From nobody Fri Mar 14 06:13:54 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1738697081; cv=pass; d=zohomail.com; s=zohoarc; b=AtiTQ29E+0lvBb2hvzjWcdK0+fdu2WqV7otYUcX6CvDSouynxiAS2JyEcUIZcxx5aXFikDQiutEIUAgq8werkrX4CKrm70nK48yPeu5COZJ71fxpUC+V9ag3s0+waTR5uqU12SOrJNYjX3Rvl1p4LLAnMmUzbr0/jNHN39CRebo= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1738697081; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=oO+GghfFL4JgTxoRWMrv1S6PLgVtgiVvBOKgB4uNX/M=; b=HOo34V2KAQhJ+CphDY6GcpXIXwpHey1pqp3ss8z0rhf41LCAxnxcezKLKk8sQQwcRKeKRzYP3bhysXms5txXfkB7kV3BHvrl6D1UCuGU9feIo0boU0nxHWCBTrvRpjDWL/v3AMY9MXC2nXApNaSiP+QNDKylxb4cUlcMQN/a3GI= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1738697081335448.60387967453164; Tue, 4 Feb 2025 11:24:41 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.881796.1291968 (Exim 4.92) (envelope-from ) id 1tfOWz-00052V-3y; Tue, 04 Feb 2025 19:24:21 +0000 Received: by outflank-mailman (output) from mailman id 881796.1291968; Tue, 04 Feb 2025 19:24:21 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOWz-00052O-0q; Tue, 04 Feb 2025 19:24:21 +0000 Received: by outflank-mailman (input) for mailman id 881796; Tue, 04 Feb 2025 19:24:19 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOWx-00051v-RD for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:19 +0000 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on20616.outbound.protection.outlook.com [2a01:111:f403:2417::616]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 9fe03c76-e32d-11ef-a0e7-8be0dac302b0; Tue, 04 Feb 2025 20:24:18 +0100 (CET) Received: from SJ0PR13CA0214.namprd13.prod.outlook.com (2603:10b6:a03:2c1::9) by SJ2PR12MB7895.namprd12.prod.outlook.com (2603:10b6:a03:4c6::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.25; Tue, 4 Feb 2025 19:24:11 +0000 Received: from SJ5PEPF00000207.namprd05.prod.outlook.com (2603:10b6:a03:2c1:cafe::49) by SJ0PR13CA0214.outlook.office365.com (2603:10b6:a03:2c1::9) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8377.13 via Frontend Transport; Tue, 4 Feb 2025 19:24:11 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by SJ5PEPF00000207.mail.protection.outlook.com (10.167.244.40) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:09 +0000 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:09 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:08 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 9fe03c76-e32d-11ef-a0e7-8be0dac302b0 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=x3FYZ5/1vPER+8lA56j6wwtMQDq98QxLM8FgLPxjtgQiO/z7cHs0AiFqRW4CQ72Vlcu0FjLyFP+Ce1iD7Lx91ffJzx9J8P/2z+HyBpHrWRirV1w4jgGyHF0QlQVgUmbULkqHXLuQIOt63dSf5B5lUdz5pD5j7FcvTCEYu5nX4MfQJ9ObXqo7ybwdXw6MSJ5wOSQvYNHA0VkbipM6oTlrwxNMh3y6d+vog2JpzvVdgZMu+q5QEdvIZN108P/U5HUQTfRB6mQDmsNb1UCPqj4gokmEiozxjHmbZ8NOkDV91LGKTsmXWz5KY95/CbknrrX+bw+Nod6YbXqm7VDEoRm/Tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oO+GghfFL4JgTxoRWMrv1S6PLgVtgiVvBOKgB4uNX/M=; b=OIyjyisM1Rwjog7sj8o+2nkXc0ICKcQu8141MyGv64nbUlS8OaFbIxalBQdXpXwBSMH5oP0rV8y8T/w5Bi6GQQLKOdY3/1VP25l+rlTAD6lVgI5KPnj+Q8SqsYOoa57lZhV2qpvVBrdZQcneBQ/KeZ1jxGTARB5XG9+k5Klc3rAhS7nKLuHPYLBLcDkrD51NbJYlAD7ZTgicguR52JU+Dk1ay2LaAkYuhgOReQn3vL0evegm8sMjOR0oZiiGWGpRBURks8TqJlDp2jzFlrAhg3KxvU/g/5qRFoir01eq3n+lbdovOCfpqXGBAy7tbi63J/2xr7w8J2gJ6BgzydcEdw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oO+GghfFL4JgTxoRWMrv1S6PLgVtgiVvBOKgB4uNX/M=; b=3T6GYIck51xgb4cU5ytPCi1YW/0/kg3bizGdfDJCbGbXYr0j79l23TeMF6QrUkD6w8lRYf7GrWmrINjeCk+tHjJH5jpmK9J4+2jbzMiBruL7xbh6oIpJf5qpsTqayYLDGx3c3/8//YSsiSfk5YLn4JwT6YcCcv0AxaicZPxcdOM= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 1/5] xen/arm: mpu: Ensure that the page size is 4KB (arm32) Date: Tue, 4 Feb 2025 19:23:53 +0000 Message-ID: <20250204192357.1862264-2-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: None (SATLEXMB04.amd.com: ayan.kumar.halder@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000207:EE_|SJ2PR12MB7895:EE_ X-MS-Office365-Filtering-Correlation-Id: 3a8470cf-33a0-4c0c-f6ed-08dd45518024 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|82310400026|376014|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?+b44YURIBvIJuArbvq0Bk5BK4QnMZ6bjulVClRoYXZKhENfL71KH6IfDyvqT?= =?us-ascii?Q?SwCiDk163+PJyL99NY+PIXlui5QIwJCtBZsZsIZiwpRlKIYXfGyHIhHTfR+U?= =?us-ascii?Q?cxFDjuQTsqYHmDp0NBD5RB3TfloM2gYiLfTBPeMidstxDYz+hQFVVs+54gLs?= =?us-ascii?Q?MPlngeYfwGCHmeHNBhp04x4os0jUYREunQqmjGtHdshhbq6MijAyXaBPRitV?= =?us-ascii?Q?5s93NCiG1ICz5SBUe5R/0R435iA1aFV8lm/8IJKkPMW9eCwCu73uL/b8gj6F?= =?us-ascii?Q?WSrAk/JPiz365veVcBIsQ5ruqMEnLa98ow9Z9Az5uSWTNaqJpis5Sw6dkfLU?= =?us-ascii?Q?8A71t4eSkJfhPsdncrsV7K/wJmtpj+YvsV3DJgvZtTh/BAp1Pp6l9zJwck7R?= =?us-ascii?Q?nUYvwmk0/MWJK1SytUA/bs0cv0fRZdtZ2sRZbH4ZjdZPuiFQ1JmCG9ToHvOw?= =?us-ascii?Q?76A8MrYnG4SO478eO94sMBvxKh5/3xveN6RfDc7dVAXKKXPEQlvGzyr7viX7?= =?us-ascii?Q?vSqhx0QxmvdH6xA85Twf4s/DBEhyeQ83ctDJFV8WzGoPskdMy7DNCRocQFIr?= =?us-ascii?Q?cJKRus9EO7I/Eo5fJO1cIjPO5mhpjlQrBvTgMdPkvzLTvoPuZU1MObTRWyjM?= =?us-ascii?Q?ien4cz6b6NR0IiPmUNiiYGZ8ausjHHaKxHlD0oJEKuP58+3eePDlukrSIIb4?= =?us-ascii?Q?IyjqKa3Ud4SEatQjVXyLUn5GE9GUVuN47J2XhA7aL7wMGL2OQFM8RDQGplQq?= =?us-ascii?Q?/mTUw5apXJ9yzVOvD4V/tYOUShJ65G7iabW0QKFgpnjsr3HSRBomeYRwhddu?= =?us-ascii?Q?sIz2DVcCGfUtK8N47epX55XE+zXSzGvWWVu0s2rUK7Q4OMg65qgyNxKO1BaD?= =?us-ascii?Q?qo93gVi+l+xzadAZW40Hj1wJ0FzfJ00BPf53KbP5/9g1XsXcyFDMTSTL1jwQ?= =?us-ascii?Q?qWcgQmpX0Hb8qBoeeKkKwS2AgJej4E5MkOl8zuglWdRHPAXvUNAsjld7MB63?= =?us-ascii?Q?Bmlxf20IJzpNBJZMJMtm66r8fBT0kdMGOzLLmoYmcGx3yvnvjcn9mlb4JJRg?= =?us-ascii?Q?zvd3eAFbGoVLE6uneTZgq0lBQOjtTSe9sJoOUhIlW4Iu6gwbQBFVsAtk5WHz?= =?us-ascii?Q?ARr7q7W6avRpKqfLfNa+QwagvhNjRWFI1V8R/x7zw2RZWashFN0YxDh34PEN?= =?us-ascii?Q?WKFRX5S764TcG23p8l72RdCoZkkUDgHPudWZVmhG020O4hnfPI7rIrqrMKsf?