[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2 07/10] vm_event: Add vm_event_ng interface


  • To: Paul Durrant <Paul.Durrant@xxxxxxxxxx>
  • From: Jan Beulich <JBeulich@xxxxxxxx>
  • Date: Fri, 19 Jul 2019 08:22:28 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=suse.com;dmarc=pass action=none header.from=suse.com;dkim=pass header.d=suse.com;arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IrxE3Oz2/1KgyRJSQz+YPit0dBLCIEG+OhMylKrk9rg=; b=Id0Ll2KJ1rYa5VzUDT/R9plY0g+UeHhCVJSusTVHGHujr/jxCQRTCAY7R1mUjYz1pD6ld1qZYiBsOSUUeQrAGz/WbnDGZ2lISDdcM3OGMKe3R95aBZdAmWN98g+o3DQiWfr+RbbLfmhoO0BiFCCfif8gpZZeIeW7UJ4GLigkDZRgtWXxSCTDxphMlD0rDBkTG+34OhT+WxIWAdkIrXDmzquRTFFzRVogk/6birZI38d7IRrx9vnrEVmU0uLPaXyuR7Syq5cdyhJskk2OCZ1O4K8GF/uo8J/CAgS7ovj4l11EVjtyEOMUyC4KfNsaCqvcdLXnJ79CqETSO9inhIyxIw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=S9guZ5YV6/aCm1DVPtgUGvUqxkFVE1B2Hmb1sya9ZUIMQiNK3U4KWmvmnu4rfgU997iJYzUFp+Y49i7RWMdhLolhskQi8ErhIjRPUaiZHHkmWSU+V5JhVOXTI3VyG6zgnZTKirSNGzhJFDxt/s92aG+WG4rX3BQl6bZ/SbSaThNcjZWFVIDY1MR2GQhV+YaUnAoQnWnp3uKZI3xXy8sJF/koq1DVn4jF/vjcwc/RV3Necj3rsxI7HbC/k6GiHiKfuCHS9sFR7/SZrzl17JNPO+6usJaEVUUIhj0bk13v8DDj3xob6ge5bHptp/tvkjzKiFtLlgAUk//uZMKh7a4zLw==
  • Authentication-results: spf=none (sender IP is ) smtp.mailfrom=JBeulich@xxxxxxxx;
  • Cc: 'Petre Ovidiu PIRCALABU' <ppircalabu@xxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>, KonradRzeszutek Wilk <konrad.wilk@xxxxxxxxxx>, Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>, "Tim \(Xen.org\)" <tim@xxxxxxx>, George Dunlap <George.Dunlap@xxxxxxxxxx>, JulienGrall <julien.grall@xxxxxxx>, Tamas K Lengyel <tamas@xxxxxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx>, Ian Jackson <Ian.Jackson@xxxxxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Delivery-date: Fri, 19 Jul 2019 08:24:04 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHVO/ja8zGHp8jkY0SwPhMewFAvpabOwNgAgAAfJACAAWdVAIABTcoAgAAJIgA=
  • Thread-topic: [PATCH v2 07/10] vm_event: Add vm_event_ng interface

On 19.07.2019 09:56, Paul Durrant wrote:
>> From: Petre Ovidiu PIRCALABU <ppircalabu@xxxxxxxxxxxxxxx>
>> Sent: 18 July 2019 14:59
>>
>> So, at this point the most promising solution is allocating the memory
>> in XEN, sharing it with ID using share_xen_page_with_guest, and mapping
>> it with xenforeignmemory_map_resource (with the flag
>> XENMEM_rsrc_acq_caller_owned set)
> 
> If that page is shared with the ID then XENMEM_rsrc_acq_caller_owned
> should *not* be set. Also, that flag is an 'out' flag... the caller
> doesn't decide who owns the resource.

I had implied that it's really MD that's meant here, but maybe I was
wrong doing so.

> TBH I regret ever introducing the flag; it caused a lot of problems,
> which is why it is no longer used.

It's a tools only interface - why don't we drop the flag if you now
think it was a bad idea to introduce it?

Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.