[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] x86 hvm: New hvm_op "set_mem_type" which allows marking ram page
# HG changeset patch # User Keir Fraser <keir.fraser@xxxxxxxxxx> # Date 1215700239 -3600 # Node ID 7749f135140a637d1ae58a137f23298f042b030b # Parent 8803b305b06c4bc03fa8b8270f3a83844bd446be x86 hvm: New hvm_op "set_mem_type" which allows marking ram page ranges as ro, rw, or mmio_dm. Signed-off-by: Trolle Selander <trolle.selander@xxxxxxxxxxxxx> --- tools/libxc/xc_misc.c | 30 ++++++++++++++++++++ tools/libxc/xenctrl.h | 9 ++++++ xen/arch/x86/hvm/hvm.c | 59 ++++++++++++++++++++++++++++++++++++++++ xen/include/public/hvm/hvm_op.h | 21 ++++++++++++++ 4 files changed, 119 insertions(+) diff -r 8803b305b06c -r 7749f135140a tools/libxc/xc_misc.c --- a/tools/libxc/xc_misc.c Thu Jul 10 15:19:56 2008 +0100 +++ b/tools/libxc/xc_misc.c Thu Jul 10 15:30:39 2008 +0100 @@ -294,6 +294,36 @@ int xc_hvm_modified_memory( return rc; } + +int xc_hvm_set_mem_type( + int xc_handle, domid_t dom, hvmmem_type_t mem_type, uint64_t first_pfn, uint64_t nr) +{ + DECLARE_HYPERCALL; + struct xen_hvm_set_mem_type arg; + int rc; + + hypercall.op = __HYPERVISOR_hvm_op; + hypercall.arg[0] = HVMOP_set_mem_type; + hypercall.arg[1] = (unsigned long)&arg; + + arg.domid = dom; + arg.hvmmem_type = mem_type; + arg.first_pfn = first_pfn; + arg.nr = nr; + + if ( (rc = lock_pages(&arg, sizeof(arg))) != 0 ) + { + PERROR("Could not lock memory"); + return rc; + } + + rc = do_xen_hypercall(xc_handle, &hypercall); + + unlock_pages(&arg, sizeof(arg)); + + return rc; +} + void *xc_map_foreign_pages(int xc_handle, uint32_t dom, int prot, const xen_pfn_t *arr, int num) diff -r 8803b305b06c -r 7749f135140a tools/libxc/xenctrl.h --- a/tools/libxc/xenctrl.h Thu Jul 10 15:19:56 2008 +0100 +++ b/tools/libxc/xenctrl.h Thu Jul 10 15:30:39 2008 +0100 @@ -27,6 +27,7 @@ #include <xen/event_channel.h> #include <xen/sched.h> #include <xen/memory.h> +#include <xen/hvm/params.h> #include <xen/xsm/acm.h> #include <xen/xsm/acm_ops.h> #include <xen/xsm/flask_op.h> @@ -942,6 +943,14 @@ int xc_hvm_modified_memory( int xc_hvm_modified_memory( int xc_handle, domid_t dom, uint64_t first_pfn, uint64_t nr); +/* + * Set a range of memory to a specific type. + * Allowed types are HVMMEM_ram_rw, HVMMEM_ram_ro, HVMMEM_mmio_dm + */ +int xc_hvm_set_mem_type( + int xc_handle, domid_t dom, hvmmem_type_t memtype, uint64_t first_pfn, uint64_t nr); + + typedef enum { XC_ERROR_NONE = 0, XC_INTERNAL_ERROR = 1, diff -r 8803b305b06c -r 7749f135140a xen/arch/x86/hvm/hvm.c --- a/xen/arch/x86/hvm/hvm.c Thu Jul 10 15:19:56 2008 +0100 +++ b/xen/arch/x86/hvm/hvm.c Thu Jul 10 15:30:39 2008 +0100 @@ -2611,6 +2611,65 @@ long do_hvm_op(unsigned long op, XEN_GUE break; } + case HVMOP_set_mem_type: + { + struct xen_hvm_set_mem_type a; + struct domain *d; + unsigned long pfn; + + /* Interface types to internal p2m types */ + p2m_type_t memtype[] = { + p2m_ram_rw, /* HVMMEM_ram_rw */ + p2m_ram_ro, /* HVMMEM_ram_ro */ + p2m_mmio_dm /* HVMMEM_mmio_dm */ + }; + + if ( copy_from_guest(&a, arg, 1) ) + return -EFAULT; + + if ( a.domid == DOMID_SELF ) + { + d = rcu_lock_current_domain(); + } + else + { + if ( (d = rcu_lock_domain_by_id(a.domid)) == NULL ) + return -ESRCH; + if ( !IS_PRIV_FOR(current->domain, d) ) + { + rc = -EPERM; + goto param_fail4; + } + } + + rc = -EINVAL; + if ( !is_hvm_domain(d) ) + goto param_fail4; + + rc = -EINVAL; + if ( (a.first_pfn > domain_get_maximum_gpfn(d)) || + ((a.first_pfn + a.nr - 1) < a.first_pfn) || + ((a.first_pfn + a.nr - 1) > domain_get_maximum_gpfn(d)) ) + goto param_fail4; + + if ( a.hvmmem_type >= ARRAY_SIZE(memtype) ) + goto param_fail4; + + rc = 0; + + for ( pfn = a.first_pfn; pfn < a.first_pfn + a.nr; pfn++ ) + { + p2m_type_t t; + mfn_t mfn; + mfn = gfn_to_mfn(d, pfn, &t); + p2m_change_type(d, pfn, t, memtype[a.hvmmem_type]); + } + + param_fail4: + rcu_unlock_domain(d); + break; + } + default: { gdprintk(XENLOG_WARNING, "Bad HVM op %ld.\n", op); diff -r 8803b305b06c -r 7749f135140a xen/include/public/hvm/hvm_op.h --- a/xen/include/public/hvm/hvm_op.h Thu Jul 10 15:19:56 2008 +0100 +++ b/xen/include/public/hvm/hvm_op.h Thu Jul 10 15:30:39 2008 +0100 @@ -105,6 +105,27 @@ typedef struct xen_hvm_modified_memory x typedef struct xen_hvm_modified_memory xen_hvm_modified_memory_t; DEFINE_XEN_GUEST_HANDLE(xen_hvm_modified_memory_t); +#define HVMOP_set_mem_type 8 +typedef enum { + HVMMEM_ram_rw, /* Normal read/write guest RAM */ + HVMMEM_ram_ro, /* Read-only; writes are discarded */ + HVMMEM_mmio_dm, /* Reads and write go to the device model */ +} hvmmem_type_t; +/* Notify that a region of memory is to be treated in a specific way. */ +struct xen_hvm_set_mem_type { + /* Domain to be updated. */ + domid_t domid; + /* Memory type */ + hvmmem_type_t hvmmem_type; + /* First pfn. */ + uint64_aligned_t first_pfn; + /* Number of pages. */ + uint64_aligned_t nr; +}; +typedef struct xen_hvm_set_mem_type xen_hvm_set_mem_type_t; +DEFINE_XEN_GUEST_HANDLE(xen_hvm_set_mem_type_t); + + #endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */ #endif /* __XEN_PUBLIC_HVM_HVM_OP_H__ */ _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |