From: Tiejun Chen Date: Wed, 22 Jul 2015 01:39:58 +0000 (+0000) Subject: tools/libxc: Expose new hypercall xc_reserved_device_memory_map X-Git-Tag: 4.6.0-rc1~72 X-Git-Url: http://xenbits.xensource.com/gitweb?a=commitdiff_plain;h=504ed2053362381ac01b98db9313454488b7db40;p=xen.git tools/libxc: Expose new hypercall xc_reserved_device_memory_map We will introduce the hypercall xc_reserved_device_memory_map approach to libxc. This helps us get rdm entry info according to different parameters. If flag == PCI_DEV_RDM_ALL, all entries should be exposed. Or we just expose that rdm entry specific to a SBDF. CC: Ian Jackson CC: Stefano Stabellini CC: Ian Campbell CC: Wei Liu Signed-off-by: Tiejun Chen Reviewed-by: Kevin Tian Signed-off-by: Ian Jackson Acked-by: Wei Liu --- v13: Mechanical changes to deal with changes to patch 01/ XENMEM_reserved_device_memory_map. --- diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h index ce9029c6b1..9c5ef8bcd8 100644 --- a/tools/libxc/include/xenctrl.h +++ b/tools/libxc/include/xenctrl.h @@ -1314,6 +1314,14 @@ int xc_domain_set_memory_map(xc_interface *xch, int xc_get_machine_memory_map(xc_interface *xch, struct e820entry entries[], uint32_t max_entries); + +int xc_reserved_device_memory_map(xc_interface *xch, + uint32_t flags, + uint16_t seg, + uint8_t bus, + uint8_t devfn, + struct xen_reserved_device_memory entries[], + uint32_t *max_entries); #endif int xc_domain_set_time_offset(xc_interface *xch, uint32_t domid, diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c index 6db8d13368..31511032f4 100644 --- a/tools/libxc/xc_domain.c +++ b/tools/libxc/xc_domain.c @@ -684,6 +684,42 @@ int xc_domain_set_memory_map(xc_interface *xch, return rc; } + +int xc_reserved_device_memory_map(xc_interface *xch, + uint32_t flags, + uint16_t seg, + uint8_t bus, + uint8_t devfn, + struct xen_reserved_device_memory entries[], + uint32_t *max_entries) +{ + int rc; + struct xen_reserved_device_memory_map xrdmmap = { + .flags = flags, + .dev.pci.seg = seg, + .dev.pci.bus = bus, + .dev.pci.devfn = devfn, + .nr_entries = *max_entries + }; + DECLARE_HYPERCALL_BOUNCE(entries, + sizeof(struct xen_reserved_device_memory) * + *max_entries, XC_HYPERCALL_BUFFER_BOUNCE_OUT); + + if ( xc_hypercall_bounce_pre(xch, entries) ) + return -1; + + set_xen_guest_handle(xrdmmap.buffer, entries); + + rc = do_memory_op(xch, XENMEM_reserved_device_memory_map, + &xrdmmap, sizeof(xrdmmap)); + + xc_hypercall_bounce_post(xch, entries); + + *max_entries = xrdmmap.nr_entries; + + return rc; +} + int xc_get_machine_memory_map(xc_interface *xch, struct e820entry entries[], uint32_t max_entries)