|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [XEN v3 01/13] GICv3: Emulate GICD_IGRPMODR as RAZ / WI
Hi Ayan,
> On 24 Oct 2022, at 19:25, Ayan Kumar Halder <ayankuma@xxxxxxx> wrote:
>
> Refer GIC v3 specification (Arm IHI 0069H ID020922), IGRPMODR is emulated
> as RAZ / WI for the guests as "GICD_CTLR.ARE_S==0" is true.
> Xen is currently supported to run in non-secure mode, so guests will run in
> non-secure mode only.
>
> Also, if Xen was supposed to run in secure mode with guests, the programming
> of the interrupts (ie whether it belongs to secure/non secure and group 0/1)
> will be done by Xen only. The guests will not be allowed to change this.
Thanks a lot this description is a lot better.
>
> Signed-off-by: Ayan Kumar Halder <ayankuma@xxxxxxx>
Reviewed-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>
I do not think this is something for 4.17 so it will need to be on hold until
staging reopens unless someone thinks otherwise ?
Cheers
Bertrand
> ---
>
> Observed the issue while running Zephyr on R52.
> Also, found that KVM has similar behaviour.
>
> Changes from:-
> v1 - Moved the definitions of GICD_IGRPMODR, GICD_IGRPMODRN to gic_v3
> specific header.
>
> v2 - Updated the commit message.
>
> xen/arch/arm/include/asm/gic_v3_defs.h | 2 ++
> xen/arch/arm/vgic-v3.c | 4 ++++
> 2 files changed, 6 insertions(+)
>
> diff --git a/xen/arch/arm/include/asm/gic_v3_defs.h
> b/xen/arch/arm/include/asm/gic_v3_defs.h
> index 34ed5f857d..728e28d5e5 100644
> --- a/xen/arch/arm/include/asm/gic_v3_defs.h
> +++ b/xen/arch/arm/include/asm/gic_v3_defs.h
> @@ -30,6 +30,8 @@
> #define GICD_CLRSPI_NSR (0x048)
> #define GICD_SETSPI_SR (0x050)
> #define GICD_CLRSPI_SR (0x058)
> +#define GICD_IGRPMODR (0xD00)
> +#define GICD_IGRPMODRN (0xD7C)
> #define GICD_IROUTER (0x6000)
> #define GICD_IROUTER32 (0x6100)
> #define GICD_IROUTER1019 (0x7FD8)
> diff --git a/xen/arch/arm/vgic-v3.c b/xen/arch/arm/vgic-v3.c
> index 7fb99a9ff2..0c23f6df9d 100644
> --- a/xen/arch/arm/vgic-v3.c
> +++ b/xen/arch/arm/vgic-v3.c
> @@ -685,6 +685,7 @@ static int __vgic_v3_distr_common_mmio_read(const char
> *name, struct vcpu *v,
> switch ( reg )
> {
> case VRANGE32(GICD_IGROUPR, GICD_IGROUPRN):
> + case VRANGE32(GICD_IGRPMODR, GICD_IGRPMODRN):
> /* We do not implement security extensions for guests, read zero */
> if ( dabt.size != DABT_WORD ) goto bad_width;
> goto read_as_zero;
> @@ -781,6 +782,7 @@ static int __vgic_v3_distr_common_mmio_write(const char
> *name, struct vcpu *v,
> switch ( reg )
> {
> case VRANGE32(GICD_IGROUPR, GICD_IGROUPRN):
> + case VRANGE32(GICD_IGRPMODR, GICD_IGRPMODRN):
> /* We do not implement security extensions for guests, write ignore */
> goto write_ignore_32;
>
> @@ -1192,6 +1194,7 @@ static int vgic_v3_distr_mmio_read(struct vcpu *v,
> mmio_info_t *info,
> case VRANGE32(GICD_ICACTIVER, GICD_ICACTIVERN):
> case VRANGE32(GICD_IPRIORITYR, GICD_IPRIORITYRN):
> case VRANGE32(GICD_ICFGR, GICD_ICFGRN):
> + case VRANGE32(GICD_IGRPMODR, GICD_IGRPMODRN):
> /*
> * Above all register are common with GICR and GICD
> * Manage in common
> @@ -1379,6 +1382,7 @@ static int vgic_v3_distr_mmio_write(struct vcpu *v,
> mmio_info_t *info,
> case VRANGE32(GICD_ICACTIVER, GICD_ICACTIVERN):
> case VRANGE32(GICD_IPRIORITYR, GICD_IPRIORITYRN):
> case VRANGE32(GICD_ICFGR, GICD_ICFGRN):
> + case VRANGE32(GICD_IGRPMODR, GICD_IGRPMODRN):
> /* Above registers are common with GICR and GICD
> * Manage in common */
> return __vgic_v3_distr_common_mmio_write("vGICD", v, info,
> --
> 2.17.1
>
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |