|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC 32/35] arm : acpi map xen environment table to dom0
On Wed, 4 Feb 2015, parth.dixit@xxxxxxxxxx wrote:
> From: Parth Dixit <parth.dixit@xxxxxxxxxx>
>
> xen environment table contains the grant table address,size and event
> channel interrupt information required by dom0.
>
> Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx>
> ---
> xen/arch/arm/arm64/acpi/arm-core.c | 52
> +++++++++++++++++++++++++++++++++++++-
> 1 file changed, 51 insertions(+), 1 deletion(-)
>
> diff --git a/xen/arch/arm/arm64/acpi/arm-core.c
> b/xen/arch/arm/arm64/acpi/arm-core.c
> index 9fd02f9..9e9285c 100644
> --- a/xen/arch/arm/arm64/acpi/arm-core.c
> +++ b/xen/arch/arm/arm64/acpi/arm-core.c
> @@ -33,7 +33,6 @@
> #include <asm/cputype.h>
> #include <asm/acpi.h>
> #include <asm/p2m.h>
> -
> /*
> * We never plan to use RSDT on arm/arm64 as its deprecated in spec but this
> * variable is still required by the ACPI core
Spurious change
> @@ -297,6 +296,49 @@ static int map_stao_table(struct domain *d, u64 *mstao)
> return 0;
> }
>
> +static int map_xenv_table(struct domain *d, u64 *mxenv)
> +{
> + u64 addr;
> + u64 size;
> + int res;
> + u8 checksum;
> + struct acpi_table_xenv *xenv=NULL;
> +
> + xenv = ACPI_ALLOCATE_ZEROED( sizeof(struct acpi_table_xenv) );
> + if( xenv == NULL )
> + return -ENOMEM;
> +
> + ACPI_MEMCPY(xenv->header.signature, ACPI_SIG_XENV, 4);
> + xenv->header.length = sizeof(struct acpi_table_header)+12;
> + xenv->header.checksum = 0;
> + ACPI_MEMCPY(xenv->header.oem_id, "XenVMM", 6);
> + ACPI_MEMCPY(xenv->header.oem_table_id, "RTSMVEV8", 8);
> + xenv->header.revision = 1;
> + ACPI_MEMCPY(xenv->header.asl_compiler_id, "INTL", 4);
> + xenv->header.asl_compiler_revision = 0x20140828;
> + xenv->gnt_start = 0x00000010000000;
> + xenv->gnt_size = 0x20000;
> + xenv->evt_intr = 31;
> + xenv->evt_intr_flag =3;
> + size = sizeof(struct acpi_table_xenv);
As per all the other checksum calculation, I wonder whether we need a
memory barrier here.
> + checksum = acpi_tb_checksum(ACPI_CAST_PTR(u8, xenv), size);
> + xenv->header.checksum = (u8)( xenv->header.checksum - checksum );
> + *mxenv = addr = virt_to_maddr(xenv);
Given that this is way before we start dom0, I don't think we need any
memory barriers here.
> + res = map_ram_regions(d,
> + paddr_to_pfn(addr & PAGE_MASK),
> + DIV_ROUND_UP(size, PAGE_SIZE),
> + paddr_to_pfn(addr & PAGE_MASK));
> + if ( res )
> + {
> + printk(XENLOG_ERR "Unable to map 0x%"PRIx64
> + " - 0x%"PRIx64" in domain \n",
> + addr & PAGE_MASK, PAGE_ALIGN(addr + size) - 1);
> + return res;
> + }
> +
> + return 0;
> +}
>
> #define NR_NEW_XEN_TABLES 2
>
> @@ -346,6 +388,14 @@ static int map_xsdt_table(struct domain *d, u64 *xsdt)
> ( ( (size - sizeof(struct acpi_table_header) ) /
> sizeof(acpi_native_uint) ) );
>
> + /* map xen env table */
> + res = map_xenv_table(d, &addr);
> + if(res)
> + return res;
> +
> + table_entry--;
> + *table_entry = addr ;
> +
> /* map stao table */
> map_stao_table(d, &addr);
> if(res)
> --
> 1.9.1
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |