From: David Woodhouse <dwmw2@infradead.org>
To: Peter Maydell <peter.maydell@linaro.org>, qemu-devel@nongnu.org
Cc: "Paolo Bonzini" <pbonzini@redhat.com>,
"Paul Durrant" <paul@xen.org>,
"Joao Martins" <joao.m.martins@oracle.com>,
"Ankur Arora" <ankur.a.arora@oracle.com>,
"Philippe Mathieu-Daudé" <philmd@linaro.org>,
"Thomas Huth" <thuth@redhat.com>,
"Alex Bennée" <alex.bennee@linaro.org>,
"Juan Quintela" <quintela@redhat.com>,
"Dr . David Alan Gilbert" <dgilbert@redhat.com>,
"Claudio Fontana" <cfontana@suse.de>,
"Julien Grall" <julien@xen.org>,
"Michael S. Tsirkin" <mst@redhat.com>,
"Marcel Apfelbaum" <marcel.apfelbaum@gmail.com>,
armbru@redhat.com, "Stefano Stabellini" <sstabellini@kernel.org>,
vikram.garhwal@amd.com
Subject: Re: [PATCH v12 47/60] i386/xen: handle PV timer hypercalls
Date: Wed, 22 Feb 2023 09:21:57 +0000 [thread overview]
Message-ID: <c92e355e101669f8473a695ad4abfc555765e5be.camel@infradead.org> (raw)
In-Reply-To: <20230220204736.2639601-48-dwmw2@infradead.org>
[-- Attachment #1: Type: text/plain, Size: 3322 bytes --]
On Mon, 2023-02-20 at 20:47 +0000, David Woodhouse wrote:
> @@ -1246,6 +1470,16 @@ static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit)
> }
>
> switch (code) {
> + case __HYPERVISOR_set_timer_op:
> + if (exit->u.hcall.longmode) {
> + return kvm_xen_hcall_set_timer_op(exit, cpu,
> + exit->u.hcall.params[0]);
> + } else {
> + /* In 32-bit mode, the 64-bit timer value is in two args. */
> + uint64_t val = ((uint64_t)exit->u.hcall.params[1]) << 32 |
> + (uint32_t)exit->u.hcall.params[0];
> + return kvm_xen_hcall_set_timer_op(exit, cpu, val);
> + }
Argh, there I'm returning -errno from a function that ought to set it
in exit->u.hcall.result and return 'true' for a handled syscall. Again.
Still *slightly* regretting my life choices there and wishing the
compiler caught that for me, but not enough to change it because we
really *do* want to track which unhandled calls guests are trying to
make. I'll fix it and then (if I make load_multiboot() tolerate 64-bit
binaries as previously discussed) the XTF tests work:
$ ./bkvm/qemu-system-x86_64 -serial mon:stdio -accel kvm,xen-version=0x4000a,kernel-irqchip=split -cpu host -display none -kernel$XTFDIR/tests/set_timer_op/test-hvm64-set_timer_op
--- Xen Test Framework ---
Environment: HVM 64bit (Long mode 4 levels)
Test hypercall set_timer_op
Test result: SUCCESS
******************************
PANIC: xtf_exit(): hypercall_shutdown(SHUTDOWN_poweroff) returned
******************************
QEMU: Terminated
$ ./bkvm/qemu-system-x86_64 -serial mon:stdio -accel kvm,xen-version=0x4000a,kernel-irqchip=split -cpu host -display none -kernel $XTFDIR/tests/set_timer_op/test-hvm32-set_timer_op
--- Xen Test Framework ---
Environment: HVM 32bit (No paging)
Test hypercall set_timer_op
Test result: SUCCESS
******************************
PANIC: xtf_exit(): hypercall_shutdown(SHUTDOWN_poweroff) returned
******************************
QEMU: Terminated
(Dunno why it whines about poweroff; it isn't even calling the
hypercall. And the test to explicitly test that hypercall does work.)
--- a/target/i386/kvm/xen-emu.c
+++ b/target/i386/kvm/xen-emu.c
@@ -1118,14 +1118,18 @@ static int vcpuop_stop_singleshot_timer(CPUState *cs)
return 0;
}
-static int kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu,
- uint64_t timeout)
+static bool kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu,
+ uint64_t timeout)
{
+ int err;
+
if (unlikely(timeout == 0)) {
- return vcpuop_stop_singleshot_timer(CPU(cpu));
+ err = vcpuop_stop_singleshot_timer(CPU(cpu));
} else {
- return do_set_singleshot_timer(CPU(cpu), timeout, false, true);
+ err = do_set_singleshot_timer(CPU(cpu), timeout, false, true);
}
+ exit->u.hcall.result = err;
+ return true;
}
static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,
[-- Attachment #2: smime.p7s --]
[-- Type: application/pkcs7-signature, Size: 5965 bytes --]
next prev parent reply other threads:[~2023-02-22 9:22 UTC|newest]
Thread overview: 69+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-02-20 20:46 [PATCH v12 00/60] Xen HVM support under KVM David Woodhouse
2023-02-20 20:46 ` [PATCH v12 01/60] include: import Xen public headers to hw/xen/interface David Woodhouse
2023-02-20 20:46 ` [PATCH v12 02/60] xen: add CONFIG_XEN_BUS and CONFIG_XEN_EMU options for Xen emulation David Woodhouse
2023-02-20 20:46 ` [PATCH v12 03/60] xen: Add XEN_DISABLED mode and make it default David Woodhouse
2023-02-20 20:46 ` [PATCH v12 04/60] i386/kvm: Add xen-version KVM accelerator property and init KVM Xen support David Woodhouse
2023-02-20 20:46 ` [PATCH v12 05/60] i386/kvm: handle Xen HVM cpuid leaves David Woodhouse
2023-02-20 20:46 ` [PATCH v12 06/60] i386/hvm: Set Xen vCPU ID in KVM David Woodhouse
2023-02-20 20:46 ` [PATCH v12 07/60] xen-platform: exclude vfio-pci from the PCI platform unplug David Woodhouse
2023-02-20 20:46 ` [PATCH v12 08/60] xen-platform: allow its creation with XEN_EMULATE mode David Woodhouse
2023-02-20 20:46 ` [PATCH v12 09/60] i386/xen: handle guest hypercalls David Woodhouse
2023-02-20 20:46 ` [PATCH v12 10/60] i386/xen: implement HYPERVISOR_xen_version David Woodhouse
2023-02-20 20:46 ` [PATCH v12 11/60] i386/xen: implement HYPERVISOR_sched_op, SCHEDOP_shutdown David Woodhouse
2023-02-20 20:46 ` [PATCH v12 12/60] i386/xen: Implement SCHEDOP_poll and SCHEDOP_yield David Woodhouse
2023-02-20 20:46 ` [PATCH v12 13/60] hw/xen: Add xen_overlay device for emulating shared xenheap pages David Woodhouse
2023-02-20 20:46 ` [PATCH v12 14/60] xen: Permit --xen-domid argument when accel is KVM David Woodhouse
2023-02-20 20:46 ` [PATCH v12 15/60] i386/xen: add pc_machine_kvm_type to initialize XEN_EMULATE mode David Woodhouse
2023-02-20 20:46 ` [PATCH v12 16/60] i386/xen: manage and save/restore Xen guest long_mode setting David Woodhouse
2023-02-20 20:46 ` [PATCH v12 17/60] i386/xen: implement HYPERVISOR_memory_op David Woodhouse
2023-02-20 20:46 ` [PATCH v12 18/60] i386/xen: implement XENMEM_add_to_physmap_batch David Woodhouse
2023-02-20 20:46 ` [PATCH v12 19/60] i386/xen: implement HYPERVISOR_hvm_op David Woodhouse
2023-02-20 20:46 ` [PATCH v12 20/60] i386/xen: implement HYPERVISOR_vcpu_op David Woodhouse
2023-02-20 20:46 ` [PATCH v12 21/60] i386/xen: handle VCPUOP_register_vcpu_info David Woodhouse
2023-02-20 20:46 ` [PATCH v12 22/60] i386/xen: handle VCPUOP_register_vcpu_time_info David Woodhouse
2023-02-20 20:46 ` [PATCH v12 23/60] i386/xen: handle VCPUOP_register_runstate_memory_area David Woodhouse
2023-02-20 20:47 ` [PATCH v12 24/60] i386/xen: implement HYPERVISOR_event_channel_op David Woodhouse
2023-02-20 20:47 ` [PATCH v12 25/60] i386/xen: implement HVMOP_set_evtchn_upcall_vector David Woodhouse
2023-02-20 20:47 ` [PATCH v12 26/60] i386/xen: implement HVMOP_set_param David Woodhouse
2023-02-20 20:47 ` [PATCH v12 27/60] hw/xen: Add xen_evtchn device for event channel emulation David Woodhouse
2023-02-20 20:47 ` [PATCH v12 28/60] i386/xen: Add support for Xen event channel delivery to vCPU David Woodhouse
2023-02-20 20:47 ` [PATCH v12 29/60] hw/xen: Implement EVTCHNOP_status David Woodhouse
2023-02-20 20:47 ` [PATCH v12 30/60] hw/xen: Implement EVTCHNOP_close David Woodhouse
2023-02-20 20:47 ` [PATCH v12 31/60] hw/xen: Implement EVTCHNOP_unmask David Woodhouse
2023-02-20 20:47 ` [PATCH v12 32/60] hw/xen: Implement EVTCHNOP_bind_virq David Woodhouse
2023-02-20 20:47 ` [PATCH v12 33/60] hw/xen: Implement EVTCHNOP_bind_ipi David Woodhouse
2023-02-20 20:47 ` [PATCH v12 34/60] hw/xen: Implement EVTCHNOP_send David Woodhouse
2023-02-20 20:47 ` [PATCH v12 35/60] hw/xen: Implement EVTCHNOP_alloc_unbound David Woodhouse
2023-02-20 20:47 ` [PATCH v12 36/60] hw/xen: Implement EVTCHNOP_bind_interdomain David Woodhouse
2023-02-20 20:47 ` [PATCH v12 37/60] hw/xen: Implement EVTCHNOP_bind_vcpu David Woodhouse
2023-02-20 20:47 ` [PATCH v12 38/60] hw/xen: Implement EVTCHNOP_reset David Woodhouse
2023-02-20 20:47 ` [PATCH v12 39/60] i386/xen: add monitor commands to test event injection David Woodhouse
2023-02-20 20:47 ` [PATCH v12 40/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_GSI callback David Woodhouse
2023-02-20 20:47 ` [PATCH v12 41/60] hw/xen: Support HVM_PARAM_CALLBACK_TYPE_PCI_INTX callback David Woodhouse
2023-02-20 20:47 ` [PATCH v12 42/60] kvm/i386: Add xen-gnttab-max-frames property David Woodhouse
2023-02-20 20:47 ` [PATCH v12 43/60] hw/xen: Add xen_gnttab device for grant table emulation David Woodhouse
2023-02-20 20:47 ` [PATCH v12 44/60] hw/xen: Support mapping grant frames David Woodhouse
2023-02-20 20:47 ` [PATCH v12 45/60] i386/xen: Implement HYPERVISOR_grant_table_op and GNTTABOP_[gs]et_verson David Woodhouse
2023-02-20 20:47 ` [PATCH v12 46/60] hw/xen: Implement GNTTABOP_query_size David Woodhouse
2023-02-20 20:47 ` [PATCH v12 47/60] i386/xen: handle PV timer hypercalls David Woodhouse
2023-02-22 9:21 ` David Woodhouse [this message]
2023-02-22 12:03 ` Paul Durrant
2023-02-22 12:14 ` Paul Durrant
2023-02-22 12:51 ` David Woodhouse
2023-02-22 13:31 ` Paul Durrant
2023-02-22 13:32 ` Paul Durrant
2023-02-22 16:18 ` David Woodhouse
2023-02-20 20:47 ` [PATCH v12 48/60] i386/xen: Reserve Xen special pages for console, xenstore rings David Woodhouse
2023-02-20 20:47 ` [PATCH v12 49/60] i386/xen: handle HVMOP_get_param David Woodhouse
2023-02-20 20:47 ` [PATCH v12 50/60] hw/xen: Add backend implementation of interdomain event channel support David Woodhouse
2023-02-20 20:47 ` [PATCH v12 51/60] hw/xen: Add xen_xenstore device for xenstore emulation David Woodhouse
2023-02-20 20:47 ` [PATCH v12 52/60] hw/xen: Add basic ring handling to xenstore David Woodhouse
2023-02-20 20:47 ` [PATCH v12 53/60] hw/xen: Automatically add xen-platform PCI device for emulated Xen guests David Woodhouse
2023-02-20 20:47 ` [PATCH v12 54/60] i386/xen: Implement HYPERVISOR_physdev_op David Woodhouse
2023-02-20 20:47 ` [PATCH v12 55/60] hw/xen: Implement emulated PIRQ hypercall support David Woodhouse
2023-02-20 20:47 ` [PATCH v12 56/60] hw/xen: Support GSI mapping to PIRQ David Woodhouse
2023-02-20 20:47 ` [PATCH v12 57/60] hw/xen: Support MSI " David Woodhouse
2023-02-20 20:47 ` [PATCH v12 58/60] kvm/i386: Add xen-evtchn-max-pirq property David Woodhouse
2023-02-20 20:47 ` [PATCH v12 59/60] i386/xen: Document Xen HVM emulation David Woodhouse
2023-02-20 20:47 ` [PATCH v12 60/60] hw/xen: Subsume xen_be_register_common() into xen_be_init() David Woodhouse
2023-02-22 12:05 ` Paul Durrant
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=c92e355e101669f8473a695ad4abfc555765e5be.camel@infradead.org \
--to=dwmw2@infradead.org \
--cc=alex.bennee@linaro.org \
--cc=ankur.a.arora@oracle.com \
--cc=armbru@redhat.com \
--cc=cfontana@suse.de \
--cc=dgilbert@redhat.com \
--cc=joao.m.martins@oracle.com \
--cc=julien@xen.org \
--cc=marcel.apfelbaum@gmail.com \
--cc=mst@redhat.com \
--cc=paul@xen.org \
--cc=pbonzini@redhat.com \
--cc=peter.maydell@linaro.org \
--cc=philmd@linaro.org \
--cc=qemu-devel@nongnu.org \
--cc=quintela@redhat.com \
--cc=sstabellini@kernel.org \
--cc=thuth@redhat.com \
--cc=vikram.garhwal@amd.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).