[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v14 49/60] i386/xen: handle HVMOP_get_param
From: |
David Woodhouse |
Subject: |
[PATCH v14 49/60] i386/xen: handle HVMOP_get_param |
Date: |
Mon, 27 Feb 2023 14:28:57 +0000 |
From: Joao Martins <joao.m.martins@oracle.com>
Which is used to fetch xenstore PFN and port to be used
by the guest. This is preallocated by the toolstack when
guest will just read those and use it straight away.
Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Paul Durrant <paul@xen.org>
---
target/i386/kvm/xen-emu.c | 39 +++++++++++++++++++++++++++++++++++++++
1 file changed, 39 insertions(+)
diff --git a/target/i386/kvm/xen-emu.c b/target/i386/kvm/xen-emu.c
index 75bcf7b630..d2c88ef0d9 100644
--- a/target/i386/kvm/xen-emu.c
+++ b/target/i386/kvm/xen-emu.c
@@ -765,6 +765,42 @@ out:
return true;
}
+static bool handle_get_param(struct kvm_xen_exit *exit, X86CPU *cpu,
+ uint64_t arg)
+{
+ CPUState *cs = CPU(cpu);
+ struct xen_hvm_param hp;
+ int err = 0;
+
+ /* No need for 32/64 compat handling */
+ qemu_build_assert(sizeof(hp) == 16);
+
+ if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) {
+ err = -EFAULT;
+ goto out;
+ }
+
+ if (hp.domid != DOMID_SELF && hp.domid != xen_domid) {
+ err = -ESRCH;
+ goto out;
+ }
+
+ switch (hp.index) {
+ case HVM_PARAM_STORE_PFN:
+ hp.value = XEN_SPECIAL_PFN(XENSTORE);
+ break;
+ default:
+ return false;
+ }
+
+ if (kvm_copy_to_gva(cs, arg, &hp, sizeof(hp))) {
+ err = -EFAULT;
+ }
+out:
+ exit->u.hcall.result = err;
+ return true;
+}
+
static int kvm_xen_hcall_evtchn_upcall_vector(struct kvm_xen_exit *exit,
X86CPU *cpu, uint64_t arg)
{
@@ -809,6 +845,9 @@ static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit *exit,
X86CPU *cpu,
case HVMOP_set_param:
return handle_set_param(exit, cpu, arg);
+ case HVMOP_get_param:
+ return handle_get_param(exit, cpu, arg);
+
default:
return false;
}
--
2.39.0
- [PATCH v14 09/60] i386/xen: handle guest hypercalls, (continued)
- [PATCH v14 09/60] i386/xen: handle guest hypercalls, David Woodhouse, 2023/02/27
- [PATCH v14 32/60] hw/xen: Implement EVTCHNOP_bind_virq, David Woodhouse, 2023/02/27
- [PATCH v14 43/60] hw/xen: Add xen_gnttab device for grant table emulation, David Woodhouse, 2023/02/27
- [PATCH v14 47/60] i386/xen: handle PV timer hypercalls, David Woodhouse, 2023/02/27
- [PATCH v14 28/60] i386/xen: Add support for Xen event channel delivery to vCPU, David Woodhouse, 2023/02/27
- [PATCH v14 44/60] hw/xen: Support mapping grant frames, David Woodhouse, 2023/02/27
- [PATCH v14 41/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_PCI_INTX callback, David Woodhouse, 2023/02/27
- [PATCH v14 55/60] hw/xen: Implement emulated PIRQ hypercall support, David Woodhouse, 2023/02/27
- [PATCH v14 18/60] i386/xen: implement XENMEM_add_to_physmap_batch, David Woodhouse, 2023/02/27
- [PATCH v14 30/60] hw/xen: Implement EVTCHNOP_close, David Woodhouse, 2023/02/27
- [PATCH v14 49/60] i386/xen: handle HVMOP_get_param,
David Woodhouse <=
- [PATCH v14 36/60] hw/xen: Implement EVTCHNOP_bind_interdomain, David Woodhouse, 2023/02/27
- [PATCH v14 35/60] hw/xen: Implement EVTCHNOP_alloc_unbound, David Woodhouse, 2023/02/27
- [PATCH v14 15/60] i386/xen: add pc_machine_kvm_type to initialize XEN_EMULATE mode, David Woodhouse, 2023/02/27
- [PATCH v14 45/60] i386/xen: Implement HYPERVISOR_grant_table_op and GNTTABOP_[gs]et_verson, David Woodhouse, 2023/02/27
- [PATCH v14 05/60] i386/kvm: handle Xen HVM cpuid leaves, David Woodhouse, 2023/02/27
- [PATCH v14 12/60] i386/xen: Implement SCHEDOP_poll and SCHEDOP_yield, David Woodhouse, 2023/02/27