From: Avi Kivity <avi@redhat.com>
To: Gerd Hoffmann <kraxel@redhat.com>
Cc: Ed Swierk <eswierk@aristanetworks.com>,
Alexander Graf <agraf@suse.de>,
"kvm@vger.kernel.org" <kvm@vger.kernel.org>
Subject: Re: Userspace MSR handling
Date: Thu, 28 May 2009 11:53:28 +0300 [thread overview]
Message-ID: <4A1E5108.5080307@redhat.com> (raw)
In-Reply-To: <4A1D9191.1070600@redhat.com>
Gerd Hoffmann wrote:
>
>>> - what about connecting the guest driver to xen netback one day? we
>>> don't
>>> want to go through userspace for that.
>
> You can't without emulation tons of xen stuff in-kernel.
>
> Current situation:
> * Guest does xen hypercalls. We can handle that just fine.
> * Host userspace (backends) calls libxen*, where the xen hypercall
> calls are hidden. We can redirect the library calls via LD_PRELOAD
> (standalone xenner) or function pointers (qemuified xenner) and do
> something else instead.
>
> Trying to use in-kernel xen netback driver adds this problem:
> * Host kernel does xen hypercalls. Ouch. We have to emulate them
> in-kernel (otherwise using in-kernel netback would be a quite
> pointless exercise).
Or do the standard function pointer trick. Event channel notifications
change to eventfd_signal, grant table ops change to copy_to_user().
>
>> One way or another, the MSR somehow has to map in a chunk of data
>> supplied by userspace. Are you suggesting an alternative to the PIO
>> hack?
>
> Well, the "chunk of data" is on disk anyway:
> $libdir/xenner/hvm{32,64}.bin
>
> So a possible plan to attack could be "ln -s $libdir/xenner
> /lib/firmware", let kvm.ko grab it if needed using
> request_firmware("xenner/hvm${bits}.bin"), and a few lines of kernel
> code handling the wrmsr. Logic is just this:
>
> void xenner_wrmsr(uint64_t val, int longmode)
> {
> uint32_t page = val & ~PAGE_MASK;
> uint64_t paddr = val & PAGE_MASK;
> uint8_t *blob = longmode ? hvm64 : hvm32;
> cpu_physical_memory_write(paddr, blob + page * PAGE_SIZE,
> PAGE_SIZE);
> }
>
> Well, you'll have to sprinkle in blob loading and caching and some
> error checking. But even with that it is probably hard to beat in
> actual code size.
This ties all guests to one hypercall page implementation installed in
one root-only place.
> Additional plus is we get away without a new ioctl then.
Minimizing the amount of ioctls is an important non-goal. If you
replace request_firmware with an ioctl that defines the location and
size of the hypercall page in host userspace, this would work well.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
next prev parent reply other threads:[~2009-05-28 8:53 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-05-22 20:11 Userspace MSR handling Ed Swierk
2009-05-23 8:57 ` Alexander Graf
2009-05-24 12:07 ` Avi Kivity
2009-05-24 16:15 ` Alexander Graf
2009-05-26 11:31 ` Avi Kivity
2009-05-25 11:03 ` Gerd Hoffmann
2009-05-25 11:20 ` Avi Kivity
2009-05-25 11:29 ` Gerd Hoffmann
2009-05-25 11:31 ` Avi Kivity
2009-05-27 16:12 ` Ed Swierk
2009-05-27 16:28 ` Avi Kivity
2009-05-27 17:09 ` Ed Swierk
2009-05-27 19:16 ` Gerd Hoffmann
2009-05-27 23:00 ` Ed Swierk
2009-05-28 8:53 ` Avi Kivity [this message]
2009-05-29 9:47 ` Gerd Hoffmann
2009-05-31 8:21 ` Avi Kivity
2009-05-25 11:16 ` Gerd Hoffmann
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4A1E5108.5080307@redhat.com \
--to=avi@redhat.com \
--cc=agraf@suse.de \
--cc=eswierk@aristanetworks.com \
--cc=kraxel@redhat.com \
--cc=kvm@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).