From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.3 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6AFADC433B4 for ; Tue, 6 Apr 2021 18:32:05 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 2A52D613B3 for ; Tue, 6 Apr 2021 18:32:05 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 2A52D613B3 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=xen.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from list by lists.xenproject.org with outflank-mailman.106221.203161 (Exim 4.92) (envelope-from ) id 1lTqUQ-0007a0-HB; Tue, 06 Apr 2021 18:31:50 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 106221.203161; Tue, 06 Apr 2021 18:31:50 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1lTqUQ-0007Zt-DT; Tue, 06 Apr 2021 18:31:50 +0000 Received: by outflank-mailman (input) for mailman id 106221; Tue, 06 Apr 2021 18:31:49 +0000 Received: from mail.xenproject.org ([104.130.215.37]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1lTqUP-0007Ze-1N for xen-devel@lists.xenproject.org; Tue, 06 Apr 2021 18:31:49 +0000 Received: from xenbits.xenproject.org ([104.239.192.120]) by mail.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1lTqUH-0004ly-RI; Tue, 06 Apr 2021 18:31:41 +0000 Received: from 54-240-197-234.amazon.com ([54.240.197.234] helo=a483e7b01a66.ant.amazon.com) by xenbits.xenproject.org with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from ) id 1lTqUH-0004UM-GK; Tue, 06 Apr 2021 18:31:41 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org; s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To: MIME-Version:Date:Message-ID:From:References:Cc:To:Subject; bh=tWsW5Yoj4ql+j1gAVglHFf6MMTnUyNPXS0mFzyE1Gv0=; b=ZgAa1fbMHt7iXBcwBp9I6VE+3l 3BrnVHFa8AK80SBzFdT+gpk3ZPU4Y+i15uczb+JYEbq0CC+5vPXWhbElYIWAxXlGLxGJfAf+VmvA4 VsjCF6Bsj4oJZ8VdChKVpVE4v4UoIboaGp0B8SZ+3AxEJbsAzalnBhJCMzc/DJtncv9s=; Subject: Re: [PATCH 0/2] xen/arm: Couple of bug fixes when decompressing kernels To: xen-devel@lists.xenproject.org Cc: bertrand.marquis@arm.com, Julien Grall , Stefano Stabellini , Volodymyr Babchuk , Andrew Cooper , George Dunlap , Ian Jackson , Jan Beulich , Wei Liu References: <20210402152105.29387-1-julien@xen.org> From: Julien Grall Message-ID: <7d105207-7bd4-66b2-0ff3-d1e684da123f@xen.org> Date: Tue, 6 Apr 2021 19:31:39 +0100 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <20210402152105.29387-1-julien@xen.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Hi, On 02/04/2021 16:21, Julien Grall wrote: > From: Julien Grall > > Hi all, > > The main goal of this series is to address the bug report [1]. It is not > possible > > While testing the series, I also noticed that it is not possible to > re-use the same compressed kernel for multiple domains as the module > will be overwritten during the first decompression. > > I am still a bit undecided how to fix it. We can either create a new > module for the uncompressed kernel and link with the compressed kernel. > Or we could decompress everytime. > > One inconvenience to kernel to only decompress once is we have to keep > it until all the domains have booted. This may means a lot of memory to be > wasted just for keeping the uncompressed kernel (one my setup, it takes > ~3 times more space). > > Any opinions on how to approach it? > > Cheers, > > [1] https://lists.xenproject.org/archives/html/xen-users/2021-02/msg00027.html > > Julien Grall (2): > xen/arm: kernel: Propagate the error if we fail to decompress the > kernel > xen/gunzip: Allow perform_gunzip() to be called multiple times I have committed the second patch as it is independent. The first patch still need some reviews. Cheers, -- Julien Grall