[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH] xen/arm, xen/common: Add Kconfig option to control Dom0 boot
This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to allow for building Xen without support for booting a regular domain (Dom0). This functionality is primarily intended for the ARM architecture. A new Kconfig symbol, `HAS_DOM0`, has been added and is selected by default for ARM architecture. This symbol signifies that an architecture has the capability to support a Dom0. The `DOM0_BOOT` option depends on `HAS_DOM0` and defaults to 'y'. For expert users, this option can be disabled (`CONFIG_EXPERT=y` and no `CONFIG_DOM0_BOOT` in the config), which will compile out the Dom0 creation code on ARM. This is useful for embedded or dom0less-only scenarios to reduce binary size and complexity. The ARM boot path has been updated to panic if it detects a non-dom0less configuration while `CONFIG_DOM0_BOOT` is disabled, preventing an invalid boot. Signed-off-by: Oleksii Moisieiev <oleksii_moisieiev@xxxxxxxx> --- CONFIG_DOM0_BOOT Kconfig option was introduced to make the Dom0 regular (legacy) domain an optional feature that can be compiled out from the Xen hypervisor build. The primary motivation for this change is to enhance modularity and produce a cleaner, more specialized hypervisor binary when a control domain is not needed. In many embedded or dedicated systems, Xen is used in a "dom0less" configuration where guests are pre-configured and launched directly by the hypervisor. In these scenarios, the entire subsystem for booting and managing Dom0 is unnecessary. This approach aligns with software quality standards like MISRA C, which advocate for the removal of unreachable or unnecessary code to improve safety and maintainability. Specifically, this change helps adhere to: MISRA C:2012, Rule 2.2: "There shall be no dead code" In a build configured for a dom0less environment, the code responsible for creating Dom0 would be considered "dead code" as it would never be executed. By using the preprocessor to remove it before compilation, we ensure that the final executable is free from this unreachable code. This simplifies static analysis, reduces the attack surface, and makes the codebase easier to verify, which is critical for systems requiring high levels of safety and security. --- xen/arch/arm/Kconfig | 1 + xen/arch/arm/domain_build.c | 8 ++++++++ xen/arch/arm/setup.c | 14 ++++++++++---- xen/common/Kconfig | 11 +++++++++++ 4 files changed, 30 insertions(+), 4 deletions(-) diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index bf6d1cf88e..29399183e8 100644 --- a/xen/arch/arm/Kconfig +++ b/xen/arch/arm/Kconfig @@ -19,6 +19,7 @@ config ARM select HAS_ALTERNATIVE if HAS_VMAP select HAS_DEVICE_TREE select HAS_DOM0LESS + select HAS_DOM0 select HAS_GRANT_CACHE_FLUSH if GRANT_TABLE select HAS_STACK_PROTECTOR select HAS_UBSAN diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index ed668bd61c..9b8993df80 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -40,8 +40,10 @@ #include <asm/grant_table.h> #include <xen/serial.h> +#ifdef CONFIG_DOM0_BOOT static unsigned int __initdata opt_dom0_max_vcpus; integer_param("dom0_max_vcpus", opt_dom0_max_vcpus); +#endif /* * If true, the extended regions support is enabled for dom0 and @@ -102,6 +104,7 @@ int __init parse_arch_dom0_param(const char *s, const char *e) */ #define DOM0_FDT_EXTRA_SIZE (128 + sizeof(struct fdt_reserve_entry)) +#ifdef CONFIG_DOM0_BOOT unsigned int __init dom0_max_vcpus(void) { if ( opt_dom0_max_vcpus == 0 ) @@ -114,6 +117,7 @@ unsigned int __init dom0_max_vcpus(void) return opt_dom0_max_vcpus; } +#endif /* * Insert the given pages into a memory bank, banks are ordered by address. @@ -1953,6 +1957,7 @@ int __init construct_domain(struct domain *d, struct kernel_info *kinfo) return 0; } +#ifdef CONFIG_DOM0_BOOT static int __init construct_dom0(struct domain *d) { struct kernel_info kinfo = KERNEL_INFO_INIT; @@ -1984,6 +1989,7 @@ static int __init construct_dom0(struct domain *d) return construct_hwdom(&kinfo, NULL); } +#endif int __init construct_hwdom(struct kernel_info *kinfo, const struct dt_device_node *node) @@ -2037,6 +2043,7 @@ int __init construct_hwdom(struct kernel_info *kinfo, return construct_domain(d, kinfo); } +#ifdef CONFIG_DOM0_BOOT void __init create_dom0(void) { struct domain *dom0; @@ -2089,6 +2096,7 @@ void __init create_dom0(void) set_xs_domain(dom0); } +#endif /* CONFIG_DOM0_BOOT */ /* * Local variables: diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c index 12b76a0a98..c1463d647a 100644 --- a/xen/arch/arm/setup.c +++ b/xen/arch/arm/setup.c @@ -480,12 +480,18 @@ void asmlinkage __init start_xen(unsigned long fdt_paddr) enable_errata_workarounds(); enable_cpu_features(); - /* Create initial domain 0. */ - if ( !is_dom0less_mode() ) + if ( IS_ENABLED(CONFIG_DOM0_BOOT) && !is_dom0less_mode() ) + { + /* Create initial domain 0. */ create_dom0(); + } else - printk(XENLOG_INFO "Xen dom0less mode detected\n"); - + { + if ( is_dom0less_mode()) + printk(XENLOG_INFO "Xen dom0less mode detected\n"); + else + panic("Xen dom0less mode not detected, aborting boot\n"); + } if ( acpi_disabled ) { create_domUs(); diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 64865112a1..75039138b0 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -21,6 +21,14 @@ config DOM0LESS_BOOT Xen boot without the need of a control domain (Dom0), which could be present anyway. +config DOM0_BOOT + bool "Dom0 boot support" if EXPERT + depends on HAS_DOM0 && HAS_DEVICE_TREE && DOMAIN_BUILD_HELPERS + default y + help + Dom0 boot support enables Xen to boot to the control domain (Dom0) and + manage domU guests using the Xen toolstack with provided configurations. + config DOMAIN_BUILD_HELPERS bool @@ -92,6 +100,9 @@ config HAS_DEVICE_TREE config HAS_DOM0LESS bool +config HAS_DOM0 + bool + config HAS_DIT # Data Independent Timing bool -- 2.34.1
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |