[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v13 12/60] i386/xen: Implement SCHEDOP_poll and SCHEDOP_yield
From: |
David Woodhouse |
Subject: |
[PATCH v13 12/60] i386/xen: Implement SCHEDOP_poll and SCHEDOP_yield |
Date: |
Thu, 23 Feb 2023 12:45:25 +0000 |
From: David Woodhouse <dwmw@amazon.co.uk>
They both do the same thing and just call sched_yield. This is enough to
stop the Linux guest panicking when running on a host kernel which doesn't
intercept SCHEDOP_poll and lets it reach userspace.
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Paul Durrant <paul@xen.org>
---
target/i386/kvm/xen-emu.c | 13 +++++++++++++
1 file changed, 13 insertions(+)
diff --git a/target/i386/kvm/xen-emu.c b/target/i386/kvm/xen-emu.c
index 4ed833656f..ebea27caf6 100644
--- a/target/i386/kvm/xen-emu.c
+++ b/target/i386/kvm/xen-emu.c
@@ -234,6 +234,19 @@ static bool kvm_xen_hcall_sched_op(struct kvm_xen_exit
*exit, X86CPU *cpu,
err = schedop_shutdown(cs, arg);
break;
+ case SCHEDOP_poll:
+ /*
+ * Linux will panic if this doesn't work. Just yield; it's not
+ * worth overthinking it because with event channel handling
+ * in KVM, the kernel will intercept this and it will never
+ * reach QEMU anyway. The semantics of the hypercall explicltly
+ * permit spurious wakeups.
+ */
+ case SCHEDOP_yield:
+ sched_yield();
+ err = 0;
+ break;
+
default:
return false;
}
--
2.39.0
- [PATCH v13 01/60] include: import Xen public headers to hw/xen/interface, (continued)
- [PATCH v13 01/60] include: import Xen public headers to hw/xen/interface, David Woodhouse, 2023/02/23
- [PATCH v13 13/60] hw/xen: Add xen_overlay device for emulating shared xenheap pages, David Woodhouse, 2023/02/23
- [PATCH v13 27/60] hw/xen: Add xen_evtchn device for event channel emulation, David Woodhouse, 2023/02/23
- [PATCH v13 41/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_PCI_INTX callback, David Woodhouse, 2023/02/23
- [PATCH v13 39/60] i386/xen: add monitor commands to test event injection, David Woodhouse, 2023/02/23
- [PATCH v13 40/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_GSI callback, David Woodhouse, 2023/02/23
- [PATCH v13 57/60] hw/xen: Support MSI mapping to PIRQ, David Woodhouse, 2023/02/23
- [PATCH v13 54/60] i386/xen: Implement HYPERVISOR_physdev_op, David Woodhouse, 2023/02/23
- [PATCH v13 17/60] i386/xen: implement HYPERVISOR_memory_op, David Woodhouse, 2023/02/23
- [PATCH v13 55/60] hw/xen: Implement emulated PIRQ hypercall support, David Woodhouse, 2023/02/23
- [PATCH v13 12/60] i386/xen: Implement SCHEDOP_poll and SCHEDOP_yield,
David Woodhouse <=
- [PATCH v13 15/60] i386/xen: add pc_machine_kvm_type to initialize XEN_EMULATE mode, David Woodhouse, 2023/02/23
- [PATCH v13 44/60] hw/xen: Support mapping grant frames, David Woodhouse, 2023/02/23
- [PATCH v13 56/60] hw/xen: Support GSI mapping to PIRQ, David Woodhouse, 2023/02/23
- [PATCH v13 33/60] hw/xen: Implement EVTCHNOP_bind_ipi, David Woodhouse, 2023/02/23
- [PATCH v13 48/60] i386/xen: Reserve Xen special pages for console, xenstore rings, David Woodhouse, 2023/02/23
- [PATCH v13 46/60] hw/xen: Implement GNTTABOP_query_size, David Woodhouse, 2023/02/23
- [PATCH v13 24/60] i386/xen: implement HYPERVISOR_event_channel_op, David Woodhouse, 2023/02/23
- [PATCH v13 18/60] i386/xen: implement XENMEM_add_to_physmap_batch, David Woodhouse, 2023/02/23
- [PATCH v13 03/60] xen: Add XEN_DISABLED mode and make it default, David Woodhouse, 2023/02/23
- [PATCH v13 11/60] i386/xen: implement HYPERVISOR_sched_op, SCHEDOP_shutdown, David Woodhouse, 2023/02/23