[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v8 19/58] i386/xen: implement HYPERVISOR_vcpu_op
From: |
David Woodhouse |
Subject: |
[PATCH v8 19/58] i386/xen: implement HYPERVISOR_vcpu_op |
Date: |
Fri, 20 Jan 2023 13:13:04 +0000 |
From: Joao Martins <joao.m.martins@oracle.com>
This is simply when guest tries to register a vcpu_info
and since vcpu_info placement is optional in the minimum ABI
therefore we can just fail with -ENOSYS
Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Paul Durrant <paul@xen.org>
---
target/i386/kvm/xen-emu.c | 25 +++++++++++++++++++++++++
1 file changed, 25 insertions(+)
diff --git a/target/i386/kvm/xen-emu.c b/target/i386/kvm/xen-emu.c
index 0b056eb450..e940901f80 100644
--- a/target/i386/kvm/xen-emu.c
+++ b/target/i386/kvm/xen-emu.c
@@ -27,6 +27,7 @@
#include "standard-headers/xen/sched.h"
#include "standard-headers/xen/memory.h"
#include "standard-headers/xen/hvm/hvm_op.h"
+#include "standard-headers/xen/vcpu.h"
#include "xen-compat.h"
@@ -363,6 +364,25 @@ static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit
*exit, X86CPU *cpu,
}
}
+static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,
+ int cmd, int vcpu_id, uint64_t arg)
+{
+ int err;
+
+ switch (cmd) {
+ case VCPUOP_register_vcpu_info:
+ /* no vcpu info placement for now */
+ err = -ENOSYS;
+ break;
+
+ default:
+ return false;
+ }
+
+ exit->u.hcall.result = err;
+ return true;
+}
+
int kvm_xen_soft_reset(void)
{
int err;
@@ -464,6 +484,11 @@ static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct
kvm_xen_exit *exit)
case __HYPERVISOR_sched_op:
return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0],
exit->u.hcall.params[1]);
+ case __HYPERVISOR_vcpu_op:
+ return kvm_xen_hcall_vcpu_op(exit, cpu,
+ exit->u.hcall.params[0],
+ exit->u.hcall.params[1],
+ exit->u.hcall.params[2]);
case __HYPERVISOR_hvm_op:
return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0],
exit->u.hcall.params[1]);
--
2.39.0
- [PATCH v8 01/58] include: import Xen public headers to include/standard-headers/, (continued)
- [PATCH v8 01/58] include: import Xen public headers to include/standard-headers/, David Woodhouse, 2023/01/20
- [PATCH v8 15/58] i386/xen: manage and save/restore Xen guest long_mode setting, David Woodhouse, 2023/01/20
- [PATCH v8 29/58] hw/xen: Implement EVTCHNOP_close, David Woodhouse, 2023/01/20
- [PATCH v8 18/58] i386/xen: implement HYPERVISOR_hvm_op, David Woodhouse, 2023/01/20
- [PATCH v8 28/58] hw/xen: Implement EVTCHNOP_status, David Woodhouse, 2023/01/20
- [PATCH v8 12/58] i386/xen: Implement SCHEDOP_poll and SCHEDOP_yield, David Woodhouse, 2023/01/20
- [PATCH v8 14/58] i386/xen: add pc_machine_kvm_type to initialize XEN_EMULATE mode, David Woodhouse, 2023/01/20
- [PATCH v8 57/58] hw/xen: Support MSI mapping to PIRQ, David Woodhouse, 2023/01/20
- [PATCH v8 06/58] i386/hvm: Set Xen vCPU ID in KVM, David Woodhouse, 2023/01/20
- [PATCH v8 33/58] hw/xen: Implement EVTCHNOP_send, David Woodhouse, 2023/01/20
- [PATCH v8 19/58] i386/xen: implement HYPERVISOR_vcpu_op,
David Woodhouse <=
- [PATCH v8 03/58] xen: Add XEN_DISABLED mode and make it default, David Woodhouse, 2023/01/20
- [PATCH v8 37/58] hw/xen: Implement EVTCHNOP_reset, David Woodhouse, 2023/01/20
- [PATCH v8 47/58] i386/xen: Reserve Xen special pages for console, xenstore rings, David Woodhouse, 2023/01/20
- [PATCH v8 32/58] hw/xen: Implement EVTCHNOP_bind_ipi, David Woodhouse, 2023/01/20
- [PATCH v8 43/58] hw/xen: Support mapping grant frames, David Woodhouse, 2023/01/20
- [PATCH v8 55/58] hw/xen: Implement emulated PIRQ hypercall support, David Woodhouse, 2023/01/20
- [PATCH v8 42/58] hw/xen: Add xen_gnttab device for grant table emulation, David Woodhouse, 2023/01/20
- [PATCH v8 11/58] i386/xen: implement HYPERVISOR_sched_op, SCHEDOP_shutdown, David Woodhouse, 2023/01/20
- [PATCH v8 41/58] kvm/i386: Add xen-gnttab-max-frames property, David Woodhouse, 2023/01/20
- [PATCH v8 51/58] hw/xen: Add basic ring handling to xenstore, David Woodhouse, 2023/01/20