WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

Re: [Xen-ia64-devel] [PATCH][RFC][TAKE4] the P2M/VP patches

To: "Tian, Kevin" <kevin.tian@xxxxxxxxx>, "Isaku Yamahata" <yamahata@xxxxxxxxxxxxx>
Subject: Re: [Xen-ia64-devel] [PATCH][RFC][TAKE4] the P2M/VP patches
From: Tristan Gingold <Tristan.Gingold@xxxxxxxx>
Date: Wed, 12 Apr 2006 09:01:46 +0100
Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Wed, 12 Apr 2006 00:57:55 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <571ACEFD467F7749BC50E0A98C17CDD8094E7B01@pdsmsx403>
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
References: <571ACEFD467F7749BC50E0A98C17CDD8094E7B01@pdsmsx403>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: KMail/1.5
Le Mercredi 12 Avril 2006 09:23, Tian, Kevin a écrit :
> From: Tristan Gingold [mailto:Tristan.Gingold@xxxxxxxx]
[...]
> >> >> >But this issues isn't specific to the P2M/VP patch.
> >> >
> >> >I don't agree with this solution.  I really prefer to have warnings
> >> > because it
> >> >means something got wrong.  domU shouldn't access to mmio.
> >> >
> >> >If you use a dummy page, a device driver may loop.
> >>
> >> Either way. Currently return 0 after warning actually same as dummy
> >> page.
> >
> >What about write accesses ?
> >
> >Tristan.
>
> First, current code is taking mfn 0 as the result when mapping is not
> found which is more problematic like write access as you mentioned
>
> Second, mapping to a dummy page has similar effect, but no harm
> for write
Writing page 0 is harmless!

> Last, the only way to prevent such io access is from guest itself,
> meant not compiling native drivers in. Or else there's no way for
> xen to handle it correctly.
User should disable drivers in domU.  Everybody agree with that!

You can also use command line options to do that.

But without warnings, you don't know there are drivers enabled.

Tristan.


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel