|
|
|
|
|
|
|
|
|
|
xen-ia64-devel
[Xen-ia64-devel] [patch 15/16] Kexec: define EFI offsets for identity ma
This is used by paches that move the EFI runtime regions into what is
normally guest space. A description of why this mapping is made is
included in the patch that makes the mapping.
Cc: Tristan Gingold <tgingold@xxxxxxx>
Cc: Isaku Yamahata <yamahata@xxxxxxxxxxxxx>
Cc: Alex Williamson <alex.williamson@xxxxxx>
Cc: Aron Griffis <aron@xxxxxx>
Signed-off-by: Simon Horman <horms@xxxxxxxxxxxx>
---
Sat, 8 Sep 2007 06:06:30 +0200
Tristan Gingold has rasied the point that mapping EFI memory as
facilitated by this and subsequent patches may cause a security
problem, allowing VTI domains to access memory that they shouldn't.
This needs further analysis.
Index: xen-unstable.hg/xen/include/asm-ia64/xensystem.h
===================================================================
--- xen-unstable.hg.orig/xen/include/asm-ia64/xensystem.h 2008-02-05
16:18:40.000000000 +0900
+++ xen-unstable.hg/xen/include/asm-ia64/xensystem.h 2008-02-05
16:18:58.000000000 +0900
@@ -33,6 +33,12 @@
#define KERNEL_START 0xf400000004000000
#define GATE_ADDR KERNEL_START
+/* In order for Kexec between Xen and Linux to work EFI needs
+ * to be mapped into the same place by both. It seems most convenient
+ * to make Xen do the dirty work here */
+#define __IA64_EFI_UNCACHED_OFFSET 0xc000000000000000UL
+#define __IA64_EFI_CACHED_OFFSET 0xe000000000000000UL
+
#define IS_VMM_ADDRESS(addr) ((((addr) >> 60) ^ ((addr) >> 59)) & 1)
#endif // _ASM_IA64_XENSYSTEM_H
--
--
Horms
_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-ia64-devel] [patch 02/16] Kexec: Unpin the correct VHPT TR in ia64_do_tlb_purge, (continued)
- [Xen-ia64-devel] [patch 02/16] Kexec: Unpin the correct VHPT TR in ia64_do_tlb_purge, Simon Horman
- [Xen-ia64-devel] [patch 09/16] Kexec: Add identity mapping of EFI memory to alt_dtlb_miss, Simon Horman
- [Xen-ia64-devel] [patch 04/16] Kexec: Header changes in preparation for EFI RID, Simon Horman
- [Xen-ia64-devel] [patch 10/16] Kexec: Add identity mapping of EFI memory to dtlb_miss, Simon Horman
- [Xen-ia64-devel] [patch 12/16] Kexec: Set protection key of identity mapping of EFI in alt_dtlb_miss, Simon Horman
- [Xen-ia64-devel] [patch 11/16] ia64: Add identity mapping of EFI memory to itlb_miss, Simon Horman
- [Xen-ia64-devel] [patch 07/16] Kexec: Use a separate RID for EFI, Simon Horman
- [Xen-ia64-devel] [patch 03/16] Kexec: Unpin shared_info and mapped_regs TR in ia64_do_tlb_purge, Simon Horman
- [Xen-ia64-devel] [patch 13/16] Kexec: Set protection key of identity mapping of EFI in alt_itlb_miss, Simon Horman
- [Xen-ia64-devel] [patch 14/16] Kexec: Set page size identity mapping of EFI in alt_itlb_miss, Simon Horman
- [Xen-ia64-devel] [patch 15/16] Kexec: define EFI offsets for identity mapping,
Simon Horman <=
- [Xen-ia64-devel] [patch 08/16] Kexec: Allow EFI_RID to be used in ivt.S, Simon Horman
- [Xen-ia64-devel] [patch 16/16] Kexec: Map EFI regions into the same place they are maped into in Linux, Simon Horman
|
|
|
|
|