Re: [Xen-devel] [PATCH v7 4/4] xen/x86: Allow stubdom access to irq created for msi.

2019-09-26 Thread Roger Pau Monné
On Thu, Sep 26, 2019 at 06:16:06AM +0200, Marek Marczykowski-Górecki wrote: > On Wed, Sep 25, 2019 at 03:26:17PM +0200, Roger Pau Monné wrote: > > On Wed, Sep 25, 2019 at 02:29:41PM +0200, Marek Marczykowski-Górecki wrote: > > > On Wed, Sep 25, 2019 at 11:41:50AM +0200, Roger Pau Monné wrote: > > >

Re: [Xen-devel] Latest development (master) Xen fails to boot on HP ProLiant DL20 GEN10

2019-09-26 Thread Jan Beulich
On 26.09.2019 00:31, Roman Shaposhnik wrote: > Jan, Roger, thank you so much for the initial ideas. I tried a few of > those and here's where I am. > > First of all, it is definitely related to CPU bring up. Adding > cpuidle=0 to xen command line made Xen boot. > > Then, a good friend of mine (wh

Re: [Xen-devel] [PATCH v3 08/10] tools/libxc: Rework xc_cpuid_apply_policy() to use {get, set}_cpu_policy()

2019-09-26 Thread Jan Beulich
On 25.09.2019 20:11, Andrew Cooper wrote: > +int xc_cpuid_apply_policy(xc_interface *xch, uint32_t domid, > + const uint32_t *featureset, unsigned int > nr_features) > +{ > +int rc; > +xc_dominfo_t di; > +unsigned int i, nr_leaves, nr_msrs; > +xen_cpuid_lea

Re: [Xen-devel] [xen-unstable-smoke test] 141841: regressions - FAIL

2019-09-26 Thread Jan Beulich
On 26.09.2019 07:29, osstest service owner wrote: > flight 141841 xen-unstable-smoke real [real] > http://logs.test-lab.xenproject.org/osstest/logs/141841/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-arm64-arm64-xl-xsm

[Xen-devel] [libvirt test] 141806: regressions - FAIL

2019-09-26 Thread osstest service owner
flight 141806 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/141806/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-libvirt-qcow2 11 guest-startfail REGR. vs. 141683 Tests which did not suc

Re: [Xen-devel] [PATCH v13 0/4] add per-domain IOMMU control

2019-09-26 Thread Paul Durrant
> -Original Message- > From: Oleksandr > Sent: 25 September 2019 19:07 > To: Paul Durrant ; 'Jan Beulich' > Cc: Petre Pircalabu ; Stefano Stabellini > ; Wei Liu > ; KonradRzeszutek Wilk ; Andrew Cooper > ; David Scott ; Tim (Xen.org) > ; George Dunlap > ; Tamas K Lengyel ; Ian Jackson >

Re: [Xen-devel] [PATCH v13 0/4] add per-domain IOMMU control

2019-09-26 Thread Paul Durrant
> -Original Message- > From: Julien Grall > Sent: 25 September 2019 22:34 > To: Paul Durrant ; 'Oleksandr' > ; 'Jan Beulich' > > Cc: nd ; Petre Pircalabu ; Stefano > Stabellini > ; Wei Liu ; KonradRzeszutek Wilk > ; Andrew > Cooper ; David Scott ; Tim > (Xen.org) ; George > Dunlap ; T

Re: [Xen-devel] Windows HVM no longer boots with AMD Ryzen 3700X

2019-09-26 Thread Jan Beulich
On 24.09.2019 18:58, Andreas Kinzler wrote: > Does it still make sense to try the patch given the cpuid I posted? The patch shouldn't make any difference there, afaict. Jan ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproj

Re: [Xen-devel] [PATCH 00/84] Remove direct map from Xen

2019-09-26 Thread hongyax
I am updating my git email settings to comply with the Xen development guidelines. I am also asking my manager for permissions to set up git trees on xen.org. Once those are done, I will repost the series. Hopefully it will be less messy than this round. Hongyan On 25/09/2019 16:25, Wei Liu w

[Xen-devel] [xen-unstable-smoke test] 141854: regressions - FAIL

2019-09-26 Thread osstest service owner
flight 141854 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/141854/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm 7 xen-boot fail REGR. vs. 141821 test-armhf-a

Re: [Xen-devel] [RFC PATCH] xen/gntdev: Stop abusing DT of_dma_configure API

2019-09-26 Thread Nicolas Saenz Julienne
On Wed, 2019-09-25 at 16:50 -0500, Rob Herring wrote: > As the comment says, this isn't a DT based device. of_dma_configure() > is going to stop allowing a NULL DT node, so this needs to be fixed. > > Not sure exactly what setup besides arch_setup_dma_ops is needed... > > Cc: Robin Murphy > Cc:

Re: [Xen-devel] [PATCH v3 37/47] xen/sched: move per-cpu variable scheduler to struct sched_resource

2019-09-26 Thread Dario Faggioli
On Wed, 2019-09-25 at 15:13 +0200, Jürgen Groß wrote: > On 24.09.19 14:16, Jan Beulich wrote: > > > > While at the first glance "sd" is used twice here, this 2nd use is > > actually unnecessary - "cpu" hasn't changed from the beginning of > > the function afaics, and hence "ops" could be used here

Re: [Xen-devel] [PATCH v3 38/47] xen/sched: move per-cpu variable cpupool to struct sched_resource

2019-09-26 Thread Dario Faggioli
On Sat, 2019-09-14 at 10:52 +0200, Juergen Gross wrote: > Having a pointer to struct cpupool in struct sched_resource instead > of per cpu is enough. > > Signed-off-by: Juergen Gross > Reviewed-by: Dario Faggioli Regards -- Dario Faggioli, Ph.D http://about.me/dario.faggioli Virtualization Sof

Re: [Xen-devel] [PATCH v3 39/47] xen/sched: reject switching smt on/off with core scheduling active

2019-09-26 Thread Dario Faggioli
On Sat, 2019-09-14 at 10:52 +0200, Juergen Gross wrote: > When core or socket scheduling are active enabling or disabling smt > is > not possible as that would require a major host reconfiguration. > > Add a bool sched_disable_smt_switching which will be set for core or > socket scheduling. > > S

Re: [Xen-devel] [PATCH v13 0/4] add per-domain IOMMU control

2019-09-26 Thread Julien Grall
Hi, On 9/26/19 9:39 AM, Paul Durrant wrote: -Original Message- From: Julien Grall Sent: 25 September 2019 22:34 To: Paul Durrant ; 'Oleksandr' ; 'Jan Beulich' Cc: nd ; Petre Pircalabu ; Stefano Stabellini ; Wei Liu ; KonradRzeszutek Wilk ; Andrew Cooper ; David Scott ; Tim (Xen.org)

Re: [Xen-devel] [PATCH v13 0/4] add per-domain IOMMU control

2019-09-26 Thread Paul Durrant
> -Original Message- > From: Julien Grall > Sent: 26 September 2019 10:13 > To: Paul Durrant ; 'Oleksandr' > ; 'Jan Beulich' > > Cc: nd ; Petre Pircalabu ; Stefano > Stabellini > ; Wei Liu ; KonradRzeszutek Wilk > ; Andrew > Cooper ; David Scott ; Tim > (Xen.org) ; George > Dunlap ; T

Re: [Xen-devel] [PATCH v13 0/4] add per-domain IOMMU control

2019-09-26 Thread Oleksandr
On 26.09.19 11:39, Paul Durrant wrote: Hi Paul [CC Julien] Hi Paul I may mistake, but looks like 80ff3d338dc93260b41ffeeebb0f852c2edef9ce iommu: tidy up iommu_use_hap_pt() and need_iommu_pt_sync() macros triggers ASSERT_UNREACHABLE on Arm if no IOMMU has been found (I built with my plat

Re: [Xen-devel] [PATCH v13 0/4] add per-domain IOMMU control

2019-09-26 Thread Julien Grall
Hi Paul, On 9/26/19 10:17 AM, Paul Durrant wrote: If so, I think it should stay were it is. This is a generic function that might be re-used for other architecture in the future. That seems like a bit of a long shot. If I remove the call from iommu_setup() then the only remaining callers ar

Re: [Xen-devel] [PATCH v3 46/47] xen/sched: disable scheduling when entering ACPI deep sleep states

2019-09-26 Thread Dario Faggioli
On Sat, 2019-09-14 at 10:52 +0200, Juergen Gross wrote: > When entering deep sleep states all domains are paused resulting in > all cpus only running idle vcpus. This enables us to stop scheduling > completely in order to avoid synchronization problems with core > scheduling when individual cpus ar

Re: [Xen-devel] [PATCH v3 40/47] xen/sched: prepare per-cpupool scheduling granularity

2019-09-26 Thread Dario Faggioli
On Tue, 2019-09-24 at 15:34 +0200, Jan Beulich wrote: > On 14.09.2019 10:52, Juergen Gross wrote: > > --- a/xen/include/xen/sched-if.h > > +++ b/xen/include/xen/sched-if.h > > @@ -25,6 +25,15 @@ extern int sched_ratelimit_us; > > /* Scheduling resource mask. */ > > extern const cpumask_t *sched_r

Re: [Xen-devel] [PATCH v3 47/47] xen/sched: add scheduling granularity enum

2019-09-26 Thread Dario Faggioli
On Sat, 2019-09-14 at 10:52 +0200, Juergen Gross wrote: > Add a scheduling granularity enum ("cpu", "core", "socket") for > specification of the scheduling granularity. Initially it is set to > "cpu", this can be modified by the new boot parameter (x86 only) > "sched-gran". > > According to the se

