[PATCH v1 03/14] RISC-V: paravirt: Implement steal-time support
Conor Dooley
conor.dooley at microchip.com
Thu Dec 7 06:06:37 PST 2023
On Tue, Dec 05, 2023 at 07:11:23PM +0100, Andrew Jones wrote:
> +static int sbi_sta_steal_time_set_shmem(unsigned long lo, unsigned long hi,
> + unsigned long flags)
> {
> + struct sbiret ret;
> +
> + ret = sbi_ecall(SBI_EXT_STA, SBI_EXT_STA_STEAL_TIME_SET_SHMEM,
> + lo, hi, flags, 0, 0, 0);
> + if (ret.error) {
> + if (lo == SBI_STA_SHMEM_DISABLE && hi == SBI_STA_SHMEM_DISABLE)
> + pr_warn("Failed to disable steal-time shmem");
> + else
> + pr_warn("Failed to set steal-time shmem");
> + return -ENOMEM;
btw, how come this is an ENOMEM and not a propagation of the error from
the ecall?
> + }
> +
> return 0;
> }
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/linux-riscv/attachments/20231207/9a69294f/attachment.sig>
More information about the linux-riscv
mailing list