Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp370649ybi; Fri, 7 Jun 2019 09:22:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqwIJB5KRQgjP+6EzUsXImjbXi0qnZ3+Ys/reYOuX9Vhaia6Ejj5YJClxagjqsqlOuG6as5L X-Received: by 2002:a62:82c2:: with SMTP id w185mr38336542pfd.202.1559924570536; Fri, 07 Jun 2019 09:22:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559924570; cv=none; d=google.com; s=arc-20160816; b=WLD6kucMfA1u0R01lTKP/n/6hjUvsrYjtSU+xsLfcue7q9eUfnB1KZy7k4+rq6kAo+ 0DULQ6jYE4oO1y+W+qY3g1ZcSgS8we1bDeucC4eJGz7hSN1GHQQq5dX8ddT6oS5QETIJ BFR6cwx8BoJW+B0ypIS3LEtjprK41WMu2eosJGVY0TgKE2E7UUEeLmSbknQ68zNn1KxE FdQpEZcJk6CIt1cjdl7v8LTg/t2is93xzfT2JbCOzawaSVkNrmEZ1ThAKp1jp8BLncD/ rJzkxpvlRBSZoP2s9z2TKNggeu3aHCCP5cq8uwSzf8KlEARcjTvDgezXFjArJM/+WEsl q3SA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=rcEQoVIFuDd9bf95+OIJjnmfD9sPasDLJh5Nm7ZZb5Y=; b=V/3/sHDh4osQtp56xE6ltA8eu81Z0yTnTPvYKSfGQbBQ/Na1frYPoPGIkZdTq482EI Boz6aPycTVkgdmxlF+n9c7K7fZkQX91VBDAQXtg1WjpRa+aaSd2SdA6WWKn3gz2qGYHB A+3Dkz4Wn3t63oIumzsjdYw4/Xn0egVztWhDjJpu1q4sI5tXo26RwrD8bNxnCY1u+1kb Nzmilg7RL97ndnecleWekrQijhApvI9u7qi8TXcnSBaHYzPBM8+dVZgFeWPQEroBX9sJ x6DJbE2pIrt5QPFsQHgcFamnScda+g4moVb/pdvnk+KCDLZoEHTm/lAHcSJyzU3LpM35 OYig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g5si2021526pjt.58.2019.06.07.09.22.32; Fri, 07 Jun 2019 09:22:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730117AbfFGQVT (ORCPT + 99 others); Fri, 7 Jun 2019 12:21:19 -0400 Received: from mx2.suse.de ([195.135.220.15]:60522 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728797AbfFGQVT (ORCPT ); Fri, 7 Jun 2019 12:21:19 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 5C466AC9A; Fri, 7 Jun 2019 16:21:18 +0000 (UTC) Subject: Re: [RFC PATCH 00/16] xenhost support To: Joao Martins Cc: Ankur Arora , linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org, pbonzini@redhat.com, boris.ostrovsky@oracle.com, konrad.wilk@oracle.com, sstabellini@kernel.org References: <20190509172540.12398-1-ankur.a.arora@oracle.com> <5649cfd1-24df-2196-2888-b00fc3ace7ad@suse.com> From: Juergen Gross Message-ID: Date: Fri, 7 Jun 2019 18:21:16 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: de-DE Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07.06.19 17:22, Joao Martins wrote: > On 6/7/19 3:51 PM, Juergen Gross wrote: >> On 09.05.19 19:25, Ankur Arora wrote: >>> Hi all, >>> >>> This is an RFC for xenhost support, outlined here by Juergen here: >>> https://lkml.org/lkml/2019/4/8/67. >> >> First: thanks for all the effort you've put into this series! >> >>> The high level idea is to provide an abstraction of the Xen >>> communication interface, as a xenhost_t. >>> >>> xenhost_t expose ops for communication between the guest and Xen >>> (hypercall, cpuid, shared_info/vcpu_info, evtchn, grant-table and on top >>> of those, xenbus, ballooning), and these can differ based on the kind >>> of underlying Xen: regular, local, and nested. >> >> I'm not sure we need to abstract away hypercalls and cpuid. I believe in >> case of nested Xen all contacts to the L0 hypervisor should be done via >> the L1 hypervisor. So we might need to issue some kind of passthrough >> hypercall when e.g. granting a page to L0 dom0, but this should be >> handled via the grant abstraction (events should be similar). >> > Just to be clear: By "kind of passthrough hypercall" you mean (e.g. for every > access/modify of grant table frames) you would proxy hypercall to L0 Xen via L1 Xen? It might be possible to spare some hypercalls by directly writing to grant frames mapped into L1 dom0, but in general you are right. Juergen