WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

Re: [Xen-devel] [PATCH] fix memory exchange hypercall.

To: Isaku Yamahata <yamahata@xxxxxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] fix memory exchange hypercall.
From: Keir Fraser <keir@xxxxxxxxxxxxx>
Date: Thu, 15 Mar 2007 10:59:33 +0000
Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Thu, 15 Mar 2007 03:58:47 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <20070315095305.GB1819%yamahata@xxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Acdm8QMwQZxJs9LkEdu/SQAX8io7RQ==
Thread-topic: [Xen-devel] [PATCH] fix memory exchange hypercall.
User-agent: Microsoft-Entourage/11.2.5.060620
On 15/3/07 09:53, "Isaku Yamahata" <yamahata@xxxxxxxxxxxxx> wrote:

> This patch fixes memory exchange hypercall which has been broken on ia64.
> Especially the error recovery path.
> Dropping _PGC_allocated bit and guest_physmap_remove_page() must be done
> before stealing page because The ia64 p2m table increments page
> refcount and guest_physmap_remove_page() behaves depending on _PGC_allocated.

Do the p2m semantics of the two architectures really need to differ? Can't
ia64 match x86 semantics (or vice versa)? Otherwise you're going to be
continually getting broken and having to implement skanky workarounds.

 -- Keir

> So far there is work around code in ia64, however the c/s 13366:ed73ff8440d8
> of xen-unstable.hg revealed that the work around is broken.
> The c/s passes dma bit argument of memory exchange so that it results
> in hypercall error.


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel