WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

RE: [Xen-ia64-devel] [PATCH][RFC][TAKE4] the P2M/VP patches

To: "Tristan Gingold" <Tristan.Gingold@xxxxxxxx>, "Isaku Yamahata" <yamahata@xxxxxxxxxxxxx>
Subject: RE: [Xen-ia64-devel] [PATCH][RFC][TAKE4] the P2M/VP patches
From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
Date: Wed, 12 Apr 2006 16:09:02 +0800
Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Wed, 12 Apr 2006 01:09:18 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcZeBs0ag5DeOW35Scilydc+w8cEbgAAA3NQ
Thread-topic: [Xen-ia64-devel] [PATCH][RFC][TAKE4] the P2M/VP patches
>From: Tristan Gingold [mailto:Tristan.Gingold@xxxxxxxx]
>Sent: 2006年4月12日 16:02
>>
>> First, current code is taking mfn 0 as the result when mapping is not
>> found which is more problematic like write access as you mentioned
>>
>> Second, mapping to a dummy page has similar effect, but no harm
>> for write
>Writing page 0 is harmless!

It's harmless because it's trimmed down by efi memmap walker, 
which means it's free and no one use it. So, it's same concept to 
dummy page here.

>
>> Last, the only way to prevent such io access is from guest itself,
>> meant not compiling native drivers in. Or else there's no way for
>> xen to handle it correctly.
>User should disable drivers in domU.  Everybody agree with that!

Yes, except driver domain.

>
>You can also use command line options to do that.

Can cmdline disable all the native drivers, like keyboard? Previous 
we have different config file for xen0 and xenU, and thus unwanted 
drivers are removed from config file. But now xen0 and xenU share
same config file, how x86 solves this issue?

>
>But without warnings, you don't know there are drivers enabled.

Agree to keep warning there, but stack dump may be enabled
conditionally which scares people to think something corrupted.

Thanks,
Kevin

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel