WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Xen

xen-devel

[Top] [All Lists]

Re: [Xen-devel] Move some of the PCI device manage/control into pciback?

To: Espen Skoglund <espen.skoglund@xxxxxxxxxxxxx>
Subject: Re: [Xen-devel] Move some of the PCI device manage/control into pciback?
From: Shohei Fujiwara <fujiwara-sxa@xxxxxxxxxxxxxxx>
Date: 2009年1月19日 16:05:45 +0900
Cc: "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx>, "Cui, Dexuan" <dexuan.cui@xxxxxxxxx>, "'xen-devel@xxxxxxxxxxxxxxxxxxx'" <xen-devel@xxxxxxxxxxxxxxxxxxx>, Fraser' <keir.fraser@xxxxxxxxxxxxx>
Delivery-date: 2009年1月18日 23:06:19 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <18800.38752.530780.443903@xxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <20090116174655.8EB6.CB716985@xxxxxxxxxxxxxxx> <18800.38752.530780.443903@xxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
On 2009年1月16日 14:19:12 +0000
Espen Skoglund <espen.skoglund@xxxxxxxxxxxxx> wrote:
> [Shohei Fujiwara]
> > On 2009年1月16日 14:16:08 +0800
> > "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx> wrote:
> >> Shohei Fujiwara <mailto:fujiwara-sxa@xxxxxxxxxxxxxxx> wrote:
> >>> My idea is to call XEN_DOMCTL_iomem_permission from domain 0. So
> >>> my idea doesn't open a new hole. In addition to this, interrupt
> >>> remapping of VT-d can block invalid MSI.
> >> 
> >> I suspect that feature is not enabled in all system.
> >> 
> >> Also what will happen if guest try to change the BAR value? Will be
> >> passed to hardware also? I'm not sure what will happen if two
> >> device under the same bus has the same BAR value. Maybe then it is
> >> possible one guest can write MMIO of another device.
>
> > This is the figure of my idea.
>
> > If mmcfg and interrupt remapping are supported:
>
> > guest domain | stub domain
> > ------------------+------------------------------------------
> > guest software -> | ioemu -> libpci(pcifront) -> mmcfg(subset)
>
> > If mmcfg or interrupt remapping are not supported:
>
> > guest domain | stub domain | domain 0
> > ------------------+------------------------------+---------------------
> > guest software -> | ioemu -> libpci(pcifront) -> | pciback -> mmcfg/cf8
>
> > * This is the same with current implementation.
>
> > BAR is virtualized by ioemu. BAR value written by guest software 
> > isn't passed to hardware.
>
> > If stub domain is hijacked, it is possible to set invalid BAR value.
>
>
> I still don't understand what you're trying to achieve by avoiding to
> go through pciback. As Keir said, PCI config accesses should not be
> taken on the data path. Config accesses should neither be required
> for regular device operation. It is afterall called "configuration
> space", not "control space". PCI config space acesses are kind of
> bound to have some overhead. For example, Itanium requires them to go
> through a SAL call.
Domain 0 is SPOF(Single Point of Failure). If domain 0 panics, whole
system stops. So, I'd like to remove the function from domain 0, if we
can keep security. This reduces possibility of panic of domain 0.
In the future, it is great if domain 0 can reboot while guest domain
are working. This avoids SPOF. 
To achieve this, we have to solve many problems. In case
of network, emulating link down during rebooting is needed. In case of
PCI passthrough, it is difficult to block configuration access during
rebooting. If stub domain can access to configuration space directly,
we don't need to block configuration access.
What do you think?
> Is there a real problem you're trying to solve by pushing this to the
> stub domain? Also, if this is to be handled in the stub domain I
> would very much like to be able to configure certain devices so that
> their config space acesses are still tunneled through pciback.
There is no real problem of configuration. I also think config space
access should work, if it is tunneled or not.
Thanks,
--
Shohei Fujiwara
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
Previous by Date: [Xen-devel] [PATCH] ioemu: Get guest uuid from xenstore , Yosuke Iwamatsu
Next by Date: RE: [Xen-devel] Re: Xenheap disappearance: (was: xen_phys_startfor32b) , Jan Beulich
Previous by Thread: Re: [Xen-devel] Move some of the PCI device manage/control into pciback? , Espen Skoglund
Next by Thread: Re: [Xen-devel] Move some of the PCI device manage/control into pciback? , Keir Fraser
Indexes: [Date] [Thread] [Top] [All Lists]

Copyright ©, Citrix Systems Inc. All rights reserved. Legal and Privacy
Citrix This site is hosted by Citrix

AltStyle によって変換されたページ (->オリジナル) /