[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [RFC] [PATCH 0/2] Enable PCI passthrough with stub domain
This series of patches enables PCI passthrough with stub domain which uses de-privileged qemu. This patch isn't intended to apply to Xen 3.4, but for developer of stub domain to be interested in passthrough with stub domain. Domain 0 (xend) calls the following hypercalls. XEN_DOMCTL_assign_device XEN_DOMCTL_deassign_device XEN_DOMCTL_ioport_permission XEN_DOMCTL_iomem_permission XEN_DOMCTL_irq_permission Stub domain (qemu) calls the following hypercalls. The target domain of the hypercalls is restricted to the target domain of per stub domain. Each resources are permitted to target domain with XEN_DOMCTL_xxx_permission hypercall from resource domain (dom0). So each domain can't use un-permitted resources. XEN_DOMCTL_memory_mapping XEN_DOMCTL_ioport_mapping PHYSDEVOP_map_pirq PHYSDEVOP_unmap_pirq XEN_DOMCTL_bind_pt_irq XEN_DOMCTL_unbind_pt_irq Stub domain (qemu) calls this hypercall too. The target domain of the hypercalls is restricted to the target domain of stub domain. XEN_DOMCTL_pin_mem_cacheattr Currently, MSI/MSI-X/MSI-INTx translation don't work well. Please help to work it well. I tested these patches as below. xen-unstable: 19426: 0b13d9787622 qemu: f7dd59a4d7d0b161780ed90bb0eccb2a5fbd555e linux-2.6.18: 844: 87c84f7dd850 and apply the following patch. http://lists.xensource.com/archives/html/xen-changelog/2009-03/msg00213.html Thanks, -- Shohei Fujiwara _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |