >>> but most people will never see it if we set Kconfig to default to "n". >>> And then we'll need user-space support for that, so Xen tools will >>> be extended with libxendmabuf.so or so. >>> This way all Xen dma-buf support can be localized at one place which >>> might be easier to maintain. What is more it could be totally >>> transparent >>> to most of us as Kconfig option won't be set by default (both kernel >>> and Xen). >> >> The downside is that we will end up having another device for doing >> things that are not that different from what we are already doing with >> existing gnttab device. Or are they? > Agree, but Kconfig option, IMO, won't make it look nice because > of gntdev changes and code reuse. >> -boris > Thank you, > Oleksandr > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xenproject.org > https://lists.xenproject.org/mailman/listinfo/xen-devel