xref: /openbmc/qemu/include/hw/xen/interface/memory.h (revision 2e1cacfb)
1 /* SPDX-License-Identifier: MIT */
2 /******************************************************************************
3  * memory.h
4  *
5  * Memory reservation and information.
6  *
7  * Copyright (c) 2005, Keir Fraser <keir@xensource.com>
8  */
9 
10 #ifndef __XEN_PUBLIC_MEMORY_H__
11 #define __XEN_PUBLIC_MEMORY_H__
12 
13 #include "xen.h"
14 #include "physdev.h"
15 
16 /*
17  * Increase or decrease the specified domain's memory reservation. Returns the
18  * number of extents successfully allocated or freed.
19  * arg == addr of struct xen_memory_reservation.
20  */
21 #define XENMEM_increase_reservation 0
22 #define XENMEM_decrease_reservation 1
23 #define XENMEM_populate_physmap     6
24 
25 #if __XEN_INTERFACE_VERSION__ >= 0x00030209
26 /*
27  * Maximum # bits addressable by the user of the allocated region (e.g., I/O
28  * devices often have a 32-bit limitation even in 64-bit systems). If zero
29  * then the user has no addressing restriction. This field is not used by
30  * XENMEM_decrease_reservation.
31  */
32 #define XENMEMF_address_bits(x)     (x)
33 #define XENMEMF_get_address_bits(x) ((x) & 0xffu)
34 /* NUMA node to allocate from. */
35 #define XENMEMF_node(x)     (((x) + 1) << 8)
36 #define XENMEMF_get_node(x) ((((x) >> 8) - 1) & 0xffu)
37 /* Flag to populate physmap with populate-on-demand entries */
38 #define XENMEMF_populate_on_demand (1<<16)
39 /* Flag to request allocation only from the node specified */
40 #define XENMEMF_exact_node_request  (1<<17)
41 #define XENMEMF_exact_node(n) (XENMEMF_node(n) | XENMEMF_exact_node_request)
42 /* Flag to indicate the node specified is virtual node */
43 #define XENMEMF_vnode  (1<<18)
44 #endif
45 
46 struct xen_memory_reservation {
47 
48     /*
49      * XENMEM_increase_reservation:
50      *   OUT: MFN (*not* GMFN) bases of extents that were allocated
51      * XENMEM_decrease_reservation:
52      *   IN:  GMFN bases of extents to free
53      * XENMEM_populate_physmap:
54      *   IN:  GPFN bases of extents to populate with memory
55      *   OUT: GMFN bases of extents that were allocated
56      *   (NB. This command also updates the mach_to_phys translation table)
57      * XENMEM_claim_pages:
58      *   IN: must be zero
59      */
60     XEN_GUEST_HANDLE(xen_pfn_t) extent_start;
61 
62     /* Number of extents, and size/alignment of each (2^extent_order pages). */
63     xen_ulong_t    nr_extents;
64     unsigned int   extent_order;
65 
66 #if __XEN_INTERFACE_VERSION__ >= 0x00030209
67     /* XENMEMF flags. */
68     unsigned int   mem_flags;
69 #else
70     unsigned int   address_bits;
71 #endif
72 
73     /*
74      * Domain whose reservation is being changed.
75      * Unprivileged domains can specify only DOMID_SELF.
76      */
77     domid_t        domid;
78 };
79 typedef struct xen_memory_reservation xen_memory_reservation_t;
80 DEFINE_XEN_GUEST_HANDLE(xen_memory_reservation_t);
81 
82 /*
83  * An atomic exchange of memory pages. If return code is zero then
84  * @out.extent_list provides GMFNs of the newly-allocated memory.
85  * Returns zero on complete success, otherwise a negative error code.
86  * On complete success then always @nr_exchanged == @in.nr_extents.
87  * On partial success @nr_exchanged indicates how much work was done.
88  *
89  * Note that only PV guests can use this operation.
90  */
91 #define XENMEM_exchange             11
92 struct xen_memory_exchange {
93     /*
94      * [IN] Details of memory extents to be exchanged (GMFN bases).
95      * Note that @in.address_bits is ignored and unused.
96      */
97     struct xen_memory_reservation in;
98 
99     /*
100      * [IN/OUT] Details of new memory extents.
101      * We require that:
102      *  1. @in.domid == @out.domid
103      *  2. @in.nr_extents  << @in.extent_order ==
104      *     @out.nr_extents << @out.extent_order
105      *  3. @in.extent_start and @out.extent_start lists must not overlap
106      *  4. @out.extent_start lists GPFN bases to be populated
107      *  5. @out.extent_start is overwritten with allocated GMFN bases
108      */
109     struct xen_memory_reservation out;
110 
111     /*
112      * [OUT] Number of input extents that were successfully exchanged:
113      *  1. The first @nr_exchanged input extents were successfully
114      *     deallocated.
115      *  2. The corresponding first entries in the output extent list correctly
116      *     indicate the GMFNs that were successfully exchanged.
117      *  3. All other input and output extents are untouched.
118      *  4. If not all input exents are exchanged then the return code of this
119      *     command will be non-zero.
120      *  5. THIS FIELD MUST BE INITIALISED TO ZERO BY THE CALLER!
121      */
122     xen_ulong_t nr_exchanged;
123 };
124 typedef struct xen_memory_exchange xen_memory_exchange_t;
125 DEFINE_XEN_GUEST_HANDLE(xen_memory_exchange_t);
126 
127 /*
128  * Returns the maximum machine frame number of mapped RAM in this system.
129  * This command always succeeds (it never returns an error code).
130  * arg == NULL.
131  */
132 #define XENMEM_maximum_ram_page     2
133 
134 struct xen_memory_domain {
135     /* [IN] Domain information is being queried for. */
136     domid_t domid;
137 };
138 
139 /*
140  * Returns the current or maximum memory reservation, in pages, of the
141  * specified domain (may be DOMID_SELF). Returns -ve errcode on failure.
142  * arg == addr of struct xen_memory_domain.
143  */
144 #define XENMEM_current_reservation  3
145 #define XENMEM_maximum_reservation  4
146 
147 /*
148  * Returns the maximum GFN in use by the specified domain (may be DOMID_SELF).
149  * Returns -ve errcode on failure.
150  * arg == addr of struct xen_memory_domain.
151  */
152 #define XENMEM_maximum_gpfn         14
153 
154 /*
155  * Returns a list of MFN bases of 2MB extents comprising the machine_to_phys
156  * mapping table. Architectures which do not have a m2p table do not implement
157  * this command.
158  * arg == addr of xen_machphys_mfn_list_t.
159  */
160 #define XENMEM_machphys_mfn_list    5
161 struct xen_machphys_mfn_list {
162     /*
163      * Size of the 'extent_start' array. Fewer entries will be filled if the
164      * machphys table is smaller than max_extents * 2MB.
165      */
166     unsigned int max_extents;
167 
168     /*
169      * Pointer to buffer to fill with list of extent starts. If there are
170      * any large discontiguities in the machine address space, 2MB gaps in
171      * the machphys table will be represented by an MFN base of zero.
172      */
173     XEN_GUEST_HANDLE(xen_pfn_t) extent_start;
174 
175     /*
176      * Number of extents written to the above array. This will be smaller
177      * than 'max_extents' if the machphys table is smaller than max_e * 2MB.
178      */
179     unsigned int nr_extents;
180 };
181 typedef struct xen_machphys_mfn_list xen_machphys_mfn_list_t;
182 DEFINE_XEN_GUEST_HANDLE(xen_machphys_mfn_list_t);
183 
184 /*
185  * For a compat caller, this is identical to XENMEM_machphys_mfn_list.
186  *
187  * For a non compat caller, this functions similarly to
188  * XENMEM_machphys_mfn_list, but returns the mfns making up the compatibility
189  * m2p table.
190  */
191 #define XENMEM_machphys_compat_mfn_list     25
192 
193 /*
194  * Returns the location in virtual address space of the machine_to_phys
195  * mapping table. Architectures which do not have a m2p table, or which do not
196  * map it by default into guest address space, do not implement this command.
197  * arg == addr of xen_machphys_mapping_t.
198  */
199 #define XENMEM_machphys_mapping     12
200 struct xen_machphys_mapping {
201     xen_ulong_t v_start, v_end; /* Start and end virtual addresses.   */
202     xen_ulong_t max_mfn;        /* Maximum MFN that can be looked up. */
203 };
204 typedef struct xen_machphys_mapping xen_machphys_mapping_t;
205 DEFINE_XEN_GUEST_HANDLE(xen_machphys_mapping_t);
206 
207 /* Source mapping space. */
208 /* ` enum phys_map_space { */
209 #define XENMAPSPACE_shared_info  0 /* shared info page */
210 #define XENMAPSPACE_grant_table  1 /* grant table page */
211 #define XENMAPSPACE_gmfn         2 /* GMFN */
212 #define XENMAPSPACE_gmfn_range   3 /* GMFN range, XENMEM_add_to_physmap only. */
213 #define XENMAPSPACE_gmfn_foreign 4 /* GMFN from another dom,
214                                     * XENMEM_add_to_physmap_batch only. */
215 #define XENMAPSPACE_dev_mmio     5 /* device mmio region
216                                       ARM only; the region is mapped in
217                                       Stage-2 using the Normal Memory
218                                       Inner/Outer Write-Back Cacheable
219                                       memory attribute. */
220 /* ` } */
221 
222 /*
223  * Sets the GPFN at which a particular page appears in the specified guest's
224  * physical address space (translated guests only).
225  * arg == addr of xen_add_to_physmap_t.
226  */
227 #define XENMEM_add_to_physmap      7
228 struct xen_add_to_physmap {
229     /* Which domain to change the mapping for. */
230     domid_t domid;
231 
232     /* Number of pages to go through for gmfn_range */
233     uint16_t    size;
234 
235     unsigned int space; /* => enum phys_map_space */
236 
237 #define XENMAPIDX_grant_table_status 0x80000000
238 
239     /* Index into space being mapped. */
240     xen_ulong_t idx;
241 
242     /* GPFN in domid where the source mapping page should appear. */
243     xen_pfn_t     gpfn;
244 };
245 typedef struct xen_add_to_physmap xen_add_to_physmap_t;
246 DEFINE_XEN_GUEST_HANDLE(xen_add_to_physmap_t);
247 
248 /* A batched version of add_to_physmap. */
249 #define XENMEM_add_to_physmap_batch 23
250 struct xen_add_to_physmap_batch {
251     /* IN */
252     /* Which domain to change the mapping for. */
253     domid_t domid;
254     uint16_t space; /* => enum phys_map_space */
255 
256     /* Number of pages to go through */
257     uint16_t size;
258 
259 #if __XEN_INTERFACE_VERSION__ < 0x00040700
260     domid_t foreign_domid; /* IFF gmfn_foreign. Should be 0 for other spaces. */
261 #else
262     union xen_add_to_physmap_batch_extra {
263         domid_t foreign_domid; /* gmfn_foreign */
264         uint16_t res0;  /* All the other spaces. Should be 0 */
265     } u;
266 #endif
267 
268     /* Indexes into space being mapped. */
269     XEN_GUEST_HANDLE(xen_ulong_t) idxs;
270 
271     /* GPFN in domid where the source mapping page should appear. */
272     XEN_GUEST_HANDLE(xen_pfn_t) gpfns;
273 
274     /* OUT */
275 
276     /* Per index error code. */
277     XEN_GUEST_HANDLE(int) errs;
278 };
279 typedef struct xen_add_to_physmap_batch xen_add_to_physmap_batch_t;
280 DEFINE_XEN_GUEST_HANDLE(xen_add_to_physmap_batch_t);
281 
282 #if __XEN_INTERFACE_VERSION__ < 0x00040400
283 #define XENMEM_add_to_physmap_range XENMEM_add_to_physmap_batch
284 #define xen_add_to_physmap_range xen_add_to_physmap_batch
285 typedef struct xen_add_to_physmap_batch xen_add_to_physmap_range_t;
286 DEFINE_XEN_GUEST_HANDLE(xen_add_to_physmap_range_t);
287 #endif
288 
289 /*
290  * Unmaps the page appearing at a particular GPFN from the specified guest's
291  * physical address space (translated guests only).
292  * arg == addr of xen_remove_from_physmap_t.
293  */
294 #define XENMEM_remove_from_physmap      15
295 struct xen_remove_from_physmap {
296     /* Which domain to change the mapping for. */
297     domid_t domid;
298 
299     /* GPFN of the current mapping of the page. */
300     xen_pfn_t     gpfn;
301 };
302 typedef struct xen_remove_from_physmap xen_remove_from_physmap_t;
303 DEFINE_XEN_GUEST_HANDLE(xen_remove_from_physmap_t);
304 
305 /*** REMOVED ***/
306 /*#define XENMEM_translate_gpfn_list  8*/
307 
308 /*
309  * Returns the pseudo-physical memory map as it was when the domain
310  * was started (specified by XENMEM_set_memory_map).
311  * arg == addr of xen_memory_map_t.
312  */
313 #define XENMEM_memory_map           9
314 struct xen_memory_map {
315     /*
316      * On call the number of entries which can be stored in buffer. On
317      * return the number of entries which have been stored in
318      * buffer.
319      */
320     unsigned int nr_entries;
321 
322     /*
323      * Entries in the buffer are in the same format as returned by the
324      * BIOS INT 0x15 EAX=0xE820 call.
325      */
326     XEN_GUEST_HANDLE(void) buffer;
327 };
328 typedef struct xen_memory_map xen_memory_map_t;
329 DEFINE_XEN_GUEST_HANDLE(xen_memory_map_t);
330 
331 /*
332  * Returns the real physical memory map. Passes the same structure as
333  * XENMEM_memory_map.
334  * Specifying buffer as NULL will return the number of entries required
335  * to store the complete memory map.
336  * arg == addr of xen_memory_map_t.
337  */
338 #define XENMEM_machine_memory_map   10
339 
340 /*
341  * Set the pseudo-physical memory map of a domain, as returned by
342  * XENMEM_memory_map.
343  * arg == addr of xen_foreign_memory_map_t.
344  */
345 #define XENMEM_set_memory_map       13
346 struct xen_foreign_memory_map {
347     domid_t domid;
348     struct xen_memory_map map;
349 };
350 typedef struct xen_foreign_memory_map xen_foreign_memory_map_t;
351 DEFINE_XEN_GUEST_HANDLE(xen_foreign_memory_map_t);
352 
353 #define XENMEM_set_pod_target       16
354 #define XENMEM_get_pod_target       17
355 struct xen_pod_target {
356     /* IN */
357     uint64_t target_pages;
358     /* OUT */
359     uint64_t tot_pages;
360     uint64_t pod_cache_pages;
361     uint64_t pod_entries;
362     /* IN */
363     domid_t domid;
364 };
365 typedef struct xen_pod_target xen_pod_target_t;
366 
367 #if defined(__XEN__) || defined(__XEN_TOOLS__)
368 
369 #ifndef uint64_aligned_t
370 #define uint64_aligned_t uint64_t
371 #endif
372 
373 /*
374  * Get the number of MFNs saved through memory sharing.
375  * The call never fails.
