Displaying 20 results from an estimated 41 matches for "max_page".
Did you mean:
map_page
2006 May 22
1
[Xen-ia64-devel] RE: Re: [PATCH] Disable auto-balloon on ia64
...you weren''t allocating headroom up front -- if
>you can fix ia64 to allocate the extra memory as needed then you
>shouldn''t need either of your workarounds?
>
> -- Keir
OK, the question by far is that ia64 describes the memory hierarchy
presented to domain by d->max_pages. Before balloon is ready, we at
least need to ensure all frames covered by d->max_pages allocated for
target domain. Then there''re two alternatives:
- Keep the first piece of change on increase_reservation, which
ensures all pages including extra spaces allocated immediately.
- Pa...
2007 May 29
0
Fw: [RFC] makedumpfile: xen extraction
...Info *info)
+{
+ /* common symbol */
+ SYMBOL_INIT(dom_xen, "dom_xen");
+ SYMBOL_INIT(dom_io, "dom_io");
+ SYMBOL_INIT(domain_list, "domain_list");
+ SYMBOL_INIT(frame_table, "frame_table");
+ SYMBOL_INIT(alloc_bitmap, "alloc_bitmap");
+ SYMBOL_INIT(max_page, "max_page");
+ SYMBOL_INIT(xenheap_phys_end, "xenheap_phys_end");
+
+ /* architecture specific */
+ SYMBOL_INIT(pgd_l2, "idle_pg_table_l2"); /* x86 */
+ SYMBOL_INIT(pgd_l3, "idle_pg_table_l3"); /* x86-PAE */
+ SYMBOL_INIT(pgd_l4, "idle_pg_table_4")...
2005 May 28
4
bitopts functions overflowing page boundarys
u.inuse.type_info is at the end of the pfn_info structure, and is
u32 for both x86_32 and x86_64--in this location it can also be the
last 32 bits of a page.
several functions use bitopts.h functions to manipulate this member, and
on x86_64 these functions use u64 instructions, which will overflow the
page boundary, and possibly the end of memory as we see here:
(XEN)
2012 Mar 09
4
Max gfn?
...00100000 - 00000000f0000000 (usable)
BIOS-e820: 00000000fc000000 - 0000000100000000 (reserved)
BIOS-e820: 0000000100000000 - 000000030f000000 (usable)
I see that the highest usable gpa is over 12GB due to the reserved
slots and the max gfn is 30f000. If I use xc_domain_getinfolist() and
look at max_pages, it returns 300100 which correctly reflects 12GB.
But is there a way for me to find out the max gfn that is reflected in
the guest using libxc?
Thanks,
AP
2012 Jan 05
3
[PATCH 0 of 2] xenpaging:speed up page-in
The following two patches are about how to speed up in xenpaging when page in pages.
On suse11-64 with 4G memory,if we page out 2G pages,it will cost about 15.5 seconds,
but take 2088 seconds to finish paging in.If page-in costs too much time,it will cause
unmesurable problems when vm or dom0 access the paged_out page,such as BSOD,crash.
What鈥檚 more,the dom0 is always in high I/O pressure.
2012 Nov 15
1
[RFC/PATCH v4] XENMEM_claim_pages (subop of existing) hypercall
...Beulich]
- New hypercall(s) should fail for unpriv callers [IanC]
- Non-zero extent_order disallowed [JBeulich]
- Remove bonehead ASSERTs [JBeulich]
- Need not hold heaplock for decrease case too [JBeulich]
- More descriptive failure return values [JBeulich]
- Don''t allow a claim to exceed max_pages [IanC]
- Subops must be in correct ifdef block in memory.c [keir]
v1->v2:
- Add reset-to-zero page claim in domain_kill [JBeulich]
- Proper handling of struct passed to hypercall [JBeulich]
- Fix alloc_heap_pages when a domain has a claim [JBeulich]
- Need not hold heap_lock if !d->unclaime...
2012 Mar 15
3
[PATCH] arm: allocate top level p2m page for all non-idle VCPUs
...0 )
+ goto fail;
}
d->max_vcpus = 8;
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 15632f7..6687e50 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -93,9 +93,6 @@ int construct_dom0(struct domain *d)
d->max_pages = ~0U;
- if ( (rc = p2m_alloc_table(d)) != 0 )
- return rc;
-
printk("Populate P2M %#llx->%#llx\n", kinfo.ram_start, kinfo.ram_end);
p2m_populate_ram(d, kinfo.ram_start, kinfo.ram_end);
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index 051a0e8..4f624d8...
2009 Jan 22
17
Critical bug: VT-d fault causes disk corruption or Dom0 kernel panic.
All,
We met several system failures on different hardware platforms, which are all caused by VT-d fault.
err 1: disk is corrupted by VT-d fault on SATA.
err 2: Dom0 kernel panics at booting, which is caused VT-d fault on UHCI.
err 3, Dom0 complains disk errors while creating HVM guests.
The culprit would be changeset 19054 "x86_64: Remove statically-partitioned Xen heap.".
Detailed
2012 Jan 05
13
[PATCH] xenpaging:add a new array to speed up page-in in xenpaging
...int i;
@@ -637,6 +638,17 @@
}
victims = calloc(paging->num_pages, sizeof(xenpaging_victim_t));
+ if (NULL == victims)
+ {
+ ERROR("Failed to alloc memory\n");
+ goto out;
+ }
+ page_out_index = (victim_to_i_t *)calloc(paging->domain_info->max_pages, sizeof(victim_to_i_t));
+ if ( NULL == page_out_index )
+ {
+ ERROR("Failed to alloc memory\n");
+ goto out;
+ }
/* ensure that if we get a signal, we''ll do cleanup, then exit */
act.sa_handler = close_handler;
@@ -660,6 +672,7 @@...
2009 Feb 23
8
[PATCH] Included reserved memory regions in dom0 iommu mappings
This adds a boolean boot parameter to xen to allow reserved memory
regions to be added to the iommu mappings for dom0. The parameter
is "iommu_include_reserved" and is off by default. A warning is
also traced when incorrect RMRR to system memory map values are
detected. This is being added to address some incorrect BIOS''s that
do not report correctly the requied reserved memory
2004 Jul 16
1
/proc/xen/memory_target patch
...Tue Jul 6 15:09:30 2004
--- obj-unstable/xeno-unstable.bk/linux-2.4.26-xen-sparse/arch/xen/drivers/balloon/balloon.c Fri Jul 16 15:12:11 2004
***************
*** 39,44 ****
--- 39,45 ----
static struct proc_dir_entry *balloon_pde;
unsigned long credit;
+ static unsigned long current_pages, max_pages;
static inline pte_t *get_ptep(unsigned long addr)
{
***************
*** 221,270 ****
return ret;
}
static int balloon_write(struct file *file, const char *buffer,
u_long count, void *data)
{
! user_balloon_op_t bop;
/* Only admin can p...
2005 Aug 05
0
[patch] pae >4gb fix #1
...c.pae 2005-08-05 15:39:23.000000000 +0200
+++ xen/arch/x86/x86_32/mm.c 2005-08-05 16:05:39.115794436 +0200
@@ -98,7 +98,9 @@
* installed, but at least 4MB to cover 4GB address space. This is needed
* to make PCI I/O memory address lookups work in guests.
*/
- if ( (mpt_size = max_page * 4) < (4*1024*1024) )
+#define L2_MASK ((1<<L2_PAGETABLE_SHIFT)-1)
+ mpt_size = (max_page * 4 + L2_MASK) & ~L2_MASK;
+ if (mpt_size < 4*1024*1024)
mpt_size = 4*1024*1024;
for ( i = 0; i < (mpt_size >> L2_PAGETABLE_SHIFT); i++ )
{
_________________...
2010 Dec 13
0
[PATCH, RFC] x86/iommu: don''t map RAM holes above 4G
...-- a/xen/drivers/passthrough/amd/pci_amd_iommu.c
+++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c
@@ -230,8 +230,16 @@ static void __init amd_iommu_dom0_init(s
if ( !iommu_passthrough && !need_iommu(d) )
{
/* Set up 1:1 page table for dom0 */
- for ( i = 0; i < max_page; i++ )
- amd_iommu_map_page(d, i, i, IOMMUF_readable|IOMMUF_writable);
+ for ( i = 0; i < max_pdx; i++ )
+ {
+ unsigned long pfn = pdx_to_pfn(i);
+
+ /*
+ * XXX Should we really map all non-RAM (above 4G)? Minimally
+ * a pfn...
2012 Nov 29
14
Mem_event API and MEM_EVENT_REASON_SINGLESTEP
...page
is being written to.
To this end, I''ve looked at the xen-access.c example, where at first all
the pages are being monitored:
xc_hvm_set_mem_access(xch, domain_id, HVMMEM_access_rx, ~0ull, 0);
xc_hvm_set_mem_access(xch, domain_id, HVMMEM_access_rx, 0,
xenaccess->domain_info->max_pages);
Then, after an event is received:
xc_hvm_set_mem_access(xch, domain_id, HVMMEM_access_rwx, req.gfn, 1);
thus allowing ''rwx'' access to 1 page starting at req.gfn.
This strategy indeed allows me to inspect writes to any page of the
guest OS, however I can only do this once p...
2012 Apr 24
1
[PATCH] [resend] xen-access: Check return values and clean up on errors during init
...listener required\n", rc);
+ goto exit;
+ }
/* Set the default access type and convert all pages to it */
rc = xc_hvm_set_mem_access(xch, domain_id, default_access, ~0ull, 0);
- rc = xc_hvm_set_mem_access(xch, domain_id, default_access, 0, xenaccess->domain_info->max_pages);
+ if ( rc < 0 )
+ {
+ ERROR("Error %d setting default mem access type\n", rc);
+ goto exit;
+ }
+
+ rc = xc_hvm_set_mem_access(xch, domain_id, default_access, 0,
+ xenaccess->domain_info->max_pages);
+ if ( rc < 0 )...
2020 Feb 10
2
[nbdkit PATCH 04/10] plugins: Wire up in-memory plugin support for NBD_INFO_INIT_STATE
...et, pointer to L2 directory).
@@ -103,6 +106,8 @@ struct l1_entry {
struct sparse_array {
struct l1_entry *l1_dir; /* L1 directory. */
size_t l1_size; /* Number of entries in L1 directory. */
+ size_t used_pages; /* Number of non-NULL L2 entries. */
+ uint64_t max_pages; /* Maximum L2 pages if fully allocated. */
bool debug;
};
@@ -140,6 +145,8 @@ alloc_sparse_array (bool debug)
return NULL;
sa->l1_dir = NULL;
sa->l1_size = 0;
+ sa->used_pages = 0;
+ sa->max_pages = 0;
sa->debug = debug;
return sa;
}
@@ -254,6 +26...
2008 Mar 19
10
Illegal PV kernel pfm/pfn translations on PROT_NONE ioremaps
Hi,
On paravirt x86 (both 32- and 64-bit), since cset 13998:
http://xenbits.xensource.com/xen-unstable.hg?rev/13998
we translate all ptes from being mfn-based to pfn-based when the
hardware _PAGE_PRESENT bit is cleared. We do this for PROT_NONE pages,
which appear to the HV to be non-present, but which are special-cased in
the kernel to appear present (a different bit in the
2009 Aug 24
0
[PATCH] Fix SRAT check for discontig memory
...u64 pxmram, e820ram;
- pxmram = 0;
- for_each_node_mask(i, nodes_parsed) {
- u64 s = nodes[i].start >> PAGE_SHIFT;
- u64 e = nodes[i].end >> PAGE_SHIFT;
- pxmram += e - s;
- }
+ for (i = 0; i < e820.nr_map; i++) {
+ int j, found;
+ unsigned long long start, end;
- e820ram = max_page;
- /* We seem to lose 3 pages somewhere. Allow a bit of slack. */
- if ((long)(e820ram - pxmram) >= 1*1024*1024) {
- printk(KERN_ERR "SRAT: PXMs only cover %"PRIu64"MB of your %"
- PRIu64"MB e820 RAM. Not used.\n",
- (pxmram << PAGE_SHIFT) >> 20,
-...
2012 Nov 28
0
[PATCH v8 2/2] tools: XENMEM_claim_pages (subop of existing) hypercall
...u.getdomaininfo.tot_pages;
+ info->nr_unclaimed_pages = domctl.u.getdomaininfo.unclaimed_pages;
info->nr_shared_pages = domctl.u.getdomaininfo.shr_pages;
info->nr_paged_pages = domctl.u.getdomaininfo.paged_pages;
info->max_memkb = domctl.u.getdomaininfo.max_pages << (PAGE_SHIFT-10);
diff --git a/tools/libxc/xenctrl.h b/tools/libxc/xenctrl.h
index 7eb5743..325f4a3 100644
--- a/tools/libxc/xenctrl.h
+++ b/tools/libxc/xenctrl.h
@@ -364,6 +364,7 @@ typedef struct xc_dominfo {
hvm:1, debugged:1;
unsigned int shutdown_reason; /* on...
2006 Jul 25
2
[PATCH][XEND]Fix memory allocation for VTi domain with new Qemu on xen-unstagle.hg
Due to IA64 balloon driver not ready and it depends on max memory value
to allocate its memory. So this fix is necessary now.
Thanks & Best Regards
-Xiantao
OTC,Intel Corporation
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel