search for: mfn

Displaying 20 results from an estimated 420 matches for "mfn".

2007 Sep 23
9
Confused about start of day setup
...e rest from the initial page tables. After some initializing I move over the unmapped pages, pin them as PIN_L1_TABLE and UNPIN_TABLE before adding the machine addresses to my list of free pages. Now here is an example output of this loop: ERROR: -22 pinning failed: addr = 90000 [212000], op = 0, mfn = 212 ERROR: -22 pinning failed: addr = 91000 [0], op = 0, mfn = 0 ERROR: -22 pinning failed: addr = 92000 [b3d5000], op = 0, mfn = b3d5 ERROR: -22 pinning failed: addr = 93000 [2000], op = 0, mfn = 2 ERROR: -22 pinning failed: addr = 96000 [2000], op = 0, mfn = 2 ERROR: -22 pinning failed: addr =...
2012 Sep 18
18
Error getting mfn
Hello, I''m getting many "Error getting mfn" on a xen4.1.3 with dom0 3.4.11 x86_32. I thought it could be related to xen/mmu: Release just the MFN list, not MFN list and part of pagetables. http://git.kernel.org/?p=linux/kernel/git/konrad/xen.git;a=commit;h=785f62314984ea3af9dd830b020289ba2509ae69 (XEN) Freed 212kB init memory. (XEN) m...
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
.../include/asm/xen/page.h index e0965ab..cf4f3e8 100644 --- a/arch/arm/include/asm/xen/page.h +++ b/arch/arm/include/asm/xen/page.h @@ -97,16 +97,13 @@ static inline pte_t *lookup_address(unsigned long address, unsigned int *level) return NULL; } -static inline int m2p_add_override(unsigned long mfn, struct page *page, - struct gnttab_map_grant_ref *kmap_op) -{ - return 0; -} +extern int set_foreign_p2m_mapping(struct gnttab_map_grant_ref *map_ops, + struct gnttab_map_grant_ref *kmap_ops, + struct page **pages, unsigned int count); -static inline int m2p_remove_override(struct p...
2014 Feb 27
3
[PATCH] xen/grant-table: Refactor gnttab_[un]map_refs to avoid m2p_override
.../include/asm/xen/page.h index e0965ab..cf4f3e8 100644 --- a/arch/arm/include/asm/xen/page.h +++ b/arch/arm/include/asm/xen/page.h @@ -97,16 +97,13 @@ static inline pte_t *lookup_address(unsigned long address, unsigned int *level) return NULL; } -static inline int m2p_add_override(unsigned long mfn, struct page *page, - struct gnttab_map_grant_ref *kmap_op) -{ - return 0; -} +extern int set_foreign_p2m_mapping(struct gnttab_map_grant_ref *map_ops, + struct gnttab_map_grant_ref *kmap_ops, + struct page **pages, unsigned int count); -static inline int m2p_remove_override(struct p...
2011 Jan 28
3
Doubt regarding virtual memory mapping from hypervisor to a domain
...er=9 pages in Xen memory space using alloc_domheap_pages(NULL,9,0) during boot time just before domain is created (dom0 = domain_create(0, DOMCRF_s3_integrity, DOM0_SSIDREF) in xen/arch/x86/setup.c). I got the following virtual addresses in xen log message- (XEN) a2k2: Virt_addr:ffff83011cc00000 MFN:11cc00 (XEN) a2k2: Virt_addr:ffff83011ca00000 MFN:11ca00 (XEN) a2k2: Virt_addr:ffff83011c800000 MFN:11c800 (XEN) a2k2: Virt_addr:ffff83011c600000 MFN:11c600 (XEN) a2k2: Virt_addr:ffff83011c400000 MFN:11c400 (XEN) a2k2: Virt_addr:ffff83011c200000 MFN:11c200 (XEN) a2k2: Virt_addr:ffff83011c...
2011 Sep 23
2
Some problems about xenpaging
...+ struct page_info *page; + /* alloc a new page to compensate the pod list */ + page = alloc_domheap_page(d, 0); + if ( unlikely(page == NULL) ) + { + goto out_entry_check; + } + set_p2m_entry(d, gpfn + i, _mfn(INVALID_MFN), 0, p2m_invalid); + p2m_mem_paging_drop_page(d, gpfn+i); + p2m_pod_cache_add(d, page, 0); + steal_for_cache = ( p2md->pod.entry_count > p2md->pod.count ); + nonpod--; + ram--; + } + /* for other ram types */...
2013 Nov 14
4
[PATCH] xen/arm: Allow balooning working with 1:1 memory mapping
...form.h> +#endif struct memop_args { /* INPUT */ @@ -90,7 +93,7 @@ static void increase_reservation(struct memop_args *a) static void populate_physmap(struct memop_args *a) { - struct page_info *page; + struct page_info *page = NULL; unsigned long i, j; xen_pfn_t gpfn, mfn; struct domain *d = a->domain; @@ -122,7 +125,33 @@ static void populate_physmap(struct memop_args *a) } else { - page = alloc_domheap_pages(d, a->extent_order, a->memflags); +#ifdef CONFIG_ARM + if ( d == dom0 && platform_has_q...
2013 Oct 23
3
[PATCH] xen/arm: add_to_physmap_one: Avoid to map mfn 0 if an error occurs
By default, the function add_to_physmap_one set mfn to 0. Some code paths that result to an error, continue and the map the mfn 0 (valid on ARM) to the slot given by the guest. To fix the problem, return directly an error if sanity check has failed. Signed-off-by: Julien Grall <julien.grall@linaro.org> --- xen/arch/arm/mm.c | 6 ++++++ 1 fi...
2008 Dec 19
3
xc_translate_foreign_address() returns mfn??
Hi, I looked at the function xc_translate_foreign_address(), and see that it walks the page table of the guest VM. So at best, it should return the pfn of the guest (?) We can see taht the Later part of the function is like this: ... if (pt_levels >= 3) mfn = (pte & L0_PAGETABLE_MASK_PAE) >> PAGE_SHIFT; else mfn = (pte & L0_PAGETABLE_MASK) >> PAGE_SHIFT; .. return mfn; So perhaps I miss something, but the "mfn" here should be "pfn", so this function should return pfn, not mfn as in the comme...
2013 Dec 06
36
[V6 PATCH 0/7]: PVH dom0....
Hi, V6: The only change from V5 is in patch #6: - changed comment to reflect autoxlate - removed a redundant ASSERT - reworked logic a bit so that get_page_from_gfn() is called with NULL for p2m type as before. arm has ASSERT wanting it to be NULL. Tim: patch 4 needs your approval. Daniel: patch 5 needs your approval. These patches implement PVH dom0. Patches 1 and 2
2008 Jul 24
2
[RFC] i386 highmem assist hypercalls
...- 2008-07-21.orig/xen/arch/x86/mm.c 2008-07-18 16:19:34.000000000 +0200 +++ 2008-07-21/xen/arch/x86/mm.c 2008-07-21 08:36:26.000000000 +0200 @@ -2218,6 +2218,29 @@ static inline cpumask_t vcpumask_to_pcpu return pmask; } +#ifdef __i386__ +static inline void *fixmap_domain_page(unsigned long mfn) +{ + unsigned int cpu = smp_processor_id(); + void *ptr = (void *)fix_to_virt(FIX_PAE_HIGHMEM_0 + cpu); + + l1e_write(fix_pae_highmem_pl1e - cpu, + l1e_from_pfn(mfn, __PAGE_HYPERVISOR)); + flush_tlb_one_local(ptr); + return ptr; +} +static inline void fixunmap_domain_pa...
2011 Nov 01
2
xenpaing: one way to avoid paging out the page, when the corresponding mfn is in use.
Hello, Recently many advanced memory mechanisms are introduced into Xen. One problem we found is the conflict between p2m query and setting. For example, backend drivers always map domU’s page to its own space, during the mapping procedure, situations as follow may happen, when mfn is obtained by gfn_to_mfn(), this mfn is likely to be paged out. first case: grant mapping xenpaing mfn = gfn_to_mfn(); <----------- p2m_paging_nominate() | | Check type ok...
