[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] Hypercalls in Intel-VT
- To: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- From: "Ashish Bijlani" <ashish.bijlani@xxxxxxxxx>
- Date: Fri, 26 Oct 2007 03:23:48 -0400
- Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
- Delivery-date: Fri, 26 Oct 2007 00:24:26 -0700
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=n6dsI8yaz0GD3ZKBOLlIEIznaCMr1iKAxBXVrh12Rm5qVHKPWL0K2PC6UuAWoxZRfs+shZcitEvmGlw1lIcrOwUUXUqjEPvZfuwfUeOqZmxQxyHk7Q2wq5QH3sl9z8z2HzNMYbniDR/Fs3DSM/eX+VglrEf9BOHoB3jIVo72ET0=
- List-id: Xen developer discussion <xen-devel.lists.xensource.com>
that means dom0 doesn't make trap to ring 0 root VMX mode for privileged operations like updating cr3?
On 10/26/07, Dong, Eddie <
eddie.dong@xxxxxxxxx> wrote:
DOm0 works in ring 1 root VMX mode. Anyway can switch from
ring 1 to ring 0 can be used for accessing privileged resource such as INT xx,
or thru exception like I/O.
But HVM works in non root VMX mode though ring=0, so you
need to switch from non root VMX mode to root VMX mode to access privileged
resource. VM Exit is the only way to do this.
how does dom0 on intel-vt gets privileges to access the hardware
devices? i mean does it get these privileges through superpages?
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|