mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-06-25 15:02:13 +00:00
Project ACRN hypervisor
AML allows devices defined in an ACPI namespace to have inter-dependency, i.e. a method defined in one device can refer to objects in other devices. While such inter-dependency is common in device manipulation methods, device identification and configuration methods, such as _CRS, may depend on other devices as well. An example we have already met is a PCS (Physical Coding Sublayer) which calculates resource descriptors by accessing the PCI configuration space of the accompanying Ethernet controller. Without the ACPI object describing the PCS, a driver of the Ethernet controller may refuse to initialize. This patch adds a preliminary dependency analyzer to detect such inter-device dependency. The analyzer walks through the reference chains of an object, identifying whether the referenced objects are operation fields of a device. Depending on the result of this analysis, the board XML is refined as follows. * When an object (probably a method) references such fields, the original object definition in host DSDT/SSDTs will be copied in the AML template so that they still work in VMs where the operation fields may be virtualized. Such objects will be referred to as "copied objects" hereinafter. * The objects that are **directly** referenced by a copied object is added in the AML template as well. Such objects still belong to devices where they are originally defined in the host ACPI namespace. Their definition, however, may be copied or replaced with constant values, depending on the dependency analysis on these objects. * Nodes with the "dependency" tag are added under "device" nodes in the board XML, allowing the configuration tools to follow the device dependency chain when generating vACPI tables. These nodes only represent direct dependencies; indirect dependencies can be inferred by following those direct ones. The current implementation does not allow objects being added to AML templates if they refer to any of the following. * Global objects, i.e. objects not belonging to any device. Such objects tend to encode system-wide information, such as the ACPI NVS (Non-Volatile Storage) or its fields. * Methods with parameters. Objects with such references are thus being hidden from guest software, just like how they are invisible in the current implementation. This patch is added in v2 of the series. v2 -> v3: * Also collect dependencies due to providing or consuming resources. * Refactor the dependency detection logic for clarity. Tracked-On: #6287 Signed-off-by: Junjie Mao <junjie.mao@intel.com> |
||
---|---|---|
.github/ISSUE_TEMPLATE | ||
devicemodel | ||
doc | ||
hypervisor | ||
misc | ||
.checkpatch.conf | ||
.clang-format | ||
.gitignore | ||
CODEOWNERS | ||
LICENSE | ||
Makefile | ||
paths.make | ||
README.rst | ||
VERSION |
Project ACRN Embedded Hypervisor ################################ .. raw:: html <img src="doc/images/ACRN_Logo_PrimaryLockup_COLOR-300x300-1.png" height="175px" align="right"> The open source project ACRN defines a device hypervisor reference stack and an architecture for running multiple software subsystems, managed securely, on a consolidated system by means of a virtual machine manager. It also defines a reference framework implementation for virtual device emulation, called the "ACRN Device Model". The ACRN Hypervisor is a Type 1 reference hypervisor stack, running directly on the bare-metal hardware, and is suitable for a variety of IoT and embedded device solutions. The ACRN hypervisor addresses the gap that currently exists between datacenter hypervisors, and hard partitioning hypervisors. The ACRN hypervisor architecture partitions the system into different functional domains, with carefully selected guest OS sharing optimizations for IoT and embedded devices. .. start_include_here Community Support ***************** The Project ACRN Developer Community includes developers from member organizations and the general community all joining in the development of software within the project. Members contribute and discuss ideas, submit bugs and bug fixes. They also help those in need through the community's forums such as mailing lists and IRC channels. Anyone can join the developer community and the community is always willing to help its members and the User Community to get the most out of Project ACRN. Welcome to the project ARCN community! We're now holding weekly Technical Community Meetings and encourage you to call in and learn more about the project. Meeting information is on the `TCM Meeting page`_ in our `ACRN wiki <https://wiki.projectacrn.org/>`_. .. _TCM Meeting page: https://github.com/projectacrn/acrn-hypervisor/wiki/ACRN-Committee-and-Working-Group-Meetings#technical-community-meetings Resources ********* Here's a quick summary of resources to find your way around the Project ACRN support systems: * **Project ACRN Website**: The https://projectacrn.org website is the central source of information about the project. On this site, you'll find background and current information about the project as well as relevant links to project material. For a quick start, refer to the `Introduction`_ and `Getting Started Guide`_. * **Source Code in GitHub**: Project ACRN source code is maintained on a public GitHub repository at https://github.com/projectacrn/acrn-hypervisor. You'll find information about getting access to the repository and how to contribute to the project in this `Contribution Guide`_ document. * **Documentation**: Project technical documentation is developed along with the project's code, and can be found at https://projectacrn.github.io. Additional documentation is maintained in the `Project ACRN GitHub wiki`_. * **Issue Reporting and Tracking**: Requirements and Issue tracking is done in the Github issues system: https://github.com/projectacrn/acrn-hypervisor/issues. You can browse through the reported issues and submit issues of your own. * **Reporting a Potential Security Vulnerability**: If you have discovered potential security vulnerability in ACRN, please send an e-mail to acrn-security@lists.projectacrn.org. It is important to include the following details: - The projects and versions affected - Detailed description of the vulnerability - Information on known exploits * **Mailing List**: The `Project ACRN Development mailing list`_ is perhaps the most convenient way to track developer discussions and to ask your own support questions to the project ACRN community. There are also specific `ACRN mailing list subgroups`_ for builds, users, and Technical Steering Committee notes, for example. You can read through the message archives to follow past posts and discussions, a good thing to do to discover more about the project. .. _Introduction: https://projectacrn.github.io/latest/introduction/ .. _Getting Started Guide: https://projectacrn.github.io/latest/getting-started/ .. _Contribution Guide: https://projectacrn.github.io/latest/contribute.html .. _Project ACRN GitHub wiki: https://github.com/projectacrn/acrn-hypervisor/wiki .. _PGP Key: https://www.intel.com/content/www/us/en/security-center/pgp-public-key.html .. _vulnerability handling guidelines: https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html .. _Project ACRN Development mailing list: https://lists.projectacrn.org/g/acrn-dev .. _ACRN mailing list subgroups: https://lists.projectacrn.org/g/main/subgroups