[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [RFC 35/38] x86/hyperlaunch: add multidomain construction logic
Introduce the logic to loop over boot_info->domains and construct each valid entry in the array. Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx> --- xen/arch/x86/domain-builder/core.c | 32 ++++++++++++++++++++++++---- xen/arch/x86/domain-builder/domain.c | 7 ++++-- xen/arch/x86/hvm/dom_build.c | 5 ++++- xen/arch/x86/setup.c | 11 ++++++---- 4 files changed, 44 insertions(+), 11 deletions(-) diff --git a/xen/arch/x86/domain-builder/core.c b/xen/arch/x86/domain-builder/core.c index f693aa46d278..2712703e17e6 100644 --- a/xen/arch/x86/domain-builder/core.c +++ b/xen/arch/x86/domain-builder/core.c @@ -166,16 +166,40 @@ static int __init build_core_domains(struct boot_info *bi) unsigned int __init builder_create_domains(struct boot_info *bi) { unsigned int build_count = 0; - struct boot_domain *bd = &bi->domains[0]; + int i; if ( bi->nr_domains == 0 ) panic("%s: no domains defined\n", __func__); - if ( bd->kernel == NULL && bd->capabilities & BUILD_CAPS_CONTROL ) - panic("%s: control domain missing kernel\n", __func__); - build_count = build_core_domains(bi); + if ( ! IS_ENABLED(CONFIG_MULTIDOMAIN_BUILDER) ) + goto out; + + for ( i = 0; i < bi->nr_domains; i++ ) + { + struct boot_domain *bd = &bi->domains[i]; + + if ( bd->constructed ) + continue; + + if ( bd->mode & BUILD_MODE_PARAVIRT ) + { + printk(XENLOG_WARNING "don't support PV DomU, skipping %d\n", i); + continue; + } + + arch_create_dom(bi, bd); + if ( bd->d ) + { + bd->constructed = true; + build_count++; + } + else + printk(XENLOG_WARNING "failed to construct build domain %d\n", i); + } + + out: /* Free temporary buffers. */ free_boot_modules(); diff --git a/xen/arch/x86/domain-builder/domain.c b/xen/arch/x86/domain-builder/domain.c index 919df1ffb1c3..7f5bee0dc759 100644 --- a/xen/arch/x86/domain-builder/domain.c +++ b/xen/arch/x86/domain-builder/domain.c @@ -321,8 +321,11 @@ struct domain *__init arch_create_dom( ((hvm_hap_supported() && !opt_dom0_shadow) ? XEN_DOMCTL_CDF_hap : 0)); - dom_cfg.arch.emulation_flags |= - XEN_X86_EMU_LAPIC | XEN_X86_EMU_IOAPIC | XEN_X86_EMU_VPCI; + if ( bd->capabilities & BUILD_CAPS_HARDWARE ) + dom_cfg.arch.emulation_flags |= + XEN_X86_EMU_LAPIC | XEN_X86_EMU_IOAPIC | XEN_X86_EMU_VPCI; + else + dom_cfg.arch.emulation_flags |= X86_EMU_LAPIC; } if ( bd->capabilities & BUILD_CAPS_HARDWARE ) diff --git a/xen/arch/x86/hvm/dom_build.c b/xen/arch/x86/hvm/dom_build.c index 4f614aea34c3..db7bf9a6934a 100644 --- a/xen/arch/x86/hvm/dom_build.c +++ b/xen/arch/x86/hvm/dom_build.c @@ -885,7 +885,10 @@ static int __init pvh_load_kernel( } start_info.magic = XEN_HVM_START_MAGIC_VALUE; - start_info.flags = SIF_PRIVILEGED | SIF_INITDOMAIN; + if ( is_control_domain(d) ) + start_info.flags = SIF_PRIVILEGED; + if ( is_hardware_domain(d) ) + start_info.flags = SIF_INITDOMAIN; rc = hvm_copy_to_guest_phys(last_addr, &start_info, sizeof(start_info), v); if ( rc ) { diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index da5a8e8d8ed3..09b1fc94426d 100644 --- a/xen/arch/x86/setup.c +++ b/xen/arch/x86/setup.c @@ -1319,10 +1319,13 @@ void asmlinkage __init noreturn __start_xen(void) xen->size = __2M_rwdata_end - _stext; } - bi->domains[0].kernel->headroom = - bzimage_headroom(bootstrap_map_bm(bi->domains[0].kernel), - bi->domains[0].kernel->size); - bootstrap_unmap(); + for ( i = 0; i < bi->nr_domains; i++ ) + { + bi->domains[i].kernel->headroom = + bzimage_headroom(bootstrap_map_bm(bi->domains[i].kernel), + bi->domains[i].kernel->size); + bootstrap_unmap(); + } #ifndef highmem_start /* Don't allow split below 4Gb. */ -- 2.30.2
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |