[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2/5] device tree, arm: supply a flat device tree to dom0
On 30/03/12 16:59, Ian Campbell wrote: > On Thu, 2012-03-22 at 19:17 +0000, David Vrabel wrote: >> From: David Vrabel <david.vrabel@xxxxxxxxxx> >> >> Build a flat device tree for dom0 based on the one supplied to Xen. >> The following changes are made: >> >> * In the /chosen node, the xen,dom0-bootargs parameter is renamed to >> bootargs. >> >> * In all memory nodes, the reg parameters are adjusted to reflect >> the amount of memory dom0 can use. The p2m is updated using this >> info. >> >> Support for passing ATAGS to dom0 is removed. >> >> Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx> >> --- >> xen/arch/arm/domain_build.c | 257 >> +++++++++++++++++++++++++++++------ >> xen/arch/arm/kernel.c | 2 +- >> xen/arch/arm/kernel.h | 8 +- >> xen/common/device_tree.c | 47 ++++-- >> xen/include/xen/device_tree.h | 8 + >> xen/include/xen/libfdt/libfdt_env.h | 3 + >> 6 files changed, 265 insertions(+), 60 deletions(-) >> >> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c >> index 15632f7..b4c0452 100644 >> --- a/xen/arch/arm/domain_build.c >> +++ b/xen/arch/arm/domain_build.c >> @@ -6,6 +6,10 @@ >> #include <xen/sched.h> >> #include <asm/irq.h> >> #include <asm/regs.h> >> +#include <xen/errno.h> >> +#include <xen/device_tree.h> >> +#include <xen/libfdt/libfdt.h> >> +#include <xen/guest_access.h> >> >> #include "gic.h" >> #include "kernel.h" >> @@ -13,6 +17,13 @@ >> static unsigned int __initdata opt_dom0_max_vcpus; >> integer_param("dom0_max_vcpus", opt_dom0_max_vcpus); >> >> +/* >> + * Amount of extra space required to dom0's device tree. No new nodes >> + * are added (yet) but one terminating reserve map entry (16 bytes) is >> + * added. >> + */ >> +#define DOM0_FDT_EXTRA_SIZE (sizeof(struct fdt_reserve_entry)) >> + >> struct vcpu *__init alloc_dom0_vcpu0(void) >> { >> if ( opt_dom0_max_vcpus == 0 ) >> @@ -28,43 +39,210 @@ struct vcpu *__init alloc_dom0_vcpu0(void) >> return alloc_vcpu(dom0, 0, 0); >> } >> >> -extern void guest_mode_entry(void); >> +static void set_memory_reg(struct domain *d, struct kernel_info *kinfo, >> + const void *fdt, >> + const u32 *cell, int address_cells, int >> size_cells, >> + u32 *new_cell, int *len) >> +{ >> + int reg_size = (address_cells + size_cells) * sizeof(*cell); >> + int l; >> + u64 start; >> + u64 size; >> + >> + l = *len; > >> + >> + while ( kinfo->unassigned_mem > 0 && l >= reg_size >> + && kinfo->mem.nr_banks < NR_MEM_BANKS ) >> + { >> + device_tree_get_reg(&cell, address_cells, size_cells, &start, >> &size); >> + if ( size > kinfo->unassigned_mem ) >> + size = kinfo->unassigned_mem; >> + >> + device_tree_set_reg(&new_cell, address_cells, size_cells, start, >> size); > > This assumes/requires that address_cells and size_cells a 1, right? If > they end up being 2 or more then device_tree_get_reg will trample on the > stack via &start and &size. No. address_cells and size_cells can be 1 or 2. This is enough for 64 addresses. >> + >> + printk("Populate P2M %#llx->%#llx\n", start, start + size); >> + p2m_populate_ram(d, start, start + size); >> + kinfo->mem.bank[kinfo->mem.nr_banks].start = start; >> + kinfo->mem.bank[kinfo->mem.nr_banks].size = size; >> + kinfo->mem.nr_banks++; >> + kinfo->unassigned_mem -= size; >> + >> + l -= reg_size; >> + } >> + >> + *len -= l; > > I had a bit of trouble following the logic wrt l and the updating of > *len in this function. I've updated this as per your suggestion. >> --- a/xen/include/xen/libfdt/libfdt_env.h >> +++ b/xen/include/xen/libfdt/libfdt_env.h >> @@ -13,4 +13,7 @@ >> #define fdt64_to_cpu(x) be64_to_cpu(x) >> #define cpu_to_fdt64(x) cpu_to_be64(x) >> >> +/* Xen-specific libfdt error code. */ >> +#define FDT_ERR_XEN(err) (FDT_ERR_MAX + (err)) > > Looks like the only user is FDT_ERR_XEN(ENOMEM) which could as well be > FDT_ERR_NOSPACE? No. FDT_ERR_NOSPACE means the buffer isn't large enough to add new nodes etc. This needs to be a different error code from a memory allocation failure. > FWIW I think adding a new error code would be a fair reason to diverge > in a controlled way from the pristine upstream source. I don't know what you're asking for here. David _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |