linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: will.deacon@arm.com (Will Deacon)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH] arm64: fix documentation on kernel pages mappings to HYP VA
Date: Wed, 27 Sep 2017 10:13:33 +0100	[thread overview]
Message-ID: <20170927091332.GA19317@arm.com> (raw)
In-Reply-To: <86bmlwo842.fsf@arm.com>

On Wed, Sep 27, 2017 at 09:31:41AM +0100, Marc Zyngier wrote:
> On Tue, Sep 26 2017 at  9:45:42 pm BST, Yury Norov <ynorov@caviumnetworks.com> wrote:
> > On Wed, Sep 13, 2017 at 09:08:30PM +0300, Yury Norov wrote:
> >> The Documentation/arm64/memory.txt says:
> >> When using KVM, the hypervisor maps kernel pages in EL2, at a fixed
> >> offset from the kernel VA (top 24bits of the kernel VA set to zero):
> >> 
> >> In fact, kernel addresses are transleted to HYP with kern_hyp_va macro,
> >> which has more options, and none of them assumes clearing of top 24bits
> >> of the kernel VA.
> >> 
> >> Signed-off-by: Yury Norov <ynorov@caviumnetworks.com>
> >> ---
> >>  Documentation/arm64/memory.txt | 15 +++++++++------
> >>  1 file changed, 9 insertions(+), 6 deletions(-)
> >> 
> >> diff --git a/Documentation/arm64/memory.txt b/Documentation/arm64/memory.txt
> >> index d7273a5f6456..c39895d7e3a2 100644
> >> --- a/Documentation/arm64/memory.txt
> >> +++ b/Documentation/arm64/memory.txt
> >> @@ -86,9 +86,12 @@ Translation table lookup with 64KB pages:
> >>   +-------------------------------------------------> [63] TTBR0/1
> >>  
> >>  
> >> -When using KVM, the hypervisor maps kernel pages in EL2, at a fixed
> >> -offset from the kernel VA (top 24bits of the kernel VA set to zero):
> >> -
> >> -Start			End			Size		Use
> >> ------------------------------------------------------------------------
> >> -0000004000000000	0000007fffffffff	 256GB		kernel objects mapped in HYP
> >> +When using KVM without Virtualization Host Extensions, the hypervisor maps
> >> +kernel pages in EL2, at a fixed offset from the kernel VA. Namely, top 16
> >> +or 25 bits of the kernel VA set to zero depending on ARM64_VA_BITS_48 or
> >> +ARM64_VA_BITS_39 config option selected; or top 17 or 26 bits of the kernel
> >> +VA set to zero if CPU has Reduced HYP mapping offset capability. See
> >> +kern_hyp_va macro.
> 
> What is this "Reduced HYP mapping offset capability"?
> 
> You're missing the point that the location of the EL2 mapping is
> conditioned by the location of the identity mapping that is used to
> bring up / tear down KVM. You have to express the VA transformation in
> terms of both VA_BITS (and there is more cases than just 39 or 48 bits)
> *and* the idmap address, not to mention the case where KVM's VA_BITS is
> larger than the rest of the kernel. See the extensive blurb in
> kvm_mmu.h.
> 
> >> +
> >> +When using KVM with Virtualization Host Extensions, no additional mappings
> >> +created as host kernel already operates in EL2.
> 
> This bit is fine.

FWIW, I was going to queue a simplified version along the lines of the patch
below.

Will

--->8

commit dbf7393b7738a0ba0284551e7b6e014cfb100661
Author: Yury Norov <ynorov@caviumnetworks.com>
Date:   Wed Sep 13 21:08:30 2017 +0300

    arm64: fix documentation on kernel pages mappings to HYP VA
    
    The Documentation/arm64/memory.txt says:
    When using KVM, the hypervisor maps kernel pages in EL2, at a fixed
    offset from the kernel VA (top 24bits of the kernel VA set to zero):
    
    In fact, kernel addresses are transleted to HYP with kern_hyp_va macro,
    which has more options, and none of them assumes clearing of top 24bits
    of the kernel VA.
    
    Signed-off-by: Yury Norov <ynorov@caviumnetworks.com>
    [will: removed gory details]
    Signed-off-by: Will Deacon <will.deacon@arm.com>

diff --git a/Documentation/arm64/memory.txt b/Documentation/arm64/memory.txt
index d7273a5f6456..ea9ee39784a2 100644
--- a/Documentation/arm64/memory.txt
+++ b/Documentation/arm64/memory.txt
@@ -86,9 +86,9 @@ Translation table lookup with 64KB pages:
  +-------------------------------------------------> [63] TTBR0/1
 
 
-When using KVM, the hypervisor maps kernel pages in EL2, at a fixed
-offset from the kernel VA (top 24bits of the kernel VA set to zero):
+When using KVM without the Virtualization Host Extensions, the hypervisor
+maps kernel pages in EL2 at a fixed offset from the kernel VA. See the
+kern_hyp_va macro for more details.
 
-Start			End			Size		Use
------------------------------------------------------------------------
-0000004000000000	0000007fffffffff	 256GB		kernel objects mapped in HYP
+When using KVM with the Virtualization Host Extensions, no additional
+mappings are created, since the host kernel runs directly in EL2.

  reply	other threads:[~2017-09-27  9:13 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-09-13 18:08 [PATCH] arm64: fix documentation on kernel pages mappings to HYP VA Yury Norov
2017-09-26 18:45 ` Yury Norov
2017-09-27  8:31   ` Marc Zyngier
2017-09-27  9:13     ` Will Deacon [this message]
2017-09-27 14:28       ` Marc Zyngier
2017-09-28 19:50       ` Yury Norov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170927091332.GA19317@arm.com \
    --to=will.deacon@arm.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).