[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v3 0/7] ARM split hardware and control domains


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jason Andryuk <jason.andryuk@xxxxxxx>
  • Date: Thu, 3 Apr 2025 17:46:01 -0400
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JY7pwv1wK1CqRWVrF/jA8JHdhYkcf/QyWiB4jUMBuYM=; b=fME0h7heg5BIj6s+doAzT5ih3UaePocjJR/wZ2CSBjMieE5bqzg0NKdp61b+9uuihgrXnADQyls79usdo1OxZQ6abT/snEfSn0ITcTOiQBVOpFw2WO9A/70O/pE2+9suRPVXbrg0BZ0dd5O5j5y5tQXonAzsgy5uWdLvOY/JvOik+WR2DtHHw/PCIOtUqNcFRJTRBeUkb+TodEgDAkfVc8Kewu/c4lIzcwejjL8omitpo7YmyZO0IdI/snDbJ4LajqpDmcLl89OvpGQy1/M8mreh4wzZhHau0i4sgIhP/3W0ZbP4KztBAWYIF+AMVyvkWiYqs/W8GkfIc64d5tSu8A==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cGbCaYBw1LO1LhnntkmTHW5s91C+0TiPj7LGN7WbyiKJjBegeEoqFl4VS78dBQJOzBACh3MqnyX0SF1aPvRSQDB3X+hw+XXesn4y2eUrgQ+t4Y/6sRJ2L3CkY3hFKeneUhvvKDfMFkJ3WlkMyqdCiDPB+rXTCun514QBxIkQkKzTx+49iErXV39SVFUeVzMye87kVD9h0RwI672DkWoyrBfy/cdsznv0LsOb7Ptn8AVJOuRuxvRvURv0jKc4Z1hmIpyYS7c8pqWEDLNnVCpaOsz1mHZzRQcCxNi6FKkfdCNJ8pOc4reRraTEUy3dbyKmDF/6Iyd7zl1NWnDPatrgFQ==
  • Cc: Jason Andryuk <jason.andryuk@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, "Volodymyr Babchuk" <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, "Jan Beulich" <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Thu, 03 Apr 2025 21:46:25 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

This series implements separation of dom0 into separate hardware and
control domains.  It uses the capabilities idea from Hyperlaunch -
hardware, control, and xenstore.  It's been tested with  dom1 as
control, dom2 as a domU, and dom3 as hardware and xenstore.

To keep things more managable, this v3 is only the ARM hypervisor changes,
and one associated init-dom0less change.  The series is slightly
re-ordered to move xenstore changes ahead of adding the capabilities.

"xen/arm: dom0less use has_dtb local variable" is a new patch to
slightly simplify "xen/arm: Add capabilities to dom0less".

Setting hardware domain as domid 0 is removed.

I've been unable to run a combined control/xenstore.  Linux console
output stops shortly after the domain determines it should be XS_LOCAL.
I have not investigated further.

Daniel P. Smith (1):
  xen: introduce hardware domain create flag

Jason Andryuk (6):
  xen/arm: dom0less hwdom construction
  xen/arm: dom0less delay xenstore initialization
  xen/arm: dom0less seed xenstore grant table entry
  tools/init-dom0less: Only seed legacy xenstore grants
  xen/arm: dom0less use has_dtb local variable
  xen/arm: Add capabilities to dom0less

 docs/misc/arm/device-tree/booting.txt     |  11 ++
 tools/helpers/init-dom0less.c             |  10 +-
 xen/arch/arm/dom0less-build.c             | 195 ++++++++++++++++------
 xen/arch/arm/domain.c                     |   3 +-
 xen/arch/arm/domain_build.c               |  11 +-
 xen/arch/arm/include/asm/dom0less-build.h |   2 +
 xen/arch/arm/include/asm/domain_build.h   |   3 +-
 xen/arch/x86/setup.c                      |   3 +-
 xen/common/domain.c                       |   7 +-
 xen/common/grant_table.c                  |  14 ++
 xen/include/public/bootfdt.h              |  31 ++++
 xen/include/xen/domain.h                  |   2 +
 xen/include/xen/grant_table.h             |   7 +
 13 files changed, 238 insertions(+), 61 deletions(-)
 create mode 100644 xen/include/public/bootfdt.h

-- 
2.49.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.