[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v6 1/2] xsm: create idle domain privileged and demote after setup


  • To: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • From: Luca Fancellu <Luca.Fancellu@xxxxxxx>
  • Date: Tue, 3 May 2022 12:27:44 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=b+DjChccwRJy9mvIuY1PhsTOViea0ZZycWnYFbYUdB8=; b=O/QNanFsB9nDgVDGG9EN8xkTUXZI2e0apXkvzM5CgllSDE8g8iu9uULd4g1QlYcsMt3xEqA4RTZIf6n+dIA9lrind4U9FJ/5c9viBaKfeajBf2EGkDWtguhu6YmDvan5+jgX0JYMAQPc33xnbWibplsySuEB2za0Wqk5uDmk2pdDupvfxNpn/kql3f1nSgXfdLKOx/31bCZj4dgh8OpibXDiDUWTpGPJSxW1N7KCmLlPJaKHWdgmalMIDoMMC5n83S6qZQ3DNR31xrWZNC2OcjY2ssctD6Wn2pddQF0lbhpltcvQJWrspPS5Kbj91fNTh1mV24MZojUyOL1PqZmrCA==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=b+DjChccwRJy9mvIuY1PhsTOViea0ZZycWnYFbYUdB8=; b=UhuK9lelkW9uReC4+kDGM/pwCF1iUpf073iJEbjDOnMbkV8ZEveWjKyRlDf5s/qIWVeIZg7lFw5Dk13MsxE30wvg1hOZRF2Z2Bk5kYNav5Pye8eumZvw7IMRAwZcenzcGhv9FCjjZfjD5tddrVj3f8DHVAfta45EmuM6Wlq8T4u01knisNmlmIJHd5k2lAkMxynRS3vSPpeQRAh9WOWYFZBOGXN05gF9Fjnlh8bwAGQoP1/8p17PFVCpDDJzAVn7cRnUpsJ+yiSqHec95dVLShX6sSounMAn+6DV6KaFxo3GM9npOOge+U8Qpwp5HMXVUc9eK+rVhj0dsKGKQEqu9w==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=mC3+NaSETCehIt2N3nW38TBnEYqNgVakrOy8QM/q0dC+s/lQ0bBCskmQFpir6xE6BREKZpyjVQYlCkzm1HE6IskYFprjCVsGwSGUpn64H3piAiuq6ELhaNYEYao9DOreD1LF19T+ByMDHIIOsoI3dIfiLSucc/QecwzCEYKuvLI2z6FkhusqNP/Na+tNkWCyuNgFx6K6l9CT6QqwlTr/HT37kHR11v1B3PTQGbl1yX/nN0hxxpxe8xXJZHVj+c0iT64fER3QgCnt48p1pq8ZOZGQ7m6wUIhTClhX1+UEyH4Z9K4F+BxPbdvKSsiCVF78AvSU3Oh7lRFIYyG+i/Ci2Q==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=k82HZsvfoFV6EgR4LdMt7yCmUtSpnzvh17OjziK58Kl8htMBiI2GHnnt6kgSsJrdR8MyRMGLhyMvU/Y/TBlRs97c1K/l+fL30me5JfBM/PrmndgjtrsIc4EBJCTeNYQFpgqcC4u33Z9Rl28jhPBSnEuDKjyoMFyn3x4WFepJy7RGpY8BY9V2nQqn6v0uI3zzUgX7P5s6mkgZc+QTs6TLg89VPsC52bPasndDh33uJgMc4RRMJH7Z7wuCgsTbtfZu+3rVE6diVqSbU6c6fTsucyIeOzGY/DCN3gY9lZ7epIn+zuxdMUJZjOmRhA7n2TlAPBHwMcnykFEICWITCwxdjQ==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Wei Liu <wl@xxxxxxx>, Scott Davis <scott.davis@xxxxxxxxxx>, "jandryuk@xxxxxxxxx" <jandryuk@xxxxxxxxx>, "christopher.clark@xxxxxxxxxx" <christopher.clark@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Dario Faggioli <dfaggioli@xxxxxxxx>, Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  • Delivery-date: Tue, 03 May 2022 12:28:17 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYXt+O5KwXx13Nl0CUGYEFbsIOk60NFJ8A
  • Thread-topic: [PATCH v6 1/2] xsm: create idle domain privileged and demote after setup


> On 3 May 2022, at 12:17, Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx> wrote:
> 
> There are new capabilities, dom0less and hyperlaunch, that introduce internal
> hypervisor logic which needs to make resource allocation calls that are
> protected by XSM access checks. This creates an issue as a subset of the
> hypervisor code is executed under a system domain, the idle domain, that is
> represented by a per-CPU non-privileged struct domain. To enable these new
> capabilities to function correctly but in a controlled manner, this commit
> changes the idle system domain to be created as a privileged domain under the
> default policy and demoted before transitioning to running. A new XSM hook,
> xsm_set_system_active(), is introduced to allow each XSM policy type to demote
> the idle domain appropriately for that policy type. In the case of SILO, it
> inherits the default policy's hook for xsm_set_system_active().
> 
> For flask a stub is added to ensure that flask policy system will function
> correctly with this patch until flask is extended with support for starting 
> the
> idle domain privileged and properly demoting it on the call to
> xsm_set_system_active().
> 
> Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
> Reviewed-by: Jason Andryuk <jandryuk@xxxxxxxxx>


Reviewed-by: Luca Fancellu <luca.fancellu@xxxxxxx>

Cheers,
Luca




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.