From patchwork Tue Feb 4 19:23:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ayan Kumar Halder X-Patchwork-Id: 13959681 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 556A1C02194 for ; Tue, 4 Feb 2025 19:24:28 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881796.1291968 (Exim 4.92) (envelope-from ) id 1tfOWz-00052V-3y; Tue, 04 Feb 2025 19:24:21 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881796.1291968; Tue, 04 Feb 2025 19:24:21 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOWz-00052O-0q; Tue, 04 Feb 2025 19:24:21 +0000 Received: by outflank-mailman (input) for mailman id 881796; Tue, 04 Feb 2025 19:24:19 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOWx-00051v-RD for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:19 +0000 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on20616.outbound.protection.outlook.com [2a01:111:f403:2417::616]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 9fe03c76-e32d-11ef-a0e7-8be0dac302b0; Tue, 04 Feb 2025 20:24:18 +0100 (CET) Received: from SJ0PR13CA0214.namprd13.prod.outlook.com (2603:10b6:a03:2c1::9) by SJ2PR12MB7895.namprd12.prod.outlook.com (2603:10b6:a03:4c6::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.25; Tue, 4 Feb 2025 19:24:11 +0000 Received: from SJ5PEPF00000207.namprd05.prod.outlook.com (2603:10b6:a03:2c1:cafe::49) by SJ0PR13CA0214.outlook.office365.com (2603:10b6:a03:2c1::9) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8377.13 via Frontend Transport; Tue, 4 Feb 2025 19:24:11 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by SJ5PEPF00000207.mail.protection.outlook.com (10.167.244.40) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:09 +0000 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:09 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:08 -0600 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 9fe03c76-e32d-11ef-a0e7-8be0dac302b0 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=x3FYZ5/1vPER+8lA56j6wwtMQDq98QxLM8FgLPxjtgQiO/z7cHs0AiFqRW4CQ72Vlcu0FjLyFP+Ce1iD7Lx91ffJzx9J8P/2z+HyBpHrWRirV1w4jgGyHF0QlQVgUmbULkqHXLuQIOt63dSf5B5lUdz5pD5j7FcvTCEYu5nX4MfQJ9ObXqo7ybwdXw6MSJ5wOSQvYNHA0VkbipM6oTlrwxNMh3y6d+vog2JpzvVdgZMu+q5QEdvIZN108P/U5HUQTfRB6mQDmsNb1UCPqj4gokmEiozxjHmbZ8NOkDV91LGKTsmXWz5KY95/CbknrrX+bw+Nod6YbXqm7VDEoRm/Tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oO+GghfFL4JgTxoRWMrv1S6PLgVtgiVvBOKgB4uNX/M=; b=OIyjyisM1Rwjog7sj8o+2nkXc0ICKcQu8141MyGv64nbUlS8OaFbIxalBQdXpXwBSMH5oP0rV8y8T/w5Bi6GQQLKOdY3/1VP25l+rlTAD6lVgI5KPnj+Q8SqsYOoa57lZhV2qpvVBrdZQcneBQ/KeZ1jxGTARB5XG9+k5Klc3rAhS7nKLuHPYLBLcDkrD51NbJYlAD7ZTgicguR52JU+Dk1ay2LaAkYuhgOReQn3vL0evegm8sMjOR0oZiiGWGpRBURks8TqJlDp2jzFlrAhg3KxvU/g/5qRFoir01eq3n+lbdovOCfpqXGBAy7tbi63J/2xr7w8J2gJ6BgzydcEdw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oO+GghfFL4JgTxoRWMrv1S6PLgVtgiVvBOKgB4uNX/M=; b=3T6GYIck51xgb4cU5ytPCi1YW/0/kg3bizGdfDJCbGbXYr0j79l23TeMF6QrUkD6w8lRYf7GrWmrINjeCk+tHjJH5jpmK9J4+2jbzMiBruL7xbh6oIpJf5qpsTqayYLDGx3c3/8//YSsiSfk5YLn4JwT6YcCcv0AxaicZPxcdOM= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 1/5] xen/arm: mpu: Ensure that the page size is 4KB (arm32) Date: Tue, 4 Feb 2025 19:23:53 +0000 Message-ID: <20250204192357.1862264-2-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Received-SPF: None (SATLEXMB04.amd.com: ayan.kumar.halder@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000207:EE_|SJ2PR12MB7895:EE_ X-MS-Office365-Filtering-Correlation-Id: 3a8470cf-33a0-4c0c-f6ed-08dd45518024 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|82310400026|376014|36860700013; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(82310400026)(376014)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:09.9489 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3a8470cf-33a0-4c0c-f6ed-08dd45518024 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000207.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR12MB7895 Similar to "xen/arm: mpu: Define Xen start address for MPU systems", added a build assertion to ensure that the page size is 4KB. Signed-off-by: Ayan Kumar Halder --- xen/arch/arm/arm32/Makefile | 1 + xen/arch/arm/arm32/mpu/Makefile | 1 + xen/arch/arm/arm32/mpu/mm.c | 15 +++++++++++++++ 3 files changed, 17 insertions(+) create mode 100644 xen/arch/arm/arm32/mpu/Makefile create mode 100644 xen/arch/arm/arm32/mpu/mm.c diff --git a/xen/arch/arm/arm32/Makefile b/xen/arch/arm/arm32/Makefile index 40a2b4803f..537969d753 100644 --- a/xen/arch/arm/arm32/Makefile +++ b/xen/arch/arm/arm32/Makefile @@ -1,5 +1,6 @@ obj-y += lib/ obj-$(CONFIG_MMU) += mmu/ +obj-$(CONFIG_MPU) += mpu/ obj-$(CONFIG_EARLY_PRINTK) += debug.o obj-y += domctl.o diff --git a/xen/arch/arm/arm32/mpu/Makefile b/xen/arch/arm/arm32/mpu/Makefile new file mode 100644 index 0000000000..b18cec4836 --- /dev/null +++ b/xen/arch/arm/arm32/mpu/Makefile @@ -0,0 +1 @@ +obj-y += mm.o diff --git a/xen/arch/arm/arm32/mpu/mm.c b/xen/arch/arm/arm32/mpu/mm.c new file mode 100644 index 0000000000..0b8748e575 --- /dev/null +++ b/xen/arch/arm/arm32/mpu/mm.c @@ -0,0 +1,15 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ + +#include +#include +#include + +static void __init __maybe_unused build_assertions(void) +{ + /* + * Unlike MMU, MPU does not use pages for translation. However, we continue + * to use PAGE_SIZE to denote 4KB. This is so that the existing memory + * management based on pages, continue to work for now. + */ + BUILD_BUG_ON(PAGE_SIZE != SZ_4K); +} From patchwork Tue Feb 4 19:23:54 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ayan Kumar Halder X-Patchwork-Id: 13959683 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 847ABC02193 for ; Tue, 4 Feb 2025 19:24:32 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881797.1291978 (Exim 4.92) (envelope-from ) id 1tfOX0-0005HS-B1; Tue, 04 Feb 2025 19:24:22 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881797.1291978; Tue, 04 Feb 2025 19:24:22 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX0-0005HL-7s; Tue, 04 Feb 2025 19:24:22 +0000 Received: by outflank-mailman (input) for mailman id 881797; Tue, 04 Feb 2025 19:24:21 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOWz-0004nP-F0 for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:21 +0000 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2062d.outbound.protection.outlook.com [2a01:111:f403:2418::62d]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a12ee7db-e32d-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 20:24:19 +0100 (CET) Received: from SJ0PR13CA0161.namprd13.prod.outlook.com (2603:10b6:a03:2c7::16) by MN0PR12MB5812.namprd12.prod.outlook.com (2603:10b6:208:378::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8422.11; Tue, 4 Feb 2025 19:24:15 +0000 Received: from SJ5PEPF00000203.namprd05.prod.outlook.com (2603:10b6:a03:2c7:cafe::88) by SJ0PR13CA0161.outlook.office365.com (2603:10b6:a03:2c7::16) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8398.25 via Frontend Transport; Tue, 4 Feb 2025 19:24:15 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by SJ5PEPF00000203.mail.protection.outlook.com (10.167.244.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:14 +0000 Received: from SATLEXMB05.amd.com (10.181.40.146) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:14 -0600 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB05.amd.com (10.181.40.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:14 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:13 -0600 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a12ee7db-e32d-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FR8O5W0HqihgRki0cgG+k7jj/qvaHwCnJgq2D0exTldrwbZcUbaH6OTjUfJuvH1YZvJQcfrBo9zdSY+I3uBLADGdkT3HqJGRrfsNbuTzxjzbiR1Uxa2Qdf/a0D1ergn3vpXdLa7tMfg9cqdk9R0xKUHIwFKGIrYr4wttra6b32SudPTz6AnyqYw/yDTc0XfOIbdgR8MQJWOM5HSTZoNyNfSzMUcDp6m4Wo4hg5+97UC6mqShiLKddGaqJihNuVHtHxv3X5yeQgrg4mLAb+shBwQPi+DXWhPQpdXZtSWo9pJkQFV5YQxVaIOSTwqCKPbpz0aSK4dl3h7RBqbJhpIytw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JaDj9A1dHrYS2o7s2ZFeD6vHr6ZkJxFrI1AZiL0c6gs=; b=n2us8eId2FNCDQfHRYxBaSqb+PPSI+rVfGdaCp2H2XNMDHgZK5UxldYQjlElEZMMht/hYjwAwxggSL+eARDsDknhrwc4ePd7yP3HGAAvY7YSfXc3w9rmbbws67SF/EJpkB9Wn1iSAbnGQz6Tpl5y0CPg0Vu1XQXqfks2D6cFaZIPSIaBpCY2aCNApvsV/p8zCB2A5HWWT1iAxyNhU4ed/PoYK6WNa0DXskN8Ql1HKuD5cIIsWfCWEvrAUjco6xmPv//DXJVgcF/1gRmDfQ+x7l1SKr/1dVGTfWjMI8ywX9DMeBVmAoxVyuNZpH8p+fchJfgWSk/65dmUW7sK8CKlJA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JaDj9A1dHrYS2o7s2ZFeD6vHr6ZkJxFrI1AZiL0c6gs=; b=lMP+12Iuh95I3H/hVCF6HK8d6dCVpMbf4GxKdEhfYVO0e+vUpw/u3bgVvnS3Jf2LOZSnguP8gg+V0zaep2dLpsk30jq/xJQjhGNsvzGdaBE5sUbZI8YTXX2p5KP6919qNg0R+T+nEmvyulb42Gx8Hivn/8or7TTMGsvHhCMopnE= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 2/5] xen/arm: mpu: Enclose access to MMU specific registers under CONFIG_MMU (arm32) Date: Tue, 4 Feb 2025 19:23:54 +0000 Message-ID: <20250204192357.1862264-3-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Received-SPF: None (SATLEXMB05.amd.com: ayan.kumar.halder@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000203:EE_|MN0PR12MB5812:EE_ X-MS-Office365-Filtering-Correlation-Id: 839b41fc-e994-4f18-77c1-08dd45518327 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|82310400026|1800799024|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(82310400026)(1800799024)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:14.9829 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 839b41fc-e994-4f18-77c1-08dd45518327 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000203.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN0PR12MB5812 All the EL2 MMU specific registers in head.S are enclosed within CONFIG_MMU. Signed-off-by: Ayan Kumar Halder --- xen/arch/arm/arm32/head.S | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S index 4ff5c220bc..1d0f84b18f 100644 --- a/xen/arch/arm/arm32/head.S +++ b/xen/arch/arm/arm32/head.S @@ -224,6 +224,7 @@ cpu_init_done: mcr CP32(r0, HMAIR0) mcr CP32(r1, HMAIR1) +#ifdef CONFIG_MMU /* * Set up the HTCR: * PT walks use Inner-Shareable accesses, @@ -232,6 +233,7 @@ cpu_init_done: */ mov_w r0, (TCR_RES1|TCR_SH0_IS|TCR_ORGN0_WBWA|TCR_IRGN0_WBWA|TCR_T0SZ(0)) mcr CP32(r0, HTCR) +#endif mov_w r0, HSCTLR_SET mcr CP32(r0, HSCTLR) From patchwork Tue Feb 4 19:23:55 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ayan Kumar Halder X-Patchwork-Id: 13959684 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id D938EC02193 for ; Tue, 4 Feb 2025 19:24:35 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881798.1291989 (Exim 4.92) (envelope-from ) id 1tfOX4-0005aj-OV; Tue, 04 Feb 2025 19:24:26 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881798.1291989; Tue, 04 Feb 2025 19:24:26 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX4-0005aa-KO; Tue, 04 Feb 2025 19:24:26 +0000 Received: by outflank-mailman (input) for mailman id 881798; Tue, 04 Feb 2025 19:24:25 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX3-0004nP-CK for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:25 +0000 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2061e.outbound.protection.outlook.com [2a01:111:f403:2416::61e]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a3162a05-e32d-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 20:24:23 +0100 (CET) Received: from SJ0PR05CA0135.namprd05.prod.outlook.com (2603:10b6:a03:33d::20) by BL3PR12MB6547.namprd12.prod.outlook.com (2603:10b6:208:38e::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.25; Tue, 4 Feb 2025 19:24:19 +0000 Received: from SJ5PEPF00000206.namprd05.prod.outlook.com (2603:10b6:a03:33d:cafe::77) by SJ0PR05CA0135.outlook.office365.com (2603:10b6:a03:33d::20) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8377.13 via Frontend Transport; Tue, 4 Feb 2025 19:24:19 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by SJ5PEPF00000206.mail.protection.outlook.com (10.167.244.39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:18 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:17 -0600 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:17 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:16 -0600 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a3162a05-e32d-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=jBfyd9AX+zwIHzNBkiycoNwjsZulRplPXn7Nw0WdQmBkDrTHSMQ3g0CYsCqDbXGioH9YmdWl5KUvntJ/GIJ62temNERq2PDkOWoZU86fkGiWpI0E3uCEbvYEz0zvts2aT1ljY7psRG8v9/1z5cC+iJ2X26QpwXIGSWeGltbsRw3kqHokPzjJ9CXzwJQ9eudYNXt7Y2vvpS3LUMZ5Deya0Wsqf3C60wd6CshesPamyK1upbYzDFcg9fBlzsU46/Vgaj2SJanity9ncDtrZGLtjPVDqnDn0UmUvnfRA1z7cPMAzcNDSKzFVrZ4USQIFvej3MibRARppAkjIkonRIxRfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=h5IgUIdldYNT/Kf679Yr7TCLDE1Py9MfCUBypmTOTtk=; b=oMgvVvDsgS9h7ACHC8wnTXihbskWiLUJGAvPDcuPGDls3bwfDiqUzzl6bg86wfOtEr5ZnvEZmx/xy1hW9ioBNSX9rWTBoz/bufHoJjcjvWjo5A0Zfh6wB4tKQDQUJ4bjMnfzihZJkVnmHk56cX7Boa5W5u7UUGV/Dt4JgyDXH9B2lY6FPrJOF+kExwIcgngduZiOix4HwsloXY7Cq4jh0YezLkkZqtRjzCMIAZebd+Cxcz2E4IBR3EXreFA7LPN7qp6ij1lgCCqwhafjGZds+n6w5EP7gcV5b0Rik8RL295mWxXR20CXJ4KPZrusr1GsFnOoqnHhAFS0uF+PMYCX3Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h5IgUIdldYNT/Kf679Yr7TCLDE1Py9MfCUBypmTOTtk=; b=P5pgvC4+ElcySVqZyw7wnhgF86OrNGxOU9lXycv06r6ErORJE+QBjcyJylL/th5ZUFgH8bQ08SPx9T2a7cRtjFNxuWkoi1HaUCUzMRJmUkTyZgVSYoQOfehiR3ZDFPJiTwpAXxLV4vxBDE5N+yAYwen+fuLzWh+pNJ2ejvWvnMU= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 3/5] xen/arm: mpu: Move some of the definitions to common file Date: Tue, 4 Feb 2025 19:23:55 +0000 Message-ID: <20250204192357.1862264-4-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000206:EE_|BL3PR12MB6547:EE_ X-MS-Office365-Filtering-Correlation-Id: bf66eb87-42fe-4c62-7869-08dd45518526 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|82310400026|1800799024|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(82310400026)(1800799024)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:18.3474 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: bf66eb87-42fe-4c62-7869-08dd45518526 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000206.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL3PR12MB6547 For AArch32, refer to ARM DDI 0568A.c ID110520. MPU_REGION_SHIFT is same between AArch32 and AArch64 (HPRBAR). Also, NUM_MPU_REGIONS_SHIFT is same between AArch32 and AArch64 (HMPUIR). Signed-off-by: Ayan Kumar Halder --- xen/arch/arm/arm64/mpu/head.S | 2 +- xen/arch/arm/include/asm/early_printk.h | 2 +- xen/arch/arm/include/asm/{arm64 => }/mpu.h | 6 +++--- 3 files changed, 5 insertions(+), 5 deletions(-) rename xen/arch/arm/include/asm/{arm64 => }/mpu.h (87%) diff --git a/xen/arch/arm/arm64/mpu/head.S b/xen/arch/arm/arm64/mpu/head.S index e4f2021f45..7b659aa42b 100644 --- a/xen/arch/arm/arm64/mpu/head.S +++ b/xen/arch/arm/arm64/mpu/head.S @@ -3,7 +3,7 @@ * Start-of-day code for an Armv8-R MPU system. */ -#include +#include #include /* Backgroud region enable/disable */ diff --git a/xen/arch/arm/include/asm/early_printk.h b/xen/arch/arm/include/asm/early_printk.h index 219705a8b6..644fd0fcfb 100644 --- a/xen/arch/arm/include/asm/early_printk.h +++ b/xen/arch/arm/include/asm/early_printk.h @@ -11,7 +11,7 @@ #define __ARM_EARLY_PRINTK_H__ #include -#include +#include #include #ifdef CONFIG_EARLY_PRINTK diff --git a/xen/arch/arm/include/asm/arm64/mpu.h b/xen/arch/arm/include/asm/mpu.h similarity index 87% rename from xen/arch/arm/include/asm/arm64/mpu.h rename to xen/arch/arm/include/asm/mpu.h index f8a029f1a1..40fa6eaaca 100644 --- a/xen/arch/arm/include/asm/arm64/mpu.h +++ b/xen/arch/arm/include/asm/mpu.h @@ -3,8 +3,8 @@ * mpu.h: Arm Memory Protection Unit definitions. */ -#ifndef __ARM64_MPU_H__ -#define __ARM64_MPU_H__ +#ifndef __ARM_MPU_H__ +#define __ARM_MPU_H__ #define MPU_REGION_SHIFT 6 #define MPU_REGION_ALIGN (_AC(1, UL) << MPU_REGION_SHIFT) @@ -13,7 +13,7 @@ #define NUM_MPU_REGIONS_SHIFT 8 #define NUM_MPU_REGIONS (_AC(1, UL) << NUM_MPU_REGIONS_SHIFT) #define NUM_MPU_REGIONS_MASK (NUM_MPU_REGIONS - 1) -#endif /* __ARM64_MPU_H__ */ +#endif /* __ARM_MPU_H__ */ /* * Local variables: From patchwork Tue Feb 4 19:23:56 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ayan Kumar Halder X-Patchwork-Id: 13959685 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 34A4CC02193 for ; Tue, 4 Feb 2025 19:24:39 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881800.1291999 (Exim 4.92) (envelope-from ) id 1tfOX8-0005xE-WA; Tue, 04 Feb 2025 19:24:30 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881800.1291999; Tue, 04 Feb 2025 19:24:30 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX8-0005x0-SV; Tue, 04 Feb 2025 19:24:30 +0000 Received: by outflank-mailman (input) for mailman id 881800; Tue, 04 Feb 2025 