WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

[Xen-ia64-devel] [patch 11/12] ia64: define EFI offsets for identity map

To: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-ia64-devel] [patch 11/12] ia64: define EFI offsets for identity mapping
From: Simon Horman <horms@xxxxxxxxxxxx>
Date: Tue, 27 Nov 2007 18:19:24 +0900
Cc: Isaku Yamahata <yamahata@xxxxxxxxxxxxx>, Aron Griffis <aron@xxxxxx>, Alex Williamson <alex.williamson@xxxxxx>
Delivery-date: Tue, 27 Nov 2007 01:37:48 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
References: <20071127091913.832166139@xxxxxxxxxxxx>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: quilt/0.46-1
This is used by paches that move the EFI runtime regions into what is
normally guest space.  A description of why this mapping is made is
included in the patch that makes the mapping.

Cc: Tristan Gingold <tgingold@xxxxxxx>
Cc: Isaku Yamahata <yamahata@xxxxxxxxxxxxx>
Cc: Alex Williamson <alex.williamson@xxxxxx>
Cc: Aron Griffis <aron@xxxxxx>
Signed-off-by: Simon Horman <horms@xxxxxxxxxxxx>

---
Sat, 8 Sep 2007 06:06:30 +0200

Tristan Gingold has rasied the point that mapping EFI memory as
facilitated by this and subsequent patches may cause a security
problem, allowing VTI domains to access memory that they shouldn't.
This needs further analysis.

Index: xen-unstable.hg/xen/include/asm-ia64/xensystem.h
===================================================================
--- xen-unstable.hg.orig/xen/include/asm-ia64/xensystem.h       2007-09-03 
10:21:50.000000000 +0900
+++ xen-unstable.hg/xen/include/asm-ia64/xensystem.h    2007-09-03 
18:52:11.000000000 +0900
@@ -33,6 +33,12 @@
 #define KERNEL_START            0xf000000004000000
 #define GATE_ADDR               KERNEL_START
 
+/* In order for Kexec between Xen and Linux to work EFI needs
+ * to be mapped into the same place by both. It seems most convenient
+ * to make Xen do the dirty work here */
+#define __IA64_EFI_UNCACHED_OFFSET     0xc000000000000000UL
+#define __IA64_EFI_CACHED_OFFSET       0xe000000000000000UL
+
 #define IS_VMM_ADDRESS(addr) ((((addr) >> 60) ^ ((addr) >> 59)) & 1)
 
 #endif // _ASM_IA64_XENSYSTEM_H

-- 

-- 
Horms


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel