[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 15/15] x86/hyperlaunch: add capabilities to boot domain


  • To: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jason Andryuk <jason.andryuk@xxxxxxx>
  • Date: Mon, 25 Nov 2024 19:09:22 -0500
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=apertussolutions.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HLbhG34pzc+kefPeUCZBVWGMfUzEB4dTthSOXG3NOyw=; b=RVpL5APmO/MH6S6239g+urHRMDzIYo9dQBVDqAfQduGte7tcFkYWSqik013aHbNutaOhM21n72p5YXTpvuGowW3DhKO4NmfgtDru5jYQsF+dUQ4L4hB0utu9kFvsLQc79nTBfGVaMYsm3L9G5KWL1Hk9tN0kFnlpaQNQsVbXQFQA6/arDq1fjXFHgSojnxhlpfpgwY0MasAYPMLgu0P8lKc/qfiWFtN15bIzhsk1gn0ivvXf1+jlJfnA/vdPkuWH00Wmdf1f+ocAsvBMOUAiPXG98H/HBYR8QB9ZBdkaSxNzwSeIBiaYPvIZaBHaTaNzQy+Dt2X+sVdtwKGnektuAQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=OJLbkHSgZgQiM9mjY7ii0B1cdQ6nmOETBcB9OWLW/J5oxOoNxpbB25y0aSq+hDDMJzL8Xsq+SZJkFJBDsLIu0wM0Div9wKs9J9uL7p5Vw+FRBShkUCWjwVFm7NEqOdjbgdzN+trxPQ1Bazm+75V45lP1QemliiUVVk8y1EhXW18c4o8BI2+Xj24gqNR5yVtLYkxOC1GPPKFbcJCE4M5GeHcoVeh1+YdP3HoIXxCJwSwQEFTJjJwSgl1ow/X3PYLUSWA42Hu16EqsH6JELGNzlZEPD7s21ulH24AwD4TDMM0zWqhFzV/aZ4EC5LnyTPjVi+ovDbppPoL1x71q9WOM1g==
  • Cc: <christopher.w.clark@xxxxxxxxx>, <stefano.stabellini@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Tue, 26 Nov 2024 01:52:21 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 2024-11-23 13:20, Daniel P. Smith wrote:
Introduce the ability to assign capabilities to a domain via its definition in
device tree. The first capability enabled to select is the control domain
capability. The capability property is a bitfield in both the device tree and
`struct boot_domain`.

Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
---
  xen/arch/x86/domain_builder/core.c    |  2 +-
  xen/arch/x86/domain_builder/fdt.c     | 13 +++++++++++++
  xen/arch/x86/include/asm/bootdomain.h |  4 ++++
  xen/arch/x86/setup.c                  |  6 +++++-
  4 files changed, 23 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/domain_builder/core.c 
b/xen/arch/x86/domain_builder/core.c
index 95cab06e6159..eaa019472724 100644
--- a/xen/arch/x86/domain_builder/core.c
+++ b/xen/arch/x86/domain_builder/core.c
@@ -93,9 +93,9 @@ void __init builder_init(struct boot_info *bi)
          i = first_boot_module_index(bi, BOOTMOD_UNKNOWN);
          bi->mods[i].type = BOOTMOD_KERNEL;
          bi->domains[0].kernel = &bi->mods[i];
+        bi->domains[0].capabilities |= BUILD_CAPS_CONTROL;
          bi->nr_domains = 1;
      }
-

This will get cleaned up earlier.

With that:

Reviewed-by: Jason Andryuk <jason.andryuk@xxxxxxx>



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.