[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Xen Summit 2025 - "Virtio Message challenges" design session
- To: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
- Date: Tue, 23 Sep 2025 08:25:19 +0000
- Accept-language: en-GB, en-US
- Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 4.158.2.129) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
- Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=SP0OOSwrewED/qPMOJBcKwbVCgSapH/nyVp98pFg94o=; b=dWk7Ar11rxhaGWY6t5/zGJ6HE9LKwDc62ozgFFo7CvbrB0mCrEeiSOuQb5sgUNC3InPMGs8PZe0vL840YEAaVBQ4axlD7V62dpcLc6AZgnSu/rtEQDml++N2QAcjCMzBlkxm6ijYRThhSCGIF4Suy9s+ddUcMAHpRKuXN0dg6hWCzh6NcmcQ1Y8zebCsP35DG6g9fQUNXh4vOduAkbe3Pd0ev1eaT1KWl0167OH0CsFVFD/z+ZB+3Y/Don1+jqbHyyjzcrcJU+BKT6vFoF6Uc/aSesRBfh6YYo8MVud6CXmbE2KjtyxNDgiQekcbZnZkwVmIF0SFqym+lDc3idurOw==
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=SP0OOSwrewED/qPMOJBcKwbVCgSapH/nyVp98pFg94o=; b=d71HjJUvjyYu3HLg1Zx0tbrDvwLunP5b3ClHgOe+suz6lh7nz5R0s1IxMlKkUubu3ttjkPnsmGnE4rQR/+B57aQfOim7V1PIe54GC2NnBiBV1WZGjfrIkIS2FGZBbiiq226tOCiIhE0fqXxRVtS/7asZ8iKnlt2ZK7lRCj6oH23fFfBecdCju6WmLbX7gQ6FA6FcB69Wx9FMEelt9YAnj5nXokXh2GYsFBjIZ6snTjd//ZlN2ZstBHpSRE++bSDQ0uhNSLaizGlWTA2bIjhzQSSuvsbsaWT8pOVcJDWR5YJEt742v08i5dmfeHu6YkxN0fVpXBY1Nf2Ubr9RckJM9g==
- Arc-seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=tVnbQ3PMV7cQl+ca0S5u4wEpGRqxHi3Ne8TNN2BvmQhAs4Sw/PmRNmFUmT/q6M17Vl+terg+3YI92NLmamJ39ubry65NoSJ+KGYLlmrupKgdTPMvehUifrKlfoTpf2gQ2M+T397UGH9Zp4cCOiLASlIGwqXLwmAuD4kP8Hcpi1bQ2NXL0QZpc98X0t9CaQML/8RJBJQe+WY2YcqcwuLRQWCmKM7EVbVHNThkJtJ/WAA4hZInXUMVq4WBEm35orpxqld5G0ByeNYBV8f80ylHx/8QrfbhQSFIt/fWZMlmKEA6VHhPpidCx4oV4jw2tQmXvPiiGN9BTKrw9qFWVnfZ0g==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=QYvThoqKTtHA1PTauf0ZQpfcXSqJ1zpQMX+cvFTP/4Sv4R8JWEHPHrXKqMrcXpKvK3Tt0MEEtCbFOHEHDNiBFKjcembGduATxKBDb29bB894JnA/768KHgeXWJamBH5oFYkM43EqR1/D24BoxLxYTJDGcg6sRjQQ3Fi5RRuK1cgPjU64KTo7LZ1vOGdDCM4bNumfo/fhUE8aFc0DlNzRu8oacRgAMO/WrdsfxaUJCYXYH8jSJsOAz5sh/C66sANcnNkiFtr0BA3SDgY3Sydp2nDAA02OWPc8sqhAKy+PsZ217WajvH4mlcOjBXtdnEtPR/CMQUcHZtNlyOoZCFOA+Q==
- Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
- Cc: Viresh Kumar <viresh.kumar@xxxxxxxxxx>, "Bill Mills (bill.mills@xxxxxxxxxx)" <bill.mills@xxxxxxxxxx>, "Edgar E. Iglesias" <Edgar.Iglesias@xxxxxxx>
- Delivery-date: Tue, 23 Sep 2025 08:26:13 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
- Nodisclaimer: true
- Thread-index: AQHcLGOZDZwUIN3nakWMTf8xAnZKbQ==
- Thread-topic: Xen Summit 2025 - "Virtio Message challenges" design session
Hi,
Here are the notes "Luca Fancellu" took during the design session on Virtio
Message:
-----
Ber: we have challenges in Xen and also other scenarios, I would like to
discuss to don't re-invent the wheel
Main one is that we are introducing "virtually" new VMs (Secure partitions) we
need to define who can be contacted, comprising the secure partition. We have
up to 65k possible peers.
IDs are 32k are for normal world, other 32k for secure.
Initial idea was XSM-Flask, but it goes over its capacity.
We don't want to use xenstored.
Andrew: It's XSM-Flask, what we have was ported from Linux, Xrays can solve, so
we could port it from Linux.
Ber: How do you configure this? At boot time? Can we modify at runtime?
Andrew: You have to reload the policies of the system.
Bertrand: You can have VMs appearing and disappearing, do we think it's the
right solution?
Limitation would be, you will have to have a fixed amount of policies. […]
Anyone has any other idea?
Another problem now, add a discovery system, we don't have xenstored now.
Andrew: The idea is to use argo port zero as an enumeration system.
Bertrand: We need to dig on Argo, and XSM-Flask. Now last problem: VirtIO based
on grant table and event. Main question is should we do this and who is willing
to help?
Who thinks it useful for servers?
Andrew: Legacy SW will be there forever, this thing will help in the long term.
It’s interesting to investigate.
----
Main conclusions:
- Investigate XSM/Flask for defining who is able to communicate with who when
FF-A is used on a system
- Might not be possible/easy to reconfigure at runtime
- Would require the user to define several "profiles" and assign each
VM to a profile
- Example: master can communicate with any VM and secure world, domU
can only communicate with dom0
- Investigate how Argo channel 0 could be used for discovery of Virtio Message
backends
- Define a protocol over Channel 0 to retrieve available
drivers/backend if any
- How do we discover all VMs we can communicate with using Argo ? can
we use XSM ?
- Continue creating a PoC of Virtio Message over Grant-table/xen events
- check performance we can achieve
- check how configuration would work
- check how this can leave on the side of existing pv drivers
If you have any comments or want to add something we missed, please answer to
this mail.
Regards
Bertrand
|