[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH RFC 34/35] arm : acpi workarounds for firmware/linux dependencies
From: Parth Dixit <parth.dixit@xxxxxxxxxx> Some bugs are identified in edk2 and some of the functionality is not yet merged. This patch contains workarounds for them Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx> --- xen/arch/arm/domain_build.c | 82 ++++++++++++++++++++++++++++++++++++++++++++- xen/arch/arm/vgic.c | 16 +++++++++ xen/drivers/acpi/osl.c | 7 ++-- 3 files changed, 102 insertions(+), 3 deletions(-) diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index a504064..a425ef4 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -1234,7 +1234,87 @@ static int make_chosen_node(const struct domain *d, const struct kernel_info *ki return res; } +#define ACPI_UEFI_MEM_STUB + +#ifdef ACPI_UEFI_MEM_STUB +enum{ + IO_NET0, + IO_SREG, + IO_VIRT, + IO_SCT0, + IO_AAC0, + IO_MMC0, + IO_KMI0, + IO_KMI1, + IO_SER1, + IO_SER2, + IO_SER3, + IO_WDT0, + IO_TIM0, + IO_TIM2, + IO_RTC0, + IO_TIM3, + IO_TIM4, + IO_MAX +}; +#define INIT_IO( dev,addr,size ) [dev] = {addr,size} + +static const u64 acpi_mmio_region[][IO_MAX]= + { + INIT_IO(IO_NET0,0x1a000000,(PAGE_SIZE*16) ), + INIT_IO(IO_SREG,0x1c010000,PAGE_SIZE), + INIT_IO(IO_VIRT,0x1c130000,PAGE_SIZE), + INIT_IO(IO_SCT0,0x1c020000,PAGE_SIZE), + INIT_IO(IO_AAC0,0x1c040000,PAGE_SIZE), + INIT_IO(IO_MMC0,0x1c050000,PAGE_SIZE), + INIT_IO(IO_KMI0,0x1c060000,PAGE_SIZE), + INIT_IO(IO_KMI1,0x1c070000,PAGE_SIZE), + INIT_IO(IO_SER1,0x1c0a0000,PAGE_SIZE), + INIT_IO(IO_SER2,0x1c0b0000,PAGE_SIZE), + INIT_IO(IO_SER3,0x1c0c0000,PAGE_SIZE), + INIT_IO(IO_WDT0,0x1c0f0000,PAGE_SIZE), + INIT_IO(IO_TIM0,0x1c110000,PAGE_SIZE), + INIT_IO(IO_TIM2,0x1c120000,PAGE_SIZE), + INIT_IO(IO_RTC0,0x1c170000,PAGE_SIZE), + INIT_IO(IO_TIM3,0x2a810000,(PAGE_SIZE*16) ), + INIT_IO(IO_TIM4,0x2a830000,(PAGE_SIZE*16) ), + }; + +int acpi_map_mmio(struct domain *d) +{ + int i,res; + u64 addr,size; + + for (i = 0; i < IO_MAX; i++) + { + addr = acpi_mmio_region[i][0]; + size = acpi_mmio_region[i][1]; + res = iomem_permit_access(d, paddr_to_pfn(addr & PAGE_MASK), + paddr_to_pfn(PAGE_ALIGN(addr + size - 1))); + res = map_mmio_regions(d, + paddr_to_pfn(addr & PAGE_MASK), + DIV_ROUND_UP(size, PAGE_SIZE), + paddr_to_pfn(addr & PAGE_MASK)); + + + } +#if 0 + for( i=32 ; i < 255 ; i++ ) + { + res = vgic_reserve_virq(d, i); + res = route_irq_to_guest(d, i, NULL); + if ( res ) + { + printk(XENLOG_ERR "Unable to route IRQ %u to domain %u\n", + i, d->domain_id); + } + + } +#endif + return 0; +} +#else static int acpi_map_mmio(struct domain *d) { int i,res; @@ -1273,7 +1353,7 @@ static int acpi_map_mmio(struct domain *d) return 0; } - +#endif static int map_acpi_regions(struct domain *d) { int res; diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c index 97061ce..e74555d 100644 --- a/xen/arch/arm/vgic.c +++ b/xen/arch/arm/vgic.c @@ -254,6 +254,8 @@ void vgic_disable_irqs(struct vcpu *v, uint32_t r, int n) } } +#define VGIC_ICFG_MASK(intr) ( 1 << ( ( 2 * ( intr % 16 ) ) + 1 ) ) + void vgic_enable_irqs(struct vcpu *v, uint32_t r, int n) { struct domain *d = v->domain; @@ -266,6 +268,20 @@ void vgic_enable_irqs(struct vcpu *v, uint32_t r, int n) while ( (i = find_next_bit(&mask, 32, i)) < 32 ) { irq = i + (32 * n); +#if defined(CONFIG_ARM_64) && defined(CONFIG_ACPI) + if( ( n!=0 ) && is_hardware_domain(d) ){ + struct vgic_irq_rank *vr = vgic_get_rank(v, n); + uint32_t tr; + tr = vr->icfg[i >> 4] ; + + if( ( tr & VGIC_ICFG_MASK(i) ) ) + acpi_set_irq(irq, DT_IRQ_TYPE_EDGE_BOTH); + else + acpi_set_irq(irq, DT_IRQ_TYPE_LEVEL_MASK); + + route_irq_to_guest(d,irq,NULL); + } +#endif v_target = d->arch.vgic.handler->get_target_vcpu(v, irq); p = irq_to_pending(v_target, irq); set_bit(GIC_IRQ_GUEST_ENABLED, &p->status); diff --git a/xen/drivers/acpi/osl.c b/xen/drivers/acpi/osl.c index 73da9d9..2d78ba0 100644 --- a/xen/drivers/acpi/osl.c +++ b/xen/drivers/acpi/osl.c @@ -66,7 +66,7 @@ void __init acpi_os_vprintf(const char *fmt, va_list args) acpi_physical_address __init acpi_os_get_root_pointer(void) { - if (efi_enabled) { + if (efi_enabled) { if (efi.acpi20 != EFI_INVALID_TABLE_ADDR) return efi.acpi20; else if (efi.acpi != EFI_INVALID_TABLE_ADDR) @@ -198,8 +198,11 @@ acpi_os_write_memory(acpi_physical_address phys_addr, u32 value, u32 width) return AE_OK; } - +#ifdef CONFIG_X86 #define is_xmalloc_memory(ptr) ((unsigned long)(ptr) & (PAGE_SIZE - 1)) +#else +#define is_xmalloc_memory(ptr) 1 +#endif void *__init acpi_os_alloc_memory(size_t sz) { -- 1.9.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |