WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

RE: [Xen-ia64-devel] [PATCH][RFC][TAKE4] the P2M/VP patches

To: "Tristan Gingold" <Tristan.Gingold@xxxxxxxx>, "Isaku Yamahata" <yamahata@xxxxxxxxxxxxx>
Subject: RE: [Xen-ia64-devel] [PATCH][RFC][TAKE4] the P2M/VP patches
From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
Date: Wed, 12 Apr 2006 15:23:47 +0800
Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Wed, 12 Apr 2006 00:24:21 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcZeAQDrjh7s2zHtQ5+4qsQkiD3ydgAAG1Uw
Thread-topic: [Xen-ia64-devel] [PATCH][RFC][TAKE4] the P2M/VP patches
>From: Tristan Gingold [mailto:Tristan.Gingold@xxxxxxxx]
>Sent: 2006年4月12日 15:20
>
>Le Mercredi 12 Avril 2006 09:07, Tian, Kevin a écrit :
>> From: Tristan Gingold [mailto:Tristan.Gingold@xxxxxxxx]
>>
>> >Sent: 2006年4月12日 15:08
>> >
>> >Le Mercredi 12 Avril 2006 08:12, Tian, Kevin a écrit :
>> >> From: Isaku Yamahata [mailto:yamahata@xxxxxxxxxxxxx]
>> >
>> >[...]
>> >
>> >> >That's an access to keyboard port possibly because now
>xen0/xenU
>> >> >
>> >> >> is compiled as one image with more drivers added. Maybe it's
>> >
>> >better
>> >
>> >> >> for us to map all 64M mmio area of domU to a dummy page at
>> >
>> >current
>> >
>> >> >> stage, to remove warnings and walk around some native drivers
>> >> >> within domU. Later when driver domain is added, we can map
>> >
>> >specific
>> >
>> >> >> mmio page to machine mmio range per configuration.
>> >> >
>> >> >I agree with you.
>> >> >But this issues isn't specific to the P2M/VP patch.
>> >
>> >I don't agree with this solution.  I really prefer to have warnings
>> > because it
>> >means something got wrong.  domU shouldn't access to mmio.
>> >
>> >If you use a dummy page, a device driver may loop.
>>
>> Either way. Currently return 0 after warning actually same as dummy
>> page.
>What about write accesses ?
>
>Tristan.

First, current code is taking mfn 0 as the result when mapping is not 
found which is more problematic like write access as you mentioned

Second, mapping to a dummy page has similar effect, but no harm 
for write

Last, the only way to prevent such io access is from guest itself, 
meant not compiling native drivers in. Or else there's no way for 
xen to handle it correctly.

Thanks,
Kevin

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel

<Prev in Thread] Current Thread [Next in Thread>