[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v5 0/7] ARM split hardware and control domains


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jason Andryuk <jason.andryuk@xxxxxxx>
  • Date: Wed, 16 Apr 2025 17:29:04 -0400
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sl42oGSVJ5tdONDIQTNmAmSgYy+P+a6JrWP+kdTHfEg=; b=VDRnIfp3qfqjzlpgc4RI+gRkWaTbDhVa96NbB6mYf+DI59Hsc7zfEy5kNB0ltV85orYNHVzdNFTurhsHybV5WhAJIkzN/w3sveC427PMmv0FXqZa300pOTcjt+Sgg/RshD2FUCUmh5r6k5zIMxDsVYxWX7aqU+Tvh4HczZwo4i/SDFru/STsSKEfY+FrivheHrSdUOnkrCLkF7kWw/fzyn5J083dB7OqpyRJSPJu7gyX3QMxw58RukmjV+v7t2vc/E5GnkG8r2DzPhyjXeXtkTeXTmc7Md0AhkAdAicfcolFGIdvTkSoujM0Be1jOhy+EYZ/Xeg+9678eDi/N1Z9Ew==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cRplAWU6BfRBLaMYeA9HLUb6wJwGyClzUXKUoBn8ea9oEZRmalbUevX76sAxPavHr+LK+0XxAiLMEi6ZroPFZASn095IjbqBV84V46PBUs1jTXLF1QYKZiqJFuyUb3FjrKOGbxQXznsxbK/ptooxfydYyDmsGUFVW3E/4BSNhJzOJV4j4aciZfigdcVT5xfnknxl8ax+37dGa+uGq3Kt5EKCLS9KPyedXnKWecGe/a1F38HegrJINzvBL3gcNOzwIq5wEVpEeX6nYPgQPFtDGgJZ+H+3tIvGnlwTiRy5IEfMKL71KfGa6yAon6qutjkRJqJOSdi/Xq5rTFQ0FG7lwg==
  • Cc: Jason Andryuk <jason.andryuk@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, "Volodymyr Babchuk" <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, "Jan Beulich" <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Wed, 16 Apr 2025 21:29:35 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

This series implements separation of dom0 into separate hardware and
control domains.  It uses the capabilities idea from Hyperlaunch -
hardware, control, and xenstore.  It's been tested with dom1 as
control, dom2 as a domU, and dom3 as hardware and xenstore.

To keep things more managable, this is only the ARM hypervisor changes,
and one associated init-dom0less change.  The series is slightly
re-ordered to move xenstore changes ahead of adding the capabilities.

Setting hardware domain as domid 0 is removed.

v5 is fully reviewed.

I've been unable to run a combined control/xenstore.  Linux console
output stops shortly after the domain determines it should be XS_LOCAL.
I have not investigated further.  An ARM xenstore domain also has
console output stop at seemingly the same place.

Daniel P. Smith (1):
  xen: introduce hardware domain create flag

Jason Andryuk (6):
  xen/arm: dom0less hwdom construction
  xen/arm: dom0less delay xenstore initialization
  xen/arm: dom0less seed xenstore grant table entry
  tools/init-dom0less: Only seed legacy xenstore grants
  xen/arm: dom0less use has_dtb local variable
  xen/arm: Add capabilities to dom0less

 docs/misc/arm/device-tree/booting.txt     |  11 ++
 tools/helpers/init-dom0less.c             |  10 +-
 xen/arch/arm/dom0less-build.c             | 197 ++++++++++++++++------
 xen/arch/arm/domain.c                     |   3 +-
 xen/arch/arm/domain_build.c               |  11 +-
 xen/arch/arm/include/asm/dom0less-build.h |   2 +
 xen/arch/arm/include/asm/domain_build.h   |   3 +-
 xen/arch/x86/setup.c                      |   3 +-
 xen/common/domain.c                       |  19 ++-
 xen/common/grant_table.c                  |  14 ++
 xen/include/public/bootfdt.h              |  31 ++++
 xen/include/xen/domain.h                  |   2 +
 xen/include/xen/grant_table.h             |   4 +
 xen/include/xen/types.h                   |   1 +
 14 files changed, 247 insertions(+), 64 deletions(-)
 create mode 100644 xen/include/public/bootfdt.h

-- 
2.49.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.