From mboxrd@z Thu Jan 1 00:00:00 1970 From: Konrad Rzeszutek Wilk Subject: Re: [RFC Design Doc] Add vNVDIMM support for Xen Date: Thu, 18 Feb 2016 21:14:20 -0500 Message-ID: <20160219021419.GB30364@localhost.localdomain> References: <20160201054414.GA25211@hz-desktop.sh.intel.com> <20160202191519.GB21656@char.us.oracle.com> <20160215084352.GB8938@hz-desktop.sh.intel.com> <56C1BF9302000078000D202D@prv-mh.provo.novell.com> <20160217090105.GD5459@hz-desktop.sh.intel.com> <56C4469C02000078000D2F64@prv-mh.provo.novell.com> <20160218074227.GC6519@hz-desktop.sh.intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Content-Disposition: inline In-Reply-To: <20160218074227.GC6519@hz-desktop.sh.intel.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Jan Beulich , Andrew Cooper , Ian Campbell , Wei Liu , George Dunlap , Ian Jackson , Stefano Stabellini , Jun Nakajima , Kevin Tian , Xiao Guangrong , "xen-devel@lists.xen.org" , Juergen Gross , Keir Fraser List-Id: xen-devel@lists.xenproject.org > > > QEMU would always use MFN above guest normal ram and I/O holes for > > > vNVDIMM. It would attempt to search in that space for a contiguous range > > > that is large enough for that that vNVDIMM devices. Is guest able to > > > punch holes in such GFN space? > > > > See XENMAPSPACE_* and their uses. > > > > I think we can add following restrictions to avoid uses of XENMAPSPACE_* > punching holes in GFNs of vNVDIMM: > > (1) For XENMAPSPACE_shared_info and _grant_table, never map idx in them > to GFNs occupied by vNVDIMM. OK, that sounds correct. > > (2) For XENMAPSPACE_gmfn, _gmfn_range and _gmfn_foreign, > (a) never map idx in them to GFNs occupied by vNVDIMM, and > (b) never map idx corresponding to GFNs occupied by vNVDIMM Would that mean that guest xen-blkback or xen-netback wouldn't be able to fetch data from the GFNs? As in, what if the HVM guest that has the NVDIMM also serves as a device domain - that is it has xen-blkback running to service other guests? > > > Haozhong