public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [GIT PULL] xen: features and fixes for 4.8-rc0
@ 2016-07-27 13:45 David Vrabel
  2016-07-27 18:42 ` Linus Torvalds
  0 siblings, 1 reply; 7+ messages in thread
From: David Vrabel @ 2016-07-27 13:45 UTC (permalink / raw)
  To: Linus Torvalds, linux-kernel@vger.kernel.org, xen-devel

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Linus,

Please git pull the following tag:

 git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.8-rc0-tag

xen: features and fixes for 4.8-rc0

- - ACPI support for guests on ARM platforms.
- - Generic steal time support for arm and x86.
- - Support cases where kernel cpu is not Xen VCPU number (e.g., if
  in-guest kexec is used).
- - Use the system workqueue instead of a custom workqueue in various
  places.

Thanks.

David

 Documentation/devicetree/bindings/arm/xen.txt |  35 +++++
 arch/arm/include/asm/xen/hypercall.h          |   1 +
 arch/arm/include/asm/xen/xen-ops.h            |   6 +
 arch/arm/kernel/setup.c                       |   2 +-
 arch/arm/xen/Makefile                         |   1 +
 arch/arm/xen/efi.c                            |  40 ++++++
 arch/arm/xen/enlighten.c                      | 157 +++++++++++++++------
 arch/arm/xen/hypercall.S                      |   1 +
 arch/arm64/include/asm/xen/xen-ops.h          |   6 +
 arch/arm64/kernel/setup.c                     |   3 +-
 arch/arm64/xen/Makefile                       |   1 +
 arch/arm64/xen/hypercall.S                    |   1 +
 arch/x86/include/asm/cpu.h                    |   1 +
 arch/x86/include/asm/smp.h                    |   2 +
 arch/x86/include/asm/xen/cpuid.h              |   5 +-
 arch/x86/kernel/acpi/boot.c                   |  16 ++-
 arch/x86/kernel/apic/apic.c                   |   2 +
 arch/x86/kernel/setup_percpu.c                |   3 +
 arch/x86/xen/efi.c                            | 111 +++++++++++++++
 arch/x86/xen/enlighten.c                      |  49 +++++--
 arch/x86/xen/grant-table.c                    |  57 +-------
 arch/x86/xen/irq.c                            |   3 +-
 arch/x86/xen/pmu.c                            |   2 +-
 arch/x86/xen/smp.c                            |  18 ++-
 arch/x86/xen/time.c                           |  63 ++-------
 arch/x86/xen/xen-ops.h                        |   1 +
 drivers/acpi/scan.c                           |  74 ++++++++++
 drivers/block/xen-blkback/xenbus.c            |  20 +--
 drivers/block/xen-blkfront.c                  |  43 +++---
 drivers/firmware/efi/arm-runtime.c            |   5 +
 drivers/firmware/efi/efi.c                    |  81 ++++++++---
 drivers/of/fdt.c                              |  13 ++
 drivers/xen/Kconfig                           |   2 +-
 drivers/xen/Makefile                          |   1 +
 drivers/xen/arm-device.c                      | 196 ++++++++++++++++++++++++++
 drivers/xen/efi.c                             | 173 +++++------------------
 drivers/xen/events/events_base.c              |  13 +-
 drivers/xen/events/events_fifo.c              |   2 +-
 drivers/xen/evtchn.c                          |  43 +++++-
 drivers/xen/gntalloc.c                        |   2 +-
 drivers/xen/gntdev.c                          |   2 +-
 drivers/xen/privcmd.c                         |   2 +-
 drivers/xen/time.c                            |  50 +++++--
 drivers/xen/xen-pciback/conf_space.c          |  22 ++-
 drivers/xen/xen-pciback/conf_space_header.c   |  57 +++-----
 drivers/xen/xen-pciback/pciback.h             |   1 -
 drivers/xen/xen-pciback/pciback_ops.c         |   2 +-
 drivers/xen/xen-pciback/xenbus.c              |  10 +-
 drivers/xen/xenbus/xenbus_probe_frontend.c    |  15 +-
 drivers/xen/xlate_mmu.c                       |  77 ++++++++++
 include/linux/kernel_stat.h                   |   1 -
 include/linux/of_fdt.h                        |   2 +
 include/uapi/xen/evtchn.h                     |  15 ++
 include/xen/interface/hvm/params.h            |  40 +++++-
 include/xen/interface/memory.h                |   1 +
 include/xen/interface/vcpu.h                  |  24 ++--
 include/xen/interface/xen.h                   |  17 ++-
 include/xen/xen-ops.h                         |  40 ++++--
 kernel/sched/cputime.c                        |  10 --
 59 files changed, 1150 insertions(+), 493 deletions(-)

Amitoj Kaur Chawla (1):
      x86/xen: Use DIV_ROUND_UP

Bhaktipriya Shridhar (2):
      xen: xen-pciback: Remove create_workqueue
      xen: xenbus: Remove create_workqueue

Boris Ostrovsky (1):
      xen/PMU: Log VPMU initialization error at lower level

David Vrabel (1):
      xen/evtchn: add IOCTL_EVTCHN_RESTRICT

Jan Beulich (11):
      xen-pciback: drop unused function parameter of read_dev_bar()
      xen-pciback: drop rom_init()
      xen-pciback: fold read_dev_bar() into its now single caller
      xen-pciback: simplify determination of 64-bit memory resource
      xen-pciback: use const and unsigned in bar_init()
      xen-pciback: short-circuit read path used for merging write values
      xen-pciback: drop superfluous variables
      xen-blkback: prefer xenbus_scanf() over xenbus_gather()
      xen-blkfront: prefer xenbus_scanf() over xenbus_gather()
      xen-blkback: constify instance of "struct attribute_group"
      xen-blkback: really don't leak mode property

Juergen Gross (5):
      xen: add steal_clock support on x86
      xen: update xen headers
      arm/xen: add support for vm_assist hypercall
      xen: support runqueue steal time on xen
      xen: add static initialization of steal_clock op to xen_time_ops

Muhammad Falak R Wani (1):
      xen: use vma_pages().

Shannon Zhao (16):
      Xen: ACPI: Hide UART used by Xen
      xen/grant-table: Move xlated_setup_gnttab_pages to common place
      Xen: xlate: Use page_to_xen_pfn instead of page_to_pfn
      arm/xen: Use xen_xlate_map_ballooned_pages to setup grant table
      xen: memory : Add new XENMAPSPACE type XENMAPSPACE_dev_mmio
      Xen: ARM: Add support for mapping platform device mmio
      Xen: ARM: Add support for mapping AMBA device mmio
      Xen: public/hvm: sync changes of HVM_PARAM_CALLBACK_VIA ABI from Xen
      xen/hvm/params: Add a new delivery type for event-channel in HVM_PARAM_CALLBACK_IRQ
      arm/xen: Get event-channel irq through HVM_PARAM when booting with ACPI
      ARM: XEN: Move xen_early_init() before efi_init()
      ARM: Xen: Document UEFI support on Xen ARM virtual platforms
      XEN: EFI: Move x86 specific codes to architecture directory
      ARM64: XEN: Add a function to initialize Xen specific UEFI runtime services
      FDT: Add a helper to get the subnode by given name
      Xen: EFI: Parse DT parameters for Xen specific UEFI

Vitaly Kuznetsov (9):
      x86/xen: update cpuid.h from Xen-4.7
      x86/acpi: store ACPI ids from MADT for future usage
      xen: introduce xen_vcpu_id mapping
      x86/xen: use xen_vcpu_id mapping for HYPERVISOR_vcpu_op
      x86/xen: use xen_vcpu_id mapping when pointing vcpu_info to shared_info
      xen/events: use xen_vcpu_id mapping in events_base
      xen/events: fifo: use xen_vcpu_id mapping
      xen/evtchn: use xen_vcpu_id mapping
      xen/pvhvm: run xen_vcpu_setup() for the boot CPU
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJXmLsUAAoJEFxbo/MsZsTRxJgIAIIg3aT21aYVCqoC9mll5Lej
mveypTYQ77hbluEwymjVXcxGt4Q3fabTp6tXEOzzIdHEXrxe17ltqaTpHjRWmoSu
xzKLJSknJ+7XGeb1zfAtuXsR3Hq2DSkn1PmQKcZAHdJBgWugXPTESumS00UBvCLO
+T7mCnWk+SYWlpMcIQannU1PLxiQWRlU/doLgjBGlzzLdy0LSIXDjRwnX2FrSJW+
PWEjasYnAqgPYtUQ/T7vzcX4ikFPqpBBQnIN1pJ+1EAh7zXD65eO/D7WNb9OMdd+
QY1dwnXYh7wLtIXqIKkMu6Ve8S+/eH8fAUNs0Y6zB6yTIepTfeKZ9OGTM3EoN9s=
=U2jJ
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [GIT PULL] xen: features and fixes for 4.8-rc0
  2016-07-27 13:45 [GIT PULL] xen: features and fixes for 4.8-rc0 David Vrabel
@ 2016-07-27 18:42 ` Linus Torvalds
  2016-07-27 18:57   ` [Xen-devel] " Andrew Cooper
  0 siblings, 1 reply; 7+ messages in thread
From: Linus Torvalds @ 2016-07-27 18:42 UTC (permalink / raw)
  To: David Vrabel, Shannon Zhao, Rafael J. Wysocki
  Cc: linux-kernel@vger.kernel.org, xen-devel

On Wed, Jul 27, 2016 at 6:45 AM, David Vrabel <dvrabel@cantab.net> wrote:
>
> Shannon Zhao (16):
>       Xen: ACPI: Hide UART used by Xen

So this caused a trivial conflict. No biggie, it wasn't bad and the
patch was acked by Rafael. However, looking at it made me somewhat
unhappy.

Should the device entry in ACPI really be hidden unconditionally? In
particular, if we are *not* running under virtualization, it sounds
wrong to hide it.

Comments? Am I missing something?

               Linus

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Xen-devel] [GIT PULL] xen: features and fixes for 4.8-rc0
  2016-07-27 18:42 ` Linus Torvalds
@ 2016-07-27 18:57   ` Andrew Cooper
  2016-07-27 23:09     ` Rafael J. Wysocki
  0 siblings, 1 reply; 7+ messages in thread
From: Andrew Cooper @ 2016-07-27 18:57 UTC (permalink / raw)
  To: Linus Torvalds, David Vrabel, Shannon Zhao, Rafael J. Wysocki
  Cc: xen-devel, linux-kernel@vger.kernel.org

On 27/07/16 19:42, Linus Torvalds wrote:
> On Wed, Jul 27, 2016 at 6:45 AM, David Vrabel <dvrabel@cantab.net> wrote:
>> Shannon Zhao (16):
>>       Xen: ACPI: Hide UART used by Xen
> So this caused a trivial conflict. No biggie, it wasn't bad and the
> patch was acked by Rafael. However, looking at it made me somewhat
> unhappy.
>
> Should the device entry in ACPI really be hidden unconditionally? In
> particular, if we are *not* running under virtualization, it sounds
> wrong to hide it.
>
> Comments? Am I missing something?

The purpose of the ACPI STAO table (Status Override table, ratified in
ACPI 6.0) is to list items elsewhere in the ACPI namespace which should
be completely ignored.  It is used in cases where it is impossible or
prohibitive to edit the system AML.

The patch itself only hides the UART if instructed to do so by the STAO
table (last hunk).

~Andrew

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Xen-devel] [GIT PULL] xen: features and fixes for 4.8-rc0
  2016-07-27 18:57   ` [Xen-devel] " Andrew Cooper
@ 2016-07-27 23:09     ` Rafael J. Wysocki
  2016-07-27 23:18       ` Linus Torvalds
  0 siblings, 1 reply; 7+ messages in thread
From: Rafael J. Wysocki @ 2016-07-27 23:09 UTC (permalink / raw)
  To: Andrew Cooper
  Cc: Linus Torvalds, David Vrabel, Shannon Zhao, Rafael J. Wysocki,
	xen-devel, linux-kernel@vger.kernel.org

On Wednesday, July 27, 2016 07:57:34 PM Andrew Cooper wrote:
> On 27/07/16 19:42, Linus Torvalds wrote:
> > On Wed, Jul 27, 2016 at 6:45 AM, David Vrabel <dvrabel@cantab.net> wrote:
> >> Shannon Zhao (16):
> >>       Xen: ACPI: Hide UART used by Xen
> > So this caused a trivial conflict. No biggie, it wasn't bad and the
> > patch was acked by Rafael. However, looking at it made me somewhat
> > unhappy.
> >
> > Should the device entry in ACPI really be hidden unconditionally? In
> > particular, if we are *not* running under virtualization, it sounds
> > wrong to hide it.
> >
> > Comments? Am I missing something?
> 
> The purpose of the ACPI STAO table (Status Override table, ratified in
> ACPI 6.0) is to list items elsewhere in the ACPI namespace which should
> be completely ignored.  It is used in cases where it is impossible or
> prohibitive to edit the system AML.
> 
> The patch itself only hides the UART if instructed to do so by the STAO
> table (last hunk).

Right.

The STAO definition document:

http://wiki.xenproject.org/mediawiki/images/0/02/Status-override-table.pdf

requires as to "operate as if that device does not exist", quite literally.

Thanks,
Rafael

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Xen-devel] [GIT PULL] xen: features and fixes for 4.8-rc0
  2016-07-27 23:09     ` Rafael J. Wysocki
@ 2016-07-27 23:18       ` Linus Torvalds
  2016-07-27 23:46         ` Rafael J. Wysocki
  0 siblings, 1 reply; 7+ messages in thread
From: Linus Torvalds @ 2016-07-27 23:18 UTC (permalink / raw)
  To: Rafael J. Wysocki
  Cc: Andrew Cooper, David Vrabel, Shannon Zhao, Rafael J. Wysocki,
	xen-devel, linux-kernel@vger.kernel.org

On Wed, Jul 27, 2016 at 4:09 PM, Rafael J. Wysocki <rjw@rjwysocki.net> wrote:
>
> The STAO definition document:
>
> http://wiki.xenproject.org/mediawiki/images/0/02/Status-override-table.pdf
>
> requires as to "operate as if that device does not exist", quite literally.

Well, first off, documentation is one thing, actually changing
behavior is something entirely different.

Theory and practice are *not* the same.

The other worry I have is that I'd be happier if it's still visible in
/sys/bus/acpi/ etc. Again, it's one thing to not react to it
programmatically, and another thing entirely to actually hide the
information from the rest of the system.

If I read that patch right, it will be hidden from sysfs too. But
Maybe I'm mistaken.

             Linus

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Xen-devel] [GIT PULL] xen: features and fixes for 4.8-rc0
  2016-07-27 23:18       ` Linus Torvalds
@ 2016-07-27 23:46         ` Rafael J. Wysocki
  2016-07-28  0:03           ` Andrew Cooper
  0 siblings, 1 reply; 7+ messages in thread
From: Rafael J. Wysocki @ 2016-07-27 23:46 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Andrew Cooper, David Vrabel, Shannon Zhao, Rafael J. Wysocki,
	xen-devel, linux-kernel@vger.kernel.org

On Wednesday, July 27, 2016 04:18:32 PM Linus Torvalds wrote:
> On Wed, Jul 27, 2016 at 4:09 PM, Rafael J. Wysocki <rjw@rjwysocki.net> wrote:
> >
> > The STAO definition document:
> >
> > http://wiki.xenproject.org/mediawiki/images/0/02/Status-override-table.pdf
> >
> > requires as to "operate as if that device does not exist", quite literally.
> 
> Well, first off, documentation is one thing, actually changing
> behavior is something entirely different.
> 
> Theory and practice are *not* the same.

Well, the STAO thing is totally new, so we have the documentation only ATM.

> The other worry I have is that I'd be happier if it's still visible in
> /sys/bus/acpi/ etc. Again, it's one thing to not react to it
> programmatically, and another thing entirely to actually hide the
> information from the rest of the system.
> 
> If I read that patch right, it will be hidden from sysfs too. But
> Maybe I'm mistaken.

You're right.

Avoiding to enumerate it entirely is somewhat simpler, because it allows
us to avoid some special casing in a few places IIRC.

I guess we can ask the author of the commit in question to come up with a
patch to unhide that device and we'll see how that looks like.

Thanks,
Rafael

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Xen-devel] [GIT PULL] xen: features and fixes for 4.8-rc0
  2016-07-27 23:46         ` Rafael J. Wysocki
@ 2016-07-28  0:03           ` Andrew Cooper
  0 siblings, 0 replies; 7+ messages in thread
From: Andrew Cooper @ 2016-07-28  0:03 UTC (permalink / raw)
  To: Rafael J. Wysocki, Linus Torvalds
  Cc: David Vrabel, Shannon Zhao, Rafael J. Wysocki, xen-devel,
	linux-kernel@vger.kernel.org

On 28/07/2016 00:46, Rafael J. Wysocki wrote:
> On Wednesday, July 27, 2016 04:18:32 PM Linus Torvalds wrote:
>> On Wed, Jul 27, 2016 at 4:09 PM, Rafael J. Wysocki <rjw@rjwysocki.net> wrote:
>>> The STAO definition document:
>>>
>>> http://wiki.xenproject.org/mediawiki/images/0/02/Status-override-table.pdf
>>>
>>> requires as to "operate as if that device does not exist", quite literally.
>> Well, first off, documentation is one thing, actually changing
>> behavior is something entirely different.
>>
>> Theory and practice are *not* the same.
> Well, the STAO thing is totally new, so we have the documentation only ATM.
>
>> The other worry I have is that I'd be happier if it's still visible in
>> /sys/bus/acpi/ etc. Again, it's one thing to not react to it
>> programmatically, and another thing entirely to actually hide the
>> information from the rest of the system.
>>
>> If I read that patch right, it will be hidden from sysfs too. But
>> Maybe I'm mistaken.
> You're right.
>
> Avoiding to enumerate it entirely is somewhat simpler, because it allows
> us to avoid some special casing in a few places IIRC.
>
> I guess we can ask the author of the commit in question to come up with a
> patch to unhide that device and we'll see how that looks like.

Well - the entire purpose of STAO is to list system resources which are
genuinely in use by the hypervisor, and genuinely can't be mapped or
used by the kernel (these latter two frequently resulting in crashes or
hangs at early boot).

Identifying that such devices exist is reasonable (it is certainly
possibly by dumping the raw acpi tables), but any sysfs tweakable is
going to end in misery.

~Andrew

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2016-07-28  0:23 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-07-27 13:45 [GIT PULL] xen: features and fixes for 4.8-rc0 David Vrabel
2016-07-27 18:42 ` Linus Torvalds
2016-07-27 18:57   ` [Xen-devel] " Andrew Cooper
2016-07-27 23:09     ` Rafael J. Wysocki
2016-07-27 23:18       ` Linus Torvalds
2016-07-27 23:46         ` Rafael J. Wysocki
2016-07-28  0:03           ` Andrew Cooper

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox