[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC 32/35] arm : acpi map xen environment table to dom0
On Wed, 4 Feb 2015, parth.dixit@xxxxxxxxxx wrote: > From: Parth Dixit <parth.dixit@xxxxxxxxxx> > > xen environment table contains the grant table address,size and event > channel interrupt information required by dom0. > > Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx> > --- > xen/arch/arm/arm64/acpi/arm-core.c | 52 > +++++++++++++++++++++++++++++++++++++- > 1 file changed, 51 insertions(+), 1 deletion(-) > > diff --git a/xen/arch/arm/arm64/acpi/arm-core.c > b/xen/arch/arm/arm64/acpi/arm-core.c > index 9fd02f9..9e9285c 100644 > --- a/xen/arch/arm/arm64/acpi/arm-core.c > +++ b/xen/arch/arm/arm64/acpi/arm-core.c > @@ -33,7 +33,6 @@ > #include <asm/cputype.h> > #include <asm/acpi.h> > #include <asm/p2m.h> > - > /* > * We never plan to use RSDT on arm/arm64 as its deprecated in spec but this > * variable is still required by the ACPI core Spurious change > @@ -297,6 +296,49 @@ static int map_stao_table(struct domain *d, u64 *mstao) > return 0; > } > > +static int map_xenv_table(struct domain *d, u64 *mxenv) > +{ > + u64 addr; > + u64 size; > + int res; > + u8 checksum; > + struct acpi_table_xenv *xenv=NULL; > + > + xenv = ACPI_ALLOCATE_ZEROED( sizeof(struct acpi_table_xenv) ); > + if( xenv == NULL ) > + return -ENOMEM; > + > + ACPI_MEMCPY(xenv->header.signature, ACPI_SIG_XENV, 4); > + xenv->header.length = sizeof(struct acpi_table_header)+12; > + xenv->header.checksum = 0; > + ACPI_MEMCPY(xenv->header.oem_id, "XenVMM", 6); > + ACPI_MEMCPY(xenv->header.oem_table_id, "RTSMVEV8", 8); > + xenv->header.revision = 1; > + ACPI_MEMCPY(xenv->header.asl_compiler_id, "INTL", 4); > + xenv->header.asl_compiler_revision = 0x20140828; > + xenv->gnt_start = 0x00000010000000; > + xenv->gnt_size = 0x20000; > + xenv->evt_intr = 31; > + xenv->evt_intr_flag =3; > + size = sizeof(struct acpi_table_xenv); As per all the other checksum calculation, I wonder whether we need a memory barrier here. > + checksum = acpi_tb_checksum(ACPI_CAST_PTR(u8, xenv), size); > + xenv->header.checksum = (u8)( xenv->header.checksum - checksum ); > + *mxenv = addr = virt_to_maddr(xenv); Given that this is way before we start dom0, I don't think we need any memory barriers here. > + res = map_ram_regions(d, > + paddr_to_pfn(addr & PAGE_MASK), > + DIV_ROUND_UP(size, PAGE_SIZE), > + paddr_to_pfn(addr & PAGE_MASK)); > + if ( res ) > + { > + printk(XENLOG_ERR "Unable to map 0x%"PRIx64 > + " - 0x%"PRIx64" in domain \n", > + addr & PAGE_MASK, PAGE_ALIGN(addr + size) - 1); > + return res; > + } > + > + return 0; > +} > > #define NR_NEW_XEN_TABLES 2 > > @@ -346,6 +388,14 @@ static int map_xsdt_table(struct domain *d, u64 *xsdt) > ( ( (size - sizeof(struct acpi_table_header) ) / > sizeof(acpi_native_uint) ) ); > > + /* map xen env table */ > + res = map_xenv_table(d, &addr); > + if(res) > + return res; > + > + table_entry--; > + *table_entry = addr ; > + > /* map stao table */ > map_stao_table(d, &addr); > if(res) > -- > 1.9.1 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |