All of lore.kernel.org
 help / color / mirror / Atom feed
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: Daniel Kiper <daniel.kiper@oracle.com>
Cc: "xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
	"H. Peter Anvin" <hpa@zytor.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"kexec@lists.infradead.org" <kexec@lists.infradead.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"virtualization@lists.linux-foundation.org"
	<virtualization@lists.linux-foundation.org>,
	"mingo@redhat.com" <mingo@redhat.com>,
	"Eric W. Biederman" <ebiederm@xmission.com>,
	Jan Beulich <JBeulich@suse.com>,
	"maxim.uvarov@oracle.com" <maxim.uvarov@oracle.com>,
	"tglx@linutronix.de" <tglx@linutronix.de>,
	"vgoyal@redhat.com" <vgoyal@redhat.com>
Subject: Re: [Xen-devel] [PATCH v3 00/11] xen: Initial kexec/kdump implementation
Date: Mon, 7 Jan 2013 11:20:18 -0500	[thread overview]
Message-ID: <20130107162018.GJ3219@phenom.dumpdata.com> (raw)
In-Reply-To: <20130107123404.GA2927@host-192-168-1-59.local.net-space.pl>

On Mon, Jan 07, 2013 at 01:34:04PM +0100, Daniel Kiper wrote:
> On Fri, Jan 04, 2013 at 02:11:46PM -0500, Konrad Rzeszutek Wilk wrote:
> > On Fri, Jan 04, 2013 at 06:07:51PM +0100, Daniel Kiper wrote:
> > > On Fri, Jan 04, 2013 at 02:41:17PM +0000, Jan Beulich wrote:
> > > > >>> On 04.01.13 at 15:22, Daniel Kiper <daniel.kiper@oracle.com> wrote:
> > > > > On Wed, Jan 02, 2013 at 11:26:43AM +0000, Andrew Cooper wrote:
> > > > >> /sbin/kexec can load the "Xen" crash kernel itself by issuing
> > > > >> hypercalls using /dev/xen/privcmd.  This would remove the need for
> > > > >> the dom0 kernel to distinguish between loading a crash kernel for
> > > > >> itself and loading a kernel for Xen.
> > > > >>
> > > > >> Or is this just a silly idea complicating the matter?
> > > > >
> > > > > This is impossible with current Xen kexec/kdump interface.
> > > >
> > > > Why?
> > >
> > > Because current KEXEC_CMD_kexec_load does not load kernel
> > > image and other things into Xen memory. It means that it
> > > should live somewhere in dom0 Linux kernel memory.
> >
> > We could have a very simple hypercall which would have:
> >
> > struct fancy_new_hypercall {
> > 	xen_pfn_t payload; // IN
> > 	ssize_t len; // IN
> > #define DATA (1<<1)
> > #define DATA_EOF (1<<2)
> > #define DATA_KERNEL (1<<3)
> > #define DATA_RAMDISK (1<<4)
> > 	unsigned int flags; // IN
> > 	unsigned int status; // OUT
> > };
> >
> > which would in a loop just iterate over the payloads and
> > let the hypervisor stick it in the crashkernel space.
> >
> > This is all hand-waving of course. There probably would be a need
> > to figure out how much space you have in the reserved Xen's
> > 'crashkernel' memory region too.
> 
> I think that new kexec hypercall function should mimics kexec syscall.
> It means that all arguments passed to hypercall should have same types
> if it is possible or if it is not possible then conversion should be done
> in very easy way. Additionally, I think that one call of new hypercall
> load function should load all needed thinks in right place and
> return relevant status. Last but not least, new functionality should

We are not restricted to just _one_ hypercall. And this loading
thing could be similar to the micrcode hypercall - which just points
to a virtual address along with the length - and says 'load me'.

> be available through /dev/xen/privcmd or directly from kernel without
> bigger effort.

Perhaps we should have a email thread on xen-devel where we hash out
some ideas. Eric, would you be OK included on this - it would make
sense for this mechanism to be as future-proof as possible - and I am not
sure what your plans for kexec are in the future?
> 
> Daniel

_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec

WARNING: multiple messages have this Message-ID (diff)
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: Daniel Kiper <daniel.kiper@oracle.com>
Cc: "xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
	"H. Peter Anvin" <hpa@zytor.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"kexec@lists.infradead.org" <kexec@lists.infradead.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"virtualization@lists.linux-foundation.org"
	<virtualization@lists.linux-foundation.org>,
	"mingo@redhat.com" <mingo@redhat.com>,
	"Eric W. Biederman" <ebiederm@xmission.com>,
	Jan Beulich <JBeulich@suse.com>,
	"maxim.uvarov@oracle.com" <maxim.uvarov@oracle.com>,
	"tglx@linutronix.de" <tglx@linutronix.de>,
	"vgoyal@redhat.com" <vgoyal@redhat.com>
Subject: Re: [Xen-devel] [PATCH v3 00/11] xen: Initial kexec/kdump implementation
Date: Mon, 7 Jan 2013 11:20:18 -0500	[thread overview]
Message-ID: <20130107162018.GJ3219@phenom.dumpdata.com> (raw)
In-Reply-To: <20130107123404.GA2927@host-192-168-1-59.local.net-space.pl>

On Mon, Jan 07, 2013 at 01:34:04PM +0100, Daniel Kiper wrote:
> On Fri, Jan 04, 2013 at 02:11:46PM -0500, Konrad Rzeszutek Wilk wrote:
> > On Fri, Jan 04, 2013 at 06:07:51PM +0100, Daniel Kiper wrote:
> > > On Fri, Jan 04, 2013 at 02:41:17PM +0000, Jan Beulich wrote:
> > > > >>> On 04.01.13 at 15:22, Daniel Kiper <daniel.kiper@oracle.com> wrote:
> > > > > On Wed, Jan 02, 2013 at 11:26:43AM +0000, Andrew Cooper wrote:
> > > > >> /sbin/kexec can load the "Xen" crash kernel itself by issuing
> > > > >> hypercalls using /dev/xen/privcmd.  This would remove the need for
> > > > >> the dom0 kernel to distinguish between loading a crash kernel for
> > > > >> itself and loading a kernel for Xen.
> > > > >>
> > > > >> Or is this just a silly idea complicating the matter?
> > > > >
> > > > > This is impossible with current Xen kexec/kdump interface.
> > > >
> > > > Why?
> > >
> > > Because current KEXEC_CMD_kexec_load does not load kernel
> > > image and other things into Xen memory. It means that it
> > > should live somewhere in dom0 Linux kernel memory.
> >
> > We could have a very simple hypercall which would have:
> >
> > struct fancy_new_hypercall {
> > 	xen_pfn_t payload; // IN
> > 	ssize_t len; // IN
> > #define DATA (1<<1)
> > #define DATA_EOF (1<<2)
> > #define DATA_KERNEL (1<<3)
> > #define DATA_RAMDISK (1<<4)
> > 	unsigned int flags; // IN
> > 	unsigned int status; // OUT
> > };
> >
> > which would in a loop just iterate over the payloads and
> > let the hypervisor stick it in the crashkernel space.
> >
> > This is all hand-waving of course. There probably would be a need
> > to figure out how much space you have in the reserved Xen's
> > 'crashkernel' memory region too.
> 
> I think that new kexec hypercall function should mimics kexec syscall.
> It means that all arguments passed to hypercall should have same types
> if it is possible or if it is not possible then conversion should be done
> in very easy way. Additionally, I think that one call of new hypercall
> load function should load all needed thinks in right place and
> return relevant status. Last but not least, new functionality should

We are not restricted to just _one_ hypercall. And this loading
thing could be similar to the micrcode hypercall - which just points
to a virtual address along with the length - and says 'load me'.

> be available through /dev/xen/privcmd or directly from kernel without
> bigger effort.

Perhaps we should have a email thread on xen-devel where we hash out
some ideas. Eric, would you be OK included on this - it would make
sense for this mechanism to be as future-proof as possible - and I am not
sure what your plans for kexec are in the future?
> 
> Daniel

WARNING: multiple messages have this Message-ID (diff)
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: Daniel Kiper <daniel.kiper@oracle.com>
Cc: Jan Beulich <JBeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	"x86@kernel.org" <x86@kernel.org>,
	"tglx@linutronix.de" <tglx@linutronix.de>,
	"kexec@lists.infradead.org" <kexec@lists.infradead.org>,
	"virtualization@lists.linux-foundation.org" 
	<virtualization@lists.linux-foundation.org>,
	"xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
	"maxim.uvarov@oracle.com" <maxim.uvarov@oracle.com>,
	"mingo@redhat.com" <mingo@redhat.com>,
	"vgoyal@redhat.com" <vgoyal@redhat.com>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"Eric W. Biederman" <ebiederm@xmission.com>,
	"H. Peter Anvin" <hpa@zytor.com>
Subject: Re: [Xen-devel] [PATCH v3 00/11] xen: Initial kexec/kdump implementation
Date: Mon, 7 Jan 2013 11:20:18 -0500	[thread overview]
Message-ID: <20130107162018.GJ3219@phenom.dumpdata.com> (raw)
In-Reply-To: <20130107123404.GA2927@host-192-168-1-59.local.net-space.pl>

On Mon, Jan 07, 2013 at 01:34:04PM +0100, Daniel Kiper wrote:
> On Fri, Jan 04, 2013 at 02:11:46PM -0500, Konrad Rzeszutek Wilk wrote:
> > On Fri, Jan 04, 2013 at 06:07:51PM +0100, Daniel Kiper wrote:
> > > On Fri, Jan 04, 2013 at 02:41:17PM +0000, Jan Beulich wrote:
> > > > >>> On 04.01.13 at 15:22, Daniel Kiper <daniel.kiper@oracle.com> wrote:
> > > > > On Wed, Jan 02, 2013 at 11:26:43AM +0000, Andrew Cooper wrote:
> > > > >> /sbin/kexec can load the "Xen" crash kernel itself by issuing
> > > > >> hypercalls using /dev/xen/privcmd.  This would remove the need for
> > > > >> the dom0 kernel to distinguish between loading a crash kernel for
> > > > >> itself and loading a kernel for Xen.
> > > > >>
> > > > >> Or is this just a silly idea complicating the matter?
> > > > >
> > > > > This is impossible with current Xen kexec/kdump interface.
> > > >
> > > > Why?
> > >
> > > Because current KEXEC_CMD_kexec_load does not load kernel
> > > image and other things into Xen memory. It means that it
> > > should live somewhere in dom0 Linux kernel memory.
> >
> > We could have a very simple hypercall which would have:
> >
> > struct fancy_new_hypercall {
> > 	xen_pfn_t payload; // IN
> > 	ssize_t len; // IN
> > #define DATA (1<<1)
> > #define DATA_EOF (1<<2)
> > #define DATA_KERNEL (1<<3)
> > #define DATA_RAMDISK (1<<4)
> > 	unsigned int flags; // IN
> > 	unsigned int status; // OUT
> > };
> >
> > which would in a loop just iterate over the payloads and
> > let the hypervisor stick it in the crashkernel space.
> >
> > This is all hand-waving of course. There probably would be a need
> > to figure out how much space you have in the reserved Xen's
> > 'crashkernel' memory region too.
> 
> I think that new kexec hypercall function should mimics kexec syscall.
> It means that all arguments passed to hypercall should have same types
> if it is possible or if it is not possible then conversion should be done
> in very easy way. Additionally, I think that one call of new hypercall
> load function should load all needed thinks in right place and
> return relevant status. Last but not least, new functionality should

We are not restricted to just _one_ hypercall. And this loading
thing could be similar to the micrcode hypercall - which just points
to a virtual address along with the length - and says 'load me'.

> be available through /dev/xen/privcmd or directly from kernel without
> bigger effort.

Perhaps we should have a email thread on xen-devel where we hash out
some ideas. Eric, would you be OK included on this - it would make
sense for this mechanism to be as future-proof as possible - and I am not
sure what your plans for kexec are in the future?
> 
> Daniel

  parent reply	other threads:[~2013-01-07 16:20 UTC|newest]

Thread overview: 187+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-12-27  2:18 [PATCH v3 00/11] xen: Initial kexec/kdump implementation Daniel Kiper
2012-12-27  2:18 ` Daniel Kiper
2012-12-27  2:18 ` [PATCH v3 01/11] kexec: introduce kexec firmware support Daniel Kiper
2012-12-27  2:18 ` Daniel Kiper
2012-12-27  2:18   ` Daniel Kiper
2012-12-27  2:18   ` [PATCH v3 02/11] x86/kexec: Add extra pointers to transition page table PGD, PUD, PMD and PTE Daniel Kiper
2012-12-27  2:18   ` Daniel Kiper
2012-12-27  2:18     ` Daniel Kiper
2012-12-27  2:18     ` [PATCH v3 03/11] xen: Introduce architecture independent data for kexec/kdump Daniel Kiper
2012-12-27  2:18     ` Daniel Kiper
2012-12-27  2:18       ` Daniel Kiper
2012-12-27  2:18       ` [PATCH v3 04/11] x86/xen: Introduce architecture dependent " Daniel Kiper
2012-12-27  2:18         ` Daniel Kiper
2012-12-27  2:18         ` [PATCH v3 05/11] x86/xen: Register resources required by kexec-tools Daniel Kiper
2012-12-27  2:18         ` Daniel Kiper
2012-12-27  2:18           ` Daniel Kiper
2012-12-27  2:18           ` [PATCH v3 06/11] x86/xen: Add i386 kexec/kdump implementation Daniel Kiper
2012-12-27  2:18             ` Daniel Kiper
2012-12-27  2:18             ` [PATCH v3 07/11] x86/xen: Add x86_64 " Daniel Kiper
2012-12-27  2:18               ` Daniel Kiper
2012-12-27  2:18               ` [PATCH v3 08/11] x86/xen: Add kexec/kdump Kconfig and makefile rules Daniel Kiper
2012-12-27  2:18                 ` Daniel Kiper
2012-12-27  2:18                 ` [PATCH v3 09/11] x86/xen/enlighten: Add init and crash kexec/kdump hooks Daniel Kiper
2012-12-27  2:18                 ` Daniel Kiper
2012-12-27  2:18                   ` Daniel Kiper
2012-12-27  2:18                   ` [PATCH v3 10/11] drivers/xen: Export vmcoreinfo through sysfs Daniel Kiper
2012-12-27  2:18                   ` Daniel Kiper
2012-12-27  2:18                     ` Daniel Kiper
2012-12-27  2:19                     ` [PATCH v3 11/11] x86: Add Xen kexec control code size check to linker script Daniel Kiper
2012-12-27  2:19                     ` Daniel Kiper
2012-12-27  2:19                       ` Daniel Kiper
2012-12-27 18:53                   ` [PATCH v3 09/11] x86/xen/enlighten: Add init and crash kexec/kdump hooks H. Peter Anvin
2012-12-27 18:53                     ` H. Peter Anvin
2012-12-27 18:53                     ` H. Peter Anvin
2012-12-27  2:18               ` [PATCH v3 08/11] x86/xen: Add kexec/kdump Kconfig and makefile rules Daniel Kiper
2012-12-27  2:18             ` [PATCH v3 07/11] x86/xen: Add x86_64 kexec/kdump implementation Daniel Kiper
2012-12-27  4:00             ` [PATCH v3 06/11] x86/xen: Add i386 " H. Peter Anvin
2012-12-27  4:00               ` H. Peter Anvin
2012-12-27  4:00               ` H. Peter Anvin
2012-12-27  2:18           ` Daniel Kiper
2012-12-27  2:18       ` [PATCH v3 04/11] x86/xen: Introduce architecture dependent data for kexec/kdump Daniel Kiper
2012-12-27  3:33     ` [PATCH v3 02/11] x86/kexec: Add extra pointers to transition page table PGD, PUD, PMD and PTE H. Peter Anvin
2012-12-27  3:33       ` H. Peter Anvin
2013-01-03  9:34     ` Jan Beulich
2013-01-03  9:34       ` Jan Beulich
2013-01-03  9:34       ` Jan Beulich
2013-01-04 15:15       ` Daniel Kiper
2013-01-04 15:15         ` Daniel Kiper
2013-01-04 15:15         ` Daniel Kiper
2013-01-04 16:12         ` Jan Beulich
2013-01-04 16:12           ` Jan Beulich
2013-01-04 16:12           ` Jan Beulich
2013-01-04 17:25           ` Daniel Kiper
2013-01-04 17:25             ` Daniel Kiper
2013-01-04 17:25             ` Daniel Kiper
2013-01-07  9:48             ` Jan Beulich
2013-01-07  9:48               ` Jan Beulich
2013-01-07 12:52               ` Daniel Kiper
2013-01-07 12:52                 ` Daniel Kiper
2013-01-07 12:52                 ` Daniel Kiper
2013-01-07 13:05                 ` Jan Beulich
2013-01-07 13:05                   ` Jan Beulich
2013-01-07 13:05                   ` Jan Beulich
2013-01-09 18:42                   ` Daniel Kiper
2013-01-09 18:42                   ` Daniel Kiper
2013-01-09 18:42                     ` Daniel Kiper
2013-01-07  9:48             ` Jan Beulich
2013-01-10 14:07         ` [Xen-devel] " David Vrabel
2013-01-10 14:07           ` David Vrabel
2013-01-10 14:07           ` David Vrabel
2013-01-11 13:36           ` Daniel Kiper
2013-01-11 13:36             ` Daniel Kiper
2013-01-11 13:36             ` Daniel Kiper
2012-12-27  4:46   ` [PATCH v3 01/11] kexec: introduce kexec firmware support Eric W. Biederman
2012-12-27  4:46     ` Eric W. Biederman
2012-12-27  4:46     ` Eric W. Biederman
2012-12-27  4:02 ` [PATCH v3 00/11] xen: Initial kexec/kdump implementation H. Peter Anvin
2012-12-27  4:02   ` H. Peter Anvin
2012-12-27  4:02   ` H. Peter Anvin
2012-12-27  7:53   ` Eric W. Biederman
2012-12-27  7:53     ` Eric W. Biederman
2012-12-27  7:53     ` Eric W. Biederman
2012-12-27 14:18     ` Andrew Cooper
2012-12-27 14:18       ` Andrew Cooper
2012-12-27 14:18       ` Andrew Cooper
2012-12-27 18:02       ` Eric W. Biederman
2012-12-27 18:02         ` Eric W. Biederman
2012-12-27 18:02         ` Eric W. Biederman
2013-01-02 11:26         ` [Xen-devel] " Andrew Cooper
2013-01-02 11:26           ` Andrew Cooper
2013-01-02 11:26           ` Andrew Cooper
2013-01-02 11:47           ` Eric W. Biederman
2013-01-02 11:47             ` Eric W. Biederman
2013-01-02 11:47             ` Eric W. Biederman
2013-01-03  9:31           ` Jan Beulich
2013-01-03  9:31             ` Jan Beulich
2013-01-03  9:31             ` Jan Beulich
2013-01-04 14:22           ` Daniel Kiper
2013-01-04 14:22             ` Daniel Kiper
2013-01-04 14:22             ` Daniel Kiper
2013-01-04 14:34             ` Konrad Rzeszutek Wilk
2013-01-04 14:34               ` Konrad Rzeszutek Wilk
2013-01-04 14:34               ` Konrad Rzeszutek Wilk
2013-01-04 14:34             ` Ian Campbell
2013-01-04 14:34               ` Ian Campbell
2013-01-04 14:34               ` Ian Campbell
2013-01-04 14:38             ` David Vrabel
2013-01-04 14:38             ` David Vrabel
2013-01-04 14:38               ` David Vrabel
2013-01-04 17:01               ` Daniel Kiper
2013-01-04 17:01                 ` Daniel Kiper
2013-01-04 17:01                 ` Daniel Kiper
2013-01-10 14:19                 ` David Vrabel
2013-01-10 14:19                   ` David Vrabel
2013-01-10 14:19                   ` David Vrabel
2013-01-11 13:22                   ` Daniel Kiper
2013-01-11 13:22                     ` Daniel Kiper
2013-01-11 13:22                     ` Daniel Kiper
2013-01-11 15:22                     ` David Vrabel
2013-01-11 15:22                       ` David Vrabel
2013-01-11 15:22                       ` David Vrabel
2013-01-11 17:34                       ` Daniel Kiper
2013-01-11 17:34                         ` Daniel Kiper
2013-01-11 17:34                         ` Daniel Kiper
2013-01-11 20:05                       ` Eric W. Biederman
2013-01-11 20:05                         ` Eric W. Biederman
2013-01-11 20:05                         ` Eric W. Biederman
2013-01-04 14:41             ` Jan Beulich
2013-01-04 14:41               ` Jan Beulich
2013-01-04 14:41               ` Jan Beulich
2013-01-04 17:07               ` Daniel Kiper
2013-01-04 17:07                 ` Daniel Kiper
2013-01-04 19:11                 ` Konrad Rzeszutek Wilk
2013-01-04 19:11                   ` Konrad Rzeszutek Wilk
2013-01-04 19:11                   ` Konrad Rzeszutek Wilk
2013-01-07 10:25                   ` Ian Campbell
2013-01-07 10:25                   ` Ian Campbell
2013-01-07 10:25                     ` Ian Campbell
2013-01-07 10:46                     ` Andrew Cooper
2013-01-07 10:46                       ` Andrew Cooper
2013-01-07 10:46                       ` Andrew Cooper
2013-01-07 10:54                       ` Ian Campbell
2013-01-07 10:54                         ` Ian Campbell
2013-01-07 10:54                         ` Ian Campbell
2013-01-07 12:34                   ` Daniel Kiper
2013-01-07 12:34                     ` Daniel Kiper
2013-01-07 12:34                     ` Daniel Kiper
2013-01-07 13:49                     ` Ian Campbell
2013-01-07 13:49                       ` Ian Campbell
2013-01-11 13:47                       ` Daniel Kiper
2013-01-11 13:47                         ` Daniel Kiper
2013-01-11 13:47                         ` Daniel Kiper
2013-01-07 13:49                     ` Ian Campbell
2013-01-07 16:20                     ` Konrad Rzeszutek Wilk [this message]
2013-01-07 16:20                       ` Konrad Rzeszutek Wilk
2013-01-07 16:20                       ` Konrad Rzeszutek Wilk
2013-01-11  4:16                       ` Eric W. Biederman
2013-01-11  4:16                         ` Eric W. Biederman
2013-01-11  4:16                         ` Eric W. Biederman
2013-01-11 16:55                         ` Konrad Rzeszutek Wilk
2013-01-11 16:55                           ` Konrad Rzeszutek Wilk
2013-01-11 16:55                           ` Konrad Rzeszutek Wilk
2013-01-11 20:26                           ` H. Peter Anvin
2013-01-11 20:26                             ` H. Peter Anvin
2013-01-11 20:26                             ` H. Peter Anvin
2013-01-11 20:43                             ` Vivek Goyal
2013-01-11 20:43                               ` Vivek Goyal
2013-01-11 20:43                               ` Vivek Goyal
2013-01-11 20:26                           ` Eric W. Biederman
2013-01-11 20:26                             ` Eric W. Biederman
2013-01-11 20:26                             ` Eric W. Biederman
2013-01-11 20:52                             ` Vivek Goyal
2013-01-11 20:52                               ` Vivek Goyal
2013-01-11 20:52                               ` Vivek Goyal
2013-01-11 21:03                               ` H. Peter Anvin
2013-01-11 21:03                                 ` H. Peter Anvin
2013-01-11 21:08                                 ` Vivek Goyal
2013-01-11 21:08                                   ` Vivek Goyal
2013-01-11 21:14                                   ` H. Peter Anvin
2013-01-11 21:14                                     ` H. Peter Anvin
2013-01-11 21:14                                     ` H. Peter Anvin
2013-01-11 21:08                                 ` Vivek Goyal
2013-01-11 21:03                               ` H. Peter Anvin
2013-01-04 17:07               ` Daniel Kiper
2013-01-02 15:27       ` Ian Campbell
2013-01-02 15:27         ` Ian Campbell
2013-01-02 15:27       ` Ian Campbell

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20130107162018.GJ3219@phenom.dumpdata.com \
    --to=konrad.wilk@oracle.com \
    --cc=JBeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=daniel.kiper@oracle.com \
    --cc=ebiederm@xmission.com \
    --cc=hpa@zytor.com \
    --cc=kexec@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=maxim.uvarov@oracle.com \
    --cc=mingo@redhat.com \
    --cc=tglx@linutronix.de \
    --cc=vgoyal@redhat.com \
    --cc=virtualization@lists.linux-foundation.org \
    --cc=x86@kernel.org \
    --cc=xen-devel@lists.xensource.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.