2012 Mar 01
14
[PATCH 0 of 3] RFC Paging support for AMD NPT V2
There has been some progress, but still no joy. Definitely not intended for inclusion at this point. Tim, Wei, I added a Xen command line toggle to disable IOMMU and P2M table sharing. Tim, I verified that changes to p2m-pt.c don''t break shadow mode (64bit hypervisor and Win 7 guest). Hongkaixing, I incorporated your suggestion in patch 2, so I should add your Signed-off-by eventually.
2011 Mar 15
6
[PATCH] ept: Fix bug in changeset 22526:7a5ee3800417
This fixes a bug in changeset 22526:7a5ee3800417, where the wrong value is read when deciding whether to flush the VTd tables. The effect is minor: in situations where the p2m entry is changed but the mfn is the same, the VTd tables will be unnecessarily flushed. old_entry is left untouched in the second case, since having a present old_entry will cause the an unnecessary check to be taken at the end of the function. Spotted-by: Zhang, Peng Fei <zpfalpc23@gmail.com> Signed-off-by: George Dun...
2012 Jan 21
2
[Ques]:xen_ident_map_ISA ant it's mfns...
Hi, I am bit confused about the do_update_va_mapping call that dom0 makes in xen_ident_map_ISA() to map ffff8800000a0000 to mfn a0. The mfn belongs to DOMID_IO. Before the mfn is mapped, the l1 entry is not empty: 0000000139d08500: 00100001380a0027 After the mapping: 0000000139d08500: 00100000000a0467 as expected. However, the mfn 1380a0 still seems to belong to dom0. Shouldn''t that have been returned back t...
2013 May 02
5
[PATCH] x86: allow Dom0 read-only access to IO-APICs
...ime crash of pv-ops Linux upon encountering the same kind of system. Signed-off-by: Jan Beulich <jbeulich@suse.com> --- a/xen/arch/x86/domain_build.c +++ b/xen/arch/x86/domain_build.c @@ -1114,7 +1114,7 @@ int __init construct_dom0( for ( i = 0; i < nr_ioapics; i++ ) { mfn = paddr_to_pfn(mp_ioapics[i].mpc_apicaddr); - if ( smp_found_config ) + if ( !rangeset_contains_singleton(mmio_ro_ranges, mfn) ) rc |= iomem_deny_access(dom0, mfn, mfn); } --- a/xen/arch/x86/io_apic.c +++ b/xen/arch/x86/io_apic.c @@ -2468,6 +2468,9 @@ void __init i...
2013 Nov 22
2
Question about the memory layout of xen hypervisor, dom0 and domU
Hi, I have a question about the memory layout of the Xen hypervisor, dom0 and domU. *The goal I want to achieve is: I want to show which RAM area is used by hypervisor, which RAM area is used by dom0, which RAM area is used by each domU (PV guest domain). I hope to know the above information when xen is booted as well as when xen is running some domUs. I already know that we can dedicate a fix
2012 Sep 05
21
[PATCH] amd iommu: Dump flags of IO page faults
Hi Jan, Attached patch dumps io page fault flags. The flags show the reason of the fault and tell us if this is an unmapped interrupt fault or a DMA fault. Thanks, Wei signed-off-by: Wei Wang <wei.wang2@amd.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel
2007 Dec 05
13
[PATCH] unshadow the page table page which are used as data page
...he patch deals with the situation which guest OS uses unused page table pages as data pages and write data to them. The pages will still be grabbed by Xen as page table pages, and lots of unnecessary page faults occur. The patch will check if the data guest writes to the page table contains valid mfn or not, if not, we believe it is a data page now and then unshadow the page. The patch improves the VT-D NIC performance a lot. Signed-off-by: Xin Xiaohui <xiaohui.xin@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.c...
2007 Apr 12
1
xc_map_foreign_range with mfn?
I am using Xen 3.0.4 vmx (on Intel VT). I need to map in a foreign page, given its mfn (not gpfn), into dom0. I used to do this quite well with Xen 3.0.2. However, when I ported my code to Xen 3.0.4, things seem to have changed. Does xc_map_foreign_range accept an mfn or a gpfn as its argument? It seems to be accepting gpfn in 3.0.4. Is that true? If so, can anyone please sugges...