[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] PVH PCI passthrough for DomUs


  • To: Roman Shaposhnik <roman@xxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Mon, 27 Jan 2020 15:52:46 +0100
  • Authentication-results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=roger.pau@xxxxxxxxxx; spf=Pass smtp.mailfrom=roger.pau@xxxxxxxxxx; spf=None smtp.helo=postmaster@xxxxxxxxxxxxxxx
  • Cc: xen-devel@xxxxxxxxxxxxxxxxxxxx, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Mon, 27 Jan 2020 14:53:01 +0000
  • Ironport-sdr: tD3wNvSdfg6wpQyAW4PBAHeoV/f6B9bfQ9/Im8Dkkg+k4+KG4vFCo09irsoTe9Sn9v5DiGJI79 3jDMBAVN11dPhNYgnLd2MRZ0fZuf8bc+x8BjLIynVUQ2FGflV47Uj0NJeJgvb0rFr6u/0VKZXQ 1TRQnJsov4G/gRl4vPPOERWsIoZTMvAQ1TzxZdrrs5FUH0+C5LLrO+lwi/hduMxYQiz0zWqCSu gry4q7UvKLg464OhFnkO2WKTtTtB+tbjWzMtOSt/xkzBgHwA4Wu16WGPU/FdjGxi8qMlBer0Lv IKk=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Forgot to set 'To:' correctly.

On Mon, Jan 27, 2020 at 03:28:36PM +0100, Roger Pau Monné wrote:
> On Mon, Jan 27, 2020 at 12:27:18PM +0000, Wei Liu wrote:
> > Cc Roger
> 
> Thanks :).
> 
> > On Sun, Jan 19, 2020 at 11:30:42PM -0800, Roman Shaposhnik wrote:
> > > Hi!
> > > 
> > > I've just tried this with Xen 4.13.0 and it seems like that is still
> > > not supported.
> 
> No, there hasn't been much progress on this sadly.
> 
> > > This makes me curious if anybody is working on this and whether
> > > there's anything we can do to help accelerate the effort.
> 
> The first step would be to get vPCI hooked into the ioreq machinery,
> so that a domain can have devices on the emulated PCI bus handled by
> vPCI while others are handled by external ioreq emulators. I've posted
> a v3 of this work on September:
> 
> https://lists.xenproject.org/archives/html/xen-devel/2019-09/msg03278.html
> 
> But I haven't got time to go over the comments and post a new version.
> 
> Once that's done the remaining step would be to make vPCI safe for
> unprivileged guests. We need to assure that guests can only write to
> specific bits of the config space, and need to limit the capabilities
> that are exposed to the ones Xen knows to be safe to handle. This can
> be worked by multiple people concurrently IMO, but requires step 1
> (integration with ioreq) to be finished first.
> 
> I'm more than happy for someone to pick any of those tasks, including
> the integration of vPCI with the ioreq machinery. If not, I expect I
> will be able to do some work on this in a couple of weeks, but that
> depends on nothing else getting on fire, and me being able to flush my
> queue of pending patches.
> 
> Would you be up to pick some of these tasks?
> 
> I can try to speedup the vPCI ioreq integration if there's people
> willing to work on the remaining steps, I haven't done so because I
> didn't see much interest in general, and I was expecting to be the
> only one working on the remaining steps anyway.
> 
> Regards, Roger.
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxxx
> https://lists.xenproject.org/mailman/listinfo/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.