[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] docs: fusa: Add requirements for Device Passthrough


  • To: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • From: Ayan Kumar Halder <ayankuma@xxxxxxx>
  • Date: Thu, 10 Oct 2024 10:18:16 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GuH8VFJFn8r2mU2sN2j7WmjWUiRGxfWYFvAXdEh28L0=; b=eiJj2MXrffe5uI04RhOIM3X17Mv1bp68c/bAsNgnX1HS6DOic4kfBiUQFt01/B0MTZk/mHwserNejdngn2UtiP1huJR1EtXzD6L9OyJOuI2Ef2/9VwbVKcsOvchqBLwf7Q8zKYsqt8IwK1wFrGKv+7mQPU9y9HHoHmUOdkypPZd+TjhNcSYWrsNbD9rhpkW0nrQ8y5xqt/EXJs3HhI+kGvlTCElrA9nxdzS6sVwxY7mnhAFu9g52Wk9x8C3mkW1UK547/xiRDlYS9evVpXwowgkYpLI/ZAGeCv4xxzLiolkgj3xnlg06HFFaiFCTV9TL6fNbloG6TY76V6+npG1jdw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ecxx5V3TJk1ZzKKDENYTO5MsLb2Qj5TajdkX4vFmrPuVNb4a9QpwjN33mgZEeHWIikQamdMzdDwc7toI11FRzEnHDFQt9uJmj7HS8nySMtaWcp1SL4/686A0ibrZoWCCK5LNisS+LufQ4EyH8qlTqLwf+OWXjZqAcxNqQPWFv4NOvn9J5EcrOBAiif7jtNzZLOu+OtqCDKmdNLKIia/Kxo+UcVy38qYhtRs3KMLmM2ahe/cXLHgF40IYosQqLpzQ/FW49mmYw9vMhuEMiCfz6TLySPOBSEDIsRhnp0kpIWRctrhB/u7aJZFW8oPfzud/VBSN2P76qR8Qme/UbTuBkQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com;
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Oleksandr Tyshchenko <olekstysh@xxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Oleksandr Tyshchenko <oleksandr_tyshchenko@xxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>, Artem Mygaiev <artem_mygaiev@xxxxxxxx>, Hisao Munakata <hisao.munakata.vt@xxxxxxxxxxx>
  • Delivery-date: Thu, 10 Oct 2024 09:18:37 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi Bertrand,

< snip>

4) AoU on domain - 1) Domains should not use HVC DCC registers as Xen does not 
emulate them.
Xen does not depend on that, the domain does so this is only a Xen expected 
behaviour and we should document that Domains shall not use it.

Agreed, we need to document somewhere that Domains shall not use registers like HVC_DCC, etc which are not properly emulated by Xen.

Yes, it should not be a part of AoU as Xen's behaviour is not dependent on it.


Xen behaviour if used should be specified.
Agreed, there should be a document stating the behavior of Xen if non emulated registers are accessed by domains (as an example).

The AoUs can either be tested or need to be stated explicitly in the safety 
manual.

- "integrator" (word always problematic in Fusa as usually use to bail out
and give responsibility to someone else) shall and shall not do (for example
giving access to IOMMU registers to a domain)
The responsibility with the integrator lies for things which cannot be tested. 
For eg Xen has to be built with a particular configuration (eg SMMUv3) or a 
specific CPU errata. Integrator should provide at the most X amount of memory 
for each domain. SMMU (or any specific device) should not be assigned to a 
domain (which should be under Xen's control).
Ack


For some of the AoUs which cannot be tested (eg Bootloader/Firmare needs to 
initialize the DDR, CNTFRQ_EL0 needs to contain the correct system counter 
frequency), the responsibility will lie with the integrator.
This is an AoU on the firmware or the platform not on the integrator.

I agree that this is an AoU on firmware or platform. But we can agree that this AoU cannot be tested by us (within the scope of Xen's safety certification) as we do not know on which hardware platform Xen is deployed. The system integrator (or hardware manufacturer) should know the correct value of system counter frequency. Thus, they should be able to test this.

Our intention is to keep the scope of Xen's safety certification decoupled from a specific hardware platform. Is this making sense ?


- interface and what we expect a domain will do with it
This should be covered as part of AoU on domain. We can have more examples of 
this in near future.
In my mind interface are for example hypercall numbers and behaviours.
I would not expect to find this kind of stuff as AoU.

Yes, we will be having requirements for the hypercalls. Do you mean this ?

- Ayan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.