[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] [PATCH 0/2] IOMMU: Handle sibling device assignmentcorrectly (re-send)



> This patch set is revised according to comments from community. Domctl
> interface is extended to allow libxc retrieve device group information
> from hypervisor. Vendor-specific iommu_ops is also extended by adding a
> new operation "get_device_group_id()", which is currently a null
> pointer
> but could be implemented later for vt-d.
> 
> Error will be raised from tools side when user trying to assign PCI
> device with a sibling device being driven by dom0. User will keep being
> prompted until he has hidden the entire device group (at least, the
> sibling devices driven by dom0) in dom0 kernel parameter. Hopefully
> this
> framework could be flexible enough to support both amd iommu and vt-d.
> 
> The following 2 cases are not covered by this patch, but should be easy
> to handle.
> * Checking for hot-plug devices (maybe we can delay calling
> ImageHandler.signalDeviceModel() until all checks are done?)
> * Checking for splitted device group between different passthru domains

With this patch, what happens if you assign a device that is behind a bridge. 
Does the guest get all the devices behind the bridge?

This would be reasonable behaviour, particularly if we prevent other VMs from 
claiming the sibling devices.

Ian

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.