From patchwork Wed Jul 30 13:47:17 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ian Campbell X-Patchwork-Id: 34528 Return-Path: X-Original-To: linaro@patches.linaro.org Delivered-To: linaro@patches.linaro.org Received: from mail-yh0-f72.google.com (mail-yh0-f72.google.com [209.85.213.72]) by ip-10-151-82-157.ec2.internal (Postfix) with ESMTPS id 96BA020DCC for ; Wed, 30 Jul 2014 13:55:58 +0000 (UTC) Received: by mail-yh0-f72.google.com with SMTP id f73sf4200541yha.3 for ; Wed, 30 Jul 2014 06:55:58 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:delivered-to:from:to:date:message-id:in-reply-to :references:mime-version:cc:subject:precedence:list-id :list-unsubscribe:list-post:list-help:list-subscribe:sender :errors-to:x-original-sender:x-original-authentication-results :mailing-list:list-archive:content-type:content-transfer-encoding; bh=/caJ3kuPJjAFURKi6QLjZ/TvlSZXig/Kp1nXXHz9hP8=; b=eXEvJqNmMgVJxpaGtPyef9wyR+2QctB8hJlibyozcyP3uzWrBoPAe+tdyiycneqTtF noqjC9sV30j9Ko3/8s0JRoNC0lrG06oUAGf7hjA6uqxujAon03L4cmTjwvf7S6NBqBnh UQWB0Xqvh7MVTgJJB6H+uVg8sA7+v3r+bKyuD5YTEFQbxpUqVvOkPU7ooOZcBwq0QCZT O5h3xSF/EEVUSzOud257yx1yHK/LLuQ07XP3xwG22W1tidkRv3KOk++KWcYh6otJZdpT 9uQijkBwNcl/39HvGYRGrHaDU95AYkGv2qJCWTyBS5VnGvM2s66fCQjXJsjJHYL0OjBU spuA== X-Gm-Message-State: ALoCoQnpdtLfl5nVZ7wlrY9ViltC1+u1BB8vRz90Wxuy/PdXE8e9J3s8NqN1h/DvvG6qot97b/jt X-Received: by 10.236.78.70 with SMTP id f46mr1550855yhe.24.1406728558429; Wed, 30 Jul 2014 06:55:58 -0700 (PDT) X-BeenThere: patchwork-forward@linaro.org Received: by 10.140.29.55 with SMTP id a52ls560652qga.14.gmail; Wed, 30 Jul 2014 06:55:58 -0700 (PDT) X-Received: by 10.220.173.134 with SMTP id p6mr4734010vcz.36.1406728558291; Wed, 30 Jul 2014 06:55:58 -0700 (PDT) Received: from mail-vc0-f174.google.com (mail-vc0-f174.google.com [209.85.220.174]) by mx.google.com with ESMTPS id r6si1711910vei.7.2014.07.30.06.55.58 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 30 Jul 2014 06:55:58 -0700 (PDT) Received-SPF: pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.220.174 as permitted sender) client-ip=209.85.220.174; Received: by mail-vc0-f174.google.com with SMTP id la4so1822964vcb.33 for ; Wed, 30 Jul 2014 06:55:58 -0700 (PDT) X-Received: by 10.221.47.9 with SMTP id uq9mr4717367vcb.48.1406728558212; Wed, 30 Jul 2014 06:55:58 -0700 (PDT) X-Forwarded-To: patchwork-forward@linaro.org X-Forwarded-For: patch@linaro.org patchwork-forward@linaro.org Delivered-To: patch@linaro.org Received: by 10.221.37.5 with SMTP id tc5csp29573vcb; Wed, 30 Jul 2014 06:55:57 -0700 (PDT) X-Received: by 10.43.6.195 with SMTP id ol3mr5778927icb.86.1406728557047; Wed, 30 Jul 2014 06:55:57 -0700 (PDT) Received: from lists.xen.org (lists.xen.org. [50.57.142.19]) by mx.google.com with ESMTPS id on7si6468055icb.40.2014.07.30.06.55.56 for (version=TLSv1 cipher=RC4-SHA bits=128/128); Wed, 30 Jul 2014 06:55:57 -0700 (PDT) Received-SPF: none (google.com: xen-devel-bounces@lists.xen.org does not designate permitted sender hosts) client-ip=50.57.142.19; Received: from localhost ([127.0.0.1] helo=lists.xen.org) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1XCUKi-0006AR-Rs; Wed, 30 Jul 2014 13:54:20 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1XCUKg-00069n-TP for xen-devel@lists.xen.org; Wed, 30 Jul 2014 13:54:19 +0000 Received: from [85.158.139.211:62118] by server-15.bemta-5.messagelabs.com id 15/18-12002-A09F8D35; Wed, 30 Jul 2014 13:54:18 +0000 X-Env-Sender: Ian.Campbell@citrix.com X-Msg-Ref: server-9.tower-206.messagelabs.com!1406728456!10888057!1 X-Originating-IP: [66.165.176.89] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n X-StarScan-Received: X-StarScan-Version: 6.11.3; banners=-,-,- X-VirusChecked: Checked Received: (qmail 8643 invoked from network); 30 Jul 2014 13:54:17 -0000 Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89) by server-9.tower-206.messagelabs.com with RC4-SHA encrypted SMTP; 30 Jul 2014 13:54:17 -0000 X-IronPort-AV: E=Sophos;i="5.01,764,1400025600"; d="scan'208";a="157142853" Received: from accessns.citrite.net (HELO FTLPEX01CL03.citrite.net) ([10.9.154.239]) by FTLPIPO01.CITRIX.COM with ESMTP; 30 Jul 2014 13:54:16 +0000 Received: from ukmail1.uk.xensource.com (10.80.16.128) by smtprelay.citrix.com (10.13.107.80) with Microsoft SMTP Server id 14.3.181.6; Wed, 30 Jul 2014 09:54:15 -0400 Received: from drall.uk.xensource.com ([10.80.16.71]) by ukmail1.uk.xensource.com with smtp (Exim 4.69) (envelope-from ) id 1XCUE1-0006vT-Gv; Wed, 30 Jul 2014 14:47:26 +0100 Received: by drall.uk.xensource.com (sSMTP sendmail emulation); Wed, 30 Jul 2014 14:47:25 +0100 From: Ian Campbell To: Date: Wed, 30 Jul 2014 14:47:17 +0100 Message-ID: <178041f951bc35a80f5a2a7e228b95ddc6c7a64d.1406728037.git.ian.campbell@citrix.com> X-Mailer: git-send-email 1.7.10.4 In-Reply-To: <3ef2b68c511f3e31de409b76757b95c78b99d750.1406728037.git.ian.campbell@citrix.com> References: <3ef2b68c511f3e31de409b76757b95c78b99d750.1406728037.git.ian.campbell@citrix.com> MIME-Version: 1.0 X-DLP: MIA1 Cc: julien.grall@linaro.org, tim@xen.org, Ian Campbell , vijay.kilari@gmail.com, stefano.stabellini@eu.citrix.com Subject: [Xen-devel] [PATCH RFC 9/9] xen: arm: support for up to 48-bit IPA addressing on arm64 X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.13 Precedence: list List-Id: List-Unsubscribe: , List-Post: , List-Help: , List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org X-Removed-Original-Auth: Dkim didn't pass. X-Original-Sender: ian.campbell@citrix.com X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.220.174 as permitted sender) smtp.mail=patch+caf_=patchwork-forward=linaro.org@linaro.org Mailing-list: list patchwork-forward@linaro.org; contact patchwork-forward+owners@linaro.org X-Google-Group-Id: 836684582541 List-Archive: Currently we support only 40-bits. This is insufficient on systems where peripherals which need to be 1:1 mapped to dom0 are above the 40-bit limit. Unfortunately the hardware requirements are such that this means that the number of levels in the P2M is not static and must vary with the number of implemented physical address bits. This is described in ARM DDI 0487A.b Table D4-5. In short there is no single p2m configuration which supports everything from 40- to 48- bits. For example a system which supports up to 40-bit addressing will only support 3 level p2m (maximum SL0 is 1 == 3 levels), requiring a concatenated page table root consisting of two pages to make the full 40-bits of addressing. A maximum of 16 pages can be concatenated meaning that a 3 level p2m can only support up to 43-bit addreses. Therefore support for 48-bit addressing requres SL0==2 (4 levels of paging). After the previous patches our various p2m lookup and manipulation functions already support starting at arbitrary level and with arbitrary root concatenation. All that remains is to determine the correct settings from ID_AA64MMFR0_EL1.PARange for which we use a lookup table. As well as supporting 44 and 48 bit addressing we can also reduce the order of the first level for systems which support only 32 or 36 physical address bits, saving a page. Systems with 42-bits are an interesting case, since they only support 3 levels of paging, implying that 8 pages are required at the root level. So far I am not aware of any systems with peripheral located so high up (the only 42-bit system I've seen has nothing above 40-bits), so such systems remain configured for 40-bit IPA with a pair of pages at the root of the p2m. Switching to synbolic names for the VTCR_EL2 bits as we go improves the clarity of the result. Parts of this are derived from "xen/arm: Add 4-level page table for stage 2 translation" by Vijaya Kumar K. arm32 remains with the static 3-level, 2 page root configuration. Signed-off-by: Ian Campbell --- xen/arch/arm/p2m.c | 82 +++++++++++++++++++++++++++++++-------- xen/include/asm-arm/p2m.h | 2 +- xen/include/asm-arm/processor.h | 28 +++++++++++++ 3 files changed, 94 insertions(+), 18 deletions(-) diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c index e9938ae..0e8e8e0 100644 --- a/xen/arch/arm/p2m.c +++ b/xen/arch/arm/p2m.c @@ -11,10 +11,17 @@ #include #include -#define P2M_ROOT_LEVEL 1 +#ifdef CONFIG_ARM_64 +static int __read_mostly p2m_root_order; +static int __read_mostly p2m_root_level; +#define P2M_ROOT_ORDER p2m_root_order +#define P2M_ROOT_LEVEL p2m_root_level +#else +/* First level P2M is alway 2 consecutive pages */ +#define P2M_ROOT_LEVEL 1 +#define P2M_ROOT_ORDER 1 +#endif -/* First level P2M is 2 consecutive pages */ -#define P2M_ROOT_ORDER 1 #define P2M_ROOT_PAGES (1<root + root_table); + BUG_ON(P2M_ROOT_LEVEL >= 4); + for ( level = P2M_ROOT_LEVEL ; level < 4 ; level++ ) { mask = masks[level]; @@ -883,6 +892,7 @@ int p2m_alloc_table(struct domain *d) { struct p2m_domain *p2m = &d->arch.p2m; struct page_info *page; + int i; page = alloc_domheap_pages(NULL, P2M_ROOT_ORDER, 0); if ( page == NULL ) @@ -891,8 +901,8 @@ int p2m_alloc_table(struct domain *d) spin_lock(&p2m->lock); /* Clear both first level pages */ - clear_and_clean_page(page); - clear_and_clean_page(page + 1); + for ( i = 0; i < P2M_ROOT_PAGES; i++ ) + clear_and_clean_page(page + i); p2m->root = page; @@ -1078,21 +1088,59 @@ static void setup_virt_paging_one(void *data) void __cpuinit setup_virt_paging(void) { - unsigned long val; - /* Setup Stage 2 address translation */ - /* SH0=11 (Inner-shareable) - * ORGN0=IRGN0=01 (Normal memory, Write-Back Write-Allocate Cacheable) - * SL0=01 (Level-1) - * ARVv7: T0SZ=(1)1000 = -8 (32-(-8) = 40 bit physical addresses) - * ARMv8: T0SZ=01 1000 = 24 (64-24 = 40 bit physical addresses) - * PS=010 == 40 bits - */ + unsigned long val = VTCR_RES1|VTCR_SH0_IS|VTCR_ORGN0_WBWA|VTCR_IRGN0_WBWA; + #ifdef CONFIG_ARM_32 - val = 0x80003558; -#else - val = 0x80023558; + printk("P2M: 40-bit IPA\n"); + val |= VTCR_T0SZ(0x18); /* 40 bit IPA */ +#else /* CONFIG_ARM_64 */ + const struct { + unsigned pabits; /* Physical Address Size */ + unsigned t0sz; /* Desired T0SZ, minimum in comment */ + unsigned root_order; /* Page order of the root of the p2m */ + unsigned sl0; /* Desired SL0, maximum in comment */ + } pa_range_info[] = { + /* T0SZ minimum and SL0 maximum from ARM DDI 0487A.b Table D4-5 */ + /* PA size, t0sz(min), root-order, sl0(max) */ + [0] = { 32, 32/*32*/, 0, 1 }, + [1] = { 36, 28/*28*/, 0, 1 }, + [2] = { 40, 24/*24*/, 1, 1 }, + [3] = { 42, 24/*22*/, 1, 1 }, + [4] = { 44, 20/*20*/, 0, 2 }, + [5] = { 48, 16/*16*/, 0, 2 }, + [6] = { 0 }, /* Invalid */ + [7] = { 0 } /* Invalid */ + }; + + int cpu; + int pa_range = 0x10; /* Larger than any possible value */ + + for_each_online_cpu ( cpu ) + { + struct cpuinfo_arm *info = &cpu_data[cpu]; + if ( info->mm64.pa_range < pa_range ) + pa_range = info->mm64.pa_range; + } + + /* pa_range is 4 bits, but the defined encodings are only 3 bits */ + if ( pa_range&0x8 || !pa_range_info[pa_range].pabits ) + panic("Unknown encoding of ID_AA64MMFR0_EL1.PARange %x\n", pa_range); + + val |= VTCR_PS(pa_range); + val |= VTCR_TG0_4K; + val |= VTCR_SL0(pa_range_info[pa_range].sl0); + val |= VTCR_T0SZ(pa_range_info[pa_range].t0sz); + + p2m_root_order = pa_range_info[pa_range].root_order; + p2m_root_level = 2 - pa_range_info[pa_range].sl0; + + printk("P2M: %d-bit IPA with %d-bit PA\n", + 64 - pa_range_info[pa_range].t0sz, + pa_range_info[pa_range].pabits); #endif + printk("P2M: %d levels with order-%d root, VTCR 0x%lx\n", + 4 - P2M_ROOT_LEVEL, P2M_ROOT_ORDER, val); setup_virt_paging_one((void *)val); smp_call_function(setup_virt_paging_one, (void *)val, 1); } diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h index cfd0c52..a0cf2f4 100644 --- a/xen/include/asm-arm/p2m.h +++ b/xen/include/asm-arm/p2m.h @@ -13,7 +13,7 @@ struct p2m_domain { /* Pages used to construct the p2m */ struct page_list_head pages; - /* Root of p2m page tables, 2 contiguous pages */ + /* The root of the p2m tree. May be concatenated */ struct page_info *root; /* Current VMID in use */ diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h index 979a41d..a744a67 100644 --- a/xen/include/asm-arm/processor.h +++ b/xen/include/asm-arm/processor.h @@ -116,6 +116,34 @@ #define TCR_RES1 (_AC(1,UL)<<31) #endif +/* VTCR: Stage 2 Translation Control */ + +#define VTCR_T0SZ(x) ((x)<<0) + +#define VTCR_SL0(x) ((x)<<6) + +#define VTCR_IRGN0_NC (_AC(0x0,UL)<<8) +#define VTCR_IRGN0_WBWA (_AC(0x1,UL)<<8) +#define VTCR_IRGN0_WT (_AC(0x2,UL)<<8) +#define VTCR_IRGN0_WB (_AC(0x3,UL)<<8) + +#define VTCR_ORGN0_NC (_AC(0x0,UL)<<10) +#define VTCR_ORGN0_WBWA (_AC(0x1,UL)<<10) +#define VTCR_ORGN0_WT (_AC(0x2,UL)<<10) +#define VTCR_ORGN0_WB (_AC(0x3,UL)<<10) + +#define VTCR_SH0_NS (_AC(0x0,UL)<<12) +#define VTCR_SH0_OS (_AC(0x2,UL)<<12) +#define VTCR_SH0_IS (_AC(0x3,UL)<<12) + +#define VTCR_TG0_4K (_AC(0x0,UL)<<14) /* arm64 only */ +#define VTCR_TG0_64K (_AC(0x1,UL)<<14) +#define VTCR_TG0_16K (_AC(0x2,UL)<<14) + +#define VTCR_PS(x) ((x)<<16) + +#define VTCR_RES1 (_AC(1,UL)<<31) + /* HCPTR Hyp. Coprocessor Trap Register */ #define HCPTR_TTA ((_AC(1,U)<<20)) /* Trap trace registers */ #define HCPTR_CP(x) ((_AC(1,U)<<(x))) /* Trap Coprocessor x */