Re: [PATCH] KVM: x86: Reinstate userspace hypercall support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 2020-11-28 at 23:16 +0000, Joao Martins wrote:
> I don't know how far you've gone on your implementation but in the past I had
> send a series for Xen guests support (and backends/uabi too), hopefully
> you find that useful and maybe part of that could be repurposed?
> 
> https://lore.kernel.org/kvm/20190220201609.28290-1-joao.m.martins@xxxxxxxxxx/
> 
> (The link above has links towards userland parts albeit you probably don't
> care about Qemu)

Oh, that looks extremely useful; thanks!

> While it looks big at the first sight ... in reality out of the 39 patches,
> only the first 16 patches implement the guest parts [*] while reusing the
> XEN_HVM_CONFIG for the xen hypercall page MSR. Assuming the userspace VMM
> does most device emulation including xenbus handling.

Right, I'd probably only be looking for those first 16 or so, and would
do netback/blkback in userspace. But having the shared_info handling,
as well enough of hypercalls and event channels to cover the fast paths
like IPIs, would be great.

I'll have a play with it.

Attachment: smime.p7s
Description: S/MIME cryptographic signature


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux