qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: David Woodhouse <dwmw2@infradead.org>
To: Peter Maydell <peter.maydell@linaro.org>, qemu-devel@nongnu.org
Cc: "Paolo Bonzini" <pbonzini@redhat.com>,
	"Paul Durrant" <paul@xen.org>,
	"Joao Martins" <joao.m.martins@oracle.com>,
	"Ankur Arora" <ankur.a.arora@oracle.com>,
	"Philippe Mathieu-Daudé" <philmd@linaro.org>,
	"Thomas Huth" <thuth@redhat.com>,
	"Alex Bennée" <alex.bennee@linaro.org>,
	"Juan Quintela" <quintela@redhat.com>,
	"Dr . David Alan Gilbert" <dgilbert@redhat.com>,
	"Claudio Fontana" <cfontana@suse.de>,
	"Julien Grall" <julien@xen.org>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	"Marcel Apfelbaum" <marcel.apfelbaum@gmail.com>,
	armbru@redhat.com, "Stefano Stabellini" <sstabellini@kernel.org>,
	vikram.garhwal@amd.com
Subject: Re: [PATCH v12 47/60] i386/xen: handle PV timer hypercalls
Date: Wed, 22 Feb 2023 09:21:57 +0000	[thread overview]
Message-ID: <c92e355e101669f8473a695ad4abfc555765e5be.camel@infradead.org> (raw)
In-Reply-To: <20230220204736.2639601-48-dwmw2@infradead.org>

[-- Attachment #1: Type: text/plain, Size: 3322 bytes --]

On Mon, 2023-02-20 at 20:47 +0000, David Woodhouse wrote:
> @@ -1246,6 +1470,16 @@ static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit)
>      }
>  
>      switch (code) {
> +    case __HYPERVISOR_set_timer_op:
> +        if (exit->u.hcall.longmode) {
> +            return kvm_xen_hcall_set_timer_op(exit, cpu,
> +                                              exit->u.hcall.params[0]);
> +        } else {
> +            /* In 32-bit mode, the 64-bit timer value is in two args. */
> +            uint64_t val = ((uint64_t)exit->u.hcall.params[1]) << 32 |
> +                (uint32_t)exit->u.hcall.params[0];
> +            return kvm_xen_hcall_set_timer_op(exit, cpu, val);
> +        }

Argh, there I'm returning -errno from a function that ought to set it
in exit->u.hcall.result and return 'true' for a handled syscall. Again.

Still *slightly* regretting my life choices there and wishing the
compiler caught that for me, but not enough to change it because we
really *do* want to track which unhandled calls guests are trying to
make. I'll fix it and then (if I make load_multiboot() tolerate 64-bit
binaries as previously discussed) the XTF tests work:

 $ ./bkvm/qemu-system-x86_64 -serial mon:stdio  -accel kvm,xen-version=0x4000a,kernel-irqchip=split -cpu host -display none -kernel$XTFDIR/tests/set_timer_op/test-hvm64-set_timer_op  
--- Xen Test Framework ---
Environment: HVM 64bit (Long mode 4 levels)
Test hypercall set_timer_op
Test result: SUCCESS
******************************
PANIC: xtf_exit(): hypercall_shutdown(SHUTDOWN_poweroff) returned
******************************
QEMU: Terminated
$ ./bkvm/qemu-system-x86_64 -serial mon:stdio  -accel kvm,xen-version=0x4000a,kernel-irqchip=split -cpu host -display none -kernel $XTFDIR/tests/set_timer_op/test-hvm32-set_timer_op  
--- Xen Test Framework ---
Environment: HVM 32bit (No paging)
Test hypercall set_timer_op
Test result: SUCCESS
******************************
PANIC: xtf_exit(): hypercall_shutdown(SHUTDOWN_poweroff) returned
******************************
QEMU: Terminated


(Dunno why it whines about poweroff; it isn't even calling the
hypercall. And the test to explicitly test that hypercall does work.)


--- a/target/i386/kvm/xen-emu.c
+++ b/target/i386/kvm/xen-emu.c
@@ -1118,14 +1118,18 @@ static int vcpuop_stop_singleshot_timer(CPUState *cs)
     return 0;
 }
 
-static int kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu,
-                                      uint64_t timeout)
+static bool kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu,
+                                       uint64_t timeout)
 {
+    int err;
+
     if (unlikely(timeout == 0)) {
-        return vcpuop_stop_singleshot_timer(CPU(cpu));
+        err = vcpuop_stop_singleshot_timer(CPU(cpu));
     } else {
-        return do_set_singleshot_timer(CPU(cpu), timeout, false, true);
+        err = do_set_singleshot_timer(CPU(cpu), timeout, false, true);
     }
+    exit->u.hcall.result = err;
+    return true;
 }
 
 static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,


[-- Attachment #2: smime.p7s --]
[-- Type: application/pkcs7-signature, Size: 5965 bytes --]

  reply	other threads:[~2023-02-22  9:22 UTC|newest]

Thread overview: 69+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-02-20 20:46 [PATCH v12 00/60] Xen HVM support under KVM David Woodhouse
2023-02-20 20:46 ` [PATCH v12 01/60] include: import Xen public headers to hw/xen/interface David Woodhouse
2023-02-20 20:46 ` [PATCH v12 02/60] xen: add CONFIG_XEN_BUS and CONFIG_XEN_EMU options for Xen emulation David Woodhouse
2023-02-20 20:46 ` [PATCH v12 03/60] xen: Add XEN_DISABLED mode and make it default David Woodhouse
2023-02-20 20:46 ` [PATCH v12 04/60] i386/kvm: Add xen-version KVM accelerator property and init KVM Xen support David Woodhouse
2023-02-20 20:46 ` [PATCH v12 05/60] i386/kvm: handle Xen HVM cpuid leaves David Woodhouse
2023-02-20 20:46 ` [PATCH v12 06/60] i386/hvm: Set Xen vCPU ID in KVM David Woodhouse
2023-02-20 20:46 ` [PATCH v12 07/60] xen-platform: exclude vfio-pci from the PCI platform unplug David Woodhouse
2023-02-20 20:46 ` [PATCH v12 08/60] xen-platform: allow its creation with XEN_EMULATE mode David Woodhouse
2023-02-20 20:46 ` [PATCH v12 09/60] i386/xen: handle guest hypercalls David Woodhouse
2023-02-20 20:46 ` [PATCH v12 10/60] i386/xen: implement HYPERVISOR_xen_version David Woodhouse
2023-02-20 20:46 ` [PATCH v12 11/60] i386/xen: implement HYPERVISOR_sched_op, SCHEDOP_shutdown David Woodhouse
2023-02-20 20:46 ` [PATCH v12 12/60] i386/xen: Implement SCHEDOP_poll and SCHEDOP_yield David Woodhouse
2023-02-20 20:46 ` [PATCH v12 13/60] hw/xen: Add xen_overlay device for emulating shared xenheap pages David Woodhouse
2023-02-20 20:46 ` [PATCH v12 14/60] xen: Permit --xen-domid argument when accel is KVM David Woodhouse
2023-02-20 20:46 ` [PATCH v12 15/60] i386/xen: add pc_machine_kvm_type to initialize XEN_EMULATE mode David Woodhouse
2023-02-20 20:46 ` [PATCH v12 16/60] i386/xen: manage and save/restore Xen guest long_mode setting David Woodhouse
2023-02-20 20:46 ` [PATCH v12 17/60] i386/xen: implement HYPERVISOR_memory_op David Woodhouse
2023-02-20 20:46 ` [PATCH v12 18/60] i386/xen: implement XENMEM_add_to_physmap_batch David Woodhouse
2023-02-20 20:46 ` [PATCH v12 19/60] i386/xen: implement HYPERVISOR_hvm_op David Woodhouse
2023-02-20 20:46 ` [PATCH v12 20/60] i386/xen: implement HYPERVISOR_vcpu_op David Woodhouse
2023-02-20 20:46 ` [PATCH v12 21/60] i386/xen: handle VCPUOP_register_vcpu_info David Woodhouse
2023-02-20 20:46 ` [PATCH v12 22/60] i386/xen: handle VCPUOP_register_vcpu_time_info David Woodhouse
2023-02-20 20:46 ` [PATCH v12 23/60] i386/xen: handle VCPUOP_register_runstate_memory_area David Woodhouse
2023-02-20 20:47 ` [PATCH v12 24/60] i386/xen: implement HYPERVISOR_event_channel_op David Woodhouse
2023-02-20 20:47 ` [PATCH v12 25/60] i386/xen: implement HVMOP_set_evtchn_upcall_vector David Woodhouse
2023-02-20 20:47 ` [PATCH v12 26/60] i386/xen: implement HVMOP_set_param David Woodhouse
2023-02-20 20:47 ` [PATCH v12 27/60] hw/xen: Add xen_evtchn device for event channel emulation David Woodhouse
2023-02-20 20:47 ` [PATCH v12 28/60] i386/xen: Add support for Xen event channel delivery to vCPU David Woodhouse
2023-02-20 20:47 ` [PATCH v12 29/60] hw/xen: Implement EVTCHNOP_status David Woodhouse
2023-02-20 20:47 ` [PATCH v12 30/60] hw/xen: Implement EVTCHNOP_close David Woodhouse
2023-02-20 20:47 ` [PATCH v12 31/60] hw/xen: Implement EVTCHNOP_unmask David Woodhouse
2023-02-20 20:47 ` [PATCH v12 32/60] hw/xen: Implement EVTCHNOP_bind_virq David Woodhouse
2023-02-20 20:47 ` [PATCH v12 33/60] hw/xen: Implement EVTCHNOP_bind_ipi David Woodhouse
2023-02-20 20:47 ` [PATCH v12 34/60] hw/xen: Implement EVTCHNOP_send David Woodhouse
2023-02-20 20:47 ` [PATCH v12 35/60] hw/xen: Implement EVTCHNOP_alloc_unbound David Woodhouse
2023-02-20 20:47 ` [PATCH v12 36/60] hw/xen: Implement EVTCHNOP_bind_interdomain David Woodhouse
2023-02-20 20:47 ` [PATCH v12 37/60] hw/xen: Implement EVTCHNOP_bind_vcpu David Woodhouse
2023-02-20 20:47 ` [PATCH v12 38/60] hw/xen: Implement EVTCHNOP_reset David Woodhouse
2023-02-20 20:47 ` [PATCH v12 39/60] i386/xen: add monitor commands to test event injection David Woodhouse
2023-02-20 20:47 ` [PATCH v12 40/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_GSI callback David Woodhouse
2023-02-20 20:47 ` [PATCH v12 41/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_PCI_INTX callback David Woodhouse
2023-02-20 20:47 ` [PATCH v12 42/60] kvm/i386: Add xen-gnttab-max-frames property David Woodhouse
2023-02-20 20:47 ` [PATCH v12 43/60] hw/xen: Add xen_gnttab device for grant table emulation David Woodhouse
2023-02-20 20:47 ` [PATCH v12 44/60] hw/xen: Support mapping grant frames David Woodhouse
2023-02-20 20:47 ` [PATCH v12 45/60] i386/xen: Implement HYPERVISOR_grant_table_op and GNTTABOP_[gs]et_verson David Woodhouse
2023-02-20 20:47 ` [PATCH v12 46/60] hw/xen: Implement GNTTABOP_query_size David Woodhouse
2023-02-20 20:47 ` [PATCH v12 47/60] i386/xen: handle PV timer hypercalls David Woodhouse
2023-02-22  9:21   ` David Woodhouse [this message]
2023-02-22 12:03     ` Paul Durrant
2023-02-22 12:14       ` Paul Durrant
2023-02-22 12:51         ` David Woodhouse
2023-02-22 13:31           ` Paul Durrant
2023-02-22 13:32           ` Paul Durrant
2023-02-22 16:18             ` David Woodhouse
2023-02-20 20:47 ` [PATCH v12 48/60] i386/xen: Reserve Xen special pages for console, xenstore rings David Woodhouse
2023-02-20 20:47 ` [PATCH v12 49/60] i386/xen: handle HVMOP_get_param David Woodhouse
2023-02-20 20:47 ` [PATCH v12 50/60] hw/xen: Add backend implementation of interdomain event channel support David Woodhouse
2023-02-20 20:47 ` [PATCH v12 51/60] hw/xen: Add xen_xenstore device for xenstore emulation David Woodhouse
2023-02-20 20:47 ` [PATCH v12 52/60] hw/xen: Add basic ring handling to xenstore David Woodhouse
2023-02-20 20:47 ` [PATCH v12 53/60] hw/xen: Automatically add xen-platform PCI device for emulated Xen guests David Woodhouse
2023-02-20 20:47 ` [PATCH v12 54/60] i386/xen: Implement HYPERVISOR_physdev_op David Woodhouse
2023-02-20 20:47 ` [PATCH v12 55/60] hw/xen: Implement emulated PIRQ hypercall support David Woodhouse
2023-02-20 20:47 ` [PATCH v12 56/60] hw/xen: Support GSI mapping to PIRQ David Woodhouse
2023-02-20 20:47 ` [PATCH v12 57/60] hw/xen: Support MSI " David Woodhouse
2023-02-20 20:47 ` [PATCH v12 58/60] kvm/i386: Add xen-evtchn-max-pirq property David Woodhouse
2023-02-20 20:47 ` [PATCH v12 59/60] i386/xen: Document Xen HVM emulation David Woodhouse
2023-02-20 20:47 ` [PATCH v12 60/60] hw/xen: Subsume xen_be_register_common() into xen_be_init() David Woodhouse
2023-02-22 12:05   ` Paul Durrant

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c92e355e101669f8473a695ad4abfc555765e5be.camel@infradead.org \
    --to=dwmw2@infradead.org \
    --cc=alex.bennee@linaro.org \
    --cc=ankur.a.arora@oracle.com \
    --cc=armbru@redhat.com \
    --cc=cfontana@suse.de \
    --cc=dgilbert@redhat.com \
    --cc=joao.m.martins@oracle.com \
    --cc=julien@xen.org \
    --cc=marcel.apfelbaum@gmail.com \
    --cc=mst@redhat.com \
    --cc=paul@xen.org \
    --cc=pbonzini@redhat.com \
    --cc=peter.maydell@linaro.org \
    --cc=philmd@linaro.org \
    --cc=qemu-devel@nongnu.org \
    --cc=quintela@redhat.com \
    --cc=sstabellini@kernel.org \
    --cc=thuth@redhat.com \
    --cc=vikram.garhwal@amd.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).