|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] Trapping I/O accesses of a driver domain
>> Xen-3.3 with a dom0 and driver domU both running linux-2.6.18-xen. For
>> various reasons HVM Xen is not suitable for my work.
>
> Um, why not use something more recent. Like Ubuntu or Fedora Core 16?
>
My work is based on simulated hardware logging and a significantly
modified FC5, porting the kernel modifications to FC6 is significantly
than to more recent kernels like FC16.
>> ioremap'd pages, this seems pretty straightforward since the ptes are
>> marked with _PAGE_IO before they are passed to Xen. And so it seems
>
> Not all the time and it is not a requirement.
>
I am happy to modify the 2.16.8-xen to cover the outstanding cases,
except this is a fundamentally flawed approach. Can you elaborate the
ioremap scenarios for pte are not marked _PAGE_IO. Are the requirements
documented?
>> modifying do_mmu_update () to detect and mark such ptes not present
>> should work. Is this a reasonable approach ?.
>
> What about just checking the MFNs against the ones in the E820 that
> are in the PCI gap space?
>>
I m not familiar with E820, but will explore it, thanks.
>> hypercall informing Xen that the locations are used for I/O. I am
>> probably
>
> Right.
>
Thanks for the response.
tunji
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|