lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.00.1003021817540.22259@kaball-desktop>
Date:	Tue, 2 Mar 2010 18:29:32 +0000
From:	Stefano Stabellini <stefano.stabellini@...citrix.com>
To:	xen-devel@...ts.xensource.com, linux-kernel@...r.kernel.org
Subject: [PATCH SERIES] enhanced PV on Xen HVM

Hi all,
this patch series is derived from an earlier version of Shen's "PV
extension of HVM" patch series.
It tries to achieve two goals:

- enable PV devices in Linux running in a Xen HVM domain;

- receive evtchns in place of interrupts to avoid expensive EOIs.

The main difference between the two patch series is the way the second
goals is achieved: in this patch series I am trying to reuse the same
code that is used in the Linux kernel to setup GSI to pirq mappings when
running as dom0.
In this case the GSIs that are being remapped correspond to emulated
interrupts, but Xen knows the difference and handles the two cases
separately.
It should be easy to use this mechanism also to map interrupts or MSIs
from pci passthrough devices with minimal changes to the Linux kernel.

The patch series consists of 5 patches, 1 for Xen and 4 for Linux; each
patch comes with a detailed description.

Any comment, critic or suggestion is very welcome.

Cheers,

Stefano
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