WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH 0/2] MTRR/PAT virtualization

To: "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx>, "Su, Disheng" <disheng.su@xxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH 0/2] MTRR/PAT virtualization
From: Keir Fraser <Keir.Fraser@xxxxxxxxxxxx>
Date: Mon, 08 Oct 2007 16:45:01 +0100
Delivery-date: Mon, 08 Oct 2007 08:40:42 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <391BF3CDD2DC0848B40ACB72FA97AD59023A9E5C@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcgJfbiHYf5t3raCT5qrRGbrSVAc4gAAyqLhAAJeet0ADAbXoAAB7d2H
Thread-topic: [Xen-devel] [PATCH 0/2] MTRR/PAT virtualization
User-agent: Microsoft-Entourage/11.3.6.070618
On 8/10/07 16:29, "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx> wrote:

> For RAM assigned to guest, the patch will allow non-WB types. The reason
> is for following scenerio: A  PCI-E device setting the non-snoop bit to
> 1 in TLP header when doing memory access transaction to RAM. and the
> driver/OS will access that RAM with UC attribute.
> 
> In current implementation without this patch, WB type will be used by
> guest, then PCI-E device may get wrong data, becaues the data updated
> by CPU may still in cache, and the PCI-E device's access is not snooped.
> This patch will virtualize the cache attribute through attribute in
> shadow page table.

Won't WBINVD and CLFLUSH also need to be virtualised?

If there are reservations about how this will interact with mappings in
qemu-dm, perhaps this new attribute mechanism should only be enabled for
pass-thru domains? We get no benefit for non-pass-thru domains and some
concern about correctness.

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel