[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[RFC PATCH 17/21] i386/xen: handle register_runstate_memory_area
From: |
David Woodhouse |
Subject: |
[RFC PATCH 17/21] i386/xen: handle register_runstate_memory_area |
Date: |
Mon, 5 Dec 2022 17:31:33 +0000 |
From: Joao Martins <joao.m.martins@oracle.com>
Allow guest to setup the vcpu runstates which is used as
steal clock.
Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
---
target/i386/xen.c | 25 +++++++++++++++++++++++++
1 file changed, 25 insertions(+)
diff --git a/target/i386/xen.c b/target/i386/xen.c
index 1def526e08..6f0c46c018 100644
--- a/target/i386/xen.c
+++ b/target/i386/xen.c
@@ -270,6 +270,27 @@ static int vcpuop_register_vcpu_time_info(CPUState *cs,
CPUState *target,
return xen_set_vcpu_attr(target, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
gpa);
}
+static int vcpuop_register_runstate_info(CPUState *cs, CPUState *target,
+ uint64_t arg)
+{
+ struct vcpu_register_runstate_memory_area *rma;
+ uint64_t gpa;
+ void *hva;
+
+ rma = gva_to_hva(cs, arg);
+ if (!rma) {
+ return -EFAULT;
+ }
+
+ hva = gva_to_hva(cs, rma->addr.p);
+ if (!hva || !rma->addr.p) {
+ return -EFAULT;
+ }
+
+ gpa = gva_to_gpa(cs, rma->addr.p);
+ return xen_set_vcpu_attr(target, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
gpa);
+}
+
static int kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,
int cmd, int vcpu_id, uint64_t arg)
{
@@ -278,6 +299,10 @@ static int kvm_xen_hcall_vcpu_op(struct kvm_xen_exit
*exit, X86CPU *cpu,
int err = -ENOSYS;
switch (cmd) {
+ case VCPUOP_register_runstate_memory_area: {
+ err = vcpuop_register_runstate_info(cs, dest, arg);
+ break;
+ }
case VCPUOP_register_vcpu_time_memory_area: {
err = vcpuop_register_vcpu_time_info(cs, dest, arg);
break;
--
2.35.3
- [RFC PATCH 04/21] xen-platform-pci: allow its creation with XEN_EMULATE mode, (continued)
- [RFC PATCH 04/21] xen-platform-pci: allow its creation with XEN_EMULATE mode, David Woodhouse, 2022/12/05
- [RFC PATCH 06/21] pc_piix: handle XEN_EMULATE backend init, David Woodhouse, 2022/12/05
- [RFC PATCH 19/21] i386/xen: handle event channel upcall related hypercalls, David Woodhouse, 2022/12/05
- [RFC PATCH 02/21] i386/xen: Add xen-version machine property and init KVM Xen support, David Woodhouse, 2022/12/05
- [RFC PATCH 01/21] include: import xen public headers, David Woodhouse, 2022/12/05
- [RFC PATCH 03/21] i386/kvm: handle Xen HVM cpuid leaves, David Woodhouse, 2022/12/05
[RFC PATCH 17/21] i386/xen: handle register_runstate_memory_area,
David Woodhouse <=
[RFC PATCH 13/21] i386/xen: implement HYPERVISOR_hvm_op, David Woodhouse, 2022/12/05
[RFC PATCH 05/21] hw/xen_backend: refactor xen_be_init(), David Woodhouse, 2022/12/05
[RFC PATCH 16/21] i386/xen: handle register_vcpu_time_memory_area, David Woodhouse, 2022/12/05
[RFC PATCH 11/21] i386/xen: implement HYPERCALL_xen_version, David Woodhouse, 2022/12/05
[RFC PATCH 09/21] pc_piix: allow xenfv machine with XEN_EMULATE, David Woodhouse, 2022/12/05
[RFC PATCH 18/21] kvm/ioapic: mark gsi-2 used in ioapic routing init, David Woodhouse, 2022/12/05