[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v5][PATCH 01/16] xen: introduce XENMEM_reserved_device_memory_map
Tiejun Chen writes ("[Xen-devel] [v5][PATCH 01/16] xen: introduce XENMEM_reserved_device_memory_map"): > From: Jan Beulich <jbeulich@xxxxxxxx> > > This is a prerequisite for punching holes into HVM and PVH guests' P2M > to allow passing through devices that are associated with (on VT-d) > RMRRs. ... This function: > +++ b/xen/common/compat/memory.c ... > +static int get_reserved_device_memory(xen_pfn_t start, xen_ulong_t nr, > + u32 id, void *ctxt) is remarkably similar to this function > +++ b/xen/common/memory.c ... > +static int get_reserved_device_memory(xen_pfn_t start, xen_ulong_t nr, > + u32 id, void *ctxt) Is this usual in hypervisor code ? It may be that this is the general approach in compat code and that any cure would be worse than the disease, but I found it very striking. > +/* > + * With some legacy devices, certain guest-physical addresses cannot safely > + * be used for other purposes, e.g. to map guest RAM. This hypercall > + * enumerates those regions so the toolstack can avoid using them. ... > + /* IN/OUT */ > + unsigned int nr_entries; Perhaps I am missing something but I can't find any API documentation for the return value and error returns from this new hypercall. Thanks, Ian. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |