[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 0/5] pciback: new configuration space fields, permissive flag



On Thu, 2006-04-13 at 14:45 +0100, Keir Fraser wrote:
> On 13 Apr 2006, at 14:17, Ryan wrote:
> 
> > All a user-space policy could then contain is whether a given
> > field is writable or not (and maybe a mask of exactly which bits are
> > writable). However, that's probably enough for most devices (although I
> > can't say for certain having only had a cursory look at the tg3 driver
> > and no others). I think the header fields and structures on the
> > capability list will need to remain in kernel-space.
> 
> Fair enough. I expect that the fields that need extra processing in 
> pciback will be generic things like power management etc? So really 
> device-specific things (tg3, ide, etc.) simply need at worst bit-wise  
> filtering?

That's probably correct. The generic things like power management and
the header registers should be the only things that need to call the
kernel's pci functions (on a side note, I don't know how useful the
power management stuff is right now, but it was intended as more of an
example for how other capability list structures might be handled; in
particular, I thought that someday when MSI is supported in Xen, perhaps
the driver domain's interface for setting up MSI for a device could
happen through these virtual configuration space fields (although I'm
not familiar enough with MSI to know if that is feasible or not)). A
quick glance through the kernel at other drivers that use
device-specific fields leads me to believe that this will be enough (I
suppose it would be better to wait and revisit this if someone ever
finds a device/driver that demonstrates that it's not enough).

> I wouldn't hard-code the permissive device ids in xend. Even something 
> really simple like a single commented text file containing lists of 
> device ids and the appropriate policy (e.g., permissive, or a list of 
> extra config-space fields that can be read and/or written) would be 
> better imo.

Is it appropriate for xend to read/write a configuration file? xend's
clients (xm) are the ones that do the processing of config. files now
and I wasn't sure if it was acceptable to have xend reach into a
configuration file (say /etc/xen/pci_permissive_ids.conf). I believe it
must happen on xend, but if it's not hard-coded in, what would be the
appropriate place to read the config file from?

> 
> > Do you have any other comments/concerns about adding the capability 
> > list
> > handlers (like power management) or the bottom-half handler for pci
> > operations from the frontend?
> 
> That all made sense, although I can't say I read the patches in huge 
> detail. It's mainly the wish to avoid hardcoding per-device policy in 
> the kernel that got me worried.
> 

I understand and agree. I'll fix them and resubmit.

Ryan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.