/*1* Permission is hereby granted, free of charge, to any person obtaining a copy2* of this software and associated documentation files (the "Software"), to3* deal in the Software without restriction, including without limitation the4* rights to use, copy, modify, merge, publish, distribute, sublicense, and/or5* sell copies of the Software, and to permit persons to whom the Software is6* furnished to do so, subject to the following conditions:7*8* The above copyright notice and this permission notice shall be included in9* all copies or substantial portions of the Software.10*11* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR12* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,13* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE14* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER15* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING16* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER17* DEALINGS IN THE SOFTWARE.18*19* Copyright (c) 2007, Keir Fraser20*/2122#ifndef __XEN_PUBLIC_HVM_PARAMS_H__23#define __XEN_PUBLIC_HVM_PARAMS_H__2425#include "hvm_op.h"2627/* These parameters are deprecated and their meaning is undefined. */28#if defined(__XEN__) || defined(__XEN_TOOLS__)2930#define HVM_PARAM_PAE_ENABLED 431#define HVM_PARAM_DM_DOMAIN 1332#define HVM_PARAM_MEMORY_EVENT_CR0 2033#define HVM_PARAM_MEMORY_EVENT_CR3 2134#define HVM_PARAM_MEMORY_EVENT_CR4 2235#define HVM_PARAM_MEMORY_EVENT_INT3 2336#define HVM_PARAM_NESTEDHVM 2437#define HVM_PARAM_MEMORY_EVENT_SINGLE_STEP 2538#define HVM_PARAM_BUFIOREQ_EVTCHN 2639#define HVM_PARAM_MEMORY_EVENT_MSR 304041#endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */4243/*44* Parameter space for HVMOP_{set,get}_param.45*/4647#define HVM_PARAM_CALLBACK_IRQ 048#define HVM_PARAM_CALLBACK_IRQ_TYPE_MASK xen_mk_ullong(0xFF00000000000000)49/*50* How should CPU0 event-channel notifications be delivered?51*52* If val == 0 then CPU0 event-channel notifications are not delivered.53* If val != 0, val[63:56] encodes the type, as follows:54*/5556#define HVM_PARAM_CALLBACK_TYPE_GSI 057/*58* val[55:0] is a delivery GSI. GSI 0 cannot be used, as it aliases val == 0,59* and disables all notifications.60*/6162#define HVM_PARAM_CALLBACK_TYPE_PCI_INTX 163/*64* val[55:0] is a delivery PCI INTx line:65* Domain = val[47:32], Bus = val[31:16] DevFn = val[15:8], IntX = val[1:0]66*/6768#if defined(__i386__) || defined(__x86_64__)69#define HVM_PARAM_CALLBACK_TYPE_VECTOR 270/*71* val[7:0] is a vector number. Check for XENFEAT_hvm_callback_vector to know72* if this delivery method is available.73*/74#elif defined(__arm__) || defined(__aarch64__)75#define HVM_PARAM_CALLBACK_TYPE_PPI 276/*77* val[55:16] needs to be zero.78* val[15:8] is interrupt flag of the PPI used by event-channel:79* bit 8: the PPI is edge(1) or level(0) triggered80* bit 9: the PPI is active low(1) or high(0)81* val[7:0] is a PPI number used by event-channel.82* This is only used by ARM/ARM64 and masking/eoi the interrupt associated to83* the notification is handled by the interrupt controller.84*/85#define HVM_PARAM_CALLBACK_TYPE_PPI_FLAG_MASK 0xFF0086#define HVM_PARAM_CALLBACK_TYPE_PPI_FLAG_LOW_LEVEL 287#endif8889/*90* These are not used by Xen. They are here for convenience of HVM-guest91* xenbus implementations.92*/93#define HVM_PARAM_STORE_PFN 194#define HVM_PARAM_STORE_EVTCHN 29596#define HVM_PARAM_IOREQ_PFN 59798#define HVM_PARAM_BUFIOREQ_PFN 699100#if defined(__i386__) || defined(__x86_64__)101102/*103* Viridian enlightenments104*105* (See http://download.microsoft.com/download/A/B/4/AB43A34E-BDD0-4FA6-BDEF-79EEF16E880B/Hypervisor%20Top%20Level%20Functional%20Specification%20v4.0.docx)106*107* To expose viridian enlightenments to the guest set this parameter108* to the desired feature mask. The base feature set must be present109* in any valid feature mask.110*/111#define HVM_PARAM_VIRIDIAN 9112113/* Base+Freq viridian feature sets:114*115* - Hypercall MSRs (HV_X64_MSR_GUEST_OS_ID and HV_X64_MSR_HYPERCALL)116* - APIC access MSRs (HV_X64_MSR_EOI, HV_X64_MSR_ICR and HV_X64_MSR_TPR)117* - Virtual Processor index MSR (HV_X64_MSR_VP_INDEX)118* - Timer frequency MSRs (HV_X64_MSR_TSC_FREQUENCY and119* HV_X64_MSR_APIC_FREQUENCY)120*/121#define _HVMPV_base_freq 0122#define HVMPV_base_freq (1 << _HVMPV_base_freq)123124/* Feature set modifications */125126/* Disable timer frequency MSRs (HV_X64_MSR_TSC_FREQUENCY and127* HV_X64_MSR_APIC_FREQUENCY).128* This modification restores the viridian feature set to the129* original 'base' set exposed in releases prior to Xen 4.4.130*/131#define _HVMPV_no_freq 1132#define HVMPV_no_freq (1 << _HVMPV_no_freq)133134/* Enable Partition Time Reference Counter (HV_X64_MSR_TIME_REF_COUNT) */135#define _HVMPV_time_ref_count 2136#define HVMPV_time_ref_count (1 << _HVMPV_time_ref_count)137138/* Enable Reference TSC Page (HV_X64_MSR_REFERENCE_TSC) */139#define _HVMPV_reference_tsc 3140#define HVMPV_reference_tsc (1 << _HVMPV_reference_tsc)141142/* Use Hypercall for remote TLB flush */143#define _HVMPV_hcall_remote_tlb_flush 4144#define HVMPV_hcall_remote_tlb_flush (1 << _HVMPV_hcall_remote_tlb_flush)145146/* Use APIC assist */147#define _HVMPV_apic_assist 5148#define HVMPV_apic_assist (1 << _HVMPV_apic_assist)149150/* Enable crash MSRs */151#define _HVMPV_crash_ctl 6152#define HVMPV_crash_ctl (1 << _HVMPV_crash_ctl)153154/* Enable SYNIC MSRs */155#define _HVMPV_synic 7156#define HVMPV_synic (1 << _HVMPV_synic)157158/* Enable STIMER MSRs */159#define _HVMPV_stimer 8160#define HVMPV_stimer (1 << _HVMPV_stimer)161162/* Use Synthetic Cluster IPI Hypercall */163#define _HVMPV_hcall_ipi 9164#define HVMPV_hcall_ipi (1 << _HVMPV_hcall_ipi)165166/* Enable ExProcessorMasks */167#define _HVMPV_ex_processor_masks 10168#define HVMPV_ex_processor_masks (1 << _HVMPV_ex_processor_masks)169170/* Allow more than 64 VPs */171#define _HVMPV_no_vp_limit 11172#define HVMPV_no_vp_limit (1 << _HVMPV_no_vp_limit)173174/* Enable vCPU hotplug */175#define _HVMPV_cpu_hotplug 12176#define HVMPV_cpu_hotplug (1 << _HVMPV_cpu_hotplug)177178#define HVMPV_feature_mask \179(HVMPV_base_freq | \180HVMPV_no_freq | \181HVMPV_time_ref_count | \182HVMPV_reference_tsc | \183HVMPV_hcall_remote_tlb_flush | \184HVMPV_apic_assist | \185HVMPV_crash_ctl | \186HVMPV_synic | \187HVMPV_stimer | \188HVMPV_hcall_ipi | \189HVMPV_ex_processor_masks | \190HVMPV_no_vp_limit | \191HVMPV_cpu_hotplug)192193#endif194195/*196* Set mode for virtual timers (currently x86 only):197* delay_for_missed_ticks (default):198* Do not advance a vcpu's time beyond the correct delivery time for199* interrupts that have been missed due to preemption. Deliver missed200* interrupts when the vcpu is rescheduled and advance the vcpu's virtual201* time stepwise for each one.202* no_delay_for_missed_ticks:203* As above, missed interrupts are delivered, but guest time always tracks204* wallclock (i.e., real) time while doing so.205* no_missed_ticks_pending:206* No missed interrupts are held pending. Instead, to ensure ticks are207* delivered at some non-zero rate, if we detect missed ticks then the208* internal tick alarm is not disabled if the VCPU is preempted during the209* next tick period.210* one_missed_tick_pending:211* Missed interrupts are collapsed together and delivered as one 'late tick'.212* Guest time always tracks wallclock (i.e., real) time.213*/214#define HVM_PARAM_TIMER_MODE 10215#define HVMPTM_delay_for_missed_ticks 0216#define HVMPTM_no_delay_for_missed_ticks 1217#define HVMPTM_no_missed_ticks_pending 2218#define HVMPTM_one_missed_tick_pending 3219220/* Boolean: Enable virtual HPET (high-precision event timer)? (x86-only) */221#define HVM_PARAM_HPET_ENABLED 11222223/* Identity-map page directory used by Intel EPT when CR0.PG=0. */224#define HVM_PARAM_IDENT_PT 12225226/* ACPI S state: currently support S0 and S3 on x86. */227#define HVM_PARAM_ACPI_S_STATE 14228229/* TSS used on Intel when CR0.PE=0. */230#define HVM_PARAM_VM86_TSS 15231232/* Boolean: Enable aligning all periodic vpts to reduce interrupts */233#define HVM_PARAM_VPT_ALIGN 16234235/* Console debug shared memory ring and event channel */236#define HVM_PARAM_CONSOLE_PFN 17237#define HVM_PARAM_CONSOLE_EVTCHN 18238239/*240* Select location of ACPI PM1a and TMR control blocks. Currently two locations241* are supported, specified by version 0 or 1 in this parameter:242* - 0: default, use the old addresses243* PM1A_EVT == 0x1f40; PM1A_CNT == 0x1f44; PM_TMR == 0x1f48244* - 1: use the new default qemu addresses245* PM1A_EVT == 0xb000; PM1A_CNT == 0xb004; PM_TMR == 0xb008246* You can find these address definitions in <hvm/ioreq.h>247*/248#define HVM_PARAM_ACPI_IOPORTS_LOCATION 19249250/* Params for the mem event rings */251#define HVM_PARAM_PAGING_RING_PFN 27252#define HVM_PARAM_MONITOR_RING_PFN 28253#define HVM_PARAM_SHARING_RING_PFN 29254255/* SHUTDOWN_* action in case of a triple fault */256#define HVM_PARAM_TRIPLE_FAULT_REASON 31257258#define HVM_PARAM_IOREQ_SERVER_PFN 32259#define HVM_PARAM_NR_IOREQ_SERVER_PAGES 33260261/* Location of the VM Generation ID in guest physical address space. */262#define HVM_PARAM_VM_GENERATION_ID_ADDR 34263264/*265* Set mode for altp2m:266* disabled: don't activate altp2m (default)267* mixed: allow access to all altp2m ops for both in-guest and external tools268* external: allow access to external privileged tools only269* limited: guest only has limited access (ie. control VMFUNC and #VE)270*271* Note that 'mixed' mode has not been evaluated for safety from a272* security perspective. Before using this mode in a273* security-critical environment, each subop should be evaluated for274* safety, with unsafe subops blacklisted in XSM.275*/276#define HVM_PARAM_ALTP2M 35277#define XEN_ALTP2M_disabled 0278#define XEN_ALTP2M_mixed 1279#define XEN_ALTP2M_external 2280#define XEN_ALTP2M_limited 3281282/*283* Size of the x87 FPU FIP/FDP registers that the hypervisor needs to284* save/restore. This is a workaround for a hardware limitation that285* does not allow the full FIP/FDP and FCS/FDS to be restored.286*287* Valid values are:288*289* 8: save/restore 64-bit FIP/FDP and clear FCS/FDS (default if CPU290* has FPCSDS feature).291*292* 4: save/restore 32-bit FIP/FDP, FCS/FDS, and clear upper 32-bits of293* FIP/FDP.294*295* 0: allow hypervisor to choose based on the value of FIP/FDP296* (default if CPU does not have FPCSDS).297*298* If FPCSDS (bit 13 in CPUID leaf 0x7, subleaf 0x0) is set, the CPU299* never saves FCS/FDS and this parameter should be left at the300* default of 8.301*/302#define HVM_PARAM_X87_FIP_WIDTH 36303304/*305* TSS (and its size) used on Intel when CR0.PE=0. The address occupies306* the low 32 bits, while the size is in the high 32 ones.307*/308#define HVM_PARAM_VM86_TSS_SIZED 37309310/* Enable MCA capabilities. */311#define HVM_PARAM_MCA_CAP 38312#define XEN_HVM_MCA_CAP_LMCE (xen_mk_ullong(1) << 0)313#define XEN_HVM_MCA_CAP_MASK XEN_HVM_MCA_CAP_LMCE314315#define HVM_NR_PARAMS 39316317#endif /* __XEN_PUBLIC_HVM_PARAMS_H__ */318319320