Message ID | 20230909083410.870726-3-leo.yan@linaro.org (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | xen/arm: Enlarge identity map space | expand |
Hi Leo, I know you said you will respin the series. I'd like to leave some comments to avoid having another round afterwards. On 09/09/2023 09:34, Leo Yan wrote: > On some platforms, the memory regions could be: Can you add some details in the commit message on which platform you saw the issue? Also, in v1, the problem was also depending on the firmware version. Do you know if it fails booting on a new or old firmware? > > (XEN) MODULE[0]: 00000807f6df0000 - 00000807f6f3e000 Xen > (XEN) MODULE[1]: 00000807f8054000 - 00000807f8056000 Device Tree > (XEN) MODULE[2]: 00000000fa834000 - 00000000fc5de1d5 Ramdisk > (XEN) MODULE[3]: 00000000fc5df000 - 00000000ffb3f810 Kernel > > In this case, the Xen binary is loaded above 2TiB. 2TiB is the maximum > identity map space supported by Xen, thus it fails to boot up due to the > out of the range. > > This patch introduces several macros to present the zeroth page table's Typo: s/zeroth/zeroeth/ > slot numbers for easier readable. Based on the defined macros, it > enlarges identity map space to 127TiB, which can support the memory > space [0x0 .. 0x00007eff_ffff_ffff] so has flexibility for various > platforms. Reserving 127 TiB for just the identity mapping is quite a lot. How did you decide the limit? What limit do you need on your platform? > > Fixes: 1c78d76b67 ("xen/arm64: mm: Introduce helpers to prepare/enable/disable") > Reported-by: Alexey Klimov <alexey.klimov@linaro.org> > Signed-off-by: Leo Yan <leo.yan@linaro.org> > --- > xen/arch/arm/arm64/mm.c | 12 ++++++++---- > xen/arch/arm/include/asm/config.h | 15 ++++++++------- > xen/arch/arm/mm.c | 2 +- > 3 files changed, 17 insertions(+), 12 deletions(-) > > diff --git a/xen/arch/arm/arm64/mm.c b/xen/arch/arm/arm64/mm.c > index 78b7c7eb00..802170cf29 100644 > --- a/xen/arch/arm/arm64/mm.c > +++ b/xen/arch/arm/arm64/mm.c > @@ -40,8 +40,10 @@ static void __init prepare_boot_identity_mapping(void) > clear_page(boot_second_id); > clear_page(boot_third_id); > > - if ( id_offsets[0] >= IDENTITY_MAPPING_AREA_NR_L0 ) > - panic("Cannot handle ID mapping above 2TB\n"); > + if ( id_offsets[0] >= XEN_IDENTITY_MAP_L0_END ) I don't see the value of renaming IDENTIY_MAPPING_AREA_NR_L0 to XEN_IDENTIY_MAP_L0_END. See more below. > + /* 1TiB occupies 2 slots in zeroeth table */ I don't understand how this comment is related to the message below. > + panic("Cannot handle ID mapping above %dTiB\n", The value is unsigned, so this you should use "%u". Also we have been using "TB" in Xen rather than "TiB". I would rather prefer if we keep the same for consistency even if this is not totally accurate. > + XEN_IDENTITY_MAP_L0_END>>1); Coding style: please add a space before and after >>. > > /* Link first ID table */ > pte = mfn_to_xen_entry(virt_to_mfn(boot_first_id), MT_NORMAL); > @@ -73,8 +75,10 @@ static void __init prepare_runtime_identity_mapping(void) > lpae_t pte; > DECLARE_OFFSETS(id_offsets, id_addr); > > - if ( id_offsets[0] >= IDENTITY_MAPPING_AREA_NR_L0 ) > - panic("Cannot handle ID mapping above 2TB\n"); > + if ( id_offsets[0] >= XEN_IDENTITY_MAP_L0_END ) > + /* 1TiB occupies 2 slots in zeroeth table */ > + panic("Cannot handle ID mapping above %dTiB\n", > + XEN_IDENTITY_MAP_L0_END>>1); Similar remarks here. > > /* Link first ID table */ > pte = pte_of_xenaddr((vaddr_t)xen_first_id); > diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm/config.h > index 21f4e68a40..b772f1574d 100644 > --- a/xen/arch/arm/include/asm/config.h > +++ b/xen/arch/arm/include/asm/config.h > @@ -87,11 +87,11 @@ > * 2G - 4G Domheap: on-demand-mapped > * > * ARM64 layout: > - * 0x0000000000000000 - 0x000001ffffffffff (2TB, L0 slots [0..3]) > + * 0x0000000000000000 - 0x00007effffffffff (127TB, L0 slots [0..253]) > * > * Reserved to identity map Xen > * > - * 0x0000020000000000 - 0x0000027fffffffff (512GB, L0 slot [4]) > + * 0x000007f000000000 - 0x00007fffffffffff (1TB, L0 slot [254..255]) I don't understand why this is changed. > * (Relative offsets) > * 0 - 2M Unmapped > * 2M - 10M Xen text, data, bss > @@ -103,9 +103,6 @@ > * > * 32G - 64G Frametable: 56 bytes per page for 2TB of RAM > * > - * 0x0000028000000000 - 0x00007fffffffffff (125TB, L0 slots [5..255]) > - * Unused > - * > * 0x0000800000000000 - 0x000084ffffffffff (5TB, L0 slots [256..265]) > * 1:1 mapping of RAM > * > @@ -117,8 +114,12 @@ > #define XEN_VIRT_START _AT(vaddr_t, MB(2)) > #else > > -#define IDENTITY_MAPPING_AREA_NR_L0 4 > -#define XEN_VM_MAPPING SLOT0(IDENTITY_MAPPING_AREA_NR_L0) > +#define XEN_IDENTITY_MAP_L0_START 0 So what's the value of L0_START when you don't use it in the code? Overall, I think it will actually mislead the developper because none of the code in Xen can cope with the value been non-zero. And FAOD, I don't think we should handle it in Xen. So I would rather prefer if the renaming is avoided. > +#define XEN_IDENTITY_MAP_L0_NUM 254 > +#define XEN_IDENTITY_MAP_L0_END (XEN_IDENTITY_MAP_L0_START + \ > + XEN_IDENTITY_MAP_L0_NUM) > +#define XEN_VM_MAP_L0_START (XEN_IDENTITY_MAP_L0_END) > +#define XEN_VM_MAPPING SLOT0(XEN_VM_MAP_L0_START) > > #define SLOT0_ENTRY_BITS 39 > #define SLOT0(slot) (_AT(vaddr_t,slot) << SLOT0_ENTRY_BITS) > diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c > index c34cc94c90..218552783e 100644 > --- a/xen/arch/arm/mm.c > +++ b/xen/arch/arm/mm.c > @@ -156,7 +156,7 @@ static void __init __maybe_unused build_assertions(void) > * with it. > */ > #define CHECK_OVERLAP_WITH_IDMAP(virt) \ > - BUILD_BUG_ON(zeroeth_table_offset(virt) < IDENTITY_MAPPING_AREA_NR_L0) > + BUILD_BUG_ON(zeroeth_table_offset(virt) < XEN_IDENTITY_MAP_L0_END) > > CHECK_OVERLAP_WITH_IDMAP(XEN_VIRT_START); > CHECK_OVERLAP_WITH_IDMAP(VMAP_VIRT_START); Cheers,
Hi Julien, On Mon, Sep 11, 2023 at 04:13:27PM +0100, Julien Grall wrote: > Hi Leo, > > I know you said you will respin the series. I'd like to leave some comments > to avoid having another round afterwards. Thanks! > On 09/09/2023 09:34, Leo Yan wrote: > > On some platforms, the memory regions could be: > > Can you add some details in the commit message on which platform you saw the > issue? Sure, I will add it. The issue happens on the ADLink AVA platform. > Also, in v1, the problem was also depending on the firmware version. Do you > know if it fails booting on a new or old firmware? My colleague Alexey (CCed) and I both tested Xen hypervisor on own AVA machine, Alexey produced this issue on his machine with the old firmware, I upgraded to the new firmware so I cannot see the issue anymore. > > (XEN) MODULE[0]: 00000807f6df0000 - 00000807f6f3e000 Xen > > (XEN) MODULE[1]: 00000807f8054000 - 00000807f8056000 Device Tree > > (XEN) MODULE[2]: 00000000fa834000 - 00000000fc5de1d5 Ramdisk > > (XEN) MODULE[3]: 00000000fc5df000 - 00000000ffb3f810 Kernel > > > > In this case, the Xen binary is loaded above 2TiB. 2TiB is the maximum > > identity map space supported by Xen, thus it fails to boot up due to the > > out of the range. > > > > This patch introduces several macros to present the zeroth page table's > > Typo: s/zeroth/zeroeth/ Will fix. > > slot numbers for easier readable. Based on the defined macros, it > > enlarges identity map space to 127TiB, which can support the memory > > space [0x0 .. 0x00007eff_ffff_ffff] so has flexibility for various > > platforms. > > Reserving 127 TiB for just the identity mapping is quite a lot. How did you > decide the limit? When I reviewed the existed code, I found it reserves 125TiB: 0x0000028000000000 - 0x00007fffffffffff (125TB, L0 slots [5..255]) Unused Seems to me, we can map this area. Ideally, if we only map for the first level's page table, we can just fill the zeroeth page and don't need to allocate extra page tables. > What limit do you need on your platform? On AVA platform, we can see the memory layout is: DRAM memory regions: Node[0] Region[0]: 0x000080000000 - 0x0000ffffffff Node[0] Region[1]: 0x080000000000 - 0x08007fffffff Node[0] Region[2]: 0x080100000000 - 0x0807ffffffff So the phycial memory address is splitted into the low address and the high address. The high memory address is above 8TiB. > > Fixes: 1c78d76b67 ("xen/arm64: mm: Introduce helpers to prepare/enable/disable") > > Reported-by: Alexey Klimov <alexey.klimov@linaro.org> > > Signed-off-by: Leo Yan <leo.yan@linaro.org> > > --- > > xen/arch/arm/arm64/mm.c | 12 ++++++++---- > > xen/arch/arm/include/asm/config.h | 15 ++++++++------- > > xen/arch/arm/mm.c | 2 +- > > 3 files changed, 17 insertions(+), 12 deletions(-) > > > > diff --git a/xen/arch/arm/arm64/mm.c b/xen/arch/arm/arm64/mm.c > > index 78b7c7eb00..802170cf29 100644 > > --- a/xen/arch/arm/arm64/mm.c > > +++ b/xen/arch/arm/arm64/mm.c > > @@ -40,8 +40,10 @@ static void __init prepare_boot_identity_mapping(void) > > clear_page(boot_second_id); > > clear_page(boot_third_id); > > - if ( id_offsets[0] >= IDENTITY_MAPPING_AREA_NR_L0 ) > > - panic("Cannot handle ID mapping above 2TB\n"); > > + if ( id_offsets[0] >= XEN_IDENTITY_MAP_L0_END ) > > I don't see the value of renaming IDENTIY_MAPPING_AREA_NR_L0 to > XEN_IDENTIY_MAP_L0_END. See more below. Okay. It's fine for me to keep the naming. > > + /* 1TiB occupies 2 slots in zeroeth table */ > > I don't understand how this comment is related to the message below. > > > + panic("Cannot handle ID mapping above %dTiB\n", > > The value is unsigned, so this you should use "%u". Also we have been using > "TB" in Xen rather than "TiB". I would rather prefer if we keep the same for > consistency even if this is not totally accurate. Sure, will fix it. > > + XEN_IDENTITY_MAP_L0_END>>1); > > Coding style: please add a space before and after >>. Will fix. > > /* Link first ID table */ > > pte = mfn_to_xen_entry(virt_to_mfn(boot_first_id), MT_NORMAL); > > @@ -73,8 +75,10 @@ static void __init prepare_runtime_identity_mapping(void) > > lpae_t pte; > > DECLARE_OFFSETS(id_offsets, id_addr); > > - if ( id_offsets[0] >= IDENTITY_MAPPING_AREA_NR_L0 ) > > - panic("Cannot handle ID mapping above 2TB\n"); > > + if ( id_offsets[0] >= XEN_IDENTITY_MAP_L0_END ) > > + /* 1TiB occupies 2 slots in zeroeth table */ > > + panic("Cannot handle ID mapping above %dTiB\n", > > + XEN_IDENTITY_MAP_L0_END>>1); > > Similar remarks here. Will do. > > /* Link first ID table */ > > pte = pte_of_xenaddr((vaddr_t)xen_first_id); > > diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm/config.h > > index 21f4e68a40..b772f1574d 100644 > > --- a/xen/arch/arm/include/asm/config.h > > +++ b/xen/arch/arm/include/asm/config.h > > @@ -87,11 +87,11 @@ > > * 2G - 4G Domheap: on-demand-mapped > > * > > * ARM64 layout: > > - * 0x0000000000000000 - 0x000001ffffffffff (2TB, L0 slots [0..3]) > > + * 0x0000000000000000 - 0x00007effffffffff (127TB, L0 slots [0..253]) > > * > > * Reserved to identity map Xen > > * > > - * 0x0000020000000000 - 0x0000027fffffffff (512GB, L0 slot [4]) > > + * 0x000007f000000000 - 0x00007fffffffffff (1TB, L0 slot [254..255]) > > I don't understand why this is changed. I will keep this region size as 512GB. A side topic is about extending the frame table, I conclude we don't need to extend the frame table from support 2TiB to 127TiB. The reason is the frame table is page management structure, it doesn't need to cover the hole in the memory layout, pfn_pdx_hole_setup() is used to calculate the biggest hole in the memory layout and in the end the frame table doesn't manage the hole region. > > * (Relative offsets) > > * 0 - 2M Unmapped > > * 2M - 10M Xen text, data, bss > > @@ -103,9 +103,6 @@ > > * > > * 32G - 64G Frametable: 56 bytes per page for 2TB of RAM > > * > > - * 0x0000028000000000 - 0x00007fffffffffff (125TB, L0 slots [5..255]) > > - * Unused > > - * > > * 0x0000800000000000 - 0x000084ffffffffff (5TB, L0 slots [256..265]) > > * 1:1 mapping of RAM > > * > > @@ -117,8 +114,12 @@ > > #define XEN_VIRT_START _AT(vaddr_t, MB(2)) > > #else > > -#define IDENTITY_MAPPING_AREA_NR_L0 4 > > -#define XEN_VM_MAPPING SLOT0(IDENTITY_MAPPING_AREA_NR_L0) > > +#define XEN_IDENTITY_MAP_L0_START 0 > > So what's the value of L0_START when you don't use it in the code? Overall, > I think it will actually mislead the developper because none of the code in > Xen can cope with the value been non-zero. Just clarify, I think none of the code in Xen can cope with the value been *zero*, right? > And FAOD, I don't think we should handle it in Xen. So I would rather prefer > if the renaming is avoided. Okay, in the next spin I will keep IDENTITY_MAPPING_AREA_NR_L0. You could see I tried to use the macro XEN_VM_MAPPING to replace the open coded 'SLOT0(4)', do you mind for this change or not? Thank you, Leo > > +#define XEN_IDENTITY_MAP_L0_NUM 254 > > +#define XEN_IDENTITY_MAP_L0_END (XEN_IDENTITY_MAP_L0_START + \ > > + XEN_IDENTITY_MAP_L0_NUM) > > +#define XEN_VM_MAP_L0_START (XEN_IDENTITY_MAP_L0_END) > > +#define XEN_VM_MAPPING SLOT0(XEN_VM_MAP_L0_START) > > #define SLOT0_ENTRY_BITS 39 > > #define SLOT0(slot) (_AT(vaddr_t,slot) << SLOT0_ENTRY_BITS) > > diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c > > index c34cc94c90..218552783e 100644 > > --- a/xen/arch/arm/mm.c > > +++ b/xen/arch/arm/mm.c > > @@ -156,7 +156,7 @@ static void __init __maybe_unused build_assertions(void) > > * with it. > > */ > > #define CHECK_OVERLAP_WITH_IDMAP(virt) \ > > - BUILD_BUG_ON(zeroeth_table_offset(virt) < IDENTITY_MAPPING_AREA_NR_L0) > > + BUILD_BUG_ON(zeroeth_table_offset(virt) < XEN_IDENTITY_MAP_L0_END) > > CHECK_OVERLAP_WITH_IDMAP(XEN_VIRT_START); > > CHECK_OVERLAP_WITH_IDMAP(VMAP_VIRT_START); > > Cheers, > > -- > Julien Grall
Hi Leo, > On Sep 12, 2023, at 10:41, Leo Yan <leo.yan@linaro.org> wrote: > > Hi Julien, > > On Mon, Sep 11, 2023 at 04:13:27PM +0100, Julien Grall wrote: >> Hi Leo, >> >> I know you said you will respin the series. I'd like to leave some comments >> to avoid having another round afterwards. > > Thanks! > >> On 09/09/2023 09:34, Leo Yan wrote: >>> On some platforms, the memory regions could be: >> >> Can you add some details in the commit message on which platform you saw the >> issue? > > Sure, I will add it. The issue happens on the ADLink AVA platform. At Arm we also test Xen on AVA in our CI, but our setup is based on Yocto meta-adlink-ampere layer [1]. > >> Also, in v1, the problem was also depending on the firmware version. Do you >> know if it fails booting on a new or old firmware? > > My colleague Alexey (CCed) and I both tested Xen hypervisor on own AVA > machine, Alexey produced this issue on his machine with the old > firmware, I upgraded to the new firmware so I cannot see the issue > anymore. > >>> (XEN) MODULE[0]: 00000807f6df0000 - 00000807f6f3e000 Xen >>> (XEN) MODULE[1]: 00000807f8054000 - 00000807f8056000 Device Tree >>> (XEN) MODULE[2]: 00000000fa834000 - 00000000fc5de1d5 Ramdisk >>> (XEN) MODULE[3]: 00000000fc5df000 - 00000000ffb3f810 Kernel I tried to dig a bit more about Xen log printed by our AVA setup, and [2] is our RAM and MODULES setup, just FYI and hopefully it helps. [1] https://github.com/ADLINK/meta-adlink-ampere [2] https://pastebin.com/raw/0DQpmJP1 Kind regards, Henry
Hi Henry, On Tue, Sep 12, 2023 at 03:01:30AM +0000, Henry Wang wrote: [...] > At Arm we also test Xen on AVA in our CI, but our setup is based on Yocto > meta-adlink-ampere layer [1]. Thanks for sharing the info. Yes, we (Linaro) also work with Yocto based on EWAOL [1] or TRS [2]. > >> Also, in v1, the problem was also depending on the firmware version. Do you > >> know if it fails booting on a new or old firmware? > > > > My colleague Alexey (CCed) and I both tested Xen hypervisor on own AVA > > machine, Alexey produced this issue on his machine with the old > > firmware, I upgraded to the new firmware so I cannot see the issue > > anymore. > > > >>> (XEN) MODULE[0]: 00000807f6df0000 - 00000807f6f3e000 Xen > >>> (XEN) MODULE[1]: 00000807f8054000 - 00000807f8056000 Device Tree > >>> (XEN) MODULE[2]: 00000000fa834000 - 00000000fc5de1d5 Ramdisk > >>> (XEN) MODULE[3]: 00000000fc5df000 - 00000000ffb3f810 Kernel > > I tried to dig a bit more about Xen log printed by our AVA setup, and [2] is our > RAM and MODULES setup, just FYI and hopefully it helps. Yeah, the log shows the high address space is above 8TB: (XEN) RAM: 0000080000000000 - 000008007fffffff (XEN) RAM: 0000080100000000 - 000008039bffffff (XEN) RAM: 000008039c000000 - 00000803ffffffff Appreciate for the log and it's helpful! Leo > [1] https://github.com/ADLINK/meta-adlink-ampere > [2] https://pastebin.com/raw/0DQpmJP1 > > Kind regards, > Henry > >
diff --git a/xen/arch/arm/arm64/mm.c b/xen/arch/arm/arm64/mm.c index 78b7c7eb00..802170cf29 100644 --- a/xen/arch/arm/arm64/mm.c +++ b/xen/arch/arm/arm64/mm.c @@ -40,8 +40,10 @@ static void __init prepare_boot_identity_mapping(void) clear_page(boot_second_id); clear_page(boot_third_id); - if ( id_offsets[0] >= IDENTITY_MAPPING_AREA_NR_L0 ) - panic("Cannot handle ID mapping above 2TB\n"); + if ( id_offsets[0] >= XEN_IDENTITY_MAP_L0_END ) + /* 1TiB occupies 2 slots in zeroeth table */ + panic("Cannot handle ID mapping above %dTiB\n", + XEN_IDENTITY_MAP_L0_END>>1); /* Link first ID table */ pte = mfn_to_xen_entry(virt_to_mfn(boot_first_id), MT_NORMAL); @@ -73,8 +75,10 @@ static void __init prepare_runtime_identity_mapping(void) lpae_t pte; DECLARE_OFFSETS(id_offsets, id_addr); - if ( id_offsets[0] >= IDENTITY_MAPPING_AREA_NR_L0 ) - panic("Cannot handle ID mapping above 2TB\n"); + if ( id_offsets[0] >= XEN_IDENTITY_MAP_L0_END ) + /* 1TiB occupies 2 slots in zeroeth table */ + panic("Cannot handle ID mapping above %dTiB\n", + XEN_IDENTITY_MAP_L0_END>>1); /* Link first ID table */ pte = pte_of_xenaddr((vaddr_t)xen_first_id); diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm/config.h index 21f4e68a40..b772f1574d 100644 --- a/xen/arch/arm/include/asm/config.h +++ b/xen/arch/arm/include/asm/config.h @@ -87,11 +87,11 @@ * 2G - 4G Domheap: on-demand-mapped * * ARM64 layout: - * 0x0000000000000000 - 0x000001ffffffffff (2TB, L0 slots [0..3]) + * 0x0000000000000000 - 0x00007effffffffff (127TB, L0 slots [0..253]) * * Reserved to identity map Xen * - * 0x0000020000000000 - 0x0000027fffffffff (512GB, L0 slot [4]) + * 0x000007f000000000 - 0x00007fffffffffff (1TB, L0 slot [254..255]) * (Relative offsets) * 0 - 2M Unmapped * 2M - 10M Xen text, data, bss @@ -103,9 +103,6 @@ * * 32G - 64G Frametable: 56 bytes per page for 2TB of RAM * - * 0x0000028000000000 - 0x00007fffffffffff (125TB, L0 slots [5..255]) - * Unused - * * 0x0000800000000000 - 0x000084ffffffffff (5TB, L0 slots [256..265]) * 1:1 mapping of RAM * @@ -117,8 +114,12 @@ #define XEN_VIRT_START _AT(vaddr_t, MB(2)) #else -#define IDENTITY_MAPPING_AREA_NR_L0 4 -#define XEN_VM_MAPPING SLOT0(IDENTITY_MAPPING_AREA_NR_L0) +#define XEN_IDENTITY_MAP_L0_START 0 +#define XEN_IDENTITY_MAP_L0_NUM 254 +#define XEN_IDENTITY_MAP_L0_END (XEN_IDENTITY_MAP_L0_START + \ + XEN_IDENTITY_MAP_L0_NUM) +#define XEN_VM_MAP_L0_START (XEN_IDENTITY_MAP_L0_END) +#define XEN_VM_MAPPING SLOT0(XEN_VM_MAP_L0_START) #define SLOT0_ENTRY_BITS 39 #define SLOT0(slot) (_AT(vaddr_t,slot) << SLOT0_ENTRY_BITS) diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c index c34cc94c90..218552783e 100644 --- a/xen/arch/arm/mm.c +++ b/xen/arch/arm/mm.c @@ -156,7 +156,7 @@ static void __init __maybe_unused build_assertions(void) * with it. */ #define CHECK_OVERLAP_WITH_IDMAP(virt) \ - BUILD_BUG_ON(zeroeth_table_offset(virt) < IDENTITY_MAPPING_AREA_NR_L0) + BUILD_BUG_ON(zeroeth_table_offset(virt) < XEN_IDENTITY_MAP_L0_END) CHECK_OVERLAP_WITH_IDMAP(XEN_VIRT_START); CHECK_OVERLAP_WITH_IDMAP(VMAP_VIRT_START);
On some platforms, the memory regions could be: (XEN) MODULE[0]: 00000807f6df0000 - 00000807f6f3e000 Xen (XEN) MODULE[1]: 00000807f8054000 - 00000807f8056000 Device Tree (XEN) MODULE[2]: 00000000fa834000 - 00000000fc5de1d5 Ramdisk (XEN) MODULE[3]: 00000000fc5df000 - 00000000ffb3f810 Kernel In this case, the Xen binary is loaded above 2TiB. 2TiB is the maximum identity map space supported by Xen, thus it fails to boot up due to the out of the range. This patch introduces several macros to present the zeroth page table's slot numbers for easier readable. Based on the defined macros, it enlarges identity map space to 127TiB, which can support the memory space [0x0 .. 0x00007eff_ffff_ffff] so has flexibility for various platforms. Fixes: 1c78d76b67 ("xen/arm64: mm: Introduce helpers to prepare/enable/disable") Reported-by: Alexey Klimov <alexey.klimov@linaro.org> Signed-off-by: Leo Yan <leo.yan@linaro.org> --- xen/arch/arm/arm64/mm.c | 12 ++++++++---- xen/arch/arm/include/asm/config.h | 15 ++++++++------- xen/arch/arm/mm.c | 2 +- 3 files changed, 17 insertions(+), 12 deletions(-)