[Xen-devel] [RFC PATCH 05/84] x86/mm: introduce l{1, 2}t local variables to modify_xen_mappings

2019-09-26 Thread hongyax
From: Wei Liu The pl2e and pl1e variables are heavily (ab)used in that function. It is fine at the moment because all page tables are always mapped so there is no need to track the life time of each variable. We will soon have the requirement to map and unmap page tables. We need to track the l

[Xen-devel] [RFC PATCH 04/84] x86/mm: introduce l{1, 2}t local variables to map_pages_to_xen

2019-09-26 Thread hongyax
From: Wei Liu The pl2e and pl1e variables are heavily (ab)used in that function. It is fine at the moment because all page tables are always mapped so there is no need to track the life time of each variable. We will soon have the requirement to map and unmap page tables. We need to track the li

[Xen-devel] [RFC PATCH 07/84] x86/mm: add an end_of_loop label in map_pages_to_xen

2019-09-26 Thread hongyax
From: Wei Liu We will soon need to clean up mappings whenever the out most loop is ended. Add a new label and turn relevant continue's into goto's. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 9 + 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/x

[Xen-devel] [RFC PATCH 12/84] x86/mm: change pl3e to l3t in virt_to_xen_l3e

2019-09-26 Thread hongyax
From: Wei Liu We will need to have a variable named pl3e when we rewrite virt_to_xen_l3e. Change pl3e to l3t to reflect better its purpose. This will make reviewing later patch easier. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 14 +++--- 1 file changed, 7 in

[Xen-devel] [RFC PATCH 28/84] x86_64/mm: drop lXe_to_lYe invocations from setup_m2p_table

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 16 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index e05a3a445a..9163f08de9 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86_6

[Xen-devel] [RFC PATCH 34/84] x86/smpboot: add emacs block

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/smpboot.c | 10 ++ 1 file changed, 10 insertions(+) diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c index 911416c1e1..b086063486 100644 --- a/xen/arch/x86/smpboot.c +++ b/xen/arch/x86/smpboot.c @@ -1380,3 +1380,13 @@ vo

[Xen-devel] [RFC PATCH 08/84] x86/mm: make sure there is one exit path for modify_xen_mappings

2019-09-26 Thread hongyax
From: Wei Liu We will soon need to handle dynamically mapping / unmapping page tables in the said function. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 18 +++--- 1 file changed, 15 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x

[Xen-devel] [RFC PATCH 29/84] efi: use new page table APIs in copy_mapping

2019-09-26 Thread hongyax
From: Wei Liu After inspection ARM doesn't have alloc_xen_pagetable so this function is x86 only, which means it is safe for us to change. Signed-off-by: Wei Liu --- XXX test this in gitlab ci to be sure. --- xen/common/efi/boot.c | 16 +++- 1 file changed, 11 insertions(+), 5 dele

[Xen-devel] [RFC PATCH 21/84] x86/mm: switch to new APIs in arch_init_memory

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 15 +-- 1 file changed, 9 insertions(+), 6 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index a9361b859a..59dba05ba8 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -353,19 +353,22 @@ void __i

[Xen-devel] [RFC PATCH 25/84] x86_64/mm.c: remove code that serves no purpose in setup_m2p_table

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index 945ae123a6..9b39b2ffcb 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86_64/mm.c @@ -480,8 +480,6 @@ static

[Xen-devel] [RFC PATCH 15/84] x86/mm: rewrite virt_to_xen_l1e

2019-09-26 Thread hongyax
From: Wei Liu Rewrite this function to use new APIs. Modify its callers to unmap the pointer returned. Signed-off-by: Wei Liu --- xen/arch/x86/domain_page.c | 10 ++ xen/arch/x86/mm.c | 30 +- 2 files changed, 31 insertions(+), 9 deletions(-) diff

[Xen-devel] [RFC PATCH 14/84] x86/mm: rewrite xen_to_virt_l2e

2019-09-26 Thread hongyax
From: Wei Liu Rewrite that function to use the new APIs. Modify its callers to unmap the pointer returned. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 46 +- 1 file changed, 37 insertions(+), 9 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/ar

[Xen-devel] [RFC PATCH 01/84] x86/mm: defer clearing page in virt_to_xen_lXe

2019-09-26 Thread hongyax
From: Wei Liu Defer the call to clear_page to the point when we're sure the page is going to become a page table. This is a minor optimisation. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/xen/arch

[Xen-devel] [RFC PATCH 18/84] x86/mm: drop lXe_to_lYe invocations in map_pages_to_xen

2019-09-26 Thread hongyax
From: Wei Liu Map and unmap page tables where necessary. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 40 +--- 1 file changed, 29 insertions(+), 11 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 267e4ceef5..2333e93151 100644 --- a/x

[Xen-devel] [RFC PATCH 19/84] x86/mm: switch to new APIs in modify_xen_mappings

2019-09-26 Thread hongyax
From: Wei Liu Page tables allocated in that function should be mapped and unmapped now. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 31 ++- 1 file changed, 22 insertions(+), 9 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 2333e93151..d2b8

[Xen-devel] [RFC PATCH 17/84] xxx fixup: avoid shadowing mfn

2019-09-26 Thread hongyax
From: Wei Liu --- xen/arch/x86/mm.c | 25 + 1 file changed, 13 insertions(+), 12 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 061221..267e4ceef5 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -5185,7 +5185,7 @@ int map_pages_to_xen

[Xen-devel] [RFC PATCH 23/84] x86_64/mm: switch to new APIs in paging_init

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 48 ++-- 1 file changed, 36 insertions(+), 12 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index ac5e366e5b..a9c2b5ca54 100644 --- a/xen/arch/x86/x86_64/mm.c

[Xen-devel] [RFC PATCH 26/84] x86_64/mm: introduce pl2e in setup_m2p_table

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 9 + 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index 9b39b2ffcb..d01b8f7c17 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86_64/mm.c @@

[Xen-devel] [RFC PATCH 31/84] efi: use new page table APIs in efi_init_memory

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/common/efi/boot.c | 39 +++ 1 file changed, 27 insertions(+), 12 deletions(-) diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c index 64a287690a..1d1420f02c 100644 --- a/xen/common/efi/boot.c +++ b/xen/co

[Xen-devel] [RFC PATCH 32/84] efi: add emacs block to boot.c

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/common/efi/boot.c | 10 ++ 1 file changed, 10 insertions(+) diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c index 1d1420f02c..3868293d06 100644 --- a/xen/common/efi/boot.c +++ b/xen/common/efi/boot.c @@ -1705,3 +1705,13 @@ void __

[Xen-devel] [RFC PATCH 46/84] x86_64/mm: map and unmap page tables in setup_compat_m2p_table

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index 642fead4f6..0fac71356b 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86_64/mm.c @@

[Xen-devel] [RFC PATCH 40/84] x86: switch root_pgt to mfn_t and use new APIs

2019-09-26 Thread hongyax
From: Wei Liu This then requires moving declaration of root page table mfn into mm.h and modify setup_cpu_root_pgt to have a single exit path. We also need to force map_domain_page to use direct map when switching per-domain mappings. This is contrary to our end goal of removing direct map, but

[Xen-devel] [RFC PATCH 03/84] x86: introduce a new set of APIs to manage Xen page tables

2019-09-26 Thread hongyax
From: Wei Liu We are going to switch to using domheap page for page tables. A new set of APIs is introduced to allocate, map, unmap and free pages for page tables. The allocation and deallocation work on mfn_t but not page_info, because they are required to work even before frame table is set up

[Xen-devel] [RFC PATCH 33/84] efi: switch EFI L4 table to use new APIs

2019-09-26 Thread hongyax
From: Wei Liu This requires storing the MFN instead of linear address of the L4 table. Adjust code accordingly. Signed-off-by: Wei Liu --- xen/arch/x86/efi/runtime.h | 12 +--- xen/common/efi/boot.c | 8 ++-- xen/common/efi/efi.h | 3 ++- xen/common/efi/runtime.c |

[Xen-devel] [RFC PATCH 39/84] x86/smpboot: drop lXe_to_lYe invocations from cleanup_cpu_root_pgt

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/smpboot.c | 16 +++- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c index daf734d095..b67432933d 100644 --- a/xen/arch/x86/smpboot.c +++ b/xen/arch/x86/smpboot.c @@

[Xen-devel] [RFC PATCH 37/84] x86/smpboot: switch pl2e to use new APIs in clone_mapping

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/smpboot.c | 18 -- 1 file changed, 12 insertions(+), 6 deletions(-) diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c index f970b1bd69..d3651fb99a 100644 --- a/xen/arch/x86/smpboot.c +++ b/xen/arch/x86/smpboot.c @

[Xen-devel] [RFC PATCH 38/84] x86/smpboot: switch pl1e to use new APIs in clone_mapping

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/smpboot.c | 18 -- 1 file changed, 12 insertions(+), 6 deletions(-) diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c index d3651fb99a..daf734d095 100644 --- a/xen/arch/x86/smpboot.c +++ b/xen/arch/x86/smpboot.c @

[Xen-devel] [RFC PATCH 42/84] x86_64/mm: map and unmap page tables in m2p_mapped

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 22 +++--- 1 file changed, 15 insertions(+), 7 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index 9163f08de9..36dfac11a3 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86

[Xen-devel] [RFC PATCH 45/84] x86_64/mm: map and unmap page tables in destroy_m2p_mapping

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 18 ++ 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index f4779f5c0a..642fead4f6 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86

[Xen-devel] [RFC PATCH 09/84] x86/mm: add an end_of_loop label in modify_xen_mappings

2019-09-26 Thread hongyax
From: Wei Liu We will soon need to clean up mappings whenever the out most loop is ended. Add a new label and turn relevant continue's into goto's. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 15 --- 1 file changed, 8 insertions(+), 7 deletions(-) diff --

[Xen-devel] [RFC PATCH 36/84] x86/smpboot: switch pl3e to use new APIs in clone_mapping

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/smpboot.c | 22 +++--- 1 file changed, 15 insertions(+), 7 deletions(-) diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c index 8bee0c41e3..f970b1bd69 100644 --- a/xen/arch/x86/smpboot.c +++ b/xen/arch/x86/smpboot

[Xen-devel] [RFC PATCH 11/84] x86/mm: change pl1e to l1t in virt_to_xen_l1e

2019-09-26 Thread hongyax
From: Wei Liu We will need to have a variable named pl1e when we rewrite virt_to_xen_l1e. Change pl1e to l1t to reflect better its purpose. This will make reviewing later patch easier. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 14 +++--- 1 file changed, 7 in

[Xen-devel] [RFC PATCH 13/84] x86/mm: rewrite virt_to_xen_l3e

2019-09-26 Thread hongyax
From: Wei Liu Rewrite that function to use the new APIs. Modify its callers to unmap the pointer returned. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 61 +-- 1 file changed, 48 insertions(+), 13 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/

[Xen-devel] [RFC PATCH 60/84] x86/domain_page: use PMAP when d/vcache is not ready.

2019-09-26 Thread hongyax
From: Hongyan Xia Also fix a place where unmap_domain_page should only be conditionally used. Signed-off-by: Hongyan Xia --- xen/arch/x86/domain_page.c | 27 --- xen/arch/x86/mm.c | 3 ++- 2 files changed, 26 insertions(+), 4 deletions(-) diff --git a/xen/arc

[Xen-devel] [RFC PATCH 43/84] x86_64/mm: map and unmap page tables in share_hotadd_m2p_table

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 31 +++ 1 file changed, 23 insertions(+), 8 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index 36dfac11a3..3b2b136b49 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen

[Xen-devel] [RFC PATCH 50/84] x86/smpboot: remove lXe_to_lYe in cleanup_cpu_root_pgt

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/smpboot.c | 12 +--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c index f09563ab34..d657ac0108 100644 --- a/xen/arch/x86/smpboot.c +++ b/xen/arch/x86/smpboot.c @@ -951,

[Xen-devel] [RFC PATCH 30/84] efi: avoid using global variable in copy_mapping

2019-09-26 Thread hongyax
From: Wei Liu We will soon switch efi_l4_table to use ephemeral mapping. Make copy_mapping take a pointer to the mapping instead of using the global variable. No functional change intended. Signed-off-by: Wei Liu --- xen/common/efi/boot.c | 11 ++- 1 file changed, 6 insertions(+), 5 d

[Xen-devel] [RFC PATCH 62/84] x86: lift vcpu mapcache to arch_vcpu

2019-09-26 Thread hongyax
From: Wei Liu It is going to be needed by HVM as well, because we want even HVM vcpu to have a per-vcpu mapcache. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/domain_page.c | 8 xen/include/asm-x86/domain.h | 6 +++--- 2 files changed, 7 insertions(+), 7 deletions(

[Xen-devel] [RFC PATCH 67/84] x86/domain_page: remove direct map code and initialise idle mapcache.

2019-09-26 Thread hongyax
From: Hongyan Xia These are found in the NDEBUG build. Signed-off-by: Hongyan Xia --- xen/arch/x86/domain_page.c | 10 -- 1 file changed, 10 deletions(-) diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain_page.c index f4f53a2a33..f606677ae6 100644 --- a/xen/arch/x86/domain_

[Xen-devel] [RFC PATCH 44/84] x86_64/mm: map and unmap page tables in destroy_compat_m2p_mapping

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index 3b2b136b49..f4779f5c0a 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86_64/mm.c @@

[Xen-devel] [RFC PATCH 56/84] x86/mm: drop _new suffix for page table APIs

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/domain.c| 4 +- xen/arch/x86/domain_page.c | 2 +- xen/arch/x86/efi/runtime.h | 4 +- xen/arch/x86/mm.c| 164 +-- xen/arch/x86/pv/dom0_build.c | 28 +++--- xen/arch/x86/pv/shim.c

[Xen-devel] [RFC PATCH 64/84] mapcache: initialise the mapcache even for the idle domain.

2019-09-26 Thread hongyax
From: Hongyan Xia In situations like in irqs or domain creation, PMAP cannot be used or the mapcache of that domain is simply not ready. We need to have a mapcache in the idle domain to map pages to deal with these. After this patch, map_domain_page() completely gets rid of the direct map. The a

[Xen-devel] [RFC PATCH 51/84] x86/pv: properly map and unmap page tables in mark_pv_pt_pages_rdonly

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/pv/dom0_build.c | 35 +++ 1 file changed, 23 insertions(+), 12 deletions(-) diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c index 1bd53e9c08..d7d42568fb 100644 --- a/xen/arch/x86/pv/d

[Xen-devel] [RFC PATCH 22/84] x86_64/mm: introduce pl2e in paging_init

2019-09-26 Thread hongyax
From: Wei Liu Introduce pl2e so that we can use l2_ro_mpt to point to the page table itself. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 18 ++ 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x8

[Xen-devel] [RFC PATCH 10/84] x86/mm: change pl2e to l2t in virt_to_xen_l2e

2019-09-26 Thread hongyax
From: Wei Liu We will need to have a variable named pl2e when we rewrite virt_to_xen_l2e. Change pl2e to l2t to reflect better its purpose. This will make reviewing later patch easier. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 14 +++--- 1 file changed, 7 in

[Xen-devel] [RFC PATCH 57/84] x86: add Persistent Map (PMAP) infrastructure

2019-09-26 Thread hongyax
From: Wei Liu The basic idea is like Persistent Kernel Map (PKMAP) in linux. We pre-populate all the relevant page tables before system is fully set up. It is needed to bootstrap map domain page infrastructure -- we need some way to map pages to set up per-cpu region without a direct map. In or

[Xen-devel] [RFC PATCH 41/84] x86/shim: map and unmap page tables in replace_va_mapping

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/pv/shim.c | 20 +++- 1 file changed, 15 insertions(+), 5 deletions(-) diff --git a/xen/arch/x86/pv/shim.c b/xen/arch/x86/pv/shim.c index 324ca27f93..cf638fa965 100644 --- a/xen/arch/x86/pv/shim.c +++ b/xen/arch/x86/pv/shim.c

[Xen-devel] [RFC PATCH 00/84] Remove direct map from Xen

2019-09-26 Thread hongyax
From: Hongyan Xia Previously, Wei Liu has created the patch series to switch to alloc/map/unmap/free APIs for Xen page tables so that Xen page tables are mapped with map_domain_page(). This is the first step towards removing the direct map. I implemented patches on top of Wei's to remove the dire

[Xen-devel] [RFC PATCH 71/84] x86/setup: start tearing down the direct map.

2019-09-26 Thread hongyax
From: Hongyan Xia Signed-off-by: Hongyan Xia --- xen/arch/x86/setup.c| 4 ++-- xen/common/page_alloc.c | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index e964c032f6..3dc2fad987 100644 --- a/xen/arch/x86/setup.c +++ b/xen/

[Xen-devel] [RFC PATCH 53/84] x86: remove lXe_to_lYe in __start_xen

2019-09-26 Thread hongyax
From: Wei Liu Properly map and unmap page tables where necessary. Signed-off-by: Wei Liu --- xen/arch/x86/setup.c | 10 -- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index 27981adc0b..1c90559288 100644 --- a/xen/arch/x86/se

[Xen-devel] [RFC PATCH 72/84] acpi: don't assume an always-mapped direct map in acpi allocations.

2019-09-26 Thread hongyax
From: Hongyan Xia Signed-off-by: Hongyan Xia --- xen/drivers/acpi/osl.c | 41 + 1 file changed, 29 insertions(+), 12 deletions(-) diff --git a/xen/drivers/acpi/osl.c b/xen/drivers/acpi/osl.c index 4c8bb7839e..dbf62325f3 100644 --- a/xen/drivers/acpi/osl.

Re: [Xen-devel] [RFC PATCH] xen/gntdev: Stop abusing DT of_dma_configure API

2019-09-26 Thread Julien Grall
Hi Rob, On 9/25/19 10:50 PM, Rob Herring wrote: As the comment says, this isn't a DT based device. of_dma_configure() is going to stop allowing a NULL DT node, so this needs to be fixed. And this can't work on arch not selecting CONFIG_OF and can select CONFIG_XEN_GRANT_DMA_ALLOC. We are l

[Xen-devel] [RFC PATCH 49/84] x86_64/mm: map and unmap page tables in subarch_memory_op

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 15 ++- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index 7483f8f23d..6f37bc4c15 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86_64

[Xen-devel] [RFC PATCH 54/84] x86/mm: drop old page table APIs

2019-09-26 Thread hongyax
From: Wei Liu Now that we've switched all users to the new APIs, the old ones aren't needed anymore. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 16 xen/include/asm-x86/mm.h | 2 -- xen/include/asm-x86/page.h | 5 - 3 files changed, 23 deletions(-) diff --

[Xen-devel] [RFC PATCH 55/84] x86: switch to use domheap page for page tables

2019-09-26 Thread hongyax
From: Wei Liu Modify all the _new APIs to handle domheap pages. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 13 +++-- 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index d594b61702..8e33c8f4fe 100644 --- a/xen/arch/x86/mm.c +++ b

[Xen-devel] [RFC PATCH 27/84] x86_64/mm: switch to new APIs in setup_m2p_table

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 14 +- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index d01b8f7c17..e05a3a445a 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86_64/m

[Xen-devel] [RFC PATCH 47/84] x86_64/mm: map and unmap page tables in cleanup_frame_table

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 24 +--- 1 file changed, 17 insertions(+), 7 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index 0fac71356b..bbdf1ee47c 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x

[Xen-devel] [RFC PATCH 48/84] x86_64/mm: map and unmap page tables in subarch_init_memory

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 31 +++ 1 file changed, 23 insertions(+), 8 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index bbdf1ee47c..7483f8f23d 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen

[Xen-devel] [RFC PATCH 61/84] x86: lift domain mapcache to arch_domain

2019-09-26 Thread hongyax
From: Wei Liu It is going to be needed by HVM as well, because we want even HVM domain to have a per-domain mapcache. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/domain.c| 4 ++-- xen/arch/x86/domain_page.c | 10 -- xen/include/asm-x86/domain.h | 6 +++---

[Xen-devel] [RFC PATCH 24/84] x86_64/mm: drop l4e_to_l3e invocation from paging_init

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/x86_64/mm.c | 7 +-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c index a9c2b5ca54..945ae123a6 100644 --- a/xen/arch/x86/x86_64/mm.c +++ b/xen/arch/x86/x86_64/mm.c @@ -

[Xen-devel] [RFC PATCH 02/84] x86: move some xen mm function declarations

2019-09-26 Thread hongyax
From: Wei Liu They were put into page.h but mm.h is more appropriate. The real reason is that I will be adding some new functions which takes mfn_t. It turns out it is a bit difficult to do in page.h. No functional change. Signed-off-by: Wei Liu --- xen/include/asm-x86/mm.h | 5 + xen/

[Xen-devel] [RFC PATCH 20/84] x86/mm: drop lXe_to_lYe invocations from modify_xen_mappings

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 28 +++- 1 file changed, 19 insertions(+), 9 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index d2b873a958..a9361b859a 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -5534,8 +5534

[Xen-devel] [RFC PATCH 59/84] x86/pmap: break the loop in pmap APIs.

2019-09-26 Thread hongyax
From: Hongyan Xia Modify the pmap PTEs directly. Using set/clear_fixmap() may result in invocation loops. Signed-off-by: Hongyan Xia --- xen/arch/x86/pmap.c| 11 --- xen/include/asm-x86/pmap.h | 2 +- 2 files changed, 9 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/

[Xen-devel] [RFC PATCH 06/84] x86/mm: map_pages_to_xen should have one exit path

2019-09-26 Thread hongyax
From: Wei Liu We will soon rewrite the function to handle dynamically mapping and unmapping of page tables. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 34 +++--- 1 file changed, 27 insertions(+), 7 deletions(-) diff --git a/xen/arch/x86/m

[Xen-devel] [RFC PATCH 58/84] x86/mm: fix leaks in map_xen_pagetable.

2019-09-26 Thread hongyax
From: Hongyan Xia Not unmapping pages after map_xen_pagetable can leak the virtual address space over time. Also this fix makes vmap_to_mfn non-trivial to be a macro. There might be better options but move it into vmap.c for now. Signed-off-by: Hongyan Xia --- xen/arch/x86/mm.c | 5 +

[Xen-devel] [RFC PATCH 82/84] x86: deduplicate code a bit and fix an unmapping bug.

2019-09-26 Thread hongyax
From: Hongyan Xia Signed-off-by: Hongyan Xia --- xen/arch/x86/domain_page.c | 28 +++- xen/arch/x86/pv/dom0_build.c | 2 +- 2 files changed, 12 insertions(+), 18 deletions(-) diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain_page.c index f606677ae6..782dd

[Xen-devel] [RFC PATCH 83/84] x86/pmap: rewrite logic for locking.

2019-09-26 Thread hongyax
From: Hongyan Xia Due to the limited PMAP entries, another pCPU is allowed to use PMAP only when the current pCPU has unmapped all mappings. Signed-off-by: Hongyan Xia --- xen/arch/x86/domain_page.c | 4 xen/arch/x86/pmap.c| 48 -- xen/include/

[Xen-devel] [RFC PATCH 81/84] x86/mm: optimise and properly unmap pages in virt_to_mfn_walk().

2019-09-26 Thread hongyax
From: Hongyan Xia This also resolves a mapcache overflow bug. Signed-off-by: Hongyan Xia --- xen/arch/x86/mm.c| 57 +--- xen/include/asm-x86/mm.h | 3 ++- 2 files changed, 38 insertions(+), 22 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/

[Xen-devel] [RFC PATCH 84/84] x86/pv: fix a couple of direct map assumptions in dom0 building.

2019-09-26 Thread hongyax
From: Hongyan Xia Signed-off-by: Hongyan Xia --- xen/arch/x86/pv/dom0_build.c| 7 --- xen/include/asm-x86/processor.h | 2 -- 2 files changed, 4 insertions(+), 5 deletions(-) diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c index 202edcaa17..98dcc18d21 100644 --

[Xen-devel] [RFC PATCH 65/84] x86: fix some wrong assumptions on direct map. Increase PMAP slots to 8.

2019-09-26 Thread hongyax
From: Hongyan Xia Signed-off-by: Hongyan Xia --- xen/arch/x86/domain_page.c | 8 xen/arch/x86/x86_64/mm.c | 3 ++- xen/include/asm-x86/pmap.h | 4 ++-- 3 files changed, 4 insertions(+), 11 deletions(-) diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain_page.c index 4a3995

[Xen-devel] [RFC PATCH 77/84] x86: properly (un)map pages in restore_all_guests.

2019-09-26 Thread hongyax
From: Hongyan Xia Before, it assumed both cr3 could be accessed via a direct map. This is no longer true. Also, this means we can remove a xenheap mapping hack we introduced earlier when building the cr3 of dom0. Signed-off-by: Hongyan Xia --- xen/arch/x86/pv/dom0_build.c | 11 +-- xen

[Xen-devel] [RFC PATCH 16/84] x86/mm: switch to new APIs in map_pages_to_xen

2019-09-26 Thread hongyax
From: Wei Liu Page tables allocated in that function should be mapped and unmapped now. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 31 ++- 1 file changed, 22 insertions(+), 9 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index f7fd0e6bad..0616

[Xen-devel] [RFC PATCH 35/84] x86/smpboot: clone_mapping should have one exit path

2019-09-26 Thread hongyax
From: Wei Liu We will soon need to clean up page table mappings in the exit path. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/smpboot.c | 35 --- 1 file changed, 28 insertions(+), 7 deletions(-) diff --git a/xen/arch/x86/smpboot.c b/xen/arch/

[Xen-devel] [RFC PATCH 52/84] x86/pv: properly map and unmap page table in dom0_construct_pv

2019-09-26 Thread hongyax
From: Wei Liu Signed-off-by: Wei Liu --- xen/arch/x86/pv/dom0_build.c | 6 +- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c index d7d42568fb..39cb68f7da 100644 --- a/xen/arch/x86/pv/dom0_build.c +++ b/xen/arch/x86/pv

[Xen-devel] [RFC PATCH 70/84] x86/smpboot: use xenheap pages for rpts in smpboot.

2019-09-26 Thread hongyax
From: Hongyan Xia This is because a lot of code assumes that the rpt is in the direct map region which is always mapped. Switching to domheap is non-trivial, so use xenheap for now, which means a bit less security. Signed-off-by: Hongyan Xia --- xen/arch/x86/smpboot.c | 19 ---

[Xen-devel] [RFC PATCH 63/84] x86/domain_page: mapcache is no longer tied to pv.

2019-09-26 Thread hongyax
From: Hongyan Xia Signed-off-by: Hongyan Xia --- xen/arch/x86/domain_page.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain_page.c index 348ea9ebf3..4a3995ccef 100644 --- a/xen/arch/x86/domain_page.c +++ b/xen/arch/x86/dom

[Xen-devel] [RFC PATCH 80/84] x86/setup: Install dummy 1:1 mappings for all mem passed to allocators.

2019-09-26 Thread hongyax
From: Hongyan Xia This means we no longer have an always-mapped direct map now. Signed-off-by: Hongyan Xia --- xen/arch/x86/setup.c | 14 +++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index 9015e3b723..e6a3f1e0a1 10064

[Xen-devel] [RFC PATCH 76/84] x86/setup: also clear the permission bits in the dummy 1:1 mapping.

2019-09-26 Thread hongyax
From: Hongyan Xia Signed-off-by: Hongyan Xia --- xen/arch/x86/setup.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index 3dc2fad987..9015e3b723 100644 --- a/xen/arch/x86/setup.c +++ b/xen/arch/x86/setup.c @@ -1368,7 +1368,7

[Xen-devel] [RFC PATCH 69/84] page_alloc: comments on (un)mapping pages in xenheap allocations.

2019-09-26 Thread hongyax
From: Hongyan Xia Signed-off-by: Hongyan Xia --- xen/common/page_alloc.c | 5 + 1 file changed, 5 insertions(+) diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c index 4ec6299ba8..a00db4c0d9 100644 --- a/xen/common/page_alloc.c +++ b/xen/common/page_alloc.c @@ -2212,6 +2212,10

  1   2   3   >