From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606623; cv=pass; d=zohomail.com; s=zohoarc; b=JktA5nJx7XT29tX9RBbjqQR4KOLr/HuOgy2I1fgaH2cI7t8+cuhMdGD7mKTn3sQACGxPOCB5BCIbajtNhuLf+zVsSX/2OSeFTte6SNLm+Z0Z/JN/x7GbEyd6evEJCv1UKh8MGMRNva97zAzUJ6vnEseVBExCL94Fxr/ZGjk4rYA= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606623; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=R/xCzdlcj7D1GVkyCv6SYm+nmyW2Z3DgicYLAF7U5oA=; b=jDSdhPJxPhpEi6QDiPhhMqgkyihvWmj8NBdI1cjBWW+01Zy6oSePsGZGnmq+hIm42K9riMeFA3jwfD8CZ7jLKSPDqM2yvtQAuRwk60OiSshMDjf9ZpXWcLfIsVJb4D1jJq6gDEw79bjL28k7DK4x2BsocAajeNZNDNVfoW6m6NA= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606623177523.840606187481; Fri, 30 May 2025 05:03:43 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000712.1380926 (Exim 4.92) (envelope-from ) id 1uKySJ-00083k-Tj; Fri, 30 May 2025 12:03:23 +0000 Received: by outflank-mailman (output) from mailman id 1000712.1380926; Fri, 30 May 2025 12:03:23 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySJ-00083b-QT; Fri, 30 May 2025 12:03:23 +0000 Received: by outflank-mailman (input) for mailman id 1000712; Fri, 30 May 2025 12:03:21 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySH-0007de-SC for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:21 +0000 Received: from NAM02-BN1-obe.outbound.protection.outlook.com (mail-bn1nam02on20613.outbound.protection.outlook.com [2a01:111:f403:2407::613]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 1088ca3f-3d4e-11f0-b894-0df219b8e170; Fri, 30 May 2025 14:03:15 +0200 (CEST) Received: from CH0PR04CA0058.namprd04.prod.outlook.com (2603:10b6:610:77::33) by BY5PR12MB4226.namprd12.prod.outlook.com (2603:10b6:a03:203::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.30; Fri, 30 May 2025 12:03:12 +0000 Received: from CH2PEPF00000145.namprd02.prod.outlook.com (2603:10b6:610:77:cafe::c9) by CH0PR04CA0058.outlook.office365.com (2603:10b6:610:77::33) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8746.31 via Frontend Transport; Fri, 30 May 2025 12:03:11 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000145.mail.protection.outlook.com (10.167.244.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:11 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:06 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1088ca3f-3d4e-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=R9fILf8M2WvUdjS8LUbLf+SMstpv1/TRiUDL6C93fcjdmMXw5GzsazJdL8RJ6OtWEzgwY8V7qpU2sc6SYQ+7T8sa0DYjpS7pEQzU7+CCA+JVfMF4EVN74cZ39bsSXMt7N2oFetu0OteXin5FtDUyOq0YatiYnNF5KfIOLSdBGMAtyeDYoBzKxjOOcYpaFWJK1Zkdf1EyzyqiWwFVS4dmt7c/TYH3cepJjM1qzhBZEPnNfOf8/QIDEDahxoa0KUm+fwlHMf9D6sTfWpE74MH8xcxx0Sjiq/18pd+1vWT18d/0eJf1VNSaHmrPwaSNuTLBg98j1H2WX08Bfm1P6uemUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=R/xCzdlcj7D1GVkyCv6SYm+nmyW2Z3DgicYLAF7U5oA=; b=Kg68PhFHHQrDGi8f1LoC/72ywUP9pDxsvfYvSKOrdXHZ4ShIeLUKwqvvdDy5UEqgsiLFEw0k3bt+3EFmJfTFEcEiZiesNfGMmFbZBXx33Xh1L3GD2duZU0lq3vOfNoZdpwtB0fUmIniQ5mm6WGo4UJPWOI71qKjIi0WBhyjUTKPwPgzMDjd7FTkXdzyFMPM2KoXnSPuLk39Vw+MEf4ZqzkOysqod5MNZ7Pkxf+k395FEJ8/xb69NNVxSyoAb/KFC7/pbGlXNZXm4mny8nyDyIexS5tPRlddAxjfTg94eHVJ7ocRRHYjlATYBsi4EhAcccaPNfP+yeQuyBBJv3SzC6w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=R/xCzdlcj7D1GVkyCv6SYm+nmyW2Z3DgicYLAF7U5oA=; b=o6Gb8rYw3IHwnCLUx01SBCN7ZtrBjSctURWLH5NaLKVGpRhY4KBIMpzMp/kV/7R/75gVLpBQixuvL5BGZ21UCprA9YVMzl14Toz9Idq8mlKFWnDhl+El+at1zWcFog7C+mWyTGHI8eNaQR7TShFfQrbaP7MOZRjp/+HonpHt0qM= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Daniel P. Smith" Subject: [PATCH 01/19] licence: Add missing SPDX line to bootfdt.h Date: Fri, 30 May 2025 14:02:09 +0200 Message-ID: <20250530120242.39398-2-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000145:EE_|BY5PR12MB4226:EE_ X-MS-Office365-Filtering-Correlation-Id: 2ecac68e-9117-4176-cc4b-08dd9f71f33a X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|1800799024|376014|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?2lnKy2gPzt/cWyMX9RTH8PfSz3g4MPpyFPd3+BIcmrdqUmnn4ZI6YKuBHAD8?= =?us-ascii?Q?/+VIkuFfR6UIN/+r3Ydt4kLWh6fbjveaUleGGoiKzOET0yESLRrmfRMRq0I9?= =?us-ascii?Q?H7TwyqKMkNN2CNjMJWg+NI/O5bdIE+SeJW6IUQ6qDR5Z4U0q+n9dnI3HX52y?= =?us-ascii?Q?rSEoosCBw9B9qbOrbxCW8qjUnaZDRMBtUROhFY27iA6KeskqgYE1vB5Mfx+E?= =?us-ascii?Q?eVz9D0tjBmYnHZw92lswBB0t8sqrmxrt7K9V6FVtjnJOp6gSMEozme0eAS+5?= =?us-ascii?Q?8LcBX7ij099yj2ohbVdqUtSzS5SGRH39TXAzFMunvsXrSBZQ6RoBsGeKb9KE?= =?us-ascii?Q?OG0pWQX0vBV45Dm2LxIUL0GgLq8K1nFN/4kbjz9Aa63ESSxBANPUJSpgFeLo?= =?us-ascii?Q?ULFUFE7twZC7ThOQ7uIHCw45KEU4Rs+YiBYfMYlQkwlemsiuNZ1Slk6S3yFF?= =?us-ascii?Q?ulrU4XeWB9liUO//75vPnwalozchmTKSLAjLqoYLiXFVsSot1rh+blCn7Pm2?= =?us-ascii?Q?BPDljhWpIbxS+stwYM7rAHBSXJKbH30ohWoUlLCYPNfDi9uDj2r6Qu4nmnZz?= =?us-ascii?Q?s6B6TBjnS6qOdjnqiDQQVzQk6mseAjjGSxS/ET0RX+hPvxmutR5ePA3CwObW?= =?us-ascii?Q?YhLdrSLuebI76bbsHX8dMswPWLiKExe2p518uTNwp6AK18YJvmQQkm8b7xJ6?= =?us-ascii?Q?Ha6ngNIfgvp32daoiJi1+Y89y+AGblSlZ5emCotKnTJsS29QUIrJpKWPBeIt?= =?us-ascii?Q?KwILVfiQ0T8x7FO9oAg0+qdNNnzG/SlY9ElJNXxawarS+I+0lsfeUNF+ILi5?= =?us-ascii?Q?kj7xLJ4G4BnSCo04frq9dGAwnATV/0LRavbEeVxQez0zFzHjkXcIIWgubu5S?= =?us-ascii?Q?jgJ2fzF63BRqM6MPT/sSfkd4gmsLecwCB1wOROA43a7k8IX/tWEAzGpa/R3p?= =?us-ascii?Q?SyuMF6NQUyOb+d6oalWkYGiahucoAlYH2F8YuitX5dzKl0qBOw6eNB18v+gv?= =?us-ascii?Q?ucJwsxMg8ELdsU8o6DEgwp5d3/7SuQ1DKvT5VY2ft9Eyaw/ZZ+m5HkHVVhzP?= =?us-ascii?Q?vK4YDBOVvxLQP9I5jGCaUJw9NpLLbxPZmbLDcE2EJf7nsG0IZSXNay4pIuVg?= =?us-ascii?Q?rCtpwkCh17FpXMQbjlrgZSvpccWXvYIDvjSLTU/6wAakfl4tcf+TaEFGKiyK?= =?us-ascii?Q?3tsCKTZglU0xmsjejEIC1Oh/ZpKUHK7U2ndNNRW0jiE5WsQqNRoI6GpyKwTM?= =?us-ascii?Q?eeH8xHIxvajotWE8Jh4j78Ua/IoyWMDqmNsLf6HTUN152E+Fj/G+IaGPe5Y7?= =?us-ascii?Q?qRvdXIAm7L+CUquVyaUFGVrHCHaB09N34AWtg14pM7IqI+9E1aU2VESUGWZH?= =?us-ascii?Q?T67MvbMYgQBZ26YI+9OqKCRLnk57YUVjxKhrGV5xD5FhIAtq18K7HGWGXoAe?= =?us-ascii?Q?2sPXbdv8IghOw+GnQNXOWU0KMe6b/jVhVZpHUPFUpVULkj6JiopljJ6VGhhe?= =?us-ascii?Q?//H257qXUS/gCNPp3WfWF0JLjyylIZJNy+Tx?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(1800799024)(376014)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:11.6781 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2ecac68e-9117-4176-cc4b-08dd9f71f33a X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000145.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR12MB4226 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606624698116600 Content-Type: text/plain; charset="utf-8" Signed-off-by: Alejandro Vallejo Acked-by: Michal Orzel --- xen/include/xen/bootfdt.h | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/include/xen/bootfdt.h b/xen/include/xen/bootfdt.h index 80a90e53c0..847f019559 100644 --- a/xen/include/xen/bootfdt.h +++ b/xen/include/xen/bootfdt.h @@ -1,3 +1,4 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ #ifndef XEN_BOOTFDT_H #define XEN_BOOTFDT_H =20 --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606621; cv=pass; d=zohomail.com; s=zohoarc; b=Scu512iU9ujQ9/nb1wktvuQmpILanzEXRqUqrtzzNbX46cq0BUQI1zxQLo5I0OGWZXQnWnOdMXSfl3t+kXRNJE03k3zk9IT3wkZdPWS7Q1y2k2aG6gsNPBi/JUMeYugaJwZUA+l6MVCg+2fCxwOGNsmfTGy+KzUHB68yTHYiRfU= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606621; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=7W+IdG09q2V5cYYJHkwKMYlqTJGKHIna1geSKV6F7AA=; b=l3wwubf4sYudANfyQVcRTkI2RPx8MJUREaKX7sx+ppq90Sl+csgA2DeezpRMcDZRX7B2KAz+8pljn7DeijOoZljB2h0q4eLTceWgTQ9YQ13Attr2ixcCtLqePj9ki6PPfQmypL5GLPdwPG2NoI6Of5kcAy1GhYN046REP8lWxcc= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606621114826.4664994802417; Fri, 30 May 2025 05:03:41 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000709.1380896 (Exim 4.92) (envelope-from ) id 1uKySE-0007Kj-5O; Fri, 30 May 2025 12:03:18 +0000 Received: by outflank-mailman (output) from mailman id 1000709.1380896; Fri, 30 May 2025 12:03:18 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySE-0007Kb-2k; Fri, 30 May 2025 12:03:18 +0000 Received: by outflank-mailman (input) for mailman id 1000709; Fri, 30 May 2025 12:03:16 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySC-00076q-SS for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:16 +0000 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on20612.outbound.protection.outlook.com [2a01:111:f403:2415::612]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 110c29ae-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:16 +0200 (CEST) Received: from MW4P222CA0020.NAMP222.PROD.OUTLOOK.COM (2603:10b6:303:114::25) by IA1PR12MB6284.namprd12.prod.outlook.com (2603:10b6:208:3e4::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.29; Fri, 30 May 2025 12:03:12 +0000 Received: from CH2PEPF00000143.namprd02.prod.outlook.com (2603:10b6:303:114:cafe::22) by MW4P222CA0020.outlook.office365.com (2603:10b6:303:114::25) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.19 via Frontend Transport; Fri, 30 May 2025 12:03:12 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000143.mail.protection.outlook.com (10.167.244.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:11 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:08 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 110c29ae-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=GElndKOkiJUAUW/w1FNZ82qllyMNIKHwCZ2eAoLTdN9/qNzHTunAr8MpDFSEeaGW4wZ4JpZeISFTy0mA6LaHYbbXXUQoiiXSVjfoacPvLS5fC5h9c4WMn8Z6+UmFE/IsUilpMG9jt5uuswQsA7Uc6D/5XzVTwmizHaPCpt7/ocJBqgpM99XwWNy8tBkOC6AgB671qITGOURF0MLi7H1ItFfBgEOm4kBAhlQjCtdhCdlvmIHzLqYgOWBifeK1qP8OGxdN0qfG5qUwHlotnDpKmrroTp4cNBx/5zxQAq0uVUsxeKqTGsAA2ofzU9wvf8Accdn6IeRolvZpjC0836RwKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7W+IdG09q2V5cYYJHkwKMYlqTJGKHIna1geSKV6F7AA=; b=GLS/xmZdvkTdoz+qKAUeT+Vf0kiFv7EmuMgXOO4LEngiJbyQDP9j1hYZrErCafuRv3b0VpgLwgoCNoSChoHjkdhvCuBoCbFrQkA4/IxcW5H2TReGHVLi88b5ZWBYKKNskd3KN2VlKw+pO6Hz+yu0ixqZC6dWYKuC6eBgWwNd9f2LpYDqzMJL7vHnXxdUKEooiAXx2aUJE2/kOA/+AP0NDODx1JGimPoMzcqFnDRudVlpmGCSGBPGIvYwvY96t6R1X2BKUOPoYaf+WMCOOSc4nnp08oNahc3QCupGkCbzw3rTTJf2Rxl7/1KZMSx7vrPJFxAEPSpSg/psecuDqbmHzw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7W+IdG09q2V5cYYJHkwKMYlqTJGKHIna1geSKV6F7AA=; b=e48aPTwUY+D4EjXB9BApGt6oqm47vsWjhydVbHcVcFxIALuNqhFjzaxsPS98yIIhyyYxR7Bt7llTtKah25y0EOiBQDdq+c0lIRIDarXx5YUT1Wjy/MZbn8hB/tOk48SOzOx3GtAef9ry4giI87ZAeEqjUsF6WLGWoeDNhpLZi+Y= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , "Daniel P. Smith" Subject: [PATCH 02/19] x86: Add missing pci_dev forward declaration in asm/pci.h Date: Fri, 30 May 2025 14:02:10 +0200 Message-ID: <20250530120242.39398-3-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000143:EE_|IA1PR12MB6284:EE_ X-MS-Office365-Filtering-Correlation-Id: bed11e48-bb67-4927-65ab-08dd9f71f34e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?UKIMEIcjSWF/2ZKSXm0OXI7R9bWaB5oopy71E8ISHADMJmCf/5FEvCjyJBEA?= =?us-ascii?Q?Ii011HVmJWZHKbSvZKGPF6e/fSomdvyYS8Ro4eeYyc3ImvAXUuAvKpgnrEIw?= =?us-ascii?Q?N4OauvoFQbuatXpRpGdlJ0nnOtbC1CLlx7hwgsjoPFsHbT6nKQVtFKB9yQS5?= =?us-ascii?Q?nY4DPh+Rht9b1VgNWJck9hLGNM2Aqdxt1VNcp+/4hE5GvpzRfB2jEZ3Ff7Of?= =?us-ascii?Q?zy+MgzQyn4MT3szx1l/7KE9Cx6ugMZw8bwFoYijvCabo+bTKsJijEFZgk/jN?= =?us-ascii?Q?vOjaFfM8YIgJWzmzSobFRSv6Sx3YRFyhvVKN4V1jmgAJMzVVDevq2GLazDui?= =?us-ascii?Q?/+vOcHsB/0zPLIKmqqWbuqnpNS6H2QPEk85iN5Fkw2KAjbp8/GUo0q0AboTJ?= =?us-ascii?Q?uR71DSx5AyvHvXGGYogKVFU0iCyS5sPmQWXytqmzoGzyX5KYzGnykGy+amTB?= =?us-ascii?Q?vvGXA/47H9NARbzuSthiAmXiZ35Ub+TDBQOQIq/hOiPH0fxt5J2a2KgxY7qz?= =?us-ascii?Q?89aRFl5IVY+EQtAqR0n6xNE81J500+K2fr33hbHeO+D2GNIUMaVbVfYDoNC/?= =?us-ascii?Q?qRvW59v10ftqKBTUn2dILXuCH8deV5XStb6ovXRaJCXzXdKn0z6XO4w9d8wu?= =?us-ascii?Q?NsMqquXzDUzA0sd2hf8Pb8KfhuxVR1gO2FNtFfKMXH24aKtCYomGig45K6ds?= =?us-ascii?Q?lvF0moSOrOLURe5W6yCuwEonHBqqtiiFgS4VOA3W007h5V9SqfiYr6PEW59J?= =?us-ascii?Q?xxecOCCOtP0Yah7BMdTA0X4AQRAavms77OwSz+lPFtnHbkEdIdf2JwUxx97f?= =?us-ascii?Q?ZHS0+DcPtOSsjKbiEXOom6kXphbl7WqJBrc7zjwxGIOhA3I25+Ci5BHBo/JH?= =?us-ascii?Q?bkqN2bf5a6OxjNSlZVbGkVVP8yJkpMzhBb7zPKud7MpsIfBBOop1OKxa/tk3?= =?us-ascii?Q?IOCuzs3z/Y5s/LSPuVGNknw8vErH3L6Chw4oufe65dAwVrXitHagkYNhsAtl?= =?us-ascii?Q?3gj94QzNHtkRHp/O44M5N/vZiiv4fhoFk48J/IU70S4+iTp/TxoHSPVmBFao?= =?us-ascii?Q?mFqA8q0P0xNFE5L7L5GF41rTi4Sf54RFwBo7vJXZdcSVdm/pNarvm75AkcUA?= =?us-ascii?Q?/bBsN/2+ECLb2FGcgOcAa247KiyginBDhU6XaxTtj7KMQqswDExbfg8A38Pr?= =?us-ascii?Q?md4smBEh/Rqmwi48+iOTROrXwpjMqmXMj9bsm4iF0AIOslXLKzQGflN1RcUo?= =?us-ascii?Q?IlYW6fZBMLmMUyxzJq1uan02CgImkzkcKltJHhDXygNFqwO7PJbSjMIgshM5?= =?us-ascii?Q?lxWPfDc7KNNEs/0bfydVe/bs6xc4c6hyQfur3xD7Nyq8qA4Tl1o0hZT8B20G?= =?us-ascii?Q?cJnw7cNOYvQSfkp8aZnmjsDkoKwpli93Tb129rCVSVQniGOxGfpDZ5AcLrtK?= =?us-ascii?Q?WSwS/v+NKYfT4UiqKx+eXcr72fqlaKJYRGI27R0CpmdsRHiOIEkozJmhf5zr?= =?us-ascii?Q?OowJcdYeuS+bPHN7AjNiL6fcmI6STeTWe2DI?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(1800799024)(82310400026)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:11.8064 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: bed11e48-bb67-4927-65ab-08dd9f71f34e X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000143.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB6284 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606622935116600 Content-Type: text/plain; charset="utf-8" Not a functional change. Signed-off-by: Alejandro Vallejo Reviewed-by: Jason Andryuk Reviewed-by: Stefano Stabellini --- xen/arch/x86/include/asm/pci.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/arch/x86/include/asm/pci.h b/xen/arch/x86/include/asm/pci.h index bed99437cc..2e67cba8b9 100644 --- a/xen/arch/x86/include/asm/pci.h +++ b/xen/arch/x86/include/asm/pci.h @@ -13,6 +13,8 @@ || (id) =3D=3D 0x01128086 || (id) =3D=3D 0x0122808= 6 \ || (id) =3D=3D 0x010A8086 ) =20 +struct pci_dev; + struct arch_pci_dev { vmask_t used_vectors; /* --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606623; cv=pass; d=zohomail.com; s=zohoarc; b=S7NJmZhOPWD0EtqSql1JfS0FQPeSoHKhToUDkvwc3hTF8HQrITcPmtrDKI1vx+v+jBsBggKCJFR5dYfOUoDj9vmfPiL8bWSUy6+sgUY77at4nKo3fSpTQpRQhsmstb/ORbn8UNcpPk52xaJQzZKZhAva1+gN6oOPwQRfB8h94HA= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606623; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=dZlp56kikAIJRuj8HFFgKTWb6tROZzbFa119RYv3t1Q=; b=bBxOfEilUjVzS6+/TzVBTPCsRblceNIwJEFNt2Xg8+1+y1onDwcTFZ6nDRtHwraMHGgbTlkcj79dSBuwZimPAPUGdh2YGawsFCDxJC7ohlIGZd4A07U8P3dLWo3uetV61C4UOaBcioidQEE4atc8PKZPV+wnIXpc3Ssoq16FMUc= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606623017933.52481367702; Fri, 30 May 2025 05:03:43 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000711.1380916 (Exim 4.92) (envelope-from ) id 1uKySI-0007p1-Mn; Fri, 30 May 2025 12:03:22 +0000 Received: by outflank-mailman (output) from mailman id 1000711.1380916; Fri, 30 May 2025 12:03:22 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySI-0007os-JQ; Fri, 30 May 2025 12:03:22 +0000 Received: by outflank-mailman (input) for mailman id 1000711; Fri, 30 May 2025 12:03:20 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySG-00076q-SG for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:20 +0000 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on20622.outbound.protection.outlook.com [2a01:111:f403:2416::622]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 12ae4513-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:19 +0200 (CEST) Received: from MW4P222CA0029.NAMP222.PROD.OUTLOOK.COM (2603:10b6:303:114::34) by LV3PR12MB9356.namprd12.prod.outlook.com (2603:10b6:408:20c::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.29; Fri, 30 May 2025 12:03:13 +0000 Received: from CH2PEPF00000143.namprd02.prod.outlook.com (2603:10b6:303:114:cafe::24) by MW4P222CA0029.outlook.office365.com (2603:10b6:303:114::34) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8792.24 via Frontend Transport; Fri, 30 May 2025 12:03:13 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000143.mail.protection.outlook.com (10.167.244.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:12 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:09 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 12ae4513-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=fH8lY6rYFICPAh85Yv7hUKk3kAZcmTlsdQ+W71qL5/ZaClYMcGQk3fg9IpS/YDrElNOYCJBSqmJIPWR9mPx7mpK4q1ngIMrz5c5TQneB0s2xKpwIv7QDl5wbySNJv1tjezVP7wWLvGF7nTGvs5YxgTrwjiwT5y4+TFHCy2KOvo3KPrlnvkWEyltsFJSzCbzCw/OdZgubu70lRwVLc/F23qrAAKcPPR2eXdOkviNqLz2K92d25peSNyp1OkYIgcINTc5MnXyK4v9geWEiwGb3pV/WFFIEdSnpcCVgGHgcdgj5wT6QytOQNjxgoPhnpfYkCrc4NpQiCU8Kn67zB3fL1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dZlp56kikAIJRuj8HFFgKTWb6tROZzbFa119RYv3t1Q=; b=qiUZ6R3LgWKVsWjeU9ClafXqzE4Y8PxzsD3M5dn8UPn/2KCrzH5VS8Pd301kDPPoCKAWOwEkLcuCRbclTiUTo55yPkZLy9S87bSRswXgeMms36B2Voz/meEtiNWXOpqbz9tcnWPZ+h+1cWHcyVv8jQ6IPW+UE0GP7tCZlVJ5iNSOIOplZ48J0BVvldexhFzuuDsSpcVCsfjZDulCHvLB4gElGNjupPspc3iKNG/PGrRVZWLKmqyALfL/4Ve23eas3KH/v1vEAzrasrTCvRuZKYFe2C28gOTiW9mH24ypxF9Xg1wC0JOuVTNtf9PDh4KXV2ReKOfghl2rtBU+7fzv8g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dZlp56kikAIJRuj8HFFgKTWb6tROZzbFa119RYv3t1Q=; b=ADP7h97ZDIjHxhQd7T9mZy3hG5BUX7rcv4zZPWbONiRpsohQWDs2Qik4wV4E8CFTtlSoRHHDixo2ZCKc27DZ07Mx/KVQZGawfZ9yPXDRiKuQysfv34tIDw94JmPlT9l0IrmiVvXJRBDCqNEVmpVlTUHlC9CZzLTubwgJAS6+To4= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Alistair Francis , Bob Eshleman , "Connor Davis" , Oleksii Kurochko , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , "Stefano Stabellini" , "Daniel P. Smith" Subject: [PATCH 03/19] riscv: Add missing forward declaration to intc.h Date: Fri, 30 May 2025 14:02:11 +0200 Message-ID: <20250530120242.39398-4-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000143:EE_|LV3PR12MB9356:EE_ X-MS-Office365-Filtering-Correlation-Id: d6bab5d2-4c1e-4f26-a752-08dd9f71f3f5 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|7416014|376014|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?Uj2c/2s2+tSabQ6W/4uczojidzm8/lv83VbTkb3tzP1hCfWpuCt0i1bPvXB7?= =?us-ascii?Q?184u0CGn+g/dTbZnU0aY1GexqTVD3tXhUTIdGPyna5bN+9pQCezBwtYQ0sJJ?= =?us-ascii?Q?lK/ZARmUBCrXtK/xIL0NltmtA7vlQz66kZNXR0hUvX9CbyfVwNOFHnsg8JVE?= =?us-ascii?Q?p2SIC0gL78WKuIpGZjMrgjx+ZW+7MiXVxr9i7kJV147fvYSxfz9hZu7oV6zz?= =?us-ascii?Q?85MpMMA+i7JQTaZyL5X+N9busyTpy1WSLQZlEOkV+psPK6AMtj+377l+miYx?= =?us-ascii?Q?mER/+g4GHoBpeW3oyFb5nLa5GZLua5P5Gkiz/U4aw8LyKn2m/oMzGH8KlBdw?= =?us-ascii?Q?j7pKrgNe47HYVCMMzjkG+kFrCSPj6gHgGDK706Ozlv6Gkcwian/z9mhIRIno?= =?us-ascii?Q?5JZxqy+A/rFMmG5a4a1ds6genbGcy0ScrEMq0gmR5+n2eiBoRolj0lVsERFV?= =?us-ascii?Q?CbYfoKCcW0CUc9RvcJ69ikKunkjiydvSKPDHo1CDIMCXfWF7S0F7i3b8JU5G?= =?us-ascii?Q?r8fSjOPgmqzJ0N3kTytDfSy3MWjpbS+4CtAZE3iWG3K87BkK919uqGtVxzwU?= =?us-ascii?Q?egBBOMfbBVoFaFTnTPwjU0dfG2TYN99bgDTj99mygsbD1vhXd/V33VYlf5Xg?= =?us-ascii?Q?m9P5cXqVlTQvwOouNS0eYcVKFcFLugMd1Vn59Uo5XUM3oggNZV01y60wNcJW?= =?us-ascii?Q?o9U4JBfI3+hu8ZMTX5BKcr9NxYe6k9tSy9m0ttlWUAhhW4don2GL9UKtXOya?= =?us-ascii?Q?HLgQznxaAUWLVAw4NcboBlNirZ93JGxDKvYSiRzOv5KHfQQx0aJORLROAE31?= =?us-ascii?Q?CxmwJxH6l2sBZfkDmnu4nhPmsUEsdGnsz2ySf1+DueA+L6uHCDTnSeKi5/70?= =?us-ascii?Q?nzFuZyec355/EH1Z9CznmGD41lO/5CLIq/pvbixYGkYstSnjv2It2rswouxW?= =?us-ascii?Q?MGiiQp19qL8a3aaIsFQQwmUJ/tTSWCIoBXvwB3mw96nepooEblFqx1+mQlym?= =?us-ascii?Q?4jqEyR8oOt3QcQs6LlOWvOY7npZ+qR/WE5Lex57SvoE2bugHxLgZPKUK6V6z?= =?us-ascii?Q?X/iNqAgns58fKM+/Hr5ccgWD7NDqV7U89ikfS0U1CEyRJUfAiF4PBP389HWp?= =?us-ascii?Q?QAswLonkfdI8sIDOw3x6liCSkKHqbcdiGE03LkXRpazeJbojuykxOMpZCV/y?= =?us-ascii?Q?ljb9EVGXCAUqGHqZdv8LMLTHzs211m/T8cOf3LD84lfviJW93qQoJgf4l3XQ?= =?us-ascii?Q?/0VO6eMPeNUWIeBjXf580I01CYcE9RTvkUDZFatLQJBiQwwvtXAi7qsIHee9?= =?us-ascii?Q?6MQN07Vw8ZV6W0KDN3aRxiCnccvscyIMaR7T3nTtj6LfOj1IVqC86e2LSQVy?= =?us-ascii?Q?YEs93B7GAwupI1oz7L56QSSKeutEuWlAsOD5VzToLwB4aar+019mYKBmPmSW?= =?us-ascii?Q?AuxTMxW22/DS7Ks45jbEOhfMRSFvyQBHzGMUVpxhEmIyOHDEFjdAB0cwmoeG?= =?us-ascii?Q?QFym96r/MSUSKp16OkMT6QqEWdWA4Gs9NqJf?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(7416014)(376014)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:12.9022 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d6bab5d2-4c1e-4f26-a752-08dd9f71f3f5 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000143.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV3PR12MB9356 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606624669116600 Content-Type: text/plain; charset="utf-8" Very much not a functional change Signed-off-by: Alejandro Vallejo Reviewed-by: Stefano Stabellini --- xen/arch/riscv/include/asm/intc.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/arch/riscv/include/asm/intc.h b/xen/arch/riscv/include/asm= /intc.h index 52ba196d87..81f74736ba 100644 --- a/xen/arch/riscv/include/asm/intc.h +++ b/xen/arch/riscv/include/asm/intc.h @@ -8,6 +8,8 @@ #ifndef ASM__RISCV__INTERRUPT_CONTOLLER_H #define ASM__RISCV__INTERRUPT_CONTOLLER_H =20 +struct dt_device_node; + enum intc_version { INTC_APLIC, }; --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606625; cv=pass; d=zohomail.com; s=zohoarc; b=IWWfnC+4CIQyeImy4OR43zpFWU2oLT1N31W58ioELoIQzTZ3MdD3r8drt5/vAr/A99PzrpoLs9pGqU5QWAc77vu1DrDej5mBUWFZo9OhN/EAfMa9lezSEAeLaC53XxzQg8oUzyJ+5pcSoojKqqNmABhiytkqPl5HXWg1dOSq4mw= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606625; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=vXe5G9Iqi22LTrUnfwfBy2xZ8mkimgLDxsX5KClv5aA=; b=JTlpkfw695QkEwb0r5p6flKMH+qn0qGLtROl331zIm3bfPiYj5dUtZGL2BQ9qOFooT9b0gw8za+ZZRkY/pr6x1E75B7BtdMJoj8rnIyUAU3bfN6Zq6hPLEoQJpVsHNTSbzT+A8hKEUYuRfVzV6H9lFrrBOg+Gyg0RbIeXKQ7WU0= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606625696201.1288702740692; Fri, 30 May 2025 05:03:45 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000710.1380905 (Exim 4.92) (envelope-from ) id 1uKySH-0007a4-BY; Fri, 30 May 2025 12:03:21 +0000 Received: by outflank-mailman (output) from mailman id 1000710.1380905; Fri, 30 May 2025 12:03:21 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySH-0007Zt-90; Fri, 30 May 2025 12:03:21 +0000 Received: by outflank-mailman (input) for mailman id 1000710; Fri, 30 May 2025 12:03:19 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySF-00076q-S5 for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:19 +0000 Received: from NAM04-DM6-obe.outbound.protection.outlook.com (mail-dm6nam04on20607.outbound.protection.outlook.com [2a01:111:f403:2409::607]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 12d8a7b5-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:19 +0200 (CEST) Received: from MW4P222CA0030.NAMP222.PROD.OUTLOOK.COM (2603:10b6:303:114::35) by SJ2PR12MB8875.namprd12.prod.outlook.com (2603:10b6:a03:543::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.29; Fri, 30 May 2025 12:03:15 +0000 Received: from CH2PEPF00000143.namprd02.prod.outlook.com (2603:10b6:303:114:cafe::b7) by MW4P222CA0030.outlook.office365.com (2603:10b6:303:114::35) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.19 via Frontend Transport; Fri, 30 May 2025 12:03:15 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000143.mail.protection.outlook.com (10.167.244.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:14 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:12 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 12d8a7b5-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=vgNdOYn6LZppeW60AoHaZawC9zMx/TBsYCkwDmCWFIwHfNgNTSk0qkHDC2TRrIY6MqF9hUvp21lGjr8C45/pP1OfPNZ2McUQ+7syqFgZvRqSbb/CtJ4ihjvTqX5EA+2+iWhDAx2JHhYWNZ++i+ZenI/YbnUwnMCQB6JaeYHaUvSRUH528EXsJV4ZEbpxm3ooezBlvXUzLf5aGzm/Z5CcXa6wpFFhDhYm4cnkhSz0Bmb2oM+WSPUJX7Vj5cT9CIrrJQ/kkAYN6qgN0Df0PjiwZ8VFyM20XOjXDRQ4aQTNEadQVcTLKjfbf4Y1pB9n9U3H4SFqoa/XthtVnIxuVHp1mQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vXe5G9Iqi22LTrUnfwfBy2xZ8mkimgLDxsX5KClv5aA=; b=sMeTs7B++1zOODlgyRPXuiY4Ic6+NnmMJYJWsYcRG1R2RhJu7YmAqcskRhXjbDLc9hcTTNY70Ge3NUUeM1i5ibbaj8lPNU48CT2wZ3U8/sKu+mBmEPRWPJHRuLQVYLU+ubVvKkook7sSs806xGaf29nIkTKuf+PFXjA8M5YoKeuhwDK17oDhGDP+2gqcmr+H5iAO2BHwXVMshtnp9tIkntsaVDyesVeKfDUgxxdbU/GKeCsWwucyzw2z8TL6/tG7J7/kpu8AXH5ekZDMhqpbgOuh3t8xzWkkixUcuWrlNgNWEi/5IyXYERGybyFk6tmvzfwR9IbP9/KI5sReI9UARg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vXe5G9Iqi22LTrUnfwfBy2xZ8mkimgLDxsX5KClv5aA=; b=JVrQATxBKDlNkVzgQuRS9caoou9sEvDf0glsQJH0iN9Ux5BLI6KmDWocEqbphrSSGqgi0DV3lLkxcskERrFSfek9FGagIhTajRP57oVfjA78+QTW/a9qyz9i9xQwEBBqJRinOgx9Rox8Bda/rdMFzKLs9GesEWoqGpsxgnX+Yhg= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , "Julien Grall" , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini , "Daniel P. Smith" Subject: [PATCH 04/19] xen: Add missing forward declaration to btcpupools_get_domain_pool_id Date: Fri, 30 May 2025 14:02:12 +0200 Message-ID: <20250530120242.39398-5-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000143:EE_|SJ2PR12MB8875:EE_ X-MS-Office365-Filtering-Correlation-Id: 1838771b-1bce-4689-5d99-08dd9f71f52b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?ujbPSl9VUQxCXANEnhkT8ggAjjklNJZuqYZmdBWQ2NwEzvbJK+61t6l9qN/Y?= =?us-ascii?Q?YuneEeipx/SIn587HQVZRQD2v3URS4PILJGmwmXi2AcbGspCc1T27qu1cg6s?= =?us-ascii?Q?4utwWpkmLyYMgoYgK0ve9fLOhiR4qd9xUnIZp8RA45ptRLpJbgtCgZk+TfSi?= =?us-ascii?Q?TEPo63Zhf1pME1dO7vOQqRXhe0dzflmuq1fFaV1fakf+zyUHV+TnNrAPKsP4?= =?us-ascii?Q?o3Wq56+fnbmjgMv0BqBlJb9wd67J01cQ11JdiBKhuCpS5nPOdj/0+tbdygcr?= =?us-ascii?Q?03L7eO7aop2gnei/AntGzqcQaZkZF5/SXRe0WClhGWVuG8V43Nu+MnnMPQEL?= =?us-ascii?Q?ytdEMr0EdqL743jYPPRWNpBSwaoNkf+UGTrlOPrD6A+4QUd+MWKqREN1ROpd?= =?us-ascii?Q?0IGSBjHX/CI3J6VMw5dM25PMKt1RmoMe5aKXxqGrWoXp+IjFxAU3SHyOzJD8?= =?us-ascii?Q?F/Y3XhERrk32/tNN6fU1pV98ifQlVEQHkZ0TDcTmVOFy2kMaFrSksSgNId36?= =?us-ascii?Q?C6s9lFKvO8vDrMLwpoq2JwxcobcG6o0LNOjVYpNGQJo5C57M1FTMbfSL0FnB?= =?us-ascii?Q?aJvQhOe0/tqSWTtTMbG014yDMWpT5OuG+xDPL9wmowNJYAreZinHnDcho10S?= =?us-ascii?Q?INchhTE+J5Y5Md/IurI4ztZQfEteQSO20EOu26q651QBY6VUsFTUAVat0+1a?= =?us-ascii?Q?yax7ckmm7nzaz81CwPwejbZ7e5ScUtelRC64WYY/aIVQy+1Sh1dMwfsYR5XU?= =?us-ascii?Q?EDWjzydYtawl71qaAaUmnhl99rwOzltDrTEZUmQ0G4fsYWQqt2B2RIiTutSz?= =?us-ascii?Q?sCXB0CXvIgsEp88337c5AytnhuObgwZXiO5pT34qgqzEE0jXt8HiSvPlgcpi?= =?us-ascii?Q?MS7YS9f1PIoheg2fWNRfFVWyKWMt9REdnpqwPSx/cubOz3iYHfaakOzV0utE?= =?us-ascii?Q?mOT+Hw33MialGYA2E4TWJ+n9VuOyi0M1zuvZBGAyIZoj76o4s29/gZoUtxxV?= =?us-ascii?Q?cvtxTXMsJ2zdECokV+7Db4s0W0WNEaJK8NIIq2LxACLeH0m7EJqgn+ujWNfM?= =?us-ascii?Q?RHv89/yAJ2swf3z9FEqIgxXw9VklPg4g1rYH6neBWxiKImMx9wWAxb7b6OPU?= =?us-ascii?Q?jrRymDJQpxoSxs0c7Qx41PMrYhXVonmL8fLo4qVmsJCLOxixj218pkvG0ExI?= =?us-ascii?Q?fIutC56DCqk4/7eGJMentHOUHdKhifxZM8pFqhWhvEuwqijgvf8n7lFH6aVP?= =?us-ascii?Q?Mw/B7/xaxzbJqBd7CuzL9bT/L+QvJfpt/ZTbDsCF5WZmthQFPAO4I3bCXYYX?= =?us-ascii?Q?xHM1sxpHxum9QHPpxoapqB7vPAYs3W2grZQQrqzDzOwJ3dcKRj/qsNSXtuDb?= =?us-ascii?Q?oW2ZULywzbbX5UMhWBdHqT4Y7+Vqh+I+1f2i+28mLjDOL2N+N7zl09Ii5k9N?= =?us-ascii?Q?XwJbxnNea3YUN6OY0ZVuDiy5FslUsu1QmYKuNgtG6nWMRrsOA6JIHDVtYqud?= =?us-ascii?Q?6asq12L0vr0UjXzXrLwzMGjNeFJAO7mTJ0TH?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(376014)(82310400026)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:14.9312 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1838771b-1bce-4689-5d99-08dd9f71f52b X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000143.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR12MB8875 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606626694116600 Content-Type: text/plain; charset="utf-8" And remove the ifdef guard, as it's inconsequential. Signed-off-by: Alejandro Vallejo Reviewed-by: Stefano Stabellini --- xen/include/xen/sched.h | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h index 559d201e0c..b5a6a22c7f 100644 --- a/xen/include/xen/sched.h +++ b/xen/include/xen/sched.h @@ -1291,15 +1291,15 @@ static inline unsigned int btcpupools_get_cpupool_i= d(unsigned int cpu) { return 0; } -#ifdef CONFIG_HAS_DEVICE_TREE + +struct dt_device_node; + static inline int btcpupools_get_domain_pool_id(const struct dt_device_node *node) { return 0; } -#endif - -#endif +#endif /* !CONFIG_BOOT_TIME_CPUPOOLS */ =20 #endif /* __SCHED_H__ */ =20 --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606624; cv=pass; d=zohomail.com; s=zohoarc; b=PEnOhdzcAVkfNfWDWNtzFI+mF91/hki4qITL/yFN6LdA8nZDwdrgIU7yoKzqMZ43qj9c3PhuScp1CNE3unKTDiHDwa7/ZCvnNzs9bYOQ9YD2Q7wwis4FvpCEXwBA7xoZusyNzgy4y491gcJ/79iM8DMKT4xPS64kotFJdtkqxTA= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606624; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=CB6uSAbe+0xw4xE8YOobIV7kviFvgyyKz9p/QbVCOyc=; b=bu0zJldEVKYRrT20T2TdxdwY/xhC1MzXaTYC2Q8zTDUfGmPs0pI1U9WkQVRK3QwwgzLAxUIHT/7kFGm+1R/zindNvsICDDqs4oSidLEeTBO5BYdQtWSoUejSAlxJcbb2pBQkbUysATn9WlN7v+diRY7P7hGP83ZcKf/QMAPUWgA= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606624714584.2225959324004; Fri, 30 May 2025 05:03:44 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000713.1380932 (Exim 4.92) (envelope-from ) id 1uKySK-00087A-8A; Fri, 30 May 2025 12:03:24 +0000 Received: by outflank-mailman (output) from mailman id 1000713.1380932; Fri, 30 May 2025 12:03:24 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySK-000866-2Q; Fri, 30 May 2025 12:03:24 +0000 Received: by outflank-mailman (input) for mailman id 1000713; Fri, 30 May 2025 12:03:21 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySH-00076q-SG for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:21 +0000 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on2061c.outbound.protection.outlook.com [2a01:111:f403:2412::61c]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 14673029-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:21 +0200 (CEST) Received: from MW4P222CA0028.NAMP222.PROD.OUTLOOK.COM (2603:10b6:303:114::33) by MN0PR12MB5810.namprd12.prod.outlook.com (2603:10b6:208:376::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.26; Fri, 30 May 2025 12:03:17 +0000 Received: from CH2PEPF00000143.namprd02.prod.outlook.com (2603:10b6:303:114:cafe::57) by MW4P222CA0028.outlook.office365.com (2603:10b6:303:114::33) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.19 via Frontend Transport; Fri, 30 May 2025 12:03:16 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000143.mail.protection.outlook.com (10.167.244.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:16 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:14 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 14673029-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=UrAflS6M7rXsLjmUvpnGe6cZBX6i09cxKrt8Cp8BmyNjdXLasPOTMGvFnnAym++Pykc404PHW6U/BLT9n8qO1eD193oCkAI8QNfpRD9A3+GCv+9tPfjSUM/Wq35RCO4C1bW3xSzGJTPaYayQqAt76INHU3pOPqIQ9GiH9xlmoLPHpcmUcDuZvCvzH0k9J3NJM0+xm335GZ9BlI8tSDi4EM3OLMS6Qc42N8l1A4a3dbhwYEKWilTmbCBgqTld0pTiAP5AW3NkeneR7tJyQlopmr3vN87LV+UouJrxbEKweT4Rdo4njEO6RwEDU7TG0jNibNv4xMu3BtZDrkDigX93ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=CB6uSAbe+0xw4xE8YOobIV7kviFvgyyKz9p/QbVCOyc=; b=j51PQMdVuI2uHeHKp5V1YAoNHUBq9AuGVn8n7GBnXjrVVNoo+TgExz4AYC69SWoGDmgWYjEATfVEIRwL9d0krLm5wXbGIWUxIQbFFXNLvcQOdLPSVxnFB20V65l7ZdmKP9R4LM90I7txjXzBFuVimJmC6ppm1rdTyOGBmaG9SVDt03EaD2E2FOgpxVoKbK2dijiX1qLI+93XXbsbpQ6pEiIERxa/SJjXI7OMxIwjhP7xtZRdrGswEkpZfcy4l4NbpppXOmNQQbOtKVuzKyMH74Te3rP0dkNfPuSJNuAq3Wxzh1vhKc/jrzjjws6xOU83MchpE3RQMKQd/a19LJedGA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CB6uSAbe+0xw4xE8YOobIV7kviFvgyyKz9p/QbVCOyc=; b=2kGgJxFG6CYcegwJ9h1zp3X11/+JAmtA4LP/grKbQ4wK4qD+007gfMBI1g8Vi/p/pE2w5gphvICuMcDaQ7P2RVz72oZi87Coy2cXDftV3khP59j02qPY7y9a8hXwZqSu0r4d5XfIeve6RRZnQq1752MYxeGwEwaWDwL3g0i0QPQ= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" , "Daniel P. Smith" Subject: [PATCH 05/19] arm: Remove dependencies with membank(s) definitions from setup.h Date: Fri, 30 May 2025 14:02:13 +0200 Message-ID: <20250530120242.39398-6-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000143:EE_|MN0PR12MB5810:EE_ X-MS-Office365-Filtering-Correlation-Id: 524d2aa7-efad-4b14-274f-08dd9f71f632 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?Bae3R9cVDxLgMYyelWZPlaFhIZ6LzxqbpiOur0bJ5iDAPjTKKHCRVl7olOaI?= =?us-ascii?Q?5bgakf4vF+c9dqnaYNcpTftx7+NL+H7E0+feKGugf9hzfKQ9PYGd/BVAvinX?= =?us-ascii?Q?hWxj6NUZkU1Y5186sRbGB3oWbGq60qKUKXRgUAdDYZRIROMuA2FV1RsLWnt0?= =?us-ascii?Q?QIIlJVyIcxBkLx4Ok4L83GB70gPOrmicu5a7XWzANcQZBpIY7GXJygssojGT?= =?us-ascii?Q?71ihAysAwfAuT49lmoosoMA4y6oed5QikfezQCZF7whBftpOUwdeHKRfBhYI?= =?us-ascii?Q?3VNxZKMgdFakxI9+RWe2obCoZ/RqMp1YhnRUc8EhoWRNu1Z1Zr8fZFm06/IF?= =?us-ascii?Q?XC/cnwr+CUX7DVm9gABYKnNMa9oWz48ESfOx/PLeNx1iqfZxC6Lz9WJROhCK?= =?us-ascii?Q?X0zE+Z3Ow/FTASBnsg0AK6KpSYN9Kjuz4/FM7ZPi5V0kfqskYygPnkZZ90ft?= =?us-ascii?Q?EjRviZOs9Y2lEeTjw6r59kR8clkxLLgCWm7NQk0fymvlQmMszBT4WGOHXrNo?= =?us-ascii?Q?56tN5WipHlPtA6MlygF4mMjT7HDNjPCWNU1j79w8mGD1TA/qkWnBLv5guZSN?= =?us-ascii?Q?M+sIDQXdaFVIY7UPPEYZV3tAm4jl3KoO99461baJ6Rzi94Bp2vekywlQ8SCy?= =?us-ascii?Q?MwQrBF1n9YhcVZ4IM0B0scdAae63wQNaZlfXb+LoqfEfWvw+QtRv7zQv6CjM?= =?us-ascii?Q?xqhrm3KPV/ZhN9BJDSiZC3HY/1IweU3/sX1auF5AkVlv8pl+eHiPWW0WS6Zl?= =?us-ascii?Q?6o2VZXsBDjShRrUWZ1JiYWTXTjn3bgS2VgQDuVWaMtvsXlY6NHFbGTRXYZy5?= =?us-ascii?Q?G6M+e+kmvMgNNh9c+O10kliNJ7eZ30P6VY2DvMpLKCJCDSoewnQ2uRG1K/YY?= =?us-ascii?Q?4IMKXNgz6vBiDhH9lIO4aoCl1/IMb/3kxjTvJ3yC0OJRtda9/oaZcMoJE1uO?= =?us-ascii?Q?sFPAyfR5T12ZAGjBHo5awfA001K4dd4Rd659+l2x+H88MIKyWDbg/eWHDg6z?= =?us-ascii?Q?Xuot+RnkOF3FHLsBirItSeQucU7slbE6SLA6SKRgWmuFHBlDFnRtw55MVe4f?= =?us-ascii?Q?a2Ps10vB3UZKQCK2Ws+s5jIJF/tXx0o6TvsA0O91Cpn8D4WBeY/XkCsn+pr1?= =?us-ascii?Q?qEs7nIhIYFx7pWoZf+RFS/tsNZFC1ILtQiJJZ8EjqBdJz97kpzcooO5sGQxf?= =?us-ascii?Q?wTl0vqkSwdSILuWsgOSLdEHHWwGacx6429lTCkNoqPxudE6/dEfxcvrHTjeZ?= =?us-ascii?Q?w3udC8UM0h0TQGrTaUW3XEklChlEW1FKa11cBYVkGKdMRecM8cFe99pRJKpu?= =?us-ascii?Q?oSN5BHDm4kyJ7WoJ/huB83+rvK9fzwzOZ8xgYk9kDKGYdPht1vjcxXSW8drE?= =?us-ascii?Q?Yf3iOuIm3953NYpwKno2ejRca8J0uri8cnkLZ1+XBM3pOfIhn773roRM/9qW?= =?us-ascii?Q?qaT4ufumC1DXKg2Ba1h0K0//d4brYgPR3XIiV89NoTO3cyvYf1ewz+5a0Ar8?= =?us-ascii?Q?EqxG44R+sWQZ+EtIhz1QPMLemk9VLpoOb9Cj?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(376014)(82310400026)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:16.6504 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 524d2aa7-efad-4b14-274f-08dd9f71f632 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000143.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN0PR12MB5810 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606626729116600 Content-Type: text/plain; charset="utf-8" ... as they can be forward-declared changing arrays for pointers in the fun= ction declarations. No functional change. Signed-off-by: Alejandro Vallejo --- xen/arch/arm/include/asm/setup.h | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/se= tup.h index 6cf272c160..0f9e531a34 100644 --- a/xen/arch/arm/include/asm/setup.h +++ b/xen/arch/arm/include/asm/setup.h @@ -3,7 +3,6 @@ =20 #include #include -#include #include =20 #if defined(CONFIG_MMU) @@ -14,6 +13,9 @@ =20 #define MAX_FDT_SIZE SZ_2M =20 +struct membank; +struct membanks; + struct map_range_data { struct domain *d; @@ -32,13 +34,13 @@ void copy_from_paddr(void *dst, paddr_t paddr, unsigned= long len); size_t estimate_efi_size(unsigned int mem_nr_banks); =20 void acpi_create_efi_system_table(struct domain *d, - struct membank tbl_add[]); + struct membank *tbl_add); =20 void acpi_create_efi_mmap_table(struct domain *d, const struct membanks *mem, - struct membank tbl_add[]); + struct membank *tbl_add); =20 -int acpi_make_efi_nodes(void *fdt, struct membank tbl_add[]); +int acpi_make_efi_nodes(void *fdt, struct membank *tbl_add); =20 void create_dom0(void); =20 --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606624; cv=pass; d=zohomail.com; s=zohoarc; b=V9dbc19F/8uyIv9UNRRdXitfCIUWtaktecwNCZWfnRSDB6/yaZhtfW12cvZa5lD/uIdsdE+Y03RHyFD0esTgiTiodSbp5i8K5LoL3kTQENMRoFlZ75e9iMvSemt3UriqhtPr87JTdYTl5yFHSejdM4v8pgYYQ3e4IauJHWhuTEA= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606624; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=GVbXefuGXvR0oYEIOeTnmJPdVj5num7GvQxtWu/G3Ng=; b=MY3PeXXNemMCVq+PmqFsKafIyDxBJfphKzcrgMU+2Aya+rAziIo3qo75NAYlo7EplnazpLJEdTsj+lQme38sE33YhIR3/7Ai25OhhaOr+mCCDx+/YBWJs8pia/s1wEqQFvatCskjiBgKheE+lxQKZWn7Wf1QZY3AEqbTsIL3kfk= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606624551947.0898226494312; Fri, 30 May 2025 05:03:44 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000715.1380946 (Exim 4.92) (envelope-from ) id 1uKySN-00009P-Hq; Fri, 30 May 2025 12:03:27 +0000 Received: by outflank-mailman (output) from mailman id 1000715.1380946; Fri, 30 May 2025 12:03:27 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySN-000098-DR; Fri, 30 May 2025 12:03:27 +0000 Received: by outflank-mailman (input) for mailman id 1000715; Fri, 30 May 2025 12:03:26 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySL-00076q-VE for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:25 +0000 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on20603.outbound.protection.outlook.com [2a01:111:f403:2418::603]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 16949eaa-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:25 +0200 (CEST) Received: from MW4P222CA0014.NAMP222.PROD.OUTLOOK.COM (2603:10b6:303:114::19) by IA1PR12MB6163.namprd12.prod.outlook.com (2603:10b6:208:3e9::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.26; Fri, 30 May 2025 12:03:20 +0000 Received: from CH2PEPF00000143.namprd02.prod.outlook.com (2603:10b6:303:114:cafe::7e) by MW4P222CA0014.outlook.office365.com (2603:10b6:303:114::19) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.19 via Frontend Transport; Fri, 30 May 2025 12:03:20 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000143.mail.protection.outlook.com (10.167.244.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:19 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:16 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 16949eaa-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=XScqiqPgssSj1MjcUsiWEqanqpx+mIg040FX0yu762svZwmjhpwUsUItA2g0a8IS5sevXd3Es/+352JMcNm953ULhy+WcEDn56CN4Lw0Td9sTOv/dPXWiMx39Zb3fQHrEJrKOj/woUC31olG6roTTMqTo1pm9UqAHhkJW6QfU5VH6n/O8VXy0FeoyXviNV2XzlGX2P1o3ToON4qed0jrs2Ajk8ycFg1aHAKbClJWaovSJNCXhWF2Dlnvsi1ouT9i6AA0z03UbIBEWPNtpDBqnBnNdWgL3SXzJGCC4tvQG9IlpRLlQ4OYwzVmKoyK/E+atUTgjCDXXjt10NmjnYvDYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GVbXefuGXvR0oYEIOeTnmJPdVj5num7GvQxtWu/G3Ng=; b=palHz8Q83K4QIIKYpmfjZeLTmZ5DLGRWLJjoiVonY717hbaeghr16Pxnb8D1K6PyMFGBFOIXsXt/Y3Yf2vgegrGZnEkh83lTUovLd0gFlnsDUWgI/CRQg6L8k+TxpNRzxjoVIZmkyMnkDaI/CHNo04QaKevrd/AMz6mkqqvbv8bylnCMsKLERi+SzgIY+BJUMsgLVC5dMeOMEV8s3O8PB1Doc1S/3ssvcJXfdUiPpweQm0hfPUli8RZaP9B17H2hgMypLyYsNjOI32zx3h9cMTWFxgIGd7soT71h46EY+p+zgWUKpzTdqJuQDKgvxW8xzmfmap+DGnrkYdfTugaBUA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GVbXefuGXvR0oYEIOeTnmJPdVj5num7GvQxtWu/G3Ng=; b=QSsqKRITfgVSU3lkZ6WMcdOacxpN6ZzQoHNEWAgZMKbBwI0z3f/mkTvgsH7yfu5VoACN8XSo10FP1209eeR3mHrqqoeNxeFcNLUPopyXWX1WYoHwVDBD5E5BXDnFXoRJboeE1ckIurIqSKTQQxl5n/u1zuEQKR/aa1sV/afuW3s= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Alistair Francis , Bob Eshleman , "Connor Davis" , Oleksii Kurochko , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , "Stefano Stabellini" , "Daniel P. Smith" Subject: [PATCH 06/19] xen: Clean up asm-generic/device.h Date: Fri, 30 May 2025 14:02:14 +0200 Message-ID: <20250530120242.39398-7-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000143:EE_|IA1PR12MB6163:EE_ X-MS-Office365-Filtering-Correlation-Id: 77bb117a-b1af-4175-f686-08dd9f71f81f X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|82310400026|376014|7416014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?IZYyICNHHP043awSqAUNCWg7LCG16YO4T4x32Az6z1r0XSt0SVd1ksfEY2tS?= =?us-ascii?Q?VdTqG8JB0QEC8HcY4K++Jq9X5pmZuAtAxPjXvKhmiwso+uimstwZwY06d3iS?= =?us-ascii?Q?v52my8eEVQUZbCkf4TU0ZA4+mrVG2tXI8/iBkp6PoUSS5GWO/p15JgOjy9HY?= =?us-ascii?Q?SzzJ/43uZFRjG3H1R4ayfNzbZmN2LhPcaTG+rIlc6ATzWGRyZNXTsDaGvC9N?= =?us-ascii?Q?xS5CFkBHqWwpxhFgaCfOJr13QjiJvzrJ9aDwk2iO4o3xfLjcKOzHMeSgdCQH?= =?us-ascii?Q?hq1GSFIxmdsm9ycBKKi2euGtIYVtkagN8jXs4QuJ2mEAtA2Lz6ejzmhbd7Q5?= =?us-ascii?Q?7Eanzz+JEDNqBc159O2DNOPVGx461mAgjaEJCuD7HZfMVVUVlQZDssubwfv5?= =?us-ascii?Q?cAVoXRAQAKMXqLoIowyHNQ9dtuEHvoRaGdNgfhSVYYLcraIwkRmxXUKIY5Vb?= =?us-ascii?Q?n1lSzhXxzmJsf1IvHOdqqEZ36RXZglooE6XSIzdKxIeyxaH/o9F1Igx9AqSd?= =?us-ascii?Q?xqWLFpsPzQvruCwloU6DZfmoTwlrcmK6M1C8Tm5DRV/272USBvQ6Yh5LBtQq?= =?us-ascii?Q?7hqgojOp+Md8UWN8lWrHwn5b2rH/Zw4Dxf+Gl4EgwXwRuLpmTl/cxEBJIPAK?= =?us-ascii?Q?hH6EQ6vODycTLCeEBOvZMT3gpIvSB1v+rg4hZAWxURY2rTv6LZTSRvXaF8QN?= =?us-ascii?Q?nzayq+k5ds8OQD23kOlrqJRD7p2eSXXBi80PvNfZkJRgHoJX0NUyjKiUQvpH?= =?us-ascii?Q?w2E4dFcaQeDvatXuSRv0BDTEEG6kieH28zEgzetBDzf3U9p/673e/N+sOYvk?= =?us-ascii?Q?lSdtsSgonz/APOW3YOae0iVcAfR5JdXxr4o+Vl/FbNSTbInHLl+v9tCDYkNM?= =?us-ascii?Q?chdudvlhK3R7WiGdH6LCHQmgceEzK2aGn87Hz2izlRgVdTimY878C/ndKzbr?= =?us-ascii?Q?6/Dc2pYcVb8sDFnfmr/u9M4wsbQLNBiWZYOao+crZpP0g/E37kT2G5Pz+WXa?= =?us-ascii?Q?Qymozz83OjCykR4bh75co3dsdBOIbLZv6l8kf7XLpWlqWS6oJ36sbcnp+Vfy?= =?us-ascii?Q?DMVEAc/dd6RBG8YZf2LbE5UjoLXyJLNxdEZVlg5xB6AJc4dCZw9e0ZAm3y/4?= =?us-ascii?Q?fcnvEMV8qq4JXyDDnlGdG0Bcj3FEt7AQiNWa1Y6HNZK2AEDz1WNeZYhwvfAi?= =?us-ascii?Q?InbX0ySPNpsvrgSxENRmpUQdL4qIzgMyllLaVQU7BekewRqsamAQnoSRaB85?= =?us-ascii?Q?0UbbkDxcQNoOdlpLM8h0nAJkRDHxbX5F3k74+Gky58SIdslYYRdYxMoIpnC7?= =?us-ascii?Q?dSKGZuzn9/BrYnGzoH3uxWN00LngL2VtD+F0ZDoTbYyRc0zShRM0llq7IWw4?= =?us-ascii?Q?F7XlJqRgkfHlBq5iBFpFgPz39CikQtcSXgr7tMjRaZMJL7vHdw1rFy3L9n3m?= =?us-ascii?Q?te7dhbtcI4jJQr04aDKwMpeeIkZIzSGNZvZMCkvumPL6028gRwWZZT4mgsci?= =?us-ascii?Q?FrSsAwBsQA5jOZ2YNQZaTL5rZcRsipG+YejQ?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(82310400026)(376014)(7416014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:19.8897 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 77bb117a-b1af-4175-f686-08dd9f71f81f X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000143.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB6163 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606626795116600 Content-Type: text/plain; charset="utf-8" There's some pretense this header may be used without CONFIG_HAS_DEVICE_TREE, but that's just wishful thinking. Only x86 lacks that option, and it fully overrides this header, typedeffing struct pci_dev to be device_t. Furthermore there's an include for xen/device_tree.h halfway through the header, but that header already includes asm/device.h, creating a cycle. Clean up the header removing ifdef guards, merging the typedef onto the struct definition for device_t and removing the spurious include. The only affected file is aplic.c, in riscv, which is forced now to include device_tree.h directly. Not a functional change. Signed-off-by: Alejandro Vallejo Reviewed-by: Stefano Stabellini --- xen/arch/riscv/aplic.c | 3 ++- xen/include/asm-generic/device.h | 18 ++---------------- 2 files changed, 4 insertions(+), 17 deletions(-) diff --git a/xen/arch/riscv/aplic.c b/xen/arch/riscv/aplic.c index caba8f8993..90bf222eeb 100644 --- a/xen/arch/riscv/aplic.c +++ b/xen/arch/riscv/aplic.c @@ -9,12 +9,13 @@ * Copyright (c) 2024-2025 Vates */ =20 +#include #include #include +#include #include #include =20 -#include #include =20 static struct intc_info __ro_after_init aplic_info =3D { diff --git a/xen/include/asm-generic/device.h b/xen/include/asm-generic/dev= ice.h index 1acd1ba1d8..d485fb97dc 100644 --- a/xen/include/asm-generic/device.h +++ b/xen/include/asm-generic/device.h @@ -6,9 +6,7 @@ =20 enum device_type { -#ifdef CONFIG_HAS_DEVICE_TREE DEV_DT, -#endif DEV_PCI }; =20 @@ -23,23 +21,15 @@ enum device_class }; =20 /* struct device - The basic device structure */ -struct device +typedef struct device { enum device_type type; -#ifdef CONFIG_HAS_DEVICE_TREE struct dt_device_node *of_node; /* Used by drivers imported from Linux= */ -#endif #ifdef CONFIG_HAS_PASSTHROUGH void *iommu; /* IOMMU private data */; struct iommu_fwspec *iommu_fwspec; /* per-device IOMMU instance data */ #endif -}; - -typedef struct device device_t; - -#ifdef CONFIG_HAS_DEVICE_TREE - -#include +} device_t; =20 #define dev_is_dt(dev) ((dev)->type =3D=3D DEV_DT) =20 @@ -87,10 +77,6 @@ struct device_desc { int (*init)(struct dt_device_node *dev, const void *data); }; =20 -#else /* !CONFIG_HAS_DEVICE_TREE */ -#define dev_is_dt(dev) ((void)(dev), false) -#endif /* CONFIG_HAS_DEVICE_TREE */ - #define dev_is_pci(dev) ((dev)->type =3D=3D DEV_PCI) =20 #ifdef CONFIG_ACPI --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606638; cv=pass; d=zohomail.com; s=zohoarc; b=c7aAdMTQ+SfHzncEVRTZWtrL7qjP6uUuD7qDKjSuSziVac64tFt7uYlRGcNXRiLDAaynrCJgYD5zHrXanE6dhm4drI/PtvEQKhi1MEVxG9qSY6Weof108I9sPr0zL/GvckM3ZVOWB4j7L3COQHN5Jc7EqmUiuNoX9WakqqoahoQ= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606638; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=F1Gy7METHvl4e1uTjxJqux8z1qxe5mj2zTQSv1Qz68k=; b=Q5GrL0r7Xw/eDyR9JXWcKEtMF/6RrStdggLVaIU9SlcYPnl/8JOyHchAH7sEm7cArkP3WCIyoV4o1hJ68juo2F7+x5V7qUEC3mXAF2q0XSgIsdb4dEviosc8DoepZPtE6G8wNqCc9K86q1zoenSlBic9W5wKVgz1KdfV6CRhpbA= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606638182341.308168637403; Fri, 30 May 2025 05:03:58 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000716.1380956 (Exim 4.92) (envelope-from ) id 1uKySO-0000Qs-VB; Fri, 30 May 2025 12:03:28 +0000 Received: by outflank-mailman (output) from mailman id 1000716.1380956; Fri, 30 May 2025 12:03:28 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySO-0000QZ-RL; Fri, 30 May 2025 12:03:28 +0000 Received: by outflank-mailman (input) for mailman id 1000716; Fri, 30 May 2025 12:03:27 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySN-0007de-OM for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:27 +0000 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on20628.outbound.protection.outlook.com [2a01:111:f403:2414::628]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 16b3cc15-3d4e-11f0-b894-0df219b8e170; Fri, 30 May 2025 14:03:26 +0200 (CEST) Received: from CH0PR13CA0024.namprd13.prod.outlook.com (2603:10b6:610:b1::29) by CH0PR12MB8577.namprd12.prod.outlook.com (2603:10b6:610:18b::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.26; Fri, 30 May 2025 12:03:21 +0000 Received: from CH2PEPF00000147.namprd02.prod.outlook.com (2603:10b6:610:b1:cafe::31) by CH0PR13CA0024.outlook.office365.com (2603:10b6:610:b1::29) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.16 via Frontend Transport; Fri, 30 May 2025 12:03:21 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000147.mail.protection.outlook.com (10.167.244.104) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:21 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:18 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 16b3cc15-3d4e-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=spQ+SFUEjc/XLWnGN7A/NOVBa+tWMrXV56fdBhrRmN2Nb7mfPEUieYyz8mqUJwefoT0Gq8eegDRWZToVAa27krpMdphCFj1+jAboefYgqYhh4ViGLR9XWRbebPOoI3C2X41rwPmP0XiQsjH/LN4ghmi2zaHtvicC9DFP1VeZYWg7MrYHt6ru2nHwYTAqBbmZ2uPejr8d0JvSenGwsw7y8OLjx5VG3kSrut5RSvO3O8ExNicQhZg94Yi0Ft/q3VJ7f/vpKrzC4Ll+OyDzaJk+0HLuqlL65qmwc1KYEOZnhdzwfRh7Xf1G+9ylBVGUuksy4ZgxTyhVun+7MhBe3XBytg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=F1Gy7METHvl4e1uTjxJqux8z1qxe5mj2zTQSv1Qz68k=; b=N1Ri+yY7/uYypJYSLJ0aD76q0Z8Ri/QsFa0oEFEzf3JMaasncxZy1gLes86Fo+awHr2OefwuRmyELcvDxS5WVelMMFp93Uho3TdYLbvGkWerNn11QF2CooEGoBuoPyaDfkjPEphbU4hQhGsqEhNH7vmWofAvLllpPI0Q+BsreaCJi9qOjGvFRRR3ZZenKjGNk+qBzaaLXrkIXy9wv9bucF3Y+JpkodroI5Nfvluq4M/XRWcypG3V2nbMso136vzFAY9krj//SyC0ltA9FBKd25Zuj+dbmgD9HI2CVVxAY6v+c2lcvjDJ6fqNyXuNDQmCWYyUChavrypsgAd0BRQ+6A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=F1Gy7METHvl4e1uTjxJqux8z1qxe5mj2zTQSv1Qz68k=; b=rAQSh6/hGyJznONHSs1J8GhpnXdVBV+7k/86IARJoXm4D1xuO3RFVk5R/VLD38s4hXCSv6iyMnYeAlNNWj9lHp9e55NpvXJeyVCtU4x679mw2HXxLRjhfAUZXvE8ON9Qfpj2cki9lZMHiIaNXWwzO5uyqWSZ8BOHmSfdn4fa/n8= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" , Andrew Cooper , Anthony PERARD , "Jan Beulich" , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , "Daniel P. Smith" Subject: [PATCH 07/19] arm/gnttab: Break cycle between asm/grant_table.h and xen/grant_table.h Date: Fri, 30 May 2025 14:02:15 +0200 Message-ID: <20250530120242.39398-8-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000147:EE_|CH0PR12MB8577:EE_ X-MS-Office365-Filtering-Correlation-Id: 8489f693-9131-425a-b1ac-08dd9f71f8fb X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|7416014|82310400026|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?o2JsOOhez/oKkVMoS9RmaG1Hk/El9ditQkPukm914PQjj/gxTnGOTMQOq2Hl?= =?us-ascii?Q?aL1CrL9ojTOV67rD/0MXXdzp6BPjaV53yNnJ3vOEbZ4WKYa6V180Xm063mzl?= =?us-ascii?Q?G6T/O+wfNMmIKJDI3QOw6kF2iLS1IlkN/7JvK8W3ygkGrWtu8t9Ggo9n+GeM?= =?us-ascii?Q?OQRqEyDB3WYl+qtEuYSzi05qciDrJVR2OPIjLSaYtMDW2Ok/GpTotxk3L78t?= =?us-ascii?Q?Zdw5hfoYp/Gb38M98v2XHu4iGs4uXES44uE+4Avrxtq8ldStrSaoUt7MCDO9?= =?us-ascii?Q?iIT97ofrDrwLIG7vgh2bzPHQ65etMRRt2GIJH4CkW3MGUO7DMun7VGmSrCh6?= =?us-ascii?Q?Sh1zTO++U1TToKimqkqmV6rjdpXv74a2McBBSVKDKlyh+mHOEsd5G5Esoong?= =?us-ascii?Q?ZZSljjLfwUvM7RTrcgnwUaEE8NEKaV2S4y/Uo9n+q30930LjWFJ36x28t3ug?= =?us-ascii?Q?z9r2XkVJw9Zil6mv01MKlz+vzLPCjEL1y+6nxww182yjWJd7rEUuW0+7AqY8?= =?us-ascii?Q?6F9SVVwvYfJIKi9c45/0csbT7ib7Vlc+rfKkqKD8N25+/CmYvvK3hRpBBE4t?= =?us-ascii?Q?/Oc421fc1IZPpaVubfoROSMHsEKWnuiSKHcl+8AiQqFCEVXNMnk0nXH2p0oY?= =?us-ascii?Q?XQoRQ900atIyzYpVxUih2fRjYadTMcqy42Ru4YuSpq5O+AVGCaKNJ04oqdyf?= =?us-ascii?Q?qgfzGs5ywZdmFjC6ZyG2nOlv0Mrtyw40vtjzvCGsXAo8NtJa+NF3LtSgvdG4?= =?us-ascii?Q?eGJc3OokcgMOQ5OjyISOdktTTXMQlYPwYuXUA1DZIED+YkNm6p980mTbEU/+?= =?us-ascii?Q?IHBOLUXhX1FzvUUy5tOkZFYYQXOxwiG78XlfkoI69CkQNF6vYTEKTy2i6ZXq?= =?us-ascii?Q?OTlySkx8zB+CHah6qoVca49L8B6uPc9hqLWuTIYAUgbNPyhFndX5u32VHpB3?= =?us-ascii?Q?aNe7XIJuGjStIVyOLwYR0nabF322J9KRyJ2b0Ryt7nDUt/CI7uRXsx+JIB9z?= =?us-ascii?Q?RbPdVWenFJfcBCvaVbvezQc13PPoBp4dF3pspjjoRRDF27eC5rFKAOst1I0P?= =?us-ascii?Q?fmoZ1yQa/9vRhEW/dUWg0e+lgUnifU9e0idUU36YogeaWAAiWuVg8btbkmli?= =?us-ascii?Q?SQ7bJXZjvFoojvOkfSI4dfWX2W9hxsqyQ8ipy5qfSQ1i0OzjvJ1aT24Q+EAd?