[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v8 1/2] xsm: create idle domain privileged and demote after setup
- To: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Date: Tue, 31 May 2022 17:16:11 +0200
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JGNsVT/2X3jfLFHWXSIrC98CabJV1aAOdssUcDVOrsE=; b=E84qTX0MhTnI9yek4nTKdIr1Wfeno77DwqxrWqOfyRZptF0h4urm5F5qgReKAFceo+itipRsP6z+y17PqSElO9Y5sgwtdB0eqopwioX69PrOQw1pdkXiJgTFHTpQOplzYb/0hxPpaXQ3SIvZQAiHgf8e5TxqdkjoHAkxwMWKwdAoErhoQMVqS1U/ldETbMLPiH5Vf8oIHHL12IR7Em47GjBAhGwFYFJsqhspAtBt30YckGW3VSRPUyxyFMUJZasZU79FFL3DXr1oJ2tFkAzVrG6QwqELQftCsg9hTJFx1QgzrA7N9S978lb6XCsNSm5Ivc+LNRZMvKThxIIIMY1YHg==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AmkC66iq/dOa2+/U6CDdIu1SYMgexExooMDPioSLNdGcLpnaXnLoAD9jODdQpvfYtb0ERr5pbAMk+NKjwMETxCjblHP/8UblHOtuvDcnmzovFyqbFR4aujEgRtgxqxBmsN9uM6IXkM8xxesp/Xmh5pP+E4BcdYo07XiXKlC7jnqxqJLRdatVRJQBPEbi/AsXedt0XadZyi75sl4XwCzHuBgQ+otVROySPywCuwh5MPT3m+9aZbv/B8/zDnZNsCKdGD+e+M1AiVm/EDhvpyIJ+DG+Smj1wfEsI8eleVMPTW3VBEag+yTwgpK+K1oF4xhqUkUakEBheUy0kMDysl4ooA==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
- Cc: scott.davis@xxxxxxxxxx, christopher.clark@xxxxxxxxxx, jandryuk@xxxxxxxxx, Luca Fancellu <luca.fancellu@xxxxxxx>, Julien Grall <jgrall@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Dario Faggioli <dfaggioli@xxxxxxxx>, Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Wei Liu <wl@xxxxxxx>
- Delivery-date: Tue, 31 May 2022 15:16:54 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 31.05.2022 16:56, Daniel P. Smith wrote:
> There are new capabilities, dom0less and hyperlaunch, that introduce internal
> hypervisor logic, which needs to make resource allocation calls that are
> protected by XSM access checks. The need for these resource allocations are
> necessary for dom0less and hyperlaunch when they are constructing the initial
> domain(s). This creates an issue as a subset of the hypervisor code is
> executed under a system domain, the idle domain, that is represented by a
> per-CPU non-privileged struct domain. To enable these new capabilities to
> function correctly but in a controlled manner, this commit changes the idle
> system domain to be created as a privileged domain under the default policy
> and
> demoted before transitioning to running. A new XSM hook,
> xsm_set_system_active(), is introduced to allow each XSM policy type to demote
> the idle domain appropriately for that policy type. In the case of SILO, it
> inherits the default policy's hook for xsm_set_system_active().
>
> For flask, a stub is added to ensure that flask policy system will function
> correctly with this patch until flask is extended with support for starting
> the
> idle domain privileged and properly demoting it on the call to
> xsm_set_system_active().
>
> Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
> Reviewed-by: Jason Andryuk <jandryuk@xxxxxxxxx>
> Reviewed-by: Luca Fancellu <luca.fancellu@xxxxxxx>
> Acked-by: Julien Grall <jgrall@xxxxxxxxxx> # arm
Hmm, here and on patch 2 you've lost Rahul's R-b and T-b, afaict.
Jan
|