[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 4/4] xsm/dummy: Allow hwdom SYSCTL_readconsole/physinfo


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Jason Andryuk <jason.andryuk@xxxxxxx>
  • Date: Wed, 11 Jun 2025 00:48:24 -0400
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=suse.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Zt1ezhVNOiPDAuhq6Fd8EDVtLvjnuzgEI1XEGDcz4T4=; b=f4QsVQUAtpDWG7MNrz1wHjk7BaC99dYYiwt8qMSk3PFkpH+Ml+uFHjMSyN2f4/+/i9uFelmb7A7QyykbZfIBD+lEI9s7umSz3aW8VwdKmGlDuO3DI4z4UPROJgsYl3ypCBdSjyMMzwbkebkYzSHG+YUzWt4uRT2JNyuLpq4KPR9mdHzGONGvoPBdpy6Eq444UgFd9s0snhFAs7+73+P4Ep9CrV8J+hE3nf04jSy40leNhRKHXcTuvXPWF4UhWP0/8zqn0fpGek3/9K0OzeprXQkD/wyfOT4923Olhp/BpG4D4yPpdG1Z5EIYrvaPwLxhojK0d4SLE5KEsIrXUKWcvw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Q02sexjmPiKE2cBeBXTByrMMhmf4hcvV7OxyH/FX57Xu+zg3T3DUz44ExsDS5vyBbTPTx3ASbAzMLEKrY9rBAfzvDiiEee/L5HxnOIlJET/ioseX3d2GvNrnfL8Hj5ptpIwjIpzchq80CM+FsVp9BVpoBJo3aD1w1xzn2JV73kCRSf7nEwHBFD+XaXcHowp5mjs4OHN9idIO+YOmC0/iMUl7wdFi9895mSre/AKtBUfu2sZwD8m8z+3qKGJr1xkuTb1qyYLEvxZ94qKkKbT7q69IATHK9zTDbh1tqBi8ZKsvWbDEar5I4CbTjLlzSuBzZE5lu3fj7DHi+s8slOyouA==
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, "Julien Grall" <julien@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 11 Jun 2025 17:27:28 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 2025-06-11 09:27, Jan Beulich wrote:
On 11.06.2025 00:57, Jason Andryuk wrote:
Allow the hwdom to access the console, and to access physical
information about the system.

xenconsoled can read Xen's dmesg.  If it's in hwdom, then that
permission would be required.

Why would xenconsoled run in the hardware domain? It's purely a software
construct, isn't it? As a daemon, putting it in the control domain may
make sense. Otherwise it probably ought to go in a service domain.

My approach has been to transform dom0 into the hardware domain and add a new control domain. xenconsoled was left running in the hardware domain.

I suppose it could move. Maybe that would be fine? I haven't tried. The Hyperlaunch code populates the console grants to point at the hardware domain, and I just followed that.

One aspect of why I left most things running in the Hardware domain was to not run things in the Control domain. If Control is the highest privileged entity, we'd rather run software in lower privileged places. Especially something like xenconsoled which is receiving data from the domUs.

Running in a service domain is a good suggestion, but we haven't made it that far.

Regards,
Jason



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.