= =?us-ascii?Q?Urt0xdgwPN87HOe94SNFZwvDJtV/7Q5+6PGbF3g1+rknASNYFaErT8pccLiF?= =?us-ascii?Q?xOo4JyfZUkSckD1Dnf9Bt30M8p9sAC89LeJ9gWnhZJNbi00+NBVDUSVrjCFm?= =?us-ascii?Q?wNvCPdRszAwzd+AY28G7cdaUMDmNt8OgF9/RiIal7K0AMuh/o/h9sH5q3stk?= =?us-ascii?Q?Q6fcC5KTZU9UWFLmaECO+3VZ7GClfGnnFNs63kIB3UchYGs8CD9jwJ6nrPP8?= =?us-ascii?Q?lWlA7s8fUuyAzFuM30h50Yut7BFkwxevB7d3pCR9Z4hhm2jlYYc+oHsX7hBQ?= =?us-ascii?Q?C5Ui2qqZKDvJMxVRJXRx3uIjWW/gUSnzrYzB?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(7416014)(82310400026)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:21.3308 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8489f693-9131-425a-b1ac-08dd9f71f8fb X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000147.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR12MB8577 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606638836116600 Content-Type: text/plain; charset="utf-8" xen/grant_table is meant to pull asm/grant_table, when it exists. Signed-off-by: Alejandro Vallejo Acked-by: Stefano Stabellini Reviewed-by: Jason Andryuk --- xen/arch/arm/domain_build.c | 1 - xen/arch/arm/include/asm/grant_table.h | 1 - xen/include/xen/grant_table.h | 2 +- 3 files changed, 1 insertion(+), 3 deletions(-) diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index b189a7cfae..11cc03e5db 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -37,7 +37,6 @@ =20 #include #include -#include #include =20 static unsigned int __initdata opt_dom0_max_vcpus; diff --git a/xen/arch/arm/include/asm/grant_table.h b/xen/arch/arm/include/= asm/grant_table.h index c5d87b60c4..c47058a3a0 100644 --- a/xen/arch/arm/include/asm/grant_table.h +++ b/xen/arch/arm/include/asm/grant_table.h @@ -1,7 +1,6 @@ #ifndef __ASM_GRANT_TABLE_H__ #define __ASM_GRANT_TABLE_H__ =20 -#include #include #include #include diff --git a/xen/include/xen/grant_table.h b/xen/include/xen/grant_table.h index 297d7669e9..491cd6c539 100644 --- a/xen/include/xen/grant_table.h +++ b/xen/include/xen/grant_table.h @@ -27,7 +27,7 @@ #include #include =20 -#ifdef CONFIG_GRANT_TABLE +#if __has_include("asm/grant_table.h") #include #endif =20 --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607104; cv=pass; d=zohomail.com; s=zohoarc; b=cRP12GpySDrtQUR0mOg/Vw4FNOC5h7J/nwJql2IxVdVvtawXRvr0XW6nhzd7HKyZdryOEuhnNMsBHAqKP0ZlZb/DG7SPBTk/z6AjUdV8VDB4YqM1H1lxJ2lQ0j0EQDgk2beSo00Ie5R6f0GDnofqxms0Egem/6IBIsgRgkp+CX0= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607104; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=lh7ewCrrIM0zkU9a/iiqTktsuVi4TxAGs/l1EJ0Ddg0=; b=XYComy2nte+kBmQYQc4XdVZPcYNxkdEGaoZb3LPFHkiIszjCFsLRPw/Coab5w7HAnT6tNrx0r2kaX8+YLrC0x+PMLooyP4uF8gVWUKHQu4vcBlHqhHpsNUIu3M2qkJjheBZ/Qd2a2EjNImnzLLkR6pjZCMtn84Cd8GV2gW45gkU= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748607103194129.2678464661219; Fri, 30 May 2025 05:11:43 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000797.1381025 (Exim 4.92) (envelope-from ) id 1uKyZs-0006jr-Ou; Fri, 30 May 2025 12:11:12 +0000 Received: by outflank-mailman (output) from mailman id 1000797.1381025; Fri, 30 May 2025 12:11:12 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyZs-0006jh-Lx; Fri, 30 May 2025 12:11:12 +0000 Received: by outflank-mailman (input) for mailman id 1000797; Fri, 30 May 2025 12:11:10 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySS-00076q-0M for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:32 +0000 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on2061d.outbound.protection.outlook.com [2a01:111:f403:2412::61d]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 193936b2-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:30 +0200 (CEST) Received: from CH0PR04CA0095.namprd04.prod.outlook.com (2603:10b6:610:75::10) by BY5PR12MB4180.namprd12.prod.outlook.com (2603:10b6:a03:213::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.25; Fri, 30 May 2025 12:03:23 +0000 Received: from CH2PEPF0000014A.namprd02.prod.outlook.com (2603:10b6:610:75:cafe::ca) by CH0PR04CA0095.outlook.office365.com (2603:10b6:610:75::10) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8746.31 via Frontend Transport; Fri, 30 May 2025 12:03:23 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF0000014A.mail.protection.outlook.com (10.167.244.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:22 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:21 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 193936b2-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=WCZSPjqqpRWyN9AqgalFKOiDTrWOp9gdaU+mL0xcic30zYJAxgY1SDtslm1vOgBwwTTqe8McCjGuWaib6L3sogSHpcvnGwlz34rLSHWg2gNgBv3E4GI/xOqhY/Y/mGdfTe43w1EF2ejwudMJXf+wrhhlKBmVSW5cUNDy3lrGlIr2QOjhpp8YEblbekJASo2M6atZsGJnS5BPyina6DFOFItJLvqw8csQPEMUKlr/EwHeagKAqLjwcS1D3s5WPnjt9bkc2+J0cCmu6B43BnZzy7+mdW0CUZM5guslNgkTONYBTI7mG/rdtoZmofNvzc8cYKMF6a9XmBXYsDMdh0LG0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lh7ewCrrIM0zkU9a/iiqTktsuVi4TxAGs/l1EJ0Ddg0=; b=Ph2+vlCWzso3pIY6FJ+HoxeDfCP1K1/v7ij2wEvs1SAPLPcOK7hLzD8Py4S1UVhmUd2YBaNiLsfqyyKKUYqxAgzBAfr1Mikwzhgyqqwq9CU5UcdeIz9HUk9giYPGuOTJcfw4XBhfNTBHkkLy7wvswwfJiyc4m4SPK8LFM6h++ZBfvjndJ/HP6+6aOrRunYZQWr/V5/cVAc/Q/0ZYKjlPBGALH4HKbrppP+rWru7T8CqWnELImKiNHYmNXr5r5iWnJdzg3skcI9M+2/49bHR36A+K7bzyMAJjkSsitPxlfBz0RYkZc9mr4anriTlxl3he1wXVJVR3QHPaYs0hvK0Pdg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lh7ewCrrIM0zkU9a/iiqTktsuVi4TxAGs/l1EJ0Ddg0=; b=sYUruGK+bR0evDJhEaylVN28UR32S5Zm+sDPnWSGXaahDTFqNObpWMz8Ci4YleKEvKOSdVqIJfLrX2M/9h4hYP3BZTnVRxQ8digMvH4VGyVx1nZit/jOZFTq7Ow16Sqc8iqMrHqqQDRFewh6WoDAXTA3rPyfHKWojKzzb9nj1J4= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Daniel P. Smith" Subject: [PATCH 08/19] xen/dt: Add BOOTMOD_MICROCODE Date: Fri, 30 May 2025 14:02:16 +0200 Message-ID: <20250530120242.39398-9-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF0000014A:EE_|BY5PR12MB4180:EE_ X-MS-Office365-Filtering-Correlation-Id: 3be31408-4e36-45d6-c202-08dd9f71f9ef X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|1800799024|376014|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?Zn8Ghrk/oI+ejLkPnT38dxN4FTvByaAlfvaW/6k+uJe7B20oc4Vy+oTWiUE1?= =?us-ascii?Q?AV+YPYoDLd0RpnPTFIl7vkLjTqUVns0n2eDd85RuQ/ApRHllaqPM0bDgswG9?= =?us-ascii?Q?HVVlI4x/bvltDNVfSqVZbe4LJxTWsZJEdPrtu6zagq/wzmDSTlQCnQoBtIbb?= =?us-ascii?Q?tZdfIMQvqXlsVOEx4bHfRZZk6mdBrr2paXH+1Zf/T3m3f29AgarHWpCX8WG2?= =?us-ascii?Q?aFXQva62v+5AWJSYiqGtt6L1sdyU/4n9i78mFFvU26DvHbRyuIXuKPQapSu+?= =?us-ascii?Q?0CrnBNlRfAlnATf4Cncl+SfPYxoMEFg9YyWMtk4YMQBCJj1ePd9WTJky/qwq?= =?us-ascii?Q?JYNkPtaUE5H2zzmhgucrdRqeTfA5ciUqpuDdFqYGxOFl2dnK/rVDYmXAW5dy?= =?us-ascii?Q?WuzVzUxL8f/8gGBcW3bcZWiGOc7Sb176aq2B20OTENJgWkahS57jc4+qpRWX?= =?us-ascii?Q?ZtOQPIcw1WrplCTRQCkGlAmNdd5am71LfGvfma4Dzqiagucy5LJ1O0JQVAWm?= =?us-ascii?Q?Ly/h/sLQYtK15WITjJ6yHhET7FV+5Zcf7cXOQ56xYcH9lYaC/cCa46VC0+eg?= =?us-ascii?Q?HHv2tAAsJYFtxV4DOPDnDQTSTKMeCb1IsyL3OlzZ7JRVnEJoVICwv5orguxZ?= =?us-ascii?Q?4VywKZSE7GVFGAN4diXxRJPeWTqU5D1J22wsKxi0CQvFfF/JyPfVrU/6mr9v?= =?us-ascii?Q?NvALq2Ux4FvHsmYLrxhaQlRjOvpETq19yMle37esAZqLnhcgadr+jpipmny6?= =?us-ascii?Q?REllA1j/lUiF9h+bgs1qS8q6lS04DAF4Q2BLeWyG7RtrnjKTm+kKPhAO6xZ8?= =?us-ascii?Q?0fJA6YP3RYhISYHjnw5ZmckljRczEQyKKrivXZ+swPiHgMxeG2V+RHDehPy7?= =?us-ascii?Q?UM1ZeXs+rqDYPfd9Rwyb2jQ9YF5i1RltljfyE6zvh2ccC3khXT0aVHU9Rk33?= =?us-ascii?Q?i2ShIs3rvKThJMBrUl64LAMeys5WDxjugtyX+cgGuIWkAKrpL6Big9lemFqO?= =?us-ascii?Q?B8KunivM0zyfCjah3cwO+vyA3kyNTRnYttqmjbGfOAwVMElZI827a8bXkdvl?= =?us-ascii?Q?8BHdZNYVsMijFkUEbnetvTy0a3x1z/ALaw/+ppGZbyH82s3pXbRSvU2nPqkb?= =?us-ascii?Q?lC6pxXvvfoQ5MW5G1jwRr1FkEfN1QnvE+omCtxCqQ+OnEGIgV0p3eRq0Eg7+?= =?us-ascii?Q?y/cGgd1cCSmUtMit9vMI2Yma7hAGe+DfyBL2RyvhVr0qn9IFpwNOBzD1Ehyb?= =?us-ascii?Q?AruwgZ7UijzR7SDqa8TLTkLNWSrlurPNzo2DCHyKEzE/D8ZWDbzPpHHYq6XD?= =?us-ascii?Q?/ThK/ztATCJ1rh9d5JuEw77sfvprA02fc84c5Ut5C962LgDG/jf5HyypQF7f?= =?us-ascii?Q?GbVLkWH9MB9JqbgWQIoQ4RJ7YEqcNcdvVZx9LahflkhtheSIw3Ekf8e86LU4?= =?us-ascii?Q?JXux6EaSEKaQl5aaoDRFe5IADaGLN1MSmXGJSw+jrm8ikACf3eklGb0gipy3?= =?us-ascii?Q?aQjMmgMwQ0CSZNniipICN3LREaYf1B97qc7J?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(1800799024)(376014)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:22.9279 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3be31408-4e36-45d6-c202-08dd9f71f9ef X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF0000014A.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR12MB4180 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607106877116600 Content-Type: text/plain; charset="utf-8" In preparation for x86 to start using bootmodule instead of boot_module Signed-off-by: Alejandro Vallejo Reviewed-by: Stefano Stabellini --- xen/common/device-tree/bootinfo.c | 1 + xen/include/xen/bootfdt.h | 1 + 2 files changed, 2 insertions(+) diff --git a/xen/common/device-tree/bootinfo.c b/xen/common/device-tree/boo= tinfo.c index 76d652c0de..717cfa0962 100644 --- a/xen/common/device-tree/bootinfo.c +++ b/xen/common/device-tree/bootinfo.c @@ -31,6 +31,7 @@ const char * __init boot_module_kind_as_string(bootmodule= _kind kind) case BOOTMOD_RAMDISK: return "Ramdisk"; case BOOTMOD_XSM: return "XSM"; case BOOTMOD_GUEST_DTB: return "DTB"; + case BOOTMOD_MICROCODE: return "Microcode"; case BOOTMOD_UNKNOWN: return "Unknown"; default: BUG(); } diff --git a/xen/include/xen/bootfdt.h b/xen/include/xen/bootfdt.h index 847f019559..d503d1bd4b 100644 --- a/xen/include/xen/bootfdt.h +++ b/xen/include/xen/bootfdt.h @@ -21,6 +21,7 @@ typedef enum { BOOTMOD_RAMDISK, BOOTMOD_XSM, BOOTMOD_GUEST_DTB, + BOOTMOD_MICROCODE, BOOTMOD_UNKNOWN } bootmodule_kind; =20 --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607101; cv=pass; d=zohomail.com; s=zohoarc; b=h1t3eLhJD4JHnrkvGxQNT2ouP2VB4IO/lDbqc2rpkhEkp5LdDAL4VM485s4GjbsMJqrVBll7M7nCsZKAXRSOrO1QWXIVUJ2FY2XUOCvp3RLFyh73OaYDG+8OsKCSRONP2MVvlDnax2jOaEKz/uPG0AsqYClwhH1RTXZWXNS5nqI= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607101; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=KCNBXPXD2aKN1qe1F0kvtAXVlpJprW3tfZvK/Z8sjKc=; b=K/wxoDWKiZbd2xSoVCwhyZ/PFCKwISAAsDASwqew5x18cSofX8dWhYJEUu/SPNUkgut92engNe3BBgbixFBa8Lp47ASzAZyz9ZcwqBLGcma/9NUByCWcnKn9JNud1z7870JhUpQlBnhvzs5uHjVPQZ7qBYuVSfMfhMdJwR3/DvU= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 174860710144813.117368865500794; Fri, 30 May 2025 05:11:41 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000819.1381046 (Exim 4.92) (envelope-from ) id 1uKyaA-0007mO-6U; Fri, 30 May 2025 12:11:30 +0000 Received: by outflank-mailman (output) from mailman id 1000819.1381046; Fri, 30 May 2025 12:11:30 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyaA-0007mH-3K; Fri, 30 May 2025 12:11:30 +0000 Received: by outflank-mailman (input) for mailman id 1000819; Fri, 30 May 2025 12:11:29 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySU-00076q-0x for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:34 +0000 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on20613.outbound.protection.outlook.com [2a01:111:f403:2415::613]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1af8e6d6-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:32 +0200 (CEST) Received: from CH0PR13CA0003.namprd13.prod.outlook.com (2603:10b6:610:b1::8) by CYYPR12MB8701.namprd12.prod.outlook.com (2603:10b6:930:bf::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.32; Fri, 30 May 2025 12:03:25 +0000 Received: from CH2PEPF00000147.namprd02.prod.outlook.com (2603:10b6:610:b1:cafe::8a) by CH0PR13CA0003.outlook.office365.com (2603:10b6:610:b1::8) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:24 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000147.mail.protection.outlook.com (10.167.244.104) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:24 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:22 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1af8e6d6-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=I2l1Toe2RZF/N4xhqBhqqgmVCR/CDiSq47ExVoV0yZ6FqpcOp+ZnfVNrTf0SiyVgriNpMhAXiWY/SW/92itvWGe8Uv4IFJ4yzN7nOJLUb5OpMR2BwbKeI5xnoRIRQosl2g4UtLesEFp5K8FFLIAAle9d274GYYcxlr4kXnrUMLCqotgmRKVYNBmISMcdihlozH6tsz4DCjjVj2xn1l/6jvZJ6lka090H763f8rUp2jKG/6kTDZLxV0dPr/PoY5PQwrTTRPamNoYJQ2cmMln5buu6UhaWbnViaGQcadgEQ80SbVni1ki96kXuODBQjLtEBIGZi6xOPtnLvzdvEiH5rQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KCNBXPXD2aKN1qe1F0kvtAXVlpJprW3tfZvK/Z8sjKc=; b=HPskpW0DkqHpsjORbSMq2hA2HisLfCY0GeoYgJyR44vpCyLnioHNiX9P74HxQ+nIsf2vK2LaDAqFSEIq6gHqq5lgQTpuBhHeaAwzN1qyccJGEQk8St7RE3AEbO77N4+ppHZbgghyo8uuVPgSuSdO4cW/X4Fzp5ignn5/lH1woJmHZwFBHe/nRsCSVjXsCVmwA8NGCdZTd1fYxX/JNM1VKk7vjP3rVoJVHYfD/ZGgWnzOJ5vq/1OxnyFiyOSQuLro70ubCIrogHIlMgWLQGnEI4eClPDVlRgILrfY+XQraXzLnbfJvWmfZlJKmGCj6J04ihSNsUMzjffskG8IEAP9IQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KCNBXPXD2aKN1qe1F0kvtAXVlpJprW3tfZvK/Z8sjKc=; b=UoIgWKwwOG5PfdoJN3/q0roPujJbKYCxiD1qKJgpNKgFlf8iar8hjlQQZWn08vhUaBPFiyEwCoqHrfDrxZQf7RjytVdEGlTdu9CAnwqsriGJBVz9yOhkInoX9mfqyfrmIT3kHLUXZ9BD4VDLaX1rp9jIdKYeHaXtuD7lLBQRdfM= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , "Daniel P. Smith" Subject: [PATCH 09/19] x86: Preinitialise all modules to be of kind BOOTMOD_UNKNOWN Date: Fri, 30 May 2025 14:02:17 +0200 Message-ID: <20250530120242.39398-10-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000147:EE_|CYYPR12MB8701:EE_ X-MS-Office365-Filtering-Correlation-Id: 0594b330-22c6-49ee-0818-08dd9f71fac7 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?BnlSpW3J1x67g0+/Ocgag8Jp9EC7m2MTi9LfIKWDldWK4SpHHlq9IMuPUZ3Y?= =?us-ascii?Q?by5Fb6kelrpa/HkhvSM5diIPzkOTs/tDR+maMvtlr3FXkKsZkbfxpk+q8HUq?= =?us-ascii?Q?H9V0xRO58oMG2TO0Fn7qrlvlkAW3MIF4KtuEZq0sNq4sorCABmjMXTN0+6hC?= =?us-ascii?Q?ngttbCYBghRkxGxrTeOAgNxNp8ovouSyg/KMsDDpuxVxx45IQqATLcQ+FWSn?= =?us-ascii?Q?v+2wG+C1BvuC1EBjJh5K+3gpWxoB9NwM/9w6xn9WC7qbOKERBCtqUF6EMnF9?= =?us-ascii?Q?KBwDo4LABhmDiZA4VhDyEwx+umufNCh4EAGxOR+WXvWTdcH9NUpy6oGGlZ0m?= =?us-ascii?Q?ftprhEQ6lfu9IKSIG7lZ9r86flVqlwS6id+wCLLGuRrYDpijis6LhBjJLm7L?= =?us-ascii?Q?dGqJSZsFT1ySf/fTE8EhSDJkXD9cgVjIiZdAQ4BwXA5DBLRBSVbQG24v7rDE?= =?us-ascii?Q?7pE/o0tm/9RA27uulJtlWiR6PA9KGiC0NIJFQiKuFHQEVhCWO0pGWrhPxvbA?= =?us-ascii?Q?MsUb+qvIZQCLlE0pXCr7wjIhRAz46tbiSpF52FMy36qTOYTYxnxrnNLCpoz+?= =?us-ascii?Q?FwZozNXBTxIEhYfHHiz07xWQE4C3Rg22c1WmW4DL66Ot1o518+oEYLucho8p?= =?us-ascii?Q?kZFUkY1eskfWe8h5S0TJI13UTBTvhoOIg6AaRVW8zjVNH1+vslNCcOb5iBoq?= =?us-ascii?Q?CsYEgc28PpFB0AGgUNIr5WouiCIe8XzdBfU2zylg86oFaUnzQZAuSXb+pM84?= =?us-ascii?Q?63A5eeT3tBN1cHIo7mfhuTJGgMn1t4XbTbH4itJXrSF90XEHNx+2dorgrQ9O?= =?us-ascii?Q?ZHTmw8n+32OH1+BJX3hyMdLzVy+38VmYvDN+DdYXdYLXIsKzBVlDp5BY+hmW?= =?us-ascii?Q?uMZaliWUSspB0nrdNczgl2pxDQN4mEu6sxO1sqSc//+/RNfY83CGlLnFUQU/?= =?us-ascii?Q?f6OmvRZav2X/CkMkb22UNXBboNVNodVY8uRiWXeW8cPQkFmEIpvHa74QErIq?= =?us-ascii?Q?z5cMuaUfaDMZ6LLDF5XYmZNF7XMNH84Pfn0Y5gK2UsAl2uPhQlXvnsMsdfD7?= =?us-ascii?Q?eVBUPjfx+5Iv7Q7J6iaIn6u5+mOA1Xw+WmXPQoQdcXX2NoZTidipmo/Vds/E?= =?us-ascii?Q?qzRBVNNgEhwX0dOgKLkCHKDnpc88SQuhBtSIrUaoWJ8KZiQ9nU3gRsgdjbLb?= =?us-ascii?Q?k1g0NXWKo1mv3T3w5U4toRzWZvvEOZ1RjJlsXmNUKTKZMEYc05EYfmJvz2eG?= =?us-ascii?Q?nXsLodKMpmhbfX9LqD7pP3qrZolbJRxejAh6q1ex3fYD8XZBnMe2LzBwUxmJ?= =?us-ascii?Q?B6lrjs4Xv1Rb6pqFQYQ8j8nT3n/sUc538SXhitXEdK2RA2oaN3Llwlvp0kTg?= =?us-ascii?Q?uVK50SJ3v2RiD4e12KXj0xkGJcVqZ5flyHL9V0ZZATeOuGpvPbj5I+tb3Hij?= =?us-ascii?Q?BIGNrT/4fz28fe/hRBBYkudliOFVyrw3CN1xmZNxBuM8Z7VdpKczf5r7zV4H?= =?us-ascii?Q?+ypylZltmgmZsL20QpGtZSIaLQppulBQSV/3?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(1800799024)(82310400026)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:24.3319 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 0594b330-22c6-49ee-0818-08dd9f71fac7 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000147.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CYYPR12MB8701 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607102647116600 Content-Type: text/plain; charset="utf-8" A later patch removes boot_module and replaces its uses with bootmodule. The equivalent field for "type" doesn't have BOOTMOD_UNKNOWN as a zero value, so it must be explicitly set in the static xen_boot_info. Not a functional change. Signed-off-by: Alejandro Vallejo Reviewed-by: Stefano Stabellini --- xen/arch/x86/setup.c | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index 1f5cb67bd0..5da9df33c9 100644 --- a/xen/arch/x86/setup.c +++ b/xen/arch/x86/setup.c @@ -298,6 +298,7 @@ struct boot_info __initdata xen_boot_info =3D { .loader =3D "unknown", .cmdline =3D "", .domains =3D { [0 ... MAX_NR_BOOTDOMS - 1] =3D { .domid =3D DOMID_INVA= LID } }, + .mods =3D { [0 ... MAX_NR_BOOTMODS] =3D { .type =3D BOOTMOD_UNKNOWN } = }, }; =20 static struct boot_info *__init multiboot_fill_boot_info( --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606637; cv=pass; d=zohomail.com; s=zohoarc; b=Afydoxv4u33dcv2xgiFTbF4Pljy12stwVutemtNmWETxOTF3TC+4icQ84f1wpF7H5AgQ7Tr3CdeJM1CQYsMaPoLTma0oqWatIqO+ZcKYSmgyohvanHuQhahn6ZRx2IgDYX0D8WgJQGnuUJpXld9MmkATYCnaUdkdaE6de6UKG2k= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606637; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=hIPhLoFawvGeIDDt6iVFMk37bF1y48jzP0Gaa6ODd+o=; b=ZD9QXedBJqmu9JkdAwUkBB84Gi2uJC+C3kvIf+SoyL1crJcezRS4KYqmqNbw7jF++VOyg9xKdrnDW/RN4pS952Ox4NCqOe83XCivCn7//Lw/ofVgoHhCBSSkF010srF0NvUH1LU1ckyVykKkG+r7viOAE7un38EDFgLDpYPMUpI= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606637804264.55209382658734; Fri, 30 May 2025 05:03:57 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000721.1380972 (Exim 4.92) (envelope-from ) id 1uKySW-00013H-Rg; Fri, 30 May 2025 12:03:36 +0000 Received: by outflank-mailman (output) from mailman id 1000721.1380972; Fri, 30 May 2025 12:03:36 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySW-00012X-Ja; Fri, 30 May 2025 12:03:36 +0000 Received: by outflank-mailman (input) for mailman id 1000721; Fri, 30 May 2025 12:03:35 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySV-0007de-Bf for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:35 +0000 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on20606.outbound.protection.outlook.com [2a01:111:f403:200a::606]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 1a69e3a3-3d4e-11f0-b894-0df219b8e170; Fri, 30 May 2025 14:03:32 +0200 (CEST) Received: from CH0PR04CA0117.namprd04.prod.outlook.com (2603:10b6:610:75::32) by MN6PR12MB8567.namprd12.prod.outlook.com (2603:10b6:208:478::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.21; Fri, 30 May 2025 12:03:26 +0000 Received: from CH2PEPF0000014A.namprd02.prod.outlook.com (2603:10b6:610:75:cafe::af) by CH0PR04CA0117.outlook.office365.com (2603:10b6:610:75::32) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8792.23 via Frontend Transport; Fri, 30 May 2025 12:03:26 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF0000014A.mail.protection.outlook.com (10.167.244.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:26 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:24 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1a69e3a3-3d4e-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=u/H+7viSBxzqz7JSl+9F+KzV5lmHin8gawlUW8YvDBI+86gd+OPFbnm3f68VANlb3PAYZ9GxgPblRt49hLKxIQVps89dTt1SVQIyOfL0JKLTjB0y9AvqHVE1COJG5BHmNuJJ6oudPnnUW4oovIEAHnHUMezrrOrr1nTEt2hlOl3FCqznDIKB78r9mYL5xMatMYwfeB8OXCYTQmhmzzkKLhtxLLbwc/Kg14VChAesS5D98wihN9E5kVDVDS/cuILWkSI18nQxct90QbKoTWOQ3URKPuwBB7KnysEnzhHEleZEb2WTsRBqnxt51DUNXwl8dtBOeG+OBcOCPPsOQt2rEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hIPhLoFawvGeIDDt6iVFMk37bF1y48jzP0Gaa6ODd+o=; b=si6Sh73J/k9KEeyBFjKDdJ4RffMAXAg3yCtzGioFYk4+FZcHXXsjFmiUvfkR+g1+FRkUA2k+anRpl/jfRkEuZpaCw6yeSbzZUsyYGyuorwWdN739h2IY5nCG7VwX1wfl+y1Axqxf6LlS3XoLaedxXsRtgfk7aHPBiG/1lRg73sc4uTV5iFCb6dAzGUwTLJUIE1v93IIjEf+xai8TiiK5Ojsoum9beL4etkj/AJDhDWdYDgMQXMuspbbQ0j5mxOfX1mozEAFIYlFDQBU6BNq4KWKvuSyhcJgvi2aOdPS06c6ZKSHjvBfdu0fvSO2jxISF2bmUD1IWnD2jOX3SkC6FYw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hIPhLoFawvGeIDDt6iVFMk37bF1y48jzP0Gaa6ODd+o=; b=TcKQqk22Kzr2W7JKhhyvfxvLA3EABWVTlYRMEoyLq1yuqXN8glpDlTtQVOeQZAF+pBqGzmC2Ryo8TglQAd37oAU6nvjT2McKtbmT0Ht5GbCDsYbcvWj6fjjoTZAo9IWjFgfrgTJmA9CoOew5StfA9rLboh/62gYq5vJrzzV2F4k= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , "Stefano Stabellini" , Julien Grall , "Bertrand Marquis" , Michal Orzel , "Daniel P. Smith" Subject: [PATCH 10/19] x86: Replace boot_module with bootmodule Date: Fri, 30 May 2025 14:02:18 +0200 Message-ID: <20250530120242.39398-11-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF0000014A:EE_|MN6PR12MB8567:EE_ X-MS-Office365-Filtering-Correlation-Id: 1458d993-2fdf-4d7a-4d74-08dd9f71fc1a X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|82310400026|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?FAYq855I6ECSQP7Itggoowy+mLSUPDj1VS9clrFgsLMGIjQ9l/vUgnS7UrFC?= =?us-ascii?Q?2weAGUpd0Htuvrl/Jwecr/bqbLSdukmtikr2oO1VYl2PW49spjEq/5ZDaEQK?= =?us-ascii?Q?TztZueLHFEBKotfIURjBiBiUs8pOaOuUQxQSMpzPEiM0GEPoxFvaXwHktnhE?= =?us-ascii?Q?0YMvi8o0MTt8Tx6tCitSQD+XYpnLTCiQACftgImIkk8+q4ofi6ZoBmNhxuzZ?= =?us-ascii?Q?dPp+sTJ/9dmNcSOByVy0lKGmWZsHLOF8tUawNkf73bWR+8uqko70qAPEr6kY?= =?us-ascii?Q?qdSpMO8n2xJgAHegF/E4akvZoSA+/V52PdHlHFl1dYKT9nW8QzFvyNg9iHTp?= =?us-ascii?Q?E+26HGlSUSlqeIx/cdCiDdJw3KhToWZkDT7OjKXg60whWpVzJU5hS9kFlobH?= =?us-ascii?Q?X++8eUozL5Xe1XPBXUfbxKV1GMV3XckrsElOceqJ8XfFZUbNvPdU2E3j0zcv?= =?us-ascii?Q?3Ub6zauGN58q4YdHgrpcSkVDvbad9LFFrMZ32F5QqbKR/ltGyIyr9cbiOSka?= =?us-ascii?Q?UouI8+fEFGbSMS5ofXV2nguChiPjnXEHaFx61xB5SkUV9NHf66TaaUuAVtZ4?= =?us-ascii?Q?muaMhMJlEARv+quL28rCLTfi0PwgLeVNO5OpolmPQdf5RSlEGQQ6Z1/7W3kN?= =?us-ascii?Q?Zsm98pqUTEavspfH7KclaPjQsUaBSmPxf1QDKQr3WeIpyJ/Flpy6jUelp/lb?= =?us-ascii?Q?cGyJI/9XAJiih8y3enaR/HYM3Gty4xYR9esYqrcRURTMFZyqk5G1LN4DjTbt?= =?us-ascii?Q?jjz6nI3Rm5xNIrRhzn8Ps3MoLUtMZgKqD7o5p08RwnaQfEvGF+TOBtOouwjU?= =?us-ascii?Q?CDwkNZw4I5KDoZvxXRrXOxOy7fj+vrN6MVKYzI9nRLahdKt35HPz5N4u4eDV?= =?us-ascii?Q?7LkpTyXMePC0G3cWDp+M0Yiqmy/C10wq3wN10u9uIkIhxx204wEPUY2XNkAs?= =?us-ascii?Q?OJQKSC6LpwOb4fdW2Fry3UaS6GuZ+A0f5o1OLjJolV56dJTOEcERSzV7t40B?= =?us-ascii?Q?GMMcQzs1bt7CQMqA0GbpttjNB/FF1UYh4nkRRrhn0zv074/8zhHlcA/1fsSi?= =?us-ascii?Q?NLnQ7IayV2XUtsx4grdpkVDN7P7S9+w8b4osh7JWbChb5zWJTsYwVcCzTJ2z?= =?us-ascii?Q?8fOSlBN6tIxZB4kpJF2Mu9hRnP9aWrW3j7CKZ8164IwtO9U6549P3d9EFEXp?= =?us-ascii?Q?rTee3tEiMVq7zYLRrG2KtGqx7bg/XWuwlBjS3Klzlg+2L/1qgWW8qqJ/rWqu?= =?us-ascii?Q?54ykJ4j0v63uN1R9/OqSiLPuwZ0RcxEJvO8mdG+c8bZfehs9J/CZs235LgF4?= =?us-ascii?Q?q/7oUm337lt2/NCVEWDTlDASaqcu71amZA7210sT66LKkV5rSMcQBFLfFHlX?= =?us-ascii?Q?I5maByn+HdjITm9wDao+bV+QflKcuvnDVtyr1WBpctC3PQMLZSnis1H0kOx0?= =?us-ascii?Q?eBY6LIcDmov9Shc9aDFVHneGA8SkTTwOh5DJvaTfAgS57HzozI8Aocp28AnA?= =?us-ascii?Q?F5QwocQRjCWTJ+28DvxJfbHUUxWDcR8DaNXQ?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(82310400026)(36860700013)(1800799024);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:26.5635 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1458d993-2fdf-4d7a-4d74-08dd9f71fc1a X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF0000014A.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN6PR12MB8567 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606639141116600 Content-Type: text/plain; charset="utf-8" These types resemble each other very closely in layout and intent, and with "struct bootmodule" already in common code it makes perfect sense to merge them. In order to do so, add an arch-specific area for x86-specific tidbits. Signed-off-by: Alejandro Vallejo --- xen/arch/x86/cpu/microcode/core.c | 9 ++-- xen/arch/x86/hvm/dom0_build.c | 10 ++--- xen/arch/x86/include/asm/boot-domain.h | 4 +- xen/arch/x86/include/asm/bootfdt.h | 52 +++++++++++++++++++++++ xen/arch/x86/include/asm/bootinfo.h | 58 +++----------------------- xen/arch/x86/include/asm/setup.h | 6 +-- xen/arch/x86/pv/dom0_build.c | 8 ++-- xen/arch/x86/setup.c | 52 ++++++++++++----------- xen/include/xen/bootfdt.h | 9 ++++ xen/xsm/xsm_policy.c | 4 +- 10 files changed, 113 insertions(+), 99 deletions(-) create mode 100644 xen/arch/x86/include/asm/bootfdt.h diff --git a/xen/arch/x86/cpu/microcode/core.c b/xen/arch/x86/cpu/microcode= /core.c index 34a94cd25b..0111ef9156 100644 --- a/xen/arch/x86/cpu/microcode/core.c +++ b/xen/arch/x86/cpu/microcode/core.c @@ -760,12 +760,11 @@ static int __init early_microcode_load(struct boot_in= fo *bi) { for ( idx =3D 0; idx < bi->nr_modules; ++idx ) { - const struct boot_module *bm =3D &bi->mods[idx]; + const struct bootmodule *bm =3D &bi->mods[idx]; struct cpio_data cd; =20 /* Search anything unclaimed or likely to be a CPIO archive. */ - if ( bm->type !=3D BOOTMOD_UNKNOWN && - bm->type !=3D BOOTMOD_RAMDISK ) + if ( bm->kind !=3D BOOTMOD_UNKNOWN && bm->kind !=3D BOOTMOD_RA= MDISK ) continue; =20 size =3D bm->size; @@ -815,12 +814,12 @@ static int __init early_microcode_load(struct boot_in= fo *bi) return -ENODEV; } =20 - if ( bi->mods[idx].type !=3D BOOTMOD_UNKNOWN ) + if ( bi->mods[idx].kind !=3D BOOTMOD_UNKNOWN ) { printk(XENLOG_WARNING "Microcode: Chosen module %d already use= d\n", idx); return -ENODEV; } - bi->mods[idx].type =3D BOOTMOD_MICROCODE; + bi->mods[idx].kind =3D BOOTMOD_MICROCODE; =20 size =3D bi->mods[idx].size; data =3D bootstrap_map_bm(&bi->mods[idx]); diff --git a/xen/arch/x86/hvm/dom0_build.c b/xen/arch/x86/hvm/dom0_build.c index a038e58c11..96410344a8 100644 --- a/xen/arch/x86/hvm/dom0_build.c +++ b/xen/arch/x86/hvm/dom0_build.c @@ -647,10 +647,10 @@ static int __init pvh_load_kernel( const struct boot_domain *bd, paddr_t *entry, paddr_t *start_info_addr) { struct domain *d =3D bd->d; - struct boot_module *image =3D bd->kernel; - struct boot_module *initrd =3D bd->module; + struct bootmodule *image =3D bd->kernel; + struct bootmodule *initrd =3D bd->module; void *image_base =3D bootstrap_map_bm(image); - void *image_start =3D image_base + image->headroom; + void *image_start =3D image_base + image->arch.headroom; unsigned long image_len =3D image->size; unsigned long initrd_len =3D initrd ? initrd->size : 0; size_t cmdline_len =3D bd->cmdline ? strlen(bd->cmdline) + 1 : 0; @@ -721,9 +721,9 @@ static int __init pvh_load_kernel( { size_t initrd_space =3D elf_round_up(&elf, initrd_len); =20 - if ( initrd->cmdline_pa ) + if ( initrd->arch.cmdline_pa ) { - initrd_cmdline =3D __va(initrd->cmdline_pa); + initrd_cmdline =3D __va(initrd->arch.cmdline_pa); if ( !*initrd_cmdline ) initrd_cmdline =3D NULL; } diff --git a/xen/arch/x86/include/asm/boot-domain.h b/xen/arch/x86/include/= asm/boot-domain.h index d7c6042e25..242e9c9c2b 100644 --- a/xen/arch/x86/include/asm/boot-domain.h +++ b/xen/arch/x86/include/asm/boot-domain.h @@ -13,8 +13,8 @@ struct boot_domain { domid_t domid; =20 - struct boot_module *kernel; - struct boot_module *module; + struct bootmodule *kernel; + struct bootmodule *module; const char *cmdline; =20 struct domain *d; diff --git a/xen/arch/x86/include/asm/bootfdt.h b/xen/arch/x86/include/asm/= bootfdt.h new file mode 100644 index 0000000000..c00de8c09b --- /dev/null +++ b/xen/arch/x86/include/asm/bootfdt.h @@ -0,0 +1,52 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef __ARCH_X86_BOOTFDT_H__ +#define __ARCH_X86_BOOTFDT_H__ + +#include + +struct arch_bootmodule +{ + /* + * Module State Flags: + * relocated: indicates module has been relocated in memory. + * released: indicates module's pages have been freed. + * fdt_cmdline: indicates module's cmdline is in the FDT. + */ + bool relocated:1; + bool released:1; + bool fdt_cmdline:1; + + /* + * A boot module may need decompressing by Xen. Headroom is an estima= te of + * the additional space required to decompress the module. + * + * Headroom is accounted for at the start of the module. Decompressin= g is + * done in-place with input=3Dstart, output=3Dstart-headroom, expectin= g the + * pointers to become equal (give or take some rounding) when decompre= ssion + * is complete. + * + * Memory layout at boot: + * + * start ----+ + * v + * |<-----headroom------>|<------size------->| + * +-------------------+ + * | Compressed Module | + * +---------------------+-------------------+ + * | Decompressed Module | + * +-----------------------------------------+ + */ + unsigned long headroom; + paddr_t cmdline_pa; +}; + +#endif /* __ARCH_X86_BOOTFDT_H__ */ + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 4 + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/arch/x86/include/asm/bootinfo.h b/xen/arch/x86/include/asm= /bootinfo.h index 3afc214c17..f3210b7d6a 100644 --- a/xen/arch/x86/include/asm/bootinfo.h +++ b/xen/arch/x86/include/asm/bootinfo.h @@ -8,6 +8,7 @@ #ifndef X86_BOOTINFO_H #define X86_BOOTINFO_H =20 +#include #include #include #include @@ -19,55 +20,6 @@ /* Max number of boot domains that Xen can construct */ #define MAX_NR_BOOTDOMS 1 =20 -/* Boot module binary type / purpose */ -enum bootmod_type { - BOOTMOD_UNKNOWN, - BOOTMOD_XEN, - BOOTMOD_KERNEL, - BOOTMOD_RAMDISK, - BOOTMOD_MICROCODE, - BOOTMOD_XSM_POLICY, -}; - -struct boot_module { - enum bootmod_type type; - - /* - * Module State Flags: - * relocated: indicates module has been relocated in memory. - * released: indicates module's pages have been freed. - */ - bool relocated:1; - bool released:1; - - /* - * A boot module may need decompressing by Xen. Headroom is an estima= te of - * the additional space required to decompress the module. - * - * Headroom is accounted for at the start of the module. Decompressin= g is - * done in-place with input=3Dstart, output=3Dstart-headroom, expectin= g the - * pointers to become equal (give or take some rounding) when decompre= ssion - * is complete. - * - * Memory layout at boot: - * - * start ----+ - * v - * |<-----headroom------>|<------size------->| - * +-------------------+ - * | Compressed Module | - * +---------------------+-------------------+ - * | Decompressed Module | - * +-----------------------------------------+ - */ - unsigned long headroom; - - paddr_t cmdline_pa; - - paddr_t start; - size_t size; -}; - /* * Xen internal representation of information provided by the * bootloader/environment, or derived from the information. @@ -81,7 +33,7 @@ struct boot_info { size_t memmap_length; =20 unsigned int nr_modules; - struct boot_module mods[MAX_NR_BOOTMODS + 1]; + struct bootmodule mods[MAX_NR_BOOTMODS + 1]; struct boot_domain domains[MAX_NR_BOOTDOMS]; }; =20 @@ -94,16 +46,16 @@ struct boot_info { * Failure - a value greater than MAX_NR_BOOTMODS */ static inline unsigned int __init next_boot_module_index( - const struct boot_info *bi, enum bootmod_type t, unsigned int start) + const struct boot_info *bi, bootmodule_kind k, unsigned int start) { unsigned int i; =20 - if ( t =3D=3D BOOTMOD_XEN ) + if ( k =3D=3D BOOTMOD_XEN ) return bi->nr_modules; =20 for ( i =3D start; i < bi->nr_modules; i++ ) { - if ( bi->mods[i].type =3D=3D t ) + if ( bi->mods[i].kind =3D=3D k ) return i; } =20 diff --git a/xen/arch/x86/include/asm/setup.h b/xen/arch/x86/include/asm/se= tup.h index ac34c69855..c7deaba109 100644 --- a/xen/arch/x86/include/asm/setup.h +++ b/xen/arch/x86/include/asm/setup.h @@ -36,11 +36,11 @@ extern struct boot_info xen_boot_info; unsigned long initial_images_nrpages(nodeid_t node); void free_boot_modules(void); =20 -struct boot_module; -void *bootstrap_map_bm(const struct boot_module *bm); +struct bootmodule; +void *bootstrap_map_bm(const struct bootmodule *bm); void bootstrap_unmap(void); =20 -void release_boot_module(struct boot_module *bm); +void release_boot_module(struct bootmodule *bm); =20 struct rangeset; int remove_xen_ranges(struct rangeset *r); diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c index e1b78d47c2..e6c77413f5 100644 --- a/xen/arch/x86/pv/dom0_build.c +++ b/xen/arch/x86/pv/dom0_build.c @@ -374,8 +374,8 @@ static int __init dom0_construct(const struct boot_doma= in *bd) struct domain *d =3D bd->d; struct vcpu *v =3D d->vcpu[0]; =20 - struct boot_module *image =3D bd->kernel; - struct boot_module *initrd =3D bd->module; + struct bootmodule *image =3D bd->kernel; + struct bootmodule *initrd =3D bd->module; void *image_base; unsigned long image_len; void *image_start; @@ -422,7 +422,7 @@ static int __init dom0_construct(const struct boot_doma= in *bd) =20 image_base =3D bootstrap_map_bm(image); image_len =3D image->size; - image_start =3D image_base + image->headroom; + image_start =3D image_base + image->arch.headroom; =20 d->max_pages =3D ~0U; =20 @@ -659,7 +659,7 @@ static int __init dom0_construct(const struct boot_doma= in *bd) * pages. Tell the boot_module handling that we've freed it, s= o the * memory is left alone. */ - initrd->released =3D true; + initrd->arch.released =3D true; } =20 iommu_memory_setup(d, "initrd", mfn_to_page(_mfn(initrd_mfn)), diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index 5da9df33c9..a6b3dbfc8c 100644 --- a/xen/arch/x86/setup.c +++ b/xen/arch/x86/setup.c @@ -298,7 +298,7 @@ struct boot_info __initdata xen_boot_info =3D { .loader =3D "unknown", .cmdline =3D "", .domains =3D { [0 ... MAX_NR_BOOTDOMS - 1] =3D { .domid =3D DOMID_INVA= LID } }, - .mods =3D { [0 ... MAX_NR_BOOTMODS] =3D { .type =3D BOOTMOD_UNKNOWN } = }, + .mods =3D { [0 ... MAX_NR_BOOTMODS] =3D { .kind =3D BOOTMOD_UNKNOWN } = }, }; =20 static struct boot_info *__init multiboot_fill_boot_info( @@ -333,7 +333,7 @@ static struct boot_info *__init multiboot_fill_boot_inf= o( */ for ( i =3D 0; i < MAX_NR_BOOTMODS && i < bi->nr_modules; i++ ) { - bi->mods[i].cmdline_pa =3D mods[i].string; + bi->mods[i].arch.cmdline_pa =3D mods[i].string; =20 if ( efi_enabled(EFI_LOADER) ) { @@ -356,7 +356,7 @@ static struct boot_info *__init multiboot_fill_boot_inf= o( } =20 /* Variable 'i' should be one entry past the last module. */ - bi->mods[i].type =3D BOOTMOD_XEN; + bi->mods[i].kind =3D BOOTMOD_XEN; =20 return bi; } @@ -381,13 +381,13 @@ unsigned long __init initial_images_nrpages(nodeid_t = node) return nr; } =20 -void __init release_boot_module(struct boot_module *bm) +void __init release_boot_module(struct bootmodule *bm) { - ASSERT(!bm->released); + ASSERT(!bm->arch.released); =20 init_domheap_pages(bm->start, bm->start + PAGE_ALIGN(bm->size)); =20 - bm->released =3D true; + bm->arch.released =3D true; } =20 void __init free_boot_modules(void) @@ -397,7 +397,7 @@ void __init free_boot_modules(void) =20 for ( i =3D 0; i < bi->nr_modules; ++i ) { - if ( bi->mods[i].released ) + if ( bi->mods[i].arch.released ) continue; =20 release_boot_module(&bi->mods[i]); @@ -519,7 +519,7 @@ static void *__init bootstrap_map_addr(paddr_t start, p= addr_t end) return ret; } =20 -void *__init bootstrap_map_bm(const struct boot_module *bm) +void *__init bootstrap_map_bm(const struct bootmodule *bm) { return bootstrap_map_addr(bm->start, bm->start + bm->size); } @@ -689,7 +689,7 @@ static void __init noinline move_xen(void) #undef BOOTSTRAP_MAP_LIMIT =20 static uint64_t __init consider_modules( - uint64_t s, uint64_t e, uint32_t size, const struct boot_module *mods, + uint64_t s, uint64_t e, uint32_t size, const struct bootmodule mods[], unsigned int nr_mods, unsigned int this_mod) { unsigned int i; @@ -985,8 +985,9 @@ static size_t __init domain_cmdline_size(const struct b= oot_info *bi, const struct boot_domain *bd) { size_t s =3D bi->kextra ? strlen(bi->kextra) : 0; + const struct arch_bootmodule *abm =3D &bd->kernel->arch; =20 - s +=3D bd->kernel->cmdline_pa ? strlen(__va(bd->kernel->cmdline_pa)) := 0; + s +=3D abm->cmdline_pa ? strlen(__va(abm->cmdline_pa)) : 0; =20 if ( s =3D=3D 0 ) return s; @@ -1050,9 +1051,10 @@ static struct domain *__init create_dom0(struct boot= _info *bi) if ( !(cmdline =3D xzalloc_array(char, cmdline_size)) ) panic("Error allocating cmdline buffer for %pd\n", d); =20 - if ( bd->kernel->cmdline_pa ) + if ( bd->kernel->arch.cmdline_pa ) strlcpy(cmdline, - cmdline_cook(__va(bd->kernel->cmdline_pa), bi->loader), + cmdline_cook(__va(bd->kernel->arch.cmdline_pa), + bi->loader), cmdline_size); =20 if ( bi->kextra ) @@ -1074,7 +1076,7 @@ static struct domain *__init create_dom0(struct boot_= info *bi) strlcat(cmdline, " acpi=3D", cmdline_size); strlcat(cmdline, acpi_param, cmdline_size); } - bd->kernel->cmdline_pa =3D 0; + bd->kernel->arch.cmdline_pa =3D 0; bd->cmdline =3D cmdline; } =20 @@ -1287,7 +1289,7 @@ void asmlinkage __init noreturn __start_xen(void) } =20 /* Dom0 kernel is always first */ - bi->mods[0].type =3D BOOTMOD_KERNEL; + bi->mods[0].kind =3D BOOTMOD_KERNEL; bi->domains[0].kernel =3D &bi->mods[0]; =20 if ( pvh_boot ) @@ -1458,7 +1460,7 @@ void asmlinkage __init noreturn __start_xen(void) =20 if ( xen_phys_start ) { - struct boot_module *xen =3D &bi->mods[bi->nr_modules]; + struct bootmodule *xen =3D &bi->mods[bi->nr_modules]; =20 relocated =3D true; =20 @@ -1471,7 +1473,7 @@ void asmlinkage __init noreturn __start_xen(void) xen->size =3D __2M_rwdata_end - _stext; } =20 - bi->mods[0].headroom =3D + bi->mods[0].arch.headroom =3D bzimage_headroom(bootstrap_map_bm(&bi->mods[0]), bi->mods[0].size); bootstrap_unmap(); =20 @@ -1552,10 +1554,10 @@ void asmlinkage __init noreturn __start_xen(void) /* Is the region suitable for relocating the multiboot modules? */ for ( j =3D bi->nr_modules - 1; j >=3D 0; j-- ) { - struct boot_module *bm =3D &bi->mods[j]; - unsigned long size =3D PAGE_ALIGN(bm->headroom + bm->size); + struct bootmodule *bm =3D &bi->mods[j]; + unsigned long size =3D PAGE_ALIGN(bm->arch.headroom + bm->size= ); =20 - if ( bm->relocated ) + if ( bm->arch.relocated ) continue; =20 /* Don't overlap with other modules (or Xen itself). */ @@ -1565,12 +1567,12 @@ void asmlinkage __init noreturn __start_xen(void) if ( highmem_start && end > highmem_start ) continue; =20 - if ( s < end && (bm->headroom || (end - size) > bm->start) ) + if ( s < end && (bm->arch.headroom || (end - size) > bm->start= ) ) { - move_memory(end - size + bm->headroom, bm->start, bm->size= ); + move_memory(end - size + bm->arch.headroom, bm->start, bm-= >size); bm->start =3D (end - size); - bm->size +=3D bm->headroom; - bm->relocated =3D true; + bm->size +=3D bm->arch.headroom; + bm->arch.relocated =3D true; } } =20 @@ -1596,7 +1598,7 @@ void asmlinkage __init noreturn __start_xen(void) #endif } =20 - if ( bi->mods[0].headroom && !bi->mods[0].relocated ) + if ( bi->mods[0].arch.headroom && !bi->mods[0].arch.relocated ) panic("Not enough memory to relocate the dom0 kernel image\n"); for ( i =3D 0; i < bi->nr_modules; ++i ) { @@ -2154,7 +2156,7 @@ void asmlinkage __init noreturn __start_xen(void) initrdidx =3D first_boot_module_index(bi, BOOTMOD_UNKNOWN); if ( initrdidx < MAX_NR_BOOTMODS ) { - bi->mods[initrdidx].type =3D BOOTMOD_RAMDISK; + bi->mods[initrdidx].kind =3D BOOTMOD_RAMDISK; bi->domains[0].module =3D &bi->mods[initrdidx]; if ( first_boot_module_index(bi, BOOTMOD_UNKNOWN) < MAX_NR_BOOTMOD= S ) printk(XENLOG_WARNING diff --git a/xen/include/xen/bootfdt.h b/xen/include/xen/bootfdt.h index d503d1bd4b..fa65e8fcf4 100644 --- a/xen/include/xen/bootfdt.h +++ b/xen/include/xen/bootfdt.h @@ -7,6 +7,10 @@ #include #include =20 +#if __has_include() +#include +#endif + #define MIN_FDT_ALIGN 8 =20 #define NR_MEM_BANKS 256 @@ -106,8 +110,13 @@ struct shared_meminfo { struct bootmodule { bootmodule_kind kind; bool domU; + paddr_t start; paddr_t size; + +#if __has_include() + struct arch_bootmodule arch; +#endif }; =20 /* DT_MAX_NAME is the node name max length according the DT spec */ diff --git a/xen/xsm/xsm_policy.c b/xen/xsm/xsm_policy.c index 7f70d860bd..0c2cdea8ed 100644 --- a/xen/xsm/xsm_policy.c +++ b/xen/xsm/xsm_policy.c @@ -40,7 +40,7 @@ int __init xsm_multiboot_policy_init( =20 for_each_boot_module_by_type ( i, bi, BOOTMOD_UNKNOWN ) { - struct boot_module *bm =3D &bi->mods[i]; + struct bootmodule *bm =3D &bi->mods[i]; =20 _policy_start =3D bootstrap_map_bm(bm); _policy_len =3D bm->size; @@ -53,7 +53,7 @@ int __init xsm_multiboot_policy_init( printk("Policy len %#lx, start at %p.\n", _policy_len,_policy_start); =20 - bm->type =3D BOOTMOD_XSM_POLICY; + bm->kind =3D BOOTMOD_XSM; break; =20 } --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606636; cv=pass; d=zohomail.com; s=zohoarc; b=KTEnpHKYVPHyM03e1eAOToLGDb04kwju/JLPEqkjVCeCGUe7dkcHRiJMs+15Tmgc4KsRmZEzzDoodO1DhHLDP1Bd5CTUpjZWbj/ofpBfjPYR+qOpaxghfcigs5xoiIUdHYMGXokztOdN+9oymFOhAzrQkUrsDBJ+COBJ/c1s4wI= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606636; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=VHG82Ru0wjX5B6c2AZ+qjxP8hH7oJ3456oo5ASWGKik=; b=HpnBqixXqpvw8SP4IG72zZiufll5q7fcPiBP4RoZcDUMP0jMWLRG4cQg2XztQEUawGbk/qIa4tw7f6NtsH64U7iBjj7ifIcI30rw0VqzsBlOeUxyK4m4QfKdDUc9Vgx8JM90Bsq0qBm62jiybSoTG5xmxdIYgbsH4cAmuTm07jQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748606636836163.0882308631442; Fri, 30 May 2025 05:03:56 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000720.1380966 (Exim 4.92) (envelope-from ) id 1uKySW-0000yJ-AK; Fri, 30 May 2025 12:03:36 +0000 Received: by outflank-mailman (output) from mailman id 1000720.1380966; Fri, 30 May 2025 12:03:36 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySW-0000xs-5O; Fri, 30 May 2025 12:03:36 +0000 Received: by outflank-mailman (input) for mailman id 1000720; Fri, 30 May 2025 12:03:34 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySU-0007de-BV for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:34 +0000 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on20607.outbound.protection.outlook.com [2a01:111:f403:2417::607]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 1aa9b876-3d4e-11f0-b894-0df219b8e170; Fri, 30 May 2025 14:03:32 +0200 (CEST) Received: from CH2PR18CA0049.namprd18.prod.outlook.com (2603:10b6:610:55::29) by IA1PR12MB8405.namprd12.prod.outlook.com (2603:10b6:208:3d8::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.30; Fri, 30 May 2025 12:03:29 +0000 Received: from CH2PEPF00000148.namprd02.prod.outlook.com (2603:10b6:610:55:cafe::4b) by CH2PR18CA0049.outlook.office365.com (2603:10b6:610:55::29) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.19 via Frontend Transport; Fri, 30 May 2025 12:03:29 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000148.mail.protection.outlook.com (10.167.244.105) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:28 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:26 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1aa9b876-3d4e-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=HUMc0yrzeXwHBH61vHfMQ5Q+ysfQ94U6UMzf3sOLn36z9VP8Rl7pqqd/zJ5d3aRx0gM6o4zzvIz+jCOMc3R5ZJT6DPZmZ/CynugQ/FSbYSzH1EA3zi31VmM+HmXJgasMqb2OUogb3q9j7Iwa0ZxXG4zhsBm+cSHMq3vzseU/Z/iI1lmWBmGX15LSWwjXcRJQoGqQSQDrwFxfGYBN06BrwXEyLsrWn8GxatTbRsBuWBhvndCiVVUFsRf7U8HEEHb1YeVLH7RPUpfNm/s7ALgwAMuKNYSLig1PAoYZPzMJ00O8sc28QEr5IHQLRqjABcoEQ+DQmAUeAg6+CzSjKl8yHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=VHG82Ru0wjX5B6c2AZ+qjxP8hH7oJ3456oo5ASWGKik=; b=p464m4Ea6SthOxOi5RJ9Dy1WPFtwYtFHEpsRBO7/n4a65OmFSmRDhU+bj1q3RLBoij0bZkHVmc+8hK2//b7ZpWVwwrX20w3qWDPorinifU/HDovXlvdwBYKWJNTo6MefdN+N5x5gTRuejeBqLoHTN46l8HIFrMS0rNTDaor+jk9PhptBHGXQzWPoeQyKNvm17MqT7w9nwVMEdYqRZ3Q7cPfxH/eUyeIJzaETtCxTgsbSqv2AAh4cCJH8cfw6BzlCxYTOLpnUSgqxrTtfuDOpHRb6mSNV381W2G8szRwvycrboanWJzlsVF5FGHfH2r98iUdS8sj9ZNnR3ihNm6/zww== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VHG82Ru0wjX5B6c2AZ+qjxP8hH7oJ3456oo5ASWGKik=; b=x5XaskTSvbQH+5FjJDPK/Zm/AEOhwVOxX1x+jwmAMErex1K3IcRDgYug0zGMec6vlhAn5ENTrzXcEqrPSmoBEylwm84McEKFPEGtFdjwN7FMPkNdjpHhwCSLQyDxKAzp+qqD5OC12itliJD6q0MVg/Kgoar0BxkVlIa/z1ZIB5M= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Anthony PERARD , Michal Orzel , "Julien Grall" , Stefano Stabellini , "Daniel P. Smith" Subject: [PATCH 11/19] x86: Replace boot_domain with kernel_info Date: Fri, 30 May 2025 14:02:19 +0200 Message-ID: <20250530120242.39398-12-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000148:EE_|IA1PR12MB8405:EE_ X-MS-Office365-Filtering-Correlation-Id: 4f13120f-844e-42ac-2272-08dd9f71fd59 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?m7957DLGvMpBROcHwnNt+Boc87FjbwJ+skBu+lJdv6FyfMmsxKRQYRLBrjlW?= =?us-ascii?Q?MwzL9bDpZDJun9ysMeHj6zYzxiE/PQsipH17rQEwUu1564pAG/TaN7ZLcMhD?= =?us-ascii?Q?Bd0x88OcX2kqI5AyR9cx8LWzmOye5t8/rZqdCOJOrHibOkyR/xWkztkInUYK?= =?us-ascii?Q?e/c++ZBAh4lHullkndrlPvUV2nAOuCijPHbE0PfHWp4CGCFLRXj3F66rkJjV?= =?us-ascii?Q?QABP7oucnLPWaclTObNDeLOgcBySgWnZHzXP2Q9608yaADWxaOiemld06QVx?= =?us-ascii?Q?6rGz7mCfJAn0kXVRIBFya/TqednhNeVQBtr6by7j1gM2/gE1eEl7Xc10coDu?= =?us-ascii?Q?nxY5F3tkxCrJeuumoPRhQRQ6CDGSXImYb2YnvrECLEgOCSql1rwNTuZDEhLd?= =?us-ascii?Q?Pic0+b0UCjOFe1F4GM0TOHo7x9Toa9NXJJKizaPWOuwu7VlFLdjxv819+YTv?= =?us-ascii?Q?3QrM6+Yv2xWgLYxzeN+9pAdYnGBd5wF5fWnf3ui4jH3GUlnIndfEzIlj/o14?= =?us-ascii?Q?fKejri0tuOGmf5dMN1aqRCahymnY0oygbC/nRBCznppy7YhwcerHsUe/xFlU?= =?us-ascii?Q?OSwhs6AkslJq983wcAEGC96B+KoU7L3u6NhspOQsdckYrpAaEZhgt3ipaRCZ?= =?us-ascii?Q?6BzyvjeuMIY2r1K3ebmSdPrzuDrt37JjXKcet5/HUwftElP7hFHz/CRjeYXa?= =?us-ascii?Q?R8NVAMnBZOWlREURcHDPug1Ro7uuSo8+FAPQkIcNv9FQJ2c6FX2oznl9/vkK?= =?us-ascii?Q?1MnSlZLRvWMPJLKjj/MFWnwPMCyDKz8HoF2nGke5Nwzt2lZRHuwrodSeVzjc?= =?us-ascii?Q?bB536Nsup8ek67y75f1kGMuI2Di6zOfxhtdp0yx9nzJCysfiS4Gjk1Gh5aGI?= =?us-ascii?Q?gxeWsE80gxIs7JF+QGmsDt9y23H2p9i4bxbrDBF4SKtUufAD1H5kWz+3oHcR?= =?us-ascii?Q?FQpYqcCJgtTtK808lyVrHq2ukQEmmOgSD7untMnqrkIzRPZjSa+kkmM48OoK?= =?us-ascii?Q?i4Qyi3xLvJSGoeApjqaVIqS8A+lJIOysoyJxSMmPwQA60YSaOGNgijzjt+Sd?= =?us-ascii?Q?8JcJSRGVkoESqWgzioavCQaOAJgWs3nAam2Wgxde7Wx+fJySiYP1ovFQAatY?= =?us-ascii?Q?elLoleBkuCsiUn7GTQHqXQo+1rl8bxb7MehkPRXvtO3cFU1WYag+Jgnlsrsg?= =?us-ascii?Q?wcFw9EEJ7y49L5aJnIzYrNWJIdqaANzcrOVnb9ts5FWfs3YRI8MF8+h2Tfx4?= =?us-ascii?Q?qQdgU5eDpbgLGA9PXRap5CYqIwtbSSGhxG2ztOWu2Sy5z2hW1H3mGDP0Du7s?= =?us-ascii?Q?m4/3n5yf37mjEIt7wJ8+4yn/Ofj4T6uur7AFPRRVmi/4cFC83YJfPBUzlKkl?= =?us-ascii?Q?pxue7vN2li27JvTigjWs3ea1n/jzVugSxVqo0dLv84YTdmaMn6G4WtsxEznf?= =?us-ascii?Q?LCBJOYdJo0d+pAIVr6uLFePZSBlseL0AndBIGUM5qdVBJMIILq8YAbMR8Q+P?= =?us-ascii?Q?M5zih2/1MQbk/SEDQJc8UZLmQegSLx4TMNMt?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(376014)(82310400026)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:28.6538 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4f13120f-844e-42ac-2272-08dd9f71fd59 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000148.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB8405 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606638862116600 Content-Type: text/plain; charset="utf-8" kernel_info and boot_domain serve basically the same role. Unify them so they can be used in common code for domain building purposes across all architectures. kernel_info has a lot of fields x86 doesn't care about, but riscv and arm do. Hence rather than moving them to the arch-specific files, x86 is ifdeffed out of those so arm and riscv can still keep sharing the definitions. Also, deconstify module pointers inside kernel_info, because x86 relies on mutating through them. Signed-off-by: Alejandro Vallejo --- I'd be happier renaming struct kernel_info to struct bootdomain to clean up the misnaming but I don't want to deal with the refactor in arm+riscv right now. I've typedeffed it on x86 to bootdomain_t to reduce the diff delta. (otherwise there's a lot of useless s/bd/ki/) Some headers still use "struct kernel_info" in x86 to avoid extra includes. Re-typedeffing only works from C11 onwards. --- xen/arch/x86/dom0_build.c | 2 +- xen/arch/x86/hvm/dom0_build.c | 10 ++++---- xen/arch/x86/include/asm/boot-domain.h | 33 -------------------------- xen/arch/x86/include/asm/bootinfo.h | 7 ++++-- xen/arch/x86/include/asm/dom0_build.h | 6 ++--- xen/arch/x86/include/asm/kernel.h | 20 ++++++++++++++++ xen/arch/x86/include/asm/setup.h | 4 ++-- xen/arch/x86/pv/dom0_build.c | 8 +++---- xen/arch/x86/setup.c | 26 ++++++++++---------- xen/include/xen/fdt-kernel.h | 2 +- 10 files changed, 55 insertions(+), 63 deletions(-) delete mode 100644 xen/arch/x86/include/asm/boot-domain.h create mode 100644 xen/arch/x86/include/asm/kernel.h diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c index 0b467fd4a4..5bd4d39d10 100644 --- a/xen/arch/x86/dom0_build.c +++ b/xen/arch/x86/dom0_build.c @@ -615,7 +615,7 @@ int __init dom0_setup_permissions(struct domain *d) return rc; } =20 -int __init construct_dom0(const struct boot_domain *bd) +int __init construct_dom0(const bootdomain_t *bd) { int rc; const struct domain *d =3D bd->d; diff --git a/xen/arch/x86/hvm/dom0_build.c b/xen/arch/x86/hvm/dom0_build.c index 96410344a8..66d7046577 100644 --- a/xen/arch/x86/hvm/dom0_build.c +++ b/xen/arch/x86/hvm/dom0_build.c @@ -644,11 +644,11 @@ static bool __init check_and_adjust_load_address( } =20 static int __init pvh_load_kernel( - const struct boot_domain *bd, paddr_t *entry, paddr_t *start_info_addr) + const bootdomain_t *bd, paddr_t *entry, paddr_t *start_info_addr) { struct domain *d =3D bd->d; - struct bootmodule *image =3D bd->kernel; - struct bootmodule *initrd =3D bd->module; + struct bootmodule *image =3D bd->kernel_bootmodule; + struct bootmodule *initrd =3D bd->initrd_bootmodule; void *image_base =3D bootstrap_map_bm(image); void *image_start =3D image_base + image->arch.headroom; unsigned long image_len =3D image->size; @@ -1329,7 +1329,7 @@ static void __hwdom_init pvh_setup_mmcfg(struct domai= n *d) } } =20 -int __init dom0_construct_pvh(const struct boot_domain *bd) +int __init dom0_construct_pvh(const bootdomain_t *bd) { paddr_t entry, start_info; struct domain *d =3D bd->d; @@ -1337,7 +1337,7 @@ int __init dom0_construct_pvh(const struct boot_domai= n *bd) =20 printk(XENLOG_INFO "*** Building a PVH Dom%d ***\n", d->domain_id); =20 - if ( bd->kernel =3D=3D NULL ) + if ( bd->kernel_bootmodule =3D=3D NULL ) panic("Missing kernel boot module for %pd construction\n", d); =20 if ( is_hardware_domain(d) ) diff --git a/xen/arch/x86/include/asm/boot-domain.h b/xen/arch/x86/include/= asm/boot-domain.h deleted file mode 100644 index 242e9c9c2b..0000000000 --- a/xen/arch/x86/include/asm/boot-domain.h +++ /dev/null @@ -1,33 +0,0 @@ -/* SPDX-License-Identifier: GPL-2.0-or-later */ -/* - * Copyright (c) 2024 Apertus Solutions, LLC - * Author: Daniel P. Smith - * Copyright (c) 2024 Christopher Clark - */ - -#ifndef __XEN_X86_BOOTDOMAIN_H__ -#define __XEN_X86_BOOTDOMAIN_H__ - -#include - -struct boot_domain { - domid_t domid; - - struct bootmodule *kernel; - struct bootmodule *module; - const char *cmdline; - - struct domain *d; -}; - -#endif - -/* - * Local variables: - * mode: C - * c-file-style: "BSD" - * c-basic-offset: 4 - * tab-width: 4 - * indent-tabs-mode: nil - * End: - */ diff --git a/xen/arch/x86/include/asm/bootinfo.h b/xen/arch/x86/include/asm= /bootinfo.h index f3210b7d6a..6b151c7759 100644 --- a/xen/arch/x86/include/asm/bootinfo.h +++ b/xen/arch/x86/include/asm/bootinfo.h @@ -9,10 +9,10 @@ #define X86_BOOTINFO_H =20 #include +#include #include #include #include -#include =20 /* Max number of boot modules a bootloader can provide in addition to Xen = */ #define MAX_NR_BOOTMODS 63 @@ -20,6 +20,9 @@ /* Max number of boot domains that Xen can construct */ #define MAX_NR_BOOTDOMS 1 =20 +/* kernel_info is a misnomer. It holds information for a to-be domain. */ +typedef struct kernel_info bootdomain_t; + /* * Xen internal representation of information provided by the * bootloader/environment, or derived from the information. @@ -34,7 +37,7 @@ struct boot_info { =20 unsigned int nr_modules; struct bootmodule mods[MAX_NR_BOOTMODS + 1]; - struct boot_domain domains[MAX_NR_BOOTDOMS]; + bootdomain_t domains[MAX_NR_BOOTDOMS]; }; =20 /* diff --git a/xen/arch/x86/include/asm/dom0_build.h b/xen/arch/x86/include/a= sm/dom0_build.h index ff021c24af..68dc5e487c 100644 --- a/xen/arch/x86/include/asm/dom0_build.h +++ b/xen/arch/x86/include/asm/dom0_build.h @@ -13,9 +13,9 @@ unsigned long dom0_compute_nr_pages(struct domain *d, unsigned long initrd_len); int dom0_setup_permissions(struct domain *d); =20 -struct boot_domain; -int dom0_construct_pv(const struct boot_domain *bd); -int dom0_construct_pvh(const struct boot_domain *bd); +struct kernel_info; +int dom0_construct_pv(const struct kernel_info *bd); +int dom0_construct_pvh(const struct kernel_info *bd); =20 unsigned long dom0_paging_pages(const struct domain *d, unsigned long nr_pages); diff --git a/xen/arch/x86/include/asm/kernel.h b/xen/arch/x86/include/asm/k= ernel.h new file mode 100644 index 0000000000..f945f0957b --- /dev/null +++ b/xen/arch/x86/include/asm/kernel.h @@ -0,0 +1,20 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef __ARCH_X86_KERNEL_H__ +#define __ARCH_X86_KERNEL_H__ + +#include + +typedef struct arch_kernel_info { + domid_t domid; +} arch_bootdomain_t; + +#endif /* #__ARCH_X86_KERNEL_H__ */ + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 4 + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/arch/x86/include/asm/setup.h b/xen/arch/x86/include/asm/se= tup.h index c7deaba109..2183036da3 100644 --- a/xen/arch/x86/include/asm/setup.h +++ b/xen/arch/x86/include/asm/setup.h @@ -26,8 +26,8 @@ void subarch_init_memory(void); =20 void init_IRQ(void); =20 -struct boot_domain; -int construct_dom0(const struct boot_domain *bd); +struct kernel_info; /* bootdomain_t */ +int construct_dom0(const struct kernel_info *bd); =20 void setup_io_bitmap(struct domain *d); =20 diff --git a/xen/arch/x86/pv/dom0_build.c b/xen/arch/x86/pv/dom0_build.c index e6c77413f5..2bb5d1bcdf 100644 --- a/xen/arch/x86/pv/dom0_build.c +++ b/xen/arch/x86/pv/dom0_build.c @@ -355,7 +355,7 @@ static struct page_info * __init alloc_chunk(struct dom= ain *d, return page; } =20 -static int __init dom0_construct(const struct boot_domain *bd) +static int __init dom0_construct(const bootdomain_t *bd) { unsigned int i; int rc, order, machine; @@ -374,8 +374,8 @@ static int __init dom0_construct(const struct boot_doma= in *bd) struct domain *d =3D bd->d; struct vcpu *v =3D d->vcpu[0]; =20 - struct bootmodule *image =3D bd->kernel; - struct bootmodule *initrd =3D bd->module; + struct bootmodule *image =3D bd->kernel_bootmodule; + struct bootmodule *initrd =3D bd->initrd_bootmodule; void *image_base; unsigned long image_len; void *image_start; @@ -1070,7 +1070,7 @@ out: return rc; } =20 -int __init dom0_construct_pv(const struct boot_domain *bd) +int __init dom0_construct_pv(const bootdomain_t *bd) { unsigned long cr4 =3D read_cr4(); int rc; diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index a6b3dbfc8c..aa3d913191 100644 --- a/xen/arch/x86/setup.c +++ b/xen/arch/x86/setup.c @@ -297,7 +297,9 @@ static const char *cmdline_cook(const char *p, const ch= ar *loader_name); struct boot_info __initdata xen_boot_info =3D { .loader =3D "unknown", .cmdline =3D "", - .domains =3D { [0 ... MAX_NR_BOOTDOMS - 1] =3D { .domid =3D DOMID_INVA= LID } }, + .domains =3D { [0 ... MAX_NR_BOOTDOMS - 1] =3D { + .arch =3D { .domid =3D DOMID_INVALID } + }}, .mods =3D { [0 ... MAX_NR_BOOTMODS] =3D { .kind =3D BOOTMOD_UNKNOWN } = }, }; =20 @@ -982,10 +984,10 @@ static unsigned int __init copy_bios_e820(struct e820= entry *map, unsigned int li } =20 static size_t __init domain_cmdline_size(const struct boot_info *bi, - const struct boot_domain *bd) + const bootdomain_t *bd) { size_t s =3D bi->kextra ? strlen(bi->kextra) : 0; - const struct arch_bootmodule *abm =3D &bd->kernel->arch; + const struct arch_bootmodule *abm =3D &bd->kernel_bootmodule->arch; =20 s +=3D abm->cmdline_pa ? strlen(__va(abm->cmdline_pa)) : 0; =20 @@ -1017,7 +1019,7 @@ static struct domain *__init create_dom0(struct boot_= info *bi) .misc_flags =3D opt_dom0_msr_relaxed ? XEN_X86_MSR_RELAXED : 0, }, }; - struct boot_domain *bd =3D &bi->domains[0]; + bootdomain_t *bd =3D &bi->domains[0]; struct domain *d; =20 if ( opt_dom0_pvh ) @@ -1034,11 +1036,11 @@ static struct domain *__init create_dom0(struct boo= t_info *bi) dom0_cfg.flags |=3D XEN_DOMCTL_CDF_iommu; =20 /* Create initial domain. Not d0 for pvshim. */ - bd->domid =3D get_initial_domain_id(); - d =3D domain_create(bd->domid, &dom0_cfg, + bd->arch.domid =3D get_initial_domain_id(); + d =3D domain_create(bd->arch.domid, &dom0_cfg, pv_shim ? 0 : CDF_privileged | CDF_hardware); if ( IS_ERR(d) ) - panic("Error creating d%u: %ld\n", bd->domid, PTR_ERR(d)); + panic("Error creating d%u: %ld\n", bd->arch.domid, PTR_ERR(d)); =20 init_dom0_cpuid_policy(d); =20 @@ -1051,9 +1053,9 @@ static struct domain *__init create_dom0(struct boot_= info *bi) if ( !(cmdline =3D xzalloc_array(char, cmdline_size)) ) panic("Error allocating cmdline buffer for %pd\n", d); =20 - if ( bd->kernel->arch.cmdline_pa ) + if ( bd->kernel_bootmodule->arch.cmdline_pa ) strlcpy(cmdline, - cmdline_cook(__va(bd->kernel->arch.cmdline_pa), + cmdline_cook(__va(bd->kernel_bootmodule->arch.cmdline_= pa), bi->loader), cmdline_size); =20 @@ -1076,7 +1078,7 @@ static struct domain *__init create_dom0(struct boot_= info *bi) strlcat(cmdline, " acpi=3D", cmdline_size); strlcat(cmdline, acpi_param, cmdline_size); } - bd->kernel->arch.cmdline_pa =3D 0; + bd->kernel_bootmodule->arch.cmdline_pa =3D 0; bd->cmdline =3D cmdline; } =20 @@ -1290,7 +1292,7 @@ void asmlinkage __init noreturn __start_xen(void) =20 /* Dom0 kernel is always first */ bi->mods[0].kind =3D BOOTMOD_KERNEL; - bi->domains[0].kernel =3D &bi->mods[0]; + bi->domains[0].kernel_bootmodule =3D &bi->mods[0]; =20 if ( pvh_boot ) { @@ -2157,7 +2159,7 @@ void asmlinkage __init noreturn __start_xen(void) if ( initrdidx < MAX_NR_BOOTMODS ) { bi->mods[initrdidx].kind =3D BOOTMOD_RAMDISK; - bi->domains[0].module =3D &bi->mods[initrdidx]; + bi->domains[0].initrd_bootmodule =3D &bi->mods[initrdidx]; if ( first_boot_module_index(bi, BOOTMOD_UNKNOWN) < MAX_NR_BOOTMOD= S ) printk(XENLOG_WARNING "Multiple initrd candidates, picking module #%u\n", diff --git a/xen/include/xen/fdt-kernel.h b/xen/include/xen/fdt-kernel.h index 1939c3ebf7..2f0ee42ebc 100644 --- a/xen/include/xen/fdt-kernel.h +++ b/xen/include/xen/fdt-kernel.h @@ -34,7 +34,7 @@ struct kernel_info { paddr_t gnttab_size; =20 /* boot blob load addresses */ - const struct bootmodule *kernel_bootmodule, *initrd_bootmodule, *dtb_b= ootmodule; + struct bootmodule *kernel_bootmodule, *initrd_bootmodule, *dtb_bootmod= ule; const char* cmdline; paddr_t dtb_paddr; paddr_t initrd_paddr; --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607114; cv=pass; d=zohomail.com; s=zohoarc; b=Bb3l2pD3D0Xeawlm0jubRbLKXuNl5IgaH+0omgk1AMnXKibFw9yThjI+UK6S4wpDQYp4ObaizGagwHP68fdJBLykUjHJOaiccpP3UVzA+dUvEZ2oC1R05VHG4OFXQqCB/gNG8OrG68cbZ++gujpmhbZtLeiJsLdKJEyUeuthh6Q= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607114; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=34ICjvzD4lVMM+wfqkK97CeOJs6tTTN5/D+GOWUdGNA=; b=cyJgEPZRixinykcgFYSEMZQ+Wwx0O/KajitH7oxtP+Gb5pj8zQxYVWdyfjAvZ+1WxuHKV9uDNz3QuZ9wGGWDxX8BMe/lcbTZ7GpTquJnvhQVYGkE271kwqQjQfLoWv+utTz4BLzalmS7XCgcTe2jFsJkRKVmpg9iPVpgE3BTePo= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748607114697567.0470132104523; Fri, 30 May 2025 05:11:54 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000828.1381055 (Exim 4.92) (envelope-from ) id 1uKyaO-0008RJ-EZ; Fri, 30 May 2025 12:11:44 +0000 Received: by outflank-mailman (output) from mailman id 1000828.1381055; Fri, 30 May 2025 12:11:44 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyaO-0008RA-AZ; Fri, 30 May 2025 12:11:44 +0000 Received: by outflank-mailman (input) for mailman id 1000828; Fri, 30 May 2025 12:11:43 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySX-00076q-1D for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:37 +0000 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on20631.outbound.protection.outlook.com [2a01:111:f403:2412::631]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1ba186f5-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:34 +0200 (CEST) Received: from CH2PR15CA0014.namprd15.prod.outlook.com (2603:10b6:610:51::24) by SJ1PR12MB6218.namprd12.prod.outlook.com (2603:10b6:a03:457::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.31; Fri, 30 May 2025 12:03:30 +0000 Received: from CH2PEPF00000146.namprd02.prod.outlook.com (2603:10b6:610:51:cafe::41) by CH2PR15CA0014.outlook.office365.com (2603:10b6:610:51::24) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8746.26 via Frontend Transport; Fri, 30 May 2025 12:03:30 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000146.mail.protection.outlook.com (10.167.244.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:30 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:28 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1ba186f5-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ax0ij0GS99gpbdJ7fP/qchacW2KBlX59oAms24xUH7g8qEssaOPpDyqPcepgfL/WecUu3ef4NIDiTO+V24lE4l7mic4+fNFgzj7Zp3wFSAX8nTfeD7hkgDV8QQlh/lPGtQHGUbYYPAhz1+g6S9s66IWb8eFw59eMOdFr2DuQfwz0Echvu/BPPdHCjhjAWxMgQHjvtZ+1JrysXFLNNiZngaRULlA688VTtPCwtqmOLnLMi1lj/LNNxd1L/O/wQL5Hef65qNnYryCsNZjicPk/ZagTMCU5t264PESX1fcAjqSGjh9eAr4Rg8JDEWI14ps9i9XvG2NpS9j8fmhSbCyNQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=34ICjvzD4lVMM+wfqkK97CeOJs6tTTN5/D+GOWUdGNA=; b=LuJV9+PW4UtMj6+NYATCeFq4Eo8MV1OARLUp1m2er3Fyi7BUZ+AwUQxr620s7F76CYjNTRfQ3axJulZVil2SQ1K1ovyAM+nUFRVAzr4BQ++miHtLH6c3rNKuQ/vYx5TBXLRC9xKSt7+CB8t8o55XXZ+jVl0+7f4hOV/9ypF34dsdz0aK6yqgZhynjoQEKirVdzYKifrysdhDDq9KBz2dPAc/pMQpO4a6flG5ZercZH47FDsjKjCAKdKznXGxiJaN+7asTQnrVwCbzzxyVDx4UYRIU9fdo5EcYDdGB4S6pp/X5yFMzW94+8FqT1jWe+1yrWEVFuKEOeplQLNqDUfF6g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=34ICjvzD4lVMM+wfqkK97CeOJs6tTTN5/D+GOWUdGNA=; b=TdaZqVmlpOFJTfDpR9WzjFHI9LcWIQdjZ0m3jaldiEWQ36MoM0Lt0N+B7od0kjTwfnoWjuCdHJZgY0ZUc63cJC8TMaADPlB0meN+r/MJwUMzfwv5CRvkaS1sgfUqv6mtFFemwm3ho8R5hIwOH0TIyDqfH6eVSrSTA77nkin/g3Q= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" , "Daniel P. Smith" Subject: [PATCH 12/19] xen/dt: Move bootfdt functions to xen/bootfdt.h Date: Fri, 30 May 2025 14:02:20 +0200 Message-ID: <20250530120242.39398-13-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000146:EE_|SJ1PR12MB6218:EE_ X-MS-Office365-Filtering-Correlation-Id: 21c267a6-8ad8-42c8-24ff-08dd9f71fe6f X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|36860700013|1800799024|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?KDW3QzWmpY5+XqfEVARsoPf11ub6wA4h8fgxT4Fi52m8y1TJpy+YcTE1q4RY?= =?us-ascii?Q?lMSwlzxbmF1/kXOyEg7vb1cLKIXiLFS8UBPSn3z46g+V/UBzDpJiuRtI+in+?= =?us-ascii?Q?sH8qSnwKIcvo4280RLEvhWoR/F0cRw2yXFEjRqg1zpcQBQA1nW2c2MM4QmLx?= =?us-ascii?Q?9eoGU4T2QBHGtVl0jLm8Jsy3ApF5pMGyaLyfOEhjXW3nW5bvubJagaFURUF1?= =?us-ascii?Q?ztICOE50xR8yRy4IVZiCNMl0V4viMkW/8Sx3eZBvDi6TMZQtzsqrMODL93KT?= =?us-ascii?Q?WwSf5AzSErSa7FASd7GU8mi5hvrIyIA0n6o3vqELnw1zQ/ra7I52j4YlYQl9?= =?us-ascii?Q?0FMIhS7Ae4THq/hxMPvmaZuFlI7mKnV9k+UXcwrHIFIDjLliMs/ZTVcZ3owu?= =?us-ascii?Q?tbYvkJB7NrTeyg4sHM0kM/vgHlxkzVkcxXad7wSyBk3BVSuWJ/lZNuKvX5ph?= =?us-ascii?Q?6BpNlwCsksmGppbpPZywemAIQg7kwnfmZ1sNr99jC9tc5+0BeaazkiO2mMZp?= =?us-ascii?Q?LppN4PDArFTBL1SDpj1CT4k3sftwHI0N7/g81Ufcj4Qx+kJL7sNY8a6ijLDT?= =?us-ascii?Q?Qf25X4u5zrtC/PsZtn+/c81U4ri0wmbl+RKqrM4IbrfjkUznYL3Lg1Mcmnc0?= =?us-ascii?Q?6lK4Y41ZMlu5Nx9y2Otm6o+5NhZyWK1SRVcF5+ITY1fs8uw3Nv0eMp4WxC59?= =?us-ascii?Q?CKd9Ax0mYqJr630GwsqHEuE7jp5yuxDt2W82/u8tj5JrXX7cDaGLzGqTPrc2?= =?us-ascii?Q?Wratskc2bz6/n5Q/pRC82XQXFdTmd0DcXUImYrzn0qx/41VTbsVMwCO0mHiz?= =?us-ascii?Q?rlJu8LZYF+kmB/boLr+YRQS/2DkXWzbLN9IAAdgdOl4ZNfEKHYsRzHNaqwlR?= =?us-ascii?Q?DUg1AT0hqeJQym3+FCnkHczy7uUVWE24v2453oX9o5yUcnFeumw6AFs/+u3D?= =?us-ascii?Q?BqGFYM2RKm+BdXgC6XNhMS+jHAnfquk6h+OIBJ6YmcNDMy4Xa8hJWSV7MyiV?= =?us-ascii?Q?Sq9999Fw1ri8dt3otZwosdDY/yCzhDfQbqknbRQwLaxUVBRwwfYL/QSDYncx?= =?us-ascii?Q?/YZgC6g8nPeMG/mB1rYL08hnSX6ihaZ5Bc4ZRd/CO/xto5wylfrRKBPs+A16?= =?us-ascii?Q?kd+NYEPALDl6lFEoqy+oFNRatA7zjfZGocllCl/QwyRKiq7wx6lSPUV7FS1J?= =?us-ascii?Q?Ua+w5cW/8AMSWAijqJxMU1NWhhUhubxJD+CQdm2WpJ5xoxAFZc7HCRqBPFEd?= =?us-ascii?Q?CsaWCtmVgDfRZMcjrNP1MEjzz6kpAyOgneoghedwyKP1PwyqUkINand/0bm3?= =?us-ascii?Q?Q9V5+S4Yee7oSpZ5QdbWrazOix0YtXlTXOFKyt5ak2JRgXhy6Ts/qoHii8NA?= =?us-ascii?Q?Vc/+2+ZWRsqEHaJ34RVggsvj1uuudawLzWrunSzZ+TApxSoYYXziSselXwlK?= =?us-ascii?Q?f5A4y/lf+2T+9/9EnK7QkS8vUTSpW6twCN0b4r0tAFhwz+jUnfoF9j5Z6Hap?= =?us-ascii?Q?WqyUgwD7rqsvy050lb6sW0aEbxG1KkO5f0vW?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(36860700013)(1800799024)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:30.4748 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 21c267a6-8ad8-42c8-24ff-08dd9f71fe6f X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000146.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ1PR12MB6218 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607117077116600 Content-Type: text/plain; charset="utf-8" Part of an unpicking process to extract bootfdt contents independent of boo= tinfo to a separate file for x86 to take. Move functions required for early FDT parsing from device_tree.h and arm's setup.h onto bootfdt.h Declaration motion only. Not a functional change. Signed-off-by: Alejandro Vallejo --- xen/arch/arm/include/asm/setup.h | 6 ---- xen/include/xen/bootfdt.h | 62 ++++++++++++++++++++++++++++++++ xen/include/xen/device_tree.h | 34 +----------------- 3 files changed, 63 insertions(+), 39 deletions(-) diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/se= tup.h index 0f9e531a34..32308837a9 100644 --- a/xen/arch/arm/include/asm/setup.h +++ b/xen/arch/arm/include/asm/setup.h @@ -55,12 +55,6 @@ void setup_mm(void); extern uint32_t hyp_traps_vector[]; void init_traps(void); =20 -void device_tree_get_reg(const __be32 **cell, uint32_t address_cells, - uint32_t size_cells, paddr_t *start, paddr_t *siz= e); - -u32 device_tree_get_u32(const void *fdt, int node, - const char *prop_name, u32 dflt); - int handle_device(struct domain *d, struct dt_device_node *dev, p2m_type_t= p2mt, struct rangeset *iomem_ranges, struct rangeset *irq_rang= es); =20 diff --git a/xen/include/xen/bootfdt.h b/xen/include/xen/bootfdt.h index fa65e8fcf4..079259c719 100644 --- a/xen/include/xen/bootfdt.h +++ b/xen/include/xen/bootfdt.h @@ -2,6 +2,7 @@ #ifndef XEN_BOOTFDT_H #define XEN_BOOTFDT_H =20 +#include #include #include #include @@ -16,8 +17,53 @@ #define NR_MEM_BANKS 256 #define NR_SHMEM_BANKS 32 =20 +/* Default #address and #size cells */ +#define DT_ROOT_NODE_ADDR_CELLS_DEFAULT 2 +#define DT_ROOT_NODE_SIZE_CELLS_DEFAULT 1 + #define MAX_MODULES 32 /* Current maximum useful modules */ =20 +#define DEVICE_TREE_MAX_DEPTH 16 + +/* Helper to read a big number; size is in cells (not bytes) */ +static inline u64 dt_read_number(const __be32 *cell, int size) +{ + u64 r =3D 0; + + while ( size-- ) + r =3D (r << 32) | be32_to_cpu(*(cell++)); + return r; +} + +static inline u64 dt_next_cell(int s, const __be32 **cellp) +{ + const __be32 *p =3D *cellp; + + *cellp =3D p + s; + return dt_read_number(p, s); +} + +typedef int (*device_tree_node_func)(const void *fdt, + int node, const char *name, int depth, + u32 address_cells, u32 size_cells, + void *data); + +/** + * device_tree_for_each_node - iterate over all device tree sub-nodes + * @fdt: flat device tree. + * @node: parent node to start the search from + * @func: function to call for each sub-node. + * @data: data to pass to @func. + * + * Any nodes nested at DEVICE_TREE_MAX_DEPTH or deeper are ignored. + * + * Returns 0 if all nodes were iterated over successfully. If @func + * returns a value different from 0, that value is returned immediately. + */ +int device_tree_for_each_node(const void *fdt, int node, + device_tree_node_func func, + void *data); + typedef enum { BOOTMOD_XEN, BOOTMOD_FDT, @@ -246,4 +292,20 @@ static inline struct membanks *membanks_xzalloc(unsign= ed int nr, return banks; } =20 +/* + * Interpret the property `prop_name` of `node` as a u32. + * + * Returns the property value on success; otherwise returns `dflt`. + */ +uint32_t device_tree_get_u32(const void *fdt, int node, + const char *prop_name, uint32_t dflt); + +/* + * Interpret the property `prop_name` of `node` as a "reg". + * + * Returns outputs in `start` and `size`. + */ +void device_tree_get_reg(const __be32 **cell, uint32_t address_cells, + uint32_t size_cells, paddr_t *start, paddr_t *siz= e); + #endif /* XEN_BOOTFDT_H */ diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h index 6dc1fb5159..0a22b1ba1d 100644 --- a/xen/include/xen/device_tree.h +++ b/xen/include/xen/device_tree.h @@ -10,6 +10,7 @@ #ifndef __XEN_DEVICE_TREE_H__ #define __XEN_DEVICE_TREE_H__ =20 +#include #include =20 #include @@ -22,8 +23,6 @@ #include #include =20 -#define DEVICE_TREE_MAX_DEPTH 16 - /* * Struct used for matching a device */ @@ -164,17 +163,8 @@ struct dt_raw_irq { u32 specifier[DT_MAX_IRQ_SPEC]; }; =20 -typedef int (*device_tree_node_func)(const void *fdt, - int node, const char *name, int depth, - u32 address_cells, u32 size_cells, - void *data); - extern const void *device_tree_flattened; =20 -int device_tree_for_each_node(const void *fdt, int node, - device_tree_node_func func, - void *data); - /** * dt_unflatten_host_device_tree - Unflatten the host device tree * @@ -245,10 +235,6 @@ void intc_dt_preinit(void); #define dt_node_cmp(s1, s2) strcasecmp((s1), (s2)) #define dt_compat_cmp(s1, s2) strcasecmp((s1), (s2)) =20 -/* Default #address and #size cells */ -#define DT_ROOT_NODE_ADDR_CELLS_DEFAULT 2 -#define DT_ROOT_NODE_SIZE_CELLS_DEFAULT 1 - #define dt_for_each_property_node(dn, pp) \ for ( pp =3D (dn)->properties; (pp) !=3D NULL; pp =3D (pp)->next ) =20 @@ -258,16 +244,6 @@ void intc_dt_preinit(void); #define dt_for_each_child_node(dt, dn) \ for ( dn =3D (dt)->child; (dn) !=3D NULL; dn =3D (dn)->sibling ) =20 -/* Helper to read a big number; size is in cells (not bytes) */ -static inline u64 dt_read_number(const __be32 *cell, int size) -{ - u64 r =3D 0; - - while ( size-- ) - r =3D (r << 32) | be32_to_cpu(*(cell++)); - return r; -} - /* Wrapper for dt_read_number() to return paddr_t (instead of uint64_t) */ static inline paddr_t dt_read_paddr(const __be32 *cell, int size) { @@ -307,14 +283,6 @@ static inline int dt_size_to_cells(int bytes) return (bytes / sizeof(u32)); } =20 -static inline u64 dt_next_cell(int s, const __be32 **cellp) -{ - const __be32 *p =3D *cellp; - - *cellp =3D p + s; - return dt_read_number(p, s); -} - static inline const char *dt_node_full_name(const struct dt_device_node *n= p) { return (np && np->full_name) ? np->full_name : ""; --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607072; cv=pass; d=zohomail.com; s=zohoarc; b=dvOp9S78Z7xJUXkOTKza+nrH5M1jeRXUvNz4VSUrsn/GiQ8rkr4VLlPsjR5jYCJ0K0bVkcEtyHgPq0nG+7u5bF5ybXqNv9fzRU+5OU305yIR8RAGnPSyo76WcgQmFaMNjo2MDXM5FCKxJU4Uwj7E0y91kQCDy4GlwOK984kcDjM= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607072; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=hFTCTDGKnZMY9M9/WqL/G3QIpXNSv/jD/qzSC5480UI=; b=eq6eAqL7Dl1RndItomOtZ93gNprpiKApSTh7cdZX6vFVRxwKgViFKNI1i67qA7ph4Q/MueGTSOKFtOMNrRtAPt88YSg4Gmc7k2FoXAcU6mI5ehzMNSaaT3j5btCUmqnEyxFQTgSQwmiG7CmDsJQfx/juEaNi/gc9Gxz/HW3ua0o= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748607070361520.4628851917207; Fri, 30 May 2025 05:11:10 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000787.1381016 (Exim 4.92) (envelope-from ) id 1uKyZb-00063O-Dq; Fri, 30 May 2025 12:10:55 +0000 Received: by outflank-mailman (output) from mailman id 1000787.1381016; Fri, 30 May 2025 12:10:55 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyZb-00063H-AQ; Fri, 30 May 2025 12:10:55 +0000 Received: by outflank-mailman (input) for mailman id 1000787; Fri, 30 May 2025 12:10:54 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySZ-00076q-1i for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:39 +0000 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2060f.outbound.protection.outlook.com [2a01:111:f403:2009::60f]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1df1280c-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:36 +0200 (CEST) Received: from CH2PR18CA0050.namprd18.prod.outlook.com (2603:10b6:610:55::30) by IA1PR12MB6067.namprd12.prod.outlook.com (2603:10b6:208:3ed::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.29; Fri, 30 May 2025 12:03:33 +0000 Received: from CH2PEPF00000148.namprd02.prod.outlook.com (2603:10b6:610:55:cafe::cb) by CH2PR18CA0050.outlook.office365.com (2603:10b6:610:55::30) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8792.21 via Frontend Transport; Fri, 30 May 2025 12:03:33 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000148.mail.protection.outlook.com (10.167.244.105) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:33 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:30 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1df1280c-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=er4yNbrgfoIxWYUQu2GXltxuOcZFeF0f2pItFaP8Y4wG9kZwd+p16/QznjJp41jdOBGqVNfePj8o6QhbGyW38Xxl+P3KPHOupyj9mheWKxxrrHbZI+FjF3S5dkl9KiELnghHXHAqkUCeRCCvDPYuJ2hc5WZ16w/qki3daK78vTi/CssESsrQY09fnJiiGeI3fGW7BjPPEbig/Kc3QEYdOzjBG1eWgYp63FVEr8MyFvitU4CbH34POMt61j6yfUIW2odS9MlLVCcRSD9Klx3pnawS49NnKWpzcW6lgmsxj+C9rnMsiwcy8V2Fqnh52D8VGBf2olhvtcZpx5awlkpntQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hFTCTDGKnZMY9M9/WqL/G3QIpXNSv/jD/qzSC5480UI=; b=FUQR+dPAPFrL3o4L1G8r97NZJ1cxoOGrq2lp1O0RcqLnDIjGtSc/SV16gFXLejcRYhqX2De0nbx6cZGzCdp15pZonJfbdRRGB7cFJRHGFl6MhBrhQI9vzxdN9UbQqsIgYiSrS8YpKNKGzOrG6hnfuRD2oJ5YUfoZ09M6UG7Lx0jcwI0VIYr/jVTxanq/1z0AJUZjewgIeSto+vubiF6LuUdkCWEdVl+IJOU1nA7e5rAwMMCsrICY1m/Pyd0Q91nGcIYs0hELO2Y/Cflb75lSvY5dBmz16K6D/Fa6S9r57ESZ8QY0Ucub0zWRcseofoGhtX0A+8DNkVETwXsyj4/WeQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hFTCTDGKnZMY9M9/WqL/G3QIpXNSv/jD/qzSC5480UI=; b=0mGnLmoi7Unsl4pNtYxCYTHes9+Fi7v5Xm9Qzxj/drKyiRqX5L8/37ofuNMjsSXwqVAdTa0O9OyzXB8bb0FWDet7STLiU/XpztUJ46prxeTlJ0MZ+uqc0CGgmueYPJPMqk+mvPIfENzO7srOCCs7HpDfD5g2xiFVXVdl93c4gYA= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" , Andrew Cooper , Anthony PERARD , "Jan Beulich" , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Alistair Francis , "Bob Eshleman" , Connor Davis , Oleksii Kurochko , "Daniel P. Smith" Subject: [PATCH 13/19] xen/dt: Move bootinfo functions to a new bootinfo.h Date: Fri, 30 May 2025 14:02:21 +0200 Message-ID: <20250530120242.39398-14-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000148:EE_|IA1PR12MB6067:EE_ X-MS-Office365-Filtering-Correlation-Id: d93c18bb-7a32-4d36-a75c-08dd9f72001e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|36860700013|7416014|376014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?jlK67OKg45TK2mQvrJH8pJFhxXTZyeEw9AfWajM0FmXZl8V8DN1ghJxFQQOv?= =?us-ascii?Q?Q90tR4ZZkdIoty5RyoxKXKdGGuNbYDqcqeIrhGdYnR2rIeQiAc1TSAYKheh2?= =?us-ascii?Q?8ehQky3kSvWzt6cTCX4b7CelS32r+UAarBGqg7K/oIm6Fbs2EAIT3Ei+P95j?= =?us-ascii?Q?XkXpr8pp3CRssD+FRFJwoMwa306Jk+KWFXIsi7P2rdg1G9nxIf4ashjpEfPr?= =?us-ascii?Q?9282YkwAc3cFqRIxrYBTpsbQfeUlcQydAoF/6GCnuCebl2sE5kFwPSlS+Iqq?= =?us-ascii?Q?tyt6kfDoqdiLZWPblSA5Pnr+7c8ajJLAaWzSl/Ix8rVE+z6fz14er6QtHc/9?= =?us-ascii?Q?UIolpsT6J726hqeMH8qTqJzwEvvLw9WUQgwyrI/2oVd95eK7o+p6I02oA4G2?= =?us-ascii?Q?YcvAKpJWqbifm75LJiba9fHfbW/zWm5WEnurxrHXpIDbGpAZm/pfxrlqNz2u?= =?us-ascii?Q?cLGab6d2TER91pcdyZILmKgJb8V2kpFJTVfVrf2UuwiiGQlJ2dp9q0rhO5nj?= =?us-ascii?Q?QVp091/IhkqcWTKd13n23T4ccZFr7sig8qdObnxYwRK+BO2Swp9sEy3f9i9m?= =?us-ascii?Q?9JzQ+7Pq2HmqT1eikr68m1AFdB9zL3UAJQ/VeQskWepfn9lSnmX2e3wMfwzY?= =?us-ascii?Q?JuRaZUNwAZWFOCQitNzaENJnU1YZ+Sr/am+oqXz3eoCcjkQDV2juNi6x1boH?= =?us-ascii?Q?WJXuCWGEdqGFKWyA5KtzgkFxcDdbRIKa3QWZhK2TT/WuLEW24IhEiqDkqv30?= =?us-ascii?Q?cHZvjpIXvh5LYBYM14yx7Ei6A2lhLbOSAoP7OMpsfJrx24MvXpof0VXMf8zC?= =?us-ascii?Q?NZK7Nz8amNNurtlwKjPyyHQF1nJ1FhXlriqFlR0rubEBtHorXjdwQ8vXZJOQ?= =?us-ascii?Q?WopYs1il3dbxZVjS3d2NtRCICGYLAn4NHh31SU6yG/WYDyicALVkbpxne4A0?= =?us-ascii?Q?yQUdJH35tQgjsV0CdJ9FjmpD0I4lPWaahdbH1VreTcWc1rtsMmlBrpcakQnB?= =?us-ascii?Q?B84/600R+0tX6jbK5BoTTzqGshNf/aAHcofSSFu94tH6CiU86i+ISusdp+V+?= =?us-ascii?Q?kM2+Rup94/0snwUSPLrdlLnzQgE5QalEeXVF10jjnIO8G9sbLArTjojKUlGh?= =?us-ascii?Q?desQN7CjVzweYes5Bg33UjNmfVaotTDR5QK9U8h4Sg+eMV8l33cHTz8KSgSF?= =?us-ascii?Q?sPVdM37021uccNW54qlxP3Vu3YoBzg1Zm4gsj/lz6S5VapWa7lcU664Q7Vsp?= =?us-ascii?Q?EfgBRfdtOXTk1Gt6qgTwFwtYnPTVm8+mdu3REb8QkZykPE6r4D21wASvYIaY?= =?us-ascii?Q?BIJm6tIKcbMXDDVcncJaA2VvEHNI+gMg3DVT7Grd5yJmJlcLbcW/tsAR0QlY?= =?us-ascii?Q?SnYzjmB+riawhvcdFxp8hVjA48DcJirSno3NsOKt87GJr5A8+1wqEpi7hkdh?= =?us-ascii?Q?JTDkIt728YCaPtWW2ktOa2OixRUc5rKITY3pBUiLcVXf3UqzL3CiLmjT2rPe?= =?us-ascii?Q?40jeyRF33msasmMoUhBtVvL2tCCst2ZRP0hb?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(36860700013)(7416014)(376014)(1800799024);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:33.2956 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d93c18bb-7a32-4d36-a75c-08dd9f72001e X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000148.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB6067 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607078660116600 Content-Type: text/plain; charset="utf-8" Part of an unpicking process to extract bootfdt contents independent of bootinfo to a separate file for x86 to take. With this, bootfdt.h can be cleanly included from x86. A later patch extracts the definitions so the functions may be called too. Not a functional change. Signed-off-by: Alejandro Vallejo --- xen/arch/arm/domain_build.c | 1 + xen/arch/arm/mmu/mm.c | 1 + xen/arch/riscv/mm.c | 2 +- xen/arch/riscv/setup.c | 2 +- xen/common/device-tree/bootfdt.c | 1 + xen/common/device-tree/bootinfo.c | 2 +- xen/common/device-tree/dom0less-build.c | 2 +- xen/common/device-tree/domain-build.c | 2 +- xen/common/device-tree/kernel.c | 2 +- xen/include/xen/bootfdt.h | 206 ----------------------- xen/include/xen/bootinfo.h | 212 ++++++++++++++++++++++++ xen/include/xen/device_tree.h | 2 +- xen/include/xen/fdt-domain-build.h | 2 +- xen/include/xen/fdt-kernel.h | 2 +- 14 files changed, 224 insertions(+), 215 deletions(-) create mode 100644 xen/include/xen/bootinfo.h diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index 11cc03e5db..c53da76682 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -1,5 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0-only */ #include +#include #include #include #include diff --git a/xen/arch/arm/mmu/mm.c b/xen/arch/arm/mmu/mm.c index 9c50479c63..77f82757bb 100644 --- a/xen/arch/arm/mmu/mm.c +++ b/xen/arch/arm/mmu/mm.c @@ -1,5 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0-or-later */ =20 +#include #include #include #include diff --git a/xen/arch/riscv/mm.c b/xen/arch/riscv/mm.c index d3ece9f132..040db73d00 100644 --- a/xen/arch/riscv/mm.c +++ b/xen/arch/riscv/mm.c @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0-only */ =20 -#include +#include #include #include #include diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c index 4e416f6e44..0a2d0dc1eb 100644 --- a/xen/arch/riscv/setup.c +++ b/xen/arch/riscv/setup.c @@ -2,7 +2,7 @@ =20 #include #include -#include +#include #include #include #include diff --git a/xen/common/device-tree/bootfdt.c b/xen/common/device-tree/boot= fdt.c index 529c91e603..fb4ac06390 100644 --- a/xen/common/device-tree/bootfdt.c +++ b/xen/common/device-tree/bootfdt.c @@ -6,6 +6,7 @@ */ =20 #include +#include #include #include #include diff --git a/xen/common/device-tree/bootinfo.c b/xen/common/device-tree/boo= tinfo.c index 717cfa0962..69491bdb0b 100644 --- a/xen/common/device-tree/bootinfo.c +++ b/xen/common/device-tree/bootinfo.c @@ -10,7 +10,7 @@ */ =20 #include -#include +#include #include #include #include diff --git a/xen/common/device-tree/dom0less-build.c b/xen/common/device-tr= ee/dom0less-build.c index 39cb2cd5c7..c798807560 100644 --- a/xen/common/device-tree/dom0less-build.c +++ b/xen/common/device-tree/dom0less-build.c @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0-only */ =20 -#include +#include #include #include #include diff --git a/xen/common/device-tree/domain-build.c b/xen/common/device-tree= /domain-build.c index 6b8b8d7cac..e5d34dd89d 100644 --- a/xen/common/device-tree/domain-build.c +++ b/xen/common/device-tree/domain-build.c @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0-only */ =20 -#include +#include #include #include #include diff --git a/xen/common/device-tree/kernel.c b/xen/common/device-tree/kerne= l.c index cb04cd9d50..d02440cc2d 100644 --- a/xen/common/device-tree/kernel.c +++ b/xen/common/device-tree/kernel.c @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0-only */ =20 -#include +#include #include #include #include diff --git a/xen/include/xen/bootfdt.h b/xen/include/xen/bootfdt.h index 079259c719..766956e102 100644 --- a/xen/include/xen/bootfdt.h +++ b/xen/include/xen/bootfdt.h @@ -4,9 +4,6 @@ =20 #include #include -#include -#include -#include =20 #if __has_include() #include @@ -14,15 +11,10 @@ =20 #define MIN_FDT_ALIGN 8 =20 -#define NR_MEM_BANKS 256 -#define NR_SHMEM_BANKS 32 - /* Default #address and #size cells */ #define DT_ROOT_NODE_ADDR_CELLS_DEFAULT 2 #define DT_ROOT_NODE_SIZE_CELLS_DEFAULT 1 =20 -#define MAX_MODULES 32 /* Current maximum useful modules */ - #define DEVICE_TREE_MAX_DEPTH 16 =20 /* Helper to read a big number; size is in cells (not bytes) */ @@ -75,77 +67,6 @@ typedef enum { BOOTMOD_UNKNOWN } bootmodule_kind; =20 -enum membank_type { - /* - * The MEMBANK_DEFAULT type refers to either reserved memory for the - * device/firmware (when the bank is in 'reserved_mem') or any RAM (wh= en - * the bank is in 'mem'). - */ - MEMBANK_DEFAULT, - /* - * The MEMBANK_STATIC_DOMAIN type is used to indicate whether the memo= ry - * bank is bound to a static Xen domain. It is only valid when the bank - * is in reserved_mem. - */ - MEMBANK_STATIC_DOMAIN, - /* - * The MEMBANK_STATIC_HEAP type is used to indicate whether the memory - * bank is reserved as static heap. It is only valid when the bank is - * in reserved_mem. - */ - MEMBANK_STATIC_HEAP, - /* - * The MEMBANK_FDT_RESVMEM type is used to indicate whether the memory - * bank is from the FDT reserve map. - */ - MEMBANK_FDT_RESVMEM, -}; - -enum region_type { - MEMORY, - RESERVED_MEMORY, - STATIC_SHARED_MEMORY -}; - -/* Indicates the maximum number of characters(\0 included) for shm_id */ -#define MAX_SHM_ID_LENGTH 16 - -struct shmem_membank_extra { - char shm_id[MAX_SHM_ID_LENGTH]; - unsigned int nr_shm_borrowers; -}; - -struct membank { - paddr_t start; - paddr_t size; - union { - enum membank_type type; -#ifdef CONFIG_STATIC_SHM - struct shmem_membank_extra *shmem_extra; -#endif - }; -}; - -struct membanks { - __struct_group(membanks_hdr, common, , - unsigned int nr_banks; - unsigned int max_banks; - enum region_type type; - ); - struct membank bank[]; -}; - -struct meminfo { - struct membanks_hdr common; - struct membank bank[NR_MEM_BANKS]; -}; - -struct shared_meminfo { - struct membanks_hdr common; - struct membank bank[NR_SHMEM_BANKS]; - struct shmem_membank_extra extra[NR_SHMEM_BANKS]; -}; - /* * The domU flag is set for kernels and ramdisks of "xen,domain" nodes. * The purpose of the domU flag is to avoid getting confused in @@ -165,133 +86,6 @@ struct bootmodule { #endif }; =20 -/* DT_MAX_NAME is the node name max length according the DT spec */ -#define DT_MAX_NAME 41 -struct bootcmdline { - bootmodule_kind kind; - bool domU; - paddr_t start; - char dt_name[DT_MAX_NAME]; - char cmdline[BOOTMOD_MAX_CMDLINE]; -}; - -struct bootmodules { - int nr_mods; - struct bootmodule module[MAX_MODULES]; -}; - -struct bootcmdlines { - unsigned int nr_mods; - struct bootcmdline cmdline[MAX_MODULES]; -}; - -struct bootinfo { - struct meminfo mem; - /* The reserved regions are only used when booting using Device-Tree */ - struct meminfo reserved_mem; - struct bootmodules modules; - struct bootcmdlines cmdlines; -#ifdef CONFIG_ACPI - struct meminfo acpi; -#endif -#ifdef CONFIG_STATIC_SHM - struct shared_meminfo shmem; -#endif -}; - -#ifdef CONFIG_ACPI -#define BOOTINFO_ACPI_INIT \ - .acpi.common.max_banks =3D NR_MEM_BANKS, \ - .acpi.common.type =3D MEMORY, -#else -#define BOOTINFO_ACPI_INIT -#endif - -#ifdef CONFIG_STATIC_SHM -#define BOOTINFO_SHMEM_INIT \ - .shmem.common.max_banks =3D NR_SHMEM_BANKS, \ - .shmem.common.type =3D STATIC_SHARED_MEMORY, -#else -#define BOOTINFO_SHMEM_INIT -#endif - -#define BOOTINFO_INIT \ -{ \ - .mem.common.max_banks =3D NR_MEM_BANKS, \ - .mem.common.type =3D MEMORY, \ - .reserved_mem.common.max_banks =3D NR_MEM_BANKS, \ - .reserved_mem.common.type =3D RESERVED_MEMORY, \ - BOOTINFO_ACPI_INIT \ - BOOTINFO_SHMEM_INIT \ -} - -extern struct bootinfo bootinfo; - -bool check_reserved_regions_overlap(paddr_t region_start, - paddr_t region_size, - bool allow_memreserve_overlap); - -struct bootmodule *add_boot_module(bootmodule_kind kind, - paddr_t start, paddr_t size, bool domU); -struct bootmodule *boot_module_find_by_kind(bootmodule_kind kind); -struct bootmodule * boot_module_find_by_addr_and_kind(bootmodule_kind kind, - paddr_t start= ); -void add_boot_cmdline(const char *name, const char *cmdline, - bootmodule_kind kind, paddr_t start, bool domU); -struct bootcmdline *boot_cmdline_find_by_kind(bootmodule_kind kind); -struct bootcmdline * boot_cmdline_find_by_name(const char *name); -const char *boot_module_kind_as_string(bootmodule_kind kind); - -void populate_boot_allocator(void); - -size_t boot_fdt_info(const void *fdt, paddr_t paddr); - -const char *boot_fdt_cmdline(const void *fdt); - -static inline struct membanks *bootinfo_get_reserved_mem(void) -{ - return container_of(&bootinfo.reserved_mem.common, struct membanks, co= mmon); -} - -static inline struct membanks *bootinfo_get_mem(void) -{ - return container_of(&bootinfo.mem.common, struct membanks, common); -} - -#ifdef CONFIG_ACPI -static inline struct membanks *bootinfo_get_acpi(void) -{ - return container_of(&bootinfo.acpi.common, struct membanks, common); -} -#endif - -#ifdef CONFIG_STATIC_SHM -static inline struct membanks *bootinfo_get_shmem(void) -{ - return container_of(&bootinfo.shmem.common, struct membanks, common); -} - -static inline struct shmem_membank_extra *bootinfo_get_shmem_extra(void) -{ - return bootinfo.shmem.extra; -} -#endif - -static inline struct membanks *membanks_xzalloc(unsigned int nr, - enum region_type type) -{ - struct membanks *banks =3D xzalloc_flex_struct(struct membanks, bank, = nr); - - if ( !banks ) - goto out; - - banks->max_banks =3D nr; - banks->type =3D type; - - out: - return banks; -} - /* * Interpret the property `prop_name` of `node` as a u32. * diff --git a/xen/include/xen/bootinfo.h b/xen/include/xen/bootinfo.h new file mode 100644 index 0000000000..bf7516ec1f --- /dev/null +++ b/xen/include/xen/bootinfo.h @@ -0,0 +1,212 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef XEN_BOOTINFO_H +#define XEN_BOOTINFO_H + +#include +#include +#include +#include + +#define NR_MEM_BANKS 256 +#define NR_SHMEM_BANKS 32 + +#define MAX_MODULES 32 /* Current maximum useful modules */ + +enum membank_type { + /* + * The MEMBANK_DEFAULT type refers to either reserved memory for the + * device/firmware (when the bank is in 'reserved_mem') or any RAM (wh= en + * the bank is in 'mem'). + */ + MEMBANK_DEFAULT, + /* + * The MEMBANK_STATIC_DOMAIN type is used to indicate whether the memo= ry + * bank is bound to a static Xen domain. It is only valid when the bank + * is in reserved_mem. + */ + MEMBANK_STATIC_DOMAIN, + /* + * The MEMBANK_STATIC_HEAP type is used to indicate whether the memory + * bank is reserved as static heap. It is only valid when the bank is + * in reserved_mem. + */ + MEMBANK_STATIC_HEAP, + /* + * The MEMBANK_FDT_RESVMEM type is used to indicate whether the memory + * bank is from the FDT reserve map. + */ + MEMBANK_FDT_RESVMEM, +}; + +enum region_type { + MEMORY, + RESERVED_MEMORY, + STATIC_SHARED_MEMORY +}; + +/* Indicates the maximum number of characters(\0 included) for shm_id */ +#define MAX_SHM_ID_LENGTH 16 + +struct shmem_membank_extra { + char shm_id[MAX_SHM_ID_LENGTH]; + unsigned int nr_shm_borrowers; +}; + +struct membank { + paddr_t start; + paddr_t size; + union { + enum membank_type type; +#ifdef CONFIG_STATIC_SHM + struct shmem_membank_extra *shmem_extra; +#endif + }; +}; + +struct membanks { + __struct_group(membanks_hdr, common, , + unsigned int nr_banks; + unsigned int max_banks; + enum region_type type; + ); + struct membank bank[]; +}; + +struct meminfo { + struct membanks_hdr common; + struct membank bank[NR_MEM_BANKS]; +}; + +struct shared_meminfo { + struct membanks_hdr common; + struct membank bank[NR_SHMEM_BANKS]; + struct shmem_membank_extra extra[NR_SHMEM_BANKS]; +}; + +/* DT_MAX_NAME is the node name max length according the DT spec */ +#define DT_MAX_NAME 41 +struct bootcmdline { + bootmodule_kind kind; + bool domU; + paddr_t start; + char dt_name[DT_MAX_NAME]; + char cmdline[BOOTMOD_MAX_CMDLINE]; +}; + +struct bootmodules { + int nr_mods; + struct bootmodule module[MAX_MODULES]; +}; + +struct bootcmdlines { + unsigned int nr_mods; + struct bootcmdline cmdline[MAX_MODULES]; +}; + +struct bootinfo { + struct meminfo mem; + /* The reserved regions are only used when booting using Device-Tree */ + struct meminfo reserved_mem; + struct bootmodules modules; + struct bootcmdlines cmdlines; +#ifdef CONFIG_ACPI + struct meminfo acpi; +#endif +#ifdef CONFIG_STATIC_SHM + struct shared_meminfo shmem; +#endif +}; + +#ifdef CONFIG_ACPI +#define BOOTINFO_ACPI_INIT \ + .acpi.common.max_banks =3D NR_MEM_BANKS, \ + .acpi.common.type =3D MEMORY, +#else +#define BOOTINFO_ACPI_INIT +#endif + +#ifdef CONFIG_STATIC_SHM +#define BOOTINFO_SHMEM_INIT \ + .shmem.common.max_banks =3D NR_SHMEM_BANKS, \ + .shmem.common.type =3D STATIC_SHARED_MEMORY, +#else +#define BOOTINFO_SHMEM_INIT +#endif + +#define BOOTINFO_INIT \ +{ \ + .mem.common.max_banks =3D NR_MEM_BANKS, \ + .mem.common.type =3D MEMORY, \ + .reserved_mem.common.max_banks =3D NR_MEM_BANKS, \ + .reserved_mem.common.type =3D RESERVED_MEMORY, \ + BOOTINFO_ACPI_INIT \ + BOOTINFO_SHMEM_INIT \ +} + +extern struct bootinfo bootinfo; + +bool check_reserved_regions_overlap(paddr_t region_start, + paddr_t region_size, + bool allow_memreserve_overlap); + +struct bootmodule *add_boot_module(bootmodule_kind kind, + paddr_t start, paddr_t size, bool domU); +struct bootmodule *boot_module_find_by_kind(bootmodule_kind kind); +struct bootmodule * boot_module_find_by_addr_and_kind(bootmodule_kind kind, + paddr_t start= ); +void add_boot_cmdline(const char *name, const char *cmdline, + bootmodule_kind kind, paddr_t start, bool domU); +struct bootcmdline *boot_cmdline_find_by_kind(bootmodule_kind kind); +struct bootcmdline * boot_cmdline_find_by_name(const char *name); +const char *boot_module_kind_as_string(bootmodule_kind kind); + +void populate_boot_allocator(void); + +size_t boot_fdt_info(const void *fdt, paddr_t paddr); +const char *boot_fdt_cmdline(const void *fdt); + +static inline struct membanks *bootinfo_get_reserved_mem(void) +{ + return container_of(&bootinfo.reserved_mem.common, struct membanks, co= mmon); +} + +static inline struct membanks *bootinfo_get_mem(void) +{ + return container_of(&bootinfo.mem.common, struct membanks, common); +} + +#ifdef CONFIG_ACPI +static inline struct membanks *bootinfo_get_acpi(void) +{ + return container_of(&bootinfo.acpi.common, struct membanks, common); +} +#endif + +#ifdef CONFIG_STATIC_SHM +static inline struct membanks *bootinfo_get_shmem(void) +{ + return container_of(&bootinfo.shmem.common, struct membanks, common); +} + +static inline struct shmem_membank_extra *bootinfo_get_shmem_extra(void) +{ + return bootinfo.shmem.extra; +} +#endif + +static inline struct membanks *membanks_xzalloc(unsigned int nr, + enum region_type type) +{ + struct membanks *banks =3D xzalloc_flex_struct(struct membanks, bank, = nr); + + if ( !banks ) + goto out; + + banks->max_banks =3D nr; + banks->type =3D type; + + out: + return banks; +} + +#endif /* XEN_BOOTINFO_H */ diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h index 0a22b1ba1d..7d1c8bc305 100644 --- a/xen/include/xen/device_tree.h +++ b/xen/include/xen/device_tree.h @@ -10,7 +10,7 @@ #ifndef __XEN_DEVICE_TREE_H__ #define __XEN_DEVICE_TREE_H__ =20 -#include +#include #include =20 #include diff --git a/xen/include/xen/fdt-domain-build.h b/xen/include/xen/fdt-domai= n-build.h index 45981dbec0..60565fdbf9 100644 --- a/xen/include/xen/fdt-domain-build.h +++ b/xen/include/xen/fdt-domain-build.h @@ -3,7 +3,7 @@ #ifndef __XEN_FDT_DOMAIN_BUILD_H__ #define __XEN_FDT_DOMAIN_BUILD_H__ =20 -#include +#include #include #include #include diff --git a/xen/include/xen/fdt-kernel.h b/xen/include/xen/fdt-kernel.h index 2f0ee42ebc..cb7ddc9807 100644 --- a/xen/include/xen/fdt-kernel.h +++ b/xen/include/xen/fdt-kernel.h @@ -7,7 +7,7 @@ #ifndef __XEN_FDT_KERNEL_H__ #define __XEN_FDT_KERNEL_H__ =20 -#include +#include #include #include =20 --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607164; cv=pass; d=zohomail.com; s=zohoarc; b=DhLUrSu80tOLAjmtwLwpULLTdRbn8d6dnRjHzaACl0fwLSyl1BUMH4qrPphI/IG+7CNwHJ87kpJG0TsjreBGGLQqhXzuhXvY25WF4diQ2J0GrUza8Ed8bMShTDlbFFc8dj3VPC35EU9Y0r2Oky+oVTtz5KKDotwWwU96L5u8VTs= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607164; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=s1Ju23IR+EEatQtsIjEvwx3F7nbCca9u0WIiSRMIQpI=; b=k205xglvJUia0FDxrstsT4FO6+V6oNACrhcfkpV4RH7b7ioaBcqt8r+Mc68MTJ9gSJ2Mdx3yPeouiKy6mWYViDi8D8TTSRd8y93XDz9mZQ1IPpktbPSa1vhxEIK5Fbs//WI5wxWilVg6OqW2L7+UjWHp+TuN1oVDjZKkN4SVk9o= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748607164709701.6033200642729; Fri, 30 May 2025 05:12:44 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000856.1381076 (Exim 4.92) (envelope-from ) id 1uKybD-0001bm-1Z; Fri, 30 May 2025 12:12:35 +0000 Received: by outflank-mailman (output) from mailman id 1000856.1381076; Fri, 30 May 2025 12:12:35 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKybC-0001ba-UP; Fri, 30 May 2025 12:12:34 +0000 Received: by outflank-mailman (input) for mailman id 1000856; Fri, 30 May 2025 12:12:33 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySb-00076q-22 for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:41 +0000 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on20631.outbound.protection.outlook.com [2a01:111:f403:2415::631]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1f42e099-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:40 +0200 (CEST) Received: from CH2PR15CA0016.namprd15.prod.outlook.com (2603:10b6:610:51::26) by DS0PR12MB6654.namprd12.prod.outlook.com (2603:10b6:8:d1::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.30; Fri, 30 May 2025 12:03:34 +0000 Received: from CH2PEPF00000146.namprd02.prod.outlook.com (2603:10b6:610:51:cafe::45) by CH2PR15CA0016.outlook.office365.com (2603:10b6:610:51::26) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8746.31 via Frontend Transport; Fri, 30 May 2025 12:03:34 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000146.mail.protection.outlook.com (10.167.244.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:34 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:33 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1f42e099-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=GgMvWIsYFBxbPAR2AGgEeM6EUFlqhhppH4RvMAPMyXPReX3so3pJRhOoSUzXvlkb7/dabFiTdfKc4F3o2uGsyUGpSK2c9dnrUf8D9BNTM2009yMii8woiPrXoHFHKnDwOQEE3OpRbDoR3zVgVvmkUbTGRmXUy1aqMKDDPLlnN1PM+KQ2EEd3TxHGeajgISkRyu4+b611Zt/3eRdciOZQQGKMcCeYuDqlbv/sIjvDte3my7DzokkVwDmlDbFDMUlhIis45UzCVzp0Egw2MIX/IXJ4u7S/itX29v8nce9CCWUkQ/9REOPHy/rlNqtTY7IOJqmTYWBHRmO42pdIVaO4Jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=s1Ju23IR+EEatQtsIjEvwx3F7nbCca9u0WIiSRMIQpI=; b=iBtoQKLbsckEqlnmSeSENRypM6LzuLjD5ej+3RtzZ2qNPAZaUuf337RN8AmOLW36UDAWsaEvca73tTFep5EA1ApxXLeic6eq2pWQVEISGWCd2cUHGA7CLXqM5stQ+YdIdU4crUsD3P2eOawsdVTI1Fh+8a6oPaEYRyW5SYKMMzs54t+yv5odGXg2YANXaDEMSIPF6qSdCfZEsWLarHCbSorCd6milzLc+/5tUmLuit/0Bv/5IhcihMlAeHKPKMFMq5Lh5Y6vHR+EafciZDWwlpD6KYpyE7cys/wqrPtQ4T61yZ8J3sfXY/xI9VD2HJo31K4HhIrjDQX3/rrnOPptYw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=s1Ju23IR+EEatQtsIjEvwx3F7nbCca9u0WIiSRMIQpI=; b=iHCDJkqqctFW7iBVAICAqAuXAQaT6q8HtmRjeRohbdlIr9a9nRAt/SUJqaHR9Rrt5dCU/s7+TuuuuR2pBJKS4iqpxmY/i89YqYAHfsoW1egnqc631hxjvuaYlAh0UUnOOFnpVPVN8ASKaacSJLIdpRb0VGPVzdEXECB5O4ziarc= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Daniel P. Smith" Subject: [PATCH 14/19] xen/dt: Rename bootfdt.c -> bootinfo-fdt.c Date: Fri, 30 May 2025 14:02:22 +0200 Message-ID: <20250530120242.39398-15-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000146:EE_|DS0PR12MB6654:EE_ X-MS-Office365-Filtering-Correlation-Id: 4578e73a-fc87-43d1-e15c-08dd9f720106 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|36860700013|1800799024|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?v7aJvLyyyzoqPZPJyAzmPebRpKbSIo6rYnkmFMJvZODz65JEk0H5K1+Og9/e?= =?us-ascii?Q?84gjSoJEHCAHU7TFM/X3tpBps0BZ5p8B8lGGbqbXcNgtUOFZZEddzgsoaTQz?= =?us-ascii?Q?SAA+8qdQX4NnqEhSWnCh7kdwT5CvqnU9yCaxzEChyMDIRy8ZvVis3qUpaOYN?= =?us-ascii?Q?KEoJwna+5CvE1Yj9zmVNnNVIq36UYIe19hQDYVWwmQosSb0pGp4B22ByceSF?= =?us-ascii?Q?6TU9E5Pc+nRzge1rZPcjaOb1Cd8dBi4LROcsj/JSH9oCeCMWdPyHdzJItcms?= =?us-ascii?Q?rc4rQXvQ5D323esfeg61maPvsxbhaEX0rfGfRqycIsKirkmrvYXqBoOOyq6y?= =?us-ascii?Q?SalvmOj8WsRTWnnur6aKLiUYUnabF+PWTSTQVcJ4p8maBQgJWocT46s2QDhf?= =?us-ascii?Q?+AYMbISQw4aSesbvoq1OWAPM1D188/aaONbp9y4Ds794Md/BAmJyCJ9WY69H?= =?us-ascii?Q?QQHlvh1JCiOt56spJX5yV00oLNaA4qvvrRRgt4GQaqEXeeDB8nu8LYAN0QOv?= =?us-ascii?Q?HZQLgfjhLyldkdzprS6CIxsqqbkh4KGTbSnEnB6gCEKcbB180S8L4eB9kSqW?= =?us-ascii?Q?kLA/FJJdVsfBq9uMmJsdINPfXfSm6b1RX6H75uAbX9PfVvzpr61N9FJpXjN9?= =?us-ascii?Q?5BGUIceSsvViEciFnvuElF1Jc1p0yvDBWc10G4gqKZy+buxFbXm6pFuRPZNf?= =?us-ascii?Q?emHU6Qeq/5ya0ZcqS3rd3cnDrLxJRHkGHFYIdnVc2mil7VvRdCXdXSv5F7b2?= =?us-ascii?Q?0B7AQG2pM3ta1vLJQBLYDli/ksX4btxkydAuH2C2Ho4nGEbaVm2S7mr16kG/?= =?us-ascii?Q?Pt33OacD3HznRB3Pq4s9j1+Vc3bcqIGK+Z/p0kVSHdcNWPsgNu+Dmal9/6y5?= =?us-ascii?Q?03DBTMuUhehx3Bq0tw1OVW0BK71EjDyKKuJArCiecKNPxY2N0bpAyAAwZsLI?= =?us-ascii?Q?HKNwMU6F4Vfg1/2SpA5EDyoudPcJZbsRax3Png7TKTwoHuXNpX5LpYHc2EjW?= =?us-ascii?Q?vXBsISdB9+HNwiFc4NKiw4v1zlJyCWYuHPoEkxvrglYoGdI49501MQ9lB7AV?= =?us-ascii?Q?gURpzoPgewBuviQ6NOGzR+u1rQc5TQZUUoHAaneSJRP/SqKZXSbizdOEno2B?= =?us-ascii?Q?lz8/QPQZysDGfuj1BHMxxqjb8uu/HTWZ1TPrqrKrRmRenuMz5mfRLRZDdrSG?= =?us-ascii?Q?7C13/dAVlziRfnYLdX7lx2lJUP+Y+NuHSgbKOVULS07DakHxjIuN2WEZgSp4?= =?us-ascii?Q?ovqVATzoJvYMgmcHBqKG2fso3b5tCn5qEuraswK3l5UCTobdgxL8JvgpQSYS?= =?us-ascii?Q?b/Hf8mLOb7eWUlRUEl9Y9GvIe1WRmZ9u/IFFNM5HNpmkqdcjNAq1ipnzID1k?= =?us-ascii?Q?qs5TODONFHHijThEXu49rFMSnKXEFCQ4U1B92RZsF7KOxmjLX12kJRIxHxr2?= =?us-ascii?Q?/elGKKWmZSFJ/rvVjSK45IoxdD7HNySruCFWuzYaPBGZsP7eTWCD7ls3saVq?= =?us-ascii?Q?y0GO1JYaEBe0D/ODLKDXjpm8IPs9CpBrROYT?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(36860700013)(1800799024)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:34.8254 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4578e73a-fc87-43d1-e15c-08dd9f720106 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000146.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB6654 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607166906124100 Content-Type: text/plain; charset="utf-8" This file will eventually contain bootfdt helpers that make heavy use of bootinfo. To simplify git history do the rename here explicitly. A later patch extracts bootinfo-independent helpers into bootfdt.c. Doing so here would needlessly pollute the diffs. Not a functional change. Signed-off-by: Alejandro Vallejo Reviewed-by: Stefano Stabellini --- xen/common/device-tree/Makefile | 2 +- xen/common/device-tree/{bootfdt.c =3D> bootinfo-fdt.c} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename xen/common/device-tree/{bootfdt.c =3D> bootinfo-fdt.c} (99%) diff --git a/xen/common/device-tree/Makefile b/xen/common/device-tree/Makef= ile index 57b9e6ca00..bb6d5ddec5 100644 --- a/xen/common/device-tree/Makefile +++ b/xen/common/device-tree/Makefile @@ -1,4 +1,4 @@ -obj-y +=3D bootfdt.init.o +obj-y +=3D bootinfo-fdt.init.o obj-y +=3D bootinfo.init.o obj-y +=3D device-tree.o obj-$(CONFIG_DOMAIN_BUILD_HELPERS) +=3D domain-build.init.o diff --git a/xen/common/device-tree/bootfdt.c b/xen/common/device-tree/boot= info-fdt.c similarity index 99% rename from xen/common/device-tree/bootfdt.c rename to xen/common/device-tree/bootinfo-fdt.c index fb4ac06390..bb5f45771e 100644 --- a/xen/common/device-tree/bootfdt.c +++ b/xen/common/device-tree/bootinfo-fdt.c @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0-only */ /* - * Early Device Tree + * Early Device Tree with bootinfo hooks * * Copyright (C) 2012-2014 Citrix Systems, Inc. */ --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607133; cv=pass; d=zohomail.com; s=zohoarc; b=m/WmXG13637op9AiLFh2JRu00LG5RJ5+uQZ6pEX6as67EK65wvVxkXdqFnfSXgw+Z2RKpYv5lcqPnZyfC/bM54mQZOhoQGMe4F27CkjZKP0sOAoB9WAjZi6vFr/iZLvdF+zuBxH+SzKLTIbymL3tWDX6a3rvcP3/ZJiLXMByxus= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607133; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=QScSHMvynX6vj1N+8sVjrtazka+q1SLtfC56Og9Zthg=; b=iYnn8a8ijrT0/joNISpEVVyH0cNIn/hFXOztL7ZLpztJOnbx6P0TE7/9bPplL7pL7CvSM70cLw4r3n+kKxgdQcq6vZ9ZpwTZmMVMGbGDdMzQw25ls3SqRxc55iSGzxxe9wmJwaE26N0Sb8YxG9nbc2iMEpdJYFRw6Ixd5OOhsCs= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748607133420350.700347513147; Fri, 30 May 2025 05:12:13 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000843.1381067 (Exim 4.92) (envelope-from ) id 1uKyaf-0000iC-Qr; Fri, 30 May 2025 12:12:01 +0000 Received: by outflank-mailman (output) from mailman id 1000843.1381067; Fri, 30 May 2025 12:12:01 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyaf-0000h6-Mb; Fri, 30 May 2025 12:12:01 +0000 Received: by outflank-mailman (input) for mailman id 1000843; Fri, 30 May 2025 12:12:00 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySc-00076q-21 for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:42 +0000 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on20626.outbound.protection.outlook.com [2a01:111:f403:2416::626]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1f0d2541-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:40 +0200 (CEST) Received: from CH0PR04CA0104.namprd04.prod.outlook.com (2603:10b6:610:75::19) by CH1PR12MB9599.namprd12.prod.outlook.com (2603:10b6:610:2ae::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.26; Fri, 30 May 2025 12:03:36 +0000 Received: from CH2PEPF0000014A.namprd02.prod.outlook.com (2603:10b6:610:75:cafe::f4) by CH0PR04CA0104.outlook.office365.com (2603:10b6:610:75::19) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8746.31 via Frontend Transport; Fri, 30 May 2025 12:03:36 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF0000014A.mail.protection.outlook.com (10.167.244.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:36 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:34 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1f0d2541-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=EiWgRF++OSBMhis7czWdgjd2sNKcxVmoYLNx0l32yPhjGV5+y/9i9wo9JZdDFmQFzN/hsh6ldnI0UD5Xxubrb6hmvg8HsXG5C1NDiuP1amYe7G97jr0GDRD1VgN8tv0jlsKUQkAH08NqJvEp+70M5SFw9pGEv8cfdPALdxp8SniTksunDTvB4M1paHEPyUQSwtrUcwN53u1kgzZHB6tMwwC4RBR/TXXIDg1IAcWt0mjYMnNBV0+1vZr127yPYKz8lGM6MGkaGEFOEfUs7p0o3xFwjt15Y9q9sNnS1zdFX3CKo/euQ3D1WAmU+gS5gCdeW8opMjs2fGw84T4teYktGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=QScSHMvynX6vj1N+8sVjrtazka+q1SLtfC56Og9Zthg=; b=RuL7uUi1mqqtOe+v30RgOf/l8SoQdZ8Hur5GaRCHv46H6WgwATatFEWdT+5KxDN3BlNWl9A2Peg9D1WfISwjBAzncjERC2YoNfHn/bRSUzDPmmaRZ5Lnnnwsrbeygd9gMhN1l/do6rGmZO4M23BdzsnzRRuxRgFJpv/ckjTiqofzSfDu826uYmam+NOvTIwbnQY93+RvvGd1F/+5OAkKoX7iBA3hK+QVdCY67ky9OPI2vnDfi+Vi5zSoVS5UoIqte6w5Lqrkt2G/tXDw4wlN/TmqNxJ7Y/0ubBzvXnc/v5xCWikQ151BFu5cUN9j7GGQo55eq9wIu/WjQsNCUIclWQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QScSHMvynX6vj1N+8sVjrtazka+q1SLtfC56Og9Zthg=; b=Lq3oEv9rbQN9s1HeQfPi2U4Fbgxf4GobU+Zv/El9i944nrXN+cb/nKLmBmyeT+wGFutxII8vzQJMPx2HCkjFF6A5bWV4ueWWPfVq6csBIZE6AYBQavtxygqgLUJZtC2Kbqf9Ab5+LZ83llIm8swaY+LQV3Kk3ekyhQL6MCJUnBY= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Daniel P. Smith" Subject: [PATCH 15/19] xen/dt: Move bootinfo-independent helpers out of bootinfo-fdt.c Date: Fri, 30 May 2025 14:02:23 +0200 Message-ID: <20250530120242.39398-16-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF0000014A:EE_|CH1PR12MB9599:EE_ X-MS-Office365-Filtering-Correlation-Id: 489cc566-eb82-4b8b-223f-08dd9f7201fc X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|1800799024|36860700013|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?WNxrTHOoblmj5TT4DE25dJO4q5DxYrM4mdDjCElQxop9yrfhxXF3EmBGvlfH?= =?us-ascii?Q?OvQtNZHZxW6U92y3UCVHv/zT3J2QXp62CFcMIcxG2bVeFV6prRBesClJz3do?= =?us-ascii?Q?u4duwG6wSTe7q2lSDYtqykp0Yfk8Ud/oabToOvx05xFH7B9F+qJikMQvS8Y4?= =?us-ascii?Q?qA137K/+1Pa5yRQYuJa8ga7eegdNrNtWH+7fzlyxUVRSn7y9s68mX5PTO0/H?= =?us-ascii?Q?AidlggPPxr+yzvNTOHfREncvxvDinTIK+QCPTgwbAuqN3XTPLvZIU3xAvXmx?= =?us-ascii?Q?cf4s8dKL+/e/285MJP8GtTu7pW4DVc6nmjBil41x9vya3GbpEyzt1exQRoJ1?= =?us-ascii?Q?847B4E+Jzo7Zps9BNwbR1v+zaTU834x1SnyiCEiXV+EktPHn6vSBVwdrl8Bp?= =?us-ascii?Q?oe4yLGJ5GMSx8IwpyLb1I1Jcilw1EEpsUqASZ1ea5QjlMVCZDhHujLM5ZGS5?= =?us-ascii?Q?qbFVOjJ5FNeOIamOoRSmYIVCXza3dKwXYm5MWLAJSHvS/ufjRbSGae/jjv2D?= =?us-ascii?Q?65h7kD5WoyVSa+Cik8AcIROd67D/mF90nvB1N0EfDiQS95L9iw2OA3pv0rJd?= =?us-ascii?Q?teE0gk/K8XSemdvrraU6Bi45asI9fXyKZNdYqsZ18G2Yqf7F52wFbT5zg5C/?= =?us-ascii?Q?p/jBnz6E3iFVrwAt9mxrB+CuThX/YRlDsWgSFSsoSLnabXXbrAC2DvkdTJqh?= =?us-ascii?Q?lj5X2W25Ya6lQOXldLTgV9a0sErShsjpn+hNVRNVtxdRH2fYoZFdr7Zh1+E7?= =?us-ascii?Q?COhmrSZgz6QOp3TGsMu0l/tCMSZ+YzOw+gKYTeJ5TuricSGUfrYv0XiRZFI1?= =?us-ascii?Q?xdMNHW4tjpwMdnA+ELqsLS7KVEWj40rBk1GCI3knRiCbGhTmdWI2VRwS5y5n?= =?us-ascii?Q?5cpfWQKYICQpDWD6sNRkc1CXCN2ZsG3difK6/Uo2Dw1fV/y5asLTw10K3ORM?= =?us-ascii?Q?jk4Nx7yXAZO5FzKhspnMaV+wlTvCvn6GwWAE0j32VhDnR9+w8WFGA++WkA/7?= =?us-ascii?Q?z0gNHtcuXnOtEg9SESfti/KxYJ+F3ZsEYRvNH5PwOFtVJZeJXgB6/N80ss1y?= =?us-ascii?Q?pQKfSqfyRnGqoBvisBfqmSNQ2w8K7MhZHH7zyvXBPvgQm9aEz2HKijflXBby?= =?us-ascii?Q?OHiFlsGLQDRFHAOv+tmK7j/eUsPouishNsx4DfDbY0ZTSPiF7iTeobMqjwkv?= =?us-ascii?Q?dRU3MyEM3nZfADgeduJnaOrh67JpT3oiGpqeiEOQcrucVNOs7MSHdX4SHx/c?= =?us-ascii?Q?OqoG2jf1JIeFkOfpAGo4CyF+v7LYs9P0T5lTT0eAYDpI2I2wAGihafC3LZGo?= =?us-ascii?Q?VOtkNKJOhv8G7/aZVzz6xikYyGIU+J2mlv8wnxXsn2all1SAJTjPOnTsEqoQ?= =?us-ascii?Q?IJanIp3cXiwAf7TAVEh5fYSL65NPc+bynkA2hdznjpPSXId6fhZij+0p4xeV?= =?us-ascii?Q?56TffGs48Hlkl+6E19V+GJlZ7Ujbz1T4hwPBC2lGu1he3fG9kxfAH7Ve4exz?= =?us-ascii?Q?gogaRszHyAMsRxltxXssAYBKYy+K95G2l46/?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(1800799024)(36860700013)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:36.4320 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 489cc566-eb82-4b8b-223f-08dd9f7201fc X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF0000014A.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH1PR12MB9599 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607135219124100 Content-Type: text/plain; charset="utf-8" ... back into bootfdt.c These will be required by x86 later on to detect modules in the early scan = of the FDT. They are independent of bootinfo, so it's cleaner for them to exis= t in a separate file. Not a functional change. Signed-off-by: Alejandro Vallejo --- xen/common/device-tree/Makefile | 1 + xen/common/device-tree/bootfdt.c | 97 ++++++++++++++++++++++++ xen/common/device-tree/bootinfo-fdt.c | 104 -------------------------- 3 files changed, 98 insertions(+), 104 deletions(-) create mode 100644 xen/common/device-tree/bootfdt.c diff --git a/xen/common/device-tree/Makefile b/xen/common/device-tree/Makef= ile index bb6d5ddec5..922c5bba9b 100644 --- a/xen/common/device-tree/Makefile +++ b/xen/common/device-tree/Makefile @@ -1,3 +1,4 @@ +obj-y +=3D bootfdt.init.o obj-y +=3D bootinfo-fdt.init.o obj-y +=3D bootinfo.init.o obj-y +=3D device-tree.o diff --git a/xen/common/device-tree/bootfdt.c b/xen/common/device-tree/boot= fdt.c new file mode 100644 index 0000000000..5decf17faf --- /dev/null +++ b/xen/common/device-tree/bootfdt.c @@ -0,0 +1,97 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#include +#include +#include +#include + +uint32_t __init device_tree_get_u32(const void *fdt, int node, + const char *prop_name, uint32_t dflt) +{ + const struct fdt_property *prop; + + prop =3D fdt_get_property(fdt, node, prop_name, NULL); + if ( !prop || prop->len < sizeof(u32) ) + return dflt; + + return fdt32_to_cpu(*(uint32_t*)prop->data); +} + +int __init device_tree_for_each_node(const void *fdt, int node, + device_tree_node_func func, + void *data) +{ + /* + * We only care about relative depth increments, assume depth of + * node is 0 for simplicity. + */ + int depth =3D 0; + const int first_node =3D node; + u32 address_cells[DEVICE_TREE_MAX_DEPTH]; + u32 size_cells[DEVICE_TREE_MAX_DEPTH]; + int ret; + + do { + const char *name =3D fdt_get_name(fdt, node, NULL); + u32 as, ss; + + if ( depth >=3D DEVICE_TREE_MAX_DEPTH ) + { + printk("Warning: device tree node `%s' is nested too deep\n", + name); + continue; + } + + as =3D depth > 0 ? address_cells[depth-1] : DT_ROOT_NODE_ADDR_CELL= S_DEFAULT; + ss =3D depth > 0 ? size_cells[depth-1] : DT_ROOT_NODE_SIZE_CELLS_D= EFAULT; + + address_cells[depth] =3D device_tree_get_u32(fdt, node, + "#address-cells", as); + size_cells[depth] =3D device_tree_get_u32(fdt, node, + "#size-cells", ss); + + /* skip the first node */ + if ( node !=3D first_node ) + { + ret =3D func(fdt, node, name, depth, as, ss, data); + if ( ret !=3D 0 ) + return ret; + } + + node =3D fdt_next_node(fdt, node, &depth); + } while ( node >=3D 0 && depth > 0 ); + + return 0; +} + +void __init device_tree_get_reg(const __be32 **cell, uint32_t address_cell= s, + uint32_t size_cells, paddr_t *start, + paddr_t *size) +{ + uint64_t dt_start, dt_size; + + /* + * dt_next_cell will return uint64_t whereas paddr_t may not be 64-bit. + * Thus, there is an implicit cast from uint64_t to paddr_t. + */ + dt_start =3D dt_next_cell(address_cells, cell); + dt_size =3D dt_next_cell(size_cells, cell); + + if ( dt_start !=3D (paddr_t)dt_start ) + { + printk("Physical address greater than max width supported\n"); + WARN(); + } + + if ( dt_size !=3D (paddr_t)dt_size ) + { + printk("Physical size greater than max width supported\n"); + WARN(); + } + + /* + * Xen will truncate the address/size if it is greater than the maximum + * supported width and it will give an appropriate warning. + */ + *start =3D dt_start; + *size =3D dt_size; +} diff --git a/xen/common/device-tree/bootinfo-fdt.c b/xen/common/device-tree= /bootinfo-fdt.c index bb5f45771e..736f877616 100644 --- a/xen/common/device-tree/bootinfo-fdt.c +++ b/xen/common/device-tree/bootinfo-fdt.c @@ -112,39 +112,6 @@ static bool __init device_tree_is_memory_node(const vo= id *fdt, int node, return true; } =20 -void __init device_tree_get_reg(const __be32 **cell, uint32_t address_cell= s, - uint32_t size_cells, paddr_t *start, - paddr_t *size) -{ - uint64_t dt_start, dt_size; - - /* - * dt_next_cell will return uint64_t whereas paddr_t may not be 64-bit. - * Thus, there is an implicit cast from uint64_t to paddr_t. - */ - dt_start =3D dt_next_cell(address_cells, cell); - dt_size =3D dt_next_cell(size_cells, cell); - - if ( dt_start !=3D (paddr_t)dt_start ) - { - printk("Physical address greater than max width supported\n"); - WARN(); - } - - if ( dt_size !=3D (paddr_t)dt_size ) - { - printk("Physical size greater than max width supported\n"); - WARN(); - } - - /* - * Xen will truncate the address/size if it is greater than the maximum - * supported width and it will give an appropriate warning. - */ - *start =3D dt_start; - *size =3D dt_size; -} - static int __init device_tree_get_meminfo(const void *fdt, int node, const char *prop_name, u32 address_cells, u32 size_cell= s, @@ -205,77 +172,6 @@ static int __init device_tree_get_meminfo(const void *= fdt, int node, return 0; } =20 -u32 __init device_tree_get_u32(const void *fdt, int node, - const char *prop_name, u32 dflt) -{ - const struct fdt_property *prop; - - prop =3D fdt_get_property(fdt, node, prop_name, NULL); - if ( !prop || prop->len < sizeof(u32) ) - return dflt; - - return fdt32_to_cpu(*(uint32_t*)prop->data); -} - -/** - * device_tree_for_each_node - iterate over all device tree sub-nodes - * @fdt: flat device tree. - * @node: parent node to start the search from - * @func: function to call for each sub-node. - * @data: data to pass to @func. - * - * Any nodes nested at DEVICE_TREE_MAX_DEPTH or deeper are ignored. - * - * Returns 0 if all nodes were iterated over successfully. If @func - * returns a value different from 0, that value is returned immediately. - */ -int __init device_tree_for_each_node(const void *fdt, int node, - device_tree_node_func func, - void *data) -{ - /* - * We only care about relative depth increments, assume depth of - * node is 0 for simplicity. - */ - int depth =3D 0; - const int first_node =3D node; - u32 address_cells[DEVICE_TREE_MAX_DEPTH]; - u32 size_cells[DEVICE_TREE_MAX_DEPTH]; - int ret; - - do { - const char *name =3D fdt_get_name(fdt, node, NULL); - u32 as, ss; - - if ( depth >=3D DEVICE_TREE_MAX_DEPTH ) - { - printk("Warning: device tree node `%s' is nested too deep\n", - name); - continue; - } - - as =3D depth > 0 ? address_cells[depth-1] : DT_ROOT_NODE_ADDR_CELL= S_DEFAULT; - ss =3D depth > 0 ? size_cells[depth-1] : DT_ROOT_NODE_SIZE_CELLS_D= EFAULT; - - address_cells[depth] =3D device_tree_get_u32(fdt, node, - "#address-cells", as); - size_cells[depth] =3D device_tree_get_u32(fdt, node, - "#size-cells", ss); - - /* skip the first node */ - if ( node !=3D first_node ) - { - ret =3D func(fdt, node, name, depth, as, ss, data); - if ( ret !=3D 0 ) - return ret; - } - - node =3D fdt_next_node(fdt, node, &depth); - } while ( node >=3D 0 && depth > 0 ); - - return 0; -} - static int __init process_memory_node(const void *fdt, int node, const char *name, int depth, u32 address_cells, u32 size_cells, --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607073; cv=pass; d=zohomail.com; s=zohoarc; b=N//YhnVH9k/Yz2Qo/VmcuZWpEwhZCUsFpDOLhfgDVe0CkAAnKix323xBpzlVrHqyggI0T8SGKDM5HhoYILgPQQCAZ6FMKz8hgArHz1g93Y0nleCsNz9k4QLCHCUMtS3ESa58f6pJCArt+QMPaGmMJsewU2QSiy0Ob2aCqu4Pds8= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607073; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=iFb4p1kDcRnAri++z0uQsOLZ3FGqifI7+PMLo97XTlo=; b=h3xX9iKYbcHVFQTIb/Xdqvyzv6XLKFRflLqJAOsAlbJZVfdJbmr9AbPcyLkPafl+yY16SIh5S2tOewaKFxcfTmnqr6A/ECPV5aY62+FIQ1sbRfeq07eGqvlTbN4yWGo79lQNNOnV3P6qk9npE843f/G/BJQE1DV+VxKJyV0G/f8= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748607073425207.31850622386946; Fri, 30 May 2025 05:11:13 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000785.1381006 (Exim 4.92) (envelope-from ) id 1uKyZZ-0005n6-7z; Fri, 30 May 2025 12:10:53 +0000 Received: by outflank-mailman (output) from mailman id 1000785.1381006; Fri, 30 May 2025 12:10:53 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyZZ-0005mx-3Y; Fri, 30 May 2025 12:10:53 +0000 Received: by outflank-mailman (input) for mailman id 1000785; Fri, 30 May 2025 12:10:51 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySj-00076q-3b for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:49 +0000 Received: from NAM04-MW2-obe.outbound.protection.outlook.com (mail-mw2nam04on20609.outbound.protection.outlook.com [2a01:111:f403:240a::609]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 21ae17a8-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:45 +0200 (CEST) Received: from CH2PR15CA0017.namprd15.prod.outlook.com (2603:10b6:610:51::27) by PH7PR12MB5998.namprd12.prod.outlook.com (2603:10b6:510:1da::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.29; Fri, 30 May 2025 12:03:38 +0000 Received: from CH2PEPF00000146.namprd02.prod.outlook.com (2603:10b6:610:51:cafe::a9) by CH2PR15CA0017.outlook.office365.com (2603:10b6:610:51::27) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8746.27 via Frontend Transport; Fri, 30 May 2025 12:03:38 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000146.mail.protection.outlook.com (10.167.244.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:38 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:36 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 21ae17a8-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=S+Tg5zBvbDHeHFt92o1fipbo6/XdcyoigoXuPNjs6yI0wbA8G2XC6HrBRxyUsv3RQIG6rBpDJvb9L3f328bUvNnzlW//ov2j3mIMzIV12o1kB2PhZm772YzIjyqGtIHbhmuy/GguGOegL78lTvURzDU/rpJZBLrRN8pctOGPM5iI2EWa1lfEn33WTCKoQ7ci864EZPJv6VFg1CSwDUiuWMakAdvvWSW0ZvcSc7SklYnbbnLkUFQaKkc1tJk3Ij6BQk48Ryqv9cc+5/9742hiyuuGtJTRx7kPlBbIcNp5VZ6paJJXPx3fT1LwIb6F5C2n0c9j91Pa+VYCXeu2hauTyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iFb4p1kDcRnAri++z0uQsOLZ3FGqifI7+PMLo97XTlo=; b=aRAeX7lmHv1rnK4AUGKRgrUJJaRnDB2ua3f9bglLc4KFjbY02XakreVtbfZ+Pqhkjgsfr/JPs/p1JnaimwjmBAhW+PsrMejKDfQT+M1rvh7f/cLYsQbwha5clWno4KVyjmttHk/I16szWGPWFO7JeCD78NYnsCvOzlpqyi04EehtYn7/9KFccX72uA2wM76w+RdDTV7zrAt6eAEI7JRy66Twvkf5GFUFWU9qkTpAF5UiVjK+lHNReI2tSyP1hLPTMtRd+vwUIZ7CFGVMUKYGZ4D07LP1oJetXvWIOWb7lHF8/JRkfH8BPm9E+H4ji4bsBuOckSTF+m/AmbyhlCu7iQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iFb4p1kDcRnAri++z0uQsOLZ3FGqifI7+PMLo97XTlo=; b=fkEmoMHEdD8bPR8Tm+aZxzxl7EuansOM47+zFnbXjFfU43BVCn2Ceh5nVFOUGrGBMMLdW8SsrHhsm28M8opwrKaPunXQ5JLLfLjFf0l4/NK5ycgeOHaXMyEHpb5kHCvCtLhKORKRDIVo1jqsz3sAQDrrLJy/NhJQ+U3G2IFpyFw= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Daniel P. Smith" Subject: [PATCH 16/19] xen/dt: Extract helper to map nodes to module kinds Date: Fri, 30 May 2025 14:02:24 +0200 Message-ID: <20250530120242.39398-17-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000146:EE_|PH7PR12MB5998:EE_ X-MS-Office365-Filtering-Correlation-Id: d690abd3-dfa5-47ff-1d66-08dd9f7202ee X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|36860700013|1800799024|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?sYsRH4V0DjcsSNik7Y0WgE2sz6POYt1d5P0IwZ79QBx0mUupSgB0fp6gmFSX?= =?us-ascii?Q?hGCMpfbJqqTbZxflt5tvsr4d7guZyUOasrBxiUlrRLZckJkaEUQsQ96yLN7Z?= =?us-ascii?Q?98y4qpGL1BlKHrUf5xGx85Mkhvw6dRBEh2CqCZAzCvOHSYrWtAhh42/Y6AHF?= =?us-ascii?Q?q/GdxZHipIDZBXgryltWPxgA8AXbw29h9swepMP8Yf42FPgLg5aI2yHh6BvG?= =?us-ascii?Q?8/nzIOQ1rtjlzQU77VS01hdNMUDsImWJ9/PfMhmpRVDWhtrnUXO+u9WK5tMn?= =?us-ascii?Q?D3vGqueBY8r7CLiE8Rlz/f897y1fYLue0d1JMyeLEx8N/u7PoLD9sDy9ARKn?= =?us-ascii?Q?PpMRE1e/qX227Mn7/mZyd3i5SiNIRsG10zt82l2cjfsk6Ns5cKgPg+PM2y4Y?= =?us-ascii?Q?0uuuzJiNXu7ZZz2ZmlB2Ky7h7AelfvxZf0GQfLOz7vfYtJE6eQPJAWe3S1x9?= =?us-ascii?Q?+eR5RZbB64wW1/busf/j4Nrc69E4SUvLZqL2MJJ836UcB9mFHlTx4ygbS7lC?= =?us-ascii?Q?/Snd/DKN643k21UpPxd1s7yKFCgr3fekHeTFMdm8I+LncvzjLVnZL6kQqsRs?= =?us-ascii?Q?uqhmYP0V8T9EHVcUnfh+cU3hN7La3FlAdkyVc+DE7YFdy0qmyKCOOaegonQ6?= =?us-ascii?Q?Tckd1DueGxGTeAbFxr/FPdLmhNu61evYVfJHX8mKCpoBAYgL41ff7tKyX1m5?= =?us-ascii?Q?4dUwUzVc8RHaG1JdfNBfJ5M9B83sMfqNsvBbO7PeCnPLT8JCqrPgsTfVEF1e?= =?us-ascii?Q?9cqkGB+qv+kFsLas1fcwzbDrDN4ZPA8WEp1rtCZ2nXEpd08ctwbhboV4Uz94?= =?us-ascii?Q?3vpT0ps2IQzjj6wsa9gObAwmpoCjeuz3Y9Efj+FSe/Whuyls/dA/C6ek1+2S?= =?us-ascii?Q?n134c4B9LxzUjhHq1Ui+oG7AevRGWxGYO4sLdEAvS8VyAS0csj4hQYPUA+Rr?= =?us-ascii?Q?WMbjlBSSC4MRttlYgRytNRiqRi0DIQeHsNDjs32mDM4BBXtMKangf8KG7LlR?= =?us-ascii?Q?DYPvrkkV6K46fOq1PCufaGxisI2zzZ+NhZLmwuhN5KL7S5bLk8pjKw6Z1zRI?= =?us-ascii?Q?aK4NA+6VUdsb66rOzTOVgk789rrJGI022qu6dvEmdtn/kzhoKDhexsWxCdME?= =?us-ascii?Q?YXyQHFOUDER0y953Ae1XyoYXZuP7dPa+zjvH7wG8VdhV+VkSLJ/bIO2YolSI?= =?us-ascii?Q?Fw2fZX4G6Tbc4Sa4X7i0H0tVonBAXXr8nCs+u+TLPvKnfqEVFpQsIcn2/mjM?= =?us-ascii?Q?MWg2AQeOjfDWMsw/rHGAAjhwQLi1Bx31KnVvnejIIQB81uijCSyoq+9sYmlI?= =?us-ascii?Q?q3MAnlj6kImeJJEVFfM3GzgoSI6aAYZ7OUYDroergF/RGNlgBNOTVKI5y+JG?= =?us-ascii?Q?Jb3XaUgLlnSFuvggpzx5yB4O5ZuczVEMBnj2CuRuKZaBcZ0jc1uYDcfUzj4A?= =?us-ascii?Q?HNrp+Cu9FnMq/4SVRKiIljzTpmTMZ+N+U5LS+n+1U4/5AtaPrLj3t+/rE+H0?= =?us-ascii?Q?AQa20KLQ4tilgrG4V2+42IksUtUch3q6hGMm?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(36860700013)(1800799024)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:38.0193 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d690abd3-dfa5-47ff-1d66-08dd9f7202ee X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000146.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB5998 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607074231116600 Content-Type: text/plain; charset="utf-8" This will be required later by x86 code in order to do early identification of boot modules when booting off a DTB. Not a functional change. Signed-off-by: Alejandro Vallejo Reviewed-by: Stefano Stabellini --- xen/common/device-tree/bootfdt.c | 16 ++++++++++++++++ xen/common/device-tree/bootinfo-fdt.c | 14 +------------- xen/include/xen/bootfdt.h | 7 +++++++ 3 files changed, 24 insertions(+), 13 deletions(-) diff --git a/xen/common/device-tree/bootfdt.c b/xen/common/device-tree/boot= fdt.c index 5decf17faf..2dda7a9d19 100644 --- a/xen/common/device-tree/bootfdt.c +++ b/xen/common/device-tree/bootfdt.c @@ -4,6 +4,22 @@ #include #include =20 +bootmodule_kind __init fdt_node_to_kind(const void *fdt, int node) +{ + if ( fdt_node_check_compatible(fdt, node, "xen,linux-zimage") =3D=3D 0= || + fdt_node_check_compatible(fdt, node, "multiboot,kernel") =3D=3D 0= ) + return BOOTMOD_KERNEL; + if ( fdt_node_check_compatible(fdt, node, "xen,linux-initrd") =3D=3D 0= || + fdt_node_check_compatible(fdt, node, "multiboot,ramdisk") =3D=3D = 0 ) + return BOOTMOD_RAMDISK; + if ( fdt_node_check_compatible(fdt, node, "xen,xsm-policy") =3D=3D 0 ) + return BOOTMOD_XSM; + if ( fdt_node_check_compatible(fdt, node, "multiboot,device-tree") =3D= =3D 0 ) + return BOOTMOD_GUEST_DTB; + + return BOOTMOD_UNKNOWN; +} + uint32_t __init device_tree_get_u32(const void *fdt, int node, const char *prop_name, uint32_t dflt) { diff --git a/xen/common/device-tree/bootinfo-fdt.c b/xen/common/device-tree= /bootinfo-fdt.c index 736f877616..dc399bbf61 100644 --- a/xen/common/device-tree/bootinfo-fdt.c +++ b/xen/common/device-tree/bootinfo-fdt.c @@ -239,19 +239,7 @@ static void __init process_multiboot_node(const void *= fdt, int node, =20 cell =3D (const __be32 *)prop->data; device_tree_get_reg(&cell, address_cells, size_cells, &start, &size); - - if ( fdt_node_check_compatible(fdt, node, "xen,linux-zimage") =3D=3D 0= || - fdt_node_check_compatible(fdt, node, "multiboot,kernel") =3D=3D 0= ) - kind =3D BOOTMOD_KERNEL; - else if ( fdt_node_check_compatible(fdt, node, "xen,linux-initrd") =3D= =3D 0 || - fdt_node_check_compatible(fdt, node, "multiboot,ramdisk") = =3D=3D 0 ) - kind =3D BOOTMOD_RAMDISK; - else if ( fdt_node_check_compatible(fdt, node, "xen,xsm-policy") =3D= =3D 0 ) - kind =3D BOOTMOD_XSM; - else if ( fdt_node_check_compatible(fdt, node, "multiboot,device-tree"= ) =3D=3D 0 ) - kind =3D BOOTMOD_GUEST_DTB; - else - kind =3D BOOTMOD_UNKNOWN; + kind =3D fdt_node_to_kind(fdt, node); =20 /** * Guess the kind of these first two unknowns respectively: diff --git a/xen/include/xen/bootfdt.h b/xen/include/xen/bootfdt.h index 766956e102..7bc6209986 100644 --- a/xen/include/xen/bootfdt.h +++ b/xen/include/xen/bootfdt.h @@ -102,4 +102,11 @@ uint32_t device_tree_get_u32(const void *fdt, int node, void device_tree_get_reg(const __be32 **cell, uint32_t address_cells, uint32_t size_cells, paddr_t *start, paddr_t *siz= e); =20 +/* + * Probe an FDT node thought to be a boot module to identify its kind. + * + * If correctly identified, returns the detected kind, otherwise BOOTMOD_U= NKNOWN + */ +bootmodule_kind fdt_node_to_kind(const void *fdt, int node); + #endif /* XEN_BOOTFDT_H */ --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607097; cv=pass; d=zohomail.com; s=zohoarc; b=B6/KtJF0h3xB3FRs16cIiBHCxzKWqFNntV8PzbJH5UcP9YjhiteYOkvsZMOpnFuYo+FclFLHvTaUYFvHyLrDL+NBP5TEmGYgSm3AmOGzpzN/MPdRNEaQMSmdPk6oYqt/nTPfGRZCF5Dmo0X78iXcbo0O/w56G0saXCHLDSnvfx0= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607097; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=brxUSyWoWAWqxgYUG8qaIMM7Yyx7/AEhfufohTwOIXw=; b=jUa+Z5ASX1+xlmUDcvRVmWwGCnpqVoJtPsadW8Vv9nCBnZH+r80BV1590w7z4jeB7biTVcSNJYDrPsnl4NQYwWCiQsYufM7y+2JPiYdXpIjIAkwGCuqLq63Cab9152pBBJqbUXVJVRPVXk6ERUfKhfT8urKAASfhfJV2lbGOIps= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748607097040898.1496681277184; Fri, 30 May 2025 05:11:37 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000816.1381036 (Exim 4.92) (envelope-from ) id 1uKya6-0007QZ-0Y; Fri, 30 May 2025 12:11:26 +0000 Received: by outflank-mailman (output) from mailman id 1000816.1381036; Fri, 30 May 2025 12:11:25 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKya5-0007QS-T5; Fri, 30 May 2025 12:11:25 +0000 Received: by outflank-mailman (input) for mailman id 1000816; Fri, 30 May 2025 12:11:24 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySh-0007de-Pa for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:47 +0000 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on20617.outbound.protection.outlook.com [2a01:111:f403:2009::617]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 22f8a985-3d4e-11f0-b894-0df219b8e170; Fri, 30 May 2025 14:03:46 +0200 (CEST) Received: from CH2PR15CA0002.namprd15.prod.outlook.com (2603:10b6:610:51::12) by DS7PR12MB5885.namprd12.prod.outlook.com (2603:10b6:8:78::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.21; Fri, 30 May 2025 12:03:39 +0000 Received: from CH2PEPF00000146.namprd02.prod.outlook.com (2603:10b6:610:51:cafe::93) by CH2PR15CA0002.outlook.office365.com (2603:10b6:610:51::12) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.19 via Frontend Transport; Fri, 30 May 2025 12:03:39 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000146.mail.protection.outlook.com (10.167.244.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:39 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:37 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 22f8a985-3d4e-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FApZYcNUFDbA8t5TTmmWAev4Z5M7nfjSK4QuSVIuvuG4V4aq9CF484LV6SH8tPTuaExtGKXgmu/1UcsdZMAUJsT49x2uKsclR6F0wPpUubzDMLPI6nrzy120N2pi8POam8tOlL3KoeSl5dYFxDgWvy2piaRUkmo1AFyuyFLtvsSxjC+DitH6Chmyq2MPHwqNhBKVDvIpzqnqFPx3ofD4IzoexHnebCnZeov5Jk1uq2GPuvcxl3IooBUIeK6tOSMsyTABFsIoC12oOJqqilyLHDO6EJnJmGbReQ+DEo3v2ITf7tGn43FUndO/ZbVoLm5+5OTOSlOCP98Gu4U3shcsiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=brxUSyWoWAWqxgYUG8qaIMM7Yyx7/AEhfufohTwOIXw=; b=whoI4/Yktv7McRxiKSJWf7JOBZrcYRZefilaG2gVRQI41iz/DfG493r+cB0T7a+NCgn5nRxmC6xw+tFp8qBoGj1obcwk5ljW0XCEirEc6TRyI1lkhdXITElhvbAF6S9DNQWxORbPWJjJ2HDhxW47NDkdEuvbFnCfeM2tWfQWnAAWiCp3fdC8iEBNg9SQldBYTuvu/6XdbH2fQv4ismcgWGmxh8lFcNv2q+RpvggceKTwo7KpJdf1dUUwpjodFTF1qvTHcQCV1gjTgzyYuDbMKSD3Py2ZQivVYoEsXUJ7IRhaTRvg3ZM3Sx429RFH/kIUIoNecix/ZkChsk/kYmGt+g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=brxUSyWoWAWqxgYUG8qaIMM7Yyx7/AEhfufohTwOIXw=; b=DzZzlL7zUnuVTqSHzmw4DRKEzovfI8CEc7TbmadFxSpWDgItOKBpfiT0F22VQAYYGLVzTBAJrS07Ik9CpuK7y+ZUAVwU1n66FUOV0QBytnFpNSIe80LZfCLx61Ob6BfD8NWWHm/j4wf8w5KYjhMwsr6j/kGjwY2WnhORL1339OQ= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Daniel P. Smith" Subject: [PATCH 17/19] xen/dt: ifdef out DEV_DT-related bits from device_tree.{c,h} Date: Fri, 30 May 2025 14:02:25 +0200 Message-ID: <20250530120242.39398-18-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000146:EE_|DS7PR12MB5885:EE_ X-MS-Office365-Filtering-Correlation-Id: 2118cca4-a710-451e-0921-08dd9f7203ed X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|376014|1800799024|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?sQVYap2R5s5FGKz4VYuN3+3p695tfy2wSxQ9jyCL/2G3YJQ0iWCdSMlC8UA5?= =?us-ascii?Q?4wI+bgKhcNZgiV3ZsqQ9hMdppi0FXoEetRY/8CvJJXze55ALraeNOibHn9wU?= =?us-ascii?Q?BLznXIdaMdYYjnQMbde9I3UC/WBFv5b9I2jXGksk0PTSKSZ+iWXf1nEy/0M8?= =?us-ascii?Q?YG4UlAWitYofLompjcX9POBEcI2gBETuwmHIerOWmx7XSZ3J6LxKNggdAz7H?= =?us-ascii?Q?2sGwNjkOncUbTXUN6T8QIyvyHoPV4HA+8H3nv0trA/MKTxOH3JnzTe8bY2iB?= =?us-ascii?Q?SXrXzMIu4X8de4Gx/0Te4QS3gAWQQu+RzMbIf3uQKbbqwHcW6jlDRfxElPZe?= =?us-ascii?Q?LApAPuJexW0RQRNZk776Ye1dtNBU98Yqln3Si6W2Yr7Oje/bDHnXiEXr+y1c?= =?us-ascii?Q?fPsafBqVRU6+nrMU/zOKezODI7jASA293435CRxKX0q/SlpoGjEF6TJ4zQ1b?= =?us-ascii?Q?I7/JR5N0YEB3rdojPT8YAu0eFonvW9OPo4vxHGT5AZmcU9IeT6QXWXNP+/rE?= =?us-ascii?Q?cFV3TSyBf0+HA+Bq7TK9HpKujjC3JrHTNgjArbOUCcnfhNLCbedWsK9sbv3h?= =?us-ascii?Q?FvHU23L1JNPFFQNLxG3w8kbi6tJULjXCW7F+vVqwXFelUR9Y4oVM+t8+upJW?= =?us-ascii?Q?WwL4eBJs88UAMbU6wO5acuu1s9VKtva5z+djbAap0jetIAECLWLRSXlxqNJs?= =?us-ascii?Q?QK52hwgQ6EZVTf+W94mMuWlofYMixj3BGF3HjtOBXu2WNPARxvoyBhxgM1XB?= =?us-ascii?Q?65t5GxtjkzqkPBrRZ6fEBKU4tSUMFWpPbyNaf1O3dRQUPLg3LQREg4z0/nsF?= =?us-ascii?Q?OvSkaS+5C84FaILBlI/bAoJVfYd9/mf/3GLyJ3aqIpAKnPqX1aTEEv4uNFUR?= =?us-ascii?Q?gggEJB0HTuAZBjP7nrB66nfSzrqJ1rJS26XA6TM+1KodJdknmd4cLp+LwpHf?= =?us-ascii?Q?G6VO4wJ5xf+hgOwxik56V7lzM1k0iW+AUFX1rqolTvYSXoPvWnKFCI4a1wuK?= =?us-ascii?Q?g+4++okKfucZxDjZT51rpnQpJEnOVGNM4QNYGUBFCYDm+Kdae/dsh5WFV5nx?= =?us-ascii?Q?KYqPLr11sNXtMZ1EwbDNjSKRgPyXLxOipIthxwSncYvx94+1OFrUN9I8gkLO?= =?us-ascii?Q?Rdih1Q2IVsKW6XGhvHitir63gWQ5hQvor41REb8rMF5oGJiu9ugyjhqd8Fck?= =?us-ascii?Q?zHPc8daXr60eacGmyDwhXN0vSNlGmMYilUDWTO9z6Apq+fyrxStlP50PEPnr?= =?us-ascii?Q?Pm6e9LN7hSw1XbdN8p9kXPWFPSD7YAtcvMKaI9KbwvpPPZAJJQkKP79N0TvV?= =?us-ascii?Q?VXkguQSlxfGPgRkLGqvnbcFbUOqyCFxLsgSXZJ+WIJfeEGD0HztVztWm92vc?= =?us-ascii?Q?6K9yZSBmlyqxiZcqh2hfddhc2V/bDVw6A24V1Z91wU2AnJWAwqF/BlU1Wdlr?= =?us-ascii?Q?AeU1FHgMntMUdnfUKQEk/jKAUqbJQWOXRfAE5zbUyDG7u/hSxXdnP0fJsrVK?= =?us-ascii?Q?xpfOj0N2pmYGBAQqrj6efpn+/70czmTk4sHm?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(376014)(1800799024)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:39.6891 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2118cca4-a710-451e-0921-08dd9f7203ed X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000146.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR12MB5885 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607098631116600 Content-Type: text/plain; charset="utf-8" ... which means, device-tree.c stops requiring strictly CONFIG_HAS_DEVICE_T= REE and may function without it. Not a functional change on architectures that currently use these files, as they already select CONFIG_HAS_DEVICE_TREE. Signed-off-by: Alejandro Vallejo --- xen/common/device-tree/device-tree.c | 2 ++ xen/include/xen/device_tree.h | 4 ++++ 2 files changed, 6 insertions(+) diff --git a/xen/common/device-tree/device-tree.c b/xen/common/device-tree/= device-tree.c index 886e6c7712..c8a9c0e46a 100644 --- a/xen/common/device-tree/device-tree.c +++ b/xen/common/device-tree/device-tree.c @@ -2028,9 +2028,11 @@ static unsigned long unflatten_dt_node(const void *f= dt, ((char *)pp->value)[sz - 1] =3D 0; dt_dprintk("fixed up name for %s -> %s\n", pathp, (char *)pp->value); +#ifdef CONFIG_HAS_DEVICE_TREE /* Generic device initialization */ np->dev.type =3D DEV_DT; np->dev.of_node =3D np; +#endif /* CONFIG_HAS_DEVICE_TREE */ } } if ( allnextpp ) diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h index 7d1c8bc305..641f24518d 100644 --- a/xen/include/xen/device_tree.h +++ b/xen/include/xen/device_tree.h @@ -109,9 +109,12 @@ struct dt_device_node { */ struct list_head domain_list; =20 +#ifdef CONFIG_HAS_DEVICE_TREE struct device dev; +#endif /* CONFIG_HAS_DEVICE_TREE */ }; =20 +#ifdef CONFIG_HAS_DEVICE_TREE #define dt_to_dev(dt_node) (&(dt_node)->dev) =20 static inline struct dt_device_node *dev_to_dt(struct device *dev) @@ -120,6 +123,7 @@ static inline struct dt_device_node *dev_to_dt(struct d= evice *dev) =20 return container_of(dev, struct dt_device_node, dev); } +#endif /* CONFIG_HAS_DEVICE_TREE */ =20 #define MAX_PHANDLE_ARGS 16 struct dt_phandle_args { --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748607070; cv=pass; d=zohomail.com; s=zohoarc; b=d4rRzhPjjHnaiez6265eS+/ustdReNtjhjI8+z437HNk8o04ODMvappi0KAtev0J8jcqW/ebVTqTGGUlB+6PychgQwJbXgszaoUurj6ykj3dASrbjgTqwmnNCqKl5FmFo3gANtp1FqqDF5dX1OiOy+1msBYYJezqxwfxCcb5YLo= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748607070; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=OqZEAX0EcN1gu3oWhJz9QmC1AjJaiddoYvKcz3dxWGQ=; b=F2JjalY1CIDRhfBH/pP2jFFb6X62qauAxun3bH9NBA4IaiUrbb/xT55Nco2R3w6/QTiyhMxgwq6azvlU+apb1eSl/Nwl2kuiPqq1Y+Jk89nHqxl8cNeTXZsPVyLIEskKR0MtaSTTnkm+Dc7sB1PtkoiUuHIKY0d+iXXmPOMXFyA= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748607070116800.073192810223; Fri, 30 May 2025 05:11:10 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000782.1380995 (Exim 4.92) (envelope-from ) id 1uKyZY-0005ZU-0B; Fri, 30 May 2025 12:10:52 +0000 Received: by outflank-mailman (output) from mailman id 1000782.1380995; Fri, 30 May 2025 12:10:51 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyZX-0005ZK-TZ; Fri, 30 May 2025 12:10:51 +0000 Received: by outflank-mailman (input) for mailman id 1000782; Fri, 30 May 2025 12:10:51 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKySl-00076q-48 for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:03:51 +0000 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on20614.outbound.protection.outlook.com [2a01:111:f403:2414::614]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 255693a8-3d4e-11f0-a2ff-13f23c93f187; Fri, 30 May 2025 14:03:49 +0200 (CEST) Received: from MW4P222CA0005.NAMP222.PROD.OUTLOOK.COM (2603:10b6:303:114::10) by CH2PR12MB4277.namprd12.prod.outlook.com (2603:10b6:610:ae::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.25; Fri, 30 May 2025 12:03:44 +0000 Received: from CH2PEPF00000143.namprd02.prod.outlook.com (2603:10b6:303:114:cafe::31) by MW4P222CA0005.outlook.office365.com (2603:10b6:303:114::10) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.23 via Frontend Transport; Fri, 30 May 2025 12:03:43 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CH2PEPF00000143.mail.protection.outlook.com (10.167.244.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:03:43 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:03:39 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 255693a8-3d4e-11f0-a2ff-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wP36aolhyGmqpJ4YuWFaqMUawDqSHTbmmlyVoB6H5kIGHTLzkH8plhbPeEkuyKvNFP+u+Kv1SK79VLyoah6OGGUttmBA1vysbCs/maEMOMtNXPbJN7MaFTjwTP9dc+ugrQB2grwXFT7or56G5p8xrB7e+33AKhkQ7ohmNocl28Xus8G1weYfZhXGnErZg0pOTAt5xoxHU4vFUXqt0Fj/Y/9nRjusL/nTQJ+IjW4a1XRoH9qWou4zm5mPsirGfN5akxgCE2ROFqVTYB0IxVmWr4/MINZ3oW3PI88lP+s0M9Lbr8pocKl7lWrH2YVdCBFMw/zCylbD/D6wPkXvf/jD5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OqZEAX0EcN1gu3oWhJz9QmC1AjJaiddoYvKcz3dxWGQ=; b=opbZwWBHmXUmJATIxaxTfQy6BdviHTRgAkloYD+tiX37Z7b9ZGr0ZeSTmUw4+LRb9BGm5GOCGInN6wdC4vvULrwRhGmKKxvaVcstgInPYWSgV+VBw1F89ZxT9O31ofxlXOVKvsrPj+/mZ+Bm4f+GKYup2+UJ7C31R439gNkVR+nLR7V5dEpKsZgdigphaqZ4rccxgsd5G6msVlaFVIN5ZUR1cimPnt7fNa3EG6k+KCmc1M4Jj+5lLHzl4C0zGHS+cz2WTKUs4lFkAUFh3xvOYmD/b4SDuOKqoFGq9X+NVdUL8f8Ba7MKt0Mt+f5f2nm2aQDCL+4LiTlbb83L9hCmPA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OqZEAX0EcN1gu3oWhJz9QmC1AjJaiddoYvKcz3dxWGQ=; b=Gfse2k53SRuzeV2cRsJfaYgj6lF0NzhdIM98D+JpoAUHd+pSFrlsvJKMVMQ7LImx/zFvWnTMO9XTHI4tk4UQrpO/yep1lN85sZn9wTEciBMi+b5QRGscSLLYdlxrM3Efb01Bl+dhxFXPFOhT/3jqpVUOWR7lQxmd/AIzt+6xibE= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , "Julien Grall" , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini , "Bertrand Marquis" , "Daniel P. Smith" Subject: [PATCH 18/19] xen/dt: Allow CONFIG_DOM0LESS_BOOT to include device-tree/ Date: Fri, 30 May 2025 14:02:26 +0200 Message-ID: <20250530120242.39398-19-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000143:EE_|CH2PR12MB4277:EE_ X-MS-Office365-Filtering-Correlation-Id: f504fd1b-27da-498c-f6e9-08dd9f720606 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?Vuoeizq3qIVm6h0+s2fVwC7CZ7hrvIbZMQEIBU8OfKMKQyQ8DyN8WGFYRGMV?= =?us-ascii?Q?haCeZ+feA/zCinmELFoXKtY763ghJPjYIZJjGruQpNrAhpLoHYN4TRHRtHnD?= =?us-ascii?Q?6rl++SnFkyTedeYyyrC85+pR40pdjeO/XfxK42u9UoR0JmWJvfHtA+mRX9jm?= =?us-ascii?Q?GmP0tMeUIhyv4D3VPOJU7rkzV+cAe8JMwHxtl52CA1IY7UQwAIzG/ndbetjk?= =?us-ascii?Q?8+JuOn/PCMoEBM3utEG9oRCubek4U+Woj7aCYRYScUTWX0IKGGGUKEChy2LY?= =?us-ascii?Q?8GfaYE2VgGhiTQL27PjvdTRui/hxXUI+3lKKdO6OyVeyrdScP1FkbXh33N6B?= =?us-ascii?Q?RXTHfV/jNjHMJm8EOSpfl+tUUxoPrGXOZXGF8CBcPJ3rNbN9AtPwBsBCyFmq?= =?us-ascii?Q?0zsIrljQ1H0qRQvS9OaoPLFJpUxS4rh8t29HozaFpfwdEMXlTE3XjRGv6SJa?= =?us-ascii?Q?Ci6LqqWifI0zJzA1GPwPwTVEDhyhyB41xKtTQZGold9TxaELRPWXgxYUw2ua?= =?us-ascii?Q?CRr0B+hvZoH+3pfIEdl0X2FygzJEkt2ZKRB/eoEIYUilM7c1gJoM9EGFUs74?= =?us-ascii?Q?oWyIFBmfyYk/2PpQpQP+eFzElKifdPM+EEgXMuP85NUyAWY0kUcc0p8D2wu3?= =?us-ascii?Q?GC8+YZAIkwtT1eEv57efsD83tcgxfvaR56rrymF5VkipcHQqjJMGkamvg339?= =?us-ascii?Q?UeC45jXr2nd+bjYH9ZBUKus4FoTO90uQzZABe5WBVSXpEbZQ1qoJPi0+MiY5?= =?us-ascii?Q?aJ2i+H1/q2UJi8OtOugKjNqgqg0VZP6td/k2piHCL9N1iMP98b/KKIIpOMQp?= =?us-ascii?Q?13BWj+Su/NgU7pM3lL3IVOTcV1AHcwxDx7lSkZC1sfXCeOz5bLMNaOKDcPjs?= =?us-ascii?Q?cl87EIb0tiwJbV2ovnlkc3DxNYAyCeqtIAmtcBtuUtpvjN8Wfz4MrB62dxDI?= =?us-ascii?Q?tejne+sAm0hf4O7gGNERDZdaWW4v2Q1m+aAg4jpmmEuDozgM23XWIbQ234Uq?= =?us-ascii?Q?DOrYdqzkeBPdRAbf71uZJKGVzr5b4DXeRbhOsq41TzMhP4C6LhaxF6I13+V8?= =?us-ascii?Q?W1m2HJNqfRt9sluMODj9QI7u2ZiPwXE1T13f7Q72l5HBKaGfZhxOrnTj7LxY?= =?us-ascii?Q?2C0LPFnRBuYbp559DVPO8GN0YhxD0vK7QeHrJ8HqxQMiT75jDGEKkvG854Mb?= =?us-ascii?Q?FMvXZU3dDqFgLpkE/gs8vgyEYT4nOOOKTG7yC7JNUQWTaF+G8ACj7Q3EW5HT?= =?us-ascii?Q?nh5n3RVF5YQn4RhN7THwPixBeODWv1HK28JJ8becumWhj4xhWZr+M1ZInhJ9?= =?us-ascii?Q?3Dx/pkJ/ZTjfOyJyGSiE4zZn/BAX0uS2tRKq1WygJqTKzRWmZvNN2mIMx6rV?= =?us-ascii?Q?bWHrSFqTNuc/5VSTVg3o/enRLbmtuPhPZkZ4RgWvNZidXuE/MX5rhQEylat6?= =?us-ascii?Q?gIzjQ1NqkRFPczVSOLzPnOeV2cpMeweqbXHpsgX1lcYg10VSbOFaVckjjUx7?= =?us-ascii?Q?MksQvFyPefLey8hVnsdu5cq3SamvXPn+IzW5?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(376014)(36860700013)(1800799024);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:03:43.2146 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f504fd1b-27da-498c-f6e9-08dd9f720606 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000143.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR12MB4277 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748607072388116600 Content-Type: text/plain; charset="utf-8" ... without CONFIG_HAS_DEVICE_TREE Signed-off-by: Alejandro Vallejo --- xen/common/Kconfig | 1 + xen/common/Makefile | 2 +- xen/common/device-tree/Makefile | 8 ++++---- 3 files changed, 6 insertions(+), 5 deletions(-) diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 0951d4c2f2..353ccbd06f 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -14,6 +14,7 @@ config CORE_PARKING =20 config DOM0LESS_BOOT bool "Dom0less boot support" if EXPERT + select LIBFDT depends on HAS_DOM0LESS && HAS_DEVICE_TREE && DOMAIN_BUILD_HELPERS default y help diff --git a/xen/common/Makefile b/xen/common/Makefile index 98f0873056..2717c81f9c 100644 --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -8,7 +8,7 @@ obj-y +=3D cpu.o obj-$(CONFIG_DEBUG_TRACE) +=3D debugtrace.o obj-$(CONFIG_HAS_DEVICE_TREE) +=3D device.o obj-$(filter-out $(CONFIG_X86),$(CONFIG_ACPI)) +=3D device.o -obj-$(CONFIG_HAS_DEVICE_TREE) +=3D device-tree/ +obj-$(firstword $(CONFIG_HAS_DEVICE_TREE) $(CONFIG_DOM0LESS_BOOT)) +=3D de= vice-tree/ obj-$(CONFIG_IOREQ_SERVER) +=3D dm.o obj-y +=3D domain.o obj-y +=3D event_2l.o diff --git a/xen/common/device-tree/Makefile b/xen/common/device-tree/Makef= ile index 922c5bba9b..4c09e3fb2d 100644 --- a/xen/common/device-tree/Makefile +++ b/xen/common/device-tree/Makefile @@ -1,10 +1,10 @@ obj-y +=3D bootfdt.init.o -obj-y +=3D bootinfo-fdt.init.o -obj-y +=3D bootinfo.init.o -obj-y +=3D device-tree.o +obj-$(CONFIG_HAS_DEVICE_TREE) +=3D bootinfo-fdt.init.o +obj-$(CONFIG_HAS_DEVICE_TREE) +=3D bootinfo.init.o +obj-$(CONFIG_HAS_DEVICE_TREE) +=3D device-tree.o obj-$(CONFIG_DOMAIN_BUILD_HELPERS) +=3D domain-build.init.o obj-$(CONFIG_DOM0LESS_BOOT) +=3D dom0less-build.init.o obj-$(CONFIG_OVERLAY_DTB) +=3D dt-overlay.o -obj-y +=3D intc.o +obj-$(CONFIG_HAS_DEVICE_TREE) +=3D intc.o obj-$(CONFIG_DOMAIN_BUILD_HELPERS) +=3D kernel.o obj-$(CONFIG_STATIC_EVTCHN) +=3D static-evtchn.init.o --=20 2.43.0 From nobody Mon Feb 9 09:25:28 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1748606785; cv=pass; d=zohomail.com; s=zohoarc; b=Qph7zQ1Pcoz3nP2ju8sjsxzJzfOMtvpdVND6m4fcxKn68ugllkvci5Kj4YOI/FVJH2VkRvGCJJaniAoGXF2C1AEmqm08f0WOreSX5pK085znWpOm0mxo4URSyJadv/mYXYzwtQixPO7i9dZKpXvNMXL24J2NRei4O7DWStCRQJI= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748606785; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Ocg88oX1BblcuPZqowSJkdIZmVKEQ9DR4WNp1Wf0MfQ=; b=EfqWTM8IPsdip3LARGlJUOwJJq/JAGVVJqtWiLtIIAyeTfSBQpGwy6D7/UsyKIyBHkU2NsoXEF/N6iP/gHdZeFye4EhXR3upDfACVd4wlNvirE8YZGJ7xbWaNSClToUIcAmIm1mT2n/1L1ipJOpNMG+y97vRf6nk0Y/wOJEqQ6M= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 174860678590876.52852167816013; Fri, 30 May 2025 05:06:25 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1000741.1380985 (Exim 4.92) (envelope-from ) id 1uKyV4-0003pA-Am; Fri, 30 May 2025 12:06:14 +0000 Received: by outflank-mailman (output) from mailman id 1000741.1380985; Fri, 30 May 2025 12:06:14 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyV4-0003p3-83; Fri, 30 May 2025 12:06:14 +0000 Received: by outflank-mailman (input) for mailman id 1000741; Fri, 30 May 2025 12:06:12 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uKyV2-0003ov-OA for xen-devel@lists.xenproject.org; Fri, 30 May 2025 12:06:12 +0000 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on20628.outbound.protection.outlook.com [2a01:111:f403:2412::628]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 78d311b6-3d4e-11f0-b894-0df219b8e170; Fri, 30 May 2025 14:06:10 +0200 (CEST) Received: from SJ0PR03CA0185.namprd03.prod.outlook.com (2603:10b6:a03:2ef::10) by IA0PR12MB7773.namprd12.prod.outlook.com (2603:10b6:208:431::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8769.22; Fri, 30 May 2025 12:06:07 +0000 Received: from CO1PEPF000042A9.namprd03.prod.outlook.com (2603:10b6:a03:2ef:cafe::d8) by SJ0PR03CA0185.outlook.office365.com (2603:10b6:a03:2ef::10) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:06:06 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by CO1PEPF000042A9.mail.protection.outlook.com (10.167.243.38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8769.18 via Frontend Transport; Fri, 30 May 2025 12:06:05 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 30 May 2025 07:06:02 -0500 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 78d311b6-3d4e-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Rn8c/C33E3HQyMYIFe6Ed2YxxvIW4lmgwcx+tw/jN1u1CGtv7V8GumDAV2WAng6HMheL2exr4kSLFsj71vcVT43JQpgMgXTHOm0prLnnYnD8ofv8eHBZyC1MWMAfjUlbi5XY4bAbYnttHVZqp2WGBczH5DbFKRsqt6Hpzr+CgODCx2/hQhT7apTcyBUJ7Zbjt1KxNxZueTG0DI5dEW0/TxDy33ximUqQE7idlnu/L42N7M3WdX0ujA3+rJ6FSc80PGVlU6qcbt0d/sdz9IcE3HVOHB7NageYEv6qkeQpLRXGlypnd/Yczltggvp/NAEQj6mkz2x6h1f+9Zvl0o1vbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ocg88oX1BblcuPZqowSJkdIZmVKEQ9DR4WNp1Wf0MfQ=; b=UZLyjksUsCr7CLVKBk36Yt5G4zDnB6+9qmYNZ5GvUAPTIVAcLZhQOc8lDOGbBkNEsg8CW9/0vYEigXISYBjzLSlEqmtxi0cGFXRdASqgQRdRGnM8knR60tTai4F7Mt6eojzeOz5UoXHStXo16NBjo4D5QRrSyf3HNlNAdnXCVBkRwUOBllobwTiuVDn/nLDkwP9rcA+K+k6CRmhNtGaSJMLPlHSnaiFGyw731SupRjKpYUij5nimVXfxgYQQ8559gktyr3+KbOlE2QLlnC9STLM3DynffgRTAnflIZIZ+gaRvOY3SphEQjVDX0DlzW6U935KT0Gy0THV7K4/b6En+w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ocg88oX1BblcuPZqowSJkdIZmVKEQ9DR4WNp1Wf0MfQ=; b=Vozr5vmN4ZeueeJIXeBKTCCECjmNMSwYA6PPWgN80MrbgNM2tEuE8a6rJ6GufTh0RGeq6ZuNmbsNF82SvTJ6xtX6osz6VkLN3VYljm304KTyaULYlb0OdjwnpR4Dk8tZRG+ka6BJi4qdth3z3lROUU7C9p0q0XzmNf3ktNHRFLc= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Anthony PERARD , Michal Orzel , "Julien Grall" , Stefano Stabellini , "Bertrand Marquis" , "Daniel P. Smith" Subject: [PATCH 19/19] kconfig: Allow x86 to pick CONFIG_DOM0LESS_BOOT Date: Fri, 30 May 2025 14:05:25 +0200 Message-ID: <20250530120548.39550-1-agarciav@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250530120242.39398-1-agarciav@amd.com> References: <20250530120242.39398-1-agarciav@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1PEPF000042A9:EE_|IA0PR12MB7773:EE_ X-MS-Office365-Filtering-Correlation-Id: 1c03a2cc-6085-464c-2c76-08dd9f725acc X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|82310400026|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?piimtZczPktlCGfXmQW52dwvGy0ZtGx4sj1qHbgkKMAPep0qq6DEjm2v2Tbm?= =?us-ascii?Q?YzLogKsuhHEhdaK0N4fvQfGPifsMjFkwmpKSr0wvCmICHAA+Ygy51ZIBGBIf?= =?us-ascii?Q?n6Q0E9kRCEp3KIvMRq4IuriA2+F48NrafgWUJzgZwyJl0Ly/eX4llkTMKBYr?= =?us-ascii?Q?AV7DRXmQHIAUKbrykC891opQnBvdGdMVeoLU3tvc9pknTvQJNSov0E1Q6Xzw?= =?us-ascii?Q?BmdhpcZBiJGOVDgh3/MQuphummMLXwjoFoHQXMyHlovAlwpSxRjjO7tM83l+?= =?us-ascii?Q?kZoNKvoRGWDPWUZ5vMnsI+MAadRWCM8X7HkB3u4urFF4TgDHkoocePPozIr/?= =?us-ascii?Q?weUMmy3dYsVdWziMMQIG0w5wS2inTGpmPTXsfusPVh2gQ1wUN/cUQVeOyKNG?= =?us-ascii?Q?NqKhuwbZtFtKBDzLe/Fg5HXs1y6oS7FAYHfZQYT7MAgNCpZWNa90VapJf+Kp?= =?us-ascii?Q?KYapQRhbFwz0KESudjaVH6WB4eGVIFqadNStyiHqxHjMdbUPksbgtzEV3aas?= =?us-ascii?Q?XvEH1GwYQ/kotezL9juFpu8O/GKiVPCk4o4B1i6I2muxenbi02AfF+3uj5Tk?= =?us-ascii?Q?xjr0eBox7Sjy1lamXHe9YL6oj1XTQdmyh7eEbIym5IApZQcdeYjnyOLg3nFk?= =?us-ascii?Q?tw0VnXpcfH2Z+U5Had+w05jIL/gjPUrceMr+eqAy9jeXoYKCnXJxKmRjgARd?= =?us-ascii?Q?/KdN2VxEm7ZffjGVeeAN7Ec1sUow8KW92DirAEdP5nhjAjeDBAwnGnKUarbp?= =?us-ascii?Q?AztaJukiVs0QLp0/Gi96EPl/dWsnXLlIrsOTMKJta8c3/FlAiQiLNYxPmj3n?= =?us-ascii?Q?1QkXw2DQRtZRkw45sxjGYDS3pcrSeKxSa6JXopSzjkRXju0n853GT4Jt/0//?= =?us-ascii?Q?k96R3o/1r3jn+MtsU+EkyLEQcP2UkSMzwsV/OiJGb5DQ6FIaXnYf78v7facK?= =?us-ascii?Q?u6lxtnZ3UvlvOl0npVrb2rIXYb8ZOYPVWeae1hkH5mf4A1cAuBWcY21U6GOl?= =?us-ascii?Q?1MJxNQeqQZ4IINd1joLWq3eP7iX/Kl0PlKjZILpVxhRcQ1Qaoinx9d9klBKo?= =?us-ascii?Q?85ac43Zi1GWeN6UtwGx1qMc/CCtmnRFyJlVLtpMcQ8b64oUdDWIaRi/a2qEl?= =?us-ascii?Q?iPUU33fozMM5FzT+hxb7JGaynGHy3iC5hY17/2DP0XKMoNphOv2RtTewnJ3x?= =?us-ascii?Q?RZlQlEvw8wBtz63TJE7C1/gTKBz021cfCOzmS1KcjTE4cAjYaLLaisiVStBF?= =?us-ascii?Q?V4D97wr2VoK6J7sfGhJQqIZcFfEVZ0jSiIEvyb6ZHmUzNqChctlhAvEYagqH?= =?us-ascii?Q?nozfNZv310xx3JBQgpcBQNILXhMyUoERvvX5vOIu2KirnvXR6cTqif4HOvnS?= =?us-ascii?Q?tBgTTxzFqDh/bN3Em4b32/BACo+TRVjyYrC4dt0fNCBleTZn3YSOCKqzj1y6?= =?us-ascii?Q?1SMkkVAUfX7+hSenRn5lOOlmoNzB9koWhiW4tsDyg2WifKSxfnWblIAIZhVQ?= =?us-ascii?Q?NJkT3EUAiV5FTefd97ktFd1Bgqi56TTaVIyd?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(82310400026)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 May 2025 12:06:05.3438 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1c03a2cc-6085-464c-2c76-08dd9f725acc X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CO1PEPF000042A9.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR12MB7773 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1748606787040116600 Content-Type: text/plain; charset="utf-8" Without picking CONFIG_HAS_DEVICE_TREE. In order to do that. Allow CONFIG_DOM0LESS_BOOT to take include a subset of the common/device-tree/ directory. x86 doesn't want dom0less-build.c, as that's tightly integrated still to the ARM way of building domains. Requires "unsupported" for the time being until all required patches make it through. Only intended as a functional change for x86. Signed-off-by: Alejandro Vallejo --- I'm compiling out dom0less-build.c because it relies heavily on bootinfo. Initially x86 will keep its private builder even for multidomain boots. And will do so until boot_info and bootinfo are properly unified. --- xen/arch/x86/Kconfig | 1 + xen/common/Kconfig | 8 +++++--- xen/common/device-tree/Makefile | 2 +- 3 files changed, 7 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig index 7afe879710..4344b4289c 100644 --- a/xen/arch/x86/Kconfig +++ b/xen/arch/x86/Kconfig @@ -18,6 +18,7 @@ config X86 select HAS_COMPAT select HAS_CPUFREQ select HAS_DIT + select HAS_DOM0LESS select HAS_EHCI select HAS_EX_TABLE select HAS_FAST_MULTIPLY diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 353ccbd06f..6e66657550 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -13,15 +13,17 @@ config CORE_PARKING depends on NR_CPUS > 1 =20 config DOM0LESS_BOOT - bool "Dom0less boot support" if EXPERT + bool "Dom0less boot support" if EXPERT && (!X86 || UNSUPPORTED) select LIBFDT - depends on HAS_DOM0LESS && HAS_DEVICE_TREE && DOMAIN_BUILD_HELPERS - default y + depends on HAS_DOM0LESS && (X86 || (HAS_DEVICE_TREE && DOMAIN_BUILD_HELPE= RS)) + default y if !X86 help Dom0less boot support enables Xen to create and start domU guests during Xen boot without the need of a control domain (Dom0), which could be present anyway. =20 + If unsure on x86, say N. + config DOMAIN_BUILD_HELPERS bool =20 diff --git a/xen/common/device-tree/Makefile b/xen/common/device-tree/Makef= ile index 4c09e3fb2d..49d061733e 100644 --- a/xen/common/device-tree/Makefile +++ b/xen/common/device-tree/Makefile @@ -3,7 +3,7 @@ obj-$(CONFIG_HAS_DEVICE_TREE) +=3D bootinfo-fdt.init.o obj-$(CONFIG_HAS_DEVICE_TREE) +=3D bootinfo.init.o obj-$(CONFIG_HAS_DEVICE_TREE) +=3D device-tree.o obj-$(CONFIG_DOMAIN_BUILD_HELPERS) +=3D domain-build.init.o -obj-$(CONFIG_DOM0LESS_BOOT) +=3D dom0less-build.init.o +obj-$(filter-out $(CONFIG_X86),$(CONFIG_DOM0LESS_BOOT)) +=3D dom0less-buil= d.init.o obj-$(CONFIG_OVERLAY_DTB) +=3D dt-overlay.o obj-$(CONFIG_HAS_DEVICE_TREE) +=3D intc.o obj-$(CONFIG_DOMAIN_BUILD_HELPERS) +=3D kernel.o --=20 2.43.0