All of lore.kernel.org
 help / color / mirror / Atom feed
From: Julien Grall <julien.grall@linaro.org>
To: Ian Campbell <ian.campbell@citrix.com>, xen-devel@lists.xen.org
Cc: ian.jackson@eu.citrix.com, tim@xen.org, stefano.stabellini@eu.citrix.com
Subject: Re: [PATCH v3 08/14] xen: arm: define guest virtual platform in API headers
Date: Thu, 07 Nov 2013 23:29:14 -0800	[thread overview]
Message-ID: <527C92CA.6050408@linaro.org> (raw)
In-Reply-To: <1383842696-8598-8-git-send-email-ian.campbell@citrix.com>



On 11/07/2013 08:44 AM, Ian Campbell wrote:
> The tools and the hypervisor need to agree on various aspects of the guest
> environment, such as interrupt numbers, memory layout, initial register values
> for registers which are implementation defined etc. Therefore move the
> associated defines into the public interface headers, or create them as
> necessary. However these should not be exposed to guests, they should find
> these things out via device tree or should not be relying on implementation
> defined defaults.
>
> Various bits of the hypervisor needed to change to configure dom0 with the real
> platform values while using the virtual platform configuration for guests.
> Arrange for this where appropriate and plumb through as needed.
>
> We also need to expose some 64-bit values (e.g. PSR_GUEST64_INIT) for the
> benefit of 32 bit toolstacks building 64 bit guests.
>
> Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
> ---
>   tools/libxc/xc_dom_arm.c        |    4 +--
>   xen/arch/arm/domain.c           |    8 ++++--
>   xen/arch/arm/domain_build.c     |   13 +++++----
>   xen/arch/arm/gic.c              |   21 +++++++++-----
>   xen/arch/arm/psci.c             |    2 +-
>   xen/arch/arm/traps.c            |    2 +-
>   xen/arch/arm/vtimer.c           |   13 ++++++---
>   xen/include/asm-arm/domain.h    |    1 +
>   xen/include/asm-arm/event.h     |    3 +-
>   xen/include/asm-arm/gic.h       |    3 --
>   xen/include/asm-arm/processor.h |    7 -----
>   xen/include/asm-arm/psci.h      |    5 ----
>   xen/include/public/arch-arm.h   |   60 +++++++++++++++++++++++++++++++--------
>   13 files changed, 91 insertions(+), 51 deletions(-)
>

[..]

>   /* HCR Hyp Configuration Register */
>   #define HCR_RW          (1<<31) /* Register Width, ARM64 only */
>   #define HCR_TGE         (1<<27) /* Trap General Exceptions */
> diff --git a/xen/include/asm-arm/psci.h b/xen/include/asm-arm/psci.h
> index fdba636..67d4c35 100644
> --- a/xen/include/asm-arm/psci.h
> +++ b/xen/include/asm-arm/psci.h
> @@ -6,11 +6,6 @@
>   #define PSCI_EINVAL  -2
>   #define PSCI_DENIED  -3
>
> -#define __PSCI_cpu_suspend 0
> -#define __PSCI_cpu_off     1
> -#define __PSCI_cpu_on      2
> -#define __PSCI_migrate     3
> -
>   int do_psci_cpu_on(uint32_t vcpuid, register_t entry_point);
>   int do_psci_cpu_off(uint32_t power_state);
>   int do_psci_cpu_suspend(uint32_t power_state, register_t entry_point);
> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
> index 5d359af..70a0766 100644
> --- a/xen/include/public/arch-arm.h
> +++ b/xen/include/public/arch-arm.h
> @@ -268,8 +268,21 @@ typedef uint64_t xen_callback_t;
>
>   #endif
>
> +#if defined(__XEN__) || defined(__XEN_TOOLS__)
> +
>   /* PSR bits (CPSR, SPSR)*/
>
> +#define PSR_THUMB       (1<<5)        /* Thumb Mode enable */
> +#define PSR_FIQ_MASK    (1<<6)        /* Fast Interrupt mask */
> +#define PSR_IRQ_MASK    (1<<7)        /* Interrupt mask */
> +#define PSR_ABT_MASK    (1<<8)        /* Asynchronous Abort mask */
> +#define PSR_BIG_ENDIAN  (1<<9)        /* Big Endian Mode */
> +#ifdef __aarch64__ /* For Aarch64 bit 9 is repurposed. */

If you keep __aarch64__, you won't be able to have dom0 in 32 bits on arm64.
BTW, what does prevent the developer to use arm64 defines on arm64?

> +#define PSR_DBG_MASK    (1<<9)
> +#endif
> +#define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
> +#define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
> +
>   /* 32 bit modes */
>   #define PSR_MODE_USR 0x10
>   #define PSR_MODE_FIQ 0x11
> @@ -281,8 +294,6 @@ typedef uint64_t xen_callback_t;
>   #define PSR_MODE_UND 0x1b
>   #define PSR_MODE_SYS 0x1f
>
> -/* 64 bit modes */

I would keep this commit. It's good to know that it's ARM64 specific.

> -#ifdef __aarch64__
>   #define PSR_MODE_BIT  0x10 /* Set iff AArch32 */
>   #define PSR_MODE_EL3h 0x0d
>   #define PSR_MODE_EL3t 0x0c
> @@ -291,18 +302,43 @@ typedef uint64_t xen_callback_t;
>   #define PSR_MODE_EL1h 0x05
>   #define PSR_MODE_EL1t 0x04
>   #define PSR_MODE_EL0t 0x00
> -#endif
>
> -#define PSR_THUMB       (1<<5)        /* Thumb Mode enable */
> -#define PSR_FIQ_MASK    (1<<6)        /* Fast Interrupt mask */
> -#define PSR_IRQ_MASK    (1<<7)        /* Interrupt mask */
> -#define PSR_ABT_MASK    (1<<8)        /* Asynchronous Abort mask */
> -#define PSR_BIG_ENDIAN  (1<<9)        /* Big Endian Mode */
> -#ifdef __aarch64__ /* For Aarch64 bit 9 is repurposed. */
> -#define PSR_DBG_MASK    (1<<9)
> +#define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_EL1h)
> +
> +#define SCTLR_GUEST_INIT    0x00c50078
> +
> +/*
> + * Virtual machine platform (memory layout, interrupts)
> + *
> + * These are defined for consistency between the tools and the
> + * hypervisor. Guests must not rely on these hardcoded values but
> + * should instead use the FDT.
> + */
> +

I don't like the solution to hardcode GIC, IRQs (timer + evtchn) in the 
public interface. If we keep this solution, we will need to modify, 
again, the ABI for ARM, why can't we add/extend some hypercalls to give 
theses values to the hypervisor?

> +/* Physical Address Space */
> +#define GUEST_GICD_BASE   0x2c001000ULL
> +#define GUEST_GICD_SIZE   0x1000ULL
> +#define GUEST_GICC_BASE   0x2c002000ULL
> +#define GUEST_GICC_SIZE   0x100ULL
> +
> +#define GUEST_RAM_BASE    0x80000000ULL

This define should be libxc/libxl specific. Xen should not use this value.

> +
> +#define GUEST_GNTTAB_BASE 0xb0000000ULL
> +#define GUEST_GNTTAB_SIZE 0x00020000ULL
> +
> +/* Interrupts */
> +#define GUEST_TIMER_VIRT_PPI    27
> +#define GUEST_TIMER_PHYS_S_PPI  29
> +#define GUEST_TIMER_PHYS_NS_PPI 30
> +#define GUEST_EVTCHN_PPI        31
> +
> +/* PSCI functions */
> +#define PSCI_cpu_suspend 0
> +#define PSCI_cpu_off     1
> +#define PSCI_cpu_on      2
> +#define PSCI_migrate     3
> +
>   #endif
> -#define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
> -#define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
>
>   #endif /*  __XEN_PUBLIC_ARCH_ARM_H__ */
>
>

-- 
Julien Grall

  reply	other threads:[~2013-11-08  7:29 UTC|newest]

Thread overview: 46+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-11-07 16:44 [PATCH v3 00/14] xen: arm: 64-bit guest support and domU FDT autogeneration Ian Campbell
2013-11-07 16:44 ` [PATCH v3 01/14] xen: arm: Report aarch64 capability Ian Campbell
2013-11-07 16:44 ` [PATCH v3 02/14] xen: arm: Add comment regard arm64 zImage v0 vs v1 Ian Campbell
2013-11-07 16:44 ` [PATCH v3 03/14] xen: arm: allocate dom0 memory separately from preparing the dtb Ian Campbell
2013-11-08  7:18   ` Julien Grall
2013-11-08  9:36     ` Ian Campbell
2013-11-11 12:08       ` Julien Grall
2013-11-11 12:12         ` Ian Campbell
2013-11-11 12:25           ` Julien Grall
2013-11-11 13:17             ` Stefano Stabellini
2013-11-07 16:44 ` [PATCH v3 04/14] xen: arm: add enable-method to cpu nodes for arm64 guests Ian Campbell
2013-11-07 16:44 ` [PATCH v3 05/14] xen: arm: implement XEN_DOMCTL_set_address_size Ian Campbell
2013-11-11 12:13   ` Julien Grall
2013-11-07 16:44 ` [PATCH v3 06/14] xen: arm: implement arch_set_info_guest for 64-bit vcpus Ian Campbell
2013-11-08  7:20   ` Julien Grall
2013-11-07 16:44 ` [PATCH v3 07/14] tools: check for libfdt when building for ARM Ian Campbell
2013-11-07 17:04   ` Ian Jackson
2013-11-07 16:44 ` [PATCH v3 08/14] xen: arm: define guest virtual platform in API headers Ian Campbell
2013-11-08  7:29   ` Julien Grall [this message]
2013-11-08  9:48     ` Ian Campbell
2013-11-11 14:25       ` Julien Grall
2013-11-11 15:12         ` Ian Campbell
2013-11-07 16:44 ` [PATCH v3 09/14] libxc: arm: rename various bits of zimage load with 32 suffix Ian Campbell
2013-11-07 16:44 ` [PATCH v3 10/14] libxc: allow caller to specify guest rambase rather than hardcoding Ian Campbell
2013-11-07 17:06   ` Ian Jackson
2013-11-07 17:09     ` Ian Campbell
2013-11-07 17:30       ` Ian Jackson
2013-11-07 16:44 ` [PATCH v3 11/14] libxc: allow passing a device tree blob to the guest Ian Campbell
2013-11-07 17:09   ` Ian Jackson
2013-11-07 17:10     ` Ian Campbell
2013-11-07 17:31       ` Ian Jackson
2013-11-07 17:42         ` Ian Campbell
2013-11-12 10:46           ` Ian Campbell
2013-11-07 16:44 ` [PATCH v3 12/14] libxc: support for arm64 Image format Ian Campbell
2013-11-11 14:28   ` Julien Grall
2013-11-07 16:44 ` [PATCH v3 13/14] libxc: arm64 vcpu initialisation Ian Campbell
2013-11-07 17:09   ` Ian Jackson
2013-11-11 15:03   ` Julien Grall
2013-11-07 16:44 ` [PATCH v3 14/14] libxl: build a device tree for ARM guests Ian Campbell
2013-11-07 17:30   ` Ian Jackson
2013-11-07 17:41     ` Ian Campbell
2013-11-07 17:47       ` Ian Jackson
2013-11-08  9:30         ` Ian Campbell
2013-11-08 15:14           ` Ian Jackson
2013-11-11 12:14             ` Ian Campbell
2013-11-12 10:51     ` Ian Campbell

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=527C92CA.6050408@linaro.org \
    --to=julien.grall@linaro.org \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.