]> git.ipfire.org Git - thirdparty/qemu.git/blame - linux-headers/linux/kvm.h
kvm: add support for boolean statistics
[thirdparty/qemu.git] / linux-headers / linux / kvm.h
CommitLineData
dd873966 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
51b24e34
JK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
8 * Note: you must update KVM_API_VERSION if you change this interface.
9 */
10
278f064e 11#include <linux/const.h>
51b24e34
JK
12#include <linux/types.h>
13
14#include <linux/ioctl.h>
15#include <asm/kvm.h>
16
17#define KVM_API_VERSION 12
18
19/* *** Deprecated interfaces *** */
20
21#define KVM_TRC_SHIFT 16
22
23#define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT)
24#define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1))
25
26#define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01)
27#define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02)
28#define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01)
29
30#define KVM_TRC_HEAD_SIZE 12
31#define KVM_TRC_CYCLE_SIZE 8
32#define KVM_TRC_EXTRA_MAX 7
33
34#define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02)
35#define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03)
36#define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04)
37#define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05)
38#define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06)
39#define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07)
40#define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08)
41#define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09)
42#define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A)
43#define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B)
44#define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C)
45#define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D)
46#define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E)
47#define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F)
48#define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10)
49#define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11)
50#define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12)
51#define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13)
52#define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14)
53#define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15)
54#define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16)
55#define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17)
56#define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18)
57#define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19)
58
59struct kvm_user_trace_setup {
60 __u32 buf_size;
61 __u32 buf_nr;
62};
63
64#define __KVM_DEPRECATED_MAIN_W_0x06 \
65 _IOW(KVMIO, 0x06, struct kvm_user_trace_setup)
66#define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07)
67#define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08)
68
69#define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq)
70
71struct kvm_breakpoint {
72 __u32 enabled;
73 __u32 padding;
74 __u64 address;
75};
76
77struct kvm_debug_guest {
78 __u32 enabled;
79 __u32 pad;
80 struct kvm_breakpoint breakpoints[4];
81 __u32 singlestep;
82};
83
84#define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest)
85
86/* *** End of deprecated interfaces *** */
87
88
89/* for KVM_CREATE_MEMORY_REGION */
90struct kvm_memory_region {
91 __u32 slot;
92 __u32 flags;
93 __u64 guest_phys_addr;
94 __u64 memory_size; /* bytes */
95};
96
97/* for KVM_SET_USER_MEMORY_REGION */
98struct kvm_userspace_memory_region {
99 __u32 slot;
100 __u32 flags;
101 __u64 guest_phys_addr;
102 __u64 memory_size; /* bytes */
103 __u64 userspace_addr; /* start of the userspace allocated memory */
104};
105
716b8e4d
AW
106/*
107 * The bit 0 ~ bit 15 of kvm_memory_region::flags are visible for userspace,
108 * other bits are reserved for kvm internal use which are defined in
109 * include/linux/kvm_host.h.
110 */
111#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
112#define KVM_MEM_READONLY (1UL << 1)
51b24e34
JK
113
114/* for KVM_IRQ_LINE */
115struct kvm_irq_level {
116 /*
117 * ACPI gsi notion of irq.
118 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
119 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
f76b348e 120 * For ARM: See Documentation/virt/kvm/api.rst
51b24e34
JK
121 */
122 union {
123 __u32 irq;
124 __s32 status;
125 };
126 __u32 level;
127};
128
129
130struct kvm_irqchip {
131 __u32 chip_id;
132 __u32 pad;
133 union {
134 char dummy[512]; /* reserving space */
135#ifdef __KVM_HAVE_PIT
136 struct kvm_pic_state pic;
137#endif
138#ifdef __KVM_HAVE_IOAPIC
139 struct kvm_ioapic_state ioapic;
140#endif
141 } chip;
142};
143
144/* for KVM_CREATE_PIT2 */
145struct kvm_pit_config {
146 __u32 flags;
147 __u32 pad[15];
148};
149
150#define KVM_PIT_SPEAKER_DUMMY 1
151
7a52ce8a
CH
152struct kvm_s390_skeys {
153 __u64 start_gfn;
154 __u64 count;
155 __u64 skeydata_addr;
156 __u32 flags;
157 __u32 reserved[9];
158};
fff02bc0 159
3272f0e2
CB
160#define KVM_S390_CMMA_PEEK (1 << 0)
161
162/**
163 * kvm_s390_cmma_log - Used for CMMA migration.
164 *
165 * Used both for input and output.
166 *
167 * @start_gfn: Guest page number to start from.
168 * @count: Size of the result buffer.
169 * @flags: Control operation mode via KVM_S390_CMMA_* flags
170 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
171 * pages are still remaining.
172 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
173 * in the PGSTE.
174 * @values: Pointer to the values buffer.
175 *
176 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
177 */
178struct kvm_s390_cmma_log {
179 __u64 start_gfn;
180 __u32 count;
181 __u32 flags;
182 union {
183 __u64 remaining;
184 __u64 mask;
185 };
186 __u64 values;
187};
188
fff02bc0
PB
189struct kvm_hyperv_exit {
190#define KVM_EXIT_HYPERV_SYNIC 1
b89485a5 191#define KVM_EXIT_HYPERV_HCALL 2
f76b348e 192#define KVM_EXIT_HYPERV_SYNDBG 3
fff02bc0 193 __u32 type;
f76b348e 194 __u32 pad1;
fff02bc0
PB
195 union {
196 struct {
197 __u32 msr;
f76b348e 198 __u32 pad2;
fff02bc0
PB
199 __u64 control;
200 __u64 evt_page;
201 __u64 msg_page;
202 } synic;
b89485a5
PB
203 struct {
204 __u64 input;
205 __u64 result;
206 __u64 params[2];
207 } hcall;
f76b348e
CH
208 struct {
209 __u32 msr;
210 __u32 pad2;
211 __u64 control;
212 __u64 status;
213 __u64 send_page;
214 __u64 recv_page;
215 __u64 pending_page;
216 } syndbg;
fff02bc0
PB
217 } u;
218};
219
278f064e
EH
220struct kvm_xen_exit {
221#define KVM_EXIT_XEN_HCALL 1
222 __u32 type;
223 union {
224 struct {
225 __u32 longmode;
226 __u32 cpl;
227 __u64 input;
228 __u64 result;
229 __u64 params[6];
230 } hcall;
231 } u;
232};
233
7a52ce8a
CH
234#define KVM_S390_GET_SKEYS_NONE 1
235#define KVM_S390_SKEYS_MAX 1048576
236
51b24e34
JK
237#define KVM_EXIT_UNKNOWN 0
238#define KVM_EXIT_EXCEPTION 1
239#define KVM_EXIT_IO 2
240#define KVM_EXIT_HYPERCALL 3
241#define KVM_EXIT_DEBUG 4
242#define KVM_EXIT_HLT 5
243#define KVM_EXIT_MMIO 6
244#define KVM_EXIT_IRQ_WINDOW_OPEN 7
245#define KVM_EXIT_SHUTDOWN 8
246#define KVM_EXIT_FAIL_ENTRY 9
247#define KVM_EXIT_INTR 10
248#define KVM_EXIT_SET_TPR 11
249#define KVM_EXIT_TPR_ACCESS 12
250#define KVM_EXIT_S390_SIEIC 13
251#define KVM_EXIT_S390_RESET 14
a9fd1654 252#define KVM_EXIT_DCR 15 /* deprecated */
51b24e34
JK
253#define KVM_EXIT_NMI 16
254#define KVM_EXIT_INTERNAL_ERROR 17
255#define KVM_EXIT_OSI 18
7c6da3de 256#define KVM_EXIT_PAPR_HCALL 19
1529ae1b 257#define KVM_EXIT_S390_UCONTROL 20
d4834ff9 258#define KVM_EXIT_WATCHDOG 21
d3dccee1
AG
259#define KVM_EXIT_S390_TSCH 22
260#define KVM_EXIT_EPR 23
b061808d 261#define KVM_EXIT_SYSTEM_EVENT 24
7a52ce8a 262#define KVM_EXIT_S390_STSI 25
3a824b15 263#define KVM_EXIT_IOAPIC_EOI 26
fff02bc0 264#define KVM_EXIT_HYPERV 27
2a886794 265#define KVM_EXIT_ARM_NISV 28
53ba2eee
MR
266#define KVM_EXIT_X86_RDMSR 29
267#define KVM_EXIT_X86_WRMSR 30
b3c818a4 268#define KVM_EXIT_DIRTY_RING_FULL 31
278f064e
EH
269#define KVM_EXIT_AP_RESET_HOLD 32
270#define KVM_EXIT_X86_BUS_LOCK 33
271#define KVM_EXIT_XEN 34
43709a0c 272#define KVM_EXIT_RISCV_SBI 35
51b24e34
JK
273
274/* For KVM_EXIT_INTERNAL_ERROR */
d4834ff9
AG
275/* Emulate instruction failed. */
276#define KVM_INTERNAL_ERROR_EMULATION 1
277/* Encounter unexpected simultaneous exceptions. */
278#define KVM_INTERNAL_ERROR_SIMUL_EX 2
279/* Encounter unexpected vm-exit due to delivery event. */
280#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
f363d039
EA
281/* Encounter unexpected vm-exit reason */
282#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
51b24e34 283
327d4b7f
BR
284/* Flags that describe what fields in emulation_failure hold valid data. */
285#define KVM_INTERNAL_ERROR_EMULATION_FLAG_INSTRUCTION_BYTES (1ULL << 0)
286
51b24e34
JK
287/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
288struct kvm_run {
289 /* in */
290 __u8 request_interrupt_window;
3a5eb5b4
PB
291 __u8 immediate_exit;
292 __u8 padding1[6];
51b24e34
JK
293
294 /* out */
295 __u32 exit_reason;
296 __u8 ready_for_interrupt_injection;
297 __u8 if_flag;
24a31426 298 __u16 flags;
51b24e34
JK
299
300 /* in (pre_kvm_run), out (post_kvm_run) */
301 __u64 cr8;
302 __u64 apic_base;
303
304#ifdef __KVM_S390
305 /* the processor status word for s390 */
306 __u64 psw_mask; /* psw upper half */
307 __u64 psw_addr; /* psw lower half */
308#endif
309 union {
310 /* KVM_EXIT_UNKNOWN */
311 struct {
312 __u64 hardware_exit_reason;
313 } hw;
314 /* KVM_EXIT_FAIL_ENTRY */
315 struct {
316 __u64 hardware_entry_failure_reason;
e6546342 317 __u32 cpu;
51b24e34
JK
318 } fail_entry;
319 /* KVM_EXIT_EXCEPTION */
320 struct {
321 __u32 exception;
322 __u32 error_code;
323 } ex;
324 /* KVM_EXIT_IO */
325 struct {
326#define KVM_EXIT_IO_IN 0
327#define KVM_EXIT_IO_OUT 1
328 __u8 direction;
329 __u8 size; /* bytes */
330 __u16 port;
331 __u32 count;
332 __u64 data_offset; /* relative to kvm_run start */
333 } io;
3a824b15 334 /* KVM_EXIT_DEBUG */
51b24e34
JK
335 struct {
336 struct kvm_debug_exit_arch arch;
337 } debug;
338 /* KVM_EXIT_MMIO */
339 struct {
340 __u64 phys_addr;
341 __u8 data[8];
342 __u32 len;
343 __u8 is_write;
344 } mmio;
345 /* KVM_EXIT_HYPERCALL */
346 struct {
347 __u64 nr;
348 __u64 args[6];
349 __u64 ret;
350 __u32 longmode;
351 __u32 pad;
352 } hypercall;
353 /* KVM_EXIT_TPR_ACCESS */
354 struct {
355 __u64 rip;
356 __u32 is_write;
357 __u32 pad;
358 } tpr_access;
359 /* KVM_EXIT_S390_SIEIC */
360 struct {
361 __u8 icptcode;
362 __u16 ipa;
363 __u32 ipb;
364 } s390_sieic;
365 /* KVM_EXIT_S390_RESET */
366#define KVM_S390_RESET_POR 1
367#define KVM_S390_RESET_CLEAR 2
368#define KVM_S390_RESET_SUBSYSTEM 4
369#define KVM_S390_RESET_CPU_INIT 8
370#define KVM_S390_RESET_IPL 16
371 __u64 s390_reset_flags;
1529ae1b
AG
372 /* KVM_EXIT_S390_UCONTROL */
373 struct {
374 __u64 trans_exc_code;
375 __u32 pgm_code;
376 } s390_ucontrol;
a9fd1654 377 /* KVM_EXIT_DCR (deprecated) */
51b24e34
JK
378 struct {
379 __u32 dcrn;
380 __u32 data;
381 __u8 is_write;
382 } dcr;
3a824b15 383 /* KVM_EXIT_INTERNAL_ERROR */
51b24e34
JK
384 struct {
385 __u32 suberror;
386 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
387 __u32 ndata;
388 __u64 data[16];
389 } internal;
327d4b7f
BR
390 /*
391 * KVM_INTERNAL_ERROR_EMULATION
392 *
393 * "struct emulation_failure" is an overlay of "struct internal"
394 * that is used for the KVM_INTERNAL_ERROR_EMULATION sub-type of
395 * KVM_EXIT_INTERNAL_ERROR. Note, unlike other internal error
396 * sub-types, this struct is ABI! It also needs to be backwards
397 * compatible with "struct internal". Take special care that
398 * "ndata" is correct, that new fields are enumerated in "flags",
399 * and that each flag enumerates fields that are 64-bit aligned
400 * and sized (so that ndata+internal.data[] is valid/accurate).
43709a0c
PB
401 *
402 * Space beyond the defined fields may be used to store arbitrary
403 * debug information relating to the emulation failure. It is
404 * accounted for in "ndata" but the format is unspecified and is
405 * not represented in "flags". Any such information is *not* ABI!
327d4b7f
BR
406 */
407 struct {
408 __u32 suberror;
409 __u32 ndata;
410 __u64 flags;
43709a0c
PB
411 union {
412 struct {
413 __u8 insn_size;
414 __u8 insn_bytes[15];
415 };
416 };
417 /* Arbitrary debug data may follow. */
327d4b7f 418 } emulation_failure;
51b24e34
JK
419 /* KVM_EXIT_OSI */
420 struct {
421 __u64 gprs[32];
422 } osi;
3a824b15 423 /* KVM_EXIT_PAPR_HCALL */
7c6da3de
AG
424 struct {
425 __u64 nr;
426 __u64 ret;
427 __u64 args[9];
428 } papr_hcall;
d3dccee1
AG
429 /* KVM_EXIT_S390_TSCH */
430 struct {
431 __u16 subchannel_id;
432 __u16 subchannel_nr;
433 __u32 io_int_parm;
434 __u32 io_int_word;
435 __u32 ipb;
436 __u8 dequeued;
437 } s390_tsch;
438 /* KVM_EXIT_EPR */
439 struct {
440 __u32 epr;
441 } epr;
b061808d
AG
442 /* KVM_EXIT_SYSTEM_EVENT */
443 struct {
444#define KVM_SYSTEM_EVENT_SHUTDOWN 1
445#define KVM_SYSTEM_EVENT_RESET 2
120758fb 446#define KVM_SYSTEM_EVENT_CRASH 3
b061808d 447 __u32 type;
e4082063
AW
448 __u32 ndata;
449 union {
450 __u64 flags;
451 __u64 data[16];
452 };
b061808d 453 } system_event;
7a52ce8a
CH
454 /* KVM_EXIT_S390_STSI */
455 struct {
456 __u64 addr;
457 __u8 ar;
458 __u8 reserved;
459 __u8 fc;
460 __u8 sel1;
461 __u16 sel2;
462 } s390_stsi;
3a824b15
PB
463 /* KVM_EXIT_IOAPIC_EOI */
464 struct {
465 __u8 vector;
466 } eoi;
fff02bc0
PB
467 /* KVM_EXIT_HYPERV */
468 struct kvm_hyperv_exit hyperv;
2a886794
GK
469 /* KVM_EXIT_ARM_NISV */
470 struct {
471 __u64 esr_iss;
472 __u64 fault_ipa;
473 } arm_nisv;
53ba2eee
MR
474 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
475 struct {
476 __u8 error; /* user -> kernel */
477 __u8 pad[7];
478#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
479#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
480#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
481 __u32 reason; /* kernel -> user */
482 __u32 index; /* kernel -> user */
483 __u64 data; /* kernel <-> user */
484 } msr;
278f064e
EH
485 /* KVM_EXIT_XEN */
486 struct kvm_xen_exit xen;
43709a0c
PB
487 /* KVM_EXIT_RISCV_SBI */
488 struct {
489 unsigned long extension_id;
490 unsigned long function_id;
491 unsigned long args[6];
492 unsigned long ret[2];
493 } riscv_sbi;
51b24e34
JK
494 /* Fix the size of the union. */
495 char padding[256];
496 };
1529ae1b 497
65a6d8dd
PM
498 /* 2048 is the size of the char array used to bound/pad the size
499 * of the union that holds sync regs.
500 */
501 #define SYNC_REGS_SIZE_BYTES 2048
1529ae1b
AG
502 /*
503 * shared registers between kvm and userspace.
504 * kvm_valid_regs specifies the register classes set by the host
505 * kvm_dirty_regs specified the register classes dirtied by userspace
506 * struct kvm_sync_regs is architecture specific, as well as the
507 * bits for kvm_valid_regs and kvm_dirty_regs
508 */
509 __u64 kvm_valid_regs;
510 __u64 kvm_dirty_regs;
511 union {
512 struct kvm_sync_regs regs;
65a6d8dd 513 char padding[SYNC_REGS_SIZE_BYTES];
1529ae1b 514 } s;
51b24e34
JK
515};
516
517/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
518
519struct kvm_coalesced_mmio_zone {
520 __u64 addr;
521 __u32 size;
966f2ec3
PB
522 union {
523 __u32 pad;
524 __u32 pio;
525 };
51b24e34
JK
526};
527
528struct kvm_coalesced_mmio {
529 __u64 phys_addr;
530 __u32 len;
966f2ec3
PB
531 union {
532 __u32 pad;
533 __u32 pio;
534 };
51b24e34
JK
535 __u8 data[8];
536};
537
538struct kvm_coalesced_mmio_ring {
539 __u32 first, last;
540 struct kvm_coalesced_mmio coalesced_mmio[0];
541};
542
543#define KVM_COALESCED_MMIO_MAX \
544 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
545 sizeof(struct kvm_coalesced_mmio))
546
547/* for KVM_TRANSLATE */
548struct kvm_translation {
549 /* in */
550 __u64 linear_address;
551
552 /* out */
553 __u64 physical_address;
554 __u8 valid;
555 __u8 writeable;
556 __u8 usermode;
557 __u8 pad[5];
558};
559
7a52ce8a
CH
560/* for KVM_S390_MEM_OP */
561struct kvm_s390_mem_op {
562 /* in */
563 __u64 gaddr; /* the guest address */
564 __u64 flags; /* flags */
565 __u32 size; /* amount of bytes */
566 __u32 op; /* type of operation */
567 __u64 buf; /* buffer in userspace */
dc6f8d45 568 union {
e4082063
AW
569 struct {
570 __u8 ar; /* the access register number */
571 __u8 key; /* access key, ignored if flag unset */
572 };
dc6f8d45 573 __u32 sida_offset; /* offset into the sida */
e4082063 574 __u8 reserved[32]; /* ignored */
dc6f8d45 575 };
7a52ce8a
CH
576};
577/* types for kvm_s390_mem_op->op */
578#define KVM_S390_MEMOP_LOGICAL_READ 0
579#define KVM_S390_MEMOP_LOGICAL_WRITE 1
dc6f8d45
CH
580#define KVM_S390_MEMOP_SIDA_READ 2
581#define KVM_S390_MEMOP_SIDA_WRITE 3
e4082063
AW
582#define KVM_S390_MEMOP_ABSOLUTE_READ 4
583#define KVM_S390_MEMOP_ABSOLUTE_WRITE 5
7a52ce8a
CH
584/* flags for kvm_s390_mem_op->flags */
585#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
586#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
e4082063 587#define KVM_S390_MEMOP_F_SKEY_PROTECTION (1ULL << 2)
7a52ce8a 588
51b24e34
JK
589/* for KVM_INTERRUPT */
590struct kvm_interrupt {
591 /* in */
592 __u32 irq;
593};
594
595/* for KVM_GET_DIRTY_LOG */
596struct kvm_dirty_log {
597 __u32 slot;
598 __u32 padding1;
599 union {
600 void *dirty_bitmap; /* one bit per page */
601 __u64 padding2;
602 };
603};
604
da054c64
PB
605/* for KVM_CLEAR_DIRTY_LOG */
606struct kvm_clear_dirty_log {
607 __u32 slot;
608 __u32 num_pages;
609 __u64 first_page;
610 union {
611 void *dirty_bitmap; /* one bit per page */
612 __u64 padding2;
613 };
614};
615
51b24e34
JK
616/* for KVM_SET_SIGNAL_MASK */
617struct kvm_signal_mask {
618 __u32 len;
619 __u8 sigset[0];
620};
621
622/* for KVM_TPR_ACCESS_REPORTING */
623struct kvm_tpr_access_ctl {
624 __u32 enabled;
625 __u32 flags;
626 __u32 reserved[8];
627};
628
629/* for KVM_SET_VAPIC_ADDR */
630struct kvm_vapic_addr {
631 __u64 vapic_addr;
632};
633
a9fd1654 634/* for KVM_SET_MP_STATE */
51b24e34 635
a9fd1654 636/* not all states are valid on all architectures */
51b24e34
JK
637#define KVM_MP_STATE_RUNNABLE 0
638#define KVM_MP_STATE_UNINITIALIZED 1
639#define KVM_MP_STATE_INIT_RECEIVED 2
640#define KVM_MP_STATE_HALTED 3
641#define KVM_MP_STATE_SIPI_RECEIVED 4
a9fd1654
JF
642#define KVM_MP_STATE_STOPPED 5
643#define KVM_MP_STATE_CHECK_STOP 6
644#define KVM_MP_STATE_OPERATING 7
645#define KVM_MP_STATE_LOAD 8
278f064e 646#define KVM_MP_STATE_AP_RESET_HOLD 9
51b24e34
JK
647
648struct kvm_mp_state {
649 __u32 mp_state;
650};
651
652struct kvm_s390_psw {
653 __u64 mask;
654 __u64 addr;
655};
656
657/* valid values for type in kvm_s390_interrupt */
658#define KVM_S390_SIGP_STOP 0xfffe0000u
659#define KVM_S390_PROGRAM_INT 0xfffe0001u
660#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
661#define KVM_S390_RESTART 0xfffe0003u
216db403
CB
662#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
663#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
d3dccee1 664#define KVM_S390_MCHK 0xfffe1000u
76eb98d5
JF
665#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
666#define KVM_S390_INT_CPU_TIMER 0xffff1005u
51b24e34
JK
667#define KVM_S390_INT_VIRTIO 0xffff2603u
668#define KVM_S390_INT_SERVICE 0xffff2401u
669#define KVM_S390_INT_EMERGENCY 0xffff1201u
1529ae1b 670#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d3dccee1
AG
671/* Anything below 0xfffe0000u is taken by INT_IO */
672#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
673 (((schid)) | \
674 ((ssid) << 16) | \
675 ((cssid) << 18) | \
676 ((ai) << 26))
677#define KVM_S390_INT_IO_MIN 0x00000000u
678#define KVM_S390_INT_IO_MAX 0xfffdffffu
120758fb 679#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d3dccee1 680
51b24e34
JK
681
682struct kvm_s390_interrupt {
683 __u32 type;
684 __u32 parm;
685 __u64 parm64;
686};
687
216db403
CB
688struct kvm_s390_io_info {
689 __u16 subchannel_id;
690 __u16 subchannel_nr;
691 __u32 io_int_parm;
692 __u32 io_int_word;
693};
694
695struct kvm_s390_ext_info {
696 __u32 ext_params;
697 __u32 pad;
698 __u64 ext_params2;
699};
700
701struct kvm_s390_pgm_info {
702 __u64 trans_exc_code;
703 __u64 mon_code;
704 __u64 per_address;
705 __u32 data_exc_code;
706 __u16 code;
707 __u16 mon_class_nr;
708 __u8 per_code;
709 __u8 per_atmid;
710 __u8 exc_access_id;
711 __u8 per_access_id;
712 __u8 op_access_id;
66fb2d54
CH
713#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
714#define KVM_S390_PGM_FLAGS_ILC_0 0x02
715#define KVM_S390_PGM_FLAGS_ILC_1 0x04
716#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
717#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
718 __u8 flags;
719 __u8 pad[2];
216db403
CB
720};
721
722struct kvm_s390_prefix_info {
723 __u32 address;
724};
725
726struct kvm_s390_extcall_info {
727 __u16 code;
728};
729
730struct kvm_s390_emerg_info {
731 __u16 code;
732};
733
51628b18
CB
734#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
735struct kvm_s390_stop_info {
736 __u32 flags;
737};
738
216db403
CB
739struct kvm_s390_mchk_info {
740 __u64 cr14;
741 __u64 mcic;
742 __u64 failing_storage_address;
743 __u32 ext_damage_code;
744 __u32 pad;
745 __u8 fixed_logout[16];
746};
747
748struct kvm_s390_irq {
749 __u64 type;
750 union {
751 struct kvm_s390_io_info io;
752 struct kvm_s390_ext_info ext;
753 struct kvm_s390_pgm_info pgm;
754 struct kvm_s390_emerg_info emerg;
755 struct kvm_s390_extcall_info extcall;
756 struct kvm_s390_prefix_info prefix;
51628b18 757 struct kvm_s390_stop_info stop;
216db403
CB
758 struct kvm_s390_mchk_info mchk;
759 char reserved[64];
760 } u;
761};
762
7a52ce8a
CH
763struct kvm_s390_irq_state {
764 __u64 buf;
9cbb6362 765 __u32 flags; /* will stay unused for compatibility reasons */
7a52ce8a 766 __u32 len;
9cbb6362 767 __u32 reserved[4]; /* will stay unused for compatibility reasons */
7a52ce8a
CH
768};
769
51b24e34
JK
770/* for KVM_SET_GUEST_DEBUG */
771
772#define KVM_GUESTDBG_ENABLE 0x00000001
773#define KVM_GUESTDBG_SINGLESTEP 0x00000002
774
775struct kvm_guest_debug {
776 __u32 control;
777 __u32 pad;
778 struct kvm_guest_debug_arch arch;
779};
780
781enum {
782 kvm_ioeventfd_flag_nr_datamatch,
783 kvm_ioeventfd_flag_nr_pio,
784 kvm_ioeventfd_flag_nr_deassign,
cae7f586 785 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
76eb98d5 786 kvm_ioeventfd_flag_nr_fast_mmio,
51b24e34
JK
787 kvm_ioeventfd_flag_nr_max,
788};
789
790#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
791#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
792#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
cae7f586
AG
793#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
794 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
51b24e34
JK
795
796#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
797
798struct kvm_ioeventfd {
799 __u64 datamatch;
800 __u64 addr; /* legal pio/mmio address */
76eb98d5 801 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
51b24e34
JK
802 __s32 fd;
803 __u32 flags;
804 __u8 pad[36];
805};
806
65a6d8dd 807#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
77d361b1 808#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
65a6d8dd 809#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
d38d201f 810#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
65a6d8dd 811#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
77d361b1 812 KVM_X86_DISABLE_EXITS_HLT | \
d38d201f
WL
813 KVM_X86_DISABLE_EXITS_PAUSE | \
814 KVM_X86_DISABLE_EXITS_CSTATE)
65a6d8dd 815
51b24e34
JK
816/* for KVM_ENABLE_CAP */
817struct kvm_enable_cap {
818 /* in */
819 __u32 cap;
820 __u32 flags;
821 __u64 args[4];
822 __u8 pad[64];
823};
824
825/* for KVM_PPC_GET_PVINFO */
3a5eb5b4
PB
826
827#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
828
51b24e34
JK
829struct kvm_ppc_pvinfo {
830 /* out */
831 __u32 flags;
832 __u32 hcall[4];
833 __u8 pad[108];
834};
835
80a3eb10
JK
836/* for KVM_PPC_GET_SMMU_INFO */
837#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
838
839struct kvm_ppc_one_page_size {
840 __u32 page_shift; /* Page shift (or 0) */
841 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
842};
843
844struct kvm_ppc_one_seg_page_size {
845 __u32 page_shift; /* Base page shift of segment (or 0) */
846 __u32 slb_enc; /* SLB encoding for BookS */
847 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
848};
849
850#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
851#define KVM_PPC_1T_SEGMENTS 0x00000002
966f2ec3 852#define KVM_PPC_NO_HASH 0x00000004
80a3eb10
JK
853
854struct kvm_ppc_smmu_info {
855 __u64 flags;
856 __u32 slb_size;
d4083f50
AP
857 __u16 data_keys; /* # storage keys supported for data */
858 __u16 instr_keys; /* # storage keys supported for instructions */
80a3eb10
JK
859 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
860};
861
3a5eb5b4
PB
862/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
863struct kvm_ppc_resize_hpt {
864 __u64 flags;
865 __u32 shift;
866 __u32 pad;
867};
d4834ff9 868
51b24e34
JK
869#define KVMIO 0xAE
870
1529ae1b
AG
871/* machine type bits, to be used as argument to KVM_CREATE_VM */
872#define KVM_VM_S390_UCONTROL 1
873
bf63839f
AW
874/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
875#define KVM_VM_PPC_HV 1
876#define KVM_VM_PPC_PR 2
877
94c7fefc
AJ
878/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
879#define KVM_VM_MIPS_AUTO 0
74c98e20 880#define KVM_VM_MIPS_VZ 1
94c7fefc 881#define KVM_VM_MIPS_TE 2
74c98e20 882
1529ae1b
AG
883#define KVM_S390_SIE_PAGE_OFFSET 1
884
da054c64
PB
885/*
886 * On arm64, machine type can be used to request the physical
887 * address size for the VM. Bits[7-0] are reserved for the guest
888 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
889 * value 0 implies the default IPA size, 40bits.
890 */
891#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
892#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
893 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
51b24e34
JK
894/*
895 * ioctls for /dev/kvm fds:
896 */
897#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
898#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
899#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
900
901#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
902/*
903 * Check if a kvm extension is available. Argument is extension number,
904 * return is 1 (yes) or 0 (no, sorry).
905 */
906#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
907/*
908 * Get size for mmap(vcpu_fd)
909 */
910#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
911#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
912#define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06
913#define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07
914#define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08
bf63839f 915#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
9f2d175d 916#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
51b24e34
JK
917
918/*
919 * Extension capability list.
920 */
921#define KVM_CAP_IRQCHIP 0
922#define KVM_CAP_HLT 1
923#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
924#define KVM_CAP_USER_MEMORY 3
925#define KVM_CAP_SET_TSS_ADDR 4
926#define KVM_CAP_VAPIC 6
927#define KVM_CAP_EXT_CPUID 7
928#define KVM_CAP_CLOCKSOURCE 8
7c6da3de 929#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
51b24e34
JK
930#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
931#define KVM_CAP_PIT 11
932#define KVM_CAP_NOP_IO_DELAY 12
933#define KVM_CAP_PV_MMU 13
934#define KVM_CAP_MP_STATE 14
935#define KVM_CAP_COALESCED_MMIO 15
936#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
51b24e34 937#define KVM_CAP_IOMMU 18
51b24e34
JK
938/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
939#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
51b24e34 940#define KVM_CAP_USER_NMI 22
51b24e34
JK
941#ifdef __KVM_HAVE_GUEST_DEBUG
942#define KVM_CAP_SET_GUEST_DEBUG 23
943#endif
944#ifdef __KVM_HAVE_PIT
945#define KVM_CAP_REINJECT_CONTROL 24
946#endif
51b24e34 947#define KVM_CAP_IRQ_ROUTING 25
51b24e34 948#define KVM_CAP_IRQ_INJECT_STATUS 26
51b24e34
JK
949#define KVM_CAP_ASSIGN_DEV_IRQ 29
950/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
951#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
952#ifdef __KVM_HAVE_MCE
953#define KVM_CAP_MCE 31
954#endif
955#define KVM_CAP_IRQFD 32
956#ifdef __KVM_HAVE_PIT
957#define KVM_CAP_PIT2 33
958#endif
959#define KVM_CAP_SET_BOOT_CPU_ID 34
960#ifdef __KVM_HAVE_PIT_STATE2
961#define KVM_CAP_PIT_STATE2 35
962#endif
963#define KVM_CAP_IOEVENTFD 36
964#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
965#ifdef __KVM_HAVE_XEN_HVM
966#define KVM_CAP_XEN_HVM 38
967#endif
968#define KVM_CAP_ADJUST_CLOCK 39
969#define KVM_CAP_INTERNAL_ERROR_DATA 40
970#ifdef __KVM_HAVE_VCPU_EVENTS
971#define KVM_CAP_VCPU_EVENTS 41
972#endif
973#define KVM_CAP_S390_PSW 42
974#define KVM_CAP_PPC_SEGSTATE 43
975#define KVM_CAP_HYPERV 44
976#define KVM_CAP_HYPERV_VAPIC 45
977#define KVM_CAP_HYPERV_SPIN 46
978#define KVM_CAP_PCI_SEGMENT 47
979#define KVM_CAP_PPC_PAIRED_SINGLES 48
980#define KVM_CAP_INTR_SHADOW 49
981#ifdef __KVM_HAVE_DEBUGREGS
982#define KVM_CAP_DEBUGREGS 50
983#endif
984#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
985#define KVM_CAP_PPC_OSI 52
986#define KVM_CAP_PPC_UNSET_IRQ 53
987#define KVM_CAP_ENABLE_CAP 54
988#ifdef __KVM_HAVE_XSAVE
989#define KVM_CAP_XSAVE 55
990#endif
991#ifdef __KVM_HAVE_XCRS
992#define KVM_CAP_XCRS 56
993#endif
994#define KVM_CAP_PPC_GET_PVINFO 57
995#define KVM_CAP_PPC_IRQ_LEVEL 58
996#define KVM_CAP_ASYNC_PF 59
997#define KVM_CAP_TSC_CONTROL 60
998#define KVM_CAP_GET_TSC_KHZ 61
999#define KVM_CAP_PPC_BOOKE_SREGS 62
7c6da3de
AG
1000#define KVM_CAP_SPAPR_TCE 63
1001#define KVM_CAP_PPC_SMT 64
1002#define KVM_CAP_PPC_RMA 65
1003#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
9d4e4f8c 1004#define KVM_CAP_PPC_HIOR 67
7c6da3de 1005#define KVM_CAP_PPC_PAPR 68
a54fc080 1006#define KVM_CAP_SW_TLB 69
9d4e4f8c 1007#define KVM_CAP_ONE_REG 70
1529ae1b
AG
1008#define KVM_CAP_S390_GMAP 71
1009#define KVM_CAP_TSC_DEADLINE_TIMER 72
1010#define KVM_CAP_S390_UCONTROL 73
1011#define KVM_CAP_SYNC_REGS 74
9ab2195d
MT
1012#define KVM_CAP_PCI_2_3 75
1013#define KVM_CAP_KVMCLOCK_CTRL 76
80a3eb10
JK
1014#define KVM_CAP_SIGNAL_MSI 77
1015#define KVM_CAP_PPC_GET_SMMU_INFO 78
2a60dba4 1016#define KVM_CAP_S390_COW 79
651682dc 1017#define KVM_CAP_PPC_ALLOC_HTAB 80
716b8e4d 1018#define KVM_CAP_READONLY_MEM 81
716b8e4d 1019#define KVM_CAP_IRQFD_RESAMPLE 82
d4834ff9
AG
1020#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
1021#define KVM_CAP_PPC_HTAB_FD 84
d3dccee1
AG
1022#define KVM_CAP_S390_CSS_SUPPORT 85
1023#define KVM_CAP_PPC_EPR 86
eadd0e44
PM
1024#define KVM_CAP_ARM_PSCI 87
1025#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
e098b453
AK
1026#define KVM_CAP_DEVICE_CTRL 89
1027#define KVM_CAP_IRQ_MPIC 90
1028#define KVM_CAP_PPC_RTAS 91
1029#define KVM_CAP_IRQ_XICS 92
c5daeae1 1030#define KVM_CAP_ARM_EL1_32BIT 93
4f265607 1031#define KVM_CAP_SPAPR_MULTITCE 94
bf63839f 1032#define KVM_CAP_EXT_EMUL_CPUID 95
48a5f3bc 1033#define KVM_CAP_HYPERV_TIME 96
9ffd2685
CH
1034#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
1035#define KVM_CAP_ENABLE_CAP_VM 98
1036#define KVM_CAP_S390_IRQCHIP 99
76eb98d5
JF
1037#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
1038#define KVM_CAP_VM_ATTRIBUTES 101
b061808d
AG
1039#define KVM_CAP_ARM_PSCI_0_2 102
1040#define KVM_CAP_PPC_FIXUP_HCALL 103
a9fd1654
JF
1041#define KVM_CAP_PPC_ENABLE_HCALL 104
1042#define KVM_CAP_CHECK_EXTENSION_VM 105
51628b18 1043#define KVM_CAP_S390_USER_SIGP 106
7a52ce8a
CH
1044#define KVM_CAP_S390_VECTOR_REGISTERS 107
1045#define KVM_CAP_S390_MEM_OP 108
1046#define KVM_CAP_S390_USER_STSI 109
1047#define KVM_CAP_S390_SKEYS 110
1048#define KVM_CAP_MIPS_FPU 111
1049#define KVM_CAP_MIPS_MSA 112
1050#define KVM_CAP_S390_INJECT_IRQ 113
1051#define KVM_CAP_S390_IRQ_STATE 114
1052#define KVM_CAP_PPC_HWRNG 115
24a31426
PB
1053#define KVM_CAP_DISABLE_QUIRKS 116
1054#define KVM_CAP_X86_SMM 117
1055#define KVM_CAP_MULTI_ADDRESS_SPACE 118
3a824b15
