WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH] xenbus: Fix loopback event channel assuming doma

To: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] xenbus: Fix loopback event channel assuming domain 0
From: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
Date: Fri, 7 Oct 2011 08:52:36 +0100
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>, Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
Delivery-date: Fri, 07 Oct 2011 00:53:54 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4E8DF425.9000807@xxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: Citrix Systems, Inc.
References: <1317824920-639-1-git-send-email-dgdegra@xxxxxxxxxxxxx> <20109.60188.905267.410813@xxxxxxxxxxxxxxxxxxxxxxxx> <4E8DF425.9000807@xxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
On Thu, 2011-10-06 at 19:32 +0100, Daniel De Graaf wrote:
> On 10/06/2011 01:53 PM, Ian Jackson wrote:
> > Daniel De Graaf writes ("[Xen-devel] [PATCH] xenbus: Fix loopback event 
> > channel assuming domain 0"):
> >> The xenbus event channel established in xenbus_init is intended to be a
> >> loopback channel, but the remote domain was hardcoded to 0; this will
> >> cause the channel to be unusable when xenstore is not being run in
> >> domain 0.
> > 
> > I'm not sure I understand this.
> > 
> > ...
> >>            /* Next allocate a local port which xenstored can bind to */
> >>            alloc_unbound.dom        = DOMID_SELF;
> >> -          alloc_unbound.remote_dom = 0;
> >> +          alloc_unbound.remote_dom = DOMID_SELF;
> > 
> > The comment doesn't suggest that this is supposedly a loopback channel
> > (ie one for use by the xenbus client for signalling to itself,
> > somehow).
> 
> The event channel being changed here is a loopback event channel exposed in
> /proc/xen/xsd_port, which xenstored binds to. This code is only used for the
> initial domain; otherwise, the shared info page is used.

How does this change impact the regular dom0? It will be expecting a
xenstored to startup locally when in reality it actually needs to wait
for another domain and then connect to that.

Diego Ongaro did some work several years ago on this issue, it was most
recently re-posted by Alex Zeffert, patches against xen-unstable and the
linux-2.6.18 tree:
http://lists.xensource.com/archives/html/xen-devel/2009-03/msg01484.html
http://lists.xensource.com/archives/html/xen-devel/2009-03/msg01488.html

Part of the trick was to fixup the kernel side in a way which was
compatible with both existing Xen releases while also supporting new
releases which support both stub and non-stub xenstore. To do this Diego
setup a lazy xenbus initialisation with a state machine to track which
case was active, with transitions triggered either from the local-mmap
of /proc/xen/xenbus_xsd (so was backwards compatible) or an ioctl called
by the tool which builds the stub domain to tell the dom0 xenbus code
which domain/mfn/evtchn contains the xenstored and dom0's connection to
it (the patcheset includes a cut-down builder which works without
xenstore).

http://lists.xensource.com/archives/html/xen-devel/2009-03/msg01487.html
is the key kernel side patch in that regard.

Diego did some initial work with xenstored in a Linux domU, but I think
the final patchset was stub-xenstored (i.e. ocaml xenstored on minios,
possibly C xenstored on minios too), so I'm not sure about the xenstored
in Linux domU use case.

Some of the more trivial bits of this series were committed but the real
meat wasn't really pushed through.

> 
> > Rather it's supposed to be a channel to xenstore.  So the remote
> > domain should be the xenstore domain, which should come from the
> > shared info page.
> > 
> > Have you actually tested this with a separate xenstored domain ?
> > 
> > Ian.
> > 
> 
> The test setup that exposed this issue is having a non-dom0 Linux domain
> running xenstored (in addition to other services); this domain is started
> with the SIF_INITDOMAIN flag set. It has been tested and can start other
> domains with references back to the xenstored running there; the local
> kernel is able to communicate with the locally running xenstore to provide
> backend services.
> 
> The test for xen_initial_domain() here might better be replaced with a
> check on xen_start_info->store_evtchn which should be a valid event channel
> on all domains except the domain running xenstored. This seems like a more
> elegant solution than relying on the SIF_INITDOMAIN flag to determine the
> location of xenstore.
> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel