All of lore.kernel.org
 help / color / mirror / Atom feed
From: julien.grall@citrix.com (Julien Grall)
To: linux-arm-kernel@lists.infradead.org
Subject: [Xen-devel] [PATCH v2 19/20] xen/privcmd: Add support for Linux 64KB page granularity
Date: Fri, 17 Jul 2015 13:50:30 +0100	[thread overview]
Message-ID: <55A8FA16.3000900@citrix.com> (raw)
In-Reply-To: <alpine.DEB.2.02.1507161707300.17378@kaball.uk.xensource.com>

Hi Stefano,

On 16/07/15 18:12, Stefano Stabellini wrote:
> On Thu, 9 Jul 2015, Julien Grall wrote:
>> The hypercall interface (as well as the toolstack) is always using 4KB
>> page granularity. When the toolstack is asking for mapping a series of
>> guest PFN in a batch, it expects to have the page map contiguously in
>> its virtual memory.
>>
>> When Linux is using 64KB page granularity, the privcmd driver will have
>> to map multiple Xen PFN in a single Linux page.
>>
>> Note that this solution works on page granularity which is a multiple of
>> 4KB.
>>
>> Signed-off-by: Julien Grall <julien.grall@citrix.com>
>> Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
>> Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>
>> Cc: David Vrabel <david.vrabel@citrix.com>
>> ---
>> Changes in v2:
>>     - Use xen_apply_to_page
>> ---
>>  drivers/xen/privcmd.c   |   8 +--
>>  drivers/xen/xlate_mmu.c | 127 +++++++++++++++++++++++++++++++++---------------
>>  2 files changed, 92 insertions(+), 43 deletions(-)
>>
>> diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c
>> index 5a29616..e8714b4 100644
>> --- a/drivers/xen/privcmd.c
>> +++ b/drivers/xen/privcmd.c
>> @@ -446,7 +446,7 @@ static long privcmd_ioctl_mmap_batch(void __user *udata, int version)
>>  		return -EINVAL;
>>  	}
>>  
>> -	nr_pages = m.num;
>> +	nr_pages = DIV_ROUND_UP_ULL(m.num, PAGE_SIZE / XEN_PAGE_SIZE);
>>  	if ((m.num <= 0) || (nr_pages > (LONG_MAX >> PAGE_SHIFT)))
>>  		return -EINVAL;
> 
> DIV_ROUND_UP is enough, neither arguments are unsigned long long

I'm not sure why I use DIV_ROUND_UP_ULL here... I will switch to
DIV_ROUND_UP in the next version.

> 
>> @@ -494,7 +494,7 @@ static long privcmd_ioctl_mmap_batch(void __user *udata, int version)
>>  			goto out_unlock;
>>  		}
>>  		if (xen_feature(XENFEAT_auto_translated_physmap)) {
>> -			ret = alloc_empty_pages(vma, m.num);
>> +			ret = alloc_empty_pages(vma, nr_pages);
>>  			if (ret < 0)
>>  				goto out_unlock;
>>  		} else
>> @@ -518,6 +518,7 @@ static long privcmd_ioctl_mmap_batch(void __user *udata, int version)
>>  	state.global_error  = 0;
>>  	state.version       = version;
>>  
>> +	BUILD_BUG_ON(((PAGE_SIZE / sizeof(xen_pfn_t)) % XEN_PFN_PER_PAGE) != 0);
>>  	/* mmap_batch_fn guarantees ret == 0 */
>>  	BUG_ON(traverse_pages_block(m.num, sizeof(xen_pfn_t),
>>  				    &pagelist, mmap_batch_fn, &state));
>> @@ -582,12 +583,13 @@ static void privcmd_close(struct vm_area_struct *vma)
>>  {
>>  	struct page **pages = vma->vm_private_data;
>>  	int numpgs = (vma->vm_end - vma->vm_start) >> PAGE_SHIFT;
>> +	int nr_pfn = (vma->vm_end - vma->vm_start) >> XEN_PAGE_SHIFT;
>>  	int rc;
>>  
>>  	if (!xen_feature(XENFEAT_auto_translated_physmap) || !numpgs || !pages)
>>  		return;
>>  
>> -	rc = xen_unmap_domain_mfn_range(vma, numpgs, pages);
>> +	rc = xen_unmap_domain_mfn_range(vma, nr_pfn, pages);
>>  	if (rc == 0)
>>  		free_xenballooned_pages(numpgs, pages);
> 
> If you intend to pass the number of xen pages as nr argument to
> xen_unmap_domain_mfn_range, then I think that the changes to
> xen_xlate_unmap_gfn_range below are wrong.

Hmmm... right. I will fix it.

> 
> 
>>  	else
>> diff --git a/drivers/xen/xlate_mmu.c b/drivers/xen/xlate_mmu.c
>> index 58a5389..1fac17c 100644
>> --- a/drivers/xen/xlate_mmu.c
>> +++ b/drivers/xen/xlate_mmu.c
>> @@ -38,31 +38,9 @@
>>  #include <xen/interface/xen.h>
>>  #include <xen/interface/memory.h>
>>  
>> -/* map fgmfn of domid to lpfn in the current domain */
>> -static int map_foreign_page(unsigned long lpfn, unsigned long fgmfn,
>> -			    unsigned int domid)
>> -{
>> -	int rc;
>> -	struct xen_add_to_physmap_range xatp = {
>> -		.domid = DOMID_SELF,
>> -		.foreign_domid = domid,
>> -		.size = 1,
>> -		.space = XENMAPSPACE_gmfn_foreign,
>> -	};
>> -	xen_ulong_t idx = fgmfn;
>> -	xen_pfn_t gpfn = lpfn;
>> -	int err = 0;
>> -
>> -	set_xen_guest_handle(xatp.idxs, &idx);
>> -	set_xen_guest_handle(xatp.gpfns, &gpfn);
>> -	set_xen_guest_handle(xatp.errs, &err);
>> -
>> -	rc = HYPERVISOR_memory_op(XENMEM_add_to_physmap_range, &xatp);
>> -	return rc < 0 ? rc : err;
>> -}
>> -
>>  struct remap_data {
>>  	xen_pfn_t *fgmfn; /* foreign domain's gmfn */
>> +	xen_pfn_t *efgmfn; /* pointer to the end of the fgmfn array */
>>  	pgprot_t prot;
>>  	domid_t  domid;
>>  	struct vm_area_struct *vma;
>> @@ -71,24 +49,75 @@ struct remap_data {
>>  	struct xen_remap_mfn_info *info;
>>  	int *err_ptr;
>>  	int mapped;
>> +
>> +	/* Hypercall parameters */
>> +	int h_errs[XEN_PFN_PER_PAGE];
>> +	xen_ulong_t h_idxs[XEN_PFN_PER_PAGE];
>> +	xen_pfn_t h_gpfns[XEN_PFN_PER_PAGE];
> 
> I don't think you should be adding these fields to struct remap_data:
> struct remap_data is used to pass multi pages arguments from
> xen_xlate_remap_gfn_array to remap_pte_fn.
> 
> I think you need to introduce a different struct to pass per linux page
> arguments from remap_pte_fn to setup_hparams.

I didn't want to introduce a new structure in order to avoid allocating
it on the stack every time remap_pte_fn is called.

Maybe it is an optimization for nothing?

[...]

>> +	/* info->err_ptr expect to have one error status per Xen PFN */
>> +	for (i = 0; i < info->h_iter; i++) {
>> +		int err = (rc < 0) ? rc : info->h_errs[i];
>> +
>> +		*(info->err_ptr++) = err;
>> +		if (!err)
>> +			info->mapped++;
>>  	}
>> -	info->fgmfn++;
>> +
>> +	/*
>> +	 * Note: The hypercall will return 0 in most of the case if even if
>                                          ^ in most cases

Will fix it.

>> +	 * all the fgmfn are not mapped. We still have to update the pte
>        ^ not all the fgmfn are mapped.
> 
>> +	 * as the userspace may decide to continue.
>> +	 */
>> +	if (!rc)
>> +		set_pte_at(info->vma->vm_mm, addr, ptep, pte);
>>  
>>  	return 0;
>>  }
>> @@ -102,13 +131,14 @@ int xen_xlate_remap_gfn_array(struct vm_area_struct *vma,
>>  {
>>  	int err;
>>  	struct remap_data data;
>> -	unsigned long range = nr << PAGE_SHIFT;
>> +	unsigned long range = round_up(nr, XEN_PFN_PER_PAGE) << XEN_PAGE_SHIFT;
> 
> If would just BUG_ON(nr % XEN_PFN_PER_PAGE) and avoid the round_up;

As discussed IRL, the toolstack can request to map only 1 Xen page. So
the BUG_ON would always be hit.

Anyway, as you suggested IRL, I will replace the round_up by
DIV_ROUND_UP in the next version.

>>  	data.prot  = prot;
>>  	data.domid = domid;
>>  	data.vma   = vma;
>> @@ -123,21 +153,38 @@ int xen_xlate_remap_gfn_array(struct vm_area_struct *vma,
>>  }
>>  EXPORT_SYMBOL_GPL(xen_xlate_remap_gfn_array);
>>  
>> +static int unmap_gfn(struct page *page, unsigned long pfn, void *data)
>> +{
>> +	int *nr = data;
>> +	struct xen_remove_from_physmap xrp;
>> +
>> +	/* The Linux Page may not have been fully mapped to Xen */
>> +	if (!*nr)
>> +		return 0;
>> +
>> +	xrp.domid = DOMID_SELF;
>> +	xrp.gpfn = pfn;
>> +	(void)HYPERVISOR_memory_op(XENMEM_remove_from_physmap, &xrp);
>> +
>> +	(*nr)--;
> 
> I don't understand why you are passing nr as private argument. I would
> just call XENMEM_remove_from_physmap unconditionally here. Am I missing
> something? After all XENMEM_remove_from_physmap is just unmapping
> at 4K granularity, right?

Yes, but you may ask to only remove 1 4KB page. When 64KB is inuse that
would mean to call the hypervisor 16 times for only 1 useful remove.

This is because, the hypervisor doesn't provide an hypercall to remove a
list of PFN which is very infortunate.

Although, as discussed IIRC I can see to provide a new function
xen_apply_to_page_range which will handle the counter internally.

> 
> 
>> +	return 0;
>> +}
>> +
>>  int xen_xlate_unmap_gfn_range(struct vm_area_struct *vma,
>>  			      int nr, struct page **pages)
>>  {
>>  	int i;
>> +	int nr_page = round_up(nr, XEN_PFN_PER_PAGE);
> 
> If nr is the number of xen pages, then this should be:
> 
>     int nr_pages = DIV_ROUND_UP(nr, XEN_PFN_PER_PAGE);

Correct, I will fix it.

>> -	for (i = 0; i < nr; i++) {
>> -		struct xen_remove_from_physmap xrp;
>> -		unsigned long pfn;
>> +	for (i = 0; i < nr_page; i++) {
>> +		/* unmap_gfn guarantees ret == 0 */
>> +		BUG_ON(xen_apply_to_page(pages[i], unmap_gfn, &nr));
>> +	}
>>  
>> -		pfn = page_to_pfn(pages[i]);
>> +	/* We should have consume every xen page */
>                         ^ consumed

I will fix it.

Regards,

-- 
Julien Grall

WARNING: multiple messages have this Message-ID (diff)
From: Julien Grall <julien.grall@citrix.com>
To: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Cc: <ian.campbell@citrix.com>, <linux-kernel@vger.kernel.org>,
	David Vrabel <david.vrabel@citrix.com>,
	<xen-devel@lists.xenproject.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	<linux-arm-kernel@lists.infradead.org>
Subject: Re: [Xen-devel] [PATCH v2 19/20] xen/privcmd: Add support for Linux 64KB page granularity
Date: Fri, 17 Jul 2015 13:50:30 +0100	[thread overview]
Message-ID: <55A8FA16.3000900@citrix.com> (raw)
In-Reply-To: <alpine.DEB.2.02.1507161707300.17378@kaball.uk.xensource.com>

Hi Stefano,

On 16/07/15 18:12, Stefano Stabellini wrote:
> On Thu, 9 Jul 2015, Julien Grall wrote:
>> The hypercall interface (as well as the toolstack) is always using 4KB
>> page granularity. When the toolstack is asking for mapping a series of
>> guest PFN in a batch, it expects to have the page map contiguously in
>> its virtual memory.
>>
>> When Linux is using 64KB page granularity, the privcmd driver will have
>> to map multiple Xen PFN in a single Linux page.
>>
>> Note that this solution works on page granularity which is a multiple of
>> 4KB.
>>
>> Signed-off-by: Julien Grall <julien.grall@citrix.com>
>> Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
>> Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>
>> Cc: David Vrabel <david.vrabel@citrix.com>
>> ---
>> Changes in v2:
>>     - Use xen_apply_to_page
>> ---
>>  drivers/xen/privcmd.c   |   8 +--
>>  drivers/xen/xlate_mmu.c | 127 +++++++++++++++++++++++++++++++++---------------
>>  2 files changed, 92 insertions(+), 43 deletions(-)
>>
>> diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c
>> index 5a29616..e8714b4 100644
>> --- a/drivers/xen/privcmd.c
>> +++ b/drivers/xen/privcmd.c
>> @@ -446,7 +446,7 @@ static long privcmd_ioctl_mmap_batch(void __user *udata, int version)
>>  		return -EINVAL;
>>  	}
>>  
>> -	nr_pages = m.num;
>> +	nr_pages = DIV_ROUND_UP_ULL(m.num, PAGE_SIZE / XEN_PAGE_SIZE);
>>  	if ((m.num <= 0) || (nr_pages > (LONG_MAX >> PAGE_SHIFT)))
>>  		return -EINVAL;
> 
> DIV_ROUND_UP is enough, neither arguments are unsigned long long

I'm not sure why I use DIV_ROUND_UP_ULL here... I will switch to
DIV_ROUND_UP in the next version.

