[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 4/4] xsm/dummy: Allow hwdom SYSCTL_readconsole/physinfo
- To: Jan Beulich <jbeulich@xxxxxxxx>
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Date: Wed, 11 Jun 2025 00:48:24 -0400
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=suse.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Zt1ezhVNOiPDAuhq6Fd8EDVtLvjnuzgEI1XEGDcz4T4=; b=f4QsVQUAtpDWG7MNrz1wHjk7BaC99dYYiwt8qMSk3PFkpH+Ml+uFHjMSyN2f4/+/i9uFelmb7A7QyykbZfIBD+lEI9s7umSz3aW8VwdKmGlDuO3DI4z4UPROJgsYl3ypCBdSjyMMzwbkebkYzSHG+YUzWt4uRT2JNyuLpq4KPR9mdHzGONGvoPBdpy6Eq444UgFd9s0snhFAs7+73+P4Ep9CrV8J+hE3nf04jSy40leNhRKHXcTuvXPWF4UhWP0/8zqn0fpGek3/9K0OzeprXQkD/wyfOT4923Olhp/BpG4D4yPpdG1Z5EIYrvaPwLxhojK0d4SLE5KEsIrXUKWcvw==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Q02sexjmPiKE2cBeBXTByrMMhmf4hcvV7OxyH/FX57Xu+zg3T3DUz44ExsDS5vyBbTPTx3ASbAzMLEKrY9rBAfzvDiiEee/L5HxnOIlJET/ioseX3d2GvNrnfL8Hj5ptpIwjIpzchq80CM+FsVp9BVpoBJo3aD1w1xzn2JV73kCRSf7nEwHBFD+XaXcHowp5mjs4OHN9idIO+YOmC0/iMUl7wdFi9895mSre/AKtBUfu2sZwD8m8z+3qKGJr1xkuTb1qyYLEvxZ94qKkKbT7q69IATHK9zTDbh1tqBi8ZKsvWbDEar5I4CbTjLlzSuBzZE5lu3fj7DHi+s8slOyouA==
- Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, "Julien Grall" <julien@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- Delivery-date: Wed, 11 Jun 2025 17:27:28 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 2025-06-11 09:27, Jan Beulich wrote:
On 11.06.2025 00:57, Jason Andryuk wrote:
Allow the hwdom to access the console, and to access physical
information about the system.
xenconsoled can read Xen's dmesg. If it's in hwdom, then that
permission would be required.
Why would xenconsoled run in the hardware domain? It's purely a software
construct, isn't it? As a daemon, putting it in the control domain may
make sense. Otherwise it probably ought to go in a service domain.
My approach has been to transform dom0 into the hardware domain and add
a new control domain. xenconsoled was left running in the hardware domain.
I suppose it could move. Maybe that would be fine? I haven't tried.
The Hyperlaunch code populates the console grants to point at the
hardware domain, and I just followed that.
One aspect of why I left most things running in the Hardware domain was
to not run things in the Control domain. If Control is the highest
privileged entity, we'd rather run software in lower privileged places.
Especially something like xenconsoled which is receiving data from the
domUs.
Running in a service domain is a good suggestion, but we haven't made it
that far.
Regards,
Jason
|