[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH RFC 18/20] libxc/acpi: Build ACPI tables for HVMlite guests



On 06/06/2016 09:29 AM, Jan Beulich wrote:
>>>> On 06.04.16 at 03:25, <boris.ostrovsky@xxxxxxxxxx> wrote:
>> --- /dev/null
>> +++ b/tools/libxc/xc_acpi.c
>> @@ -0,0 +1,268 @@
>> +#include <stdio.h>
>> +#include <stdlib.h>
>> +#include <string.h>
>> +#include <inttypes.h>
>> +#include <assert.h>
>> +
>> +#include <xen/xen.h>
>> +#include <xen/foreign/x86_32.h>
>> +#include <xen/foreign/x86_64.h>
> Why are these two needed here? The code here shouldn't care
> about the mode the guest may later want to run in.

These two are not needed.

>
>> +#include <xen/hvm/hvm_info_table.h>
>> +#include <xen/io/protocols.h>
>> +
>> +#include "xg_private.h"
>> +#include "xc_dom.h"
>> +#include "xenctrl.h"
>> +
>> +#include "acpi2_0.h"
>> +
>> +#define RESERVED_MEMORY_DYNAMIC_START 0xFC001000
>> +#define ACPI_PHYSICAL_ADDRESS         0x000EA020
>> +
>> +/* Initial allocation for ACPI tables */
>> +#define NUM_ACPI_PAGES  16
> With which other definitions do these three need to remain in sync?

NUM_ACPI_PAGES is private to this file.

ACPI_PHYSICAL_ADDRESS (RSDP pointer) needs to be between 0xe0000 and 0xfffff, I 
picked this number because that's where most systems that I have appear to have 
it. (And by "most" I mean the two that I checked ;-))

RESERVED_MEMORY_DYNAMIC_START is one page after DSDT's SystemMemory (aka 
ACPI_INFO_PHYSICAL_ADDRESS). But then it looks like PVHv2 doesn't need 
SystemMemory so it can be anywhere (and e820 should presumably be aware of 
this, which it is not right now)


>
>> +static int init_acpi_config(struct xc_dom_image *dom,
>> +                            struct acpi_config *config)
>> +{
>> +    xc_interface *xch = dom->xch;
>> +    uint32_t domid = dom->guest_domid;
>> +    xc_dominfo_t info;
>> +    int i, rc;
>> +
>> +    memset(config, 0, sizeof(*config));
>> +
>> +    config->dsdt_anycpu = config->dsdt_15cpu = dsdt_empty;
>> +    config->dsdt_anycpu_len = config->dsdt_15cpu_len = dsdt_empty_len;
> What good does an empty DSDT do? (Perhaps this question is a
> result of there not being any description of this change.)

DSDT is required to be present by the spec. And ACPICA gets upset if it
doesn't see it.

> +    /* Copy acpi_info page into guest's memory */
> +    extent = PFN(ACPI_INFO_PHYSICAL_ADDRESS);
> +    rc = xc_domain_populate_physmap_exact(xch, domid, 1, 0, 0, &extent);
> +    if ( rc )
> +    {
> +        DOMPRINTF("%s: xc_domain_populate_physmap failed with %d\n",
> +                  __FUNCTION__, rc);
> +        goto out;
> +    }
> +    guest_info_page = xc_map_foreign_range(xch, domid, PAGE_SIZE,
> +                                           PROT_READ | PROT_WRITE,
> +                                           PFN(ACPI_INFO_PHYSICAL_ADDRESS));
> +    if ( !guest_info_page )
> +    {
> +        DOMPRINTF("%s: Can't map acpi_info_page", __FUNCTION__);
> +        rc = -1;
> +        goto out;
> +    }
> +    memcpy(guest_info_page, acpi_pages, PAGE_SIZE);
> +
> +    /* Copy ACPI tables into guest's memory */
> +    acpi_pages_num = ((alloc_up - (unsigned long)acpi_pages +
> +                       (PAGE_SIZE - 1)) >> PAGE_SHIFT) - 1;
> This looks like there are acpi_pages_num pages starting at
> acpi_pages, yet ...
>
>> +    extents = malloc(acpi_pages_num * sizeof(*extents));
>> +    if ( !extents )
>> +    {
>> +        DOMPRINTF("%s: Can't allocate extents array", __FUNCTION__);
>> +        rc = -ENOMEM;
>> +        goto out;
>> +    }
>> +    for (i = 0; i < acpi_pages_num; i++)
>> +        extents[i] = PFN(RESERVED_MEMORY_DYNAMIC_START) + i;
>> +    rc = xc_domain_populate_physmap_exact(xch, domid, acpi_pages_num,
>> +                                          0, 0, extents);
>> +    if ( rc )
>> +    {
>> +        DOMPRINTF("%s: xc_domain_populate_physmap failed with %d",
>> +                  __FUNCTION__, rc);
>> +        goto out;
>> +    }
>> +    guest_acpi_pages = xc_map_foreign_range(xch, domid,
>> +                                            PAGE_SIZE * acpi_pages_num,
>> +                                            PROT_READ | PROT_WRITE,
>> +                                            
>> PFN(RESERVED_MEMORY_DYNAMIC_START));
>> +    if ( !guest_acpi_pages )
>> +    {
>> +        DOMPRINTF("%s Can't map guest_acpi_pages", __FUNCTION__);
>> +        rc = -1;
>> +        goto out;
>> +    }
>> +
>> +    memcpy(guest_acpi_pages, acpi_pages + PAGE_SIZE,
>> +           acpi_pages_num * PAGE_SIZE);
> ... this looks like there are acpi_pages_num pages starting at
> acpi_pages + PAGE_SIZE.

Yes, I am off-by-one here. The first page (ACPI_INFO_PHYSICAL_ADDRESS)
is managed separately.

>
>> --- a/tools/libxc/xc_dom_x86.c
>> +++ b/tools/libxc/xc_dom_x86.c
>> @@ -643,6 +643,13 @@ static int alloc_magic_pages_hvm(struct xc_dom_image 
>> *dom)
>>              DOMPRINTF("Unable to reserve memory for the start info");
>>              goto out;
>>          }
>> +
>> +        rc = xc_dom_build_acpi(dom);
>> +        if ( rc != 0 )
>> +        {
>> +            DOMPRINTF("Unable to build ACPI tables");
>> +            goto out;
>> +        }
> Iirc there is an "acpi=" guest config setting, yet neither here nor
> down the call tree I have been able to find a respective check. Is
> that option not relevant anymore? Do we really want to always
> have those tables built?

Right, I should check. Come think of it, we should probably also check
"apic=" option when building MADT in libacpi.


>
>> --- a/xen/common/libacpi/build.c
>> +++ b/xen/common/libacpi/build.c
>> @@ -480,7 +480,7 @@ static int new_vm_gid(struct acpi_config *config)
>>      return 1;
>>  }
>>  
>> -void acpi_build_tables(struct acpi_config *config, unsigned int physical)
>> +void acpi_build_tables(struct acpi_config *config, unsigned long physical)
> I'm having some difficulty seeing how this change belongs here.

acpi_build_tables() is called with virtual (i.e. 64-bit) address from libxc.

-boris


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.