On Thu, Sep 26, 2019 at 06:16:06AM +0200, Marek Marczykowski-Górecki wrote:
> On Wed, Sep 25, 2019 at 03:26:17PM +0200, Roger Pau Monné wrote:
> > On Wed, Sep 25, 2019 at 02:29:41PM +0200, Marek Marczykowski-Górecki wrote:
> > > On Wed, Sep 25, 2019 at 11:41:50AM +0200, Roger Pau Monné wrote:
> > >
On 26.09.2019 00:31, Roman Shaposhnik wrote:
> Jan, Roger, thank you so much for the initial ideas. I tried a few of
> those and here's where I am.
>
> First of all, it is definitely related to CPU bring up. Adding
> cpuidle=0 to xen command line made Xen boot.
>
> Then, a good friend of mine (wh
On 25.09.2019 20:11, Andrew Cooper wrote:
> +int xc_cpuid_apply_policy(xc_interface *xch, uint32_t domid,
> + const uint32_t *featureset, unsigned int
> nr_features)
> +{
> +int rc;
> +xc_dominfo_t di;
> +unsigned int i, nr_leaves, nr_msrs;
> +xen_cpuid_lea
On 26.09.2019 07:29, osstest service owner wrote:
> flight 141841 xen-unstable-smoke real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/141841/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-arm64-arm64-xl-xsm
flight 141806 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/141806/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-libvirt-qcow2 11 guest-startfail REGR. vs. 141683
Tests which did not suc
> -Original Message-
> From: Oleksandr
> Sent: 25 September 2019 19:07
> To: Paul Durrant ; 'Jan Beulich'
> Cc: Petre Pircalabu ; Stefano Stabellini
> ; Wei Liu
> ; KonradRzeszutek Wilk ; Andrew Cooper
> ; David Scott ; Tim (Xen.org)
> ; George Dunlap
> ; Tamas K Lengyel ; Ian Jackson
>
> -Original Message-
> From: Julien Grall
> Sent: 25 September 2019 22:34
> To: Paul Durrant ; 'Oleksandr'
> ; 'Jan Beulich'
>
> Cc: nd ; Petre Pircalabu ; Stefano
> Stabellini
> ; Wei Liu ; KonradRzeszutek Wilk
> ; Andrew
> Cooper ; David Scott ; Tim
> (Xen.org) ; George
> Dunlap ; T
On 24.09.2019 18:58, Andreas Kinzler wrote:
> Does it still make sense to try the patch given the cpuid I posted?
The patch shouldn't make any difference there, afaict.
Jan
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproj
I am updating my git email settings to comply with the Xen development
guidelines. I am also asking my manager for permissions to set up git trees on
xen.org. Once those are done, I will repost the series. Hopefully it will be
less messy than this round.
Hongyan
On 25/09/2019 16:25, Wei Liu w
flight 141854 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/141854/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-xsm 7 xen-boot fail REGR. vs. 141821
test-armhf-a
On Wed, 2019-09-25 at 16:50 -0500, Rob Herring wrote:
> As the comment says, this isn't a DT based device. of_dma_configure()
> is going to stop allowing a NULL DT node, so this needs to be fixed.
>
> Not sure exactly what setup besides arch_setup_dma_ops is needed...
>
> Cc: Robin Murphy
> Cc:
On Wed, 2019-09-25 at 15:13 +0200, Jürgen Groß wrote:
> On 24.09.19 14:16, Jan Beulich wrote:
> >
> > While at the first glance "sd" is used twice here, this 2nd use is
> > actually unnecessary - "cpu" hasn't changed from the beginning of
> > the function afaics, and hence "ops" could be used here
On Sat, 2019-09-14 at 10:52 +0200, Juergen Gross wrote:
> Having a pointer to struct cpupool in struct sched_resource instead
> of per cpu is enough.
>
> Signed-off-by: Juergen Gross
>
Reviewed-by: Dario Faggioli
Regards
--
Dario Faggioli, Ph.D
http://about.me/dario.faggioli
Virtualization Sof
On Sat, 2019-09-14 at 10:52 +0200, Juergen Gross wrote:
> When core or socket scheduling are active enabling or disabling smt
> is
> not possible as that would require a major host reconfiguration.
>
> Add a bool sched_disable_smt_switching which will be set for core or
> socket scheduling.
>
> S
Hi,
On 9/26/19 9:39 AM, Paul Durrant wrote:
-Original Message-
From: Julien Grall
Sent: 25 September 2019 22:34
To: Paul Durrant ; 'Oleksandr' ;
'Jan Beulich'
Cc: nd ; Petre Pircalabu ; Stefano
Stabellini
; Wei Liu ; KonradRzeszutek Wilk
; Andrew
Cooper ; David Scott ; Tim (Xen.org)
> -Original Message-
> From: Julien Grall
> Sent: 26 September 2019 10:13
> To: Paul Durrant ; 'Oleksandr'
> ; 'Jan Beulich'
>
> Cc: nd ; Petre Pircalabu ; Stefano
> Stabellini
> ; Wei Liu ; KonradRzeszutek Wilk
> ; Andrew
> Cooper ; David Scott ; Tim
> (Xen.org) ; George
> Dunlap ; T
On 26.09.19 11:39, Paul Durrant wrote:
Hi Paul
[CC Julien]
Hi Paul
I may mistake, but looks like
80ff3d338dc93260b41ffeeebb0f852c2edef9ce iommu: tidy up
iommu_use_hap_pt() and need_iommu_pt_sync() macros
triggers ASSERT_UNREACHABLE on Arm if no IOMMU has been found (I built
with my plat
Hi Paul,
On 9/26/19 10:17 AM, Paul Durrant wrote:
If so, I think
it should stay were it is. This is a generic function that might be
re-used for other architecture in the future.
That seems like a bit of a long shot. If I remove the call from iommu_setup()
then the only remaining callers ar
On Sat, 2019-09-14 at 10:52 +0200, Juergen Gross wrote:
> When entering deep sleep states all domains are paused resulting in
> all cpus only running idle vcpus. This enables us to stop scheduling
> completely in order to avoid synchronization problems with core
> scheduling when individual cpus ar
On Tue, 2019-09-24 at 15:34 +0200, Jan Beulich wrote:
> On 14.09.2019 10:52, Juergen Gross wrote:
> > --- a/xen/include/xen/sched-if.h
> > +++ b/xen/include/xen/sched-if.h
> > @@ -25,6 +25,15 @@ extern int sched_ratelimit_us;
> > /* Scheduling resource mask. */
> > extern const cpumask_t *sched_r
On Sat, 2019-09-14 at 10:52 +0200, Juergen Gross wrote:
> Add a scheduling granularity enum ("cpu", "core", "socket") for
> specification of the scheduling granularity. Initially it is set to
> "cpu", this can be modified by the new boot parameter (x86 only)
> "sched-gran".
>
> According to the se
From: Wei Liu
The pl2e and pl1e variables are heavily (ab)used in that function. It
is fine at the moment because all page tables are always mapped so
there is no need to track the life time of each variable.
We will soon have the requirement to map and unmap page tables. We
need to track the l
From: Wei Liu
The pl2e and pl1e variables are heavily (ab)used in that function. It
is fine at the moment because all page tables are always mapped so
there is no need to track the life time of each variable.
We will soon have the requirement to map and unmap page tables. We
need to track the li
From: Wei Liu
We will soon need to clean up mappings whenever the out most loop is
ended. Add a new label and turn relevant continue's into goto's.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 9 +
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/x
From: Wei Liu
We will need to have a variable named pl3e when we rewrite
virt_to_xen_l3e. Change pl3e to l3t to reflect better its purpose.
This will make reviewing later patch easier.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 14 +++---
1 file changed, 7 in
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 16
1 file changed, 12 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index e05a3a445a..9163f08de9 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_6
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/smpboot.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index 911416c1e1..b086063486 100644
--- a/xen/arch/x86/smpboot.c
+++ b/xen/arch/x86/smpboot.c
@@ -1380,3 +1380,13 @@ vo
From: Wei Liu
We will soon need to handle dynamically mapping / unmapping page
tables in the said function.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 18 +++---
1 file changed, 15 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x
From: Wei Liu
After inspection ARM doesn't have alloc_xen_pagetable so this function
is x86 only, which means it is safe for us to change.
Signed-off-by: Wei Liu
---
XXX test this in gitlab ci to be sure.
---
xen/common/efi/boot.c | 16 +++-
1 file changed, 11 insertions(+), 5 dele
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 15 +--
1 file changed, 9 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index a9361b859a..59dba05ba8 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -353,19 +353,22 @@ void __i
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 945ae123a6..9b39b2ffcb 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@ -480,8 +480,6 @@ static
From: Wei Liu
Rewrite this function to use new APIs. Modify its callers to unmap the
pointer returned.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain_page.c | 10 ++
xen/arch/x86/mm.c | 30 +-
2 files changed, 31 insertions(+), 9 deletions(-)
diff
From: Wei Liu
Rewrite that function to use the new APIs. Modify its callers to unmap
the pointer returned.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 46 +-
1 file changed, 37 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/ar
From: Wei Liu
Defer the call to clear_page to the point when we're sure the page is
going to become a page table.
This is a minor optimisation. No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/xen/arch
From: Wei Liu
Map and unmap page tables where necessary.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 40 +---
1 file changed, 29 insertions(+), 11 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 267e4ceef5..2333e93151 100644
--- a/x
From: Wei Liu
Page tables allocated in that function should be mapped and unmapped
now.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 31 ++-
1 file changed, 22 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 2333e93151..d2b8
From: Wei Liu
---
xen/arch/x86/mm.c | 25 +
1 file changed, 13 insertions(+), 12 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 061221..267e4ceef5 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -5185,7 +5185,7 @@ int map_pages_to_xen
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 48 ++--
1 file changed, 36 insertions(+), 12 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index ac5e366e5b..a9c2b5ca54 100644
--- a/xen/arch/x86/x86_64/mm.c
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 9 +
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 9b39b2ffcb..d01b8f7c17 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/common/efi/boot.c | 39 +++
1 file changed, 27 insertions(+), 12 deletions(-)
diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c
index 64a287690a..1d1420f02c 100644
--- a/xen/common/efi/boot.c
+++ b/xen/co
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/common/efi/boot.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c
index 1d1420f02c..3868293d06 100644
--- a/xen/common/efi/boot.c
+++ b/xen/common/efi/boot.c
@@ -1705,3 +1705,13 @@ void __
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 642fead4f6..0fac71356b 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@
From: Wei Liu
This then requires moving declaration of root page table mfn into mm.h
and modify setup_cpu_root_pgt to have a single exit path.
We also need to force map_domain_page to use direct map when switching
per-domain mappings. This is contrary to our end goal of removing
direct map, but
From: Wei Liu
We are going to switch to using domheap page for page tables.
A new set of APIs is introduced to allocate, map, unmap and free pages
for page tables.
The allocation and deallocation work on mfn_t but not page_info,
because they are required to work even before frame table is set up
From: Wei Liu
This requires storing the MFN instead of linear address of the L4
table. Adjust code accordingly.
Signed-off-by: Wei Liu
---
xen/arch/x86/efi/runtime.h | 12 +---
xen/common/efi/boot.c | 8 ++--
xen/common/efi/efi.h | 3 ++-
xen/common/efi/runtime.c |
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/smpboot.c | 16 +++-
1 file changed, 11 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index daf734d095..b67432933d 100644
--- a/xen/arch/x86/smpboot.c
+++ b/xen/arch/x86/smpboot.c
@@
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/smpboot.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index f970b1bd69..d3651fb99a 100644
--- a/xen/arch/x86/smpboot.c
+++ b/xen/arch/x86/smpboot.c
@
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/smpboot.c | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index d3651fb99a..daf734d095 100644
--- a/xen/arch/x86/smpboot.c
+++ b/xen/arch/x86/smpboot.c
@
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 22 +++---
1 file changed, 15 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 9163f08de9..36dfac11a3 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 18 ++
1 file changed, 14 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index f4779f5c0a..642fead4f6 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86
From: Wei Liu
We will soon need to clean up mappings whenever the out most loop
is ended. Add a new label and turn relevant continue's into goto's.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 15 ---
1 file changed, 8 insertions(+), 7 deletions(-)
diff --
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/smpboot.c | 22 +++---
1 file changed, 15 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index 8bee0c41e3..f970b1bd69 100644
--- a/xen/arch/x86/smpboot.c
+++ b/xen/arch/x86/smpboot
From: Wei Liu
We will need to have a variable named pl1e when we rewrite
virt_to_xen_l1e. Change pl1e to l1t to reflect better its purpose.
This will make reviewing later patch easier.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 14 +++---
1 file changed, 7 in
From: Wei Liu
Rewrite that function to use the new APIs. Modify its callers to unmap
the pointer returned.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 61 +--
1 file changed, 48 insertions(+), 13 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/
From: Hongyan Xia
Also fix a place where unmap_domain_page should only be conditionally
used.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/domain_page.c | 27 ---
xen/arch/x86/mm.c | 3 ++-
2 files changed, 26 insertions(+), 4 deletions(-)
diff --git a/xen/arc
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 31 +++
1 file changed, 23 insertions(+), 8 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 36dfac11a3..3b2b136b49 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/smpboot.c | 12 +---
1 file changed, 9 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index f09563ab34..d657ac0108 100644
--- a/xen/arch/x86/smpboot.c
+++ b/xen/arch/x86/smpboot.c
@@ -951,
From: Wei Liu
We will soon switch efi_l4_table to use ephemeral mapping. Make
copy_mapping take a pointer to the mapping instead of using the global
variable.
No functional change intended.
Signed-off-by: Wei Liu
---
xen/common/efi/boot.c | 11 ++-
1 file changed, 6 insertions(+), 5 d
From: Wei Liu
It is going to be needed by HVM as well, because we want even HVM vcpu
to have a per-vcpu mapcache.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain_page.c | 8
xen/include/asm-x86/domain.h | 6 +++---
2 files changed, 7 insertions(+), 7 deletions(
From: Hongyan Xia
These are found in the NDEBUG build.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/domain_page.c | 10 --
1 file changed, 10 deletions(-)
diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain_page.c
index f4f53a2a33..f606677ae6 100644
--- a/xen/arch/x86/domain_
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 3b2b136b49..f4779f5c0a 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c| 4 +-
xen/arch/x86/domain_page.c | 2 +-
xen/arch/x86/efi/runtime.h | 4 +-
xen/arch/x86/mm.c| 164 +--
xen/arch/x86/pv/dom0_build.c | 28 +++---
xen/arch/x86/pv/shim.c
From: Hongyan Xia
In situations like in irqs or domain creation, PMAP cannot be used or
the mapcache of that domain is simply not ready. We need to have a
mapcache in the idle domain to map pages to deal with these.
After this patch, map_domain_page() completely gets rid of the direct
map. The a
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/dom0_build.c | 35 +++
1 file changed, 23 insertions(+), 12 deletions(-)
diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c
index 1bd53e9c08..d7d42568fb 100644
--- a/xen/arch/x86/pv/d
From: Wei Liu
Introduce pl2e so that we can use l2_ro_mpt to point to the page table
itself.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 18 ++
1 file changed, 10 insertions(+), 8 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x8
From: Wei Liu
We will need to have a variable named pl2e when we rewrite
virt_to_xen_l2e. Change pl2e to l2t to reflect better its purpose.
This will make reviewing later patch easier.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 14 +++---
1 file changed, 7 in
From: Wei Liu
The basic idea is like Persistent Kernel Map (PKMAP) in linux. We
pre-populate all the relevant page tables before system is fully set
up.
It is needed to bootstrap map domain page infrastructure -- we need
some way to map pages to set up per-cpu region without a direct map.
In or
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/shim.c | 20 +++-
1 file changed, 15 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/pv/shim.c b/xen/arch/x86/pv/shim.c
index 324ca27f93..cf638fa965 100644
--- a/xen/arch/x86/pv/shim.c
+++ b/xen/arch/x86/pv/shim.c
From: Hongyan Xia
Previously, Wei Liu has created the patch series to switch to
alloc/map/unmap/free APIs for Xen page tables so that Xen page tables
are mapped with map_domain_page(). This is the first step towards
removing the direct map. I implemented patches on top of Wei's to remove
the dire
From: Hongyan Xia
Signed-off-by: Hongyan Xia
---
xen/arch/x86/setup.c| 4 ++--
xen/common/page_alloc.c | 2 +-
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index e964c032f6..3dc2fad987 100644
--- a/xen/arch/x86/setup.c
+++ b/xen/
From: Wei Liu
Properly map and unmap page tables where necessary.
Signed-off-by: Wei Liu
---
xen/arch/x86/setup.c | 10 --
1 file changed, 8 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index 27981adc0b..1c90559288 100644
--- a/xen/arch/x86/se
From: Hongyan Xia
Signed-off-by: Hongyan Xia
---
xen/drivers/acpi/osl.c | 41 +
1 file changed, 29 insertions(+), 12 deletions(-)
diff --git a/xen/drivers/acpi/osl.c b/xen/drivers/acpi/osl.c
index 4c8bb7839e..dbf62325f3 100644
--- a/xen/drivers/acpi/osl.
Hi Rob,
On 9/25/19 10:50 PM, Rob Herring wrote:
As the comment says, this isn't a DT based device. of_dma_configure()
is going to stop allowing a NULL DT node, so this needs to be fixed.
And this can't work on arch not selecting CONFIG_OF and can select
CONFIG_XEN_GRANT_DMA_ALLOC.
We are l
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 15 ++-
1 file changed, 10 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 7483f8f23d..6f37bc4c15 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64
From: Wei Liu
Now that we've switched all users to the new APIs, the old ones aren't
needed anymore.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 16
xen/include/asm-x86/mm.h | 2 --
xen/include/asm-x86/page.h | 5 -
3 files changed, 23 deletions(-)
diff --
From: Wei Liu
Modify all the _new APIs to handle domheap pages.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 13 +++--
1 file changed, 7 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index d594b61702..8e33c8f4fe 100644
--- a/xen/arch/x86/mm.c
+++ b
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 14 +-
1 file changed, 9 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index d01b8f7c17..e05a3a445a 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/m
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 24 +---
1 file changed, 17 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 0fac71356b..bbdf1ee47c 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 31 +++
1 file changed, 23 insertions(+), 8 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index bbdf1ee47c..7483f8f23d 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen
From: Wei Liu
It is going to be needed by HVM as well, because we want even HVM
domain to have a per-domain mapcache.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c| 4 ++--
xen/arch/x86/domain_page.c | 10 --
xen/include/asm-x86/domain.h | 6 +++---
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/x86_64/mm.c | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index a9c2b5ca54..945ae123a6 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@ -
From: Wei Liu
They were put into page.h but mm.h is more appropriate.
The real reason is that I will be adding some new functions which
takes mfn_t. It turns out it is a bit difficult to do in page.h.
No functional change.
Signed-off-by: Wei Liu
---
xen/include/asm-x86/mm.h | 5 +
xen/
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 28 +++-
1 file changed, 19 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index d2b873a958..a9361b859a 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -5534,8 +5534
From: Hongyan Xia
Modify the pmap PTEs directly. Using set/clear_fixmap() may result in
invocation loops.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/pmap.c| 11 ---
xen/include/asm-x86/pmap.h | 2 +-
2 files changed, 9 insertions(+), 4 deletions(-)
diff --git a/xen/arch/x86/
From: Wei Liu
We will soon rewrite the function to handle dynamically mapping and
unmapping of page tables.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 34 +++---
1 file changed, 27 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/m
From: Hongyan Xia
Not unmapping pages after map_xen_pagetable can leak the virtual address
space over time. Also this fix makes vmap_to_mfn non-trivial to be a
macro. There might be better options but move it into vmap.c for now.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/mm.c | 5 +
From: Hongyan Xia
Signed-off-by: Hongyan Xia
---
xen/arch/x86/domain_page.c | 28 +++-
xen/arch/x86/pv/dom0_build.c | 2 +-
2 files changed, 12 insertions(+), 18 deletions(-)
diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain_page.c
index f606677ae6..782dd
From: Hongyan Xia
Due to the limited PMAP entries, another pCPU is allowed to use PMAP
only when the current pCPU has unmapped all mappings.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/domain_page.c | 4
xen/arch/x86/pmap.c| 48 --
xen/include/
From: Hongyan Xia
This also resolves a mapcache overflow bug.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/mm.c| 57 +---
xen/include/asm-x86/mm.h | 3 ++-
2 files changed, 38 insertions(+), 22 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/
From: Hongyan Xia
Signed-off-by: Hongyan Xia
---
xen/arch/x86/pv/dom0_build.c| 7 ---
xen/include/asm-x86/processor.h | 2 --
2 files changed, 4 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c
index 202edcaa17..98dcc18d21 100644
--
From: Hongyan Xia
Signed-off-by: Hongyan Xia
---
xen/arch/x86/domain_page.c | 8
xen/arch/x86/x86_64/mm.c | 3 ++-
xen/include/asm-x86/pmap.h | 4 ++--
3 files changed, 4 insertions(+), 11 deletions(-)
diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain_page.c
index 4a3995
From: Hongyan Xia
Before, it assumed both cr3 could be accessed via a direct map. This is
no longer true. Also, this means we can remove a xenheap mapping hack
we introduced earlier when building the cr3 of dom0.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/pv/dom0_build.c | 11 +--
xen
From: Wei Liu
Page tables allocated in that function should be mapped and unmapped
now.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 31 ++-
1 file changed, 22 insertions(+), 9 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index f7fd0e6bad..0616
From: Wei Liu
We will soon need to clean up page table mappings in the exit path.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/smpboot.c | 35 ---
1 file changed, 28 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/
From: Wei Liu
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/dom0_build.c | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c
index d7d42568fb..39cb68f7da 100644
--- a/xen/arch/x86/pv/dom0_build.c
+++ b/xen/arch/x86/pv
From: Hongyan Xia
This is because a lot of code assumes that the rpt is in the direct map
region which is always mapped. Switching to domheap is non-trivial, so
use xenheap for now, which means a bit less security.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/smpboot.c | 19 ---
From: Hongyan Xia
Signed-off-by: Hongyan Xia
---
xen/arch/x86/domain_page.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain_page.c
index 348ea9ebf3..4a3995ccef 100644
--- a/xen/arch/x86/domain_page.c
+++ b/xen/arch/x86/dom
From: Hongyan Xia
This means we no longer have an always-mapped direct map now.
Signed-off-by: Hongyan Xia
---
xen/arch/x86/setup.c | 14 +++---
1 file changed, 11 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index 9015e3b723..e6a3f1e0a1 10064
From: Hongyan Xia
Signed-off-by: Hongyan Xia
---
xen/arch/x86/setup.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index 3dc2fad987..9015e3b723 100644
--- a/xen/arch/x86/setup.c
+++ b/xen/arch/x86/setup.c
@@ -1368,7 +1368,7
From: Hongyan Xia
Signed-off-by: Hongyan Xia
---
xen/common/page_alloc.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
index 4ec6299ba8..a00db4c0d9 100644
--- a/xen/common/page_alloc.c
+++ b/xen/common/page_alloc.c
@@ -2212,6 +2212,10
1 - 100 of 279 matches
Mail list logo