From: Konrad Rzeszutek Wilk Date: Thu, 26 May 2011 13:49:50 +0000 (+0100) Subject: libxc: xc_domain_set_memory_map, xc_get_machine_memory_map (x86, amd64 only) X-Git-Tag: archive/raspbian/4.8.0-1+rpi1~1^2~10285 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=eadf449efd7518d8f5789c90aaa93c487b88fb98;p=xen.git libxc: xc_domain_set_memory_map, xc_get_machine_memory_map (x86, amd64 only) Add these two functions. The later retrieves the E820 as seen by the hypervisor (completely unchanged) and the second call sets the E820 for the specified guest. Signed-off-by: Konrad Rzeszutek Wilk Committed-by: Ian Jackson --- diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c index 98ca5ed49e..a9c5cff6fa 100644 --- a/tools/libxc/xc_domain.c +++ b/tools/libxc/xc_domain.c @@ -478,38 +478,65 @@ int xc_domain_pin_memory_cacheattr(xc_interface *xch, } #if defined(__i386__) || defined(__x86_64__) -#include "xc_e820.h" -int xc_domain_set_memmap_limit(xc_interface *xch, +int xc_domain_set_memory_map(xc_interface *xch, uint32_t domid, - unsigned long map_limitkb) + struct e820entry entries[], + uint32_t nr_entries) { int rc; struct xen_foreign_memory_map fmap = { .domid = domid, - .map = { .nr_entries = 1 } + .map = { .nr_entries = nr_entries } }; - DECLARE_HYPERCALL_BUFFER(struct e820entry, e820); - - e820 = xc_hypercall_buffer_alloc(xch, e820, sizeof(*e820)); + DECLARE_HYPERCALL_BOUNCE(entries, nr_entries * sizeof(struct e820entry), + XC_HYPERCALL_BUFFER_BOUNCE_IN); - if ( e820 == NULL ) - { - PERROR("Could not allocate memory for xc_domain_set_memmap_limit hypercall"); + if ( !entries || xc_hypercall_bounce_pre(xch, entries) ) return -1; - } - - e820->addr = 0; - e820->size = (uint64_t)map_limitkb << 10; - e820->type = E820_RAM; - set_xen_guest_handle(fmap.map.buffer, e820); + set_xen_guest_handle(fmap.map.buffer, entries); rc = do_memory_op(xch, XENMEM_set_memory_map, &fmap, sizeof(fmap)); - xc_hypercall_buffer_free(xch, e820); + xc_hypercall_bounce_post(xch, entries); return rc; } +int xc_get_machine_memory_map(xc_interface *xch, + struct e820entry entries[], + uint32_t max_entries) +{ + int rc; + struct xen_memory_map memmap = { + .nr_entries = max_entries + }; + DECLARE_HYPERCALL_BOUNCE(entries, sizeof(struct e820entry) * max_entries, + XC_HYPERCALL_BUFFER_BOUNCE_OUT); + + if ( !entries || xc_hypercall_bounce_pre(xch, entries) || max_entries <= 1) + return -1; + + + set_xen_guest_handle(memmap.buffer, entries); + + rc = do_memory_op(xch, XENMEM_machine_memory_map, &memmap, sizeof(memmap)); + + xc_hypercall_bounce_post(xch, entries); + + return rc ? rc : memmap.nr_entries; +} +int xc_domain_set_memmap_limit(xc_interface *xch, + uint32_t domid, + unsigned long map_limitkb) +{ + struct e820entry e820; + + e820.addr = 0; + e820.size = (uint64_t)map_limitkb << 10; + e820.type = E820_RAM; + + return xc_domain_set_memory_map(xch, domid, &e820, 1); +} #else int xc_domain_set_memmap_limit(xc_interface *xch, uint32_t domid, diff --git a/tools/libxc/xc_e820.h b/tools/libxc/xc_e820.h index 5207a9da43..fadfe73f2a 100644 --- a/tools/libxc/xc_e820.h +++ b/tools/libxc/xc_e820.h @@ -26,6 +26,9 @@ #define E820_RESERVED 2 #define E820_ACPI 3 #define E820_NVS 4 +#define E820_UNUSABLE 5 + +#define E820MAX (128) struct e820entry { uint64_t addr; diff --git a/tools/libxc/xenctrl.h b/tools/libxc/xenctrl.h index 9a4355f79c..0c4c6fb399 100644 --- a/tools/libxc/xenctrl.h +++ b/tools/libxc/xenctrl.h @@ -966,6 +966,17 @@ int xc_domain_set_memmap_limit(xc_interface *xch, uint32_t domid, unsigned long map_limitkb); +#if defined(__i386__) || defined(__x86_64__) +#include "xc_e820.h" +int xc_domain_set_memory_map(xc_interface *xch, + uint32_t domid, + struct e820entry entries[], + uint32_t nr_entries); + +int xc_get_machine_memory_map(xc_interface *xch, + struct e820entry entries[], + uint32_t max_entries); +#endif int xc_domain_set_time_offset(xc_interface *xch, uint32_t domid, int32_t time_offset_seconds);