[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Re: One question on xen_cpuid in pv guest



On 07/29/09 22:44, Jiang, Yunhong wrote:
> Jeremy, thanks for clarification, but I still not sure about following code 
> in pv_ops dom0. Since the Local APIC is owned by Xen totally, why is it not 
> "outright forbidden for the guest"?
>
>
>     if (!xen_initial_domain())
>         cpuid_leaf1_edx_mask &=
>             ~((1 << X86_FEATURE_APIC) |  /* disable local APIC */
>               (1 << X86_FEATURE_ACPI));  /* disable ACPI */
>   

Some of the approaches to implementing dom0 pretend the local APIC
exists in order to fool various code-paths into doing the right thing
(for example, getting the kernel to parse all the MADT tables, which it
won't do if there's no local APIC).

Historically I think the policy has been for Xen to explicitly blacklist
features which turn out to be problematic when they become problematic,
rather than whitelist features known to be safe.

    J

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.