WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH] [HVM] Patches to make HVM capable of running OS/

To: "Keir Fraser" <keir@xxxxxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] [HVM] Patches to make HVM capable of running OS/2.
From: "Trolle Selander" <trolle.selander@xxxxxxxxx>
Date: Fri, 16 Mar 2007 13:45:36 +0100
Cc: Mats.Petersson@xxxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxx, thomas.woller@xxxxxxx
Delivery-date: Fri, 16 Mar 2007 05:44:47 -0700
Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=tWCjJvY1wE5GynyyFX8kstquLuUN40I4ubgJeljn/8eUDMZDU2tQey8vxauBd0EPtuWhf80CG0DH1wgem4GA9ZoWCTtUTEMb1NhBleifMRpeTKe5BMQhPH+p9V6j29tXy7prMQ3Xm2Y83F6OyAxAH0rxpFeBaSmvW0fT3yykYGs=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=DGihCsmHKzQirxpXWpjLBviQ6h/XV+SlRM2bjZcN8ysbCb5ZU3QGkOggnSjeJ9oNOzcOIaHpYjFD68TdQKcLKu+cUfjB7rN/fsioEbIap5TTLs7qJEjQx/izwXvnuZn+ZtB8GO/0StJe1moBR18kIsMKyLofZk9Yrj6x4e/DWnE=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <C2203C33.BA79%keir@xxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <515922b50703160507v5da9ad6eg3389c46044a0f8d1@xxxxxxxxxxxxxx> <C2203C33.BA79%keir@xxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx


On 3/16/07, Keir Fraser <keir@xxxxxxxxxxxxx> wrote:
On 16/3/07 12:07, "Trolle Selander" < trolle.selander@xxxxxxxxx> wrote:

This is a "minimally intrusive" way to fix an issue that I think should really be fixed in a different way.
Currently, the shared info, ioreq and buffered_io pages are mapped into the guest's memory space as the three highest page frames. They are "protected" from use by being marked as reserved in the e820 ram map. However, legacy software won't know about the e820 call, and since the older e801 call reports all ram, including the shared pages, the guest OS will end up using them as regular ram with disastrous results.
This patch makes the older e801 bios call report one 64kb block less memory, thus "protecting" the shared pages from older OS's in a similar manner to the e820 call, at the expense of 52kb of wasted ram (the e801 call reports memory in 64kb blocks, so no way around this).

I think we should reserve a 64kB block just below 0xF0000000 (by marking E820_RESERVED) and put these 'special pages' in there. The fact they're not currently mentioned by the e820 map at all is pretty bad — an OS might decide to remap PCI devices on top of them, for example!

 -- Keir

I thought they were marked as reserved in the e820 map right now, but now that I checked, you're right that they're not mentioned, which means they're actually nearly as "unprotected" from a modern OS as from a pre-e820-aware one like OS/2. Nasty.
In any case, I still don't see why the ioreq and buffered io pages should be inside the guest's memory space at all. What's the issue with keeping them completely outside the guest's visible RAM and only shared between HV & Dom0?
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel