bus/fslmc: support VFIO
authorHemant Agrawal <hemant.agrawal@nxp.com>
Tue, 11 Apr 2017 13:37:14 +0000 (19:07 +0530)
committerFerruh Yigit <ferruh.yigit@intel.com>
Wed, 19 Apr 2017 13:37:37 +0000 (15:37 +0200)
Add support for using VFIO for dpaa2 based fsl-mc bus.

There are some differences in the way vfio used for fsl-mc bus
from the eal vfio.
 - The scanning of bus for individual objects on the basis of
   the DPRC container.
 - The use and mapping of MC portal for object access

With the evolution of bus model, they can be further aligned with
eal vfio code.

Signed-off-by: Hemant Agrawal <hemant.agrawal@nxp.com>
drivers/bus/fslmc/Makefile
drivers/bus/fslmc/fslmc_bus.c
drivers/bus/fslmc/fslmc_vfio.c [new file with mode: 0644]
drivers/bus/fslmc/fslmc_vfio.h [new file with mode: 0644]
drivers/bus/fslmc/rte_bus_fslmc_version.map

index e7eff10..b99a4f0 100644 (file)
@@ -67,6 +67,7 @@ SRCS-$(CONFIG_RTE_LIBRTE_FSLMC_BUS) += \
         mc/dpio.c \
         mc/mc_sys.c
 
+SRCS-$(CONFIG_RTE_LIBRTE_FSLMC_BUS) += fslmc_vfio.c
 SRCS-$(CONFIG_RTE_LIBRTE_FSLMC_BUS) += fslmc_bus.c
 
 include $(RTE_SDK)/mk/rte.lib.mk
index 7848207..b24642d 100644 (file)
@@ -42,6 +42,7 @@
 #include <rte_ethdev.h>
 
 #include "rte_fslmc.h"
+#include "fslmc_vfio.h"
 
 #define FSLMC_BUS_LOG(level, fmt, args...) \
        RTE_LOG(level, EAL, "%s(): " fmt "\n", __func__, ##args)
@@ -51,6 +52,21 @@ struct rte_fslmc_bus rte_fslmc_bus;
 static int
 rte_fslmc_scan(void)
 {
+       int ret;
+
+       ret = fslmc_vfio_setup_group();
+       if (ret) {
+               FSLMC_BUS_LOG(ERR, "fslmc: Unable to setup VFIO");
+               return ret;
+       }
+
+       ret = fslmc_vfio_process_group();
+       if (ret) {
+               FSLMC_BUS_LOG(ERR, "fslmc: Unable to setup devices");
+               return -1;
+       }
+
+       RTE_LOG(INFO, EAL, "fslmc: Bus scan completed\n");
        return 0;
 }
 
diff --git a/drivers/bus/fslmc/fslmc_vfio.c b/drivers/bus/fslmc/fslmc_vfio.c
new file mode 100644 (file)
index 0000000..8223e48
--- /dev/null
@@ -0,0 +1,463 @@
+/*-
+ *   BSD LICENSE
+ *
+ *   Copyright (c) 2015-2016 Freescale Semiconductor, Inc. All rights reserved.
+ *   Copyright (c) 2016 NXP. All rights reserved.
+ *
+ *   Redistribution and use in source and binary forms, with or without
+ *   modification, are permitted provided that the following conditions
+ *   are met:
+ *
+ *     * Redistributions of source code must retain the above copyright
+ *       notice, this list of conditions and the following disclaimer.
+ *     * Redistributions in binary form must reproduce the above copyright
+ *       notice, this list of conditions and the following disclaimer in
+ *       the documentation and/or other materials provided with the
+ *       distribution.
+ *     * Neither the name of Freescale Semiconductor, Inc nor the names of its
+ *       contributors may be used to endorse or promote products derived
+ *       from this software without specific prior written permission.
+ *
+ *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <unistd.h>
+#include <stdio.h>
+#include <sys/types.h>
+#include <string.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <errno.h>
+#include <sys/ioctl.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+#include <sys/mman.h>
+#include <sys/vfs.h>
+#include <libgen.h>
+#include <dirent.h>
+#include <sys/eventfd.h>
+
+#include <rte_mbuf.h>
+#include <rte_ethdev.h>
+#include <rte_malloc.h>
+#include <rte_memcpy.h>
+#include <rte_string_fns.h>
+#include <rte_cycles.h>
+#include <rte_kvargs.h>
+#include <rte_dev.h>
+#include <rte_ethdev.h>
+#include <rte_bus.h>
+
+#include "rte_fslmc.h"
+#include "fslmc_vfio.h"
+
+#define VFIO_MAX_CONTAINERS    1
+
+#define FSLMC_VFIO_LOG(level, fmt, args...) \
+       RTE_LOG(level, EAL, "%s(): " fmt "\n", __func__, ##args)
+
+/** Pathname of FSL-MC devices directory. */
+#define SYSFS_FSL_MC_DEVICES "/sys/bus/fsl-mc/devices"
+
+/* Number of VFIO containers & groups with in */
+static struct fslmc_vfio_group vfio_groups[VFIO_MAX_GRP];
+static struct fslmc_vfio_container vfio_containers[VFIO_MAX_CONTAINERS];
+static int container_device_fd;
+void *(*rte_mcp_ptr_list);
+static uint32_t mcp_id;
+
+static int vfio_connect_container(struct fslmc_vfio_group *vfio_group)
+{
+       struct fslmc_vfio_container *container;
+       int i, fd, ret;
+
+       /* Try connecting to vfio container if already created */
+       for (i = 0; i < VFIO_MAX_CONTAINERS; i++) {
+               container = &vfio_containers[i];
+               if (!ioctl(vfio_group->fd, VFIO_GROUP_SET_CONTAINER,
+                          &container->fd)) {
+                       FSLMC_VFIO_LOG(INFO, "Container pre-exists with"
+                                   " FD[0x%x] for this group",
+                                   container->fd);
+                       vfio_group->container = container;
+                       return 0;
+               }
+       }
+
+       /* Opens main vfio file descriptor which represents the "container" */
+       fd = vfio_get_container_fd();
+       if (fd < 0) {
+               FSLMC_VFIO_LOG(ERR, "Failed to open VFIO container");
+               return -errno;
+       }
+
+       /* Check whether support for SMMU type IOMMU present or not */
+       if (ioctl(fd, VFIO_CHECK_EXTENSION, VFIO_TYPE1_IOMMU)) {
+               /* Connect group to container */
+               ret = ioctl(vfio_group->fd, VFIO_GROUP_SET_CONTAINER, &fd);
+               if (ret) {
+                       FSLMC_VFIO_LOG(ERR, "Failed to setup group container");
+                       close(fd);
+                       return -errno;
+               }
+
+               ret = ioctl(fd, VFIO_SET_IOMMU, VFIO_TYPE1_IOMMU);
+               if (ret) {
+                       FSLMC_VFIO_LOG(ERR, "Failed to setup VFIO iommu");
+                       close(fd);
+                       return -errno;
+               }
+       } else {
+               FSLMC_VFIO_LOG(ERR, "No supported IOMMU available");
+               close(fd);
+               return -EINVAL;
+       }
+
+       container = NULL;
+       for (i = 0; i < VFIO_MAX_CONTAINERS; i++) {
+               if (vfio_containers[i].used)
+                       continue;
+               FSLMC_VFIO_LOG(DEBUG, "Unused container at index %d", i);
+               container = &vfio_containers[i];
+       }
+       if (!container) {
+               FSLMC_VFIO_LOG(ERR, "No free container found");
+               close(fd);
+               return -ENOMEM;
+       }
+
+       container->used = 1;
+       container->fd = fd;
+       container->group_list[container->index] = vfio_group;
+       vfio_group->container = container;
+       container->index++;
+       return 0;
+}
+
+int vfio_dmamap_mem_region(uint64_t vaddr,
+                          uint64_t iova,
+                          uint64_t size)
+{
+       struct fslmc_vfio_group *group;
+       struct vfio_iommu_type1_dma_map dma_map = {
+               .argsz = sizeof(dma_map),
+               .flags = VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE,
+       };
+
+       dma_map.vaddr = vaddr;
+       dma_map.size = size;
+       dma_map.iova = iova;
+
+       /* SET DMA MAP for IOMMU */
+       group = &vfio_groups[0];
+       if (ioctl(group->container->fd, VFIO_IOMMU_MAP_DMA, &dma_map)) {
+               FSLMC_VFIO_LOG(ERR, "VFIO_IOMMU_MAP_DMA (errno = %d)", errno);
+               return -1;
+       }
+       return 0;
+}
+
+static int64_t vfio_map_mcp_obj(struct fslmc_vfio_group *group, char *mcp_obj)
+{
+       int64_t v_addr = (int64_t)MAP_FAILED;
+       int32_t ret, mc_fd;
+
+       struct vfio_device_info d_info = { .argsz = sizeof(d_info) };
+       struct vfio_region_info reg_info = { .argsz = sizeof(reg_info) };
+
+       /* getting the mcp object's fd*/
+       mc_fd = ioctl(group->fd, VFIO_GROUP_GET_DEVICE_FD, mcp_obj);
+       if (mc_fd < 0) {
+               FSLMC_VFIO_LOG(ERR, "error in VFIO get device %s fd from group"
+                           " %d", mcp_obj, group->fd);
+               return v_addr;
+       }
+
+       /* getting device info*/
+       ret = ioctl(mc_fd, VFIO_DEVICE_GET_INFO, &d_info);
+       if (ret < 0) {
+               FSLMC_VFIO_LOG(ERR, "error in VFIO getting DEVICE_INFO");
+               goto MC_FAILURE;
+       }
+
+       /* getting device region info*/
+       ret = ioctl(mc_fd, VFIO_DEVICE_GET_REGION_INFO, &reg_info);
+       if (ret < 0) {
+               FSLMC_VFIO_LOG(ERR, "error in VFIO getting REGION_INFO");
+               goto MC_FAILURE;
+       }
+
+       FSLMC_VFIO_LOG(DEBUG, "region offset = %llx  , region size = %llx",
+                    reg_info.offset, reg_info.size);
+
+       v_addr = (uint64_t)mmap(NULL, reg_info.size,
+               PROT_WRITE | PROT_READ, MAP_SHARED,
+               mc_fd, reg_info.offset);
+
+MC_FAILURE:
+       close(mc_fd);
+
+       return v_addr;
+}
+
+/* Following function shall fetch total available list of MC devices
+ * from VFIO container & populate private list of devices and other
+ * data structures
+ */
+int fslmc_vfio_process_group(void)
+{
+       struct fslmc_vfio_device *vdev;
+       struct vfio_device_info device_info = { .argsz = sizeof(device_info) };
+       char *temp_obj, *object_type __rte_unused, *mcp_obj, *dev_name;
+       int32_t object_id, i, dev_fd;
+       DIR *d;
+       struct dirent *dir;
+       char path[PATH_MAX];
+       int64_t v_addr;
+       int ndev_count;
+       struct fslmc_vfio_group *group = &vfio_groups[0];
+       static int process_once;
+
+       /* if already done once */
+       if (process_once) {
+               FSLMC_VFIO_LOG(DEBUG, "Already scanned once - re-scan "
+                           "not supported");
+               return 0;
+       }
+       process_once = 0;
+
+       sprintf(path, "/sys/kernel/iommu_groups/%d/devices", group->groupid);
+
+       d = opendir(path);
+       if (!d) {
+               FSLMC_VFIO_LOG(ERR, "Unable to open directory %s", path);
+               return -1;
+       }
+
+       /*Counting the number of devices in a group and getting the mcp ID*/
+       ndev_count = 0;
+       mcp_obj = NULL;
+       while ((dir = readdir(d)) != NULL) {
+               if (dir->d_type == DT_LNK) {
+                       ndev_count++;
+                       if (!strncmp("dpmcp", dir->d_name, 5)) {
+                               if (mcp_obj)
+                                       free(mcp_obj);
+                               mcp_obj = malloc(sizeof(dir->d_name));
+                               if (!mcp_obj) {
+                                       FSLMC_VFIO_LOG(ERR, "mcp obj:Unable to"
+                                                   " allocate memory");
+                                       closedir(d);
+                                       return -ENOMEM;
+                               }
+                               strcpy(mcp_obj, dir->d_name);
+                               temp_obj = strtok(dir->d_name, ".");
+                               temp_obj = strtok(NULL, ".");
+                               sscanf(temp_obj, "%d", &mcp_id);
+                       }
+               }
+       }
+       closedir(d);
+       d = NULL;
+       if (!mcp_obj) {
+               FSLMC_VFIO_LOG(ERR, "DPAA2 MCP Object not Found");
+               return -ENODEV;
+       }
+       RTE_LOG(INFO, EAL, "fslmc: DPRC contains = %d devices\n", ndev_count);
+
+       /* Allocate the memory depends upon number of objects in a group*/
+       group->vfio_device = (struct fslmc_vfio_device *)malloc(ndev_count *
+                            sizeof(struct fslmc_vfio_device));
+       if (!(group->vfio_device)) {
+               FSLMC_VFIO_LOG(ERR, "vfio device: Unable to allocate memory\n");
+               free(mcp_obj);
+               return -ENOMEM;
+       }
+
+       /* Allocate memory for MC Portal list */
+       rte_mcp_ptr_list = malloc(sizeof(void *) * 1);
+       if (!rte_mcp_ptr_list) {
+               FSLMC_VFIO_LOG(ERR, "portal list: Unable to allocate memory!");
+               free(mcp_obj);
+               goto FAILURE;
+       }
+
+       v_addr = vfio_map_mcp_obj(group, mcp_obj);
+       free(mcp_obj);
+       if (v_addr == (int64_t)MAP_FAILED) {
+               FSLMC_VFIO_LOG(ERR, "Error mapping region (errno = %d)", errno);
+               goto FAILURE;
+       }
+
+       FSLMC_VFIO_LOG(DEBUG, "DPAA2 MC has VIR_ADD = %ld", v_addr);
+
+       rte_mcp_ptr_list[0] = (void *)v_addr;
+
+       d = opendir(path);
+       if (!d) {
+               FSLMC_VFIO_LOG(ERR, "Unable to open %s Directory", path);
+               goto FAILURE;
+       }
+
+       i = 0;
+       FSLMC_VFIO_LOG(DEBUG, "DPAA2 - Parsing devices:");
+       /* Parsing each object and initiating them*/
+       while ((dir = readdir(d)) != NULL) {
+               if (dir->d_type != DT_LNK)
+                       continue;
+               if (!strncmp("dprc", dir->d_name, 4) ||
+                   !strncmp("dpmcp", dir->d_name, 5))
+                       continue;
+               dev_name = malloc(sizeof(dir->d_name));
+               if (!dev_name) {
+                       FSLMC_VFIO_LOG(ERR, "name: Unable to allocate memory");
+                       goto FAILURE;
+               }
+               strcpy(dev_name, dir->d_name);
+               object_type = strtok(dir->d_name, ".");
+               temp_obj = strtok(NULL, ".");
+               sscanf(temp_obj, "%d", &object_id);
+               FSLMC_VFIO_LOG(DEBUG, " - %s ", dev_name);
+
+               /* getting the device fd*/
+               dev_fd = ioctl(group->fd, VFIO_GROUP_GET_DEVICE_FD, dev_name);
+               if (dev_fd < 0) {
+                       FSLMC_VFIO_LOG(ERR, "VFIO_GROUP_GET_DEVICE_FD error"
+                                   " Device fd: %s, Group: %d",
+                                   dev_name, group->fd);
+                       free(dev_name);
+                       goto FAILURE;
+               }
+
+               free(dev_name);
+               vdev = &group->vfio_device[group->object_index++];
+               vdev->fd = dev_fd;
+               vdev->index = i;
+               i++;
+               /* Get Device inofrmation */
+               if (ioctl(vdev->fd, VFIO_DEVICE_GET_INFO, &device_info)) {
+                       FSLMC_VFIO_LOG(ERR, "DPAA2 VFIO_DEVICE_GET_INFO fail");
+                       goto FAILURE;
+               }
+       }
+       closedir(d);
+
+       return 0;
+
+FAILURE:
+       if (d)
+               closedir(d);
+       if (rte_mcp_ptr_list) {
+               free(rte_mcp_ptr_list);
+               rte_mcp_ptr_list = NULL;
+       }
+
+       free(group->vfio_device);
+       group->vfio_device = NULL;
+       return -1;
+}
+
+int fslmc_vfio_setup_group(void)
+{
+       struct fslmc_vfio_group *group = NULL;
+       int groupid;
+       int ret, i;
+       char *container;
+       struct vfio_group_status status = { .argsz = sizeof(status) };
+
+       /* if already done once */
+       if (container_device_fd)
+               return 0;
+
+       container = getenv("DPRC");
+
+       if (container == NULL) {
+               FSLMC_VFIO_LOG(ERR, "VFIO container not set in env DPRC");
+               return -EOPNOTSUPP;
+       }
+
+       /* get group number */
+       ret = vfio_get_group_no(SYSFS_FSL_MC_DEVICES, container, &groupid);
+       if (ret == 0) {
+               RTE_LOG(WARNING, EAL, "%s not managed by VFIO, skipping\n",
+                       container);
+               return -EOPNOTSUPP;
+       }
+
+       /* if negative, something failed */
+       if (ret < 0)
+               return ret;
+
+       FSLMC_VFIO_LOG(DEBUG, "VFIO iommu group id = %d", groupid);
+
+       /* Check if group already exists */
+       for (i = 0; i < VFIO_MAX_GRP; i++) {
+               group = &vfio_groups[i];
+               if (group->groupid == groupid) {
+                       FSLMC_VFIO_LOG(ERR, "groupid already exists %d",
+                                      groupid);
+                       return 0;
+               }
+       }
+
+       /* get the actual group fd */
+       ret = vfio_get_group_fd(groupid);
+       if (ret < 0)
+               return ret;
+       group->fd = ret;
+
+       /*
+        * at this point, we know that this group is viable (meaning,
+        * all devices are either bound to VFIO or not bound to anything)
+        */
+
+       ret = ioctl(group->fd, VFIO_GROUP_GET_STATUS, &status);
+       if (ret) {
+               FSLMC_VFIO_LOG(ERR, " VFIO error getting group status");
+               close(group->fd);
+               return ret;
+       }
+
+       if (!(status.flags & VFIO_GROUP_FLAGS_VIABLE)) {
+               FSLMC_VFIO_LOG(ERR, "VFIO group not viable");
+               close(group->fd);
+               return -EPERM;
+       }
+       /* Since Group is VIABLE, Store the groupid */
+       group->groupid = groupid;
+
+       /* check if group does not have a container yet */
+       if (!(status.flags & VFIO_GROUP_FLAGS_CONTAINER_SET)) {
+               /* Now connect this IOMMU group to given container */
+               ret = vfio_connect_container(group);
+               if (ret) {
+                       FSLMC_VFIO_LOG(ERR, "VFIO error connecting container"
+                                      " with groupid %d", groupid);
+                       close(group->fd);
+                       return ret;
+               }
+       }
+
+       /* Get Device information */
+       ret = ioctl(group->fd, VFIO_GROUP_GET_DEVICE_FD, container);
+       if (ret < 0) {
+               FSLMC_VFIO_LOG(ERR, "VFIO error getting device %s fd from"
+                              " group  %d", container, group->groupid);
+               return ret;
+       }
+       container_device_fd = ret;
+       FSLMC_VFIO_LOG(DEBUG, "VFIO Container FD is [0x%X]",
+                    container_device_fd);
+
+       return 0;
+}
diff --git a/drivers/bus/fslmc/fslmc_vfio.h b/drivers/bus/fslmc/fslmc_vfio.h
new file mode 100644 (file)
index 0000000..5e58211
--- /dev/null
@@ -0,0 +1,74 @@
+/*-
+ *   BSD LICENSE
+ *
+ *   Copyright (c) 2015-2016 Freescale Semiconductor, Inc. All rights reserved.
+ *   Copyright (c) 2016 NXP. All rights reserved.
+ *
+ *   Redistribution and use in source and binary forms, with or without
+ *   modification, are permitted provided that the following conditions
+ *   are met:
+ *
+ *     * Redistributions of source code must retain the above copyright
+ *       notice, this list of conditions and the following disclaimer.
+ *     * Redistributions in binary form must reproduce the above copyright
+ *       notice, this list of conditions and the following disclaimer in
+ *       the documentation and/or other materials provided with the
+ *       distribution.
+ *     * Neither the name of Freescale Semiconductor, Inc nor the names of its
+ *       contributors may be used to endorse or promote products derived
+ *       from this software without specific prior written permission.
+ *
+ *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#ifndef _FSLMC_VFIO_H_
+#define _FSLMC_VFIO_H_
+
+#include "eal_vfio.h"
+
+#define DPAA2_VENDOR_ID                0x1957
+#define DPAA2_MC_DPNI_DEVID    7
+#define DPAA2_MC_DPSECI_DEVID  3
+
+#define VFIO_MAX_GRP 1
+
+typedef struct fslmc_vfio_device {
+       int fd; /* fslmc root container device ?? */
+       int index; /*index of child object */
+       struct fslmc_vfio_device *child; /* Child object */
+} fslmc_vfio_device;
+
+typedef struct fslmc_vfio_group {
+       int fd; /* /dev/vfio/"groupid" */
+       int groupid;
+       struct fslmc_vfio_container *container;
+       int object_index;
+       struct fslmc_vfio_device *vfio_device;
+} fslmc_vfio_group;
+
+typedef struct fslmc_vfio_container {
+       int fd; /* /dev/vfio/vfio */
+       int used;
+       int index; /* index in group list */
+       struct fslmc_vfio_group *group_list[VFIO_MAX_GRP];
+} fslmc_vfio_container;
+
+int vfio_dmamap_mem_region(
+       uint64_t vaddr,
+       uint64_t iova,
+       uint64_t size);
+
+int fslmc_vfio_setup_group(void);
+int fslmc_vfio_process_group(void);
+
+#endif /* _FSLMC_VFIO_H_ */
index 67b0dc8..f64572f 100644 (file)
@@ -36,6 +36,7 @@ DPDK_17.05 {
        qbman_swp_send_multiple;
        rte_fslmc_driver_register;
        rte_fslmc_driver_unregister;
+       rte_mcp_ptr_list;
 
        local: *;
 };