|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] x86/xen: populate boot_params with EDD data
On Wed, Apr 03, 2013 at 12:10:49PM +0100, David Vrabel wrote:
> From: David Vrabel <david.vrabel@xxxxxxxxxx>
>
> During early setup of a dom0 kernel, populate boot_params with the
> Enhanced Disk Drive (EDD) and MBR signature data. This makes
> information on the BIOS boot device available in /sys/firmware/edd/.
>
> Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx>
> ---
> arch/x86/xen/enlighten.c | 57
> ++++++++++++++++++++++++++++++++++++++++++++++
> 1 files changed, 57 insertions(+), 0 deletions(-)
>
> diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c
> index c8e1c7b..857d3bc 100644
> --- a/arch/x86/xen/enlighten.c
> +++ b/arch/x86/xen/enlighten.c
> @@ -31,6 +31,7 @@
> #include <linux/pci.h>
> #include <linux/gfp.h>
> #include <linux/memblock.h>
> +#include <linux/edd.h>
>
> #include <xen/xen.h>
> #include <xen/events.h>
> @@ -1306,6 +1307,60 @@ static const struct machine_ops xen_machine_ops
> __initconst = {
> .emergency_restart = xen_emergency_restart,
> };
>
> +#if defined(CONFIG_EDD) || defined(CONFIG_EDD_MODULE)
> +static void __init load_edd(void)
> +{
> + struct xen_platform_op op;
> + struct edd_info *edd_info;
> + u32 *mbr_signature;
> + unsigned nr;
> + int ret;
> +
> + edd_info = boot_params.eddbuf;
> + mbr_signature = boot_params.edd_mbr_sig_buffer;
> +
> + op.cmd = XENPF_firmware_info;
> +
> + op.u.firmware_info.type = XEN_FW_DISK_INFO;
> + for (nr = 0; nr < EDDMAXNR; nr++) {
> + struct edd_info *info = edd_info + nr;
> +
> + op.u.firmware_info.index = nr;
> + info->params.length = sizeof(info->params);
> + set_xen_guest_handle(op.u.firmware_info.u.disk_info.edd_params,
> + &info->params);
> + ret = HYPERVISOR_dom0_op(&op);
> + if (ret)
> + break;
> +
> +#define C(x) info->x = op.u.firmware_info.u.disk_info.x
> + C(device);
> + C(version);
> + C(interface_support);
> + C(legacy_max_cylinder);
> + C(legacy_max_head);
> + C(legacy_sectors_per_track);
> +#undef C
> + }
> + boot_params.eddbuf_entries = nr;
> +
> + op.u.firmware_info.type = XEN_FW_DISK_MBR_SIGNATURE;
> + for (nr = 0; nr < EDD_MBR_SIG_MAX; nr++) {
> + op.u.firmware_info.index = nr;
> + ret = HYPERVISOR_dom0_op(&op);
> + if (ret)
> + break;
> + mbr_signature[nr] =
> op.u.firmware_info.u.disk_mbr_signature.mbr_signature;
> + }
> + boot_params.edd_mbr_sig_buf_entries = nr;
If those two loops end up terminating at different spots (say first
one ends at nr=1, and the second at nr=5), is that going to present
a problem?
Should we have some form of 'min(nr_earlier, nr)' to clamp down in
case of weird oddities?
> +}
> +#else
> +static inline void __init load_edd(void)
> +{
> +}
> +#endif
> +
> +
> /*
> * Set up the GDT and segment registers for -fstack-protector. Until
> * we do this, we have to be careful not to call any stack-protected
> @@ -1508,6 +1563,8 @@ asmlinkage void __init xen_start_kernel(void)
> /* Avoid searching for BIOS MP tables */
> x86_init.mpparse.find_smp_config = x86_init_noop;
> x86_init.mpparse.get_smp_config = x86_init_uint_noop;
> +
> + load_edd();
> }
> #ifdef CONFIG_PCI
> /* PCI BIOS service won't work from a PV guest. */
> --
> 1.7.2.5
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |