lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 26 Aug 2021 09:38:38 +0800 From: Li Fei1 <fei1.li@...el.com> To: Greg KH <gregkh@...uxfoundation.org> Cc: linux-kernel@...r.kernel.org, yu1.wang@...el.com, shuox.liu@...il.com, fei1.li@...el.com Subject: Re: [PATCH v2 1/3] virt: acrn: Introduce interfaces for MMIO device passthrough On Wed, Aug 25, 2021 at 10:43:29PM +0200, Greg KH wrote: > On Wed, Aug 25, 2021 at 05:01:40PM +0800, Fei Li wrote: > > From: Shuo Liu <shuo.a.liu@...el.com> > > > > MMIO device passthrough enables an OS in a virtual machine to directly > > access a MMIO device in the host. It promises almost the native > > performance, which is required in performance-critical scenarios of > > ACRN. > > > > HSM provides the following ioctls: > > - Assign - ACRN_IOCTL_ASSIGN_MMIODEV > > Pass data struct acrn_mmiodev from userspace to the hypervisor, and > > inform the hypervisor to assign a MMIO device to a User VM. > > > > - De-assign - ACRN_IOCTL_DEASSIGN_PCIDEV > > Pass data struct acrn_mmiodev from userspace to the hypervisor, and > > inform the hypervisor to de-assign a MMIO device from a User VM. > > > > Signed-off-by: Shuo Liu <shuo.a.liu@...el.com> > > Signed-off-by: Fei Li <fei1.li@...el.com> > > Where is the userspace code that uses this new api? Hi Greg An ACRN userspace application (like QEMU) would uses these new apis in https://github.com/projectacrn/acrn-hypervisor/blob/master/devicemodel/core/vmmapi.c#L562 and https://github.com/projectacrn/acrn-hypervisor/blob/master/devicemodel/core/vmmapi.c#L568 thanks. > > thanks, > > greg k-h
Powered by blists - more mailing lists