1 /* Architecture specific portion of the lguest hypercalls */
2 #ifndef _ASM_X86_LGUEST_HCALL_H
3 #define _ASM_X86_LGUEST_HCALL_H
5 #define LHCALL_FLUSH_ASYNC 0
6 #define LHCALL_LGUEST_INIT 1
7 #define LHCALL_SHUTDOWN 2
8 #define LHCALL_NEW_PGTABLE 4
9 #define LHCALL_FLUSH_TLB 5
10 #define LHCALL_LOAD_IDT_ENTRY 6
11 #define LHCALL_SET_STACK 7
13 #define LHCALL_SET_CLOCKEVENT 9
14 #define LHCALL_HALT 10
15 #define LHCALL_SET_PMD 13
16 #define LHCALL_SET_PTE 14
17 #define LHCALL_SET_PGD 15
18 #define LHCALL_LOAD_TLS 16
19 #define LHCALL_NOTIFY 17
20 #define LHCALL_LOAD_GDT_ENTRY 18
21 #define LHCALL_SEND_INTERRUPTS 19
23 #define LGUEST_TRAP_ENTRY 0x1F
25 /* Argument number 3 to LHCALL_LGUEST_SHUTDOWN */
26 #define LGUEST_SHUTDOWN_POWEROFF 1
27 #define LGUEST_SHUTDOWN_RESTART 2
30 #include <asm/hw_irq.h>
31 #include <asm/kvm_para.h>
34 * But first, how does our Guest contact the Host to ask for privileged
35 * operations? There are two ways: the direct way is to make a "hypercall",
36 * to make requests of the Host Itself.
38 * We use the KVM hypercall mechanism, though completely different hypercall
39 * numbers. Seventeen hypercalls are available: the hypercall number is put in
40 * the %eax register, and the arguments (when required) are placed in %ebx,
41 * %ecx, %edx and %esi. If a return value makes sense, it's returned in %eax.
43 * Grossly invalid calls result in Sudden Death at the hands of the vengeful
44 * Host, rather than returning failure. This reflects Winston Churchill's
45 * definition of a gentleman: "someone who is only rude intentionally".
48 /* Can't use our min() macro here: needs to be a constant */
49 #define LGUEST_IRQS (NR_IRQS < 32 ? NR_IRQS: 32)
51 #define LHCALL_RING_SIZE 64
53 /* These map directly onto eax/ebx/ecx/edx/esi in struct lguest_regs */
54 unsigned long arg0
, arg1
, arg2
, arg3
, arg4
;
57 #endif /* !__ASSEMBLY__ */
58 #endif /* _ASM_X86_LGUEST_HCALL_H */