WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

RE: [Xen-ia64-devel] Time for hybrid virtualization?

To: <tgingold@xxxxxxx>
Subject: RE: [Xen-ia64-devel] Time for hybrid virtualization?
From: "Xu, Anthony" <anthony.xu@xxxxxxxxx>
Date: Thu, 17 Jan 2008 21:26:47 +0800
Cc: Alex Williamson <alex.williamson@xxxxxx>, xen-ia64-devel <xen-ia64-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Thu, 17 Jan 2008 05:27:05 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <1200568198.478f3786c5e79@xxxxxxxxxxx>
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
References: <1200528127.6773.88.camel@lappy> <1200561588.478f1db46381a@xxxxxxxxxxx> <51CFAB8CB6883745AE7B93B3E084EBE20166FE76@xxxxxxxxxxxxxxxxxxxxxxxxxxxx> <1200568198.478f3786c5e79@xxxxxxxxxxx>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AchY+YQK49eWlz10TAaAMHHyzkHJjwAEcxnA
Thread-topic: [Xen-ia64-devel] Time for hybrid virtualization?
tgingold@xxxxxxx wrote:
> I am worried with Sal/Pal.  How do you prevent dom0 from making host
> PAL calls? 
We have handled this before in a private project.
Xen can know the pal_entry and sal_entry from the system_table,
There are two methods to intercept them.
1. change the pal_entry and sal_entry of system_table to faked entry
point.
2. patch pal_entry and sal_entry code to jump to a faked code sequence.

Method 2 is more secure, because native FW may store pal_entry and
sal_entry at other place.
Method 1 deponds on pal_entry and sal_entry code, we at least need to
find a good place to put one slot "break 0xxxx"
to intercept pal/sal call.




> 
>>> * Building a dom0 vti means porting backend, balloon and all other
>>>   drivers to Vti.
>> Dom0 Vti just mean that cpu virtulaization is using VT-i( privileged
>> intruction emulation). All other should be same.
>> We may need to modify backend, ballon and other drivers a little.
> 
> If we really want to reduce kernel maintenance, it would be great to
> be 
> able to run an unmodified kernel.  But I am maybe going too far!
We can do it step by step deponding on performance and requirement.
The first step is to use VT to intercept priviledge instruction, this
may reduce half of xenlinux patch.
Then we try to modify linux as little as possible.


Thanks,
- Anthony

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel

<Prev in Thread] Current Thread [Next in Thread>