I would like to implement a mechanism to disable PCI devices by writing to a certain IO port to prevent the problem of duplication where PV on HVM drivers are used. Disabling drivers in the GPLPV drivers is quite troublesome and while I think 3.3 has eliminated the corruption problem (no caching appears to make windows understand that it is the same underlying device) I''d still rather that the qemu PCI devices weren''t there at all. So if the PV drivers loaded early in the boot process, they would write to a designated IO port and qemu would then tell the PCI devices to not work anymore. Because I would do it at the driver level rather than at the device level, it should happen even before windows has loaded the pci.sys driver and started probing the PCI space. Does that sound acceptable? Thanks James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
On 11/12/2008 03:10, "James Harper" <james.harper@bendigoit.com.au> wrote:> So if the PV drivers loaded early in the boot process, they would write > to a designated IO port and qemu would then tell the PCI devices to not > work anymore. Because I would do it at the driver level rather than at > the device level, it should happen even before windows has loaded the > pci.sys driver and started probing the PCI space. > > Does that sound acceptable?It sounds good in principle. Do you know how you would hack it into qemu? Ian Jackson may have views on that. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-11 09:08 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> On 11/12/2008 03:10, "James Harper" <james.harper@bendigoit.com.au>wrote:> > > So if the PV drivers loaded early in the boot process, they wouldwrite> > to a designated IO port and qemu would then tell the PCI devices tonot> > work anymore. Because I would do it at the driver level rather thanat> > the device level, it should happen even before windows has loadedthe> > pci.sys driver and started probing the PCI space. > > > > Does that sound acceptable? > > It sounds good in principle. Do you know how you would hack it intoqemu?> Ian Jackson may have views on that. >Since that email I have already implemented it and it seems to work well. I''ll email details shortly for discussion. James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-11 09:28 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> On 11/12/2008 03:10, "James Harper" <james.harper@bendigoit.com.au>wrote:> > > So if the PV drivers loaded early in the boot process, they wouldwrite> > to a designated IO port and qemu would then tell the PCI devices tonot> > work anymore. Because I would do it at the driver level rather thanat> > the device level, it should happen even before windows has loadedthe> > pci.sys driver and started probing the PCI space. > > > > Does that sound acceptable? > > It sounds good in principle. Do you know how you would hack it intoqemu?> Ian Jackson may have views on that. >The attached patch is what I have developed so far. There is also a logging facility in there too - XenSource has something similar but mine is better :) (with the exception of rate limiting, which mine doesn''t do yet) Basically, I use ioports 0x10-0x1F for communication. Reads to 0x10-0x12 return ''X'', ''E'', and ''N'' respectively. 0x13 returns a version number. This is to allow to detection of the mechanism (otherwise I have to fallback to the previous method of disabling the ide and network drivers in windows, which is unreliable and messy and the WHQL guys will laugh at me :) Writes to ports 0x10-0x17 records data in logging buffers (1 per port), printing on a newline. I wanted to be able to have a method of logging that relied on the barest minimum of overhead. Synchronising access to an ioport across multiple windows drivers would require setup and I needed to be able to log before that setup. So what I do is raise the IRQL to HIGH_LEVEL (disabling interrupts) and then write to port 0x10+cpu. Without that I was getting log messages mixed up with each other during high rates of logging, where I was looking for races etc. This way it''s clean and I even get to know what the CPU doing the logging is. It''s only really useful for debugging so I think the performance hit is acceptable. If you don''t want to include that part of it then that''s fine. A write to port 0x18 with a non-zero value will set the global variable xen_pci_disable_devices. A write of 0 will unset it, but I''m not sure where that would be useful. I have added a disable_flag variable to the pci dev structure. This is set to 1 for devices that should be disabled when PV drivers are in use (ide and rtl8139, possibly others?). In pci_data_read, if xen_pci_disable_devices and pci_dev->disable_flag are both set, all 1''s are returned as per when no device is there at all. If this is done before windows loads pci.sys and scans for devices, it''s as if the device isn''t there. Let me know what you think. James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper writes ("RE: [Xen-devel] disable qemu PCI devices in HVM domains"):> Basically, I use ioports 0x10-0x1F for communication.You seem to mean thedse absolute addresses in IO space ? Rather than offsets in the Xen platform device, for example ? And your driver is going to write, blind, into these locations ? Surely that risks causing problems if your driver is run in a situation where those ports are used for something else ? I like the principle of disabling the drivers via an instruction to qemu rather than by attempting to wrestle with the Windows driver machinery to try to hide the devices. But couldn''t we simulate a PCI unplug or a medium change or something instead ? Then you could do it later in the boot after your own drivers have properly bound. And presumably the instrunction to do so should be given via the Xen PCI platform device ? Also, what if the user wants (for some reason) to use PV drivers for disk but emulated-real-hardware drivers for network, or something ? Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-11 22:06 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > James Harper writes ("RE: [Xen-devel] disable qemu PCI devices in HVM > domains"): > > Basically, I use ioports 0x10-0x1F for communication. > > You seem to mean thedse absolute addresses in IO space ? Rather than > offsets in the Xen platform device, for example ?Yes. Under the current scheme I need to disable the other PCI devices before the platform pci device is enumerated.> And your driver is > going to write, blind, into these locations ?No. A read is done first to check for some magic bytes.> Surely that risks > causing problems if your driver is run in a situation where those > ports are used for something else ?Perhaps, but under Xen+qemu we have a tightly controlled situation where that is unlikely, I would have thought. Perhaps you have a situation in mind where this would be a problem? Would a passed-through pci device ever try and use these ports? If I had allocated them in qemu then wouldn''t pci passthrough avoid them?> I like the principle of disabling the drivers via an instruction to > qemu rather than by attempting to wrestle with the Windows driver > machinery to try to hide the devices. But couldn''t we simulate a PCI > unplug or a medium change or something instead ? Then you could do it > later in the boot after your own drivers have properly bound. > > And presumably the instrunction to do so should be given via the Xen > PCI platform device ? >Possibly. A hot unplug could work too, but it would need to happen after windows had enumerated all the pci devices (if done from platform pci) but before windows had enumerated and started using the ide devices. Remember that windows is closed source and therefore is a huge pita when trying to do something they hadn''t thought of, like make something happen at a very specific point during boot.> Also, what if the user wants (for some reason) to use PV drivers for > disk but emulated-real-hardware drivers for network, or something ?I could allow for that - just set up the disable flag as masks instead. The previous ''xenhide'' windows driver scheme allowed that, but it was seldom used. With the exception of a user trying to avoid a bug in the PV drivers (in which case time would be better spent fixing the bug than implementing a mechanism to avoid it) the only time it would be useful is for when a CDROM is used - blkback doesn''t have a mechanism for ejecting physical CDROM devices. Unfortunately the latter would be even harder as the CDROM is not a PCI device itself, and at the PCI device level we don''t know what is going to be attached... James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-13 09:33 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > I like the principle of disabling the drivers via an instruction to > qemu rather than by attempting to wrestle with the Windows driver > machinery to try to hide the devices. But couldn''t we simulate a PCI > unplug or a medium change or something instead ? Then you could do it > later in the boot after your own drivers have properly bound. >Is the ''pci unplug'' as simple as making a call somewhere like pci_unplug(id of ide adapter)? I''m concerned that Windows may not like this. James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
On 13/12/2008 09:33, "James Harper" <james.harper@bendigoit.com.au> wrote:>> I like the principle of disabling the drivers via an instruction to >> qemu rather than by attempting to wrestle with the Windows driver >> machinery to try to hide the devices. But couldn''t we simulate a PCI >> unplug or a medium change or something instead ? Then you could do it >> later in the boot after your own drivers have properly bound. >> > > Is the ''pci unplug'' as simple as making a call somewhere like > pci_unplug(id of ide adapter)? I''m concerned that Windows may not like > this.My own opinion is that the ioports are fine, but they should be offsets from the xen-platform-pci device''s ioport bar. Also we ought to document the ports in xen-platform-pci''s source file, as it''s going to start getting messy in there. I''m not sure if the approach taken by the Citrix drivers could be at all useful. Cc''ing Steven Smith in case he has any comments to make. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-13 10:05 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > Is the ''pci unplug'' as simple as making a call somewhere like > > pci_unplug(id of ide adapter)? I''m concerned that Windows may notlike> > this. > > My own opinion is that the ioports are fine, but they should beoffsets> from > the xen-platform-pci device''s ioport bar. Also we ought to documentthe> ports in xen-platform-pci''s source file, as it''s going to startgetting> messy in there. > > I''m not sure if the approach taken by the Citrix drivers could be atall> useful. Cc''ing Steven Smith in case he has any comments to make.Citrix use fixed ports for logging. The problem with using xen-platform-pci''s ioport range is that I can only get to them once the windows pci bus driver has enumerated all the devices, and it''s too late by then as Windows has already enumerated PDO''s for all the devices. The only way around this would be to send an ''unplug'' event to xen to remove the PCI devices, but is the standard PCI bus emulated by qemu hotplug capable? And would windows even cope with a hotplug event that early in the boot process? A completely different way of solving this (as per another previous email) is for qemu to (optionally) emulate things at the int13 level rather than at the pci device level. That way there would be no PCI device at all and Windows would only ever see my drivers. We can already do this for net, but obviously that isn''t required for booting (normally). So /dev/hd[a-d] would be PCI devices and anything else would be hooked into int13. If only Windows were more like Linux... James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
On 13/12/2008 10:05, "James Harper" <james.harper@bendigoit.com.au> wrote:> Citrix use fixed ports for logging. The problem with using > xen-platform-pci''s ioport range is that I can only get to them once the > windows pci bus driver has enumerated all the devices, and it''s too late > by then as Windows has already enumerated PDO''s for all the devices. The > only way around this would be to send an ''unplug'' event to xen to remove > the PCI devices, but is the standard PCI bus emulated by qemu hotplug > capable? And would windows even cope with a hotplug event that early in > the boot process?Does Windows remap the BAR? If not you can go probe the PCI space yourself? It''s really easy to do. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-13 11:31 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> On 13/12/2008 10:05, "James Harper" <james.harper@bendigoit.com.au>wrote:> > > Citrix use fixed ports for logging. The problem with using > > xen-platform-pci''s ioport range is that I can only get to them oncethe> > windows pci bus driver has enumerated all the devices, and it''s toolate> > by then as Windows has already enumerated PDO''s for all the devices.The> > only way around this would be to send an ''unplug'' event to xen toremove> > the PCI devices, but is the standard PCI bus emulated by qemuhotplug> > capable? And would windows even cope with a hotplug event that earlyin> > the boot process? > > Does Windows remap the BAR?I don''t know.> If not you can go probe the PCI space yourself? > It''s really easy to do.Is it just a matter of probing a few ioports? Doing so would be ''against the rules'' as far as Windows is concerned, although it would work. James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith
2008-Dec-15 17:10 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
> >> I like the principle of disabling the drivers via an instruction to > >> qemu rather than by attempting to wrestle with the Windows driver > >> machinery to try to hide the devices. But couldn''t we simulate a PCI > >> unplug or a medium change or something instead ? Then you could do it > >> later in the boot after your own drivers have properly bound. > >> > > > > Is the ''pci unplug'' as simple as making a call somewhere like > > pci_unplug(id of ide adapter)? I''m concerned that Windows may not like > > this. > My own opinion is that the ioports are fine, but they should be offsets from > the xen-platform-pci device''s ioport bar. Also we ought to document the > ports in xen-platform-pci''s source file, as it''s going to start getting > messy in there. > > I''m not sure if the approach taken by the Citrix drivers could be at all > useful. Cc''ing Steven Smith in case he has any comments to make.I can''t see any reason why the approach we take in our closed-source drivers wouldn''t work here as well. I''ve attached the appropriate patches from our product qemu patchqueue, tidied up and stripped of the most obviously XenServer-specific bits, and made to apply to current ioemu-remote. The protocol covers three basic things: -- Disconnecting emulated devices. -- Getting log messages out of the drivers and into dom0. -- Allowing dom0 to block the loading of specific drivers. This is intended as a backwards-compatibility thing: if we discover a bug in some old version of the drivers, then rather than working around it in Xen, we have the option of just making those drivers fall back to emulated mode. The current protocol works like this (from the point of view of drivers): 1) When the drivers first come up, they check whether the unplug logic is available by reading a two-byte magic number from IO port 0x10. These should be 0x49d2. If the magic number doesn''t match, the drivers don''t do anything. 2) The drivers read a one-byte protocol version from IO port 0x12. If this is 0, skip to 6. 3) The drivers write a two-byte product number to IO port 0x12. At the moment, the only drivers using this protocol are our closed-source ones, which use product number 1. 4) The drivers write a four-byte build number to IO port 0x10. 5) The drivers check the magic number by reading two bytes from 0x10 again. If it''s changed from 0x49d2, the drivers are blacklisted and should not load. 6) The drivers write a two-byte bitmask of devices to unplug to IO port 0x10. The defined fields are: 1 -- All IDE disks (not including CD drives) 2 -- All emulated NICs 4 -- All IDE disks except for the primary master (not including CD drives) The relevant emulated devices then disappear from the relevant buses. For most guest operating systems, you want to do this before device enumeration happens. ...) Once the drivers have checked the magic number (and the blacklist, if appropriate), they can send log messages to qemu which will be logged to wherever qemu''s logs go (/var/log/xen/qemu-dm.log on normal Xen, dom0 syslog on XenServer). These messages are written to IO port 0x12 a byte at a time, and are terminated by newlines. There''s a fairly aggressive rate limiter on these messages, so they shouldn''t be used for anything even vaguely high-volume, but they''re rather useful for debugging and support. This isn''t exactly a pretty protocol, but it does solve the problem. The blacklist is, from qemu''s point of view, handled mostly through xenstore. A driver version is considered to be blacklisted if /mh/driver-blacklist/{product_name}/{build_number} exists and is readable, where {build_number} is the build number from step 4 as a decimal number. {product_name} is a string corresponding to the product number in step 3; at present, the only product number is 1, which has a product_name of xensource-windows. A previous version of the protocol put the IO ports on the PCI platform device. Unfortunately, that makes it difficult to get at them before PCI bus enumeration happens, which complicates removal of the emulated NICs. It is possible to work around these but (at least on Windows) it''s complicated and messy, and generally best avoided. Steven. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-15 23:58 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > I''m not sure if the approach taken by the Citrix drivers could be atall> > useful. Cc''ing Steven Smith in case he has any comments to make. > I can''t see any reason why the approach we take in our closed-source > drivers wouldn''t work here as well. I''ve attached the appropriate > patches from our product qemu patchqueue, tidied up and stripped of > the most obviously XenServer-specific bits, and made to apply to > current ioemu-remote. > > > The protocol covers three basic things: > > -- Disconnecting emulated devices. > -- Getting log messages out of the drivers and into dom0. > -- Allowing dom0 to block the loading of specific drivers. This is > intended as a backwards-compatibility thing: if we discover a bug > in some old version of the drivers, then rather than working around > it in Xen, we have the option of just making those drivers fall > back to emulated mode. > > The current protocol works like this (from the point of view of > drivers): > > 1) When the drivers first come up, they check whether the unplug logic > is available by reading a two-byte magic number from IO port 0x10. > These should be 0x49d2. If the magic number doesn''t match, the > drivers don''t do anything. > > 2) The drivers read a one-byte protocol version from IO port 0x12. If > this is 0, skip to 6. > > 3) The drivers write a two-byte product number to IO port 0x12. At > the moment, the only drivers using this protocol are our > closed-source ones, which use product number 1. > > 4) The drivers write a four-byte build number to IO port 0x10. > > 5) The drivers check the magic number by reading two bytes from 0x10 > again. If it''s changed from 0x49d2, the drivers are blacklisted > and should not load. > > 6) The drivers write a two-byte bitmask of devices to unplug to IO > port 0x10. The defined fields are: > > 1 -- All IDE disks (not including CD drives) > 2 -- All emulated NICs > 4 -- All IDE disks except for the primary master (not including CD > drives)Interesting. This seems more flexible than my initial approach which was to block just the PCI devices. I guess it makes sense to leave the qemu CDROM''s as they support the eject etc functionality, and performance is seldom such a problem.> The relevant emulated devices then disappear from the relevant > buses. For most guest operating systems, you want to do this > before device enumeration happens. > > ...) Once the drivers have checked the magic number (and the > blacklist, if appropriate), they can send log messages to qemu > which will be logged to wherever qemu''s logs go > (/var/log/xen/qemu-dm.log on normal Xen, dom0 syslog on > XenServer). These messages are written to IO port 0x12 a byte at > a time, and are terminated by newlines. There''s a fairly > aggressive rate limiter on these messages, so they shouldn''t be > used for anything even vaguely high-volume, but they''re rather > useful for debugging and support. > > This isn''t exactly a pretty protocol, but it does solve the problem. > > > The blacklist is, from qemu''s point of view, handled mostly through > xenstore. A driver version is considered to be blacklisted if > /mh/driver-blacklist/{product_name}/{build_number} exists and is > readable, where {build_number} is the build number from step 4 as a > decimal number. {product_name} is a string corresponding to the > product number in step 3; at present, the only product number is 1, > which has a product_name of xensource-windows. > > > A previous version of the protocol put the IO ports on the PCI > platform device. Unfortunately, that makes it difficult to get at > them before PCI bus enumeration happens, which complicates removal of > the emulated NICs. It is possible to work around these but (at least > on Windows) it''s complicated and messy, and generally best avoided.I found that too :) It''s a bit more complicated than I would have preferred, but I think there is value in keeping the tree''s in sync rather than re-implementing things. As a result of this patch, does that mean that the Citrix Windows PV drivers might work on the GPL tree? Is that a problem? Thanks James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-16 03:01 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
Steven, Can you please comment on how the disabling should behave across migration or save/restores? Are the flags retained as part of the saved state or does the disabling need to happen again once the domain is migrated/restored? Thanks James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith
2008-Dec-16 10:20 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
> > 6) The drivers write a two-byte bitmask of devices to unplug to IO > > port 0x10. The defined fields are: > > > > 1 -- All IDE disks (not including CD drives) > > 2 -- All emulated NICs > > 4 -- All IDE disks except for the primary master (not including CD > > drives) > Interesting. This seems more flexible than my initial approach which was > to block just the PCI devices. I guess it makes sense to leave the qemu > CDROM''s as they support the eject etc functionality, and performance is > seldom such a problem.Yeah, that was pretty much our thinking. If you want a bit to turn off the IDE controller completely then that would be pretty easy to add.> > A previous version of the protocol put the IO ports on the PCI > > platform device. Unfortunately, that makes it difficult to get at > > them before PCI bus enumeration happens, which complicates removal of > > the emulated NICs. It is possible to work around these but (at least > > on Windows) it''s complicated and messy, and generally best avoided. > > I found that too :) > > It''s a bit more complicated than I would have preferred, but I think > there is value in keeping the tree''s in sync rather than re-implementing > things. > > As a result of this patch, does that mean that the Citrix Windows PV > drivers might work on the GPL tree?Not quite. You still need a few other little bits of our toolstack, but nothing which couldn''t be added to xend with twenty minutes hacking (which is how I tested these patches). Of course, the driver EULA still prohibits using them with anything other than XenServer.> Is that a problem?Not really. All of the patches I''ve posted were open source already, so someone who really wanted to use the drivers could have done so, and there''s enough still missing to make it inconvenient for casual infringement. Steven. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith
2008-Dec-16 10:27 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
> Can you please comment on how the disabling should behave across > migration or save/restores? Are the flags retained as part of the saved > state or does the disabling need to happen again once the domain is > migrated/restored?In the patches I sent, the flags are discarded across migration (so all of the emulated devices come back). Our drivers get in very early after the domain is resumed after migration and re-issue the magic writes which unplug the devices. Saving them wouldn''t cause us any problems, though, so if that''s easier for you then feel free to add it. Steven. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-16 11:06 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > Can you please comment on how the disabling should behave across > > migration or save/restores? Are the flags retained as part of thesaved> > state or does the disabling need to happen again once the domain is > > migrated/restored? > In the patches I sent, the flags are discarded across migration (so > all of the emulated devices come back). Our drivers get in very early > after the domain is resumed after migration and re-issue the magic > writes which unplug the devices. Saving them wouldn''t cause us any > problems, though, so if that''s easier for you then feel free to add > it.The only time this would not work for me is if the DomU was migrated from a machine that supported device disabling to one that didn''t (eg didn''t have these patches). Is that even a supported scenario - eg migration between machines running (even slightly) different versions of code? James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
On 16/12/2008 11:06, "James Harper" <james.harper@bendigoit.com.au> wrote:> The only time this would not work for me is if the DomU was migrated > from a machine that supported device disabling to one that didn''t (eg > didn''t have these patches). > > Is that even a supported scenario - eg migration between machines > running (even slightly) different versions of code?Migration to older hypervisor and tools is not supported. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-17 03:47 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > I''m not sure if the approach taken by the Citrix drivers could be atall> > useful. Cc''ing Steven Smith in case he has any comments to make. > I can''t see any reason why the approach we take in our closed-source > drivers wouldn''t work here as well. I''ve attached the appropriate > patches from our product qemu patchqueue, tidied up and stripped of > the most obviously XenServer-specific bits, and made to apply to > current ioemu-remote. >3.3.1 is feature frozen at this point isn''t it, which means 3.3.2 for these patches right? Thanks James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
On 17/12/2008 03:47, "James Harper" <james.harper@bendigoit.com.au> wrote:>>> I''m not sure if the approach taken by the Citrix drivers could be at > all >>> useful. Cc''ing Steven Smith in case he has any comments to make. >> I can''t see any reason why the approach we take in our closed-source >> drivers wouldn''t work here as well. I''ve attached the appropriate >> patches from our product qemu patchqueue, tidied up and stripped of >> the most obviously XenServer-specific bits, and made to apply to >> current ioemu-remote. > > 3.3.1 is feature frozen at this point isn''t it, which means 3.3.2 for > these patches right?I''m reluctant to introduce anything into a stable branch which would prevent us migrating domains up or down the branch. If we are going to shove it in, it should happen now, for 3.3.1. My .1 releases tend to be generously proportioned, but beyond a .1 release I definitely don''t take anything other than pure bug fixes. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
On 17/12/2008 08:27, "Keir Fraser" <keir.fraser@eu.citrix.com> wrote:>> 3.3.1 is feature frozen at this point isn''t it, which means 3.3.2 for >> these patches right? > > I''m reluctant to introduce anything into a stable branch which would prevent > us migrating domains up or down the branch. If we are going to shove it in, it > should happen now, for 3.3.1. My .1 releases tend to be generously > proportioned, but beyond a .1 release I definitely don''t take anything other > than pure bug fixes.The upshot really is: if you can agree on a qemu-dm patch this week then fine (and the interface it implements is then locked and unchangeable). Otherwise it''s a 3.4.0 feature. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-17 09:21 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> On 17/12/2008 08:27, "Keir Fraser" <keir.fraser@eu.citrix.com> wrote: > > >> 3.3.1 is feature frozen at this point isn''t it, which means 3.3.2for> >> these patches right? > > > > I''m reluctant to introduce anything into a stable branch which would > prevent > > us migrating domains up or down the branch. If we are going to shoveit> in, it > > should happen now, for 3.3.1. My .1 releases tend to be generously > > proportioned, but beyond a .1 release I definitely don''t takeanything> other > > than pure bug fixes. > > The upshot really is: if you can agree on a qemu-dm patch this weekthen> fine (and the interface it implements is then locked andunchangeable).> Otherwise it''s a 3.4.0 feature. >Unfortunately I don''t think that gives me enough time to do testing... what''s the timeframe for a 3.4.0 release? Thanks James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Keir Fraser writes ("Re: [Xen-devel] disable qemu PCI devices in HVM domains"):> I''m reluctant to introduce anything into a stable branch which would prevent > us migrating domains up or down the branch. If we are going to shove it in, > it should happen now, for 3.3.1. My .1 releases tend to be generously > proportioned, but beyond a .1 release I definitely don''t take anything other > than pure bug fixes.Can we make it so that the patch to qemu-dm does not affect guests which do not use James''s PV drivers ? That would allow us to support migration of any production domains. It seems that James''s drivers are not production-stable right now anyway (feel free to disagree, James!) Are there likely to be people using xen-unstable with the Citrix PV drivers ? Steven suggested that would be a violation of the licence of the Citrix drivers but is that true even for a Citrix/Xenserver customer ? If we don''t need to worry about the migration- compatibility of such guests then the answer to my first question may be easier ... Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
On 17/12/2008 10:36, "Ian Jackson" <Ian.Jackson@eu.citrix.com> wrote:> Keir Fraser writes ("Re: [Xen-devel] disable qemu PCI devices in HVM > domains"): >> I''m reluctant to introduce anything into a stable branch which would prevent >> us migrating domains up or down the branch. If we are going to shove it in, >> it should happen now, for 3.3.1. My .1 releases tend to be generously >> proportioned, but beyond a .1 release I definitely don''t take anything other >> than pure bug fixes. > > Can we make it so that the patch to qemu-dm does not affect guests > which do not use James''s PV drivers ? That would allow us to support > migration of any production domains. It seems that James''s drivers > are not production-stable right now anyway (feel free to disagree, > James!)Well, maybe. Frankly 3.4.0 will probably be out not long after 3.3.2 anyway. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-17 11:01 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > Keir Fraser writes ("Re: [Xen-devel] disable qemu PCI devices in HVM > > domains"): > >> I''m reluctant to introduce anything into a stable branch whichwould> prevent > >> us migrating domains up or down the branch. If we are going toshove it> in, > >> it should happen now, for 3.3.1. My .1 releases tend to begenerously> >> proportioned, but beyond a .1 release I definitely don''t takeanything> other > >> than pure bug fixes. > > > > Can we make it so that the patch to qemu-dm does not affect guests > > which do not use James''s PV drivers ? That would allow us tosupport> > migration of any production domains. It seems that James''s drivers > > are not production-stable right now anyway (feel free to disagree, > > James!) > > Well, maybe. Frankly 3.4.0 will probably be out not long after 3.3.2 > anyway. >I''d rather wait and get the interface just how we want it than put something in now in a rush. James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-19 00:15 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
Steven, I''ve just tried applying the patches and the last one doesn''t quite apply - this is the resulting qemu-xen.h.rej file: *************** *** 91,96 **** char *xenstore_device_model_read(int domid, char *key, unsigned int *len); char *xenstore_read_battery_data(int battery_status); int xenstore_refresh_battery_status(void); /* xenfbfront.c */ int xenfb_pv_display_init(DisplayState *ds); --- 91,98 ---- char *xenstore_device_model_read(int domid, char *key, unsigned int *len); char *xenstore_read_battery_data(int battery_status); int xenstore_refresh_battery_status(void); + int xenstore_pv_driver_build_blacklisted(uint16_t product_number, + uint32_t build_nr); /* xenfbfront.c */ int xenfb_pv_display_init(DisplayState *ds); Am I doing something wrong? Maybe I have the wrong version of the git tree? After adding the lines manually it compiles, and I''ll test it a bit later. James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-19 05:47 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > >> I like the principle of disabling the drivers via an instructionto> > >> qemu rather than by attempting to wrestle with the Windows driver > > >> machinery to try to hide the devices. But couldn''t we simulate aPCI> > >> unplug or a medium change or something instead ? Then you coulddo> it > > >> later in the boot after your own drivers have properly bound. > > >> > > > > > > Is the ''pci unplug'' as simple as making a call somewhere like > > > pci_unplug(id of ide adapter)? I''m concerned that Windows may notlike> > > this. > > My own opinion is that the ioports are fine, but they should beoffsets> from > > the xen-platform-pci device''s ioport bar. Also we ought to documentthe> > ports in xen-platform-pci''s source file, as it''s going to startgetting> > messy in there. > > > > I''m not sure if the approach taken by the Citrix drivers could be atall> > useful. Cc''ing Steven Smith in case he has any comments to make. > I can''t see any reason why the approach we take in our closed-source > drivers wouldn''t work here as well. I''ve attached the appropriate > patches from our product qemu patchqueue, tidied up and stripped of > the most obviously XenServer-specific bits, and made to apply to > current ioemu-remote. > > > The protocol covers three basic things: > > -- Disconnecting emulated devices. > -- Getting log messages out of the drivers and into dom0. > -- Allowing dom0 to block the loading of specific drivers. This is > intended as a backwards-compatibility thing: if we discover a bug > in some old version of the drivers, then rather than working around > it in Xen, we have the option of just making those drivers fall > back to emulated mode. > > The current protocol works like this (from the point of view of > drivers): > > 1) When the drivers first come up, they check whether the unplug logic > is available by reading a two-byte magic number from IO port 0x10. > These should be 0x49d2. If the magic number doesn''t match, the > drivers don''t do anything. > > > 5) The drivers check the magic number by reading two bytes from 0x10 > again. If it''s changed from 0x49d2, the drivers are blacklisted > and should not load.It appears that you set it to ''0xd249'' when the driver is blacklisted. Can I rely on that? My logging code runs independently in a number of unrelated places, and may not be called for some of those places until after the blacklist process has occurred. So testing for == 0x49d2 || == 0xd249 would tell me if the backend supported logging. James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper writes ("RE: [Xen-devel] disable qemu PCI devices in HVM domains"):> I''ve just tried applying the patches and the last one doesn''t quite > apply - this is the resulting qemu-xen.h.rej file:The public (non-staging) tree will have seen a biggish push recently, due to my most recent merge with upstream making it through the automated tests; perhaps you just need to pull ? Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2008-Dec-19 09:54 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> From: Ian Jackson [mailto:Ian.Jackson@eu.citrix.com] > Sent: Friday, 19 December 2008 20:52 > To: James Harper > Cc: Steven Smith; Keir Fraser; xen-devel@lists.xensource.com > Subject: RE: [Xen-devel] disable qemu PCI devices in HVM domains > > James Harper writes ("RE: [Xen-devel] disable qemu PCI devices in HVM > domains"): > > I''ve just tried applying the patches and the last one doesn''t quite > > apply - this is the resulting qemu-xen.h.rej file: > > The public (non-staging) tree will have seen a biggish push recently, > due to my most recent merge with upstream making it through the > automated tests; perhaps you just need to pull ? >I did pull before applying the patches. Maybe that was the problem? Steven''s patches were posted on the 16th, when was your push? James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper writes ("RE: [Xen-devel] disable qemu PCI devices in HVM domains"):> I did pull before applying the patches. Maybe that was the problem?Probably, yes.> Steven''s patches were posted on the 16th, when was your push?Wed, 17 Dec 2008 06:22:01 GMT (It''s done automatically rather than by hand.) Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith
2008-Dec-21 19:56 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
> > 5) The drivers check the magic number by reading two bytes from 0x10 > > again. If it''s changed from 0x49d2, the drivers are blacklisted > > and should not load. > It appears that you set it to ''0xd249'' when the driver is blacklisted. > Can I rely on that?I can''t see any reason for us to ever change it, so if it makes things easier for you then go ahead. Steven. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith writes ("Re: [Xen-devel] disable qemu PCI devices in HVM domains"):> I can''t see any reason why the approach we take in our closed-source > drivers wouldn''t work here as well. I''ve attached the appropriate > patches from our product qemu patchqueue, tidied up and stripped of > the most obviously XenServer-specific bits, and made to apply to > current ioemu-remote.I''m just in the process of applying this and I came across this: @@ -792,6 +793,10 @@ static void raw_close(BlockDriverState *bs) ... +#ifndef CONFIG_STUBDOM + /* Invalidate buffer cache for this device. */ + ioctl(s->fd, BLKFLSBUF, 0); +#endif Does this mean that there is currently, in the Open Source qemu-dm tree, a cache coherency problem between emulated and PV disk paths ? What about Linux platforms with existing PV drivers which do not engage in the blacklisting/disabling protocol ? Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith writes ("Re: [Xen-devel] disable qemu PCI devices in HVM domains"):> [stuff]Thanks for that. I have applied your patches to the code, and checked in your commentary as a new document file after some editing. I''ve also: * Documented this assurance you game James: > > 5) The drivers check the magic number by reading two bytes from 0x10 > > > again. If it''s changed from 0x49d2, the drivers are blacklisted > > > and should not load. > > It appears that you set it to ''0xd249'' when the driver is blacklisted. > > Can I rely on that? > I can''t see any reason for us to ever change it, so if it makes things > easier for you then go ahead. * Documented the registry location and allocation protocol (qemu-xen-unstable''s xenstore.c, and ask on xen-devel, respectively) * Assigned 0xffff for `experimental'' drivers in the hope that people won''t steal one of the existing assignments. * Assigned 2 ("gplpv-windows") for James''s drivers. James, you are in the best position to decide what the `build id'' should look like and there is no need to document it other than in your release notes, so I''ll leave that to you. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2009-Jan-01 12:35 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > Steven Smith writes ("Re: [Xen-devel] disable qemu PCI devices in HVM > domains"): > > [stuff] > > Thanks for that. I have applied your patches to the code, and checked > in your commentary as a new document file after some editing. > > I''ve also: > > * Documented this assurance you game James: > > > > 5) The drivers check the magic number by reading two bytes from0x10> > > > again. If it''s changed from 0x49d2, the drivers areblacklisted> > > > and should not load. > > > It appears that you set it to ''0xd249'' when the driver is > blacklisted. > > > Can I rely on that? > > I can''t see any reason for us to ever change it, so if it makesthings> > easier for you then go ahead. > > * Documented the registry location and allocation protocol > (qemu-xen-unstable''s xenstore.c, and ask on xen-devel, respectively) > > * Assigned 0xffff for `experimental'' drivers in the hope that people > won''t steal one of the existing assignments. > > * Assigned 2 ("gplpv-windows") for James''s drivers. James, you are > in the best position to decide what the `build id'' should look like > and there is no need to document it other than in your release > notes, so I''ll leave that to you. >Thanks Ian. I assume that that patch is in qemu-xen-unstable as opposed to qemu-xen-3.3-testing... is there an easy way I can pull that patch into my copy of 3.3-testing? Thanks James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper writes ("RE: [Xen-devel] disable qemu PCI devices in HVM domains"):> Thanks Ian. I assume that that patch is in qemu-xen-unstable as opposed > to qemu-xen-3.3-testing... is there an easy way I can pull that patch > into my copy of 3.3-testing?Yes. Well, I did it as a series of commits to make better sense of it in the history so it''s more than one patch. And there was a minor conflict in the first one. So to save you the bother I''ve done the cherry pick and made such a branch myself. You can fetch it with git-fetch \ http://xenbits.xensource.com/git-http/staging/qemu-xen-3.3-testing.git \ iwj.magic-ioport-3.3:iwj.magic-ioport-3.3 which will make a local branch called `iwj.magic-ioport-3.3''. Or you can pull it or whatever you like. That''s for git 1.4.4.4 as in Debian etch. They keep changing the UI, so if you have another version of git feel free to ask me to double-check the relevant runes. In case we need to update this protocol I''m happy to maintain this topic branch for that purpose. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith
2009-Jan-07 11:07 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
> > I can''t see any reason why the approach we take in our closed-source > > drivers wouldn''t work here as well. I''ve attached the appropriate > > patches from our product qemu patchqueue, tidied up and stripped of > > the most obviously XenServer-specific bits, and made to apply to > > current ioemu-remote. > > I''m just in the process of applying this and I came across this: > > @@ -792,6 +793,10 @@ static void raw_close(BlockDriverState *bs) > ... > +#ifndef CONFIG_STUBDOM > + /* Invalidate buffer cache for this device. */ > + ioctl(s->fd, BLKFLSBUF, 0); > +#endif > > Does this mean that there is currently, in the Open Source qemu-dm > tree, a cache coherency problem between emulated and PV disk paths ?I think for correctness it''s probably sufficient to issue a flush whenever we switch between emulated and PV mode when the previous mode had issued some writes. As far as I''m aware, all of the existing Windows drivers will boot off of emulated and then switch to PV mode before any writes are issued, so we should be okay. The switch from PV to emulated which happens when you reboot a guest should be covered by the BLKFLSBUF at the end of raw_open(), so I think we''re okay there as well. So this hunk is probably, strictly speaking, redundant for all current driver implementations. Having said that, it''s clearly more robust to not rely on the various drivers being able to get in before any writes are issued, so it''s probably a good thing to have anyway.> What about Linux platforms with existing PV drivers which do not > engage in the blacklisting/disabling protocol ?Yeah, things might go a bit funny if you write using emulated drivers and then switch to PV ones without rebooting in between. I think that''s probably a fairly unusual thing to do, but it''s not really invalid. I''m not sure what the best way of fixing this would be. You could conceivably have blkback tell qemu to do a flush when the frontend connects and before blkback starts doing IO, but that''s kind of ugly. Alternatively, we could modify blkfront so that it tells qemu to flush devices when appropriate, but that won''t help existing drivers. Steven. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith
2009-Jan-07 11:10 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
> > [stuff] > Thanks for that. I have applied your patches to the code, and checked > in your commentary as a new document file after some editing.Thanks.> * Documented the registry location and allocation protocol > (qemu-xen-unstable''s xenstore.c, and ask on xen-devel, respectively) > > * Assigned 0xffff for `experimental'' drivers in the hope that people > won''t steal one of the existing assignments.Good idea. Steven. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith writes ("Re: [Xen-devel] disable qemu PCI devices in HVM domains"):> > +#ifndef CONFIG_STUBDOM > > + /* Invalidate buffer cache for this device. */ > > + ioctl(s->fd, BLKFLSBUF, 0); > > +#endif...> So this hunk is probably, strictly speaking, redundant for all current > driver implementations.Right, good.> Having said that, it''s clearly more robust to not rely on the various > drivers being able to get in before any writes are issued, so it''s > probably a good thing to have anyway.Well, except that I would prefer not to carry a change in this part of the qemu code unless it was actually necessary.> > What about Linux platforms with existing PV drivers which do not > > engage in the blacklisting/disabling protocol ? > > Yeah, things might go a bit funny if you write using emulated drivers > and then switch to PV ones without rebooting in between. I think > that''s probably a fairly unusual thing to do, but it''s not really > invalid.Provided that whatever is managing this change (be it user or some tool in the guest) knows that this is a multipath situation and to take the appropriate steps.> I''m not sure what the best way of fixing this would be. You could > conceivably have blkback tell qemu to do a flush when the frontend > connects and before blkback starts doing IO, but that''s kind of ugly. > Alternatively, we could modify blkfront so that it tells qemu to flush > devices when appropriate, but that won''t help existing drivers.The guest can instruct qemu to flush writes through the host buffer cache by issueing an IDE FLUSH CACHE command, which translates to fsync(). Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
James Harper
2009-Jan-07 12:05 UTC
RE: [Xen-devel] disable qemu PCI devices in HVM domains
> > > What about Linux platforms with existing PV drivers which do not > > > engage in the blacklisting/disabling protocol ? > > > > Yeah, things might go a bit funny if you write using emulateddrivers> > and then switch to PV ones without rebooting in between. I think > > that''s probably a fairly unusual thing to do, but it''s not really > > invalid. > > Provided that whatever is managing this change (be it user or some > tool in the guest) knows that this is a multipath situation and to > take the appropriate steps. >Under Xen 3.3 I have seen windows decide that the qemu device and the pv device (same underlying device) were the same and that one was a multipath to another. I assume that this is because a write to one shows up in the other. Under Xen 3.2 this doesn''t happen and things break, horribly. James _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Steven Smith
2009-Jan-07 15:32 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
> > > +#ifndef CONFIG_STUBDOM > > > + /* Invalidate buffer cache for this device. */ > > > + ioctl(s->fd, BLKFLSBUF, 0); > > > +#endif > ... > > So this hunk is probably, strictly speaking, redundant for all current > > driver implementations. > > Right, good. > > > Having said that, it''s clearly more robust to not rely on the various > > drivers being able to get in before any writes are issued, so it''s > > probably a good thing to have anyway. > > Well, except that I would prefer not to carry a change in this part of > the qemu code unless it was actually necessary.It''s obviously always good to reduce skew with upstream, but in this particular case it''s a relatively small patch which eliminates a class of potential bugs which are: -- Nasty, in that they could lead to stuff on disk becoming corrupt. -- Likely to be hard to reliably reproduce. -- Difficult to demonstrate to be absent in all cases, because it''s hard to be absolutely confident that the Windows bootloader doesn''t write *something* under some obscure situation which we haven''t thought of. Personally, I''d feel a lot more confident with the flush present, but if you really hate it then it can probably go. Steven. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Pasi Kärkkäinen
2009-Jan-22 16:13 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
On Wed, Dec 17, 2008 at 08:21:00PM +1100, James Harper wrote:> > On 17/12/2008 08:27, "Keir Fraser" <keir.fraser@eu.citrix.com> wrote: > > > > >> 3.3.1 is feature frozen at this point isn''t it, which means 3.3.2 > for > > >> these patches right? > > > > > > I''m reluctant to introduce anything into a stable branch which would > > prevent > > > us migrating domains up or down the branch. If we are going to shove > it > > in, it > > > should happen now, for 3.3.1. My .1 releases tend to be generously > > > proportioned, but beyond a .1 release I definitely don''t take > anything > > other > > > than pure bug fixes. > > > > The upshot really is: if you can agree on a qemu-dm patch this week > then > > fine (and the interface it implements is then locked and > unchangeable). > > Otherwise it''s a 3.4.0 feature. > > > > Unfortunately I don''t think that gives me enough time to do testing... > what''s the timeframe for a 3.4.0 release? >Was this patch merged already? This would be a good thing to have for Xen 3.3.2 too! -- Pasi _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Pasi Kärkkäinen writes ("Re: [Xen-devel] disable qemu PCI devices in HVM domains"):> [ioport disable protocol patch] > > Was this patch merged already? > This would be a good thing to have for Xen 3.3.2 too!It''s in xen-unstable, yes, but not yet in the 3.3 series. It does seem to have been very stable since it''s gone in - no complaints or requests for amendments. So perhaps we should consider it for a backport. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Pasi Kärkkäinen
2009-Jan-22 19:25 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
On Thu, Jan 22, 2009 at 05:40:10PM +0000, Ian Jackson wrote:> Pasi Kärkkäinen writes ("Re: [Xen-devel] disable qemu PCI devices in HVM domains"): > > [ioport disable protocol patch] > > > > Was this patch merged already? > > This would be a good thing to have for Xen 3.3.2 too! > > It''s in xen-unstable, yes, but not yet in the 3.3 series. > > It does seem to have been very stable since it''s gone in - no > complaints or requests for amendments. So perhaps we should consider > it for a backport. >OK. James Harper has a patch against Xen 3.3.1: http://www.meadowcourt.org/downloads/qemu_disable_patches.zip http://lists.xensource.com/archives/html/xen-users/2009-01/msg00139.html http://lists.xensource.com/archives/html/xen-users/2009-01/msg00142.html http://lists.xensource.com/archives/html/xen-users/2009-01/msg00147.html Comments about merging that into xen-3.3-testing? -- Pasi _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Pasi Kärkkäinen
2009-Mar-02 12:07 UTC
Re: [Xen-devel] disable qemu PCI devices in HVM domains
On Thu, Jan 22, 2009 at 09:25:57PM +0200, Pasi Kärkkäinen wrote:> On Thu, Jan 22, 2009 at 05:40:10PM +0000, Ian Jackson wrote: > > Pasi Kärkkäinen writes ("Re: [Xen-devel] disable qemu PCI devices in HVM domains"): > > > [ioport disable protocol patch] > > > > > > Was this patch merged already? > > > This would be a good thing to have for Xen 3.3.2 too! > > > > It''s in xen-unstable, yes, but not yet in the 3.3 series. > > > > It does seem to have been very stable since it''s gone in - no > > complaints or requests for amendments. So perhaps we should consider > > it for a backport. > > > > OK. > > James Harper has a patch against Xen 3.3.1: > > http://www.meadowcourt.org/downloads/qemu_disable_patches.zip > > http://lists.xensource.com/archives/html/xen-users/2009-01/msg00139.html > http://lists.xensource.com/archives/html/xen-users/2009-01/msg00142.html > http://lists.xensource.com/archives/html/xen-users/2009-01/msg00147.html > > Comments about merging that into xen-3.3-testing? >Btw this backported patch is included in the latest Fedora Xen (3.3.1-6) packages. Would be nice to get it also committed to xen-3.3-testing.hg -- Pasi _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel