WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

[Xen-ia64-devel] Re: [PATCH] use shared version of iva/dcr

To: "Magenheimer, Dan (HP Labs Fort Collins)" <dan.magenheimer@xxxxxx>
Subject: [Xen-ia64-devel] Re: [PATCH] use shared version of iva/dcr
From: Matt Chapman <matthewc@xxxxxxxxxxxxxxx>
Date: Tue, 23 Aug 2005 19:52:33 +1000
Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Tue, 23 Aug 2005 09:50:57 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <516F50407E01324991DD6D07B0531AD55F6DEB@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: DIscussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
References: <516F50407E01324991DD6D07B0531AD55F6DEB@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.9i
On Mon, Aug 22, 2005 at 09:56:57AM -0700, Magenheimer, Dan (HP Labs Fort 
Collins) wrote:
> For dcr, this may not matter, but for iva, there
> are some semantics that need to be checked every
> virtual interrupt delivery.  At a minimum, if virtual
> iva is not private, bits 0-14 should be zeroed
> before every use by Xen, correct?

We could do that, but I don't think it's necessary.  The shared page is
only written directly by paravirtualised guests, and for those guests we
can just define the guest interface such that that field must be zero -
it seems unlikely that any OS would intentionally write that field.
If an OS were to write that field, it just shoots itself in the foot as
exceptions are vectored to the wrong address - no loss of isolation
occurs.

Matt


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel

<Prev in Thread] Current Thread [Next in Thread>