> 
>> @@ -494,7 +494,7 @@ static long privcmd_ioctl_mmap_batch(void __user *udata, int version)
>>  			goto out_unlock;
>>  		}
>>  		if (xen_feature(XENFEAT_auto_translated_physmap)) {
>> -			ret = alloc_empty_pages(vma, m.num);
>> +			ret = alloc_empty_pages(vma, nr_pages);
>>  			if (ret < 0)
>>  				goto out_unlock;
>>  		} else
>> @@ -518,6 +518,7 @@ static long privcmd_ioctl_mmap_batch(void __user *udata, int version)
>>  	state.global_error  = 0;
>>  	state.version       = version;
>>  
>> +	BUILD_BUG_ON(((PAGE_SIZE / sizeof(xen_pfn_t)) % XEN_PFN_PER_PAGE) != 0);
>>  	/* mmap_batch_fn guarantees ret == 0 */
>>  	BUG_ON(traverse_pages_block(m.num, sizeof(xen_pfn_t),
>>  				    &pagelist, mmap_batch_fn, &state));
>> @@ -582,12 +583,13 @@ static void privcmd_close(struct vm_area_struct *vma)
>>  {
>>  	struct page **pages = vma->vm_private_data;
>>  	int numpgs = (vma->vm_end - vma->vm_start) >> PAGE_SHIFT;
>> +	int nr_pfn = (vma->vm_end - vma->vm_start) >> XEN_PAGE_SHIFT;
>>  	int rc;
>>  
>>  	if (!xen_feature(XENFEAT_auto_translated_physmap) || !numpgs || !pages)
>>  		return;
>>  
>> -	rc = xen_unmap_domain_mfn_range(vma, numpgs, pages);
>> +	rc = xen_unmap_domain_mfn_range(vma, nr_pfn, pages);
>>  	if (rc == 0)
>>  		free_xenballooned_pages(numpgs, pages);
> 
> If you intend to pass the number of xen pages as nr argument to
> xen_unmap_domain_mfn_range, then I think that the changes to
> xen_xlate_unmap_gfn_range below are wrong.

Hmmm... right. I will fix it.

> 
> 
>>  	else
>> diff --git a/drivers/xen/xlate_mmu.c b/drivers/xen/xlate_mmu.c
>> index 58a5389..1fac17c 100644
>> --- a/drivers/xen/xlate_mmu.c
>> +++ b/drivers/xen/xlate_mmu.c
>> @@ -38,31 +38,9 @@
>>  #include <xen/interface/xen.h>
>>  #include <xen/interface/memory.h>
>>  
>> -/* map fgmfn of domid to lpfn in the current domain */
>> -static int map_foreign_page(unsigned long lpfn, unsigned long fgmfn,
>> -			    unsigned int domid)
>> -{
>> -	int rc;
>> -	struct xen_add_to_physmap_range xatp = {
>> -		.domid = DOMID_SELF,
>> -		.foreign_domid = domid,
>> -		.size = 1,
>> -		.space = XENMAPSPACE_gmfn_foreign,
>> -	};
>> -	xen_ulong_t idx = fgmfn;
>> -	xen_pfn_t gpfn = lpfn;
>> -	int err = 0;
>> -
>> -	set_xen_guest_handle(xatp.idxs, &idx);
>> -	set_xen_guest_handle(xatp.gpfns, &gpfn);
>> -	set_xen_guest_handle(xatp.errs, &err);
>> -
>> -	rc = HYPERVISOR_memory_op(XENMEM_add_to_physmap_range, &xatp);
>> -	return rc < 0 ? rc : err;
>> -}
>> -
>>  struct remap_data {
>>  	xen_pfn_t *fgmfn; /* foreign domain's gmfn */
>> +	xen_pfn_t *efgmfn; /* pointer to the end of the fgmfn array */
>>  	pgprot_t prot;
>>  	domid_t  domid;
>>  	struct vm_area_struct *vma;
>> @@ -71,24 +49,75 @@ struct remap_data {
>>  	struct xen_remap_mfn_info *info;
>>  	int *err_ptr;
>>  	int mapped;
>> +
>> +	/* Hypercall parameters */
>> +	int h_errs[XEN_PFN_PER_PAGE];
>> +	xen_ulong_t h_idxs[XEN_PFN_PER_PAGE];
>> +	xen_pfn_t h_gpfns[XEN_PFN_PER_PAGE];
> 
> I don't think you should be adding these fields to struct remap_data:
> struct remap_data is used to pass multi pages arguments from
> xen_xlate_remap_gfn_array to remap_pte_fn.
> 
> I think you need to introduce a different struct to pass per linux page
> arguments from remap_pte_fn to setup_hparams.

I didn't want to introduce a new structure in order to avoid allocating
it on the stack every time remap_pte_fn is called.

Maybe it is an optimization for nothing?

[...]

>> +	/* info->err_ptr expect to have one error status per Xen PFN */
>> +	for (i = 0; i < info->h_iter; i++) {
>> +		int err = (rc < 0) ? rc : info->h_errs[i];
>> +
>> +		*(info->err_ptr++) = err;
>> +		if (!err)
>> +			info->mapped++;
>>  	}
>> -	info->fgmfn++;
>> +
>> +	/*
>> +	 * Note: The hypercall will return 0 in most of the case if even if
>                                          ^ in most cases

Will fix it.

>> +	 * all the fgmfn are not mapped. We still have to update the pte
>        ^ not all the fgmfn are mapped.
> 
>> +	 * as the userspace may decide to continue.
>> +	 */
>> +	if (!rc)
>> +		set_pte_at(info->vma->vm_mm, addr, ptep, pte);
>>  
>>  	return 0;
>>  }
>> @@ -102,13 +131,14 @@ int xen_xlate_remap_gfn_array(struct vm_area_struct *vma,
>>  {
>>  	int err;
>>  	struct remap_data data;
>> -	unsigned long range = nr << PAGE_SHIFT;
>> +	unsigned long range = round_up(nr, XEN_PFN_PER_PAGE) << XEN_PAGE_SHIFT;
> 
> If would just BUG_ON(nr % XEN_PFN_PER_PAGE) and avoid the round_up;

As discussed IRL, the toolstack can request to map only 1 Xen page. So
the BUG_ON would always be hit.

Anyway, as you suggested IRL, I will replace the round_up by
DIV_ROUND_UP in the next version.

>>  	data.prot  = prot;
>>  	data.domid = domid;
>>  	data.vma   = vma;
>> @@ -123,21 +153,38 @@ int xen_xlate_remap_gfn_array(struct vm_area_struct *vma,
>>  }
>>  EXPORT_SYMBOL_GPL(xen_xlate_remap_gfn_array);
>>  
>> +static int unmap_gfn(struct page *page, unsigned long pfn, void *data)
>> +{
>> +	int *nr = data;
>> +	struct xen_remove_from_physmap xrp;
>> +
>> +	/* The Linux Page may not have been fully mapped to Xen */
>> +	if (!*nr)
>> +		return 0;
>> +
>> +	xrp.domid = DOMID_SELF;
>> +	xrp.gpfn = pfn;
>> +	(void)HYPERVISOR_memory_op(XENMEM_remove_from_physmap, &xrp);
>> +
>> +	(*nr)--;
> 
> I don't understand why you are passing nr as private argument. I would
> just call XENMEM_remove_from_physmap unconditionally here. Am I missing
> something? After all XENMEM_remove_from_physmap is just unmapping
> at 4K granularity, right?

Yes, but you may ask to only remove 1 4KB page. When 64KB is inuse that
would mean to call the hypervisor 16 times for only 1 useful remove.

This is because, the hypervisor doesn't provide an hypercall to remove a
list of PFN which is very infortunate.

Although, as discussed IIRC I can see to provide a new function
xen_apply_to_page_range which will handle the counter internally.

> 
> 
>> +	return 0;
>> +}
>> +
>>  int xen_xlate_unmap_gfn_range(struct vm_area_struct *vma,
>>  			      int nr, struct page **pages)
>>  {
>>  	int i;
>> +	int nr_page = round_up(nr, XEN_PFN_PER_PAGE);
> 
> If nr is the number of xen pages, then this should be:
> 
>     int nr_pages = DIV_ROUND_UP(nr, XEN_PFN_PER_PAGE);

Correct, I will fix it.

>> -	for (i = 0; i < nr; i++) {
>> -		struct xen_remove_from_physmap xrp;
>> -		unsigned long pfn;
>> +	for (i = 0; i < nr_page; i++) {
>> +		/* unmap_gfn guarantees ret == 0 */
>> +		BUG_ON(xen_apply_to_page(pages[i], unmap_gfn, &nr));
>> +	}
>>  
>> -		pfn = page_to_pfn(pages[i]);
>> +	/* We should have consume every xen page */
>                         ^ consumed

I will fix it.

Regards,

-- 
Julien Grall

  parent reply	other threads:[~2015-07-17 12:50 UTC|newest]

Thread overview: 264+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-07-09 20:42 [PATCH v2 00/20] xen/arm64: Add support for 64KB page Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 01/20] xen: Add Xen specific page definition Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 14:19   ` Stefano Stabellini
2015-07-16 14:19   ` Stefano Stabellini
2015-07-16 14:19     ` Stefano Stabellini
2015-07-16 14:52     ` Julien Grall
2015-07-16 14:52       ` Julien Grall
2015-07-16 14:52     ` Julien Grall
2015-07-24  9:28   ` David Vrabel
2015-07-24  9:28   ` [Xen-devel] " David Vrabel
2015-07-24  9:28     ` David Vrabel
2015-07-24  9:39     ` Julien Grall
2015-07-24  9:39     ` [Xen-devel] " Julien Grall
2015-07-24  9:39       ` Julien Grall
2015-07-24  9:48       ` David Vrabel
2015-07-24  9:48       ` [Xen-devel] " David Vrabel
2015-07-24  9:48         ` David Vrabel
2015-07-24  9:51         ` Julien Grall
2015-07-24  9:51           ` Julien Grall
2015-07-24 10:34           ` David Vrabel
2015-07-24 10:34             ` David Vrabel
2015-07-24 10:43             ` Ian Campbell
2015-07-24 10:43               ` Ian Campbell
2015-07-24 10:43             ` Ian Campbell
2015-07-24 13:03             ` Julien Grall
2015-07-24 13:03             ` [Xen-devel] " Julien Grall
2015-07-24 13:03               ` Julien Grall
2015-07-24 10:34           ` David Vrabel
2015-07-24  9:51         ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 02/20] xen: Introduce a function to split a Linux page into Xen page Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 14:23   ` Stefano Stabellini
2015-07-16 14:23   ` Stefano Stabellini
2015-07-16 14:23     ` Stefano Stabellini
2015-07-16 14:54     ` Julien Grall
2015-07-16 14:54     ` [Xen-devel] " Julien Grall
2015-07-16 14:54       ` Julien Grall
2015-07-16 15:19       ` Andrew Cooper
2015-07-16 16:09         ` Julien Grall
2015-07-16 16:13           ` Andrew Cooper
2015-07-24  9:31   ` David Vrabel
2015-07-24  9:31   ` [Xen-devel] " David Vrabel
2015-07-24  9:31     ` David Vrabel
2015-07-24  9:54     ` Julien Grall
2015-07-24  9:54     ` [Xen-devel] " Julien Grall
2015-07-24  9:54       ` Julien Grall
2015-07-24 10:10       ` David Vrabel
2015-07-24 10:10       ` [Xen-devel] " David Vrabel
2015-07-24 10:10         ` David Vrabel
2015-07-24 10:20         ` Julien Grall
2015-07-24 10:20           ` Julien Grall
2015-07-24 10:20         ` Julien Grall
2015-08-05 14:30         ` Julien Grall
2015-08-05 14:30         ` [Xen-devel] " Julien Grall
2015-08-05 14:30           ` Julien Grall
2015-08-05 15:50           ` David Vrabel
2015-08-05 15:50             ` David Vrabel
2015-08-05 16:06             ` Julien Grall
2015-08-05 16:06               ` Julien Grall
2015-08-05 16:06             ` Julien Grall
2015-08-05 15:50           ` David Vrabel
2015-07-09 20:42 ` [PATCH v2 03/20] xen/grant: Introduce helpers to split a page into grant Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 15:01   ` Stefano Stabellini
2015-07-16 15:01     ` Stefano Stabellini
2015-07-16 16:07     ` Julien Grall
2015-07-16 16:07       ` Julien Grall
2015-07-17 13:10       ` Julien Grall
2015-07-17 13:10       ` [Xen-devel] " Julien Grall
2015-07-17 13:10         ` Julien Grall
2015-07-16 16:07     ` Julien Grall
2015-07-16 15:01   ` Stefano Stabellini
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 04/20] xen/grant: Add helper gnttab_page_grant_foreign_access_ref Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 15:05   ` Stefano Stabellini
2015-07-16 15:05     ` Stefano Stabellini
2015-07-16 16:12     ` [Xen-devel] " Julien Grall
2015-07-16 16:12       ` Julien Grall
2015-07-16 16:12     ` Julien Grall
2015-07-16 15:05   ` Stefano Stabellini
2015-07-24  9:35   ` David Vrabel
2015-07-24  9:35   ` [Xen-devel] " David Vrabel
2015-07-24  9:35     ` David Vrabel
2015-07-09 20:42 ` [PATCH v2 05/20] block/xen-blkfront: Split blkif_queue_request in 2 Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-21  9:54   ` Roger Pau Monné
2015-07-21  9:54     ` Roger Pau Monné
2015-07-21 11:12     ` Julien Grall
2015-07-21 11:12     ` [Xen-devel] " Julien Grall
2015-07-21 11:12       ` Julien Grall
2015-07-21  9:54   ` Roger Pau Monné
2015-07-09 20:42 ` [PATCH v2 06/20] block/xen-blkfront: Store a page rather a pfn in the grant structure Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 15:11   ` Stefano Stabellini
2015-07-16 15:11   ` Stefano Stabellini
2015-07-16 15:11     ` Stefano Stabellini
2015-07-23 17:18     ` Julien Grall
2015-07-23 17:18       ` Julien Grall
2015-07-23 17:18     ` Julien Grall
2015-07-21 10:16   ` Roger Pau Monné
2015-07-21 10:16   ` Roger Pau Monné
2015-07-21 10:16     ` Roger Pau Monné
2015-07-21 11:19     ` [Xen-devel] " Julien Grall
2015-07-21 11:19       ` Julien Grall
2015-07-21 11:19     ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 07/20] block/xen-blkfront: split get_grant in 2 Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-21 10:30   ` Roger Pau Monné
2015-07-21 10:30   ` Roger Pau Monné
2015-07-21 10:30     ` Roger Pau Monné
2015-07-21 13:03     ` [Xen-devel] " Julien Grall
2015-07-21 13:03       ` Julien Grall
2015-07-21 13:03     ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 08/20] net/xen-netback: xenvif_gop_frag_copy: move GSO check out of the loop Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 09/20] xen/biomerge: Don't allow biovec to be merge when Linux is not using 4KB page Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-10 19:12   ` Konrad Rzeszutek Wilk
2015-07-10 19:12   ` Konrad Rzeszutek Wilk
2015-07-10 19:12     ` Konrad Rzeszutek Wilk
2015-07-15  8:56     ` Julien Grall
2015-07-15  8:56     ` [Xen-devel] " Julien Grall
2015-07-15  8:56       ` Julien Grall
2015-07-16 15:33     ` Stefano Stabellini
2015-07-16 15:33     ` Stefano Stabellini
2015-07-16 15:33       ` Stefano Stabellini
2015-07-16 16:15       ` [Xen-devel] " Julien Grall
2015-07-16 16:15         ` Julien Grall
2015-07-16 18:30         ` Konrad Rzeszutek Wilk
2015-07-16 18:30           ` Konrad Rzeszutek Wilk
2015-07-16 18:30         ` Konrad Rzeszutek Wilk
2015-07-17 13:20         ` Stefano Stabellini
2015-07-17 13:20         ` [Xen-devel] " Stefano Stabellini
2015-07-17 13:20           ` Stefano Stabellini
2015-07-17 14:44           ` Julien Grall
2015-07-17 14:44             ` Julien Grall
2015-07-17 14:45             ` Stefano Stabellini
2015-07-17 14:45             ` [Xen-devel] " Stefano Stabellini
2015-07-17 14:45               ` Stefano Stabellini
2015-07-17 14:46               ` Julien Grall
2015-07-17 14:46               ` [Xen-devel] " Julien Grall
2015-07-17 14:46                 ` Julien Grall
2015-07-17 14:44           ` Julien Grall
2015-07-16 16:15       ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 10/20] xen/xenbus: Use Xen page definition Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 15:35   ` Stefano Stabellini
2015-07-16 15:35     ` Stefano Stabellini
2015-07-16 15:35   ` Stefano Stabellini
2015-07-24  9:49   ` David Vrabel
2015-07-24  9:49   ` David Vrabel
2015-07-24  9:49     ` David Vrabel
2015-07-09 20:42 ` [PATCH v2 11/20] tty/hvc: xen: Use xen " Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 15:36   ` Stefano Stabellini
2015-07-16 15:36   ` Stefano Stabellini
2015-07-16 15:36     ` Stefano Stabellini
2015-07-24  9:52   ` David Vrabel
2015-07-24  9:52   ` David Vrabel
2015-07-24  9:52     ` David Vrabel
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 12/20] xen/balloon: Don't rely on the page granularity is the same for Xen and Linux Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-17 14:03   ` Stefano Stabellini
2015-07-17 14:03     ` Stefano Stabellini
2015-07-17 14:32     ` Julien Grall
2015-07-17 14:32       ` Julien Grall
2015-07-17 14:32     ` Julien Grall
2015-07-17 14:03   ` Stefano Stabellini
2015-07-09 20:42 ` [PATCH v2 13/20] xen/events: fifo: Make it running on 64KB granularity Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 15:43   ` Stefano Stabellini
2015-07-16 15:43     ` Stefano Stabellini
2015-07-16 16:18     ` [Xen-devel] " Julien Grall
2015-07-16 16:18       ` Julien Grall
2015-07-17 13:06       ` Stefano Stabellini
2015-07-17 13:06         ` Stefano Stabellini
2015-07-17 13:06       ` Stefano Stabellini
2015-07-16 16:18     ` Julien Grall
2015-07-16 15:43   ` Stefano Stabellini
2015-07-24 10:36   ` David Vrabel
2015-07-24 10:36     ` David Vrabel
2015-08-06 15:43     ` [Xen-devel] " Julien Grall
2015-08-06 15:43       ` Julien Grall
2015-08-06 15:43     ` Julien Grall
2015-07-24 10:36   ` David Vrabel
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 14/20] xen/grant-table: " Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-16 15:47   ` Stefano Stabellini
2015-07-16 15:47   ` Stefano Stabellini
2015-07-16 15:47     ` Stefano Stabellini
2015-07-16 16:23     ` [Xen-devel] " Julien Grall
2015-07-16 16:23       ` Julien Grall
2015-07-17 13:37       ` Stefano Stabellini
2015-07-17 13:37       ` [Xen-devel] " Stefano Stabellini
2015-07-17 13:37         ` Stefano Stabellini
2015-07-16 16:23     ` Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 15/20] block/xen-blkfront: Make it running on 64KB page granularity Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-21 11:06   ` Roger Pau Monné
2015-07-21 11:06   ` Roger Pau Monné
2015-07-21 11:06     ` Roger Pau Monné
2015-07-21 13:07     ` Julien Grall
2015-07-21 13:07     ` [Xen-devel] " Julien Grall
2015-07-21 13:07       ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 16/20] block/xen-blkback: " Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 17/20] net/xen-netfront: " Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-20 17:26   ` [Xen-devel] " Julien Grall
2015-07-20 17:26     ` Julien Grall
2015-07-20 17:26   ` Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 18/20] net/xen-netback: " Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 19/20] xen/privcmd: Add support for Linux " Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-13 20:13   ` Boris Ostrovsky
2015-07-13 20:13   ` Boris Ostrovsky
2015-07-13 20:13     ` Boris Ostrovsky
2015-07-13 22:05     ` Julien Grall
2015-07-13 22:05       ` Julien Grall
2015-07-14 15:28       ` Boris Ostrovsky
2015-07-14 15:28         ` Boris Ostrovsky
2015-07-14 15:37         ` Julien Grall
2015-07-14 15:37         ` Julien Grall
2015-07-14 15:37           ` Julien Grall
2015-07-14 15:28       ` Boris Ostrovsky
2015-07-13 22:05     ` Julien Grall
2015-07-16 17:12   ` Stefano Stabellini
2015-07-16 17:12     ` Stefano Stabellini
2015-07-16 17:16     ` Stefano Stabellini
2015-07-16 17:16     ` Stefano Stabellini
2015-07-16 17:16       ` Stefano Stabellini
2015-07-17 12:50     ` Julien Grall [this message]
2015-07-17 12:50       ` [Xen-devel] " Julien Grall
2015-07-17 12:50     ` Julien Grall
2015-07-16 17:12   ` Stefano Stabellini
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42 ` [PATCH v2 20/20] arm/xen: Add support for " Julien Grall
2015-07-09 20:42 ` Julien Grall
2015-07-09 20:42   ` Julien Grall
2015-07-20 17:54 ` [PATCH v2 00/20] xen/arm64: Add support for 64KB page Julien Grall
2015-07-20 17:54 ` [Xen-devel] " Julien Grall
2015-07-20 17:54   ` Julien Grall

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55A8FA16.3000900@citrix.com \
    --to=julien.grall@citrix.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.