[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 08/23] xen/arm: dom0less seed xenstore grant table entry
- To: Julien Grall <julien@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Date: Fri, 7 Mar 2025 18:03:03 -0500
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=xen.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=U6tZ2CA7CUC1O78q4dZoymsDPoHQJYfLwg+gZK+FlnY=; b=QM16uLRdWagdryyp5tFZDNLM+4ZShiqO4IByX0mQV31BRuPd7zs1oo6nnzPhjSLmFeP+B8Ui37AwE48FB3pfsUskJ1LR5Z8WgtURRTCiV8FXAU8G5cgNwHoAjtaqs2JASajxs8EgAErgnVtANpn2w75iJcGt3wzYonNC/iKZs3inEvO3Y6jVp+ggzTXhT/mSU16bLUjyMM5FUHUG6PdDzWt0/cYdA4Hrc/HpJwuIcqpyk1udlip+YCeGFecjPkGiinN1TJjquqd7auUyWPYmr06FEjaI/agebIBtikwTCYv18gvT25jJp6fPdcCM0PmnHYp5/ZxHZ8yDwqZqlX8a/Q==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=NilQcwJYb+Fl9DaedUMtzseYpxqk0EhXBgwHxmDdrPQGWFcLudSNCyqoti41sLXDnJ0ZepBY2cth/yyyfax4LwMQIF1M86h0VOCFOGKXYPs6MYtC7WVgFErrOJ9c88WPY/RnWouTEEqEihxUyzz608/m2NK9pLVES2HLLwm059tQF+Oq0NDz+Kw13DQKdQ2Pxl0ujT48BiWo2kXktWeyaKLvgHE7kJaTyZOIVGv+lFWAO0HaA78tKbNHmcRtt/qBfDv9Xbtntw6sLZZKL76I+Hd2m1h4BpQiLucqqXVd76hu5EPEIXpivLQKjMPQnIz4u1jW1YLi0wcx0DTZ3dW87g==
- Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, "Volodymyr Babchuk" <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, "Jan Beulich" <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
- Delivery-date: Fri, 07 Mar 2025 23:03:21 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 2025-03-07 16:24, Julien Grall wrote:
Hi,
On 06/03/2025 22:03, Jason Andryuk wrote:
With a split hardware and control domain, the control domain may still
want and xenstore access. Currently this relies on init-dom0less to
seed the grants. This is problematic since we don't want hardware
domain to be able to map the control domain's resources. Instead have
the hypervisor see the grant table entry. The grant is then accessible
as normal.
I am probably missing something, but why would run xenstored in the
hardware domain rather than the control domain? Isn't xenstored more
related to the VM management than HW?
I addressed this in my other email. You're probably right that
xenstored should run in control, but implementation details prevent that
in the short term.
Regardless, of the xenstored placement, I think it's a better design for
Xen to seed the grants. With Xen allocating the xenstore page and event
channel, and now seeding the grant table, they can just be used. A
xenstore stubdom can just establish all the connections without relying
on another domain to perform an action.
I tested that with hyperlaunching the xenstore stubdom. That is where
the two XS_PRIV changes later in the series come from. xenstore stubdom
iterates the domains, reads the hvm_param for the event channel, and
then runs introduce to set up the connection.
Regards,
Jason
|