843e19887f64dde75055cf8842fc4db2171eff45johnlev/******************************************************************************
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Domain management operations. For use by node control stack.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Permission is hereby granted, free of charge, to any person obtaining a copy
843e19887f64dde75055cf8842fc4db2171eff45johnlev * of this software and associated documentation files (the "Software"), to
843e19887f64dde75055cf8842fc4db2171eff45johnlev * deal in the Software without restriction, including without limitation the
843e19887f64dde75055cf8842fc4db2171eff45johnlev * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
843e19887f64dde75055cf8842fc4db2171eff45johnlev * sell copies of the Software, and to permit persons to whom the Software is
843e19887f64dde75055cf8842fc4db2171eff45johnlev * furnished to do so, subject to the following conditions:
843e19887f64dde75055cf8842fc4db2171eff45johnlev * The above copyright notice and this permission notice shall be included in
843e19887f64dde75055cf8842fc4db2171eff45johnlev * all copies or substantial portions of the Software.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
843e19887f64dde75055cf8842fc4db2171eff45johnlev * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
843e19887f64dde75055cf8842fc4db2171eff45johnlev * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
843e19887f64dde75055cf8842fc4db2171eff45johnlev * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
843e19887f64dde75055cf8842fc4db2171eff45johnlev * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
843e19887f64dde75055cf8842fc4db2171eff45johnlev * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
843e19887f64dde75055cf8842fc4db2171eff45johnlev * DEALINGS IN THE SOFTWARE.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Copyright (c) 2002-2003, B Dragovic
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Copyright (c) 2002-2006, K Fraser
843e19887f64dde75055cf8842fc4db2171eff45johnlev#error "domctl operations are intended for use by node control tools only"
843e19887f64dde75055cf8842fc4db2171eff45johnlev * NB. xen_domctl.domain is an IN/OUT parameter for this operation.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * If it is specified as zero, an id is auto-allocated and returned.
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* IN parameters */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Is this an HVM guest (as opposed to a PV guest)? */
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson#define XEN_DOMCTL_CDF_hvm_guest (1U<<_XEN_DOMCTL_CDF_hvm_guest)
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee /* Use hardware-assisted paging if available? */
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson#define XEN_DOMCTL_CDF_hap (1U<<_XEN_DOMCTL_CDF_hap)
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson /* Should domain memory integrity be verifed by tboot during Sx? */
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson#define XEN_DOMCTL_CDF_s3_integrity (1U<<_XEN_DOMCTL_CDF_s3_integrity)
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_createdomain xen_domctl_createdomain_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* OUT variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Domain is scheduled to die. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Domain is an HVM guest (as opposed to a PV guest). */
843e19887f64dde75055cf8842fc4db2171eff45johnlev#define XEN_DOMINF_hvm_guest (1U<<_XEN_DOMINF_hvm_guest)
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* The guest OS has shut down. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev#define XEN_DOMINF_shutdown (1U<<_XEN_DOMINF_shutdown)
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Currently paused by control software. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Currently blocked pending an event. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Domain is currently running. */
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab /* Being debugged. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* XEN_DOMINF_shutdown guest-supplied code. */
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint64_aligned_t shared_info_frame; /* GMFN of shared_info struct */
843e19887f64dde75055cf8842fc4db2171eff45johnlev uint32_t nr_online_vcpus; /* Number of VCPUs currently online. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev uint32_t max_vcpu_id; /* Maximum VCPUID in use by this domain. */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_getdomaininfo xen_domctl_getdomaininfo_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* IN variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Max entries to write to output buffer. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Start index in guest's page list. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* OUT variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_getmemlist xen_domctl_getmemlist_t;
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab#define XEN_DOMCTL_PFINFO_XTAB (0xfU<<28) /* invalid page */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* IN variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* OUT variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Is the page PINNED to a type? */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_getpageframeinfo xen_domctl_getpageframeinfo_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_getpageframeinfo_t);
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* IN variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* IN/OUT variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_getpageframeinfo2 xen_domctl_getpageframeinfo2_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_getpageframeinfo2_t);
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Control shadow pagetables operation
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Disable shadow mode. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Enable shadow mode (mode contains ORed XEN_DOMCTL_SHADOW_ENABLE_* flags). */
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Log-dirty bitmap operations. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Return the bitmap and clean internal copy for next round. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Return the bitmap but do not modify internal copy. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Memory allocation accessors. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Legacy enable operations. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Equiv. to ENABLE with no mode flags. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Equiv. to ENABLE with mode flag ENABLE_LOG_DIRTY. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* Equiv. to ENABLE with mode flags ENABLE_REFCOUNT and ENABLE_TRANSLATE. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Mode flags for XEN_DOMCTL_SHADOW_OP_ENABLE. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Shadow pagetables are refcounted: guest does not use explicit mmu
843e19887f64dde75055cf8842fc4db2171eff45johnlev * operations nor write-protect its pagetables.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Log pages in a bitmap as they are dirtied.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Used for live relocation to determine which pages must be re-sent.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Automatically translate GPFNs into MFNs.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Xen does not steal virtual address space from the guest.
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Requires HVM support.
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_shadow_op_stats xen_domctl_shadow_op_stats_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_shadow_op_stats_t);
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* IN variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* OP_ENABLE */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* OP_GET_ALLOCATION / OP_SET_ALLOCATION */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* OP_PEEK / OP_CLEAN */
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint64_aligned_t pages; /* Size of buffer. Updated with actual size. */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_shadow_op xen_domctl_shadow_op_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* IN variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_max_mem xen_domctl_max_mem_t;
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab XEN_GUEST_HANDLE_64(vcpu_guest_context_t) ctxt; /* IN/OUT */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_vcpucontext xen_domctl_vcpucontext_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* IN variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev /* OUT variables. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev uint8_t online; /* currently online (not hotplugged)? */
843e19887f64dde75055cf8842fc4db2171eff45johnlev uint8_t blocked; /* blocked waiting for an event? */
843e19887f64dde75055cf8842fc4db2171eff45johnlev uint8_t running; /* currently scheduled on its CPU? */
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint64_aligned_t cpu_time; /* total cpu time consumed (ns) */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_getvcpuinfo xen_domctl_getvcpuinfo_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Get/set which physical cpus a vcpu can execute on. */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_vcpuaffinity xen_domctl_vcpuaffinity_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_max_vcpus xen_domctl_max_vcpus_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Scheduler types. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev/* Set or get info? */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_scheduler_op xen_domctl_scheduler_op_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_setdomainhandle xen_domctl_setdomainhandle_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_setdomainhandle_t);
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_setdebugging xen_domctl_setdebugging_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlev uint8_t allow_access; /* flag to specify enable/disable of IRQ access */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_irq_permission xen_domctl_irq_permission_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_irq_permission_t);
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint64_aligned_t first_mfn;/* first page (physical page number) in range */
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint64_aligned_t nr_mfns; /* number of pages in range (>0) */
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint8_t allow_access; /* allow (!0) or deny (0) access to range? */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_iomem_permission xen_domctl_iomem_permission_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_iomem_permission_t);
843e19887f64dde75055cf8842fc4db2171eff45johnlev uint8_t allow_access; /* allow or deny access to range? */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_ioport_permission xen_domctl_ioport_permission_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_ioport_permission_t);
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_hypercall_init xen_domctl_hypercall_init_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_hypercall_init_t);
843e19887f64dde75055cf8842fc4db2171eff45johnlev#define XEN_DOMAINSETUP_hvm_guest (1UL<<_XEN_DOMAINSETUP_hvm_guest)
843e19887f64dde75055cf8842fc4db2171eff45johnlev#define _XEN_DOMAINSETUP_query 1 /* Get parameters (for save) */
843e19887f64dde75055cf8842fc4db2171eff45johnlev#define XEN_DOMAINSETUP_query (1UL<<_XEN_DOMAINSETUP_query)
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee#define XEN_DOMAINSETUP_sioemu_guest (1UL<<_XEN_DOMAINSETUP_sioemu_guest)
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint64_aligned_t maxmem; /* Highest memory address for MDT. */
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint64_aligned_t xsi_va; /* Xen shared_info area virtual address. */
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint32_t hypercall_imm; /* Break imm for Xen hypercalls. */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee int8_t vhpt_size_log2; /* Log2 of VHPT size. */
843e19887f64dde75055cf8842fc4db2171eff45johnlev int32_t time_offset_seconds; /* applied to domain wallclock time */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_settimeoffset xen_domctl_settimeoffset_t;
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rab uint32_t size; /* IN/OUT: size of buffer / bytes filled */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee XEN_GUEST_HANDLE_64(uint8) buffer; /* IN/OUT: data, or call
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * gethvmcontext with NULL
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * buffer to get size req'd */
843e19887f64dde75055cf8842fc4db2171eff45johnlevtypedef struct xen_domctl_real_mode_area xen_domctl_real_mode_area_t;
843e19887f64dde75055cf8842fc4db2171eff45johnlevDEFINE_XEN_GUEST_HANDLE(xen_domctl_real_mode_area_t);
a576ab5b6e08c47732b3dedca9eaa8a8cbb85720rabtypedef struct xen_domctl_sendtrigger xen_domctl_sendtrigger_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee/* Assign PCI device to HVM guest. Sets up IOMMU structures. */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint32_t machine_bdf; /* machine PCI ID of assigned device */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_assign_device xen_domctl_assign_device_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_assign_device_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee/* Retrieve sibling devices infomation of machine_bdf */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee XEN_GUEST_HANDLE_64(uint32) sdev_array; /* OUT */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_get_device_group xen_domctl_get_device_group_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_get_device_group_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee/* Pass-through interrupts: bind real irq -> hvm devfn. */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_bind_pt_irq xen_domctl_bind_pt_irq_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_bind_pt_irq_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee/* Bind machine I/O address range -> HVM address range. */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint64_aligned_t first_gfn; /* first page (hvm guest phys page) in range */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint64_aligned_t first_mfn; /* first page (machine page) in range */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint64_aligned_t nr_mfns; /* number of pages in range (>0) */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint32_t add_mapping; /* add or remove mapping */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint32_t padding; /* padding for 64-bit aligned structure */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_memory_mapping xen_domctl_memory_mapping_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_memory_mapping_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee/* Bind machine I/O port range -> HVM I/O port range. */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint32_t first_gport; /* first guest IO port*/
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint32_t first_mport; /* first machine IO port */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee uint32_t add_mapping; /* add or remove mapping */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_ioport_mapping xen_domctl_ioport_mapping_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_ioport_mapping_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * Pin caching type of RAM space for x86 HVM domU.
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee/* Caching types: these happen to be the same as x86 MTRR/PAT type codes. */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee unsigned int type; /* XEN_DOMCTL_MEM_CACHEATTR_* */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_pin_mem_cacheattr xen_domctl_pin_mem_cacheattr_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_pin_mem_cacheattr_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee /* IN: VCPU that this call applies to. */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * SET: Size of struct (IN)
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * GET: Size of struct (OUT)
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee /* SYSCALL from 32-bit mode and SYSENTER callback information. */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee /* NB. SYSCALL from 64-bit mode is contained in vcpu_guest_context_t */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_ext_vcpucontext xen_domctl_ext_vcpucontext_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_ext_vcpucontext_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * Set optimizaton features for a domain
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee /* Make struct non-empty: do not depend on this field name! */
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_set_opt_feature xen_domctl_set_opt_feature_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_set_opt_feature_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * Set the target domain for a domain
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_set_target xen_domctl_set_target_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_set_target_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_cpuid xen_domctl_cpuid_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybeetypedef struct xen_domctl_subscribe xen_domctl_subscribe_t;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart MaybeeDEFINE_XEN_GUEST_HANDLE(xen_domctl_subscribe_t);
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * Define the maximum machine address size which should be allocated
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * to a guest.
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee * Do not inject spurious page faults into this domain.
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee#define XEN_DOMCTL_suppress_spurious_page_faults 53
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnsontypedef struct xen_domctl_debug_op xen_domctl_debug_op_t;
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson * Request a particular record from the HVM context
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson uint32_t type; /* IN: Type of record required */
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson uint32_t instance; /* IN: Instance of that type */
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson XEN_GUEST_HANDLE_64(uint8) buffer; /* OUT: buffer to write record into */
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark JohnsonDEFINE_XEN_GUEST_HANDLE(xen_domctl_hvmcontext_partial_t);
843e19887f64dde75055cf8842fc4db2171eff45johnlev uint32_t interface_version; /* XEN_DOMCTL_INTERFACE_VERSION */
843e19887f64dde75055cf8842fc4db2171eff45johnlev struct xen_domctl_getpageframeinfo getpageframeinfo;
843e19887f64dde75055cf8842fc4db2171eff45johnlev struct xen_domctl_getpageframeinfo2 getpageframeinfo2;
843e19887f64dde75055cf8842fc4db2171eff45johnlev struct xen_domctl_iomem_permission iomem_permission;
843e19887f64dde75055cf8842fc4db2171eff45johnlev struct xen_domctl_ioport_permission ioport_permission;
ad09f8b827db90c9a0093f0b6382803fa64a5fd1Mark Johnson struct xen_domctl_hvmcontext_partial hvmcontext_partial;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee struct xen_domctl_get_device_group get_device_group;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee struct xen_domctl_assign_device assign_device;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee struct xen_domctl_memory_mapping memory_mapping;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee struct xen_domctl_ioport_mapping ioport_mapping;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee struct xen_domctl_pin_mem_cacheattr pin_mem_cacheattr;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee struct xen_domctl_ext_vcpucontext ext_vcpucontext;
349b53dd4e695e3d833b5380540385145b2d3ae8Stuart Maybee struct xen_domctl_set_opt_feature set_opt_feature;
843e19887f64dde75055cf8842fc4db2171eff45johnlev#endif /* __XEN_PUBLIC_DOMCTL_H__ */
843e19887f64dde75055cf8842fc4db2171eff45johnlev * Local variables:
843e19887f64dde75055cf8842fc4db2171eff45johnlev * c-set-style: "BSD"
843e19887f64dde75055cf8842fc4db2171eff45johnlev * c-basic-offset: 4
843e19887f64dde75055cf8842fc4db2171eff45johnlev * tab-width: 4
843e19887f64dde75055cf8842fc4db2171eff45johnlev * indent-tabs-mode: nil