[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen master] xen/arm: Use p2m_restore_state in construct_dom0



commit d6dd3a9ae7adead322e8ce96f83db96dce64c982
Author:     Julien Grall <julien.grall@xxxxxxxxxx>
AuthorDate: Wed Mar 19 15:43:38 2014 +0000
Commit:     Ian Campbell <ian.campbell@xxxxxxxxxx>
CommitDate: Tue Apr 1 11:23:42 2014 +0100

    xen/arm: Use p2m_restore_state in construct_dom0
    
    The address translation functions used while building dom0 rely on certain 
EL1
    state being configured. In particular they are subject to the behaviour of
    SCTLR_EL1.M (stage 1 MMU enabled).
    
    The Xen (and Linux) boot protocol require that the kernel be entered with 
the
    MMU disabled but they don't say anything explicitly about exception levels
    other than the one which is active when entering the kernels. Arguably the
    protocol could be said to apply to all exception levels but in any case we
    should cope with this and setup the EL1 state as necessary.
    
    Fu Wei discovered this when booting Xen from grub.efi over UEFI, it's not
    clear whether grub or UEFI is responsible for leaving stage 1 MMU enabled.
    
    Use directly the newly created function p2m_restore_state to retrieve a
    correct EL1 state to translate an address.
    
    Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
    Reported-by: Fu Wei <fu.wei@xxxxxxxxxx>
    Acked-by: Tim Deegan <tim@xxxxxxx>
    Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
---
 xen/arch/arm/domain_build.c |    9 +--------
 1 files changed, 1 insertions(+), 8 deletions(-)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index c9dda0e..502db84 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -1021,14 +1021,7 @@ int construct_dom0(struct domain *d)
         return rc;
 
     /* The following loads use the domain's p2m */
-    p2m_load_VTTBR(d);
-#ifdef CONFIG_ARM_64
-    d->arch.type = kinfo.type;
-    if ( is_32bit_domain(d) )
-        WRITE_SYSREG(READ_SYSREG(HCR_EL2) & ~HCR_RW, HCR_EL2);
-    else
-        WRITE_SYSREG(READ_SYSREG(HCR_EL2) | HCR_RW, HCR_EL2);
-#endif
+    p2m_restore_state(v);
 
     /*
      * kernel_load will determine the placement of the initrd & fdt in
--
generated by git-patchbot for /home/xen/git/xen.git#master

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.