[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 15/15] x86/hyperlaunch: add capabilities to boot domain


  • To: Jason Andryuk <jason.andryuk@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • Date: Wed, 11 Dec 2024 14:51:14 -0500
  • Arc-authentication-results: i=1; mx.zohomail.com; dkim=pass header.i=apertussolutions.com; spf=pass smtp.mailfrom=dpsmith@xxxxxxxxxxxxxxxxxxxx; dmarc=pass header.from=<dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1733946678; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:Subject:To:To:Message-Id:Reply-To; bh=Pt25ELFfkt7OmxOKkJjl/OzhaL1ZMQn6CcuxTcaayLQ=; b=CnWE52WvhT7OPEEX1YRZgIkECiNdtwWDIXMxPOI7qmN4wWvErLgp/E3FbjOfQVkYgWf9KrpY9EYCQyaNGl8fgkr4uyIC9Fd+BgzuF6FxM9y1BrlC28R2hnSjfPS1gX0oKP1ZCbR6Iz58SnSCMBEX/g0P5qIs5vTiPGdYi7a6J0w=
  • Arc-seal: i=1; a=rsa-sha256; t=1733946678; cv=none; d=zohomail.com; s=zohoarc; b=Jh0XrYeuquUXX6DBpf2JWYuOW5S1J7Ef8oF2q3Ld9Xu0c1tkS3GkyZZ6r/RZEs9Cp41QBX2+NRbejhs6lvL10rBfHf6/KtN6JDtIeLodU94vE3dQGZQ1PkH1HC/WU34YUpxFikgimdhDYdaM33aFk+DrPvg3yvySYUSfdnPq27c=
  • Cc: christopher.w.clark@xxxxxxxxx, stefano.stabellini@xxxxxxx, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Wed, 11 Dec 2024 19:51:28 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 11/25/24 19:09, Jason Andryuk wrote:
On 2024-11-23 13:20, Daniel P. Smith wrote:
Introduce the ability to assign capabilities to a domain via its definition in
device tree. The first capability enabled to select is the control domain
capability. The capability property is a bitfield in both the device tree and
`struct boot_domain`.

Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
---
  xen/arch/x86/domain_builder/core.c    |  2 +-
  xen/arch/x86/domain_builder/fdt.c     | 13 +++++++++++++
  xen/arch/x86/include/asm/bootdomain.h |  4 ++++
  xen/arch/x86/setup.c                  |  6 +++++-
  4 files changed, 23 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/domain_builder/core.c b/xen/arch/x86/ domain_builder/core.c
index 95cab06e6159..eaa019472724 100644
--- a/xen/arch/x86/domain_builder/core.c
+++ b/xen/arch/x86/domain_builder/core.c
@@ -93,9 +93,9 @@ void __init builder_init(struct boot_info *bi)
          i = first_boot_module_index(bi, BOOTMOD_UNKNOWN);
          bi->mods[i].type = BOOTMOD_KERNEL;
          bi->domains[0].kernel = &bi->mods[i];
+        bi->domains[0].capabilities |= BUILD_CAPS_CONTROL;
          bi->nr_domains = 1;
      }
-

This will get cleaned up earlier.

With that:

Reviewed-by: Jason Andryuk <jason.andryuk@xxxxxxx>

Thanks!



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.