[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v4 0/7] ARM split hardware and control domains


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jason Andryuk <jason.andryuk@xxxxxxx>
  • Date: Mon, 7 Apr 2025 15:40:31 -0400
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ejsmOXKBrbjqmaNCagfXX2dJXgSreeVEa39LmdbaGHI=; b=NZY9WYcgaoc6UyUnhoqo6vQdgIGtpSCDcj/ocBtpEzYxFsa426XAA0pOGvNbb3SAbKkVRh298TO9k5JbI7+iUFPAimWCtwEeRqPpcOdAN108ZtdIpcKO29QfBTWQbgpLSNSGnU7+n2XTgU0e1WvJhY5yLadmdPCaqlsiNGCPqxjamBpWCm3th4BAX5GRxiAoS/kyBOQz9csz+3sFJkjDiMBUpwqxhqDtp3qkHarAlfPS8xFZhHsJb1Tr7AxBMWLU9YkPcKkqtlWxtjS2925F3IFS0fB5TvycoetvngY0eqz8mFd3cSqcW/9UFdriqPjnpca0GuWMHRrU23UBIR1rMA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=uahmsSet7qDFQIsMADESFvIIKTBQNQyXV577ljuUzEJpjmQEfE9NYNy1M+/9XOcQpUYW++ftMYHqXFfncsORGM1opzQZnbBgs0rA7Y9E/0pt3kxDg9Bbx53xqc6hvHBtc0DQIcAjMP3GdX+JbBg6Cw15ahH8D1EPuPgYmuBzcQprazZQTEy9yUcrIM+RpbENwqDzsXJGn1hVvkBvPauOtjmU0aYBP5IVxeq7AKKheP3qwzOB3S+SyGCDK11wnYSu9ItF+GGO8zIVGFOK5QnIzYkfjXbnOYmi5/8+MMOcT5veQLFP01RfneY7Dod+bAk+ydxVWrss4NNneBU1rRe7qw==
  • Cc: Jason Andryuk <jason.andryuk@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, "Volodymyr Babchuk" <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, "Jan Beulich" <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Mon, 07 Apr 2025 19:41:00 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

This series implements separation of dom0 into separate hardware and
control domains.  It uses the capabilities idea from Hyperlaunch -
hardware, control, and xenstore.  It's been tested with dom1 as
control, dom2 as a domU, and dom3 as hardware and xenstore.

To keep things more managable, this v4 is only the ARM hypervisor changes,
and one associated init-dom0less change.  The series is slightly
re-ordered to move xenstore changes ahead of adding the capabilities.

"xen/arm: dom0less use has_dtb local variable" is a new patch to
slightly simplify "xen/arm: Add capabilities to dom0less".

Setting hardware domain as domid 0 is removed.

I've been unable to run a combined control/xenstore.  Linux console
output stops shortly after the domain determines it should be XS_LOCAL.
I have not investigated further.

Daniel P. Smith (1):
  xen: introduce hardware domain create flag

Jason Andryuk (6):
  xen/arm: dom0less hwdom construction
  xen/arm: dom0less delay xenstore initialization
  xen/arm: dom0less seed xenstore grant table entry
  tools/init-dom0less: Only seed legacy xenstore grants
  xen/arm: dom0less use has_dtb local variable
  xen/arm: Add capabilities to dom0less

 docs/misc/arm/device-tree/booting.txt     |  11 ++
 tools/helpers/init-dom0less.c             |  10 +-
 xen/arch/arm/dom0less-build.c             | 197 ++++++++++++++++------
 xen/arch/arm/domain.c                     |   3 +-
 xen/arch/arm/domain_build.c               |  11 +-
 xen/arch/arm/include/asm/dom0less-build.h |   2 +
 xen/arch/arm/include/asm/domain_build.h   |   3 +-
 xen/arch/x86/setup.c                      |   3 +-
 xen/common/domain.c                       |  15 +-
 xen/common/grant_table.c                  |  14 ++
 xen/include/public/bootfdt.h              |  31 ++++
 xen/include/xen/domain.h                  |   2 +
 xen/include/xen/grant_table.h             |   4 +
 xen/include/xen/types.h                   |   1 +
 14 files changed, 243 insertions(+), 64 deletions(-)
 create mode 100644 xen/include/public/bootfdt.h

-- 
2.49.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.