WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] [PATCH][RFC] Support more Capability Structures andDevic

To: "Ian Jackson" <Ian.Jackson@xxxxxxxxxxxxx>
Subject: RE: [Xen-devel] [PATCH][RFC] Support more Capability Structures andDevice Specific
From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
Date: Tue, 1 Jul 2008 10:12:10 +0800
Cc: Yuji Shimada <shimada-yxb@xxxxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, "Dong, Eddie" <eddie.dong@xxxxxxxxx>, Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Delivery-date: Mon, 30 Jun 2008 19:13:21 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <18532.60499.366233.86609@xxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <10EA09EFD8728347A513008B6B0DA77A035B4F6D@xxxxxxxxxxxxxxxxxxxxxxxxxxxx><C48A7D55.232F0%keir.fraser@xxxxxxxxxxxxx><10EA09EFD8728347A513008B6B0DA77A035B4F6F@xxxxxxxxxxxxxxxxxxxxxxxxxxxx> <18532.60499.366233.86609@xxxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcjYWouk49rm0s4dQmik3mfvxuYA/ACxFv0g
Thread-topic: [Xen-devel] [PATCH][RFC] Support more Capability Structures andDevice Specific
Ian Jackson wrote:
> Dong, Eddie writes ("RE: [Xen-devel] [PATCH][RFC] Support
> more Capability Structures andDevice Specific"): 
>> If we agree the basic policy is pass through except the
>> ones with known behavior, I think we don't need that
>> many case to case handle. Dexuan is working on the
>> implementation base on the summit talk and close to end,
>> maybe Yuji and Dexuan can coordinate first to see if the
>> proposed policy can server yuji's purpose. 
> 
> Is it really safe to pass through operations with unknown
> behavious ? 
> Particularly if the system has an iommu, the
> administrator may be 
> expecting the passthrough mechanism to defend the host
> from rogue 
> behaviour by the card and its owning guest.


What kind of operations in your mind will hurt host?
But yes, guest may not work properly for some cases such as some vidoe
card I mentioned in summit which may map host address to internal
register and used by drivers. For those kind of devices, CP will just
disable assignment thru kind of assignable check such as blacklist.

Other than that, I didn't see how pass through will make things worse.
Can u specify ? All guest access to memory is protected by IOMMU and
thus no imapct to host. 


Thx, eddie

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>