[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v6 1/2] xsm: create idle domain privileged and demote after setup
On 5/9/22 14:38, Julien Grall wrote: > Hi Daniel, > > On 03/05/2022 12:17, Daniel P. Smith wrote: >> There are new capabilities, dom0less and hyperlaunch, that introduce >> internal >> hypervisor logic which needs to make resource allocation calls that are >> protected by XSM access checks. This creates an issue as a subset of the >> hypervisor code is executed under a system domain, the idle domain, >> that is >> represented by a per-CPU non-privileged struct domain. To enable these >> new >> capabilities to function correctly but in a controlled manner, this >> commit >> changes the idle system domain to be created as a privileged domain >> under the >> default policy and demoted before transitioning to running. A new XSM >> hook, >> xsm_set_system_active(), is introduced to allow each XSM policy type >> to demote >> the idle domain appropriately for that policy type. In the case of >> SILO, it >> inherits the default policy's hook for xsm_set_system_active(). >> >> For flask a stub is added to ensure that flask policy system will >> function >> correctly with this patch until flask is extended with support for >> starting the >> idle domain privileged and properly demoting it on the call to >> xsm_set_system_active(). >> >> Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx> >> Reviewed-by: Jason Andryuk <jandryuk@xxxxxxxxx> >> --- >> xen/arch/arm/setup.c | 4 ++++ >> xen/arch/x86/setup.c | 5 +++++ >> xen/common/sched/core.c | 7 ++++++- >> xen/include/xsm/dummy.h | 17 +++++++++++++++++ >> xen/include/xsm/xsm.h | 6 ++++++ >> xen/xsm/dummy.c | 1 + >> xen/xsm/flask/hooks.c | 23 +++++++++++++++++++++++ >> 7 files changed, 62 insertions(+), 1 deletion(-) >> >> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c >> index d5d0792ed4..39a654926d 100644 >> --- a/xen/arch/arm/setup.c >> +++ b/xen/arch/arm/setup.c >> @@ -1048,6 +1048,10 @@ void __init start_xen(unsigned long >> boot_phys_offset, >> /* Hide UART from DOM0 if we're using it */ >> serial_endboot(); >> + if ( (rc = xsm_set_system_active()) != 0 ) >> + panic("xsm(err=%d): " >> + "unable to set hypervisor to SYSTEM_ACTIVE >> privilege\n", rc); > > We usually don't split error message over multiple lines (even if they > are over 80 characters). > >> + >> system_state = SYS_STATE_active; >> for_each_domain( d ) >> diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c >> index 6f20e17892..36a60ce884 100644 >> --- a/xen/arch/x86/setup.c >> +++ b/xen/arch/x86/setup.c >> @@ -620,6 +620,11 @@ static void noreturn init_done(void) >> { >> void *va; >> unsigned long start, end; >> + int err; >> + >> + if ( (err = xsm_set_system_active()) != 0 ) >> + panic("xsm(err=%d): " >> + "unable to set hypervisor to SYSTEM_ACTIVE >> privilege\n", err); > > Same here. > > Other than the two remarks above and Luca's one: > > Acked-by: Julien Grall <jgrall@xxxxxxxxxx> # arm Ack. v/r, dps
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |