This hypercall allows Xen to specify a non-default location for the machine to physical mapping. This capability is used when running a 32 bit domain 0 on a 64 bit hypervisor to shrink the hypervisor hole to exactly the size required. [ Impact: add Xen hypercall definitions ] Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com> Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
		
			
				
	
	
		
			102 lines
		
	
	
	
		
			2.9 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			102 lines
		
	
	
	
		
			2.9 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
/******************************************************************************
 | 
						|
 * arch-x86_32.h
 | 
						|
 *
 | 
						|
 * Guest OS interface to x86 32-bit Xen.
 | 
						|
 *
 | 
						|
 * Copyright (c) 2004, K A Fraser
 | 
						|
 */
 | 
						|
 | 
						|
#ifndef _ASM_X86_XEN_INTERFACE_32_H
 | 
						|
#define _ASM_X86_XEN_INTERFACE_32_H
 | 
						|
 | 
						|
 | 
						|
/*
 | 
						|
 * These flat segments are in the Xen-private section of every GDT. Since these
 | 
						|
 * are also present in the initial GDT, many OSes will be able to avoid
 | 
						|
 * installing their own GDT.
 | 
						|
 */
 | 
						|
#define FLAT_RING1_CS 0xe019    /* GDT index 259 */
 | 
						|
#define FLAT_RING1_DS 0xe021    /* GDT index 260 */
 | 
						|
#define FLAT_RING1_SS 0xe021    /* GDT index 260 */
 | 
						|
#define FLAT_RING3_CS 0xe02b    /* GDT index 261 */
 | 
						|
#define FLAT_RING3_DS 0xe033    /* GDT index 262 */
 | 
						|
#define FLAT_RING3_SS 0xe033    /* GDT index 262 */
 | 
						|
 | 
						|
#define FLAT_KERNEL_CS FLAT_RING1_CS
 | 
						|
#define FLAT_KERNEL_DS FLAT_RING1_DS
 | 
						|
#define FLAT_KERNEL_SS FLAT_RING1_SS
 | 
						|
#define FLAT_USER_CS    FLAT_RING3_CS
 | 
						|
#define FLAT_USER_DS    FLAT_RING3_DS
 | 
						|
#define FLAT_USER_SS    FLAT_RING3_SS
 | 
						|
 | 
						|
/* And the trap vector is... */
 | 
						|
#define TRAP_INSTR "int $0x82"
 | 
						|
 | 
						|
#define __MACH2PHYS_VIRT_START 0xF5800000
 | 
						|
#define __MACH2PHYS_VIRT_END   0xF6800000
 | 
						|
 | 
						|
#define __MACH2PHYS_SHIFT      2
 | 
						|
 | 
						|
/*
 | 
						|
 * Virtual addresses beyond this are not modifiable by guest OSes. The
 | 
						|
 * machine->physical mapping table starts at this address, read-only.
 | 
						|
 */
 | 
						|
#define __HYPERVISOR_VIRT_START 0xF5800000
 | 
						|
 | 
						|
#ifndef __ASSEMBLY__
 | 
						|
 | 
						|
struct cpu_user_regs {
 | 
						|
    uint32_t ebx;
 | 
						|
    uint32_t ecx;
 | 
						|
    uint32_t edx;
 | 
						|
    uint32_t esi;
 | 
						|
    uint32_t edi;
 | 
						|
    uint32_t ebp;
 | 
						|
    uint32_t eax;
 | 
						|
    uint16_t error_code;    /* private */
 | 
						|
    uint16_t entry_vector;  /* private */
 | 
						|
    uint32_t eip;
 | 
						|
    uint16_t cs;
 | 
						|
    uint8_t  saved_upcall_mask;
 | 
						|
    uint8_t  _pad0;
 | 
						|
    uint32_t eflags;        /* eflags.IF == !saved_upcall_mask */
 | 
						|
    uint32_t esp;
 | 
						|
    uint16_t ss, _pad1;
 | 
						|
    uint16_t es, _pad2;
 | 
						|
    uint16_t ds, _pad3;
 | 
						|
    uint16_t fs, _pad4;
 | 
						|
    uint16_t gs, _pad5;
 | 
						|
};
 | 
						|
DEFINE_GUEST_HANDLE_STRUCT(cpu_user_regs);
 | 
						|
 | 
						|
typedef uint64_t tsc_timestamp_t; /* RDTSC timestamp */
 | 
						|
 | 
						|
struct arch_vcpu_info {
 | 
						|
    unsigned long cr2;
 | 
						|
    unsigned long pad[5]; /* sizeof(struct vcpu_info) == 64 */
 | 
						|
};
 | 
						|
 | 
						|
struct xen_callback {
 | 
						|
	unsigned long cs;
 | 
						|
	unsigned long eip;
 | 
						|
};
 | 
						|
typedef struct xen_callback xen_callback_t;
 | 
						|
 | 
						|
#define XEN_CALLBACK(__cs, __eip)				\
 | 
						|
	((struct xen_callback){ .cs = (__cs), .eip = (unsigned long)(__eip) })
 | 
						|
#endif /* !__ASSEMBLY__ */
 | 
						|
 | 
						|
 | 
						|
/*
 | 
						|
 * Page-directory addresses above 4GB do not fit into architectural %cr3.
 | 
						|
 * When accessing %cr3, or equivalent field in vcpu_guest_context, guests
 | 
						|
 * must use the following accessor macros to pack/unpack valid MFNs.
 | 
						|
 *
 | 
						|
 * Note that Xen is using the fact that the pagetable base is always
 | 
						|
 * page-aligned, and putting the 12 MSB of the address into the 12 LSB
 | 
						|
 * of cr3.
 | 
						|
 */
 | 
						|
#define xen_pfn_to_cr3(pfn) (((unsigned)(pfn) << 12) | ((unsigned)(pfn) >> 20))
 | 
						|
#define xen_cr3_to_pfn(cr3) (((unsigned)(cr3) >> 12) | ((unsigned)(cr3) << 20))
 | 
						|
 | 
						|
#endif /* _ASM_X86_XEN_INTERFACE_32_H */
 |