|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Re: [PATCH 3/8] xen/setup: Set identity mapping for non-RAM
To: |
Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx> |
Subject: |
[Xen-devel] Re: [PATCH 3/8] xen/setup: Set identity mapping for non-RAM E820 and E820 gaps. |
From: |
Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> |
Date: |
Tue, 4 Jan 2011 16:28:25 -0500 |
Cc: |
Jeremy Fitzhardinge <jeremy@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <Stefano.Stabellini@xxxxxxxxxxxxx>, "linux-kernel@xxxxxxxxxxxxxxx" <linux-kernel@xxxxxxxxxxxxxxx>, Jan Beulich <JBeulich@xxxxxxxxxx>, Konrad Rzeszutek Wilk <konrad@xxxxxxxxxx>, "hpa@xxxxxxxxx" <hpa@xxxxxxxxx> |
Delivery-date: |
Tue, 04 Jan 2011 13:31:06 -0800 |
Envelope-to: |
www-data@xxxxxxxxxxxxxxxxxxx |
In-reply-to: |
<1294169277.3582.23.camel@xxxxxxxxxxxxxxxxxxxxx> |
List-help: |
<mailto:xen-devel-request@lists.xensource.com?subject=help> |
List-id: |
Xen developer discussion <xen-devel.lists.xensource.com> |
List-post: |
<mailto:xen-devel@lists.xensource.com> |
List-subscribe: |
<http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe> |
List-unsubscribe: |
<http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe> |
Organization: |
Oracle |
References: |
<1293738517-7287-1-git-send-email-konrad.wilk@xxxxxxxxxx> <20110104183822.GA1505@xxxxxxxxxxxx> <1294169277.3582.23.camel@xxxxxxxxxxxxxxxxxxxxx> |
Reply-to: |
konrad.wilk@xxxxxxxxxx |
Sender: |
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx |
User-agent: |
KMail/1.13.5 (Linux/2.6.37-rc4agp-pci-api+; KDE/4.5.1; i686; ; ) |
> > For the privileged guest - yes. But for the non-priviligied it does not
> > have such range and would end up failing.
>
> xen_memory_setup has:
> e820_add_region(ISA_START_ADDRESS, ISA_END_ADDRESS -
> ISA_START_ADDRESS, E820_RESERVED);
> which is unconditional but is actually more for domU's benefit than
> dom0's which already sees the host e820 presumably with the right hole
> already in place, which we simply shadow, or maybe slightly extend,
> here.
Actually we don't do anything with that region in Dom0 case. We just
return the PFN without consulting the P2M for 0->0x100 while for DomU _we_
do consult the P2M and set those in the PTE. (look in xen_make_pte)
>
> In a domU we do this because if you let these pages into the general
> allocation pool then they will potentially get used as page table pages
> (hence be R/O) but e.g. the DMI code tries to map them to probe for
> signatures and tries to does so R/W which fails. We could try and find
> everywhere in the kernel which does this or we can simply reserve the
> region which stops it getting used for page tables or other special
> things, and is somewhat less surprising for non-Xen code.
Yeah, went that hole once.. too many generic pieces of code.
.. snip..
> > You mean the ISA_START_ADDRESS->ISA_END_ADDRESS we mark as reserved?
>
> Yep.
>
> > It sure would be easier
> >
> > (and it would mean we can return that memory back to the hypervisor).
>
> I don't think you can return it, since something like the DMI code which
> wants to probe it expects to be able to map that PFN, if you've given
> the MFN back then that will fail.
Correct (for non-priviliged PV domain).
>
> I suppose we could alias all such PFNs to the same scratch MFN but I'd
It actually works. I setup 0x1->0x100 to point to whatever the MFN was at
0x0, and released the pages from 0x1->0x100 and it worked for DomU PV guests
(and dom0 since I ended up stomping those regions with the PFN|
IDENTITY_BIT_FRAME).
However, the tools weren't happy ('xm save'). They did not like the same PFN
across a couple of entries in the P2M table and complained about a potential
race. But there is another way and that is to special case in 'xen_make_pte'
when we want to create a PTE for 0->ISA_END_ADDRESS and just give it the MFN
from P2M[0x0] (for !xen_initial_domain()) while having the the pfns from 0x1-
>0x100 freed and set to be IDENTITY_BIT_FRAME... But that all just smacks of
weird corner cases. Thought the code that is there is already special casing
access to that region. Maybe it would clear it up a bit.
> be concerned about some piece of code which expects to interact with
> firmware scribbling over it and surprising some other piece of code
> which interacts with the firmware...
Fortunatly the all look for a some signature first before trying to scribble.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|