[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH RFC 32/35] arm : acpi map xen environment table to dom0



On Wed, 4 Feb 2015, parth.dixit@xxxxxxxxxx wrote:
> From: Parth Dixit <parth.dixit@xxxxxxxxxx>
> 
> xen environment table contains the grant table address,size and event
> channel interrupt information required by dom0.
> 
> Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx>
> ---
>  xen/arch/arm/arm64/acpi/arm-core.c | 52 
> +++++++++++++++++++++++++++++++++++++-
>  1 file changed, 51 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/arm64/acpi/arm-core.c 
> b/xen/arch/arm/arm64/acpi/arm-core.c
> index 9fd02f9..9e9285c 100644
> --- a/xen/arch/arm/arm64/acpi/arm-core.c
> +++ b/xen/arch/arm/arm64/acpi/arm-core.c
> @@ -33,7 +33,6 @@
>  #include <asm/cputype.h>
>  #include <asm/acpi.h>
>  #include <asm/p2m.h>
> -
>  /*
>   * We never plan to use RSDT on arm/arm64 as its deprecated in spec but this
>   * variable is still required by the ACPI core

Spurious change


> @@ -297,6 +296,49 @@ static int map_stao_table(struct domain *d, u64 *mstao)
>      return 0;
>  }
>  
> +static int map_xenv_table(struct domain *d, u64 *mxenv)
> +{
> +    u64 addr;
> +    u64 size;
> +    int res;
> +    u8 checksum;
> +    struct acpi_table_xenv *xenv=NULL;
> +
> +    xenv = ACPI_ALLOCATE_ZEROED( sizeof(struct acpi_table_xenv) );
> +    if( xenv == NULL )
> +            return -ENOMEM;
> +
> +    ACPI_MEMCPY(xenv->header.signature, ACPI_SIG_XENV, 4);
> +    xenv->header.length = sizeof(struct acpi_table_header)+12;
> +    xenv->header.checksum = 0;
> +    ACPI_MEMCPY(xenv->header.oem_id, "XenVMM", 6);
> +    ACPI_MEMCPY(xenv->header.oem_table_id, "RTSMVEV8", 8);
> +    xenv->header.revision = 1;
> +    ACPI_MEMCPY(xenv->header.asl_compiler_id, "INTL", 4);
> +    xenv->header.asl_compiler_revision = 0x20140828;
> +    xenv->gnt_start = 0x00000010000000;
> +    xenv->gnt_size = 0x20000;
> +    xenv->evt_intr = 31;
> +    xenv->evt_intr_flag =3;
> +    size = sizeof(struct acpi_table_xenv);

As per all the other checksum calculation, I wonder whether we need a
memory barrier here.


> +    checksum = acpi_tb_checksum(ACPI_CAST_PTR(u8, xenv), size);
> +    xenv->header.checksum = (u8)( xenv->header.checksum - checksum );
> +    *mxenv = addr = virt_to_maddr(xenv);

Given that this is way before we start dom0, I don't think we need any
memory barriers here.


> +    res = map_ram_regions(d,
> +                        paddr_to_pfn(addr & PAGE_MASK),
> +                        DIV_ROUND_UP(size, PAGE_SIZE),
> +                        paddr_to_pfn(addr & PAGE_MASK));
> +    if ( res )
> +    {
> +         printk(XENLOG_ERR "Unable to map 0x%"PRIx64
> +                " - 0x%"PRIx64" in domain \n",
> +                addr & PAGE_MASK, PAGE_ALIGN(addr + size) - 1);
> +         return res;
> +    }
> +
> +    return 0;
> +}
>  
>  #define NR_NEW_XEN_TABLES 2
>  
> @@ -346,6 +388,14 @@ static int map_xsdt_table(struct domain *d, u64 *xsdt)
>          ( ( (size - sizeof(struct acpi_table_header) ) /
>              sizeof(acpi_native_uint) ) );
>  
> +    /* map xen env table */
> +    res = map_xenv_table(d, &addr);
> +    if(res)
> +            return res;
> +
> +    table_entry--;
> +    *table_entry = addr ;
> +
>      /* map stao table */
>      map_stao_table(d, &addr);
>      if(res)
> -- 
> 1.9.1
> 

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.