Sophie

Sophie

distrib > Mageia > 5 > i586 > media > core-release > by-pkgid > e74a9b85ef914482fe1f7882f09cedae > files > 17

xen-doc-4.5.0-4.mga5.i586.rpm

<html><head><title>include/public/hvm/hvm_op.h - arch-arm - Xen public headers</title></head><body><pre>
/*
 * Permission is hereby granted, free of charge, to any person obtaining a copy
 * of this software and associated documentation files (the "Software"), to
 * deal in the Software without restriction, including without limitation the
 * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
 * sell copies of the Software, and to permit persons to whom the Software is
 * furnished to do so, subject to the following conditions:
 *
 * The above copyright notice and this permission notice shall be included in
 * all copies or substantial portions of the Software.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
 * DEALINGS IN THE SOFTWARE.
 */

#ifndef __XEN_PUBLIC_HVM_HVM_OP_H__
#define __XEN_PUBLIC_HVM_HVM_OP_H__

#include "../xen.h"
#include "../trace.h"
#include "../event_channel.h"

/* Get/set subcommands: extra argument == pointer to xen_hvm_param struct. */
#define HVMOP_set_param           0
#define HVMOP_get_param           1
<a  name="Struct_xen_hvm_param"><strong>struct xen_hvm_param</strong></a> {
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a>  domid;    /* IN */
    uint32_t index;    /* IN */
    uint64_t value;    /* IN/OUT */
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_param">struct xen_hvm_param</a> <a  name="Typedef_xen_hvm_param_t"><strong>xen_hvm_param_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_param">xen_hvm_param_t</a>);

/* Set the logical level of one of a domain's PCI INTx wires. */
#define HVMOP_set_pci_intx_level  2
<a  name="Struct_xen_hvm_set_pci_intx_level"><strong>struct xen_hvm_set_pci_intx_level</strong></a> {
    /* Domain to be updated. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a>  domid;
    /* PCI INTx identification in PCI topology (domain:bus:device:intx). */
    uint8_t  domain, bus, device, intx;
    /* Assertion level (0 = unasserted, 1 = asserted). */
    uint8_t  level;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_pci_intx_level">struct xen_hvm_set_pci_intx_level</a> <a  name="Typedef_xen_hvm_set_pci_intx_level_t"><strong>xen_hvm_set_pci_intx_level_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_pci_intx_level">xen_hvm_set_pci_intx_level_t</a>);

/* Set the logical level of one of a domain's ISA IRQ wires. */
#define HVMOP_set_isa_irq_level   3
<a  name="Struct_xen_hvm_set_isa_irq_level"><strong>struct xen_hvm_set_isa_irq_level</strong></a> {
    /* Domain to be updated. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a>  domid;
    /* ISA device identification, by ISA IRQ (0-15). */
    uint8_t  isa_irq;
    /* Assertion level (0 = unasserted, 1 = asserted). */
    uint8_t  level;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_isa_irq_level">struct xen_hvm_set_isa_irq_level</a> <a  name="Typedef_xen_hvm_set_isa_irq_level_t"><strong>xen_hvm_set_isa_irq_level_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_isa_irq_level">xen_hvm_set_isa_irq_level_t</a>);

#define HVMOP_set_pci_link_route  4
<a  name="Struct_xen_hvm_set_pci_link_route"><strong>struct xen_hvm_set_pci_link_route</strong></a> {
    /* Domain to be updated. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a>  domid;
    /* PCI link identifier (0-3). */
    uint8_t  link;
    /* ISA IRQ (1-15), or 0 (disable link). */
    uint8_t  isa_irq;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_pci_link_route">struct xen_hvm_set_pci_link_route</a> <a  name="Typedef_xen_hvm_set_pci_link_route_t"><strong>xen_hvm_set_pci_link_route_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_pci_link_route">xen_hvm_set_pci_link_route_t</a>);

/* Flushes all VCPU TLBs: @arg must be NULL. */
#define HVMOP_flush_tlbs          5

typedef enum {
    HVMMEM_ram_rw,             /* Normal read/write guest RAM */
    HVMMEM_ram_ro,             /* Read-only; writes are discarded */
    HVMMEM_mmio_dm,            /* Reads and write go to the device model */
} hvmmem_type_t;

/* Following tools-only interfaces may change in future. */
#if defined(__XEN__) || defined(__XEN_TOOLS__)

/* Track dirty VRAM. */
#define HVMOP_track_dirty_vram    6
<a  name="Struct_xen_hvm_track_dirty_vram"><strong>struct xen_hvm_track_dirty_vram</strong></a> {
    /* Domain to be tracked. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a>  domid;
    /* Number of pages to track. */
    uint32_t nr;
    /* First pfn to track. */
    uint64_aligned_t first_pfn;
    /* OUT variable. */
    /* Dirty bitmap buffer. */
    XEN_GUEST_HANDLE_64(uint8) dirty_bitmap;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_track_dirty_vram">struct xen_hvm_track_dirty_vram</a> <a  name="Typedef_xen_hvm_track_dirty_vram_t"><strong>xen_hvm_track_dirty_vram_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_track_dirty_vram">xen_hvm_track_dirty_vram_t</a>);

/* Notify that some pages got modified by the Device Model. */
#define HVMOP_modified_memory    7
<a  name="Struct_xen_hvm_modified_memory"><strong>struct xen_hvm_modified_memory</strong></a> {
    /* Domain to be updated. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a>  domid;
    /* Number of pages. */
    uint32_t nr;
    /* First pfn. */
    uint64_aligned_t first_pfn;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_modified_memory">struct xen_hvm_modified_memory</a> <a  name="Typedef_xen_hvm_modified_memory_t"><strong>xen_hvm_modified_memory_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_modified_memory">xen_hvm_modified_memory_t</a>);

#define HVMOP_set_mem_type    8
/* Notify that a region of memory is to be treated in a specific way. */
<a  name="Struct_xen_hvm_set_mem_type"><strong>struct xen_hvm_set_mem_type</strong></a> {
    /* Domain to be updated. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a> domid;
    /* Memory type */
    uint16_t hvmmem_type;
    /* Number of pages. */
    uint32_t nr;
    /* First pfn. */
    uint64_aligned_t first_pfn;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_mem_type">struct xen_hvm_set_mem_type</a> <a  name="Typedef_xen_hvm_set_mem_type_t"><strong>xen_hvm_set_mem_type_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_mem_type">xen_hvm_set_mem_type_t</a>);

#endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */

/* Hint from PV drivers for pagetable destruction. */
#define HVMOP_pagetable_dying        9
<a  name="Struct_xen_hvm_pagetable_dying"><strong>struct xen_hvm_pagetable_dying</strong></a> {
    /* Domain with a pagetable about to be destroyed. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a>  domid;
    uint16_t pad[3]; /* align next field on 8-byte boundary */
    /* guest physical address of the toplevel pagetable dying */
    uint64_t gpa;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_pagetable_dying">struct xen_hvm_pagetable_dying</a> <a  name="Typedef_xen_hvm_pagetable_dying_t"><strong>xen_hvm_pagetable_dying_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_pagetable_dying">xen_hvm_pagetable_dying_t</a>);

/* Get the current Xen time, in nanoseconds since system boot. */
#define HVMOP_get_time              10
<a  name="Struct_xen_hvm_get_time"><strong>struct xen_hvm_get_time</strong></a> {
    uint64_t now;      /* OUT */
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_get_time">struct xen_hvm_get_time</a> <a  name="Typedef_xen_hvm_get_time_t"><strong>xen_hvm_get_time_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_get_time">xen_hvm_get_time_t</a>);

#define HVMOP_xentrace              11
<a  name="Struct_xen_hvm_xentrace"><strong>struct xen_hvm_xentrace</strong></a> {
    uint16_t event, extra_bytes;
    uint8_t extra[TRACE_EXTRA_MAX * sizeof(uint32_t)];
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_xentrace">struct xen_hvm_xentrace</a> <a  name="Typedef_xen_hvm_xentrace_t"><strong>xen_hvm_xentrace_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_xentrace">xen_hvm_xentrace_t</a>);

/* Following tools-only interfaces may change in future. */
#if defined(__XEN__) || defined(__XEN_TOOLS__)

/* Deprecated by XENMEM_access_op_set_access */
#define HVMOP_set_mem_access        12

/* Deprecated by XENMEM_access_op_get_access */
#define HVMOP_get_mem_access        13

#define HVMOP_inject_trap            14
/* Inject a trap into a VCPU, which will get taken up on the next
 * scheduling of it. Note that the caller should know enough of the
 * state of the CPU before injecting, to know what the effect of
 * injecting the trap will be.
 */
<a  name="Struct_xen_hvm_inject_trap"><strong>struct xen_hvm_inject_trap</strong></a> {
    /* Domain to be queried. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a> domid;
    /* VCPU */
    uint32_t vcpuid;
    /* Vector number */
    uint32_t vector;
    /* Trap type (HVMOP_TRAP_*) */
    uint32_t type;
/* NB. This enumeration precisely matches hvm.h:X86_EVENTTYPE_* */
# define HVMOP_TRAP_ext_int    0 /* external interrupt */
# define HVMOP_TRAP_nmi        2 /* nmi */
# define HVMOP_TRAP_hw_exc     3 /* hardware exception */
# define HVMOP_TRAP_sw_int     4 /* software interrupt (CD nn) */
# define HVMOP_TRAP_pri_sw_exc 5 /* ICEBP (F1) */
# define HVMOP_TRAP_sw_exc     6 /* INT3 (CC), INTO (CE) */
    /* Error code, or ~0u to skip */
    uint32_t error_code;
    /* Intruction length */
    uint32_t insn_len;
    /* CR2 for page faults */
    uint64_aligned_t cr2;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_inject_trap">struct xen_hvm_inject_trap</a> <a  name="Typedef_xen_hvm_inject_trap_t"><strong>xen_hvm_inject_trap_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_inject_trap">xen_hvm_inject_trap_t</a>);

#endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */

#define HVMOP_get_mem_type    15
/* Return hvmmem_type_t for the specified pfn. */
<a  name="Struct_xen_hvm_get_mem_type"><strong>struct xen_hvm_get_mem_type</strong></a> {
    /* Domain to be queried. */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a> domid;
    /* OUT variable. */
    uint16_t mem_type;
    uint16_t pad[2]; /* align next field on 8-byte boundary */
    /* IN variable. */
    uint64_t pfn;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_get_mem_type">struct xen_hvm_get_mem_type</a> <a  name="Typedef_xen_hvm_get_mem_type_t"><strong>xen_hvm_get_mem_type_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_get_mem_type">xen_hvm_get_mem_type_t</a>);

/* Following tools-only interfaces may change in future. */
#if defined(__XEN__) || defined(__XEN_TOOLS__)

/* MSI injection for emulated devices */
#define HVMOP_inject_msi         16
<a  name="Struct_xen_hvm_inject_msi"><strong>struct xen_hvm_inject_msi</strong></a> {
    /* Domain to be injected */
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a>   domid;
    /* Data -- lower 32 bits */
    uint32_t  data;
    /* Address (0xfeexxxxx) */
    uint64_t  addr;
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_inject_msi">struct xen_hvm_inject_msi</a> <a  name="Typedef_xen_hvm_inject_msi_t"><strong>xen_hvm_inject_msi_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_inject_msi">xen_hvm_inject_msi_t</a>);

/*
 * IOREQ Servers
 *
 * The interface between an I/O emulator an Xen is called an IOREQ Server.
 * A domain supports a single 'legacy' IOREQ Server which is instantiated if
 * parameter...
 *
 * HVM_PARAM_IOREQ_PFN is read (to get the gmfn containing the synchronous
 * ioreq structures), or...
 * HVM_PARAM_BUFIOREQ_PFN is read (to get the gmfn containing the buffered
 * ioreq ring), or...
 * HVM_PARAM_BUFIOREQ_EVTCHN is read (to get the event channel that Xen uses
 * to request buffered I/O emulation).
 * 
 * The following hypercalls facilitate the creation of IOREQ Servers for
 * 'secondary' emulators which are invoked to implement port I/O, memory, or
 * PCI config space ranges which they explicitly register.
 */

typedef uint16_t <a  name="Typedef_ioservid_t"><strong>ioservid_t</strong></a>;

/*
 * HVMOP_create_ioreq_server: Instantiate a new IOREQ Server for a secondary
 *                            emulator servicing domain &lt;domid&gt;.
 *
 * The &lt;id&gt; handed back is unique for &lt;domid&gt;. If &lt;handle_bufioreq&gt; is zero
 * the buffered ioreq ring will not be allocated and hence all emulation
 * requestes to this server will be synchronous.
 */
#define HVMOP_create_ioreq_server 17
<a  name="Struct_xen_hvm_create_ioreq_server"><strong>struct xen_hvm_create_ioreq_server</strong></a> {
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a> domid;           /* IN - domain to be serviced */
    uint8_t handle_bufioreq; /* IN - should server handle buffered ioreqs */
    <a href="include,public,hvm,hvm_op.h.html#Typedef_ioservid_t">ioservid_t</a> id;           /* OUT - server id */
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_create_ioreq_server">struct xen_hvm_create_ioreq_server</a> <a  name="Typedef_xen_hvm_create_ioreq_server_t"><strong>xen_hvm_create_ioreq_server_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_create_ioreq_server">xen_hvm_create_ioreq_server_t</a>);

/*
 * HVMOP_get_ioreq_server_info: Get all the information necessary to access
 *                              IOREQ Server &lt;id&gt;. 
 *
 * The emulator needs to map the synchronous ioreq structures and buffered
 * ioreq ring (if it exists) that Xen uses to request emulation. These are
 * hosted in domain &lt;domid&gt;'s gmfns &lt;ioreq_pfn&gt; and &lt;bufioreq_pfn&gt;
 * respectively. In addition, if the IOREQ Server is handling buffered
 * emulation requests, the emulator needs to bind to event channel
 * &lt;bufioreq_port&gt; to listen for them. (The event channels used for
 * synchronous emulation requests are specified in the per-CPU ioreq
 * structures in &lt;ioreq_pfn&gt;).
 * If the IOREQ Server is not handling buffered emulation requests then the
 * values handed back in &lt;bufioreq_pfn&gt; and &lt;bufioreq_port&gt; will both be 0.
 */
#define HVMOP_get_ioreq_server_info 18
<a  name="Struct_xen_hvm_get_ioreq_server_info"><strong>struct xen_hvm_get_ioreq_server_info</strong></a> {
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a> domid;                 /* IN - domain to be serviced */
    <a href="include,public,hvm,hvm_op.h.html#Typedef_ioservid_t">ioservid_t</a> id;                 /* IN - server id */
    <a href="include,public,event_channel.h.html#Typedef_evtchn_port_t">evtchn_port_t</a> bufioreq_port;   /* OUT - buffered ioreq port */
    uint64_aligned_t ioreq_pfn;    /* OUT - sync ioreq pfn */
    uint64_aligned_t bufioreq_pfn; /* OUT - buffered ioreq pfn */
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_get_ioreq_server_info">struct xen_hvm_get_ioreq_server_info</a> <a  name="Typedef_xen_hvm_get_ioreq_server_info_t"><strong>xen_hvm_get_ioreq_server_info_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_get_ioreq_server_info">xen_hvm_get_ioreq_server_info_t</a>);

/*
 * HVM_map_io_range_to_ioreq_server: Register an I/O range of domain &lt;domid&gt;
 *                                   for emulation by the client of IOREQ
 *                                   Server &lt;id&gt;
 * HVM_unmap_io_range_from_ioreq_server: Deregister an I/O range of &lt;domid&gt;
 *                                       for emulation by the client of IOREQ
 *                                       Server &lt;id&gt;
 *
 * There are three types of I/O that can be emulated: port I/O, memory accesses
 * and PCI config space accesses. The &lt;type&gt; field denotes which type of range
 * the &lt;start&gt; and &lt;end&gt; (inclusive) fields are specifying.
 * PCI config space ranges are specified by segment/bus/device/function values
 * which should be encoded using the HVMOP_PCI_SBDF helper macro below.
 *
 * NOTE: unless an emulation request falls entirely within a range mapped
 * by a secondary emulator, it will not be passed to that emulator.
 */
#define HVMOP_map_io_range_to_ioreq_server 19
#define HVMOP_unmap_io_range_from_ioreq_server 20
<a  name="Struct_xen_hvm_io_range"><strong>struct xen_hvm_io_range</strong></a> {
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a> domid;               /* IN - domain to be serviced */
    <a href="include,public,hvm,hvm_op.h.html#Typedef_ioservid_t">ioservid_t</a> id;               /* IN - server id */
    uint32_t type;               /* IN - type of range */
# define HVMOP_IO_RANGE_PORT   0 /* I/O port range */
# define HVMOP_IO_RANGE_MEMORY 1 /* MMIO range */
# define HVMOP_IO_RANGE_PCI    2 /* PCI segment/bus/dev/func range */
    uint64_aligned_t start, end; /* IN - inclusive start and end of range */
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_io_range">struct xen_hvm_io_range</a> <a  name="Typedef_xen_hvm_io_range_t"><strong>xen_hvm_io_range_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_io_range">xen_hvm_io_range_t</a>);

#define HVMOP_PCI_SBDF(s,b,d,f)                 \
	((((s) &amp; 0xffff) &lt;&lt; 16) |                   \
	 (((b) &amp; 0xff) &lt;&lt; 8) |                      \
	 (((d) &amp; 0x1f) &lt;&lt; 3) |                      \
	 ((f) &amp; 0x07))

/*
 * HVMOP_destroy_ioreq_server: Destroy the IOREQ Server &lt;id&gt; servicing domain
 *                             &lt;domid&gt;.
 *
 * Any registered I/O ranges will be automatically deregistered.
 */
#define HVMOP_destroy_ioreq_server 21
<a  name="Struct_xen_hvm_destroy_ioreq_server"><strong>struct xen_hvm_destroy_ioreq_server</strong></a> {
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a> domid; /* IN - domain to be serviced */
    <a href="include,public,hvm,hvm_op.h.html#Typedef_ioservid_t">ioservid_t</a> id; /* IN - server id */
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_destroy_ioreq_server">struct xen_hvm_destroy_ioreq_server</a> <a  name="Typedef_xen_hvm_destroy_ioreq_server_t"><strong>xen_hvm_destroy_ioreq_server_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_destroy_ioreq_server">xen_hvm_destroy_ioreq_server_t</a>);

/*
 * HVMOP_set_ioreq_server_state: Enable or disable the IOREQ Server &lt;id&gt; servicing
 *                               domain &lt;domid&gt;.
 *
 * The IOREQ Server will not be passed any emulation requests until it is in the
 * enabled state.
 * Note that the contents of the ioreq_pfn and bufioreq_fn (see
 * HVMOP_get_ioreq_server_info) are not meaningful until the IOREQ Server is in
 * the enabled state.
 */
#define HVMOP_set_ioreq_server_state 22
<a  name="Struct_xen_hvm_set_ioreq_server_state"><strong>struct xen_hvm_set_ioreq_server_state</strong></a> {
    <a href="include,public,xen.h.html#Typedef_domid_t">domid_t</a> domid;   /* IN - domain to be serviced */
    <a href="include,public,hvm,hvm_op.h.html#Typedef_ioservid_t">ioservid_t</a> id;   /* IN - server id */
    uint8_t enabled; /* IN - enabled? */    
};
typedef <a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_ioreq_server_state">struct xen_hvm_set_ioreq_server_state</a> <a  name="Typedef_xen_hvm_set_ioreq_server_state_t"><strong>xen_hvm_set_ioreq_server_state_t</strong></a>;
DEFINE_XEN_GUEST_HANDLE(<a href="include,public,hvm,hvm_op.h.html#Struct_xen_hvm_set_ioreq_server_state">xen_hvm_set_ioreq_server_state_t</a>);

#endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */

#endif /* __XEN_PUBLIC_HVM_HVM_OP_H__ */

/*
 * Local variables:
 * mode: C
 * c-file-style: "BSD"
 * c-basic-offset: 4
 * tab-width: 4
 * indent-tabs-mode: nil
 * End:
 */
</pre></body></html>