[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ImageBuilder] uboot-script-gen: add xen xsm policy loading support


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>
  • From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
  • Date: Mon, 14 Apr 2025 08:14:50 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cOE4dEhBTz83BtPEP7EAznFRjuPweK6MpHYue0uewNg=; b=zIEfXB8hmGIxjVbG2EFI+zdfx2WF8Knzi01MeooL6EC35yG5FPMZ3tI6Jp13LUrw0fviS8oKMD3QqP+82UOj3ibmFlg+DF3Yud9MxxQYP5IWfQsyh0d3c2eLwMU7Qj1pnEWm2CywezYSDbjdYxXjPl3948xalPcKPrHXMue4BVAefbmBiMt+Y+2VyLUizpGO+mylP9okWdnqKquoXHVZJwYOyMudreugNqI4K5HOdsCIJKnbiSwGOMTCWDvQIOgrqJ/d4GDKq+XZH5Lk1FnAvoRpxj8HM62wmx4BT3jOkvXzhkQ91wjnUw5rv5na3eAW6N7JKQ3xjftWprX0xDW/jA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=goWX3scS/uJIWX+opt1fYrmORsLL59s3dkIdIzBCUql/Q60f/4Aiz35LVqJtC/P+JSMb2Y4cbfl5+mokhe5pTYhBPPkhDWgHVsOh26hjSfjEoP4F4BxBbqtYtTxv2BVMU/YuwsgmTXr7BQON320yvmKTdOKjc6cPl4IQYnKaqm/p8M/z1xdPPTjja9JqibhS398k/BkUvjSUuWsrMkt1M9KVMJh4DQDmr6bLmhOe8XEQtiG4E8MwNUkX39TwavXgmXMDwLsacfJnTqfz4mbkRSgfaeQ4nIXvJ3d5pkc2lGXbxFzRsDzkszIfhBpPiLkTw5fW8k9mg0aZQX5YvkRAQw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Oleksandr Tyshchenko <Oleksandr_Tyshchenko@xxxxxxxx>, Grygorii Strashko <grygorii_strashko@xxxxxxxx>
  • Delivery-date: Mon, 14 Apr 2025 08:14:56 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHbrRVLbOHOtwYZX0m+iXoOaHec7Q==
  • Thread-topic: [ImageBuilder] uboot-script-gen: add xen xsm policy loading support

From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>

This patch adds Xen XSM policy loading support.

The configuration file XEN_POLICY specifies Xen hypervisor
XSM policy binary to load.

Signed-off-by: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
---
 README.md                |  2 ++
 scripts/uboot-script-gen | 33 +++++++++++++++++++++++++++++++++
 2 files changed, 35 insertions(+)

diff --git a/README.md b/README.md
index 137abef153ce..9106d2a07302 100644
--- a/README.md
+++ b/README.md
@@ -91,6 +91,8 @@ Where:
 - XEN specifies the Xen hypervisor binary to load. Note that it has to
   be a regular Xen binary, not a u-boot binary.
 
+- XEN_POLICY specifies the Xen hypervisor XSM policy binary to load.
+
 - XEN_COLORS specifies the colors (cache coloring) to be used for Xen
   and is in the format startcolor-endcolor
 
diff --git a/scripts/uboot-script-gen b/scripts/uboot-script-gen
index c4d26caf5e0e..343eba20e4d9 100755
--- a/scripts/uboot-script-gen
+++ b/scripts/uboot-script-gen
@@ -315,6 +315,15 @@ function xen_device_tree_editing()
     dt_set "/chosen" "#size-cells" "hex" "0x2"
     dt_set "/chosen" "xen,xen-bootargs" "str" "$XEN_CMD"
 
+    if test "$XEN_POLICY" && test $xen_policy_addr != "-"
+    then
+        local node_name="xen-policy@${xen_policy_addr#0x}"
+
+        dt_mknode "/chosen" "$node_name"
+        dt_set "/chosen/$node_name" "compatible" "str_a" "xen,xsm-policy 
xen,multiboot-module multiboot,module"
+        dt_set "/chosen/$node_name" "reg" "hex" "$(split_addr_size 
$xen_policy_addr $xen_policy_size)"
+    fi
+
     if test "$DOM0_KERNEL"
     then
         local node_name="dom0@${dom0_kernel_addr#0x}"
@@ -900,6 +909,14 @@ xen_file_loading()
     kernel_addr=$memaddr
     kernel_path=$XEN
     load_file "$XEN" "host_kernel"
+
+    xen_policy_addr=="-"
+    if test "$XEN_POLICY"
+    then
+        xen_policy_addr=$memaddr
+        load_file "$XEN_POLICY" "xen_policy"
+        xen_policy_size=$filesize
+    fi
 }
 
 linux_file_loading()
@@ -939,6 +956,22 @@ bitstream_load_and_config()
 
 create_its_file_xen()
 {
+    if test "$XEN_POLICY" && test $xen_policy_addr != "-"
+    then
+        cat >> "$its_file" <<- EOF
+        xen_policy {
+            description = "Xen XSM policy binary";
+            data = /incbin/("$XEN_POLICY");
+            type = "kernel";
+            arch = "arm64";
+            os = "linux";
+            compression = "none";
+            load = <$xen_policy_addr>;
+            $fit_algo
+        };
+       EOF
+    fi
+
     if test "$DOM0_KERNEL"
     then
         if test "$ramdisk_addr" != "-"
-- 
2.34.1



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.