From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([140.186.70.92]:34258) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Rxmt5-0003Ul-0P for qemu-devel@nongnu.org; Wed, 15 Feb 2012 16:59:43 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Rxmt2-00033V-J0 for qemu-devel@nongnu.org; Wed, 15 Feb 2012 16:59:42 -0500 Received: from mail-pz0-f45.google.com ([209.85.210.45]:47469) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Rxmt2-00033J-Bo for qemu-devel@nongnu.org; Wed, 15 Feb 2012 16:59:40 -0500 Received: by dadp14 with SMTP id p14so1568539dad.4 for ; Wed, 15 Feb 2012 13:59:39 -0800 (PST) Message-ID: <4F3C2AC5.80400@codemonkey.ws> Date: Wed, 15 Feb 2012 15:59:33 -0600 From: Anthony Liguori MIME-Version: 1.0 References: <4F2AB552.2070909@redhat.com> <20120205093723.GQ23536@redhat.com> <4F2E4F8B.8090504@redhat.com> <20120205095153.GA29265@redhat.com> <4F2EAFF6.7030006@codemonkey.ws> <4F2F9E89.7090607@redhat.com> <87vcnih5qt.fsf@rustcorp.com.au> <4F3BB59D.2020505@redhat.com> In-Reply-To: <4F3BB59D.2020505@redhat.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [RFC] Next gen kvm api List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Avi Kivity Cc: linux-kernel , Gleb Natapov , qemu-devel , Rusty Russell , KVM list On 02/15/2012 07:39 AM, Avi Kivity wrote: > On 02/07/2012 08:12 PM, Rusty Russell wrote: >>> I would really love to have this, but the problem is that we'd need a >>> general purpose bytecode VM with binding to some kernel APIs. The >>> bytecode VM, if made general enough to host more complicated devices, >>> would likely be much larger than the actual code we have in the kernel now. >> >> We have the ability to upload bytecode into the kernel already. It's in >> a great bytecode interpreted by the CPU itself. > > Unfortunately it's inflexible (has to come with the kernel) and open to > security vulnerabilities. I wonder if there's any reasonable way to run device emulation within the context of the guest. Could we effectively do something like SMM? For a given set of traps, reflect back into the guest quickly changing the visibility of the VGA region. It may require installing a new CR3 but maybe that wouldn't be so bad with VPIDs. Then you could implement the PIT as guest firmware using kvmclock as the time base. Once you're back in the guest, you could install the old CR3. Perhaps just hide a portion of the physical address space with the e820. Regards, Anthony Liguori >> If every user were emulating different machines, LPF this would make >> sense. Are they? > > They aren't. > >> Or should we write those helpers once, in C, and >> provide that for them. > > There are many of them: PIT/PIC/IOAPIC/MSIX tables/HPET/kvmclock/Hyper-V > stuff/vhost-net/DMA remapping/IO remapping (just for x86), and some of > them are quite complicated. However implementing them in bytecode > amounts to exposing a stable kernel ABI, since they use such a vast > range of kernel services. >