From: Christoph Hellwig on 6 May 2010 16:20 On Thu, May 06, 2010 at 11:04:11AM -0700, Pankaj Thakkar wrote: > Plugin is x86 or x64 machine code. You write the plugin in C and compile it using gcc/ld to get the object file, we map the relevant sections only to the OS space. Which is simply not supportable for a cross-platform operating system like Linux. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo(a)vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
From: Christoph Hellwig on 6 May 2010 16:30 On Wed, May 05, 2010 at 10:52:53AM -0700, Stephen Hemminger wrote: > Let me put it bluntly. Any design that allows external code to run > in the kernel is not going to be accepted. Out of tree kernel modules are enough > of a pain already, why do you expect the developers to add another > interface. Exactly. Until our friends at VMware get this basic fact it's useless to continue arguing. Pankaj and Dmitry: you're fine to waste your time on this, but it's not going to go anywhere until you address that fundamental problem. The first thing you need to fix in your archicture is to integrate the VF function code into the kernel tree, and we can work from there. Please post patches doing this if you want to resume the discussion. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo(a)vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
From: Pankaj Thakkar on 10 May 2010 16:50 On Thu, May 06, 2010 at 01:58:54AM -0700, Avi Kivity wrote: > > We don't pass the whole VF to the guest. Only the BAR which is responsible for > > TX/RX/intr is mapped into guest space. > > Does the SR/IOV spec guarantee that you will have such a separation? No. This is a guideline which we provided to IHVs and would have to be enforced through testing/certification. > How can you unmap the VF without guest cooperation? If you're executing > Plugin code, you can't yank anything out. In our Kawela plugin we don't have any reads from the memory space at all. Hence you can yank the VF anytime (the code loaded in the guest address space will keep on executing). Even if there were reads we can map the memory pages to a NULL page and return 0xffffffff so that the plugin can detect this and return an error to the shell. Remember there are no control operations in the plugin and the code is really small (about 1k lines compared to 5k lines in the full VF driver). > > Are plugins executed with preemption/interrupts disabled? Depends on the model. Today the plugin code for checking the TX/RX rings runs in the deferred napi context. > What ISAs do those plugins support? x86 and x64. Thanks, -pankaj -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo(a)vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
First
|
Prev
|
Pages: 1 2 3 4 5 Prev: [GIT PULL] ocfs2 fixes for 2.6.34-rc Next: Exposing TSC "reliability" to userland |