[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Subject: Re: [Xen-devel] Creating a local network within the GuestOS and r outing to an ext ernal network



> Do you mean that (in a very simple view) Xen will take care of memory 
> and domain management and another domain (domain 0?) will take care of 
> every other piece of hardware like IDE, SCSI and NICs?

There'll be a concept of 'driver domains', each one of which can
take care of one or more devices. As well as running the
hardware, they'll handle the secure virtualization of the device
to domains. They only contain soft state, so if a device driver
fails it can just be re-instantiated (assuming it hasn't
managed to irrecoverably wedge the hardware or DMA all over
memory, but such faults are relatively rare...)
 
> This would be very cool but, as I understand. Xen requires "hardware" 
> drivers to be event based, so the guest OS in domain 0 would need a 
> giant patch... Right?

To enable us to use Linux drivers, the device driver domains will
be based on a cut-down version of xenolinux with all the
unnecessary stuff compiled out (most driver domains will have no
need for file systems, network stacks, character devices etc).
These domains will need additional code to do the device
virtualization, effectively moving the code that's already in Xen
into these domains.

> And Xen will end up with a) the Xen core, b) "hardware domain" guest OS 
> patch and c) general guest patches. Now we have a) and c), only... :-)

Kind of, but its wrong to think of driver domains as conventional
guest OSes : nobody logs into them so there's no need to apply
Linux security patches etc. They can be a linux snapshot that's
only occasionally updated when the linux device driver model
changes.

For convenience, we'll probably maintain all the patches in the
same xenolinux tree, i.e. the arch-xeno guest patches, the
privileged domain patches, and the device virtualization
patches. It'll just be a configuration option to determine what
kind of domain gets built.
 
However, it's our aim to get arch-xeno and privileged domain
patches into the main-line linux tree at some point, but it
probably wouldn't be appropriate to have the device
virtualization patches there. We'll then maintain a snapshot just
for driver domains in the Xen tree.

> Making the core small is very good, but enlarging the rest - the "guest" 
> universe - is not so good...

I don't think there's going to be any significant net change in
the amount of source code that we have to maintain.  The driver
domains will be a bit fatter in terms of memory usage than when
the drivers were in Xen, but we're only talking about a total of
a few of MB.

Having the device drivers outside of Xen gives us a great deal of
flexibility, making it rather easier to implement things like CoW
sparse virtual disks, layer 4 firewalling, IPv6 etc.

I think the new IO architecture is going to be a significant step
forward in terms of hardware support and flexibility. Trust us ;-)

Cheers,
Ian


-------------------------------------------------------
SF.Net is sponsored by: Speed Start Your Linux Apps Now.
Build and deploy apps & Web services for Linux with
a free DVD software kit from IBM. Click Now!
http://ads.osdn.com/?ad_id=1356&alloc_id=3438&op=click
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.