PB
1056#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
1057#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
1058#define KVM_CAP_SPLIT_IRQCHIP 121
1059#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
fff02bc0 1060#define KVM_CAP_HYPERV_SYNIC 123
66fb2d54 1061#define KVM_CAP_S390_RI 124
b89485a5
PB
1062#define KVM_CAP_SPAPR_TCE_64 125
1063#define KVM_CAP_ARM_PMU_V3 126
1064#define KVM_CAP_VCPU_ATTRIBUTES 127
ff804f15 1065#define KVM_CAP_MAX_VCPU_ID 128
dbdfea92
CH
1066#define KVM_CAP_X2APIC_API 129
1067#define KVM_CAP_S390_USER_INSTR0 130
1068#define KVM_CAP_MSI_DEVID 131
1069#define KVM_CAP_PPC_HTM 132
3a5eb5b4
PB
1070#define KVM_CAP_SPAPR_RESIZE_HPT 133
1071#define KVM_CAP_PPC_MMU_RADIX 134
1072#define KVM_CAP_PPC_MMU_HASH_V3 135
1073#define KVM_CAP_IMMEDIATE_EXIT 136
74c98e20
CH
1074#define KVM_CAP_MIPS_VZ 137
1075#define KVM_CAP_MIPS_TE 138
1076#define KVM_CAP_MIPS_64BIT 139
1077#define KVM_CAP_S390_GS 140
1078#define KVM_CAP_S390_AIS 141
1079#define KVM_CAP_SPAPR_TCE_VFIO 142
65a6d8dd 1080#define KVM_CAP_X86_DISABLE_EXITS 143
74c98e20 1081#define KVM_CAP_ARM_USER_IRQ 144
3272f0e2
CB
1082#define KVM_CAP_S390_CMMA_MIGRATION 145
1083#define KVM_CAP_PPC_FWNMI 146
1084#define KVM_CAP_PPC_SMT_POSSIBLE 147
ab6e1550
CB
1085#define KVM_CAP_HYPERV_SYNIC2 148
1086#define KVM_CAP_HYPERV_VP_INDEX 149
dd873966 1087#define KVM_CAP_S390_AIS_MIGRATION 150
9cbb6362
CH
1088#define KVM_CAP_PPC_GET_CPU_CHAR 151
1089#define KVM_CAP_S390_BPB 152
9f2d175d 1090#define KVM_CAP_GET_MSR_FEATURES 153
65a6d8dd 1091#define KVM_CAP_HYPERV_EVENTFD 154
77d361b1 1092#define KVM_CAP_HYPERV_TLBFLUSH 155
d36f7de8
CH
1093#define KVM_CAP_S390_HPAGE_1M 156
1094#define KVM_CAP_NESTED_STATE 157
8f3cd250
CH
1095#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
1096#define KVM_CAP_MSR_PLATFORM_INFO 159
966f2ec3
PB
1097#define KVM_CAP_PPC_NESTED_HV 160
1098#define KVM_CAP_HYPERV_SEND_IPI 161
1099#define KVM_CAP_COALESCED_PIO 162
1100#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
1101#define KVM_CAP_EXCEPTION_PAYLOAD 164
da054c64 1102#define KVM_CAP_ARM_VM_IPA_SIZE 165
d9cb4336 1103#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
da054c64 1104#define KVM_CAP_HYPERV_CPUID 167
d9cb4336
CH
1105#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
1106#define KVM_CAP_PPC_IRQ_XIVE 169
1107#define KVM_CAP_ARM_SVE 170
1108#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1109#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
f363d039
EA
1110#define KVM_CAP_PMU_EVENT_FILTER 173
1111#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
1112#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
2a886794
GK
1113#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
1114#define KVM_CAP_ARM_NISV_TO_USER 177
1115#define KVM_CAP_ARM_INJECT_EXT_DABT 178
ddda3748 1116#define KVM_CAP_S390_VCPU_RESETS 179
dc6f8d45
CH
1117#define KVM_CAP_S390_PROTECTED 180
1118#define KVM_CAP_PPC_SECURE_GUEST 181
f76b348e
CH
1119#define KVM_CAP_HALT_POLL 182
1120#define KVM_CAP_ASYNC_PF_INT 183
e6546342
JW
1121#define KVM_CAP_LAST_CPU 184
1122#define KVM_CAP_SMALLER_MAXPHYADDR 185
1123#define KVM_CAP_S390_DIAG318 186
94c7fefc 1124#define KVM_CAP_STEAL_TIME 187
53ba2eee
MR
1125#define KVM_CAP_X86_USER_SPACE_MSR 188
1126#define KVM_CAP_X86_MSR_FILTER 189
1127#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
b3c818a4
EF
1128#define KVM_CAP_SYS_HYPERV_CPUID 191
1129#define KVM_CAP_DIRTY_LOG_RING 192
278f064e
EH
1130#define KVM_CAP_X86_BUS_LOCK_EXIT 193
1131#define KVM_CAP_PPC_DAWR1 194
1132#define KVM_CAP_SET_GUEST_DEBUG2 195
1133#define KVM_CAP_SGX_ATTRIBUTE 196
1134#define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197
1135#define KVM_CAP_PTP_KVM 198
327d4b7f
BR
1136#define KVM_CAP_HYPERV_ENFORCE_CPUID 199
1137#define KVM_CAP_SREGS2 200
1138#define KVM_CAP_EXIT_HYPERCALL 201
1139#define KVM_CAP_PPC_RPT_INVALIDATE 202
1140#define KVM_CAP_BINARY_STATS_FD 203
1141#define KVM_CAP_EXIT_ON_EMULATION_FAILURE 204
1142#define KVM_CAP_ARM_MTE 205
ef17dd6a
VG
1143#define KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM 206
1144#define KVM_CAP_VM_GPA_BITS 207
1145#define KVM_CAP_XSAVE2 208
1ea5208f 1146#define KVM_CAP_SYS_ATTRIBUTES 209
e4082063
AW
1147#define KVM_CAP_PPC_AIL_MODE_3 210
1148#define KVM_CAP_S390_MEM_OP_EXTENSION 211
1149#define KVM_CAP_PMU_CAPABILITY 212
1150#define KVM_CAP_DISABLE_QUIRKS2 213
1151/* #define KVM_CAP_VM_TSC_CONTROL 214 */
1152#define KVM_CAP_SYSTEM_EVENT_DATA 215
51b24e34
JK
1153
1154#ifdef KVM_CAP_IRQ_ROUTING
1155
1156struct kvm_irq_routing_irqchip {
1157 __u32 irqchip;
1158 __u32 pin;
1159};
1160
1161struct kvm_irq_routing_msi {
1162 __u32 address_lo;
1163 __u32 address_hi;
1164 __u32 data;
dbdfea92
CH
1165 union {
1166 __u32 pad;
1167 __u32 devid;
1168 };
51b24e34
JK
1169};
1170
9ffd2685
CH
1171struct kvm_irq_routing_s390_adapter {
1172 __u64 ind_addr;
1173 __u64 summary_addr;
1174 __u64 ind_offset;
1175 __u32 summary_offset;
1176 __u32 adapter_id;
1177};
1178
fff02bc0
PB
1179struct kvm_irq_routing_hv_sint {
1180 __u32 vcpu;
1181 __u32 sint;
1182};
1183
ef17dd6a
VG
1184struct kvm_irq_routing_xen_evtchn {
