On Thu, May 06, 2010 at 01:58:54AM -0700, Avi Kivity wrote: > > We don't pass the whole VF to the guest. Only the BAR which is responsible for > > TX/RX/intr is mapped into guest space. > > Does the SR/IOV spec guarantee that you will have such a separation? No. This is a guideline which we provided to IHVs and would have to be enforced through testing/certification. > How can you unmap the VF without guest cooperation? If you're executing > Plugin code, you can't yank anything out. In our Kawela plugin we don't have any reads from the memory space at all. Hence you can yank the VF anytime (the code loaded in the guest address space will keep on executing). Even if there were reads we can map the memory pages to a NULL page and return 0xffffffff so that the plugin can detect this and return an error to the shell. Remember there are no control operations in the plugin and the code is really small (about 1k lines compared to 5k lines in the full VF driver). > > Are plugins executed with preemption/interrupts disabled? Depends on the model. Today the plugin code for checking the TX/RX rings runs in the deferred napi context. > What ISAs do those plugins support? x86 and x64. Thanks, -pankaj _______________________________________________ Virtualization mailing list Virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linux-foundation.org/mailman/listinfo/virtualization