[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v15 20/60] i386/xen: implement HYPERVISOR_vcpu_op
From: |
David Woodhouse |
Subject: |
[PATCH v15 20/60] i386/xen: implement HYPERVISOR_vcpu_op |
Date: |
Wed, 1 Mar 2023 13:51:43 +0000 |
From: Joao Martins <joao.m.martins@oracle.com>
This is simply when guest tries to register a vcpu_info
and since vcpu_info placement is optional in the minimum ABI
therefore we can just fail with -ENOSYS
Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Paul Durrant <paul@xen.org>
---
target/i386/kvm/xen-emu.c | 25 +++++++++++++++++++++++++
1 file changed, 25 insertions(+)
diff --git a/target/i386/kvm/xen-emu.c b/target/i386/kvm/xen-emu.c
index 4002b1b797..e5ae0a9a38 100644
--- a/target/i386/kvm/xen-emu.c
+++ b/target/i386/kvm/xen-emu.c
@@ -27,6 +27,7 @@
#include "hw/xen/interface/sched.h"
#include "hw/xen/interface/memory.h"
#include "hw/xen/interface/hvm/hvm_op.h"
+#include "hw/xen/interface/vcpu.h"
#include "xen-compat.h"
@@ -363,6 +364,25 @@ static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit
*exit, X86CPU *cpu,
}
}
+static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,
+ int cmd, int vcpu_id, uint64_t arg)
+{
+ int err;
+
+ switch (cmd) {
+ case VCPUOP_register_vcpu_info:
+ /* no vcpu info placement for now */
+ err = -ENOSYS;
+ break;
+
+ default:
+ return false;
+ }
+
+ exit->u.hcall.result = err;
+ return true;
+}
+
int kvm_xen_soft_reset(void)
{
int err;
@@ -464,6 +484,11 @@ static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct
kvm_xen_exit *exit)
case __HYPERVISOR_sched_op:
return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0],
exit->u.hcall.params[1]);
+ case __HYPERVISOR_vcpu_op:
+ return kvm_xen_hcall_vcpu_op(exit, cpu,
+ exit->u.hcall.params[0],
+ exit->u.hcall.params[1],
+ exit->u.hcall.params[2]);
case __HYPERVISOR_hvm_op:
return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0],
exit->u.hcall.params[1]);
--
2.39.0
- [PATCH v15 32/60] hw/xen: Implement EVTCHNOP_bind_virq, (continued)
- [PATCH v15 32/60] hw/xen: Implement EVTCHNOP_bind_virq, David Woodhouse, 2023/03/01
- [PATCH v15 41/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_PCI_INTX callback, David Woodhouse, 2023/03/01
- [PATCH v15 54/60] i386/xen: Implement HYPERVISOR_physdev_op, David Woodhouse, 2023/03/01
- [PATCH v15 16/60] i386/xen: manage and save/restore Xen guest long_mode setting, David Woodhouse, 2023/03/01
- [PATCH v15 24/60] i386/xen: implement HYPERVISOR_event_channel_op, David Woodhouse, 2023/03/01
- [PATCH v15 06/60] i386/kvm: Set Xen vCPU ID in KVM, David Woodhouse, 2023/03/01
- [PATCH v15 56/60] hw/xen: Support GSI mapping to PIRQ, David Woodhouse, 2023/03/01
- [PATCH v15 01/60] include: import Xen public headers to hw/xen/interface, David Woodhouse, 2023/03/01
- [PATCH v15 25/60] i386/xen: implement HVMOP_set_evtchn_upcall_vector, David Woodhouse, 2023/03/01
- [PATCH v15 07/60] xen-platform: exclude vfio-pci from the PCI platform unplug, David Woodhouse, 2023/03/01
- [PATCH v15 20/60] i386/xen: implement HYPERVISOR_vcpu_op,
David Woodhouse <=
- [PATCH v15 28/60] i386/xen: Add support for Xen event channel delivery to vCPU, David Woodhouse, 2023/03/01
- [PATCH v15 58/60] kvm/i386: Add xen-evtchn-max-pirq property, David Woodhouse, 2023/03/01
- [PATCH v15 57/60] hw/xen: Support MSI mapping to PIRQ, David Woodhouse, 2023/03/01
- [PATCH v15 47/60] i386/xen: handle PV timer hypercalls, David Woodhouse, 2023/03/01
- [PATCH v15 03/60] xen: Add XEN_DISABLED mode and make it default, David Woodhouse, 2023/03/01
- [PATCH v15 17/60] i386/xen: implement HYPERVISOR_memory_op, David Woodhouse, 2023/03/01
- [PATCH v15 40/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_GSI callback, David Woodhouse, 2023/03/01