|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2 08/11] pvh/acpi: Handle ACPI accesses for PVH guests
Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
---
CC: Paul Durrant <paul.durrant@xxxxxxxxxx>
---
Changes in v2:
* Use 'true/false' values for bools
xen/arch/x86/hvm/ioreq.c | 72 ++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 72 insertions(+)
diff --git a/xen/arch/x86/hvm/ioreq.c b/xen/arch/x86/hvm/ioreq.c
index e6ff48f..3ef01cf 100644
--- a/xen/arch/x86/hvm/ioreq.c
+++ b/xen/arch/x86/hvm/ioreq.c
@@ -1383,6 +1383,78 @@ static int hvm_access_cf8(
static int acpi_ioaccess(
int dir, unsigned int port, unsigned int bytes, uint32_t *val)
{
+ unsigned int i;
+ unsigned int bits = bytes * 8;
+ unsigned int idx = port & 3;
+ uint8_t *reg = NULL;
+ bool is_cpu_map = false;
+ struct domain *currd = current->domain;
+
+ BUILD_BUG_ON((ACPI_PM1A_EVT_BLK_LEN != 4) ||
+ (ACPI_GPE0_BLK_LEN_V1 != 4));
+
+ if ( has_ioreq_cpuhp(currd) )
+ return X86EMUL_UNHANDLEABLE;
+
+ switch (port)
+ {
+ case ACPI_PM1A_EVT_BLK_ADDRESS_V1 ...
+ (ACPI_PM1A_EVT_BLK_ADDRESS_V1 + ACPI_PM1A_EVT_BLK_LEN - 1):
+ reg = currd->arch.hvm_domain.acpi_io.pm1a;
+ break;
+ case ACPI_GPE0_BLK_ADDRESS_V1 ...
+ (ACPI_GPE0_BLK_ADDRESS_V1 + ACPI_GPE0_BLK_LEN_V1 - 1):
+ reg = currd->arch.hvm_domain.acpi_io.gpe;
+ break;
+ case ACPI_CPU_MAP ... (ACPI_CPU_MAP + ACPI_CPU_MAP_LEN - 1):
+ is_cpu_map = true;
+ break;
+ default:
+ return X86EMUL_UNHANDLEABLE;
+ }
+
+ if ( bytes == 0 )
+ return X86EMUL_OKAY;
+
+ if ( dir == IOREQ_READ )
+ {
+ *val &= ~((1U << bits) - 1);
+
+ if ( is_cpu_map )
+ {
+ unsigned int first_bit, last_bit;
+
+ first_bit = (port - ACPI_CPU_MAP) * 8;
+ last_bit = min(currd->arch.avail_vcpus, first_bit + bits);
+ for ( i = first_bit; i < last_bit; i++ )
+ *val |= (1U << (i - first_bit));
+ }
+ else
+ memcpy(val, ®[idx], bytes);
+ }
+ else
+ {
+ if ( is_cpu_map )
+ /*
+ * CPU map is only read by DSDT's PRSC method and should never
+ * be written by a guest.
+ */
+ return X86EMUL_UNHANDLEABLE;
+
+ /* Write either status or enable reegister. */
+ if ( (bytes > 2) || ((bytes == 2) && (port & 1)) )
+ return X86EMUL_UNHANDLEABLE;
+
+ if ( idx < 2 ) /* status, write 1 to clear. */
+ {
+ reg[idx] &= ~(*val & 0xff);
+ if ( bytes == 2 )
+ reg[idx + 1] &= ~((*val >> 8) & 0xff);
+ }
+ else /* enable */
+ memcpy(®[idx], val, bytes);
+ }
+
return X86EMUL_OKAY;
}
--
2.7.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |