From mboxrd@z Thu Jan 1 00:00:00 1970 From: Samuel Thibault Subject: Re: HVMlite ABI specification DRAFT A Date: Thu, 4 Feb 2016 23:21:30 +0100 Message-ID: <20160204222130.GC3377@var.home> References: <56B38EDE.5090700@citrix.com> <20160204190915.GB3377@var.home> <56B3A416.3090709@oracle.com> Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Return-path: Received: from mail6.bemta14.messagelabs.com ([193.109.254.103]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1aRSHO-0007J6-SK for xen-devel@lists.xenproject.org; Thu, 04 Feb 2016 22:21:34 +0000 Content-Disposition: inline In-Reply-To: <56B3A416.3090709@oracle.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Boris Ostrovsky Cc: Wei Liu , Stefano Stabellini , Andrew Cooper , Tim Deegan , Paul Durrant , David Vrabel , Jan Beulich , xen-devel , Roger Pau =?iso-8859-1?Q?Monn=E9?= List-Id: xen-devel@lists.xenproject.org Boris Ostrovsky, on Thu 04 Feb 2016 14:18:46 -0500, wrote: > On 02/04/2016 02:09 PM, Samuel Thibault wrote: > >Roger Pau Monn=E9, on Thu 04 Feb 2016 18:48:14 +0100, wrote: > >> struct hvm_start_info { > >> #define HVM_START_MAGIC_VALUE 0x336ec578 > >> uint32_t magic; /* Contains the magic value 0x336e= c578 */ > >> /* ("xEn3" with the 0x80 bit of th= e "E" set).*/ > >> uint32_t flags; /* SIF_xxx flags. = */ > >> uint32_t cmdline_paddr; /* Physical address of the command= line. */ > >> uint32_t nr_modules; /* Number of modules passed to the= kernel. */ > >> uint32_t modlist_paddr; /* Physical address of an array of= */ > >> /* hvm_modlist_entry. = */ > >> }; > >Mmm, don't we also need a description of the initial page table, so that > >the guest kernel knows which part of the memory it shouldn't use until > >having initialized its own page table? Or is there none in the guest > >physical memory at startup of HVMlite mode? > = > We start with paging off. So a 32bit hypervisor *has* to use segmentation to protect itself from domU? Samuel