= =?us-ascii?Q?w2fW6QDpT2t8J7vUzn+mSUagTr2Hn7ez5DjTjIaqOG76igxTkbhwehurpR8a?= =?us-ascii?Q?3zjiYCsfU30zEM1XmlTJZeWqENe4Getd7O6kEm7BSSfUWPukkiAtNI4qcRMF?= =?us-ascii?Q?oPmIXctelCKflsEiqVNLKqIl2dxssVsXe+qzHiygGQG7564QDtR5OaM7PR8b?= =?us-ascii?Q?jNF+5D6kil/OrMyoyaU+x2hMTDeoxW2BYuHxfOODH8tCrhe+/lxWJxPQ4H0X?= =?us-ascii?Q?+znVAxyyKCS3tVs=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(82310400026)(376014)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:09.9489 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3a8470cf-33a0-4c0c-f6ed-08dd45518024 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000207.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR12MB7895 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1738697094301019000 Content-Type: text/plain; charset="utf-8" Similar to "xen/arm: mpu: Define Xen start address for MPU systems", added a build assertion to ensure that the page size is 4KB. Signed-off-by: Ayan Kumar Halder Reviewed-by: Luca Fancellu --- xen/arch/arm/arm32/Makefile | 1 + xen/arch/arm/arm32/mpu/Makefile | 1 + xen/arch/arm/arm32/mpu/mm.c | 15 +++++++++++++++ 3 files changed, 17 insertions(+) create mode 100644 xen/arch/arm/arm32/mpu/Makefile create mode 100644 xen/arch/arm/arm32/mpu/mm.c diff --git a/xen/arch/arm/arm32/Makefile b/xen/arch/arm/arm32/Makefile index 40a2b4803f..537969d753 100644 --- a/xen/arch/arm/arm32/Makefile +++ b/xen/arch/arm/arm32/Makefile @@ -1,5 +1,6 @@ obj-y +=3D lib/ obj-$(CONFIG_MMU) +=3D mmu/ +obj-$(CONFIG_MPU) +=3D mpu/ =20 obj-$(CONFIG_EARLY_PRINTK) +=3D debug.o obj-y +=3D domctl.o diff --git a/xen/arch/arm/arm32/mpu/Makefile b/xen/arch/arm/arm32/mpu/Makef= ile new file mode 100644 index 0000000000..b18cec4836 --- /dev/null +++ b/xen/arch/arm/arm32/mpu/Makefile @@ -0,0 +1 @@ +obj-y +=3D mm.o diff --git a/xen/arch/arm/arm32/mpu/mm.c b/xen/arch/arm/arm32/mpu/mm.c new file mode 100644 index 0000000000..0b8748e575 --- /dev/null +++ b/xen/arch/arm/arm32/mpu/mm.c @@ -0,0 +1,15 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ + +#include +#include +#include + +static void __init __maybe_unused build_assertions(void) +{ + /* + * Unlike MMU, MPU does not use pages for translation. However, we con= tinue + * to use PAGE_SIZE to denote 4KB. This is so that the existing memory + * management based on pages, continue to work for now. + */ + BUILD_BUG_ON(PAGE_SIZE !=3D SZ_4K); +} --=20 2.25.1 From nobody Fri Mar 14 06:13:54 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1738697077; cv=pass; d=zohomail.com; s=zohoarc; b=Cbf8L+8cDNIj1hzkFqJsorIgtLxdnDXcsTjr+8LrB9c+MzFulW2GQoHfPsALrlQsLVmnhpkMJHpd29piUBJzKQUBm/jgdaVEXuRcVe0aawWJJXgicdulwQbs8OFzdZymhC5XPoYxP8OKNuTPqsRRg212H93B9atPYw1UTp+oAPE= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1738697077; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=JaDj9A1dHrYS2o7s2ZFeD6vHr6ZkJxFrI1AZiL0c6gs=; b=SvMapnmXq4eCdc1wB+FiW4DGJGP1qxr7ABlSqwrySCplDGMrf3wk4Ee5nSSknDnSdPKMYAOkzEOQttu8GTULTlLsHCxxgJ4r0ceYetQiOWTNVysAuAqkW1qIPrQ13jiR3Dx3yqQVKjzNQHr+36lGhHPC+KrGRyrjtKRAGiqy2qc= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1738697077870849.319233032485; Tue, 4 Feb 2025 11:24:37 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.881797.1291978 (Exim 4.92) (envelope-from ) id 1tfOX0-0005HS-B1; Tue, 04 Feb 2025 19:24:22 +0000 Received: by outflank-mailman (output) from mailman id 881797.1291978; Tue, 04 Feb 2025 19:24:22 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX0-0005HL-7s; Tue, 04 Feb 2025 19:24:22 +0000 Received: by outflank-mailman (input) for mailman id 881797; Tue, 04 Feb 2025 19:24:21 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOWz-0004nP-F0 for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:21 +0000 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2062d.outbound.protection.outlook.com [2a01:111:f403:2418::62d]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a12ee7db-e32d-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 20:24:19 +0100 (CET) Received: from SJ0PR13CA0161.namprd13.prod.outlook.com (2603:10b6:a03:2c7::16) by MN0PR12MB5812.namprd12.prod.outlook.com (2603:10b6:208:378::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8422.11; Tue, 4 Feb 2025 19:24:15 +0000 Received: from SJ5PEPF00000203.namprd05.prod.outlook.com (2603:10b6:a03:2c7:cafe::88) by SJ0PR13CA0161.outlook.office365.com (2603:10b6:a03:2c7::16) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8398.25 via Frontend Transport; Tue, 4 Feb 2025 19:24:15 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by SJ5PEPF00000203.mail.protection.outlook.com (10.167.244.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:14 +0000 Received: from SATLEXMB05.amd.com (10.181.40.146) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:14 -0600 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB05.amd.com (10.181.40.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:14 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:13 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a12ee7db-e32d-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FR8O5W0HqihgRki0cgG+k7jj/qvaHwCnJgq2D0exTldrwbZcUbaH6OTjUfJuvH1YZvJQcfrBo9zdSY+I3uBLADGdkT3HqJGRrfsNbuTzxjzbiR1Uxa2Qdf/a0D1ergn3vpXdLa7tMfg9cqdk9R0xKUHIwFKGIrYr4wttra6b32SudPTz6AnyqYw/yDTc0XfOIbdgR8MQJWOM5HSTZoNyNfSzMUcDp6m4Wo4hg5+97UC6mqShiLKddGaqJihNuVHtHxv3X5yeQgrg4mLAb+shBwQPi+DXWhPQpdXZtSWo9pJkQFV5YQxVaIOSTwqCKPbpz0aSK4dl3h7RBqbJhpIytw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JaDj9A1dHrYS2o7s2ZFeD6vHr6ZkJxFrI1AZiL0c6gs=; b=n2us8eId2FNCDQfHRYxBaSqb+PPSI+rVfGdaCp2H2XNMDHgZK5UxldYQjlElEZMMht/hYjwAwxggSL+eARDsDknhrwc4ePd7yP3HGAAvY7YSfXc3w9rmbbws67SF/EJpkB9Wn1iSAbnGQz6Tpl5y0CPg0Vu1XQXqfks2D6cFaZIPSIaBpCY2aCNApvsV/p8zCB2A5HWWT1iAxyNhU4ed/PoYK6WNa0DXskN8Ql1HKuD5cIIsWfCWEvrAUjco6xmPv//DXJVgcF/1gRmDfQ+x7l1SKr/1dVGTfWjMI8ywX9DMeBVmAoxVyuNZpH8p+fchJfgWSk/65dmUW7sK8CKlJA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JaDj9A1dHrYS2o7s2ZFeD6vHr6ZkJxFrI1AZiL0c6gs=; b=lMP+12Iuh95I3H/hVCF6HK8d6dCVpMbf4GxKdEhfYVO0e+vUpw/u3bgVvnS3Jf2LOZSnguP8gg+V0zaep2dLpsk30jq/xJQjhGNsvzGdaBE5sUbZI8YTXX2p5KP6919qNg0R+T+nEmvyulb42Gx8Hivn/8or7TTMGsvHhCMopnE= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 2/5] xen/arm: mpu: Enclose access to MMU specific registers under CONFIG_MMU (arm32) Date: Tue, 4 Feb 2025 19:23:54 +0000 Message-ID: <20250204192357.1862264-3-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: None (SATLEXMB05.amd.com: ayan.kumar.halder@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000203:EE_|MN0PR12MB5812:EE_ X-MS-Office365-Filtering-Correlation-Id: 839b41fc-e994-4f18-77c1-08dd45518327 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|82310400026|1800799024|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?KfpJ3609XT3ml9YvxDCoXhveZm8IkAoSiCVz9xJbW3MZCLWlK6D8YBtWLOUA?= =?us-ascii?Q?lVHGO92dlp/7evs4ulsUqsWiPI77X5E3KYuAruq/6Uun4VAW8OaLk/vR72Sq?= =?us-ascii?Q?EO98Y9SVEIaX8K9HILTK9shGhFDneU61gfrcoPkA000wAghllN05XvZlTwyk?= =?us-ascii?Q?YBj/0WNpdC8zKvilC6j0uA64r/YyqbybTnqcX1KZMjWfuP8zbwNF0ybg1JqS?= =?us-ascii?Q?94rejqZueUkrYjIeINKfTRIvAWbv1Iu4queheO9PLzxBpNSaSBbO3tQAKAdw?= =?us-ascii?Q?jR+2wzslcQmQm+psuFqGjeuA33rqvLE1dpC7Mhc4j4xi3WNHs+F9RJLHGQTu?= =?us-ascii?Q?h1FCt+vxBuzUD5zLjEBXS+/PFvO2kTFxByauAFzMhXWRprLLgHtF4VZIF5Zi?= =?us-ascii?Q?HKV29b570XlUvjtYjPz9TLTfP9+eudIis7y8u3JAOyvrscAh0w5lOrLC7+kw?= =?us-ascii?Q?7nEAEwDdIRQ9qsnXTCXsdFzl6mGQ2OcQ/XyMwBxxytf/Uh9OTnRcOsjNa/Ic?= =?us-ascii?Q?e02zdXRNCUioErXpXBppoTGcO0nt2uPwJlnTdmYO6g9ve5HE6j3etHt1ybOi?= =?us-ascii?Q?JiApTcQU529YjtuJAl/CQv3vjBNIL4++YjMAJrqYXCd1JmVo0GTHfLJ85HFL?= =?us-ascii?Q?tXDHtI+FbyxOV7gfzW4iLCBNTg+V76QoH/ywqtnSlrnLJ/6t813zL6EWFrhi?= =?us-ascii?Q?XBzSlnfFhfeyv+7mmB5l1bqGtFsiLIKqxfC7MGLsvzfPbac3U/nYtP/QHBbg?= =?us-ascii?Q?Pm+wuJssjl7aTMbt2aTJu0zcmLctfHJfPCPKeLm0cgo9J612Psrh++zuKJ/g?= =?us-ascii?Q?N0DaGZ+FsoUOtmmvfLijBtYfVC6xyhhBPK0q2bM6Up1kPL3xh63dCsUw20eP?= =?us-ascii?Q?bug1hx/bdj0drhxU7oUrqIACmrIjW6aadwFAxgi7thul0LSIJKPqN1jPHZUn?= =?us-ascii?Q?0M7cMzCd9dHz3lh6sjqmgZcPMbV9LM/Z+bzcV5slcq3+iCIn1CHGgpuvZV2J?= =?us-ascii?Q?x5vx6hZTU2YGI/IiwmD33oQ20fT4vwzv60ZetKvcwKC2g7TANZI66NC1JlxR?= =?us-ascii?Q?Hyyic9P92ThG0hzdmlfcROGXGg5Yf8tEB6iCrUz65XC/WFUNFXnRtu4WoUuF?= =?us-ascii?Q?hsIjKvnZwqy56KNNGGwVN1mhA/TJ23TGKY7GpnXJ7jApVp1QWKNstrIlFjvM?= =?us-ascii?Q?IPP+9jp5ogrw0sUUD5rlSZrjH5eI94yGx4cuaI/xwAtRHxQtp263A+5VhlBr?= =?us-ascii?Q?kBfF2Ctk04v4EBze63YpMF7hB8/mAxaVg8j7jKRzDj+2SPuzwmGdJHPHCV9d?= =?us-ascii?Q?v5qBy2fh8dQfjrzii/BbOi4mwo4jCiuDDl90ZVo2zSrVUHi5/Fy9vSqPnMyq?= =?us-ascii?Q?POisfs5ErbPMYmlOBdDEi3Kc5jMnxlqy1I1TsoTQvOqulmAOseDcMqIukm5C?= =?us-ascii?Q?TE+2CyRRjSy3X1xdbCaIOGdLt2pdUlTnW19WnXaO2ob8uENd/L2v/ignUWh7?= =?us-ascii?Q?gU0zRKgNjWDtJ2g=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(82310400026)(1800799024)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:14.9829 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 839b41fc-e994-4f18-77c1-08dd45518327 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000203.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN0PR12MB5812 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1738697080721019100 Content-Type: text/plain; charset="utf-8" All the EL2 MMU specific registers in head.S are enclosed within CONFIG_MMU. Signed-off-by: Ayan Kumar Halder Reviewed-by: Luca Fancellu --- xen/arch/arm/arm32/head.S | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S index 4ff5c220bc..1d0f84b18f 100644 --- a/xen/arch/arm/arm32/head.S +++ b/xen/arch/arm/arm32/head.S @@ -224,6 +224,7 @@ cpu_init_done: mcr CP32(r0, HMAIR0) mcr CP32(r1, HMAIR1) =20 +#ifdef CONFIG_MMU /* * Set up the HTCR: * PT walks use Inner-Shareable accesses, @@ -232,6 +233,7 @@ cpu_init_done: */ mov_w r0, (TCR_RES1|TCR_SH0_IS|TCR_ORGN0_WBWA|TCR_IRGN0_WBWA|TCR_T= 0SZ(0)) mcr CP32(r0, HTCR) +#endif =20 mov_w r0, HSCTLR_SET mcr CP32(r0, HSCTLR) --=20 2.25.1 From nobody Fri Mar 14 06:13:54 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1738697084; cv=pass; d=zohomail.com; s=zohoarc; b=RsDKyz/mm1rZhg11ap9C/87f8O4dNmKrcp3fIjsMeySzHhITALr/nX1JAoH07SsPxPAve07Udra/wPKc5ryqSfE3jT4/P2xD/X+zXCV/FpT4oEFG8OahpFh2B71cR9P+ErRnRplgZbIoZ04enLp3aO+hNQjg4J/kS5vDqj+yuwk= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1738697084; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=h5IgUIdldYNT/Kf679Yr7TCLDE1Py9MfCUBypmTOTtk=; b=JlbgpzHDu2QSnq9ToVMJJkEu+TrWvibKEp6YvkLGPzgf3EaHmxWSzoJgg2nkH1RwmS6vuxw7kNCCn9cX+2S1UAvfZFLZ9XoTqXp/N9tE/rM6ZLc/KpvuMkx71lGBS7KnRaf5wBxdrqoCE4s321gXfu0FpUNrK29fbYpbEoVJ3MQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1738697084641870.8579763101508; Tue, 4 Feb 2025 11:24:44 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.881798.1291989 (Exim 4.92) (envelope-from ) id 1tfOX4-0005aj-OV; Tue, 04 Feb 2025 19:24:26 +0000 Received: by outflank-mailman (output) from mailman id 881798.1291989; Tue, 04 Feb 2025 19:24:26 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX4-0005aa-KO; Tue, 04 Feb 2025 19:24:26 +0000 Received: by outflank-mailman (input) for mailman id 881798; Tue, 04 Feb 2025 19:24:25 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX3-0004nP-CK for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:25 +0000 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2061e.outbound.protection.outlook.com [2a01:111:f403:2416::61e]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a3162a05-e32d-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 20:24:23 +0100 (CET) Received: from SJ0PR05CA0135.namprd05.prod.outlook.com (2603:10b6:a03:33d::20) by BL3PR12MB6547.namprd12.prod.outlook.com (2603:10b6:208:38e::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.25; Tue, 4 Feb 2025 19:24:19 +0000 Received: from SJ5PEPF00000206.namprd05.prod.outlook.com (2603:10b6:a03:33d:cafe::77) by SJ0PR05CA0135.outlook.office365.com (2603:10b6:a03:33d::20) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8377.13 via Frontend Transport; Tue, 4 Feb 2025 19:24:19 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by SJ5PEPF00000206.mail.protection.outlook.com (10.167.244.39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:18 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:17 -0600 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:17 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:16 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a3162a05-e32d-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=jBfyd9AX+zwIHzNBkiycoNwjsZulRplPXn7Nw0WdQmBkDrTHSMQ3g0CYsCqDbXGioH9YmdWl5KUvntJ/GIJ62temNERq2PDkOWoZU86fkGiWpI0E3uCEbvYEz0zvts2aT1ljY7psRG8v9/1z5cC+iJ2X26QpwXIGSWeGltbsRw3kqHokPzjJ9CXzwJQ9eudYNXt7Y2vvpS3LUMZ5Deya0Wsqf3C60wd6CshesPamyK1upbYzDFcg9fBlzsU46/Vgaj2SJanity9ncDtrZGLtjPVDqnDn0UmUvnfRA1z7cPMAzcNDSKzFVrZ4USQIFvej3MibRARppAkjIkonRIxRfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=h5IgUIdldYNT/Kf679Yr7TCLDE1Py9MfCUBypmTOTtk=; b=oMgvVvDsgS9h7ACHC8wnTXihbskWiLUJGAvPDcuPGDls3bwfDiqUzzl6bg86wfOtEr5ZnvEZmx/xy1hW9ioBNSX9rWTBoz/bufHoJjcjvWjo5A0Zfh6wB4tKQDQUJ4bjMnfzihZJkVnmHk56cX7Boa5W5u7UUGV/Dt4JgyDXH9B2lY6FPrJOF+kExwIcgngduZiOix4HwsloXY7Cq4jh0YezLkkZqtRjzCMIAZebd+Cxcz2E4IBR3EXreFA7LPN7qp6ij1lgCCqwhafjGZds+n6w5EP7gcV5b0Rik8RL295mWxXR20CXJ4KPZrusr1GsFnOoqnHhAFS0uF+PMYCX3Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h5IgUIdldYNT/Kf679Yr7TCLDE1Py9MfCUBypmTOTtk=; b=P5pgvC4+ElcySVqZyw7wnhgF86OrNGxOU9lXycv06r6ErORJE+QBjcyJylL/th5ZUFgH8bQ08SPx9T2a7cRtjFNxuWkoi1HaUCUzMRJmUkTyZgVSYoQOfehiR3ZDFPJiTwpAXxLV4vxBDE5N+yAYwen+fuLzWh+pNJ2ejvWvnMU= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 3/5] xen/arm: mpu: Move some of the definitions to common file Date: Tue, 4 Feb 2025 19:23:55 +0000 Message-ID: <20250204192357.1862264-4-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000206:EE_|BL3PR12MB6547:EE_ X-MS-Office365-Filtering-Correlation-Id: bf66eb87-42fe-4c62-7869-08dd45518526 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|82310400026|1800799024|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?KMgALWBWMNukE23o+ds5ssFLWCJPV1IwraLFbG8ya/5/Ay79cXXn7ZAU21ak?= =?us-ascii?Q?UDjK/E208TqUIw5m15K03BA1+9TVIDDQfX/rXMJIiyV1jPa1D607CIK9eqjW?= =?us-ascii?Q?Hqzlm4KGwoAPhSFgYqnAB3+mQbEH251A7MhhMvcu1Mm/n/DHr0KB48xUEROY?= =?us-ascii?Q?0XUUm5Kv/tUQqzuaJVC1nLGnR3oIoZA61uGH8s1vPCWr8rkks4zhwAecy+yD?= =?us-ascii?Q?vrqoXwtH4aOnswrbvtKaNxbFaugJbLy+04qufnEJls52W2EBMpO+xA+osVtI?= =?us-ascii?Q?OcymPnr4ADlT4K6cJsedlXRdOsJar0M8a2GsTsprUkB4hbAtwk1uSPpa6PxY?= =?us-ascii?Q?VaQw1UZVd5Q8sfX+Z5iTHGEPiyY4JBaMszNSwLgYA6kfJm+xEwSxO7OCFW4r?= =?us-ascii?Q?N+PBac2Zbg+zO3uRLKWHc+4cI386wX3EbcyMyu4dWoo2+l1np2OyU/eY9D3o?= =?us-ascii?Q?EcLOVZtIFMWkP02G3t/cYNGre/xPp4YPKkLRwMYalLNqGLHB02y8DlWviJ/U?= =?us-ascii?Q?NiHy35D5HPSJGcH6oTpe85GDumsZYamHAB8Il7sW63GkJoyNauwjn6IVF02Z?= =?us-ascii?Q?ERDW6ScM/EaDwYcpWSSbG16eo/2KTPD5341FdKOSy/Rzy7NwOp4qJqZxYsgP?= =?us-ascii?Q?mNLCtEFQ1L0FdKYslrIvS6FoT/ET2GSoC2pOBksFkproHb6gWu6jdBCc0L0h?= =?us-ascii?Q?3Aar9sKArIuSISxXUzbIcJNeIf1CoZ55yx3pYzV4c6L2m/1a8ZRzG/HZan+6?= =?us-ascii?Q?f52jUdgJ661IG8HnplaqKkVsjZRv9Tp5ymqCvnSndXPQwJJHXFlk0xMCUeFJ?= =?us-ascii?Q?ySvB0398U9e1ak1VOk7gz41jZyVFf0MBatE+A2H+DwIw1XFpp121jROCeZQD?= =?us-ascii?Q?GMbbfPYrTlRjIJnytGu5Y84iyXfg5qfiE1nbMqvkEPm5eCiAXGrnhHtEU4pe?= =?us-ascii?Q?SBGnBgnG6qjvCu5GTnN5Sj2tQ6OHQMpq+fX1HxtM9zBQcazzv3VGq+w8okRR?= =?us-ascii?Q?TU/ifkP6Y6/nb92j5ScWvDVr/kzG4NEc0do56k47zVcAghxJRLi8tVAqoTh0?= =?us-ascii?Q?oxNLQCF4ZWLLxoMvWWhm+dmLCm2lz4/2x7ZFYQ0iXU28HQW8WkXVrGHyEa9u?= =?us-ascii?Q?NB9BkjacgmgfVnur+tFDa7k4VLhJUyLeUetDaW/OJnga63KWGeUvZP1ogmrK?= =?us-ascii?Q?eMAud8+vZH8VvNJSz2h7hFcAuoMQz86yqZUmZZDhB7XYZiUyzyCVdigqkXrd?= =?us-ascii?Q?S0a+Uh9BGn2S+TkICTGZPo7PEh8mD7tP/CHF9Gc99RsRjyjb5Xi/BlVOdxqY?= =?us-ascii?Q?oLbc2WdhghqkRFGSmmXo+urgSOdO4zLCM//dWo9MpzQHKzenP+WFjv6JiC6+?= =?us-ascii?Q?DKVcpzI/pm/dVxp/X/MtX+xvTCwfG0Nzx7vWkjN2alnX6+0PBObUtgjZlBSI?= =?us-ascii?Q?99vOyDedQlhvTOnGJ57nQHTC2FtO3KQawtPiS7eLheDUt61tdlJWdYX+VWGz?= =?us-ascii?Q?tXeZZPFcjG7ktzg=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(82310400026)(1800799024)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:18.3474 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: bf66eb87-42fe-4c62-7869-08dd45518526 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000206.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL3PR12MB6547 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1738697086968019100 Content-Type: text/plain; charset="utf-8" For AArch32, refer to ARM DDI 0568A.c ID110520. MPU_REGION_SHIFT is same between AArch32 and AArch64 (HPRBAR). Also, NUM_MPU_REGIONS_SHIFT is same between AArch32 and AArch64 (HMPUIR). Signed-off-by: Ayan Kumar Halder Reviewed-by: Luca Fancellu --- xen/arch/arm/arm64/mpu/head.S | 2 +- xen/arch/arm/include/asm/early_printk.h | 2 +- xen/arch/arm/include/asm/{arm64 =3D> }/mpu.h | 6 +++--- 3 files changed, 5 insertions(+), 5 deletions(-) rename xen/arch/arm/include/asm/{arm64 =3D> }/mpu.h (87%) diff --git a/xen/arch/arm/arm64/mpu/head.S b/xen/arch/arm/arm64/mpu/head.S index e4f2021f45..7b659aa42b 100644 --- a/xen/arch/arm/arm64/mpu/head.S +++ b/xen/arch/arm/arm64/mpu/head.S @@ -3,7 +3,7 @@ * Start-of-day code for an Armv8-R MPU system. */ =20 -#include +#include #include =20 /* Backgroud region enable/disable */ diff --git a/xen/arch/arm/include/asm/early_printk.h b/xen/arch/arm/include= /asm/early_printk.h index 219705a8b6..644fd0fcfb 100644 --- a/xen/arch/arm/include/asm/early_printk.h +++ b/xen/arch/arm/include/asm/early_printk.h @@ -11,7 +11,7 @@ #define __ARM_EARLY_PRINTK_H__ =20 #include -#include +#include #include =20 #ifdef CONFIG_EARLY_PRINTK diff --git a/xen/arch/arm/include/asm/arm64/mpu.h b/xen/arch/arm/include/as= m/mpu.h similarity index 87% rename from xen/arch/arm/include/asm/arm64/mpu.h rename to xen/arch/arm/include/asm/mpu.h index f8a029f1a1..40fa6eaaca 100644 --- a/xen/arch/arm/include/asm/arm64/mpu.h +++ b/xen/arch/arm/include/asm/mpu.h @@ -3,8 +3,8 @@ * mpu.h: Arm Memory Protection Unit definitions. */ =20 -#ifndef __ARM64_MPU_H__ -#define __ARM64_MPU_H__ +#ifndef __ARM_MPU_H__ +#define __ARM_MPU_H__ =20 #define MPU_REGION_SHIFT 6 #define MPU_REGION_ALIGN (_AC(1, UL) << MPU_REGION_SHIFT) @@ -13,7 +13,7 @@ #define NUM_MPU_REGIONS_SHIFT 8 #define NUM_MPU_REGIONS (_AC(1, UL) << NUM_MPU_REGIONS_SHIFT) #define NUM_MPU_REGIONS_MASK (NUM_MPU_REGIONS - 1) -#endif /* __ARM64_MPU_H__ */ +#endif /* __ARM_MPU_H__ */ =20 /* * Local variables: --=20 2.25.1 From nobody Fri Mar 14 06:13:54 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1738697086; cv=pass; d=zohomail.com; s=zohoarc; b=PCkDwtfNpgZqhoOEQx/Ypz8USamffsB2cbDka9ua1/siDDqsEddB3hl7rC7S/6jgtbKLr4irQogw2fO4SKgeOCjyTg7h8NeewpJElBQczNREuC14ncVRzHZTIg/YVHEOjc98MGOuS615aMZxBY9weyNVLcdqxVWYoBqCzL0/gQM= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1738697086; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=8Oxhmweg7AP+SCtQxJNnmxEnRyK7YMVCMD8+Qy0wThY=; b=EEvRWkIlZUauzxqeHC0zJpaB+4cdcdvAWdFZ2O+61gCkHsQjtTB3WkDaJKWdyfhUa2P4pSoOiDfQQZCfoLYZnXPbaXOnlhtqRbyAi3+Omkg4B8Vb/CO5DRJvhocvBYe0L3EWJWzyyVGnGdnunslJUygit2IbAd8Y0zliSNEk0Fk= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1738697086662839.3818104755101; Tue, 4 Feb 2025 11:24:46 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.881800.1291999 (Exim 4.92) (envelope-from ) id 1tfOX8-0005xE-WA; Tue, 04 Feb 2025 19:24:30 +0000 Received: by outflank-mailman (output) from mailman id 881800.1291999; Tue, 04 Feb 2025 19:24:30 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX8-0005x0-SV; Tue, 04 Feb 2025 19:24:30 +0000 Received: by outflank-mailman (input) for mailman id 881800; Tue, 04 Feb 2025 19:24:28 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOX6-00051v-Ne for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:28 +0000 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2061d.outbound.protection.outlook.com [2a01:111:f403:2415::61d]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id a5dfc168-e32d-11ef-a0e7-8be0dac302b0; Tue, 04 Feb 2025 20:24:28 +0100 (CET) Received: from MN0P222CA0018.NAMP222.PROD.OUTLOOK.COM (2603:10b6:208:531::19) by MW6PR12MB8736.namprd12.prod.outlook.com (2603:10b6:303:244::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 19:24:23 +0000 Received: from MN1PEPF0000F0E5.namprd04.prod.outlook.com (2603:10b6:208:531:cafe::48) by MN0P222CA0018.outlook.office365.com (2603:10b6:208:531::19) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8398.24 via Frontend Transport; Tue, 4 Feb 2025 19:24:20 +0000 Received: from SATLEXMB03.amd.com (165.204.84.17) by MN1PEPF0000F0E5.mail.protection.outlook.com (10.167.242.43) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:20 +0000 Received: from SATLEXMB05.amd.com (10.181.40.146) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:20 -0600 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB05.amd.com (10.181.40.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:19 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:18 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a5dfc168-e32d-11ef-a0e7-8be0dac302b0 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=G1dWQ55yGyhX2IPksxhxz0rmE1dd55gBmAigL1wrDuBpOtqkxAHSbe9llkqiQOIFgmGASV+WTYjQKZWR6O0Yfaswo3JOeMr8KmgjfljakNh2nIzfzDJPaklVUd7ZZxhNSQbIMyQ3ZRfSRExCGDREKqgv+13ZV97G99xj0Gj3wc8wceK3JIgitHIkxV809ggfRoipxGvwDobZzLUDPEPZBPB5klb0smNEewbkMvM9LYgnK/bLys2zA2OanEkMyITywFv7oNwW0ZTRZE38XOG+T9nod+44kb4+86sgtZev4NQk+jtli+OnvIuXq4A2fA1EEU0t/6+MNLnZkCAcUYn8Dg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8Oxhmweg7AP+SCtQxJNnmxEnRyK7YMVCMD8+Qy0wThY=; b=yKAleUFjl09MFnzIsTYJxw4u0q78xlnE5shubhBuV4QwUhEeexPr75evH6Cy1OTZlGh8G0rCbGLt5iqBHxHeVqIFxZtsaRiSgU8IcUWptHFb5vD316NHGHeK4Oan0PVbSOjpOGZ04myyQfxGq2SYwXG6sRqFbl6WHldNumVRcnlAkh6O2IeXWgzLMrpMpI5BVbxFURMVOphJdfoh+WE70c2elBThh/ZT5BYIcgz+U7j275zFvVVySkTlC0WqYkNtkbjwhCIhWyvx4nVU8CWiaN4a5vstxSPwopEFMBYyzijzPTUbO1dlAlo5NuhdhVtLa78xoRceAC+zDYxRuP7uWA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8Oxhmweg7AP+SCtQxJNnmxEnRyK7YMVCMD8+Qy0wThY=; b=cN7/TmNzA2lX2zsaFYFeiVJ8gH/hX7HgSfV8K90BgO870WlkVwcVWLxDZdviAz/Sj+FmyISobELxRd3trStaUPis3kmxQLBMLl6UuZ+XHD7b7hReCn+SbpdjqgQzEmgmzi2YVanHwut472CeGC3RtK/1o9Tneu2i53ca9+rcbAU= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 4/5] xen/arm: mpu: Create boot-time MPU protection regions (arm32) Date: Tue, 4 Feb 2025 19:23:56 +0000 Message-ID: <20250204192357.1862264-5-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: None (SATLEXMB05.amd.com: ayan.kumar.halder@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN1PEPF0000F0E5:EE_|MW6PR12MB8736:EE_ X-MS-Office365-Filtering-Correlation-Id: 6a3b26c7-7231-433b-5bba-08dd45518660 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|36860700013|82310400026|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?5yTtmbCTl7KsuaC5DDZdL877eIR238W3TEgeNZpWo2lscfZkZlxbIo54KH3L?= =?us-ascii?Q?aIaYPydC3M9oG3oAEj7Iyx0JJpyhDwBeoT2LNLpsBcT77xl7S+lfFkyqkHs5?= =?us-ascii?Q?E2MeawkPrdE/HzEB6EhFr5DgUD5hGmElCgaDw5PZP8x3F+QEVdn9MKxrFlRF?= =?us-ascii?Q?LSfgSDlcOF29FskwWfWc7dNn/SxQbXacxIUTeHBoHLp0cjqx8TrtQsRf2rkv?= =?us-ascii?Q?vVCGxoSIM/Y30PaOugqEjEzOdELIeAa9uF1Wx+2bwMkRCifD20iZgSvN9E3q?= =?us-ascii?Q?OBpIH3MoOH/X6Ex05Sx3r6+6ugXpToulM1+SNjk566oU+zo6pT7hghEq600j?= =?us-ascii?Q?PhTXbCoPQp4V7iKEMH3hjoeysEPubqMTyqvHzd+XWk8f5rFVjDckx3iSBfAK?= =?us-ascii?Q?IHC1dXO+aonY7R+WVPSH0w4+aGETv/XbKaEGv11yBVMgJpVdLlOch/aWZpT3?= =?us-ascii?Q?Fh76S5/4ROvp/XuQzAjBolbDu+RLkOEmLkMp4Xk6BnaTGwLuagqNc8LwfNLI?= =?us-ascii?Q?0u39pFJN4ObivSM2YwFkFr/d7S5pCRLNTXFXKGwuO1YqreqXr0yHDFbJednK?= =?us-ascii?Q?uq+lmDSXBjtyAWfJxQnNjgfEndxXnoJAe6v3QiOpB7NMf76gaj87WDHEuYd0?= =?us-ascii?Q?teeVWhFz9+QAmWH992WHaopCSh1zCMwqasiPSeshISwTK0olWHwEv28dYSr9?= =?us-ascii?Q?ePe6xJmFm/uh3TWDZ7EvZh1QiAUvqD4G8Ck5buopbH0WSvIEE0JQWU2J2Inq?= =?us-ascii?Q?L13s593GzkIRXEqw4HlYDwfxNA+MqmE3MajZ77EJXsX1cbrxOm8HItupeugS?= =?us-ascii?Q?rxNYDsnL7aujadW0idpTLU4m0frDYZhX5+/Hv7ozgprynjE5TdgdmXsb2BHE?= =?us-ascii?Q?wwt8fZWNNdpan+lhnJfAfqov7ZnL/XxX2XPuqoOPRI/YPyAOVYit+9CheCEk?= =?us-ascii?Q?lJV0XkfiW2MnVn5Cdglv4CYisiC7j5t2zbWw1fZeT7E5UrBe8c/po0Ocd9rz?= =?us-ascii?Q?YKkKl/JeUOchrZom0QV3DXyPZOieqJFS6kMjAHuLPWmQSBfFij1EbJ6e7+Xy?= =?us-ascii?Q?6YfgfY41ca4MkHqAMVstlq95J1vXUoKhqTvoYTI6hZINwLlm7/91fr3bifm0?= =?us-ascii?Q?fBtuwAxPYQEWzzynXrkI0X0Q4CN741Mh+TMMc45QvWlFqyl4Q0PGnrMa/fnl?= =?us-ascii?Q?EIt0ihYDRUJICqRL4/EGoJTF1PMi+Pdk12XWV6WZmY8jPxQUV+nCrULmlgtc?= =?us-ascii?Q?sEzWIVjbkjap6nWP3ulmwHiKvu/+EywotmwnG4q48j2QgBirmsOx/STAZblr?= =?us-ascii?Q?hphTZA7W7pHNGTLjYq5jINp/aedWgc50DH5C7B+26H2Hs6Gk5ucfqM3KoQZz?= =?us-ascii?Q?BCeoam36VmZXGievuxWCUowEqWvyJ+YuRmdr/IdzNiv2Mcb4RqG2YJGxqiGM?= =?us-ascii?Q?U5a/IS8zqSVL/dkW/+sJtqT+/f3luzD/G8498UhhwljVMUywSztYltAwA8wh?= =?us-ascii?Q?jMm3JKA+E/cIGig=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB03.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(36860700013)(82310400026)(1800799024);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:20.4982 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 6a3b26c7-7231-433b-5bba-08dd45518660 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: MN1PEPF0000F0E5.namprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW6PR12MB8736 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1738697089259019100 Content-Type: text/plain; charset="utf-8" Define enable_boot_cpu_mm() for the Armv8-R AArch64. Like boot-time page table in MMU system, we need a boot-time MPU protection region configuration in MPU system so Xen can fetch code and data from norm= al memory. To do this, Xen maps the following sections of the binary as separate regio= ns (with permissions) :- 1. Text (Read only at EL2, execution is permitted) 2. RO data (Read only at EL2) 3. RO after init data and RW data (Read/Write at EL2) 4. Init Text (Read only at EL2, execution is permitted) 5. Init data and BSS (Read/Write at EL2) Before creating a region, we check if the count exceeds the number defined = in MPUIR_EL2. If so, then the boot fails. Also we check if the region is empty or not. IOW, if the start and end addr= ess are same, we skip mapping the region. Signed-off-by: Ayan Kumar Halder --- xen/arch/arm/arm32/mpu/head.S | 164 ++++++++++++++++++++++++++ xen/arch/arm/include/asm/cpregs.h | 4 + xen/arch/arm/include/asm/mpu/cpregs.h | 21 ++++ 3 files changed, 189 insertions(+) create mode 100644 xen/arch/arm/arm32/mpu/head.S create mode 100644 xen/arch/arm/include/asm/mpu/cpregs.h diff --git a/xen/arch/arm/arm32/mpu/head.S b/xen/arch/arm/arm32/mpu/head.S new file mode 100644 index 0000000000..4aad3c6b5d --- /dev/null +++ b/xen/arch/arm/arm32/mpu/head.S @@ -0,0 +1,164 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Start-of-day code for an Armv8-R MPU system. + */ + +#include +#include + +/* Backgroud region enable/disable */ +#define SCTLR_ELx_BR BIT(17, UL) + +#define REGION_TEXT_PRBAR 0x18 /* SH=3D11 AP=3D10 XN=3D0 */ +#define REGION_RO_PRBAR 0x1D /* SH=3D11 AP=3D10 XN=3D1 */ +#define REGION_DATA_PRBAR 0x19 /* SH=3D11 AP=3D00 XN=3D1 */ +#define REGION_DEVICE_PRBAR 0x11 /* SH=3D10 AP=3D00 XN=3D1 */ + +#define REGION_NORMAL_PRLAR 0x0f /* NS=3D0 ATTR=3D111 EN=3D1 */ +#define REGION_DEVICE_PRLAR 0x09 /* NS=3D0 ATTR=3D100 EN=3D1 */ + +/* + * Macro to prepare and set a EL2 MPU memory region. + * We will also create an according MPU memory region entry, which + * is a structure of pr_t, in table \prmap. + * + * sel: region selector + * base: reg storing base address + * limit: reg storing limit address + * prbar: store computed PRBAR_EL2 value + * prlar: store computed PRLAR_EL2 value + * maxcount: maximum number of EL2 regions supported + * attr_prbar: PRBAR_EL2-related memory attributes. If not specified it w= ill be + * REGION_DATA_PRBAR + * attr_prlar: PRLAR_EL2-related memory attributes. If not specified it w= ill be + * REGION_NORMAL_PRLAR + * + * Preserves \maxcount + * Output: + * \sel: Next available region selector index. + * Clobbers \base, \limit, \prbar, \prlar + * + * Note that all parameters using registers should be distinct. + */ +.macro prepare_xen_region, sel, base, limit, prbar, prlar, maxcount, attr_= prbar=3DREGION_DATA_PRBAR, attr_prlar=3DREGION_NORMAL_PRLAR + /* Check if the region is empty */ + cmp \base, \limit + beq 1f + + /* Check if the number of regions exceeded the count specified in MPUI= R_EL2 */ + cmp \sel, \maxcount + bge fail_insufficient_regions + + /* Prepare value for PRBAR_EL2 reg and preserve it in \prbar.*/ + and \base, \base, #MPU_REGION_MASK + mov \prbar, #\attr_prbar + orr \prbar, \prbar, \base + + /* Limit address should be inclusive */ + sub \limit, \limit, #1 + and \limit, \limit, #MPU_REGION_MASK + mov \prlar, #\attr_prlar + orr \prlar, \prlar, \limit + + mcr CP32(\sel, PRSELR_EL2) + isb + mcr CP32(\prbar, PRBAR_EL2) + mcr CP32(\prlar, PRLAR_EL2) + dsb sy + isb + + add \sel, \sel, #1 + +1: +.endm + +/* + * Failure caused due to insufficient MPU regions. + */ +FUNC_LOCAL(fail_insufficient_regions) + PRINT("- Selected MPU region is above the implemented number in MPUIR_= EL2 -\r\n") +1: wfe + b 1b +END(fail_insufficient_regions) + +/* + * Enable EL2 MPU and data cache + * If the Background region is enabled, then the MPU uses the default memo= ry + * map as the Background region for generating the memory + * attributes when MPU is disabled. + * Since the default memory map of the Armv8-R AArch64 architecture is + * IMPLEMENTATION DEFINED, we intend to turn off the Background region her= e. + * + * Clobbers x0 + * + */ +FUNC_LOCAL(enable_mpu) + mrc CP32(r0, HSCTLR) + bic r0, r0, #SCTLR_ELx_BR /* Disable Background region */ + orr r0, r0, #SCTLR_Axx_ELx_M /* Enable MPU */ + orr r0, r0, #SCTLR_Axx_ELx_C /* Enable D-cache */ + mcr CP32(r0, HSCTLR) + isb + + ret +END(enable_mpu) + +/* + * Maps the various sections of Xen (decsribed in xen.lds.S) as different = MPU + * regions. + * + * Clobbers r0 + * + */ +#define NORMAL_MEM_SIZE 0x001fffff /* 2MB - 1 */ + +FUNC(enable_boot_cpu_mm) + /* Get the number of regions specified in MPUIR_EL2 */ + mrc CP32(r5, MPUIR_EL2) + and r5, r5, #NUM_MPU_REGIONS_MASK + + /* x0: region sel */ + mov r0, #0 + + /* Xen text section. */ + ldr r1, =3D_stext + ldr r2, =3D_etext + prepare_xen_region r0, r1, r2, r3, r4, r5, attr_prbar=3DREGION_TEXT_PR= BAR + + /* Xen read-only data section. */ + ldr r1, =3D_srodata + ldr r2, =3D_erodata + prepare_xen_region r0, r1, r2, r3, r4, r5, attr_prbar=3DREGION_RO_PRBAR + + /* Xen read-only after init and data section. (RW data) */ + ldr r1, =3D__ro_after_init_start + ldr r2, =3D__init_begin + prepare_xen_region r0, r1, r2, r3, r4, r5 + + /* Xen code section. */ + ldr r1, =3D__init_begin + ldr r2, =3D__init_data_begin + prepare_xen_region r0, r1, r2, r3, r4, r5, attr_prbar=3DREGION_TEXT_PR= BAR + + /* Xen data and BSS section. */ + ldr r1, =3D__init_data_begin + ldr r2, =3D__bss_end + prepare_xen_region r0, r1, r2, r3, r4, r5 + +#ifdef CONFIG_EARLY_PRINTK + /* Xen early UART section. */ + ldr r1, =3DCONFIG_EARLY_UART_BASE_ADDRESS + ldr r2, =3D(CONFIG_EARLY_UART_BASE_ADDRESS + CONFIG_EARLY_UART_SIZE) + prepare_xen_region r0, r1, r2, r3, r4, r5, attr_prbar=3DREGION_DEVICE_= PRBAR, attr_prlar=3DREGION_DEVICE_PRLAR +#endif + + b enable_mpu + ret +END(enable_boot_cpu_mm) + +/* + * Local variables: + * mode: ASM + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/arch/arm/include/asm/cpregs.h b/xen/arch/arm/include/asm/c= pregs.h index aec9e8f329..6019a2cbdd 100644 --- a/xen/arch/arm/include/asm/cpregs.h +++ b/xen/arch/arm/include/asm/cpregs.h @@ -1,6 +1,10 @@ #ifndef __ASM_ARM_CPREGS_H #define __ASM_ARM_CPREGS_H =20 +#ifdef CONFIG_MPU +#include +#endif + /* * AArch32 Co-processor registers. * diff --git a/xen/arch/arm/include/asm/mpu/cpregs.h b/xen/arch/arm/include/a= sm/mpu/cpregs.h new file mode 100644 index 0000000000..bd17a8c75a --- /dev/null +++ b/xen/arch/arm/include/asm/mpu/cpregs.h @@ -0,0 +1,21 @@ +#ifndef __ASM_ARM_MPU_CPREGS_H +#define __ASM_ARM_MPU_CPREGS_H + +#define HMPUIR p15,4,c0,c0,4 + +/* CP15 CR6: MPU Protection Region Base/Limit/Select Address Register */ +#define HPRSELR p15,4,c6,c2,1 +#define PRBAR_EL2 p15,4,c6,c3,0 +#define PRLAR_EL2 p15,4,c6,c8,1 + +#define MPUIR_EL2 HMPUIR +#define PRSELR_EL2 HPRSELR + +#endif + +/* + * Local variables: + * mode: ASM + * indent-tabs-mode: nil + * End: + */ --=20 2.25.1 From nobody Fri Mar 14 06:13:54 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1738697091; cv=pass; d=zohomail.com; s=zohoarc; b=J6zaQCteuBLGJA3dXCBtIcZIOqqWoKTBB0HuN3OuqiWQJVJKJJ6X+QCSdxFlgEUrI1U49vcXTb0hObmRVccC/K68rgyIihGdC74TFfDUmuSmHDlaQPY9IPDB8cY+57jPFIODDDqRmppw8JkddWZTxbnKx/hEFBY6stB9lkfPXog= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1738697091; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=XsKT5QiKx02FP+fMWtE8QG8luAAR91pZZ+lj1Or0wn0=; b=ahpvQm635GldTXGc9YO9ovNz0rm54hIkcvKNyU7e5de2XzkyHaP255nJ01gtEQPhbbHBxaPO+pK0TyGGR+dtKiYAUSVb9WM4v9DYMzCYWU4/1oKzFxMogpZwS5sDR3LdzjnXJyw4Ckcm+0BUIcisOsZ6RJ1gea/ugRaeCLquBYY= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1738697091176705.7420336814547; Tue, 4 Feb 2025 11:24:51 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.881805.1292009 (Exim 4.92) (envelope-from ) id 1tfOXD-0006Md-8z; Tue, 04 Feb 2025 19:24:35 +0000 Received: by outflank-mailman (output) from mailman id 881805.1292009; Tue, 04 Feb 2025 19:24:35 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOXD-0006MP-4w; Tue, 04 Feb 2025 19:24:35 +0000 Received: by outflank-mailman (input) for mailman id 881805; Tue, 04 Feb 2025 19:24:34 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfOXC-0004nP-0F for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 19:24:34 +0000 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on20612.outbound.protection.outlook.com [2a01:111:f403:2414::612]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a849aadc-e32d-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 20:24:31 +0100 (CET) Received: from SJ0PR13CA0211.namprd13.prod.outlook.com (2603:10b6:a03:2c1::6) by PH8PR12MB7254.namprd12.prod.outlook.com (2603:10b6:510:225::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 19:24:27 +0000 Received: from SJ5PEPF00000207.namprd05.prod.outlook.com (2603:10b6:a03:2c1:cafe::a8) by SJ0PR13CA0211.outlook.office365.com (2603:10b6:a03:2c1::6) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8398.26 via Frontend Transport; Tue, 4 Feb 2025 19:24:27 +0000 Received: from SATLEXMB04.amd.com (165.204.84.17) by SJ5PEPF00000207.mail.protection.outlook.com (10.167.244.40) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8398.14 via Frontend Transport; Tue, 4 Feb 2025 19:24:27 +0000 Received: from SATLEXMB03.amd.com (10.181.40.144) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Tue, 4 Feb 2025 13:24:26 -0600 Received: from xcbayankuma40.xilinx.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Tue, 4 Feb 2025 13:24:25 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a849aadc-e32d-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=nBAkJp9p0A5slT0L1n3QtPxYoAeBnyhqEgynCltsgvHROuDbeaGD7cqcboKXChgx+iOiRDSZCjnuOFabTzekeR+yeO3j8UBQ4u52aeCsMeBoS/kTUfw/dtr8lQ6aacTw+Ongw3mrknVYHItsn63YgJNYbl+43tRs/5Mqi5eB8OlHpNNFf3TzEFWGqzId4oTzqKDCqUeyKdHlB/b1HZcOVBjHRu6JzW0zlKIh9y0Q58GN0fzvJzuVTrxKA/grURSr7PxyX4IlOzd+ZKx1rADOh+46GbBt7f1ZgdxFL8RQ0BpSRZhDVgMn4n67k2tGJBZGvR2pRVvoPOGsCevoK3667g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XsKT5QiKx02FP+fMWtE8QG8luAAR91pZZ+lj1Or0wn0=; b=H6jb6+8sUJmGSl/niKxUV+BfEI657q9H0amRae853XWYqOhS0k3lcQde7av5yRBz+NrJt1io1/fonLWEG6IzJGGa4p7v7MyQiyXU4jozELIAAQggIdV9RczkoSJarJB+1t85FyxgItCPp4hzTci0Vx17RTjrOMBvAF64kN2F2+yIlxZS9nmPKPsmrQYAEoMdGGyljHfP69gnlUJ1YLIwSfY5nwmZkCB7P8B0yV2YzM3eeBfuv3qnOyaKE9UE9WH6UFCSx4XG9rsHcgro8n/N3KWYDsamF41C9om7zG+yGEMTYSSXSd5O9qfFv4dNcmfpC+F9vT/aoy4v46uZr57ARQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XsKT5QiKx02FP+fMWtE8QG8luAAR91pZZ+lj1Or0wn0=; b=qejvhVaTzswHBA3sJhMsnE7pv2/etoBK8fozdnV6D0TsvefHw8uWseNHFJFCXpfNQicV0yZ4X+RpIAenb6fuXKVQ+1n1mCak+Any3rD4Hqs+u5gvVedBv6Su6G64kU2Yj3bjAep7a7M8MDPRrisR5He0T37BSKOiJlHjRk4JwJw= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C From: Ayan Kumar Halder To: CC: Ayan Kumar Halder , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , "Volodymyr Babchuk" Subject: [PATCH 5/5] xen/arm: mpu: Implement a dummy enable_secondary_cpu_mm (arm32) Date: Tue, 4 Feb 2025 19:23:57 +0000 Message-ID: <20250204192357.1862264-6-ayan.kumar.halder@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> References: <20250204192357.1862264-1-ayan.kumar.halder@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: None (SATLEXMB04.amd.com: ayan.kumar.halder@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000207:EE_|PH8PR12MB7254:EE_ X-MS-Office365-Filtering-Correlation-Id: 715e9d66-0ea9-4341-e2f4-08dd45518a52 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|36860700013|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?8FZnHPCmRBZOlba6LpL5XCzuv8Fk8UNfpg9Yxk7Mra4p0JzREMxsjFiGoefa?= =?us-ascii?Q?YYrmPOxzmsFz1yfvvPDQqj+Fv5M3VEz5Pnkl5pOar1dF3kUWqBH/NnZ+OkxM?= =?us-ascii?Q?JHHlWQvH4fX5emGPWMGw8TScptJL6bqQOz4tBgZRmfAKtrtSzOiEoqs8aVQJ?= =?us-ascii?Q?YcraR9ECB6w9Ykn4Vw2viA7Tl98hBdQ7y33gAVC9/DR7lMm0PxpiV7XvRyW6?= =?us-ascii?Q?s9HWR0O6RLnnmOt/tnW2VX7m/ppTRPLu2gOq/pHw+Np96IWGmF15p04nBYca?= =?us-ascii?Q?MCB30tjpMT4v2e9MGvGF0zfTLCx8XXtUa2rYDzZ1PWK2x64634elHbZ32VNK?= =?us-ascii?Q?VqcHjfBQlRTJHV4teKwMQ3HQ9TS3Xga8sD4FgUMkM4ndy1r+PHu4xC2uQvkE?= =?us-ascii?Q?bgbexsejt7DkYLXTVUj9J4ejwI8+xWctqnplxny8vBwD2qJS/TeDVI8cXR6j?= =?us-ascii?Q?Q4+OkRlQLEKOFPKBLW0c+bN6UA1IkIFf4/LlcCtilwPBLUy2UajBG1HCYVlt?= =?us-ascii?Q?t3WDHKC7baH2Da1S+qF8dA+w+n8n5sSXzKbvlqab39J+xkxYddEPgIZ8MCLg?= =?us-ascii?Q?0gc4vLq74zZU3o/JCNDVypEQbUFFGCF8Q9Ihde/+B1qsa6QB68nutDR3wpXv?= =?us-ascii?Q?zJ5Vwf75Vdt+f59QlJ5QBebCfKhLZoZ1+d2tv5fEh/79oJwb5GiW1ZynB28T?= =?us-ascii?Q?wawbyd0mpV8ws/Eor24+JV0d9u856iXZrfAF7Web7U4eCTUI/7BlH+Pa7yGk?= =?us-ascii?Q?0CPx5Q9UxY6l2ueRm9pVLkPZ4ZgU0vWTHQ4WvQ2AX5Sv0nPhQPQAbv3W6am2?= =?us-ascii?Q?nvUsDxoG+9NxOiWCPpSfaiiCzG1orJSue9croicQAO3TP8I+DlrbN4OVO/Z6?= =?us-ascii?Q?rb681jG8ZDZjw5mpIdR4cp5/eyGnURiRbLYJObhJdVW3iBr65MX/sLPjBcY6?= =?us-ascii?Q?Bok39FOmFZyHlENFEUMM8BKNDmScKT/pz7K0lXOf6N30d3TTpN5udimFXx3I?= =?us-ascii?Q?6FLTbkjBFm7tGDNHsX10M0GySJ5TzNxBRX/+j9yFud67t32w34Qq9NvLBMPf?= =?us-ascii?Q?3LuQ5DL7BPbzULNSQG7ET58Al/WIFjTLNzTlE9o5E4WAu9IFUzQNALJ4fTDu?= =?us-ascii?Q?QpJhUt25BG/jBHkOhs6p7Nkzy7E+CydaIc1gzZ1gAG609kdJO0YTe8EBeH5V?= =?us-ascii?Q?NOh+7nrxddO+ayzZtn7k75b3Blj+Q1+z2kSmRjwY5BJn8oOPZyXXuJLRvgIL?= =?us-ascii?Q?Km9TsJ5h1pVw9dbYU7oQ5iOUWKmt7M3iQWxuNt0r7QggMXZsBTf54BTCX9vx?= =?us-ascii?Q?BBujABX0Q+rbG8BblTba5mOCMEbkdnwcdg57HHOmXorbR+0fgjrhnul7agPB?= =?us-ascii?Q?bI6Lamcp9trRPc79Nr/zTplshvQlivumFqeEfyoEg83UIz/liWbwgL+fX9ea?= =?us-ascii?Q?lun5xXOH/XvCc+AuiKM6lLNP3YLfPjCwtdAtSLk04VgsVDjxxYElu7mAUxmp?= =?us-ascii?Q?OcygVZKFK3EPywk=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(376014)(36860700013)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Feb 2025 19:24:27.0271 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 715e9d66-0ea9-4341-e2f4-08dd45518a52 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000207.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR12MB7254 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1738697092969019100 Content-Type: text/plain; charset="utf-8" Secondary cpus initialization is not yet supported. Thus, we print an appropriate message and put the secondary cpus in WFE state. Signed-off-by: Ayan Kumar Halder Reviewed-by: Luca Fancellu --- xen/arch/arm/arm32/mpu/head.S | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/xen/arch/arm/arm32/mpu/head.S b/xen/arch/arm/arm32/mpu/head.S index 4aad3c6b5d..49ab5fc9c0 100644 --- a/xen/arch/arm/arm32/mpu/head.S +++ b/xen/arch/arm/arm32/mpu/head.S @@ -156,6 +156,16 @@ FUNC(enable_boot_cpu_mm) ret END(enable_boot_cpu_mm) =20 +/* + * We don't yet support secondary CPUs bring-up. Implement a dummy helper = to + * please the common code. + */ +ENTRY(enable_secondary_cpu_mm) + PRINT("- SMP not enabled yet -\r\n") +1: wfe + b 1b +ENDPROC(enable_secondary_cpu_mm) + /* * Local variables: * mode: ASM --=20 2.25.1