xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Julien Grall <julien.grall@linaro.org>
To: Ian Campbell <ian.campbell@citrix.com>, xen-devel@lists.xen.org
Cc: ian.jackson@eu.citrix.com, tim@xen.org, stefano.stabellini@eu.citrix.com
Subject: Re: [PATCH v3 08/14] xen: arm: define guest virtual platform in API headers
Date: Thu, 07 Nov 2013 23:29:14 -0800	[thread overview]
Message-ID: <527C92CA.6050408@linaro.org> (raw)
In-Reply-To: <1383842696-8598-8-git-send-email-ian.campbell@citrix.com>



On 11/07/2013 08:44 AM, Ian Campbell wrote:
> The tools and the hypervisor need to agree on various aspects of the guest
> environment, such as interrupt numbers, memory layout, initial register values
> for registers which are implementation defined etc. Therefore move the
> associated defines into the public interface headers, or create them as
> necessary. However these should not be exposed to guests, they should find
> these things out via device tree or should not be relying on implementation
> defined defaults.
>
> Various bits of the hypervisor needed to change to configure dom0 with the real
> platform values while using the virtual platform configuration for guests.
> Arrange for this where appropriate and plumb through as needed.
>
> We also need to expose some 64-bit values (e.g. PSR_GUEST64_INIT) for the
> benefit of 32 bit toolstacks building 64 bit guests.
>
> Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
> ---
>   tools/libxc/xc_dom_arm.c        |    4 +--
>   xen/arch/arm/domain.c           |    8 ++++--
>   xen/arch/arm/domain_build.c     |   13 +++++----
>   xen/arch/arm/gic.c              |   21 +++++++++-----
>   xen/arch/arm/psci.c             |    2 +-
>   xen/arch/arm/traps.c            |    2 +-
>   xen/arch/arm/vtimer.c           |   13 ++++++---
>   xen/include/asm-arm/domain.h    |    1 +
>   xen/include/asm-arm/event.h     |    3 +-
>   xen/include/asm-arm/gic.h       |    3 --
>   xen/include/asm-arm/processor.h |    7 -----
>   xen/include/asm-arm/psci.h      |    5 ----
>   xen/include/public/arch-arm.h   |   60 +++++++++++++++++++++++++++++++--------
>   13 files changed, 91 insertions(+), 51 deletions(-)
>

[..]

>   /* HCR Hyp Configuration Register */
>   #define HCR_RW          (1<<31) /* Register Width, ARM64 only */
>   #define HCR_TGE         (1<<27) /* Trap General Exceptions */
> diff --git a/xen/include/asm-arm/psci.h b/xen/include/asm-arm/psci.h
> index fdba636..67d4c35 100644
> --- a/xen/include/asm-arm/psci.h
> +++ b/xen/include/asm-arm/psci.h
> @@ -6,11 +6,6 @@
>   #define PSCI_EINVAL  -2
>   #define PSCI_DENIED  -3
>
> -#define __PSCI_cpu_suspend 0
> -#define __PSCI_cpu_off     1
> -#define __PSCI_cpu_on      2
> -#define __PSCI_migrate     3
> -
>   int do_psci_cpu_on(uint32_t vcpuid, register_t entry_point);
>   int do_psci_cpu_off(uint32_t power_state);
>   int do_psci_cpu_suspend(uint32_t power_state, register_t entry_point);
> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
> index 5d359af..70a0766 100644
> --- a/xen/include/public/arch-arm.h
> +++ b/xen/include/public/arch-arm.h
> @@ -268,8 +268,21 @@ typedef uint64_t xen_callback_t;
>
>   #endif
>
> +#if defined(__XEN__) || defined(__XEN_TOOLS__)
> +
>   /* PSR bits (CPSR, SPSR)*/
>
> +#define PSR_THUMB       (1<<5)        /* Thumb Mode enable */
> +#define PSR_FIQ_MASK    (1<<6)        /* Fast Interrupt mask */
> +#define PSR_IRQ_MASK    (1<<7)        /* Interrupt mask */
> +#define PSR_ABT_MASK    (1<<8)        /* Asynchronous Abort mask */
> +#define PSR_BIG_ENDIAN  (1<<9)        /* Big Endian Mode */
> +#ifdef __aarch64__ /* For Aarch64 bit 9 is repurposed. */

If you keep __aarch64__, you won't be able to have dom0 in 32 bits on arm64.
BTW, what does prevent the developer to use arm64 defines on arm64?

> +#define PSR_DBG_MASK    (1<<9)
> +#endif
> +#define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
> +#define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
> +
>   /* 32 bit modes */
>   #define PSR_MODE_USR 0x10
>   #define PSR_MODE_FIQ 0x11
> @@ -281,8 +294,6 @@ typedef uint64_t xen_callback_t;
>   #define PSR_MODE_UND 0x1b
>   #define PSR_MODE_SYS 0x1f
>
> -/* 64 bit modes */

I would keep this commit. It's good to know that it's ARM64 specific.

> -#ifdef __aarch64__
>   #define PSR_MODE_BIT  0x10 /* Set iff AArch32 */
>   #define PSR_MODE_EL3h 0x0d
>   #define PSR_MODE_EL3t 0x0c
> @@ -291,18 +302,43 @@ typedef uint64_t xen_callback_t;
>   #define PSR_MODE_EL1h 0x05
>   #define PSR_MODE_EL1t 0x04
>   #define PSR_MODE_EL0t 0x00
> -#endif
>
> -#define PSR_THUMB       (1<<5)        /* Thumb Mode enable */
> -#define PSR_FIQ_MASK    (1<<6)        /* Fast Interrupt mask */
> -#define PSR_IRQ_MASK    (1<<7)        /* Interrupt mask */
> -#define PSR_ABT_MASK    (1<<8)        /* Asynchronous Abort mask */
> -#define PSR_BIG_ENDIAN  (1<<9)        /* Big Endian Mode */
> -#ifdef __aarch64__ /* For Aarch64 bit 9 is repurposed. */
> -#define PSR_DBG_MASK    (1<<9)
> +#define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_EL1h)
> +
> +#define SCTLR_GUEST_INIT    0x00c50078
> +
> +/*
> + * Virtual machine platform (memory layout, interrupts)
> + *
> + * These are defined for consistency between the tools and the
> + * hypervisor. Guests must not rely on these hardcoded values but
> + * should instead use the FDT.
> + */
> +

I don't like the solution to hardcode GIC, IRQs (timer + evtchn) in the 
public interface. If we keep this solution, we will need to modify, 
again, the ABI for ARM, why can't we add/extend some hypercalls to give 
theses values to the hypervisor?

> +/* Physical Address Space */
> +#define GUEST_GICD_BASE   0x2c001000ULL
> +#define GUEST_GICD_SIZE   0x1000ULL
> +#define GUEST_GICC_BASE   0x2c002000ULL
> +#define GUEST_GICC_SIZE   0x100ULL
> +
> +#define GUEST_RAM_BASE    0x80000000ULL

This define should be libxc/libxl specific. Xen should not use this value.

> +
> +#define GUEST_GNTTAB_BASE 0xb0000000ULL
> +#define GUEST_GNTTAB_SIZE 0x00020000ULL
> +
> +/* Interrupts */
> +#define GUEST_TIMER_VIRT_PPI    27
> +#define GUEST_TIMER_PHYS_S_PPI  29
> +#define GUEST_TIMER_PHYS_NS_PPI 30
> +#define GUEST_EVTCHN_PPI        31
> +
> +/* PSCI functions */
> +#define PSCI_cpu_suspend 0
> +#define PSCI_cpu_off     1
> +#define PSCI_cpu_on      2
> +#define PSCI_migrate     3
> +
>   #endif
> -#define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
> -#define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
>
>   #endif /*  __XEN_PUBLIC_ARCH_ARM_H__ */
>
>

-- 
Julien Grall

  reply	other threads:[~2013-11-08  7:29 UTC|newest]

Thread overview: 46+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-11-07 16:44 [PATCH v3 00/14] xen: arm: 64-bit guest support and domU FDT autogeneration Ian Campbell
2013-11-07 16:44 ` [PATCH v3 01/14] xen: arm: Report aarch64 capability Ian Campbell
2013-11-07 16:44 ` [PATCH v3 02/14] xen: arm: Add comment regard arm64 zImage v0 vs v1 Ian Campbell
2013-11-07 16:44 ` [PATCH v3 03/14] xen: arm: allocate dom0 memory separately from preparing the dtb Ian Campbell
2013-11-08  7:18   ` Julien Grall
2013-11-08  9:36     ` Ian Campbell
2013-11-11 12:08       ` Julien Grall
2013-11-11 12:12         ` Ian Campbell
2013-11-11 12:25           ` Julien Grall
2013-11-11 13:17             ` Stefano Stabellini
2013-11-07 16:44 ` [PATCH v3 04/14] xen: arm: add enable-method to cpu nodes for arm64 guests Ian Campbell
2013-11-07 16:44 ` [PATCH v3 05/14] xen: arm: implement XEN_DOMCTL_set_address_size Ian Campbell
2013-11-11 12:13   ` Julien Grall
2013-11-07 16:44 ` [PATCH v3 06/14] xen: arm: implement arch_set_info_guest for 64-bit vcpus Ian Campbell
2013-11-08  7:20   ` Julien Grall
2013-11-07 16:44 ` [PATCH v3 07/14] tools: check for libfdt when building for ARM Ian Campbell
2013-11-07 17:04   ` Ian Jackson
2013-11-07 16:44 ` [PATCH v3 08/14] xen: arm: define guest virtual platform in API headers Ian Campbell
2013-11-08  7:29   ` Julien Grall [this message]
2013-11-08  9:48     ` Ian Campbell
2013-11-11 14:25       ` Julien Grall
2013-11-11 15:12         ` Ian Campbell
2013-11-07 16:44 ` [PATCH v3 09/14] libxc: arm: rename various bits of zimage load with 32 suffix Ian Campbell
2013-11-07 16:44 ` [PATCH v3 10/14] libxc: allow caller to specify guest rambase rather than hardcoding Ian Campbell
2013-11-07 17:06   ` Ian Jackson
2013-11-07 17:09     ` Ian Campbell
2013-11-07 17:30       ` Ian Jackson
2013-11-07 16:44 ` [PATCH v3 11/14] libxc: allow passing a device tree blob to the guest Ian Campbell
2013-11-07 17:09   ` Ian Jackson
2013-11-07 17:10     ` Ian Campbell
2013-11-07 17:31       ` Ian Jackson
2013-11-07 17:42         ` Ian Campbell
2013-11-12 10:46           ` Ian Campbell
2013-11-07 16:44 ` [PATCH v3 12/14] libxc: support for arm64 Image format Ian Campbell
2013-11-11 14:28   ` Julien Grall
2013-11-07 16:44 ` [PATCH v3 13/14] libxc: arm64 vcpu initialisation Ian Campbell
2013-11-07 17:09   ` Ian Jackson
2013-11-11 15:03   ` Julien Grall
2013-11-07 16:44 ` [PATCH v3 14/14] libxl: build a device tree for ARM guests Ian Campbell
2013-11-07 17:30   ` Ian Jackson
2013-11-07 17:41     ` Ian Campbell
2013-11-07 17:47       ` Ian Jackson
2013-11-08  9:30         ` Ian Campbell
2013-11-08 15:14           ` Ian Jackson
2013-11-11 12:14             ` Ian Campbell
2013-11-12 10:51     ` Ian Campbell

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=527C92CA.6050408@linaro.org \
    --to=julien.grall@linaro.org \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).