WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] supervisor_mode_kernel and hypercall

To: "Yanjun Wu" <yanjun.wu@xxxxxxxxx>
Subject: Re: [Xen-devel] supervisor_mode_kernel and hypercall
From: "pradeep singh rautela" <rautelap@xxxxxxxxx>
Date: Mon, 20 Oct 2008 15:50:03 +0530
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Mon, 20 Oct 2008 03:20:29 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:cc:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references; bh=RBxinbf78fpm51wKBsQiYwi8Q09Hu3jJdYmYu829zWo=; b=rOQH9eV5osZmwncw2u9xVc1X36tVfRVua4vOAP18bDBdSGcbOGbsIBhUmhHrn1WGHs 64jhQEnzkyYoklmXYj+u6l7sPYqkYqWcAsaIoEsXwKCU8so/KVWlx15mz5oaM8Ip8yNd wG+2Ix5qL/YxACZiBRG+U7msceXmml9OTFxdc=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references; b=qrXih1xjwot5h9EFu3yCRXd0YBY4LBU2ElONG9FxgaeBIorPmYCoX44RxaInfTSMVt tGEaRZEp9pGes2G209GLmyE/fW3OvEZ2wnm9G/NLZuoiJco4BF1Ny1xH60L8Z8agO3NG 3vspz5hfrBK/Fn9tvk/fSUNnoJWXFp8rcKxoo=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <13a1c1400810200314h59707fd3r180aad12270babb1@xxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <13a1c1400810200314h59707fd3r180aad12270babb1@xxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
On Mon, Oct 20, 2008 at 3:44 PM, Yanjun Wu <yanjun.wu@xxxxxxxxx> wrote:
>
> In xen/arch/x86/x86_32/traps.c, if supervisor_mode_kernel is true, the
> hypercall_page will be initialized by
> hypercall_page_initialise_ring0_kernel.
> my question is, does supervisor_mode_kernel mean that the guest kernel is
> also running in ring0, the same privilege level as Xen hypervisor?

Yes but in non-root mode. This is possible because some new hardware
extensions added to x86 archtiture by Intel/AMD to facilitate
virtualization.

> The book "the definitive guide to the xen hypervisor" (in page 30) says
> hypercall through int82 is now deprecated, and replaced by hypercall_page.
> but int82 can still be found in hypercall_page_initialise_ring1_kernel. In
> what situation it will be used?

If the new method of hypercall invocation is not supported by the CPU.
I think this should be similar to the way  int 0x80 and
SYSENTER/SYSEXIT are differentiated in linux kernel.

HTH,

Thanks,
    --Pradeep

>
> Thanks.
>
> -Yanjun
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel
>
>



-- 
Pradeep Singh Rautela
http://eagain.wordpress.com
http://emptydomain.googlepages.com

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel