2019-02-14 16:22:41 +01:00
|
|
|
# -*- Mode: Python -*-
|
2020-07-29 20:50:24 +02:00
|
|
|
# vim: filetype=python
|
2019-02-14 16:22:41 +01:00
|
|
|
#
|
|
|
|
|
|
|
|
##
|
2019-02-14 16:22:42 +01:00
|
|
|
# @rtc-reset-reinjection:
|
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# This command will reset the RTC interrupt reinjection backlog. Can
|
|
|
|
# be used if another mechanism to synchronize guest time is in effect,
|
|
|
|
# for example QEMU guest agent's guest-set-time command.
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
|
|
|
# Since: 2.1
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "rtc-reset-reinjection" }
|
|
|
|
# <- { "return": {} }
|
|
|
|
##
|
|
|
|
{ 'command': 'rtc-reset-reinjection',
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386' }
|
2019-02-14 16:22:42 +01:00
|
|
|
|
|
|
|
##
|
|
|
|
# @SevState:
|
|
|
|
#
|
|
|
|
# An enumeration of SEV state information used during @query-sev.
|
|
|
|
#
|
|
|
|
# @uninit: The guest is uninitialized.
|
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# @launch-update: The guest is currently being launched; plaintext
|
|
|
|
# data and register state is being imported.
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# @launch-secret: The guest is currently being launched; ciphertext
|
|
|
|
# data is being imported.
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
|
|
|
# @running: The guest is fully launched or migrated in.
|
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# @send-update: The guest is currently being migrated out to another
|
|
|
|
# machine.
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# @receive-update: The guest is currently being migrated from another
|
|
|
|
# machine.
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
##
|
|
|
|
{ 'enum': 'SevState',
|
|
|
|
'data': ['uninit', 'launch-update', 'launch-secret', 'running',
|
|
|
|
'send-update', 'receive-update' ],
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386' }
|
2019-02-14 16:22:42 +01:00
|
|
|
|
|
|
|
##
|
|
|
|
# @SevInfo:
|
|
|
|
#
|
|
|
|
# Information about Secure Encrypted Virtualization (SEV) support
|
|
|
|
#
|
|
|
|
# @enabled: true if SEV is active
|
|
|
|
#
|
|
|
|
# @api-major: SEV API major version
|
|
|
|
#
|
|
|
|
# @api-minor: SEV API minor version
|
|
|
|
#
|
|
|
|
# @build-id: SEV FW build id
|
|
|
|
#
|
|
|
|
# @policy: SEV policy value
|
|
|
|
#
|
|
|
|
# @state: SEV guest state
|
|
|
|
#
|
|
|
|
# @handle: SEV firmware handle
|
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
##
|
|
|
|
{ 'struct': 'SevInfo',
|
|
|
|
'data': { 'enabled': 'bool',
|
|
|
|
'api-major': 'uint8',
|
|
|
|
'api-minor' : 'uint8',
|
|
|
|
'build-id' : 'uint8',
|
|
|
|
'policy' : 'uint32',
|
|
|
|
'state' : 'SevState',
|
|
|
|
'handle' : 'uint32'
|
|
|
|
},
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386'
|
2019-02-14 16:22:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
##
|
|
|
|
# @query-sev:
|
|
|
|
#
|
|
|
|
# Returns information about SEV
|
|
|
|
#
|
|
|
|
# Returns: @SevInfo
|
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "query-sev" }
|
|
|
|
# <- { "return": { "enabled": true, "api-major" : 0, "api-minor" : 0,
|
|
|
|
# "build-id" : 0, "policy" : 0, "state" : "running",
|
|
|
|
# "handle" : 1 } }
|
|
|
|
##
|
|
|
|
{ 'command': 'query-sev', 'returns': 'SevInfo',
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386' }
|
2019-02-14 16:22:42 +01:00
|
|
|
|
|
|
|
##
|
|
|
|
# @SevLaunchMeasureInfo:
|
|
|
|
#
|
|
|
|
# SEV Guest Launch measurement information
|
|
|
|
#
|
|
|
|
# @data: the measurement value encoded in base64
|
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
##
|
|
|
|
{ 'struct': 'SevLaunchMeasureInfo', 'data': {'data': 'str'},
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386' }
|
2019-02-14 16:22:42 +01:00
|
|
|
|
|
|
|
##
|
|
|
|
# @query-sev-launch-measure:
|
|
|
|
#
|
|
|
|
# Query the SEV guest launch information.
|
|
|
|
#
|
|
|
|
# Returns: The @SevLaunchMeasureInfo for the guest
|
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "query-sev-launch-measure" }
|
|
|
|
# <- { "return": { "data": "4l8LXeNlSPUDlXPJG5966/8%YZ" } }
|
|
|
|
##
|
|
|
|
{ 'command': 'query-sev-launch-measure', 'returns': 'SevLaunchMeasureInfo',
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386' }
|
2019-02-14 16:22:42 +01:00
|
|
|
|
|
|
|
##
|
|
|
|
# @SevCapability:
|
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# The struct describes capability for a Secure Encrypted
|
|
|
|
# Virtualization feature.
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
2022-05-03 09:37:35 +02:00
|
|
|
# @pdh: Platform Diffie-Hellman key (base64 encoded)
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
2022-05-03 09:37:35 +02:00
|
|
|
# @cert-chain: PDH certificate chain (base64 encoded)
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
2022-04-20 21:01:29 +02:00
|
|
|
# @cpu0-id: Unique ID of CPU0 (base64 encoded) (since 7.1)
|
2022-02-28 10:30:14 +01:00
|
|
|
#
|
2019-02-14 16:22:42 +01:00
|
|
|
# @cbitpos: C-bit location in page table entry
|
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# @reduced-phys-bits: Number of physical Address bit reduction when
|
|
|
|
# SEV is enabled
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
##
|
|
|
|
{ 'struct': 'SevCapability',
|
|
|
|
'data': { 'pdh': 'str',
|
|
|
|
'cert-chain': 'str',
|
2022-02-28 10:30:14 +01:00
|
|
|
'cpu0-id': 'str',
|
2019-02-14 16:22:42 +01:00
|
|
|
'cbitpos': 'int',
|
|
|
|
'reduced-phys-bits': 'int'},
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386' }
|
2019-02-14 16:22:42 +01:00
|
|
|
|
|
|
|
##
|
|
|
|
# @query-sev-capabilities:
|
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# This command is used to get the SEV capabilities, and is supported
|
|
|
|
# on AMD X86 platforms only.
|
2019-02-14 16:22:42 +01:00
|
|
|
#
|
|
|
|
# Returns: SevCapability objects.
|
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "query-sev-capabilities" }
|
|
|
|
# <- { "return": { "pdh": "8CCDD8DDD", "cert-chain": "888CCCDDDEE",
|
2022-02-28 10:30:14 +01:00
|
|
|
# "cpu0-id": "2lvmGwo+...61iEinw==",
|
2022-09-30 17:14:27 +02:00
|
|
|
# "cbitpos": 47, "reduced-phys-bits": 1}}
|
2019-02-14 16:22:41 +01:00
|
|
|
##
|
2019-02-14 16:22:42 +01:00
|
|
|
{ 'command': 'query-sev-capabilities', 'returns': 'SevCapability',
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386' }
|
2019-02-14 16:22:43 +01:00
|
|
|
|
2020-10-27 18:03:03 +01:00
|
|
|
##
|
|
|
|
# @sev-inject-launch-secret:
|
|
|
|
#
|
|
|
|
# This command injects a secret blob into memory of SEV guest.
|
|
|
|
#
|
|
|
|
# @packet-header: the launch secret packet header encoded in base64
|
|
|
|
#
|
|
|
|
# @secret: the launch secret data to be injected encoded in base64
|
|
|
|
#
|
|
|
|
# @gpa: the guest physical address where secret will be injected.
|
|
|
|
#
|
|
|
|
# Since: 6.0
|
|
|
|
##
|
|
|
|
{ 'command': 'sev-inject-launch-secret',
|
2021-02-04 20:39:39 +01:00
|
|
|
'data': { 'packet-header': 'str', 'secret': 'str', '*gpa': 'uint64' },
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_I386' }
|
2020-10-27 18:03:03 +01:00
|
|
|
|
2021-10-07 18:16:55 +02:00
|
|
|
##
|
|
|
|
# @SevAttestationReport:
|
|
|
|
#
|
|
|
|
# The struct describes attestation report for a Secure Encrypted
|
|
|
|
# Virtualization feature.
|
|
|
|
#
|
2022-05-03 09:37:35 +02:00
|
|
|
# @data: guest attestation report (base64 encoded)
|
2021-10-07 18:16:55 +02:00
|
|
|
#
|
|
|
|
# Since: 6.1
|
|
|
|
##
|
|
|
|
{ 'struct': 'SevAttestationReport',
|
|
|
|
'data': { 'data': 'str'},
|
|
|
|
'if': 'TARGET_I386' }
|
|
|
|
|
|
|
|
##
|
|
|
|
# @query-sev-attestation-report:
|
|
|
|
#
|
|
|
|
# This command is used to get the SEV attestation report, and is
|
|
|
|
# supported on AMD X86 platforms only.
|
|
|
|
#
|
|
|
|
# @mnonce: a random 16 bytes value encoded in base64 (it will be
|
2023-04-28 12:54:29 +02:00
|
|
|
# included in report)
|
2021-10-07 18:16:55 +02:00
|
|
|
#
|
|
|
|
# Returns: SevAttestationReport objects.
|
|
|
|
#
|
|
|
|
# Since: 6.1
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute" : "query-sev-attestation-report",
|
|
|
|
# "arguments": { "mnonce": "aaaaaaa" } }
|
|
|
|
# <- { "return" : { "data": "aaaaaaaabbbddddd"} }
|
|
|
|
##
|
|
|
|
{ 'command': 'query-sev-attestation-report',
|
|
|
|
'data': { 'mnonce': 'str' },
|
|
|
|
'returns': 'SevAttestationReport',
|
|
|
|
'if': 'TARGET_I386' }
|
|
|
|
|
2019-02-14 16:22:43 +01:00
|
|
|
##
|
|
|
|
# @dump-skeys:
|
|
|
|
#
|
|
|
|
# Dump guest's storage keys
|
|
|
|
#
|
|
|
|
# @filename: the path to the file to dump to
|
|
|
|
#
|
|
|
|
# This command is only supported on s390 architecture.
|
|
|
|
#
|
|
|
|
# Since: 2.5
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "dump-skeys",
|
|
|
|
# "arguments": { "filename": "/tmp/skeys" } }
|
|
|
|
# <- { "return": {} }
|
|
|
|
##
|
|
|
|
{ 'command': 'dump-skeys',
|
|
|
|
'data': { 'filename': 'str' },
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_S390X' }
|
2019-02-14 16:22:43 +01:00
|
|
|
|
2019-02-14 16:22:45 +01:00
|
|
|
##
|
|
|
|
# @GICCapability:
|
|
|
|
#
|
|
|
|
# The struct describes capability for a specific GIC (Generic
|
2023-04-28 12:54:29 +02:00
|
|
|
# Interrupt Controller) version. These bits are not only decided by
|
|
|
|
# QEMU/KVM software version, but also decided by the hardware that the
|
|
|
|
# program is running upon.
|
2019-02-14 16:22:45 +01:00
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# @version: version of GIC to be described. Currently, only 2 and 3
|
|
|
|
# are supported.
|
2019-02-14 16:22:45 +01:00
|
|
|
#
|
|
|
|
# @emulated: whether current QEMU/hardware supports emulated GIC
|
2023-04-28 12:54:29 +02:00
|
|
|
# device in user space.
|
2019-02-14 16:22:45 +01:00
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# @kernel: whether current QEMU/hardware supports hardware accelerated
|
|
|
|
# GIC device in kernel.
|
2019-02-14 16:22:45 +01:00
|
|
|
#
|
|
|
|
# Since: 2.6
|
|
|
|
##
|
|
|
|
{ 'struct': 'GICCapability',
|
|
|
|
'data': { 'version': 'int',
|
|
|
|
'emulated': 'bool',
|
|
|
|
'kernel': 'bool' },
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_ARM' }
|
2019-02-14 16:22:45 +01:00
|
|
|
|
|
|
|
##
|
|
|
|
# @query-gic-capabilities:
|
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# This command is ARM-only. It will return a list of GICCapability
|
2019-02-14 16:22:45 +01:00
|
|
|
# objects that describe its capability bits.
|
|
|
|
#
|
|
|
|
# Returns: a list of GICCapability objects.
|
|
|
|
#
|
|
|
|
# Since: 2.6
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "query-gic-capabilities" }
|
|
|
|
# <- { "return": [{ "version": 2, "emulated": true, "kernel": false },
|
|
|
|
# { "version": 3, "emulated": false, "kernel": true } ] }
|
|
|
|
##
|
|
|
|
{ 'command': 'query-gic-capabilities', 'returns': ['GICCapability'],
|
2021-08-04 10:31:05 +02:00
|
|
|
'if': 'TARGET_ARM' }
|
2021-04-29 19:07:28 +02:00
|
|
|
|
numa: Support SGX numa in the monitor and Libvirt interfaces
Add the SGXEPCSection list into SGXInfo to show the multiple
SGX EPC sections detailed info, not the total size like before.
This patch can enable numa support for 'info sgx' command and
QMP interfaces. The new interfaces show each EPC section info
in one numa node. Libvirt can use QMP interface to get the
detailed host SGX EPC capabilities to decide how to allocate
host EPC sections to guest.
(qemu) info sgx
SGX support: enabled
SGX1 support: enabled
SGX2 support: enabled
FLC support: enabled
NUMA node #0: size=67108864
NUMA node #1: size=29360128
The QMP interface show:
(QEMU) query-sgx
{"return": {"sgx": true, "sgx2": true, "sgx1": true, "sections": \
[{"node": 0, "size": 67108864}, {"node": 1, "size": 29360128}], "flc": true}}
(QEMU) query-sgx-capabilities
{"return": {"sgx": true, "sgx2": true, "sgx1": true, "sections": \
[{"node": 0, "size": 17070817280}, {"node": 1, "size": 17079205888}], "flc": true}}
Signed-off-by: Yang Zhong <yang.zhong@intel.com>
Message-Id: <20211101162009.62161-4-yang.zhong@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-11-01 17:20:07 +01:00
|
|
|
##
|
|
|
|
# @SGXEPCSection:
|
|
|
|
#
|
|
|
|
# Information about intel SGX EPC section info
|
|
|
|
#
|
|
|
|
# @node: the numa node
|
|
|
|
#
|
2022-01-20 23:31:04 +01:00
|
|
|
# @size: the size of EPC section
|
numa: Support SGX numa in the monitor and Libvirt interfaces
Add the SGXEPCSection list into SGXInfo to show the multiple
SGX EPC sections detailed info, not the total size like before.
This patch can enable numa support for 'info sgx' command and
QMP interfaces. The new interfaces show each EPC section info
in one numa node. Libvirt can use QMP interface to get the
detailed host SGX EPC capabilities to decide how to allocate
host EPC sections to guest.
(qemu) info sgx
SGX support: enabled
SGX1 support: enabled
SGX2 support: enabled
FLC support: enabled
NUMA node #0: size=67108864
NUMA node #1: size=29360128
The QMP interface show:
(QEMU) query-sgx
{"return": {"sgx": true, "sgx2": true, "sgx1": true, "sections": \
[{"node": 0, "size": 67108864}, {"node": 1, "size": 29360128}], "flc": true}}
(QEMU) query-sgx-capabilities
{"return": {"sgx": true, "sgx2": true, "sgx1": true, "sections": \
[{"node": 0, "size": 17070817280}, {"node": 1, "size": 17079205888}], "flc": true}}
Signed-off-by: Yang Zhong <yang.zhong@intel.com>
Message-Id: <20211101162009.62161-4-yang.zhong@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-11-01 17:20:07 +01:00
|
|
|
#
|
2022-01-20 23:31:04 +01:00
|
|
|
# Since: 7.0
|
numa: Support SGX numa in the monitor and Libvirt interfaces
Add the SGXEPCSection list into SGXInfo to show the multiple
SGX EPC sections detailed info, not the total size like before.
This patch can enable numa support for 'info sgx' command and
QMP interfaces. The new interfaces show each EPC section info
in one numa node. Libvirt can use QMP interface to get the
detailed host SGX EPC capabilities to decide how to allocate
host EPC sections to guest.
(qemu) info sgx
SGX support: enabled
SGX1 support: enabled
SGX2 support: enabled
FLC support: enabled
NUMA node #0: size=67108864
NUMA node #1: size=29360128
The QMP interface show:
(QEMU) query-sgx
{"return": {"sgx": true, "sgx2": true, "sgx1": true, "sections": \
[{"node": 0, "size": 67108864}, {"node": 1, "size": 29360128}], "flc": true}}
(QEMU) query-sgx-capabilities
{"return": {"sgx": true, "sgx2": true, "sgx1": true, "sections": \
[{"node": 0, "size": 17070817280}, {"node": 1, "size": 17079205888}], "flc": true}}
Signed-off-by: Yang Zhong <yang.zhong@intel.com>
Message-Id: <20211101162009.62161-4-yang.zhong@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-11-01 17:20:07 +01:00
|
|
|
##
|
|
|
|
{ 'struct': 'SGXEPCSection',
|
|
|
|
'data': { 'node': 'int',
|
|
|
|
'size': 'uint64'}}
|
|
|
|
|
2021-09-10 12:22:56 +02:00
|
|
|
##
|
|
|
|
# @SGXInfo:
|
|
|
|
#
|
|
|
|
# Information about intel Safe Guard eXtension (SGX) support
|
|
|
|
#
|
|
|
|
# @sgx: true if SGX is supported
|
|
|
|
#
|
|
|
|
# @sgx1: true if SGX1 is supported
|
|
|
|
#
|
|
|
|
# @sgx2: true if SGX2 is supported
|
|
|
|
#
|
|
|
|
# @flc: true if FLC is supported
|
|
|
|
#
|
2022-01-20 23:31:04 +01:00
|
|
|
# @sections: The EPC sections info for guest (Since: 7.0)
|
|
|
|
#
|
2021-09-10 12:22:56 +02:00
|
|
|
# Since: 6.2
|
|
|
|
##
|
|
|
|
{ 'struct': 'SGXInfo',
|
|
|
|
'data': { 'sgx': 'bool',
|
|
|
|
'sgx1': 'bool',
|
|
|
|
'sgx2': 'bool',
|
|
|
|
'flc': 'bool',
|
numa: Support SGX numa in the monitor and Libvirt interfaces
Add the SGXEPCSection list into SGXInfo to show the multiple
SGX EPC sections detailed info, not the total size like before.
This patch can enable numa support for 'info sgx' command and
QMP interfaces. The new interfaces show each EPC section info
in one numa node. Libvirt can use QMP interface to get the
detailed host SGX EPC capabilities to decide how to allocate
host EPC sections to guest.
(qemu) info sgx
SGX support: enabled
SGX1 support: enabled
SGX2 support: enabled
FLC support: enabled
NUMA node #0: size=67108864
NUMA node #1: size=29360128
The QMP interface show:
(QEMU) query-sgx
{"return": {"sgx": true, "sgx2": true, "sgx1": true, "sections": \
[{"node": 0, "size": 67108864}, {"node": 1, "size": 29360128}], "flc": true}}
(QEMU) query-sgx-capabilities
{"return": {"sgx": true, "sgx2": true, "sgx1": true, "sections": \
[{"node": 0, "size": 17070817280}, {"node": 1, "size": 17079205888}], "flc": true}}
Signed-off-by: Yang Zhong <yang.zhong@intel.com>
Message-Id: <20211101162009.62161-4-yang.zhong@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-11-01 17:20:07 +01:00
|
|
|
'sections': ['SGXEPCSection']},
|
2021-09-10 12:22:56 +02:00
|
|
|
'if': 'TARGET_I386' }
|
|
|
|
|
|
|
|
##
|
|
|
|
# @query-sgx:
|
|
|
|
#
|
|
|
|
# Returns information about SGX
|
|
|
|
#
|
|
|
|
# Returns: @SGXInfo
|
|
|
|
#
|
|
|
|
# Since: 6.2
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "query-sgx" }
|
|
|
|
# <- { "return": { "sgx": true, "sgx1" : true, "sgx2" : true,
|
2022-12-16 11:02:48 +01:00
|
|
|
# "flc": true,
|
2022-01-20 23:31:04 +01:00
|
|
|
# "sections": [{"node": 0, "size": 67108864},
|
|
|
|
# {"node": 1, "size": 29360128}]} }
|
2021-09-10 12:22:56 +02:00
|
|
|
##
|
|
|
|
{ 'command': 'query-sgx', 'returns': 'SGXInfo', 'if': 'TARGET_I386' }
|
2021-09-10 12:22:57 +02:00
|
|
|
|
|
|
|
##
|
|
|
|
# @query-sgx-capabilities:
|
|
|
|
#
|
|
|
|
# Returns information from host SGX capabilities
|
|
|
|
#
|
|
|
|
# Returns: @SGXInfo
|
|
|
|
#
|
|
|
|
# Since: 6.2
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "query-sgx-capabilities" }
|
|
|
|
# <- { "return": { "sgx": true, "sgx1" : true, "sgx2" : true,
|
2022-12-16 11:02:48 +01:00
|
|
|
# "flc": true,
|
2022-01-20 23:31:04 +01:00
|
|
|
# "section" : [{"node": 0, "size": 67108864},
|
|
|
|
# {"node": 1, "size": 29360128}]} }
|
2021-09-10 12:22:57 +02:00
|
|
|
##
|
|
|
|
{ 'command': 'query-sgx-capabilities', 'returns': 'SGXInfo', 'if': 'TARGET_I386' }
|
2018-08-21 18:16:19 +02:00
|
|
|
|
|
|
|
|
|
|
|
##
|
|
|
|
# @EvtchnPortType:
|
|
|
|
#
|
|
|
|
# An enumeration of Xen event channel port types.
|
|
|
|
#
|
|
|
|
# @closed: The port is unused.
|
|
|
|
#
|
|
|
|
# @unbound: The port is allocated and ready to be bound.
|
|
|
|
#
|
|
|
|
# @interdomain: The port is connected as an interdomain interrupt.
|
|
|
|
#
|
|
|
|
# @pirq: The port is bound to a physical IRQ (PIRQ).
|
|
|
|
#
|
|
|
|
# @virq: The port is bound to a virtual IRQ (VIRQ).
|
|
|
|
#
|
|
|
|
# @ipi: The post is an inter-processor interrupt (IPI).
|
|
|
|
#
|
|
|
|
# Since: 8.0
|
|
|
|
##
|
|
|
|
{ 'enum': 'EvtchnPortType',
|
|
|
|
'data': ['closed', 'unbound', 'interdomain', 'pirq', 'virq', 'ipi'],
|
|
|
|
'if': 'TARGET_I386' }
|
|
|
|
|
|
|
|
##
|
|
|
|
# @EvtchnInfo:
|
|
|
|
#
|
|
|
|
# Information about a Xen event channel port
|
|
|
|
#
|
|
|
|
# @port: the port number
|
|
|
|
#
|
|
|
|
# @vcpu: target vCPU for this port
|
|
|
|
#
|
|
|
|
# @type: the port type
|
|
|
|
#
|
|
|
|
# @remote-domain: remote domain for interdomain ports
|
|
|
|
#
|
|
|
|
# @target: remote port ID, or virq/pirq number
|
|
|
|
#
|
|
|
|
# @pending: port is currently active pending delivery
|
|
|
|
#
|
|
|
|
# @masked: port is masked
|
|
|
|
#
|
|
|
|
# Since: 8.0
|
|
|
|
##
|
|
|
|
{ 'struct': 'EvtchnInfo',
|
|
|
|
'data': {'port': 'uint16',
|
|
|
|
'vcpu': 'uint32',
|
|
|
|
'type': 'EvtchnPortType',
|
|
|
|
'remote-domain': 'str',
|
|
|
|
'target': 'uint16',
|
|
|
|
'pending': 'bool',
|
|
|
|
'masked': 'bool'},
|
|
|
|
'if': 'TARGET_I386' }
|
|
|
|
|
|
|
|
|
|
|
|
##
|
|
|
|
# @xen-event-list:
|
|
|
|
#
|
|
|
|
# Query the Xen event channels opened by the guest.
|
|
|
|
#
|
|
|
|
# Returns: list of open event channel ports.
|
|
|
|
#
|
|
|
|
# Since: 8.0
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "xen-event-list" }
|
|
|
|
# <- { "return": [
|
|
|
|
# {
|
|
|
|
# "pending": false,
|
|
|
|
# "port": 1,
|
|
|
|
# "vcpu": 1,
|
|
|
|
# "remote-domain": "qemu",
|
|
|
|
# "masked": false,
|
|
|
|
# "type": "interdomain",
|
|
|
|
# "target": 1
|
|
|
|
# },
|
|
|
|
# {
|
|
|
|
# "pending": false,
|
|
|
|
# "port": 2,
|
|
|
|
# "vcpu": 0,
|
|
|
|
# "remote-domain": "",
|
|
|
|
# "masked": false,
|
|
|
|
# "type": "virq",
|
|
|
|
# "target": 0
|
|
|
|
# }
|
|
|
|
# ]
|
|
|
|
# }
|
|
|
|
##
|
|
|
|
{ 'command': 'xen-event-list',
|
|
|
|
'returns': ['EvtchnInfo'],
|
|
|
|
'if': 'TARGET_I386' }
|
|
|
|
|
|
|
|
##
|
|
|
|
# @xen-event-inject:
|
|
|
|
#
|
|
|
|
# Inject a Xen event channel port (interrupt) to the guest.
|
|
|
|
#
|
|
|
|
# @port: The port number
|
|
|
|
#
|
2023-04-28 12:54:29 +02:00
|
|
|
# Returns:
|
|
|
|
# - Nothing on success.
|
2018-08-21 18:16:19 +02:00
|
|
|
#
|
|
|
|
# Since: 8.0
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# -> { "execute": "xen-event-inject", "arguments": { "port": 1 } }
|
|
|
|
# <- { "return": { } }
|
|
|
|
##
|
|
|
|
{ 'command': 'xen-event-inject',
|
|
|
|
'data': { 'port': 'uint32' },
|
|
|
|
'if': 'TARGET_I386' }
|