[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 08/10] pvh/acpi: Handle ACPI accesses for PVH guests
On Sun, Nov 06, 2016 at 04:42:41PM -0500, Boris Ostrovsky wrote: > Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> > --- > CC: Paul Durrant <paul.durrant@xxxxxxxxxx> > --- > xen/arch/x86/hvm/ioreq.c | 66 > ++++++++++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 66 insertions(+) > > diff --git a/xen/arch/x86/hvm/ioreq.c b/xen/arch/x86/hvm/ioreq.c > index 171ea82..ced7c92 100644 > --- a/xen/arch/x86/hvm/ioreq.c > +++ b/xen/arch/x86/hvm/ioreq.c > @@ -1392,6 +1392,72 @@ void hvm_ioreq_init(struct domain *d) > static int acpi_ioaccess( > int dir, unsigned int port, unsigned int bytes, uint32_t *val) > { > + unsigned int i; > + unsigned int bits = bytes * 8; > + uint8_t *reg = NULL; > + unsigned idx = port & 3; > + bool is_cpu_map = 0; > + struct domain *currd = current->domain; > + > + BUILD_BUG_ON((ACPI_PM1A_EVT_BLK_LEN != 4) || > + (ACPI_GPE0_BLK_LEN_V1 != 4)); > + > + switch (port) > + { > + case ACPI_PM1A_EVT_BLK_ADDRESS_V1 ... > + (ACPI_PM1A_EVT_BLK_ADDRESS_V1 + ACPI_PM1A_EVT_BLK_LEN - 1): > + reg = currd->arch.hvm_domain.acpi_io.pm1a; > + break; > + case ACPI_GPE0_BLK_ADDRESS_V1 ... > + (ACPI_GPE0_BLK_ADDRESS_V1 + ACPI_GPE0_BLK_LEN_V1 - 1): > + reg = currd->arch.hvm_domain.acpi_io.gpe; > + break; > + case 0xaf00 ... (0xaf00 + HVM_MAX_VCPUS/8 - 1): That may need some documentation or a #define perhaps? Also just in case somebody decided it was funny and compile Xen with HVM_MAX_VCPUS set to say 4, won't this go in 0xfffffff region? You may want to add a BUILD_BUG_ON for the HVM_MAX_VCPUS, like: BUILD_BUGON(HVM_MAX_VCPUS > 8)? > + is_cpu_map = 1; > + break; > + default: > + return X86EMUL_UNHANDLEABLE; > + } > + > + if ( bytes == 0 ) > + return X86EMUL_OKAY; Should you also check for other odd sizes? Say 3? > + > + if ( dir == IOREQ_READ ) > + { > + *val &= ~((1U << bits) - 1); > + > + if ( is_cpu_map ) > + { > + unsigned first_bit, last_bit; > + > + first_bit = (port - 0xaf00) * 8; Oh, that needs a define. > + last_bit = min(currd->arch.avail_vcpus, first_bit + bits); > + for (i = first_bit; i < last_bit; i++) I think you need spaces here. > + *val |= (1U << (i - first_bit)); > + } > + else > + memcpy(val, ®[idx], bytes); > + } > + else > + { > + if ( is_cpu_map ) > + /* CPU map should not be written. */ It shouldn't? Then who updates this? Oh we do it via the the hypercall. You may want to mention in this function how this all is suppose to work? > + return X86EMUL_UNHANDLEABLE; > + > + /* Write either status or enable reegister. */ > + if ( (bytes > 2) || ((bytes == 2) && (port & 1)) ) > + return X86EMUL_UNHANDLEABLE; > + > + if ( idx < 2 ) /* status, write 1 to clear. */ > + { > + reg[idx] &= ~(*val & 0xff); > + if ( bytes == 2 ) > + reg[idx + 1] &= ~((*val >> 8) & 0xff); > + } > + else /* enable */ > + memcpy(®[idx], val, bytes); > + } > + > return X86EMUL_OKAY; > } > > -- > 2.7.4 > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxx > https://lists.xen.org/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |