From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:49557) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1bziTP-00079n-SO for qemu-devel@nongnu.org; Thu, 27 Oct 2016 07:03:55 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1bziTK-00020D-Sk for qemu-devel@nongnu.org; Thu, 27 Oct 2016 07:03:51 -0400 Received: from smtp.citrix.com ([66.165.176.89]:19006) by eggs.gnu.org with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16) (Exim 4.71) (envelope-from ) id 1bziTK-0001yx-Lu for qemu-devel@nongnu.org; Thu, 27 Oct 2016 07:03:46 -0400 Date: Thu, 27 Oct 2016 12:03:42 +0100 From: Wei Liu Message-ID: <20161027110342.GY30231@citrix.com> References: <1477416484-29054-1-git-send-email-wei.liu2@citrix.com> <20161026170952.18c02dbb@nial.brq.redhat.com> <20161026152234.GQ30231@citrix.com> <20161027125402.63484b99@nial.brq.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20161027125402.63484b99@nial.brq.redhat.com> Subject: Re: [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Igor Mammedov Cc: Wei Liu , Anthony PERARD , Xen-devel , Stefano Stabellini , qemu-devel@nongnu.org, Sander Eikelenboom Cc Sander On Thu, Oct 27, 2016 at 12:54:02PM +0200, Igor Mammedov wrote: > On Wed, 26 Oct 2016 16:22:34 +0100 > Wei Liu wrote: > > > On Wed, Oct 26, 2016 at 05:09:52PM +0200, Igor Mammedov wrote: > > > On Tue, 25 Oct 2016 18:28:04 +0100 > > > Wei Liu wrote: > > > > > > > Xen's toolstack is in charge of building ACPI tables. Skip acpi table > > > > building if running on Xen. > > > > > > > > This issue is discovered due to direct kernel boot on Xen doesn't boot > > > > anymore, because the new ACPI tables cause the guest to exceed its > > > > memory allocation limit. > > > > > > > > Reported-by: Sander Eikelenboom > > > > Signed-off-by: Wei Liu > > > Question is: > > > Why does xen guest get ACPI tables from QEMU instead of using > > > Xen provided ones. > > > Maybe it's firmware issue i.e. firmware side shouldn't load > > > ACPI tables from QEMU provided fwcfg file and load Xen provided instead. > > > > > > > It hasn't come to the point that the guest is booted. QEMU exits when > > trying to populate some pages for the guest, at which point the guest > > has not yet been started. In a sense, Xen guest doesn't get ACPI from > > QEMU because it never gets to that point. > > > > Direct kernel boot causes fw_cfg to be filled in. pcms->has_acpi_build > > defaults to true and acpi_enabled is also true. These make all checks in > > acpi_setup pass. QEMU proceeds to build and load ACPI