aboutsummaryrefslogtreecommitdiffstats
path: root/techlibs/xilinx/drams_map.v
blob: 47476b5929508c1918482c8e051a8dd52ccf3f10 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
module \$__XILINX_RAM64X1D (CLK1, A1ADDR, A1DATA, B1ADDR, B1DATA, B1EN);
	parameter [63:0] INIT = 64'bx;
	parameter CLKPOL2 = 1;
	input CLK1;

	input [5:0] A1ADDR;
	output A1DATA;

	input [5:0] B1ADDR;
	input B1DATA;
	input B1EN;

	RAM64X1D #(
		.INIT(INIT),
		.IS_WCLK_INVERTED(!CLKPOL2)
	) _TECHMAP_REPLACE_ (
		.DPRA0(A1ADDR[0]),
		.DPRA1(A1ADDR[1]),
		.DPRA2(A1ADDR[2]),
		.DPRA3(A1ADDR[3]),
		.DPRA4(A1ADDR[4]),
		.DPRA5(A1ADDR[5]),
		.DPO(A1DATA),

		.A0(B1ADDR[0]),
		.A1(B1ADDR[1]),
		.A2(B1ADDR[2]),
		.A3(B1ADDR[3]),
		.A4(B1ADDR[4]),
		.A5(B1ADDR[5]),
		.D(B1DATA),
		.WCLK(CLK1),
		.WE(B1EN)
	);
endmodule

module \$__XILINX_RAM128X1D (CLK1, A1ADDR, A1DATA, B1ADDR, B1DATA, B1EN);
	parameter [127:0] INIT = 128'bx;
	parameter CLKPOL2 = 1;
	input CLK1;

	input [6:0] A1ADDR;
	output A1DATA;

	input [6:0] B1ADDR;
	input B1DATA;
	input B1EN;

	RAM128X1D #(
		.INIT(INIT),
		.IS_WCLK_INVERTED(!CLKPOL2)
	) _TECHMAP_REPLACE_ (
		.DPRA(A1ADDR),
		.DPO(A1DATA),

		.A(B1ADDR),
		.D(B1DATA),
		.WCLK(CLK1),
		.WE(B1EN)
	);
endmodule
">num > RPA_HCALL_END)) { regs->gprs[3] = H_Parameter; return; } address = papr_hcalls[num/4]; papr_hcall_jump(regs, address); } static void hcall_xen(ulong num, struct cpu_user_regs *regs) { u32 address; if (regs->msr & MSR_PR) { regs->gprs[3] = -EPERM; return; } if ((num >= NR_hypercalls)) { regs->gprs[3] = -ENOSYS; return; } address = hypercall_table[num]; if (address == 0) { printk("unsupported Xen hypercall: 0x%lx\n", num); regs->gprs[3] = -ENOSYS; return; } regs->gprs[3] = xen_hvcall_jump(regs, address); } void do_multicall_call(multicall_entry_t *call) { struct cpu_user_regs regs; regs.gprs[3] = call->args[0]; regs.gprs[4] = call->args[1]; regs.gprs[5] = call->args[2]; regs.gprs[6] = call->args[3]; regs.gprs[7] = call->args[4]; regs.gprs[8] = call->args[5]; hcall_xen(call->op, &regs); call->result = regs.gprs[3]; } void do_hcall(struct cpu_user_regs *regs) { ulong num = regs->gprs[3]; local_irq_enable(); if ((num & XEN_MARK(0)) == XEN_MARK(0)) { /* it's a Xen call */ num &= ~XEN_MARK(0); hcall_xen(num, regs); } else { /* it's a PAPR call */ hcall_papr(num, regs); } } static void do_ni_papr_hypercall(struct cpu_user_regs *regs) { struct vcpu *v = get_current(); printk("unsupported PAPR hcall 0x%lx was called by dom0x%x\n", regs->gprs[3], v->domain->domain_id); regs->gprs[3] = H_Parameter; } /* store low 32 bits of 64-bit address in hcall table (this is safe because we * know we will not link above 4GB). We don't need to preserve the TOC * because that only changes when calling dynamically linked objects. */ static void register_papr_hcall(ulong num, hcall_handler_t handler) { int index = num/4; papr_hcalls[index] = (u32)(*(u64 *)handler); } static void init_papr_hcalls(void) { inithcall_t *hcall; int i; /* initialize PAPR hcall table */ papr_hcalls = xmalloc_array(u32, RPA_HCALL_END/4); ASSERT(papr_hcalls != NULL); for (i = 0; i <= RPA_HCALL_END; i += 4) register_papr_hcall(i, do_ni_papr_hypercall); /* register the PAPR hcalls */ for (hcall = &__inithcall_start; hcall < &__inithcall_end; hcall++) { register_papr_hcall(hcall->number, hcall->handler); } } static void init_hypercall_table(void) { int i; hypercall_table = xmalloc_array(u32, NR_hypercalls); ASSERT(hypercall_table != NULL); for (i = 0; i < NR_hypercalls; i++) { if (__hypercall_table[i] == NULL ) { hypercall_table[i] = 0; } else { hypercall_table[i] = (u32)(*__hypercall_table[i]); } } } static int init_hcalls(void) { init_papr_hcalls(); init_hypercall_table(); return 0; } __initcall(init_hcalls);