WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [RFC] [PATCH 0/2] Enable PCI passthrough with stub domain

To: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>, Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [RFC] [PATCH 0/2] Enable PCI passthrough with stub domain
From: Shohei Fujiwara <fujiwara-sxa@xxxxxxxxxxxxxxx>
Date: Fri, 10 Apr 2009 10:36:04 +0900
Cc:
Delivery-date: Thu, 09 Apr 2009 18:36:40 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
This series of patches enables PCI passthrough with stub domain
which uses de-privileged qemu.

This patch isn't intended to apply to Xen 3.4, but for developer
of stub domain to be interested in passthrough with stub domain.

Domain 0 (xend) calls the following hypercalls.

    XEN_DOMCTL_assign_device
    XEN_DOMCTL_deassign_device
    XEN_DOMCTL_ioport_permission
    XEN_DOMCTL_iomem_permission
    XEN_DOMCTL_irq_permission


Stub domain (qemu) calls the following hypercalls. The target domain of the
hypercalls is restricted to the target domain of per stub domain. Each
resources are permitted to target domain with XEN_DOMCTL_xxx_permission
hypercall from resource domain (dom0). So each domain can't use
un-permitted resources.

    XEN_DOMCTL_memory_mapping
    XEN_DOMCTL_ioport_mapping
    PHYSDEVOP_map_pirq
    PHYSDEVOP_unmap_pirq
    XEN_DOMCTL_bind_pt_irq
    XEN_DOMCTL_unbind_pt_irq


Stub domain (qemu) calls this hypercall too. The target domain of the
hypercalls is restricted to the target domain of stub domain.

    XEN_DOMCTL_pin_mem_cacheattr


Currently, MSI/MSI-X/MSI-INTx translation don't work well.
Please help to work it well.

I tested these patches as below.
    xen-unstable: 19426: 0b13d9787622
    qemu: f7dd59a4d7d0b161780ed90bb0eccb2a5fbd555e
    linux-2.6.18: 844: 87c84f7dd850

and apply the following patch.
http://lists.xensource.com/archives/html/xen-changelog/2009-03/msg00213.html

Thanks,
--
Shohei Fujiwara

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>