xen-devel
[Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole
To: |
Zachary Amsden <zach@xxxxxxxxxx> |
Subject: |
[Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole |
From: |
Chris Wright <chrisw@xxxxxxxxxxxx> |
Date: |
Mon, 13 Mar 2006 22:41:07 -0800 |
Cc: |
Andrew Morton <akpm@xxxxxxxx>, Joshua LeVasseur <jtl@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, Pratap Subrahmanyam <pratap@xxxxxxxxxx>, Wim Coekaerts <wim.coekaerts@xxxxxxxxxx>, Chris Wright <chrisw@xxxxxxxx>, Jack Lo <jlo@xxxxxxxxxx>, Dan Hecht <dhecht@xxxxxxxxxx>, Linux Kernel Mailing List <linux-kernel@xxxxxxxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxxxx>, Christopher Li <chrisl@xxxxxxxxxx>, Virtualization Mailing List <virtualization@xxxxxxxxxxxxxx>, Linus Torvalds <torvalds@xxxxxxxx>, Anne Holler <anne@xxxxxxxxxx>, Jyothy Reddy <jreddy@xxxxxxxxxx>, Kip Macy <kmacy@xxxxxxxxxxx>, Ky Srinivasan <ksrinivasan@xxxxxxxxxx>, Leendert van Doorn <leendert@xxxxxxxxxxxxxx>, Dan Arai <arai@xxxxxxxxxx> |
Delivery-date: |
Tue, 14 Mar 2006 10:11:58 +0000 |
Envelope-to: |
www-data@xxxxxxxxxxxxxxxxxxx |
In-reply-to: |
<200603131804.k2DI4N6s005678@xxxxxxxxxxxxxxxxxxx> |
List-help: |
<mailto:xen-devel-request@lists.xensource.com?subject=help> |
List-id: |
Xen developer discussion <xen-devel.lists.xensource.com> |
List-post: |
<mailto:xen-devel@lists.xensource.com> |
List-subscribe: |
<http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe> |
List-unsubscribe: |
<http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe> |
References: |
<200603131804.k2DI4N6s005678@xxxxxxxxxxxxxxxxxxx> |
Sender: |
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx |
User-agent: |
Mutt/1.4.2.1i |
* Zachary Amsden (zach@xxxxxxxxxx) wrote:
> Create a configurable hole in the linear address space at the top
> of memory. A more advanced interface is needed to negotiate how
> much space the hypervisor is allowed to steal, but in the end, it
> seems most likely that a fixed constant size will be chosen for
> the compiled kernel, potentially propagated to an information
> page used by paravirtual initialization to determine interface
> compatibility.
>
> Signed-off-by: Zachary Amsden <zach@xxxxxxxxxx>
>
> Index: linux-2.6.16-rc3/arch/i386/Kconfig
> ===================================================================
> --- linux-2.6.16-rc3.orig/arch/i386/Kconfig 2006-02-22 16:09:04.000000000
> -0800
> +++ linux-2.6.16-rc3/arch/i386/Kconfig 2006-02-22 16:33:27.000000000
> -0800
> @@ -201,6 +201,15 @@ config VMI_DEBUG
>
> endmenu
>
> +config MEMORY_HOLE
> + int "Create hole at top of memory (0-256 MB)"
> + range 0 256
> + default "64" if X86_VMI
> + default "0" if !X86_VMI
Deja-vu ;-) And still works in context of Xen, but we've just let the
subarch define the __FIXADDR_TOP. Having it be dynamic could be
interesting.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole,
Chris Wright <=
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Chris Wright
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Chris Wright
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Gerd Hoffmann
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Chris Wright
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Chris Wright
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Gerd Hoffmann
|
|
|