[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v11 20/59] i386/xen: implement HYPERVISOR_vcpu_op
From: |
David Woodhouse |
Subject: |
[PATCH v11 20/59] i386/xen: implement HYPERVISOR_vcpu_op |
Date: |
Thu, 16 Feb 2023 06:24:05 +0000 |
From: Joao Martins <joao.m.martins@oracle.com>
This is simply when guest tries to register a vcpu_info
and since vcpu_info placement is optional in the minimum ABI
therefore we can just fail with -ENOSYS
Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Paul Durrant <paul@xen.org>
---
target/i386/kvm/xen-emu.c | 25 +++++++++++++++++++++++++
1 file changed, 25 insertions(+)
diff --git a/target/i386/kvm/xen-emu.c b/target/i386/kvm/xen-emu.c
index 4002b1b797..e5ae0a9a38 100644
--- a/target/i386/kvm/xen-emu.c
+++ b/target/i386/kvm/xen-emu.c
@@ -27,6 +27,7 @@
#include "hw/xen/interface/sched.h"
#include "hw/xen/interface/memory.h"
#include "hw/xen/interface/hvm/hvm_op.h"
+#include "hw/xen/interface/vcpu.h"
#include "xen-compat.h"
@@ -363,6 +364,25 @@ static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit
*exit, X86CPU *cpu,
}
}
+static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,
+ int cmd, int vcpu_id, uint64_t arg)
+{
+ int err;
+
+ switch (cmd) {
+ case VCPUOP_register_vcpu_info:
+ /* no vcpu info placement for now */
+ err = -ENOSYS;
+ break;
+
+ default:
+ return false;
+ }
+
+ exit->u.hcall.result = err;
+ return true;
+}
+
int kvm_xen_soft_reset(void)
{
int err;
@@ -464,6 +484,11 @@ static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct
kvm_xen_exit *exit)
case __HYPERVISOR_sched_op:
return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0],
exit->u.hcall.params[1]);
+ case __HYPERVISOR_vcpu_op:
+ return kvm_xen_hcall_vcpu_op(exit, cpu,
+ exit->u.hcall.params[0],
+ exit->u.hcall.params[1],
+ exit->u.hcall.params[2]);
case __HYPERVISOR_hvm_op:
return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0],
exit->u.hcall.params[1]);
--
2.39.0
- [PATCH v11 31/59] hw/xen: Implement EVTCHNOP_unmask, (continued)
- [PATCH v11 31/59] hw/xen: Implement EVTCHNOP_unmask, David Woodhouse, 2023/02/16
- [PATCH v11 47/59] i386/xen: handle PV timer hypercalls, David Woodhouse, 2023/02/16
- [PATCH v11 39/59] i386/xen: add monitor commands to test event injection, David Woodhouse, 2023/02/16
- [PATCH v11 57/59] hw/xen: Support MSI mapping to PIRQ, David Woodhouse, 2023/02/16
- [PATCH v11 23/59] i386/xen: handle VCPUOP_register_runstate_memory_area, David Woodhouse, 2023/02/16
- [PATCH v11 06/59] i386/hvm: Set Xen vCPU ID in KVM, David Woodhouse, 2023/02/16
- [PATCH v11 21/59] i386/xen: handle VCPUOP_register_vcpu_info, David Woodhouse, 2023/02/16
- [PATCH v11 27/59] hw/xen: Add xen_evtchn device for event channel emulation, David Woodhouse, 2023/02/16
- [PATCH v11 02/59] xen: add CONFIG_XEN_BUS and CONFIG_XEN_EMU options for Xen emulation, David Woodhouse, 2023/02/16
- [PATCH v11 14/59] xen: Permit --xen-domid argument when accel is KVM, David Woodhouse, 2023/02/16
- [PATCH v11 20/59] i386/xen: implement HYPERVISOR_vcpu_op,
David Woodhouse <=
- [PATCH v11 41/59] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_PCI_INTX callback, David Woodhouse, 2023/02/16
- [PATCH v11 34/59] hw/xen: Implement EVTCHNOP_send, David Woodhouse, 2023/02/16
- [PATCH v11 05/59] i386/kvm: handle Xen HVM cpuid leaves, David Woodhouse, 2023/02/16
- [PATCH v11 09/59] i386/xen: handle guest hypercalls, David Woodhouse, 2023/02/16
- [PATCH v11 13/59] hw/xen: Add xen_overlay device for emulating shared xenheap pages, David Woodhouse, 2023/02/16
- [PATCH v11 56/59] hw/xen: Support GSI mapping to PIRQ, David Woodhouse, 2023/02/16
- [PATCH v11 22/59] i386/xen: handle VCPUOP_register_vcpu_time_info, David Woodhouse, 2023/02/16
- [PATCH v11 16/59] i386/xen: manage and save/restore Xen guest long_mode setting, David Woodhouse, 2023/02/16
- [PATCH v11 35/59] hw/xen: Implement EVTCHNOP_alloc_unbound, David Woodhouse, 2023/02/16