376  */
377 #define XENMEM_get_sharing_freed_pages    18
378 #define XENMEM_get_sharing_shared_pages   19
379 
380 #define XENMEM_paging_op                    20
381 #define XENMEM_paging_op_nominate           0
382 #define XENMEM_paging_op_evict              1
383 #define XENMEM_paging_op_prep               2
384 
385 struct xen_mem_paging_op {
386     uint8_t     op;         /* XENMEM_paging_op_* */
387     domid_t     domain;
388 
389     /* IN: (XENMEM_paging_op_prep) buffer to immediately fill page from */
390     XEN_GUEST_HANDLE_64(const_uint8) buffer;
391     /* IN:  gfn of page being operated on */
392     uint64_aligned_t    gfn;
393 };
394 typedef struct xen_mem_paging_op xen_mem_paging_op_t;
395 DEFINE_XEN_GUEST_HANDLE(xen_mem_paging_op_t);
396 
397 #define XENMEM_access_op                    21
398 #define XENMEM_access_op_set_access         0
399 #define XENMEM_access_op_get_access         1
400 /*
401  * XENMEM_access_op_enable_emulate and XENMEM_access_op_disable_emulate are
402  * currently unused, but since they have been in use please do not reuse them.
403  *
404  * #define XENMEM_access_op_enable_emulate     2
405  * #define XENMEM_access_op_disable_emulate    3
406  */
407 #define XENMEM_access_op_set_access_multi   4
408 
409 typedef enum {
410     XENMEM_access_n,
411     XENMEM_access_r,
412     XENMEM_access_w,
413     XENMEM_access_rw,
414     XENMEM_access_x,
415     XENMEM_access_rx,
416     XENMEM_access_wx,
417     XENMEM_access_rwx,
418     /*
419      * Page starts off as r-x, but automatically
420      * change to r-w on a write
421      */
422     XENMEM_access_rx2rw,
423     /*
424      * Log access: starts off as n, automatically
425      * goes to rwx, generating an event without
426      * pausing the vcpu
427      */
428     XENMEM_access_n2rwx,
429     /* Take the domain default */
430     XENMEM_access_default
431 } xenmem_access_t;
432 
433 struct xen_mem_access_op {
434     /* XENMEM_access_op_* */
435     uint8_t op;
436     /* xenmem_access_t */
437     uint8_t access;
438     domid_t domid;
439     /*
440      * Number of pages for set op (or size of pfn_list for
441      * XENMEM_access_op_set_access_multi)
442      * Ignored on setting default access and other ops
443      */
444     uint32_t nr;
445     /*
446      * First pfn for set op
447      * pfn for get op
448      * ~0ull is used to set and get the default access for pages
449      */
450     uint64_aligned_t pfn;
451     /*
452      * List of pfns to set access for
453      * Used only with XENMEM_access_op_set_access_multi
454      */
455     XEN_GUEST_HANDLE(const_uint64) pfn_list;
456     /*
457      * Corresponding list of access settings for pfn_list
458      * Used only with XENMEM_access_op_set_access_multi
459      */
460     XEN_GUEST_HANDLE(const_uint8) access_list;
461 };
462 typedef struct xen_mem_access_op xen_mem_access_op_t;
463 DEFINE_XEN_GUEST_HANDLE(xen_mem_access_op_t);
464 
465 #define XENMEM_sharing_op                   22
466 #define XENMEM_sharing_op_nominate_gfn      0
467 #define XENMEM_sharing_op_nominate_gref     1
468 #define XENMEM_sharing_op_share             2
469 #define XENMEM_sharing_op_debug_gfn         3
470 #define XENMEM_sharing_op_debug_mfn         4
471 #define XENMEM_sharing_op_debug_gref        5
472 #define XENMEM_sharing_op_add_physmap       6
473 #define XENMEM_sharing_op_audit             7
474 #define XENMEM_sharing_op_range_share       8
475 #define XENMEM_sharing_op_fork              9
476 #define XENMEM_sharing_op_fork_reset        10
477 
478 #define XENMEM_SHARING_OP_S_HANDLE_INVALID  (-10)
479 #define XENMEM_SHARING_OP_C_HANDLE_INVALID  (-9)
480 
481 /* The following allows sharing of grant refs. This is useful
482  * for sharing utilities sitting as "filters" in IO backends
483  * (e.g. memshr + blktap(2)). The IO backend is only exposed
484  * to grant references, and this allows sharing of the grefs */
485 #define XENMEM_SHARING_OP_FIELD_IS_GREF_FLAG   (xen_mk_ullong(1) << 62)
486 
487 #define XENMEM_SHARING_OP_FIELD_MAKE_GREF(field, val)  \
488     (field) = (XENMEM_SHARING_OP_FIELD_IS_GREF_FLAG | val)
489 #define XENMEM_SHARING_OP_FIELD_IS_GREF(field)         \
490     ((field) & XENMEM_SHARING_OP_FIELD_IS_GREF_FLAG)
491 #define XENMEM_SHARING_OP_FIELD_GET_GREF(field)        \
492     ((field) & (~XENMEM_SHARING_OP_FIELD_IS_GREF_FLAG))
493 
494 struct xen_mem_sharing_op {
495     uint8_t     op;     /* XENMEM_sharing_op_* */
496     domid_t     domain;
497 
498     union {
499         struct mem_sharing_op_nominate {  /* OP_NOMINATE_xxx           */
500             union {
501                 uint64_aligned_t gfn;     /* IN: gfn to nominate       */
502                 uint32_t      grant_ref;  /* IN: grant ref to nominate */
503             } u;
504             uint64_aligned_t  handle;     /* OUT: the handle           */
505         } nominate;
506         struct mem_sharing_op_share {     /* OP_SHARE/ADD_PHYSMAP */
507             uint64_aligned_t source_gfn;    /* IN: the gfn of the source page */
508             uint64_aligned_t source_handle; /* IN: handle to the source page */
509             uint64_aligned_t client_gfn;    /* IN: the client gfn */
510             uint64_aligned_t client_handle; /* IN: handle to the client page */
511             domid_t  client_domain; /* IN: the client domain id */
512         } share;
513         struct mem_sharing_op_range {         /* OP_RANGE_SHARE */
514             uint64_aligned_t first_gfn;      /* IN: the first gfn */
515             uint64_aligned_t last_gfn;       /* IN: the last gfn */
516             uint64_aligned_t opaque;         /* Must be set to 0 */
517             domid_t client_domain;           /* IN: the client domain id */
518             uint16_t _pad[3];                /* Must be set to 0 */
519         } range;
520         struct mem_sharing_op_debug {     /* OP_DEBUG_xxx */
521             union {
522                 uint64_aligned_t gfn;      /* IN: gfn to debug          */
523                 uint64_aligned_t mfn;      /* IN: mfn to debug          */
524                 uint32_t gref;     /* IN: gref to debug         */
525             } u;
526         } debug;
527         struct mem_sharing_op_fork {      /* OP_FORK{,_RESET} */
528             domid_t parent_domain;        /* IN: parent's domain id */
529 /* Only makes sense for short-lived forks */
530 #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
531 /* Only makes sense for short-lived forks */
532 #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
533 #define XENMEM_FORK_RESET_STATE        (1u << 2)
534 #define XENMEM_FORK_RESET_MEMORY       (1u << 3)
535             uint16_t flags;               /* IN: optional settings */
536             uint32_t pad;                 /* Must be set to 0 */
537         } fork;
538     } u;
539 };
540 typedef struct xen_mem_sharing_op xen_mem_sharing_op_t;
541 DEFINE_XEN_GUEST_HANDLE(xen_mem_sharing_op_t);
542 
543 /*
544  * Attempt to stake a claim for a domain on a quantity of pages
545  * of system RAM, but _not_ assign specific pageframes.  Only
546  * arithmetic is performed so the hypercall is very fast and need
547  * not be preemptible, thus sidestepping time-of-check-time-of-use
548  * races for memory allocation.  Returns 0 if the hypervisor page
549  * allocator has atomically and successfully claimed the requested
550  * number of pages, else non-zero.
551  *
552  * Any domain may have only one active claim.  When sufficient memory
553  * has been allocated to resolve the claim, the claim silently expires.
554  * Claiming zero pages effectively resets any outstanding claim and
555  * is always successful.
556  *
557  * Note that a valid claim may be staked even after memory has been
558  * allocated for a domain.  In this case, the claim is not incremental,
559  * i.e. if the domain's total page count is 3, and a claim is staked
560  * for 10, only 7 additional pages are claimed.
561  *
562  * Caller must be privileged or the hypercall fails.
563  */
564 #define XENMEM_claim_pages                  24
565 
566 /*
567  * XENMEM_claim_pages flags - the are no flags at this time.
568  * The zero value is appropriate.
569  */
570 
571 /*
572  * With some legacy devices, certain guest-physical addresses cannot safely
573  * be used for other purposes, e.g. to map guest RAM.  This hypercall
574  * enumerates those regions so the toolstack can avoid using them.
575  */
576 #define XENMEM_reserved_device_memory_map   27
577 struct xen_reserved_device_memory {
578     xen_pfn_t start_pfn;
579     xen_ulong_t nr_pages;
580 };
581 typedef struct xen_reserved_device_memory xen_reserved_device_memory_t;
582 DEFINE_XEN_GUEST_HANDLE(xen_reserved_device_memory_t);
583 
584 struct xen_reserved_device_memory_map {
585 #define XENMEM_RDM_ALL 1 /* Request all regions (ignore dev union). */
586     /* IN */
587     uint32_t flags;
588     /*
589      * IN/OUT
590      *
591      * Gets set to the required number of entries when too low,
592      * signaled by error code -ERANGE.
593      */
594     unsigned int nr_entries;
595     /* OUT */
596     XEN_GUEST_HANDLE(xen_reserved_device_memory_t) buffer;
597     /* IN */
598     union {
599         physdev_pci_device_t pci;
600     } dev;
601 };
602 typedef struct xen_reserved_device_memory_map xen_reserved_device_memory_map_t;
603 DEFINE_XEN_GUEST_HANDLE(xen_reserved_device_memory_map_t);
604 
605 #endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */
606 
607 /*
608  * Get the pages for a particular guest resource, so that they can be
609  * mapped directly by a tools domain.
610  */
611 #define XENMEM_acquire_resource 28
612 struct xen_mem_acquire_resource {
613     /* IN - The domain whose resource is to be mapped */
614     domid_t domid;
615     /* IN - the type of resource */
616     uint16_t type;
617 
618 #define XENMEM_resource_ioreq_server 0
619 #define XENMEM_resource_grant_table 1
620 #define XENMEM_resource_vmtrace_buf 2
621 
622     /*
623      * IN - a type-specific resource identifier, which must be zero
624      *      unless stated otherwise.
625      *
626      * type == XENMEM_resource_ioreq_server -> id == ioreq server id
627      * type == XENMEM_resource_grant_table -> id defined below
628      */
629     uint32_t id;
630 
631 #define XENMEM_resource_grant_table_id_shared 0
632 #define XENMEM_resource_grant_table_id_status 1
633 
634     /*
635      * IN/OUT
636      *
637      * As an IN parameter number of frames of the resource to be mapped.
638      * This value may be updated over the course of the operation.
639      *
640      * When frame_list is NULL and nr_frames is 0, this is interpreted as a
641      * request for the size of the resource, which shall be returned in the
642      * nr_frames field.
643      *
644      * The size of a resource will never be zero, but a nonzero result doesn't
645      * guarantee that a subsequent mapping request will be successful.  There
646      * are further type/id specific constraints which may change between the
647      * two calls.
648      */
649     uint32_t nr_frames;
650     /*
651      * Padding field, must be zero on input.
652      * In a previous version this was an output field with the lowest bit
653      * named XENMEM_rsrc_acq_caller_owned. Future versions of this interface
654      * will not reuse this bit as an output with the field being zero on
655      * input.
656      */
657     uint32_t pad;
658     /*
659      * IN - the index of the initial frame to be mapped. This parameter
660      *      is ignored if nr_frames is 0.  This value may be updated
661      *      over the course of the operation.
662      */
663     uint64_t frame;
664 
665 #define XENMEM_resource_ioreq_server_frame_bufioreq 0
666 #define XENMEM_resource_ioreq_server_frame_ioreq(n) (1 + (n))
667 
668     /*
669      * IN/OUT - If the tools domain is PV then, upon return, frame_list
670      *          will be populated with the MFNs of the resource.
671      *          If the tools domain is HVM then it is expected that, on
672      *          entry, frame_list will be populated with a list of GFNs
673      *          that will be mapped to the MFNs of the resource.
674      *          If -EIO is returned then the frame_list has only been
675      *          partially mapped and it is up to the caller to unmap all
676      *          the GFNs.
677      *          This parameter may be NULL if nr_frames is 0.  This
678      *          value may be updated over the course of the operation.
679      */
680     XEN_GUEST_HANDLE(xen_pfn_t) frame_list;
681 };
682 typedef struct xen_mem_acquire_resource xen_mem_acquire_resource_t;
683 DEFINE_XEN_GUEST_HANDLE(xen_mem_acquire_resource_t);
684 
685 /*
686  * XENMEM_get_vnumainfo used by guest to get
687  * vNUMA topology from hypervisor.
688  */
689 #define XENMEM_get_vnumainfo                26
690 
691 /* vNUMA node memory ranges */
692 struct xen_vmemrange {
693     uint64_t start, end;
694     unsigned int flags;
695     unsigned int nid;
696 };
697 typedef struct xen_vmemrange xen_vmemrange_t;
698 DEFINE_XEN_GUEST_HANDLE(xen_vmemrange_t);
699 
700 /*
701  * vNUMA topology specifies vNUMA node number, distance table,
702  * memory ranges and vcpu mapping provided for guests.
703  * XENMEM_get_vnumainfo hypercall expects to see from guest
704  * nr_vnodes, nr_vmemranges and nr_vcpus to indicate available memory.
705  * After filling guests structures, nr_vnodes, nr_vmemranges and nr_vcpus
706  * copied back to guest. Domain returns expected values of nr_vnodes,
707  * nr_vmemranges and nr_vcpus to guest if the values where incorrect.
708  */
709 struct xen_vnuma_topology_info {
710     /* IN */
711     domid_t domid;
712     uint16_t pad;
713     /* IN/OUT */
714     unsigned int nr_vnodes;
715     unsigned int nr_vcpus;
716     unsigned int nr_vmemranges;
717     /* OUT */
718     union {
719         XEN_GUEST_HANDLE(uint) h;
720         uint64_t pad;
721     } vdistance;
722     union {
723         XEN_GUEST_HANDLE(uint) h;
724         uint64_t pad;
725     } vcpu_to_vnode;
726     union {
727         XEN_GUEST_HANDLE(xen_vmemrange_t) h;
728         uint64_t pad;
729     } vmemrange;
730 };
731 typedef struct xen_vnuma_topology_info xen_vnuma_topology_info_t;
732 DEFINE_XEN_GUEST_HANDLE(xen_vnuma_topology_info_t);
733 
734 /* Next available subop number is 29 */
735 
736 #endif /* __XEN_PUBLIC_MEMORY_H__ */
737 
738 /*
739  * Local variables:
740  * mode: C
741  * c-file-style: "BSD"
742  * c-basic-offset: 4
743  * tab-width: 4
744  * indent-tabs-mode: nil
745  * End:
746  */
747