19:24:28 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX6-00051v-Ne for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:28 +0000 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2061d.outbound.protection.outlook.com [2a01:111:f403:2415::61d]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id a5dfc168-e32d-11ef-a0e7-8be0dac302b0; Tue, 04 Feb 2025 20:24:28 +0100 (CET) Received: from MN0P222CA0018.NAMP222.PROD.OUTLOOK.COM (2603:10b6:208:531::19) by MW6PR12MB8736.namprd12.prod.outlook.com (2603:10b6:303:244::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 19:24:23 +0000 Received: from MN1PEPF0000F0E5.namprd04.prod.outlook.com (2603:10b6:208:531:cafe::48) by MN0P222CA0018.outlook.office365.com (2603:10b6:208:531::19) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8398.24 via Frontend Transport; Tue, 4 Feb 2025 19:24:20 +0000 Received: from SATLEXMB03.amd.com (165.204.84.17) by MN1PEPF0000F0E5.mail.protection.outlook.com (10.167.242.43) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:20 +0000 Received: from SATLEXMB05.amd.com (10.181.40.146) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:20 -0600 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB05.amd.com (10.181.40.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:19 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:18 -0600 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a5dfc168-e32d-11ef-a0e7-8be0dac302b0 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=G1dWQ55yGyhX2IPksxhxz0rmE1dd55gBmAigL1wrDuBpOtqkxAHSbe9llkqiQOIFgmGASV+WTYjQKZWR6O0Yfaswo3JOeMr8KmgjfljakNh2nIzfzDJPaklVUd7ZZxhNSQbIMyQ3ZRfSRExCGDREKqgv+13ZV97G99xj0Gj3wc8wceK3JIgitHIkxV809ggfRoipxGvwDobZzLUDPEPZBPB5klb0smNEewbkMvM9LYgnK/bLys2zA2OanEkMyITywFv7oNwW0ZTRZE38XOG+T9nod+44kb4+86sgtZev4NQk+jtli+OnvIuXq4A2fA1EEU0t/6+MNLnZkCAcUYn8Dg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8Oxhmweg7AP+SCtQxJNnmxEnRyK7YMVCMD8+Qy0wThY=; b=yKAleUFjl09MFnzIsTYJxw4u0q78xlnE5shubhBuV4QwUhEeexPr75evH6Cy1OTZlGh8G0rCbGLt5iqBHxHeVqIFxZtsaRiSgU8IcUWptHFb5vD316NHGHeK4Oan0PVbSOjpOGZ04myyQfxGq2SYwXG6sRqFbl6WHldNumVRcnlAkh6O2IeXWgzLMrpMpI5BVbxFURMVOphJdfoh+WE70c2elBThh/ZT5BYIcgz+U7j275zFvVVySkTlC0WqYkNtkbjwhCIhWyvx4nVU8CWiaN4a5vstxSPwopEFMBYyzijzPTUbO1dlAlo5NuhdhVtLa78xoRceAC+zDYxRuP7uWA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8Oxhmweg7AP+SCtQxJNnmxEnRyK7YMVCMD8+Qy0wThY=; b=cN7/TmNzA2lX2zsaFYFeiVJ8gH/hX7HgSfV8K90BgO870WlkVwcVWLxDZdviAz/Sj+FmyISobELxRd3trStaUPis3kmxQLBMLl6UuZ+XHD7b7hReCn+SbpdjqgQzEmgmzi2YVanHwut472CeGC3RtK/1o9Tneu2i53ca9+rcbAU= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 4/5] xen/arm: mpu: Create boot-time MPU protection regions (arm32) Date: Tue, 4 Feb 2025 19:23:56 +0000 Message-ID: <20250204192357.1862264-5-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Received-SPF: None (SATLEXMB05.amd.com: ayan.kumar.halder@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN1PEPF0000F0E5:EE_|MW6PR12MB8736:EE_ X-MS-Office365-Filtering-Correlation-Id: 6a3b26c7-7231-433b-5bba-08dd45518660 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|36860700013|82310400026|1800799024; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB03.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(36860700013)(82310400026)(1800799024);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:20.4982 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 6a3b26c7-7231-433b-5bba-08dd45518660 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: MN1PEPF0000F0E5.namprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW6PR12MB8736 Define enable_boot_cpu_mm() for the Armv8-R AArch64. Like boot-time page table in MMU system, we need a boot-time MPU protection region configuration in MPU system so Xen can fetch code and data from normal memory. To do this, Xen maps the following sections of the binary as separate regions (with permissions) :- 1. Text (Read only at EL2, execution is permitted) 2. RO data (Read only at EL2) 3. RO after init data and RW data (Read/Write at EL2) 4. Init Text (Read only at EL2, execution is permitted) 5. Init data and BSS (Read/Write at EL2) Before creating a region, we check if the count exceeds the number defined in MPUIR_EL2. If so, then the boot fails. Also we check if the region is empty or not. IOW, if the start and end address are same, we skip mapping the region. Signed-off-by: Ayan Kumar Halder --- xen/arch/arm/arm32/mpu/head.S | 164 ++++++++++++++++++++++++++ xen/arch/arm/include/asm/cpregs.h | 4 + xen/arch/arm/include/asm/mpu/cpregs.h | 21 ++++ 3 files changed, 189 insertions(+) create mode 100644 xen/arch/arm/arm32/mpu/head.S create mode 100644 xen/arch/arm/include/asm/mpu/cpregs.h diff --git a/xen/arch/arm/arm32/mpu/head.S b/xen/arch/arm/arm32/mpu/head.S new file mode 100644 index 0000000000..4aad3c6b5d --- /dev/null +++ b/xen/arch/arm/arm32/mpu/head.S @@ -0,0 +1,164 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Start-of-day code for an Armv8-R MPU system. + */ + +#include +#include + +/* Backgroud region enable/disable */ +#define SCTLR_ELx_BR BIT(17, UL) + +#define REGION_TEXT_PRBAR 0x18 /* SH=11 AP=10 XN=0 */ +#define REGION_RO_PRBAR 0x1D /* SH=11 AP=10 XN=1 */ +#define REGION_DATA_PRBAR 0x19 /* SH=11 AP=00 XN=1 */ +#define REGION_DEVICE_PRBAR 0x11 /* SH=10 AP=00 XN=1 */ + +#define REGION_NORMAL_PRLAR 0x0f /* NS=0 ATTR=111 EN=1 */ +#define REGION_DEVICE_PRLAR 0x09 /* NS=0 ATTR=100 EN=1 */ + +/* + * Macro to prepare and set a EL2 MPU memory region. + * We will also create an according MPU memory region entry, which + * is a structure of pr_t, in table \prmap. + * + * sel: region selector + * base: reg storing base address + * limit: reg storing limit address + * prbar: store computed PRBAR_EL2 value + * prlar: store computed PRLAR_EL2 value + * maxcount: maximum number of EL2 regions supported + * attr_prbar: PRBAR_EL2-related memory attributes. If not specified it will be + * REGION_DATA_PRBAR + * attr_prlar: PRLAR_EL2-related memory attributes. If not specified it will be + * REGION_NORMAL_PRLAR + * + * Preserves \maxcount + * Output: + * \sel: Next available region selector index. + * Clobbers \base, \limit, \prbar, \prlar + * + * Note that all parameters using registers should be distinct. + */ +.macro prepare_xen_region, sel, base, limit, prbar, prlar, maxcount, attr_prbar=REGION_DATA_PRBAR, attr_prlar=REGION_NORMAL_PRLAR + /* Check if the region is empty */ + cmp \base, \limit + beq 1f + + /* Check if the number of regions exceeded the count specified in MPUIR_EL2 */ + cmp \sel, \maxcount + bge fail_insufficient_regions + + /* Prepare value for PRBAR_EL2 reg and preserve it in \prbar.*/ + and \base, \base, #MPU_REGION_MASK + mov \prbar, #\attr_prbar + orr \prbar, \prbar, \base + + /* Limit address should be inclusive */ + sub \limit, \limit, #1 + and \limit, \limit, #MPU_REGION_MASK + mov \prlar, #\attr_prlar + orr \prlar, \prlar, \limit + + mcr CP32(\sel, PRSELR_EL2) + isb + mcr CP32(\prbar, PRBAR_EL2) + mcr CP32(\prlar, PRLAR_EL2) + dsb sy + isb + + add \sel, \sel, #1 + +1: +.endm + +/* + * Failure caused due to insufficient MPU regions. + */ +FUNC_LOCAL(fail_insufficient_regions) + PRINT("- Selected MPU region is above the implemented number in MPUIR_EL2 -\r\n") +1: wfe + b 1b +END(fail_insufficient_regions) + +/* + * Enable EL2 MPU and data cache + * If the Background region is enabled, then the MPU uses the default memory + * map as the Background region for generating the memory + * attributes when MPU is disabled. + * Since the default memory map of the Armv8-R AArch64 architecture is + * IMPLEMENTATION DEFINED, we intend to turn off the Background region here. + * + * Clobbers x0 + * + */ +FUNC_LOCAL(enable_mpu) + mrc CP32(r0, HSCTLR) + bic r0, r0, #SCTLR_ELx_BR /* Disable Background region */ + orr r0, r0, #SCTLR_Axx_ELx_M /* Enable MPU */ + orr r0, r0, #SCTLR_Axx_ELx_C /* Enable D-cache */ + mcr CP32(r0, HSCTLR) + isb + + ret +END(enable_mpu) + +/* + * Maps the various sections of Xen (decsribed in xen.lds.S) as different MPU + * regions. + * + * Clobbers r0 + * + */ +#define NORMAL_MEM_SIZE 0x001fffff /* 2MB - 1 */ + +FUNC(enable_boot_cpu_mm) + /* Get the number of regions specified in MPUIR_EL2 */ + mrc CP32(r5, MPUIR_EL2) + and r5, r5, #NUM_MPU_REGIONS_MASK + + /* x0: region sel */ + mov r0, #0 + + /* Xen text section. */ + ldr r1, =_stext + ldr r2, =_etext + prepare_xen_region r0, r1, r2, r3, r4, r5, attr_prbar=REGION_TEXT_PRBAR + + /* Xen read-only data section. */ + ldr r1, =_srodata + ldr r2, =_erodata + prepare_xen_region r0, r1, r2, r3, r4, r5, attr_prbar=REGION_RO_PRBAR + + /* Xen read-only after init and data section. (RW data) */ + ldr r1, =__ro_after_init_start + ldr r2, =__init_begin + prepare_xen_region r0, r1, r2, r3, r4, r5 + + /* Xen code section. */ + ldr r1, =__init_begin + ldr r2, =__init_data_begin + prepare_xen_region r0, r1, r2, r3, r4, r5, attr_prbar=REGION_TEXT_PRBAR + + /* Xen data and BSS section. */ + ldr r1, =__init_data_begin + ldr r2, =__bss_end + prepare_xen_region r0, r1, r2, r3, r4, r5 + +#ifdef CONFIG_EARLY_PRINTK + /* Xen early UART section. */ + ldr r1, =CONFIG_EARLY_UART_BASE_ADDRESS + ldr r2, =(CONFIG_EARLY_UART_BASE_ADDRESS + CONFIG_EARLY_UART_SIZE) + prepare_xen_region r0, r1, r2, r3, r4, r5, attr_prbar=REGION_DEVICE_PRBAR, attr_prlar=REGION_DEVICE_PRLAR +#endif + + b enable_mpu + ret +END(enable_boot_cpu_mm) + +/* + * Local variables: + * mode: ASM + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/arch/arm/include/asm/cpregs.h b/xen/arch/arm/include/asm/cpregs.h index aec9e8f329..6019a2cbdd 100644 --- a/xen/arch/arm/include/asm/cpregs.h +++ b/xen/arch/arm/include/asm/cpregs.h @@ -1,6 +1,10 @@ #ifndef __ASM_ARM_CPREGS_H #define __ASM_ARM_CPREGS_H +#ifdef CONFIG_MPU +#include +#endif + /* * AArch32 Co-processor registers. * diff --git a/xen/arch/arm/include/asm/mpu/cpregs.h b/xen/arch/arm/include/asm/mpu/cpregs.h new file mode 100644 index 0000000000..bd17a8c75a --- /dev/null +++ b/xen/arch/arm/include/asm/mpu/cpregs.h @@ -0,0 +1,21 @@ +#ifndef __ASM_ARM_MPU_CPREGS_H +#define __ASM_ARM_MPU_CPREGS_H + +#define HMPUIR p15,4,c0,c0,4 + +/* CP15 CR6: MPU Protection Region Base/Limit/Select Address Register */ +#define HPRSELR p15,4,c6,c2,1 +#define PRBAR_EL2 p15,4,c6,c3,0 +#define PRLAR_EL2 p15,4,c6,c8,1 + +#define MPUIR_EL2 HMPUIR +#define PRSELR_EL2 HPRSELR + +#endif + +/* + * Local variables: + * mode: ASM + * indent-tabs-mode: nil + * End: + */ From patchwork Tue Feb 4 19:23:57 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ayan Kumar Halder X-Patchwork-Id: 13959686 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 59DBBC02193 for ; Tue, 4 Feb 2025 19:24:43 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881805.1292009 (Exim 4.92) (envelope-from ) id 1tfOXD-0006Md-8z; Tue, 04 Feb 2025 19:24:35 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881805.1292009; Tue, 04 Feb 2025 19:24:35 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOXD-0006MP-4w; Tue, 04 Feb 2025 19:24:35 +0000 Received: by outflank-mailman (input) for mailman id 881805; Tue, 04 Feb 2025 19:24:34 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOXC-0004nP-0F for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:34 +0000 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on20612.outbound.protection.outlook.com [2a01:111:f403:2414::612]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a849aadc-e32d-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 20:24:31 +0100 (CET) Received: from SJ0PR13CA0211.namprd13.prod.outlook.com (2603:10b6:a03:2c1::6) by PH8PR12MB7254.namprd12.prod.outlook.com (2603:10b6:510:225::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 19:24:27 +0000 Received: from SJ5PEPF00000207.namprd05.prod.outlook.com (2603:10b6:a03:2c1:cafe::a8) by SJ0PR13CA0211.outlook.office365.com (2603:10b6:a03:2c1::6) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8398.26 via Frontend Transport; Tue, 4 Feb 2025 19:24:27 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by SJ5PEPF00000207.mail.protection.outlook.com (10.167.244.40) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:27 +0000 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:26 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:25 -0600 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a849aadc-e32d-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=nBAkJp9p0A5slT0L1n3QtPxYoAeBnyhqEgynCltsgvHROuDbeaGD7cqcboKXChgx+iOiRDSZCjnuOFabTzekeR+yeO3j8UBQ4u52aeCsMeBoS/kTUfw/dtr8lQ6aacTw+Ongw3mrknVYHItsn63YgJNYbl+43tRs/5Mqi5eB8OlHpNNFf3TzEFWGqzId4oTzqKDCqUeyKdHlB/b1HZcOVBjHRu6JzW0zlKIh9y0Q58GN0fzvJzuVTrxKA/grURSr7PxyX4IlOzd+ZKx1rADOh+46GbBt7f1ZgdxFL8RQ0BpSRZhDVgMn4n67k2tGJBZGvR2pRVvoPOGsCevoK3667g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XsKT5QiKx02FP+fMWtE8QG8luAAR91pZZ+lj1Or0wn0=; b=H6jb6+8sUJmGSl/niKxUV+BfEI657q9H0amRae853XWYqOhS0k3lcQde7av5yRBz+NrJt1io1/fonLWEG6IzJGGa4p7v7MyQiyXU4jozELIAAQggIdV9RczkoSJarJB+1t85FyxgItCPp4hzTci0Vx17RTjrOMBvAF64kN2F2+yIlxZS9nmPKPsmrQYAEoMdGGyljHfP69gnlUJ1YLIwSfY5nwmZkCB7P8B0yV2YzM3eeBfuv3qnOyaKE9UE9WH6UFCSx4XG9rsHcgro8n/N3KWYDsamF41C9om7zG+yGEMTYSSXSd5O9qfFv4dNcmfpC+F9vT/aoy4v46uZr57ARQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XsKT5QiKx02FP+fMWtE8QG8luAAR91pZZ+lj1Or0wn0=; b=qejvhVaTzswHBA3sJhMsnE7pv2/etoBK8fozdnV6D0TsvefHw8uWseNHFJFCXpfNQicV0yZ4X+RpIAenb6fuXKVQ+1n1mCak+Any3rD4Hqs+u5gvVedBv6Su6G64kU2Yj3bjAep7a7M8MDPRrisR5He0T37BSKOiJlHjRk4JwJw= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 5/5] xen/arm: mpu: Implement a dummy enable_secondary_cpu_mm (arm32) Date: Tue, 4 Feb 2025 19:23:57 +0000 Message-ID: <20250204192357.1862264-6-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Received-SPF: None (SATLEXMB04.amd.com: ayan.kumar.halder@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000207:EE_|PH8PR12MB7254:EE_ X-MS-Office365-Filtering-Correlation-Id: 715e9d66-0ea9-4341-e2f4-08dd45518a52 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|36860700013|82310400026; X-Microsoft-Antispam-Message-Info: 8FZnHPCmRBZOlba6LpL5XCzuv8Fk8UNfpg9Yxk7Mra4p0JzREMxsjFiGoefaYYrmPOxzmsFz1yfvvPDQqj+Fv5M3VEz5Pnkl5pOar1dF3kUWqBH/NnZ+OkxMJHHlWQvH4fX5emGPWMGw8TScptJL6bqQOz4tBgZRmfAKtrtSzOiEoqs8aVQJYcraR9ECB6w9Ykn4Vw2viA7Tl98hBdQ7y33gAVC9/DR7lMm0PxpiV7XvRyW6s9HWR0O6RLnnmOt/tnW2VX7m/ppTRPLu2gOq/pHw+Np96IWGmF15p04nBYcaMCB30tjpMT4v2e9MGvGF0zfTLCx8XXtUa2rYDzZ1PWK2x64634elHbZ32VNKVqcHjfBQlRTJHV4teKwMQ3HQ9TS3Xga8sD4FgUMkM4ndy1r+PHu4xC2uQvkEbgbexsejt7DkYLXTVUj9J4ejwI8+xWctqnplxny8vBwD2qJS/TeDVI8cXR6jQ4+OkRlQLEKOFPKBLW0c+bN6UA1IkIFf4/LlcCtilwPBLUy2UajBG1HCYVltt3WDHKC7baH2Da1S+qF8dA+w+n8n5sSXzKbvlqab39J+xkxYddEPgIZ8MCLg0gc4vLq74zZU3o/JCNDVypEQbUFFGCF8Q9Ihde/+B1qsa6QB68nutDR3wpXvzJ5Vwf75Vdt+f59QlJ5QBebCfKhLZoZ1+d2tv5fEh/79oJwb5GiW1ZynB28Twawbyd0mpV8ws/Eor24+JV0d9u856iXZrfAF7Web7U4eCTUI/7BlH+Pa7yGk0CPx5Q9UxY6l2ueRm9pVLkPZ4ZgU0vWTHQ4WvQ2AX5Sv0nPhQPQAbv3W6am2nvUsDxoG+9NxOiWCPpSfaiiCzG1orJSue9croicQAO3TP8I+DlrbN4OVO/Z6rb681jG8ZDZjw5mpIdR4cp5/eyGnURiRbLYJObhJdVW3iBr65MX/sLPjBcY6Bok39FOmFZyHlENFEUMM8BKNDmScKT/pz7K0lXOf6N30d3TTpN5udimFXx3I6FLTbkjBFm7tGDNHsX10M0GySJ5TzNxBRX/+j9yFud67t32w34Qq9NvLBMPf3LuQ5DL7BPbzULNSQG7ET58Al/WIFjTLNzTlE9o5E4WAu9IFUzQNALJ4fTDuQpJhUt25BG/jBHkOhs6p7Nkzy7E+CydaIc1gzZ1gAG609kdJO0YTe8EBeH5VNOh+7nrxddO+ayzZtn7k75b3Blj+Q1+z2kSmRjwY5BJn8oOPZyXXuJLRvgILKm9TsJ5h1pVw9dbYU7oQ5iOUWKmt7M3iQWxuNt0r7QggMXZsBTf54BTCX9vxBBujABX0Q+rbG8BblTba5mOCMEbkdnwcdg57HHOmXorbR+0fgjrhnul7agPBbI6Lamcp9trRPc79Nr/zTplshvQlivumFqeEfyoEg83UIz/liWbwgL+fX9ealun5xXOH/XvCc+AuiKM6lLNP3YLfPjCwtdAtSLk04VgsVDjxxYElu7mAUxmpOcygVZKFK3EPywk= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(376014)(36860700013)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:27.0271 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 715e9d66-0ea9-4341-e2f4-08dd45518a52 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000207.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR12MB7254 Secondary cpus initialization is not yet supported. Thus, we print an appropriate message and put the secondary cpus in WFE state. Signed-off-by: Ayan Kumar Halder --- xen/arch/arm/arm32/mpu/head.S | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/xen/arch/arm/arm32/mpu/head.S b/xen/arch/arm/arm32/mpu/head.S index 4aad3c6b5d..49ab5fc9c0 100644 --- a/xen/arch/arm/arm32/mpu/head.S +++ b/xen/arch/arm/arm32/mpu/head.S @@ -156,6 +156,16 @@ FUNC(enable_boot_cpu_mm) ret END(enable_boot_cpu_mm) +/* + * We don't yet support secondary CPUs bring-up. Implement a dummy helper to + * please the common code. + */ +ENTRY(enable_secondary_cpu_mm) + PRINT("- SMP not enabled yet -\r\n") +1: wfe + b 1b +ENDPROC(enable_secondary_cpu_mm) + /* * Local variables: * mode: ASM