Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp156280imp; Wed, 20 Feb 2019 16:33:57 -0800 (PST) X-Google-Smtp-Source: AHgI3IYoC4uWk20wAU7iaJwes4RO8WhdKFGdQl7k7teP2wJWRWlmplhXmU49oXyKaXnb7RmEaaYB X-Received: by 2002:a17:902:d708:: with SMTP id w8mr40003125ply.294.1550709237612; Wed, 20 Feb 2019 16:33:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550709237; cv=none; d=google.com; s=arc-20160816; b=X+Hx1WMiv7xt6fY+eSe79oFeVG0dp72ASjRISvMCXenFLqkyaiwmGigqQ3CXj+g8tL HYDJZD6Jr8fu4apC6pQTcO9lqIrpWxjH4wXEgDPNZR/4iihfyB8peEy0z+6adf9kF9tx QlgPy034CCp/jhk1/klZLTYBmM/BKDuxmiCUrnNexU++013aP9ooBuV/NwQ65mmEN92o PznavhBJi83Kd8aSoJVJGQuUj1TOoNjEINs6e4SYBYxYLVn/+XKwh2eD8jqyauEG4vVb DR6zeDLGpTgIy6Afx5mGvtHwdptomXNDYnkegnyF0YXM5vAG1Xn+dmOUd5Mjvi1iEzpJ Xgkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=9Yi0nUtp/p2qYVg/S+SSRoCpnvGRxFRBCQS7128GnrE=; b=v9+eCNV79I4WG4nQQigtNKxJnPDr4RP9tHcPGWcsPRNbNJLgxkKr/Hp7tXd3pqtv5x n3PLFCuZdSmZ8GGKzW6P8QY15BYLaFpqcxbJF9EuL8koOp9HEq8Bg7MpoeaelHHTfPt2 gC+kfdGIUZTYiihxlXr/nqrTTOFzpxoHCQwmXwp0nbyfAXAoDOcBfNnX//vUMOQWTCjP kYcs1RnU694KXgfFjkImUVU0EfsI0gnBFhPlhqiiJp3O5QEIaiZR7B+hMrqnSsbyNaZE J+vmLqQe1D3t5HXetJvg02TbJMCyCoilLoDKz5mK7xQ2i7Nkta7rLp22Y04q6LoOhWD2 VMJw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b=AFNcxLbD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n20si20416775plp.294.2019.02.20.16.33.41; Wed, 20 Feb 2019 16:33:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b=AFNcxLbD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726648AbfBUAcD (ORCPT + 99 others); Wed, 20 Feb 2019 19:32:03 -0500 Received: from userp2120.oracle.com ([156.151.31.85]:33264 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726090AbfBUAcD (ORCPT ); Wed, 20 Feb 2019 19:32:03 -0500 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x1L0SklX102932; Thu, 21 Feb 2019 00:31:39 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2018-07-02; bh=9Yi0nUtp/p2qYVg/S+SSRoCpnvGRxFRBCQS7128GnrE=; b=AFNcxLbDUjrSbfUM7/R4Q09G2NEHjff9EswhTPsfZYSTcjpqXVZTUM5otfnYrQrDb5f/ ThGJJScE/tcWBPOGnEEWTkLUHUeGwzHbS0t0WucUARPsps1cyRlLWBkCENPyDwCdAi8G 1OS5cLmxO6RSEHH4MFwKmZHxvpjw34HjXgV5iLsfJ6qnGX2EPj/maMHXYdl2lXJtwrfq k4ocnhP0PO6Tv2YLICQ2ZmladQ6n2zWIjwafN0yV98kISBzbez4GuTNjV4drojoIREoA CSNXf9yZbGFMDMViWi1HK27dLACa6Oa9NIHW+m57Liz54PGL0N5VaPrMUv8rJB4F96iq hA== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by userp2120.oracle.com with ESMTP id 2qpb5rmx5e-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 21 Feb 2019 00:31:39 +0000 Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id x1L0VcVs015628 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 21 Feb 2019 00:31:38 GMT Received: from abhmp0017.oracle.com (abhmp0017.oracle.com [141.146.116.23]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id x1L0Vb8i030592; Thu, 21 Feb 2019 00:31:37 GMT Received: from [10.156.74.184] (/10.156.74.184) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 20 Feb 2019 16:31:36 -0800 Subject: Re: [Xen-devel] [PATCH RFC 00/39] x86/KVM: Xen HVM guest support To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?= , Joao Martins Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Juergen Gross , Stefano Stabellini , xen-devel@lists.xenproject.org, =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , x86@kernel.org, Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Paolo Bonzini , Boris Ostrovsky , Thomas Gleixner References: <20190220201609.28290-1-joao.m.martins@oracle.com> <20190220233941.GA5279@mail-itl> From: Ankur Arora Message-ID: <292773f7-5a4d-ba00-8398-0c8b81766b93@oracle.com> Date: Wed, 20 Feb 2019 16:31:53 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1 MIME-Version: 1.0 In-Reply-To: <20190220233941.GA5279@mail-itl> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9173 signatures=668683 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902210003 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/20/19 3:39 PM, Marek Marczykowski-Górecki wrote: > On Wed, Feb 20, 2019 at 08:15:30PM +0000, Joao Martins wrote: >> 2. PV Driver support (patches 17 - 39) >> >> We start by redirecting hypercalls from the backend to routines >> which emulate the behaviour that PV backends expect i.e. grant >> table and interdomain events. Next, we add support for late >> initialization of xenbus, followed by implementing >> frontend/backend communication mechanisms (i.e. grant tables and >> interdomain event channels). Finally, introduce xen-shim.ko, >> which will setup a limited Xen environment. This uses the added >> functionality of Xen specific shared memory (grant tables) and >> notifications (event channels). > > Does it mean backends could be run in another guest, similarly as on > real Xen? AFAIK virtio doesn't allow that as virtio backends need I'm afraid not. For now grant operations (map/unmap) can only be done by backends to the local KVM instance. Ankur > arbitrary write access to guest memory. But grant tables provide enough > abstraction to do that safely. >