mbox series

[v4,0/7] Static shared memory followup v2 - pt2

Message ID 20240524124055.3871399-1-luca.fancellu@arm.com (mailing list archive)
Headers show
Series Static shared memory followup v2 - pt2 | expand

Message

Luca Fancellu May 24, 2024, 12:40 p.m. UTC
This serie is a partial rework of this other serie:
https://patchwork.kernel.org/project/xen-devel/cover/20231206090623.1932275-1-Penny.Zheng@arm.com/

The original serie is addressing an issue of the static shared memory feature
that impacts the memory footprint of other component when the feature is
enabled, another issue impacts the device tree generation for the guests when
the feature is enabled and used and the last one is a missing feature that is
the option to have a static shared memory region that is not from the host
address space.

This serie is handling some comment on the original serie and it is splitting
the rework in two part, this first part is addressing the memory footprint issue
and the device tree generation and currently is fully merged
(https://patchwork.kernel.org/project/xen-devel/cover/20240418073652.3622828-1-luca.fancellu@arm.com/),
this serie is addressing the static shared memory allocation from the Xen heap.

Luca Fancellu (5):
  xen/arm: Lookup bootinfo shm bank during the mapping
  xen/arm: Wrap shared memory mapping code in one function
  xen/arm: Parse xen,shared-mem when host phys address is not provided
  xen/arm: Rework heap page allocation outside allocate_bank_memory
  xen/arm: Implement the logic for static shared memory from Xen heap

Penny Zheng (2):
  xen/p2m: put reference for level 2 superpage
  xen/docs: Describe static shared memory when host address is not
    provided

 docs/misc/arm/device-tree/booting.txt   |  52 ++-
 xen/arch/arm/arm32/mmu/mm.c             |  11 +-
 xen/arch/arm/dom0less-build.c           |   4 +-
 xen/arch/arm/domain_build.c             |  84 +++--
 xen/arch/arm/include/asm/domain_build.h |   9 +-
 xen/arch/arm/mmu/p2m.c                  |  82 +++--
 xen/arch/arm/setup.c                    |  14 +-
 xen/arch/arm/static-shmem.c             | 432 +++++++++++++++++-------
 8 files changed, 502 insertions(+), 186 deletions(-)

Comments

Luca Fancellu June 11, 2024, 12:35 p.m. UTC | #1
+ Oleksii

> On 24 May 2024, at 13:40, Luca Fancellu <Luca.Fancellu@arm.com> wrote:
> 
> This serie is a partial rework of this other serie:
> https://patchwork.kernel.org/project/xen-devel/cover/20231206090623.1932275-1-Penny.Zheng@arm.com/
> 
> The original serie is addressing an issue of the static shared memory feature
> that impacts the memory footprint of other component when the feature is
> enabled, another issue impacts the device tree generation for the guests when
> the feature is enabled and used and the last one is a missing feature that is
> the option to have a static shared memory region that is not from the host
> address space.
> 
> This serie is handling some comment on the original serie and it is splitting
> the rework in two part, this first part is addressing the memory footprint issue
> and the device tree generation and currently is fully merged
> (https://patchwork.kernel.org/project/xen-devel/cover/20240418073652.3622828-1-luca.fancellu@arm.com/),
> this serie is addressing the static shared memory allocation from the Xen heap.
> 
> Luca Fancellu (5):
>  xen/arm: Lookup bootinfo shm bank during the mapping
>  xen/arm: Wrap shared memory mapping code in one function
>  xen/arm: Parse xen,shared-mem when host phys address is not provided
>  xen/arm: Rework heap page allocation outside allocate_bank_memory
>  xen/arm: Implement the logic for static shared memory from Xen heap
> 
> Penny Zheng (2):
>  xen/p2m: put reference for level 2 superpage
>  xen/docs: Describe static shared memory when host address is not
>    provided
> 
> docs/misc/arm/device-tree/booting.txt   |  52 ++-
> xen/arch/arm/arm32/mmu/mm.c             |  11 +-
> xen/arch/arm/dom0less-build.c           |   4 +-
> xen/arch/arm/domain_build.c             |  84 +++--
> xen/arch/arm/include/asm/domain_build.h |   9 +-
> xen/arch/arm/mmu/p2m.c                  |  82 +++--
> xen/arch/arm/setup.c                    |  14 +-
> xen/arch/arm/static-shmem.c             | 432 +++++++++++++++++-------
> 8 files changed, 502 insertions(+), 186 deletions(-)
> 
> -- 
> 2.34.1
> 
> 

Hi,

We would like this serie to be in Xen 4.19, there was a misunderstanding on our side because we thought
that since the serie was sent before the last posting date, it could have been a candidate for merging in the
new release, instead after speaking with Julien and Oleksii we are now aware that we need to provide a
justification for its presence.

Pros to this serie is that we are closing the circle for static shared memory, allowing it to use memory from
the host or from Xen, it is also a feature that is not enabled by default, so it should not cause too much
disruption in case of any bugs that escaped the review, however we’ve tested many configurations for that
with/without enabling the feature if that can be an additional value.

Cons: we are touching some common code related to p2m, but also there the impact should be minimal because
the new code is subject to l2 foreign mapping (to be confirmed maybe from a p2m expert like Julien).

The comments on patch 3 of this serie are addressed by this patch:
https://patchwork.kernel.org/project/xen-devel/patch/20240528125603.2467640-1-luca.fancellu@arm.com/
And the serie is fully reviewed.

So our request is to allow this serie in 4.19, Oleksii, ARM maintainers, do you agree on that?

Cheers,
Luca
Michal Orzel June 11, 2024, 12:42 p.m. UTC | #2
Hi,

On 11/06/2024 14:35, Luca Fancellu wrote:
> 
> 
> + Oleksii
> 
>> On 24 May 2024, at 13:40, Luca Fancellu <Luca.Fancellu@arm.com> wrote:
>>
>> This serie is a partial rework of this other serie:
>> https://patchwork.kernel.org/project/xen-devel/cover/20231206090623.1932275-1-Penny.Zheng@arm.com/
>>
>> The original serie is addressing an issue of the static shared memory feature
>> that impacts the memory footprint of other component when the feature is
>> enabled, another issue impacts the device tree generation for the guests when
>> the feature is enabled and used and the last one is a missing feature that is
>> the option to have a static shared memory region that is not from the host
>> address space.
>>
>> This serie is handling some comment on the original serie and it is splitting
>> the rework in two part, this first part is addressing the memory footprint issue
>> and the device tree generation and currently is fully merged
>> (https://patchwork.kernel.org/project/xen-devel/cover/20240418073652.3622828-1-luca.fancellu@arm.com/),
>> this serie is addressing the static shared memory allocation from the Xen heap.
>>
>> Luca Fancellu (5):
>>  xen/arm: Lookup bootinfo shm bank during the mapping
>>  xen/arm: Wrap shared memory mapping code in one function
>>  xen/arm: Parse xen,shared-mem when host phys address is not provided
>>  xen/arm: Rework heap page allocation outside allocate_bank_memory
>>  xen/arm: Implement the logic for static shared memory from Xen heap
>>
>> Penny Zheng (2):
>>  xen/p2m: put reference for level 2 superpage
>>  xen/docs: Describe static shared memory when host address is not
>>    provided
>>
>> docs/misc/arm/device-tree/booting.txt   |  52 ++-
>> xen/arch/arm/arm32/mmu/mm.c             |  11 +-
>> xen/arch/arm/dom0less-build.c           |   4 +-
>> xen/arch/arm/domain_build.c             |  84 +++--
>> xen/arch/arm/include/asm/domain_build.h |   9 +-
>> xen/arch/arm/mmu/p2m.c                  |  82 +++--
>> xen/arch/arm/setup.c                    |  14 +-
>> xen/arch/arm/static-shmem.c             | 432 +++++++++++++++++-------
>> 8 files changed, 502 insertions(+), 186 deletions(-)
>>
>> --
>> 2.34.1
>>
>>
> 
> Hi,
> 
> We would like this serie to be in Xen 4.19, there was a misunderstanding on our side because we thought
> that since the serie was sent before the last posting date, it could have been a candidate for merging in the
> new release, instead after speaking with Julien and Oleksii we are now aware that we need to provide a
> justification for its presence.
> 
> Pros to this serie is that we are closing the circle for static shared memory, allowing it to use memory from
> the host or from Xen, it is also a feature that is not enabled by default, so it should not cause too much
> disruption in case of any bugs that escaped the review, however we’ve tested many configurations for that
> with/without enabling the feature if that can be an additional value.
> 
> Cons: we are touching some common code related to p2m, but also there the impact should be minimal because
> the new code is subject to l2 foreign mapping (to be confirmed maybe from a p2m expert like Julien).
> 
> The comments on patch 3 of this serie are addressed by this patch:
> https://patchwork.kernel.org/project/xen-devel/patch/20240528125603.2467640-1-luca.fancellu@arm.com/
> And the serie is fully reviewed.
> 
> So our request is to allow this serie in 4.19, Oleksii, ARM maintainers, do you agree on that?
As a main reviewer of this series I'm ok to have this series in. It is nicely encapsulated and the feature itself
is still in unsupported state. I don't foresee any issues with it.

~Michal
Oleksii Kurochko June 11, 2024, 3:28 p.m. UTC | #3
On Tue, 2024-06-11 at 12:35 +0000, Luca Fancellu wrote:
> + Oleksii
> 
> > On 24 May 2024, at 13:40, Luca Fancellu <Luca.Fancellu@arm.com>
> > wrote:
> > 
> > This serie is a partial rework of this other serie:
> > https://patchwork.kernel.org/project/xen-devel/cover/20231206090623.1932275-1-Penny.Zheng@arm.com/
> > 
> > The original serie is addressing an issue of the static shared
> > memory feature
> > that impacts the memory footprint of other component when the
> > feature is
> > enabled, another issue impacts the device tree generation for the
> > guests when
> > the feature is enabled and used and the last one is a missing
> > feature that is
> > the option to have a static shared memory region that is not from
> > the host
> > address space.
> > 
> > This serie is handling some comment on the original serie and it is
> > splitting
> > the rework in two part, this first part is addressing the memory
> > footprint issue
> > and the device tree generation and currently is fully merged
> > (
> > https://patchwork.kernel.org/project/xen-devel/cover/20240418073652.3622828-1-luca.fancellu@arm.com
> > /),
> > this serie is addressing the static shared memory allocation from
> > the Xen heap.
> > 
> > Luca Fancellu (5):
> >  xen/arm: Lookup bootinfo shm bank during the mapping
> >  xen/arm: Wrap shared memory mapping code in one function
> >  xen/arm: Parse xen,shared-mem when host phys address is not
> > provided
> >  xen/arm: Rework heap page allocation outside allocate_bank_memory
> >  xen/arm: Implement the logic for static shared memory from Xen
> > heap
> > 
> > Penny Zheng (2):
> >  xen/p2m: put reference for level 2 superpage
> >  xen/docs: Describe static shared memory when host address is not
> >    provided
> > 
> > docs/misc/arm/device-tree/booting.txt   |  52 ++-
> > xen/arch/arm/arm32/mmu/mm.c             |  11 +-
> > xen/arch/arm/dom0less-build.c           |   4 +-
> > xen/arch/arm/domain_build.c             |  84 +++--
> > xen/arch/arm/include/asm/domain_build.h |   9 +-
> > xen/arch/arm/mmu/p2m.c                  |  82 +++--
> > xen/arch/arm/setup.c                    |  14 +-
> > xen/arch/arm/static-shmem.c             | 432 +++++++++++++++++----
> > ---
> > 8 files changed, 502 insertions(+), 186 deletions(-)
> > 
> > -- 
> > 2.34.1
> > 
> > 
> 
> Hi,
> 
> We would like this serie to be in Xen 4.19, there was a
> misunderstanding on our side because we thought
> that since the serie was sent before the last posting date, it could
> have been a candidate for merging in the
> new release, instead after speaking with Julien and Oleksii we are
> now aware that we need to provide a
> justification for its presence.
> 
> Pros to this serie is that we are closing the circle for static
> shared memory, allowing it to use memory from
> the host or from Xen, it is also a feature that is not enabled by
> default, so it should not cause too much
> disruption in case of any bugs that escaped the review, however we’ve
> tested many configurations for that
> with/without enabling the feature if that can be an additional value.
> 
> Cons: we are touching some common code related to p2m, but also there
> the impact should be minimal because
> the new code is subject to l2 foreign mapping (to be confirmed maybe
> from a p2m expert like Julien).
> 
> The comments on patch 3 of this serie are addressed by this patch:
> https://patchwork.kernel.org/project/xen-devel/patch/20240528125603.2467640-1-luca.fancellu@arm.com/
> And the serie is fully reviewed.
> 
> So our request is to allow this serie in 4.19, Oleksii, ARM
> maintainers, do you agree on that?
Considering that it is not enabled by default and affect on common code
is minimal we should consider this patch series in 4.19:
 Release-Acked-by: Oleksii Kurochko <oleksii.kurochko@gmail.com>

~ Oleksii
Julien Grall June 13, 2024, 11:31 a.m. UTC | #4
Hi,

On 11/06/2024 13:42, Michal Orzel wrote:
>> We would like this serie to be in Xen 4.19, there was a misunderstanding on our side because we thought
>> that since the serie was sent before the last posting date, it could have been a candidate for merging in the
>> new release, instead after speaking with Julien and Oleksii we are now aware that we need to provide a
>> justification for its presence.
>>
>> Pros to this serie is that we are closing the circle for static shared memory, allowing it to use memory from
>> the host or from Xen, it is also a feature that is not enabled by default, so it should not cause too much
>> disruption in case of any bugs that escaped the review, however we’ve tested many configurations for that
>> with/without enabling the feature if that can be an additional value.
>>
>> Cons: we are touching some common code related to p2m, but also there the impact should be minimal because
>> the new code is subject to l2 foreign mapping (to be confirmed maybe from a p2m expert like Julien).
>>
>> The comments on patch 3 of this serie are addressed by this patch:
>> https://patchwork.kernel.org/project/xen-devel/patch/20240528125603.2467640-1-luca.fancellu@arm.com/
>> And the serie is fully reviewed.
>>
>> So our request is to allow this serie in 4.19, Oleksii, ARM maintainers, do you agree on that?
> As a main reviewer of this series I'm ok to have this series in. It is nicely encapsulated and the feature itself
> is still in unsupported state. I don't foresee any issues with it.

There are changes in the p2m code and the memory allocation for boot 
domains. So is it really encapsulated?

For me there are two risks:
  * p2m (already mentioned by Luca): We modify the code to put foreign 
mapping. The worse that can happen if we don't release the foreign 
mapping. This would mean the page will not be freed. AFAIK, we don't 
exercise this path in the CI.
  * domain allocation: This mainly look like refactoring. And the path 
is exercised in the CI.

So I am not concerned with the domain allocation one. @Luca, would it be 
possible to detail how did you test the foreign pages were properly removed?

Cheers,
Luca Fancellu June 14, 2024, 7:54 a.m. UTC | #5
Hi Julien,

> On 13 Jun 2024, at 12:31, Julien Grall <julien@xen.org> wrote:
> 
> Hi,
> 
> On 11/06/2024 13:42, Michal Orzel wrote:
>>> We would like this serie to be in Xen 4.19, there was a misunderstanding on our side because we thought
>>> that since the serie was sent before the last posting date, it could have been a candidate for merging in the
>>> new release, instead after speaking with Julien and Oleksii we are now aware that we need to provide a
>>> justification for its presence.
>>> 
>>> Pros to this serie is that we are closing the circle for static shared memory, allowing it to use memory from
>>> the host or from Xen, it is also a feature that is not enabled by default, so it should not cause too much
>>> disruption in case of any bugs that escaped the review, however we’ve tested many configurations for that
>>> with/without enabling the feature if that can be an additional value.
>>> 
>>> Cons: we are touching some common code related to p2m, but also there the impact should be minimal because
>>> the new code is subject to l2 foreign mapping (to be confirmed maybe from a p2m expert like Julien).
>>> 
>>> The comments on patch 3 of this serie are addressed by this patch:
>>> https://patchwork.kernel.org/project/xen-devel/patch/20240528125603.2467640-1-luca.fancellu@arm.com/
>>> And the serie is fully reviewed.
>>> 
>>> So our request is to allow this serie in 4.19, Oleksii, ARM maintainers, do you agree on that?
>> As a main reviewer of this series I'm ok to have this series in. It is nicely encapsulated and the feature itself
>> is still in unsupported state. I don't foresee any issues with it.
> 
> There are changes in the p2m code and the memory allocation for boot domains. So is it really encapsulated?
> 
> For me there are two risks:
> * p2m (already mentioned by Luca): We modify the code to put foreign mapping. The worse that can happen if we don't release the foreign mapping. This would mean the page will not be freed. AFAIK, we don't exercise this path in the CI.
> * domain allocation: This mainly look like refactoring. And the path is exercised in the CI.
> 
> So I am not concerned with the domain allocation one. @Luca, would it be possible to detail how did you test the foreign pages were properly removed?

So at first we tested the code, with/without the static shared memory feature enabled, creating/destroying guest from Dom0 and checking that everything
was ok.

After a chat on Matrix with Julien he suggested that using a virtio-mmio disk was better to stress out the foreign mapping looking for
regressions.

Luckily I’ve found this slide deck from @Oleksandr: https://static.linaro.org/connect/lvc21/presentations/lvc21-314.pdf

So I did a setup using fvp-base, having a disk with two partitions containing Dom0 rootfs and DomU rootfs, Dom0 sees
this disk using VirtIO block.

The Dom0 rootfs contains the virtio-disk backend: https://github.com/xen-troops/virtio-disk

And the DomU XL configuration is using these parameters:

cmdline="console=hvc0 root=/dev/vda rw"
disk = ['/dev/vda2,raw,xvda,w,specification=virtio’]

Running the setup and creating/destroying a couple of times the guest is not showing regressions, here an example of the output:

root@fvp-base:/opt/xtp/guests/linux-guests# xl create -c linux-ext-arm64-stresstests-rootfs.cfg
Parsing config from linux-ext-arm64-stresstests-rootfs.cfg
main: read frontend domid 2
  Info: connected to dom2

demu_seq_next: >XENSTORE_ATTACHED
demu_seq_next: domid = 2
demu_seq_next: devid = 51712
demu_seq_next: filename[0] = /dev/vda2
demu_seq_next: readonly[0] = 0
demu_seq_next: base[0]     = 0x2000000
demu_seq_next: irq[0]      = 33
demu_seq_next: >XENEVTCHN_OPEN
demu_seq_next: >XENFOREIGNMEMORY_OPEN
demu_seq_next: >XENDEVICEMODEL_OPEN
demu_seq_next: >XENGNTTAB_OPEN
demu_initialize: 1 vCPU(s)
demu_seq_next: >SERVER_REGISTERED
demu_seq_next: ioservid = 0
demu_seq_next: >RESOURCE_MAPPED
demu_seq_next: shared_iopage = 0x7f80c58000
demu_seq_next: >SERVER_ENABLED
demu_seq_next: >PORT_ARRAY_ALLOCATED
demu_seq_next: >EVTCHN_PORTS_BOUND
demu_seq_next: VCPU0: 3 -> 6
demu_register_memory_space: 2000000 - 20001ff
  Info: (virtio/mmio.c) virtio_mmio_init:165: virtio-mmio.devices=0x200@0x2000000:33
demu_seq_next: >DEVICE_INITIALIZED
demu_seq_next: >INITIALIZED
IO request not ready
(XEN) d2v0 Unhandled SMC/HVC: 0x84000050
(XEN) d2v0 Unhandled SMC/HVC: 0x8600ff01
(XEN) d2v0: vGICD: RAZ on reserved register offset 0x00000c
(XEN) d2v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER4
(XEN) d2v0: vGICR: SGI: unhandled word write 0x000000ffffffff to ICACTIVER0
[    0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd0f0]
[    0.000000] Linux version 6.1.25 (lucfan01@e125770) (aarch64-poky-linux-gcc (GCC) 12.2.0, GNU ld (GNU Binutils) 2.40.20230119) #4 SMP PREEMPT Thu Jun 13 21:55:06 UTC 2024
[    0.000000] Machine model: XENVM-4.19
[    0.000000] Xen 4.19 support found
[    0.000000] efi: UEFI not found.
[    0.000000] NUMA: No NUMA configuration found

[...]

[    0.737758] virtio_blk virtio0: 1/0/0 default/read/poll queues
demu_detect_mappings_model: Use foreign mapping (addr 0x5d660000)
[    0.764258] virtio_blk virtio0: [vda] 747094 512-byte logical blocks (383 MB/365 MiB)
[    0.781866] Invalid max_queues (4), will use default max: 1.

[...]

INIT: Entering runlevel: 5
Configuring network interfaces... ip: SIOCGIFFLAGS: No such device
Starting syslogd/klogd: done

Poky (Yocto Project Reference Distro) 4.2.1 stressrootfs /dev/hvc0

stressrootfs login: [   62.593440] cfg80211: failed to load regulatory.db

Poky (Yocto Project Reference Distro) 4.2.1 stressrootfs /dev/hvc0

stressrootfs login: root
root@stressrootfs:~# ls /
bin         etc         lost+found  proc        sys         var
boot        home        media       run         tmp
dev         lib         mnt         sbin        usr
root@stressrootfs:~#

[...]

root@fvp-base:/opt/xtp/guests/linux-guests# xl destroy 2
  Error: reading frontend state failed

main: lost connection to dom2
demu_teardown: <INITIALIZED
demu_teardown: <DEVICE_INITIALIZED
demu_deregister_memory_space: 2000000
demu_teardown: <EVTCHN_PORTS_BOUND
demu_teardown: <PORT_ARRAY_ALLOCATED
demu_teardown: VCPU0: 6
demu_teardown: <SERVER_ENABLED
demu_teardown: <RESOURCE_MAPPED
demu_teardown: <SERVER_REGISTERED
demu_teardown: <XENGNTTAB_OPEN
demu_teardown: <XENDEVICEMODEL_OPEN
demu_teardown: <XENFOREIGNMEMORY_OPEN
demu_teardown: <XENEVTCHN_OPEN
demu_teardown: <XENSTORE_ATTACHED
  Info: disconnected from dom2

root@fvp-base:/opt/xtp/guests/linux-guests# xl list
Name                                        ID   Mem VCPUs      State   Time(s)
Domain-0                                     0  1024     2     r-----      66.6
root@fvp-base:/opt/xtp/guests/linux-guests#


Cheers,
Luca
Julien Grall June 14, 2024, 9:46 a.m. UTC | #6
On 14/06/2024 08:54, Luca Fancellu wrote:
> Hi Julien,

Hi Luca,

>> On 13 Jun 2024, at 12:31, Julien Grall <julien@xen.org> wrote:
>>
>> Hi,
>>
>> On 11/06/2024 13:42, Michal Orzel wrote:
>>>> We would like this serie to be in Xen 4.19, there was a misunderstanding on our side because we thought
>>>> that since the serie was sent before the last posting date, it could have been a candidate for merging in the
>>>> new release, instead after speaking with Julien and Oleksii we are now aware that we need to provide a
>>>> justification for its presence.
>>>>
>>>> Pros to this serie is that we are closing the circle for static shared memory, allowing it to use memory from
>>>> the host or from Xen, it is also a feature that is not enabled by default, so it should not cause too much
>>>> disruption in case of any bugs that escaped the review, however we’ve tested many configurations for that
>>>> with/without enabling the feature if that can be an additional value.
>>>>
>>>> Cons: we are touching some common code related to p2m, but also there the impact should be minimal because
>>>> the new code is subject to l2 foreign mapping (to be confirmed maybe from a p2m expert like Julien).
>>>>
>>>> The comments on patch 3 of this serie are addressed by this patch:
>>>> https://patchwork.kernel.org/project/xen-devel/patch/20240528125603.2467640-1-luca.fancellu@arm.com/
>>>> And the serie is fully reviewed.
>>>>
>>>> So our request is to allow this serie in 4.19, Oleksii, ARM maintainers, do you agree on that?
>>> As a main reviewer of this series I'm ok to have this series in. It is nicely encapsulated and the feature itself
>>> is still in unsupported state. I don't foresee any issues with it.
>>
>> There are changes in the p2m code and the memory allocation for boot domains. So is it really encapsulated?
>>
>> For me there are two risks:
>> * p2m (already mentioned by Luca): We modify the code to put foreign mapping. The worse that can happen if we don't release the foreign mapping. This would mean the page will not be freed. AFAIK, we don't exercise this path in the CI.
>> * domain allocation: This mainly look like refactoring. And the path is exercised in the CI.
>>
>> So I am not concerned with the domain allocation one. @Luca, would it be possible to detail how did you test the foreign pages were properly removed?
> 
> So at first we tested the code, with/without the static shared memory feature enabled, creating/destroying guest from Dom0 and checking that everything
> was ok.

Just to details a bit more for the other. In a normal setup, guest would 
be using PV block/network which are based on grant table. To exercise 
the foreing mapping path, you would need a backend that map using the 
GFN directly.

This is the case for virtio MMIO. Other users are IIRC XenFB, IOREQ (if 
you emulate a device).

> 
> After a chat on Matrix with Julien he suggested that using a virtio-mmio disk was better to stress out the foreign mapping looking for
> regressions.
> 
> Luckily I’ve found this slide deck from @Oleksandr: https://static.linaro.org/connect/lvc21/presentations/lvc21-314.pdf
> 
> So I did a setup using fvp-base, having a disk with two partitions containing Dom0 rootfs and DomU rootfs, Dom0 sees
> this disk using VirtIO block.

Thanks for the testing! I am satisfied with the result. I have committed 
the series.

Cheers,