[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen
On Wed, 5 Aug 2015, Shannon Zhao wrote: > On 2015/8/4 22:37, Stefano Stabellini wrote: > > On Tue, 4 Aug 2015, Shannon Zhao wrote: > >> This document is going to explain the design details of Xen booting with > >> ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are > >> welcome. > > > > Good start! > > > > > >> To Xen itself booting with ACPI, this is similar to Linux kernel except > >> that Xen doesn't parse DSDT table. So I'll skip this part and focus on > >> how Xen prepares ACPI tables for DOM0 and how Xen passes them to DOM0. > >> > >> 1)copy and change some EFI and ACPI tables. > >> a) Copy EFI_SYSTEM_TABLE and change the value of FirmwareVendor, > >> VendorGuid, VendorTable, ConfigurationTable. These changes are not > >> very special and it just assign values to these members. > >> b) Create EFI_MEMORY_DESCRIPTOR table. This will add memory start and > >> size information of DOM0. And DOM0 will get the memory information > >> through this EFI table. > >> c) Copy FADT table. Change the value of arm_boot_flags to enable PSCI > >> and HVC. Let the hypervisor_id be "XenVMM" in order to tell DOM0 > >> that it runs on Xen hypervisor, so DOM0 can call hypercall to get > >> some informations for booting necessity, such as grant tab start > >> address and size. Change header revison, length and checksum as > >> well. > >> d) Copy GTDT table. Set non_secure_el2_interrupt and > >> non_secure_el2_flags to 0 to mask EL2 timer for DOM0. > >> e) Copy MADT table. According to the value of dom0_max_vcpus to change > >> the number GICC entries. > >> f) Create STAO table. This table is a new added one that's used to > >> define a list of ACPI namespace names that are to be ignored by the > >> OSPM in DOM0. Currently we use it to tell OSPM should ignore UART > >> defined in SPCR table. > >> g) Copy XSDT table. Add a new table entry for STAO and change other > >> table's entries. > >> h) Change the value of xsdt_physical_address in RSDP table. > >> i) The reset of tables are not copied or changed. They are reused > >> including DSDT, SPCR. > > > > OK so far > > > > > >> All these tables will be copied or mapped to guest memory. > > > > Are they copied or mapped? Also I think we need to recalculate the > > md5sum? > > > > > >> 2)Create minimal DT to pass required informations to DOM0 > >> The minimal DT mainly passes DOM0 bootargs, address and size of initrd > >> (if available), address and size of uefi system table, address and > >> size of uefi memory table, uefi-mmap-desc-size and uefi-mmap-desc-ver. > > > > I think we need to specify which Linux entry point is called, that I > > think will be the proper non-EFI kernel entry point, which requires MMU > > off (see Documentation/efi-stub.txt in linux). > > > > Also it would be better to write the full bindings of the generated > > minimal DT, see http://marc.info/?l=linux-kernel&m=142362266626403&w=2 > > and Documentation/arm/uefi.txt in linux. > > > An example of the minimal DT: > / { > #address-cells = <2>; > #size-cells = <1>; > chosen { > bootargs = "kernel=Image console=hvc0 earlycon=pl011,0x1c090000 > root=/dev/vda2 rw rootfstype=ext4 init=/bin/sh acpi=force"; > linux,initrd-start = <0xXXXXXXXX>; > linux,initrd-end = <0xXXXXXXXX>; > linux,uefi-system-table = <0xXXXXXXXX>; > linux,uefi-mmap-start = <0xXXXXXXXX>; > linux,uefi-mmap-size = <0xXXXXXXXX>; > linux,uefi-mmap-desc-size = <0xXXXXXXXX>; > linux,uefi-mmap-desc-ver = <0xXXXXXXXX>; > }; > }; Good, please include this example in the doc. Please include a pointer to Documentation/arm/uefi.txt which lists these paramaters. > >> 3)DOM0 how to get grant table and event channel irq informations > >> As said above, we assign the hypervisor_id be "XenVMM" to tell DOM0 > >> that it runs on Xen hypervisor. > >> Then save the start address and size > >> of grant table in domain->grant_table->start_addr and > >> domain->grant_table->size. DOM0 can call a new hypercall > >> GNTTABOP_get_start_addr to get these info. > >> Same to event channel, we've already save interrupt number in > >> d->arch.evtchn_irq, so DOM0 can call a new hypercall EVTCHNOP_get_irq > >> to get the irq. > > > > It would be nice to go down into more details and write the parameters > > of the hypercalls in the doc as they will become a newly supported ABI. > > > The parameters of GNTTABOP_get_start_addr is like below: > struct gnttab_get_start_addr { > /* IN parameters */ > domid_t dom; > uint16_t pad; > /* OUT parameters */ > uint64_t start_addr; > uint64_t size; > }; > > The parameters of EVTCHNOP_get_irq is like below: > struct evtchn_get_irq { > /* IN parameters. */ > domid_t dom; > uint16_t pad; > /* OUT parameters. */ > uint32_t irq; > }; I think that it makes sense to reuse the existing HVM_PARAM_CALLBACK_IRQ hvmop call in this case. See drivers/xen/events/events_base.c:xen_set_callback_via in Linux and xen/include/public/hvm/params.h in Xen. I would just add a new delivery type: val[63:56] == 3: val[7:0] is a PPI (ARM and ARM64 only) I would appreciate Jan's feedback on the two hypercalls. > > The evtchnop would need to be called something like > > EVTCHNOP_get_notification_irq and would need to be ARM specific (on x86 > > things are different). > > > > > > > >> 4)How to map MMIO regions > >> a)Current implementation is mapping MMIO regions in Dom0 on demand > >> when trapping in Xen with a data abort. > > > > I think this approach is prone to failures. A driver could program a > > device for DMA involving regions not yet mapped. As a consequence the > > DMA operation would fail because the SMMU would stop the transaction. > > > > > >> b)Another way is to map all the non-ram memory regions before booting. > >> But as suggested by Stefano, this will use a lot of memory to store > >> the pagetables. > >> c)Another suggested way is to use a hypercall from DOM0 to request > >> MMIO regions mappings after Linux complete parsing the DSDT. But I > >> didn't find a proper place to issue this call. Anyone has some > >> suggestion? > > > > I suggested to exploit the bus_notifier callbacks and issue an hypercall > > there. In the case of the PCI bus, we are already handling notifications > > in drivers/xen/pci.c:xen_pci_notifier. > > > > Once you have a struct pci_dev pointer in your hand, you can get the > > MMIO regions from pdev->resource[bar]. > > > > Does that work? > > > > I investigate and test this approach. Adding a bus notifier for platform > bus, it could map the mmio regions. That's great! Keep in mind that many ARM platforms have non-PCI busses, so I think we'll need an amba and a platform bus_notifier too, in addition to the existing pci bus notifier. > Stefano, thanks for your suggestion. And does anyone else have other > comments on this approach? > > > > >> 5)How route device interrupt to DOM0 > >> Currently we route all the SPI interrupts to DOM0 before DOM0 booting. > >> But this maybe a workaround. What's the right choice? After DOM0 > >> parses the interrupt information from DSDT and call a hypercall to > >> route them? > > > > I think that is OK for now, but it is good for you to bring up this > > point here. Dom0 will ask Xen to remap interrupts for any devices > > assigned to DomU created after Dom0. > > > > . > > > > -- > Shannon > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |