WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] Re: [PATCH] VT-d: prevent dom0 to use VT-d HW

To: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>, Christian Tramnitz <chris.ace@xxxxxxx>
Subject: Re: [Xen-devel] Re: [PATCH] VT-d: prevent dom0 to use VT-d HW
From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Date: Tue, 08 Sep 2009 15:14:56 +0100
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Tue, 08 Sep 2009 07:15:25 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <19110.25898.227096.484700@xxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Acowjcmsi/pvhrCaQLeXaI+6KWYx0wAAPQPa
Thread-topic: [Xen-devel] Re: [PATCH] VT-d: prevent dom0 to use VT-d HW
User-agent: Microsoft-Entourage/12.19.0.090515
On 08/09/2009 15:07, "Ian Jackson" <Ian.Jackson@xxxxxxxxxxxxx> wrote:

> Christian Tramnitz writes ("[Xen-devel] Re: [PATCH] VT-d: prevent dom0 to use
> VT-d HW"):
>> Wouldn't be easier (and more likely to be adopted by upstream) to add a
>> Kconfig dependency like "depends on !XEN_DOM0" to VT-d?
> 
> I don't think that would be right.  Nowadays we want to be able to
> build kernels that will work on bare hardware, or under Xen, rather
> than baking the configuration statically into the kernel image.

The correct alternative would be to gate VT-d initialisation at run-time,
conditional on being run as dom0. Probably would need a hook and probably
would not be hugely palatable to the kernel maintainers. This effective
'virtualisation'/hack of the ACPI tables is probably the right way to go.

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel