summaryrefslogtreecommitdiff
path: root/docs/admin-guide/introduction.rst
blob: 6da2758d709993aa2de625cd3346b7b98e810852 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
.. SPDX-License-Identifier: CC-BY-4.0

Introduction
============

Xen is an open source, bare metal hypervisor.  It runs as the most privileged
piece of software, and shares the resources of the hardware between virtual
machines.

In Xen terminology, there are :term:`domains<domain>`, commonly abbreviated to
dom, which are identified by their numeric :term:`domid`.

When Xen boots, dom0 is automatically started as well.  Dom0 is a virtual
machine which, by default, is granted full permissions [1]_.  A typical setup
might be:

.. image:: xen-overview.drawio.svg

Dom0 takes the role of :term:`control domain`, responsible for creating and
managing other virtual machines, and the role of :term:`hardware domain`,
responsible for hardware and marshalling guest I/O.

Xen is deliberately minimal, and has no device drivers [2]_.  Xen manages RAM,
schedules virtual CPUs on the available physical CPUs, and marshals
interrupts.

Xen also provides a hypercall interface to guests, including event channels
(virtual interrupts), grant tables (shared memory), on which a lot of higher
level functionality is built.

.. rubric:: Footnotes

.. [1] A common misconception with Xen's architecture is that dom0 is somehow
       different to other guests.  The choice of id 0 is not an accident, and
       follows in UNIX heritage.

.. [2] This definition might be fuzzy.  Xen can talk to common serial UARTs,
       and knows how to drive various CPU internal devices such as IOMMUs, but
       has no knowledge of network cards, disks, etc.  All of that is the
       hardware domains responsibility.