tables (which are > > never going to be used by Xen guests), causing the guest to exceeds its > > limit. > > > > Wei. > Would something like this fix issue for you? > > diff --git a/hw/i386/pc_piix.c b/hw/i386/pc_piix.c > index a54a468..61b6026 100644 > --- a/hw/i386/pc_piix.c > +++ b/hw/i386/pc_piix.c > @@ -1094,10 +1094,13 @@ DEFINE_PC_MACHINE(isapc, "isapc", pc_init_isa, > #ifdef CONFIG_XEN > static void xenfv_machine_options(MachineClass *m) > { > + PCMachineClass *pcmc = PC_MACHINE_CLASS(m); > + > m->desc = "Xen Fully-virtualized PC"; > m->max_cpus = HVM_MAX_VCPUS; > m->default_machine_opts = "accel=xen"; > m->hot_add_cpu = pc_hot_add_cpu; > + pcmc->has_acpi_build = false; > } > > DEFINE_PC_MACHINE(xenfv, "xenfv", pc_xen_hvm_init, > Yes, it does. (I have a similar patch in my queue already) Wei. From mboxrd@z Thu Jan 1 00:00:00 1970 From: Wei Liu Subject: Re: [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests Date: Thu, 27 Oct 2016 12:03:42 +0100 Message-ID: <20161027110342.GY30231@citrix.com> References: <1477416484-29054-1-git-send-email-wei.liu2@citrix.com> <20161026170952.18c02dbb@nial.brq.redhat.com> <20161026152234.GQ30231@citrix.com> <20161027125402.63484b99@nial.brq.redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Return-path: Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1bziTK-00068A-Ak for xen-devel@lists.xenproject.org; Thu, 27 Oct 2016 11:03:46 +0000 Content-Disposition: inline In-Reply-To: <20161027125402.63484b99@nial.brq.redhat.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" To: Igor Mammedov Cc: Stefano Stabellini , Wei Liu , qemu-devel@nongnu.org, Sander Eikelenboom , Anthony PERARD , Xen-devel List-Id: xen-devel@lists.xenproject.org Q2MgU2FuZGVyCgpPbiBUaHUsIE9jdCAyNywgMjAxNiBhdCAxMjo1NDowMlBNICswMjAwLCBJZ29y IE1hbW1lZG92IHdyb3RlOgo+IE9uIFdlZCwgMjYgT2N0IDIwMTYgMTY6MjI6MzQgKzAxMDAKPiBX ZWkgTGl1IDx3ZWkubGl1MkBjaXRyaXguY29tPiB3cm90ZToKPiAKPiA+IE9uIFdlZCwgT2N0IDI2 LCAyMDE2IGF0IDA1OjA5OjUyUE0gKzAyMDAsIElnb3IgTWFtbWVkb3Ygd3JvdGU6Cj4gPiA+IE9u IFR1ZSwgMjUgT2N0IDIwMTYgMTg6Mjg6MDQgKzAxMDAKPiA+ID4gV2VpIExpdSA8d2VpLmxpdTJA Y2l0cml4LmNvbT4gd3JvdGU6Cj4gPiA+ICAgCj4gPiA+ID4gWGVuJ3MgdG9vbHN0YWNrIGlzIGlu IGNoYXJnZSBvZiBidWlsZGluZyBBQ1BJIHRhYmxlcy4gU2tpcCBhY3BpIHRhYmxlCj4gPiA+ID4g YnVpbGRpbmcgaWYgcnVubmluZyBvbiBYZW4uCj4gPiA+ID4gCj4gPiA+ID4gVGhpcyBpc3N1ZSBp cyBkaXNjb3ZlcmVkIGR1ZSB0byBkaXJlY3Qga2VybmVsIGJvb3Qgb24gWGVuIGRvZXNuJ3QgYm9v dAo+ID4gPiA+IGFueW1vcmUsIGJlY2F1c2UgdGhlIG5ldyBBQ1BJIHRhYmxlcyBjYXVzZSB0aGUg Z3Vlc3QgdG8gZXhjZWVkIGl0cwo+ID4gPiA+IG1lbW9yeSBhbGxvY2F0aW9uIGxpbWl0Lgo+ID4g PiA+IAo+ID4gPiA+IFJlcG9ydGVkLWJ5OiBTYW5kZXIgRWlrZWxlbmJvb20gPGxpbnV4QGVpa2Vs ZW5ib29tLml0Pgo+ID4gPiA+IFNpZ25lZC1vZmYtYnk6IFdlaSBMaXUgPHdlaS5saXUyQGNpdHJp eC5jb20+ICAKPiA+ID4gUXVlc3Rpb24gaXM6Cj4gPiA+IFdoeSBkb2VzIHhlbiBndWVzdCBnZXQg QUNQSSB0YWJsZXMgZnJvbSBRRU1VIGluc3RlYWQgb2YgdXNpbmcKPiA+ID4gWGVuIHByb3ZpZGVk IG9uZXMuCj4gPiA+IE1heWJlIGl0J3MgZmlybXdhcmUgaXNzdWUgaS5lLiBmaXJtd2FyZSBzaWRl IHNob3VsZG4ndCBsb2FkCj4gPiA+IEFDUEkgdGFibGVzIGZyb20gUUVNVSBwcm92aWRlZCBmd2Nm ZyBmaWxlIGFuZCBsb2FkIFhlbiBwcm92aWRlZCBpbnN0ZWFkLgo+ID4gPiAgIAo+ID4gCj4gPiBJ dCBoYXNuJ3QgY29tZSB0byB0aGUgcG9pbnQgdGhhdCB0aGUgZ3Vlc3QgaXMgYm9vdGVkLiBRRU1V IGV4aXRzIHdoZW4KPiA+IHRyeWluZyB0byBwb3B1bGF0ZSBzb21lIHBhZ2VzIGZvciB0aGUgZ3Vl c3QsIGF0IHdoaWNoIHBvaW50IHRoZSBndWVzdAo+ID4gaGFzIG5vdCB5ZXQgYmVlbiBzdGFydGVk LiAgSW4gYSBzZW5zZSwgWGVuIGd1ZXN0IGRvZXNuJ3QgZ2V0IEFDUEkgZnJvbQo+ID4gUUVNVSBi ZWNhdXNlIGl0IG5ldmVyIGdldHMgdG8gdGhhdCBwb2ludC4KPiA+IAo+ID4gRGlyZWN0IGtlcm5l bCBib290IGNhdXNlcyBmd19jZmcgdG8gYmUgZmlsbGVkIGluLiBwY21zLT5oYXNfYWNwaV9idWls ZAo+ID4gZGVmYXVsdHMgdG8gdHJ1ZSBhbmQgYWNwaV9lbmFibGVkIGlzIGFsc28gdHJ1ZS4gVGhl c2UgbWFrZSBhbGwgY2hlY2tzIGluCj4gPiBhY3BpX3NldHVwIHBhc3MuIFFFTVUgcHJvY2VlZHMg dG8gYnVpbGQgYW5kIGxvYWQgQUNQSSB0YWJsZXMgKHdoaWNoIGFyZQo+ID4gbmV2ZXIgZ29pbmcg dG8gYmUgdXNlZCBieSBYZW4gZ3Vlc3RzKSwgY2F1c2luZyB0aGUgZ3Vlc3QgdG8gZXhjZWVkcyBp dHMKPiA+IGxpbWl0Lgo+ID4gCj4gPiBXZWkuCj4gV291bGQgc29tZXRoaW5nIGxpa2UgdGhpcyBm aXggaXNzdWUgZm9yIHlvdT8KPiAKPiBkaWZmIC0tZ2l0IGEvaHcvaTM4Ni9wY19waWl4LmMgYi9o dy9pMzg2L3BjX3BpaXguYwo+IGluZGV4IGE1NGE0NjguLjYxYjYwMjYgMTAwNjQ0Cj4gLS0tIGEv aHcvaTM4Ni9wY19waWl4LmMKPiArKysgYi9ody9pMzg2L3BjX3BpaXguYwo+IEBAIC0xMDk0LDEw ICsxMDk0LDEzIEBAIERFRklORV9QQ19NQUNISU5FKGlzYXBjLCAiaXNhcGMiLCBwY19pbml0X2lz YSwKPiAgI2lmZGVmIENPTkZJR19YRU4KPiAgc3RhdGljIHZvaWQgeGVuZnZfbWFjaGluZV9vcHRp b25zKE1hY2hpbmVDbGFzcyAqbSkKPiAgewo+ICsgICAgUENNYWNoaW5lQ2xhc3MgKnBjbWMgPSBQ Q19NQUNISU5FX0NMQVNTKG0pOwo+ICsKPiAgICAgIG0tPmRlc2MgPSAiWGVuIEZ1bGx5LXZpcnR1 YWxpemVkIFBDIjsKPiAgICAgIG0tPm1heF9jcHVzID0gSFZNX01BWF9WQ1BVUzsKPiAgICAgIG0t PmRlZmF1bHRfbWFjaGluZV9vcHRzID0gImFjY2VsPXhlbiI7Cj4gICAgICBtLT5ob3RfYWRkX2Nw dSA9IHBjX2hvdF9hZGRfY3B1Owo+ICsgICAgcGNtYy0+aGFzX2FjcGlfYnVpbGQgPSBmYWxzZTsK PiAgfQo+ICAKPiAgREVGSU5FX1BDX01BQ0hJTkUoeGVuZnYsICJ4ZW5mdiIsIHBjX3hlbl9odm1f aW5pdCwKPiAKClllcywgaXQgZG9lcy4KCihJIGhhdmUgYSBzaW1pbGFyIHBhdGNoIGluIG15IHF1 ZXVlIGFscmVhZHkpCgpXZWkuCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fXwpYZW4tZGV2ZWwgbWFpbGluZyBsaXN0Clhlbi1kZXZlbEBsaXN0cy54ZW4ub3Jn Cmh0dHBzOi8vbGlzdHMueGVuLm9yZy94ZW4tZGV2ZWwK