1185 __u32 port;
1186 __u32 vcpu;
1187 __u32 priority;
1188};
1189
1190#define KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL ((__u32)(-1))
1191
51b24e34
JK
1192/* gsi routing entry types */
1193#define KVM_IRQ_ROUTING_IRQCHIP 1
1194#define KVM_IRQ_ROUTING_MSI 2
9ffd2685 1195#define KVM_IRQ_ROUTING_S390_ADAPTER 3
fff02bc0 1196#define KVM_IRQ_ROUTING_HV_SINT 4
ef17dd6a 1197#define KVM_IRQ_ROUTING_XEN_EVTCHN 5
51b24e34
JK
1198
1199struct kvm_irq_routing_entry {
1200 __u32 gsi;
1201 __u32 type;
1202 __u32 flags;
1203 __u32 pad;
1204 union {
1205 struct kvm_irq_routing_irqchip irqchip;
1206 struct kvm_irq_routing_msi msi;
9ffd2685 1207 struct kvm_irq_routing_s390_adapter adapter;
fff02bc0 1208 struct kvm_irq_routing_hv_sint hv_sint;
ef17dd6a 1209 struct kvm_irq_routing_xen_evtchn xen_evtchn;
51b24e34
JK
1210 __u32 pad[8];
1211 } u;
1212};
1213
1214struct kvm_irq_routing {
1215 __u32 nr;
1216 __u32 flags;
1217 struct kvm_irq_routing_entry entries[0];
1218};
1219
1220#endif
1221
1222#ifdef KVM_CAP_MCE
1223/* x86 MCE */
1224struct kvm_x86_mce {
1225 __u64 status;
1226 __u64 addr;
1227 __u64 misc;
1228 __u64 mcg_status;
1229 __u8 bank;
1230 __u8 pad1[7];
1231 __u64 pad2[3];
1232};
1233#endif
1234
1235#ifdef KVM_CAP_XEN_HVM
278f064e
EH
1236#define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0)
1237#define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1)
1238#define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2)
1239#define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3)
ef17dd6a 1240#define KVM_XEN_HVM_CONFIG_EVTCHN_2LEVEL (1 << 4)
278f064e 1241
51b24e34
JK
1242struct kvm_xen_hvm_config {
1243 __u32 flags;
1244 __u32 msr;
1245 __u64 blob_addr_32;
1246 __u64 blob_addr_64;
1247 __u8 blob_size_32;
1248 __u8 blob_size_64;
1249 __u8 pad2[30];
1250};
1251#endif
1252
1253#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
716b8e4d
AW
1254/*
1255 * Available with KVM_CAP_IRQFD_RESAMPLE
1256 *
1257 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1258 * the irqfd to operate in resampling mode for level triggered interrupt
f76b348e 1259 * emulation. See Documentation/virt/kvm/api.rst.
716b8e4d
AW
1260 */
1261#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
51b24e34
JK
1262
1263struct kvm_irqfd {
1264 __u32 fd;
1265 __u32 gsi;
1266 __u32 flags;
716b8e4d
AW
1267 __u32 resamplefd;
1268 __u8 pad[16];
51b24e34
JK
1269};
1270
bc204035
MT
1271/* For KVM_CAP_ADJUST_CLOCK */
1272
1273/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1274#define KVM_CLOCK_TSC_STABLE 2
43709a0c
PB
1275#define KVM_CLOCK_REALTIME (1 << 2)
1276#define KVM_CLOCK_HOST_TSC (1 << 3)
bc204035 1277
51b24e34
JK
1278struct kvm_clock_data {
1279 __u64 clock;
1280 __u32 flags;
43709a0c
PB
1281 __u32 pad0;
1282 __u64 realtime;
1283 __u64 host_tsc;
1284 __u32 pad[4];
51b24e34
JK
1285};
1286
bc204035
MT
1287/* For KVM_CAP_SW_TLB */
1288
a54fc080
AG
1289#define KVM_MMU_FSL_BOOKE_NOHV 0
1290#define KVM_MMU_FSL_BOOKE_HV 1
1291
1292struct kvm_config_tlb {
1293 __u64 params;
1294 __u64 array;
1295 __u32 mmu_type;
1296 __u32 array_len;
1297};
1298
1299struct kvm_dirty_tlb {
1300 __u64 bitmap;
1301 __u32 num_dirty;
1302};
1303
9d4e4f8c
AG
1304/* Available with KVM_CAP_ONE_REG */
1305
a31be480
AG
1306#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1307#define KVM_REG_GENERIC 0x0000000000000000ULL
9d4e4f8c
AG
1308
1309/*
1310 * Architecture specific registers are to be defined in arch headers and
1311 * ORed with the arch identifier.
1312 */
a31be480
AG
1313#define KVM_REG_PPC 0x1000000000000000ULL
1314#define KVM_REG_X86 0x2000000000000000ULL
1315#define KVM_REG_IA64 0x3000000000000000ULL
1316#define KVM_REG_ARM 0x4000000000000000ULL
1317#define KVM_REG_S390 0x5000000000000000ULL
c5daeae1
AK
1318#define KVM_REG_ARM64 0x6000000000000000ULL
1319#define KVM_REG_MIPS 0x7000000000000000ULL
f363d039 1320#define KVM_REG_RISCV 0x8000000000000000ULL
a31be480
AG
1321
1322#define KVM_REG_SIZE_SHIFT 52
1323#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1324#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1325#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1326#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1327#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1328#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1329#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1330#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1331#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
d9cb4336 1332#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
9d4e4f8c 1333
eadd0e44
PM
1334struct kvm_reg_list {
1335 __u64 n; /* number of regs */
1336 __u64 reg[0];
1337};
1338
9d4e4f8c
AG
1339struct kvm_one_reg {
1340 __u64 id;
a31be480 1341 __u64 addr;
9d4e4f8c
AG
1342};
1343
dbdfea92 1344#define KVM_MSI_VALID_DEVID (1U << 0)
80a3eb10
JK
1345struct kvm_msi {
1346 __u32 address_lo;
1347 __u32 address_hi;
1348 __u32 data;
1349 __u32 flags;
dbdfea92
CH
1350 __u32 devid;
1351 __u8 pad[12];
80a3eb10
JK
1352};
1353
eadd0e44
PM
1354struct kvm_arm_device_addr {
1355 __u64 id;
1356 __u64 addr;
1357};
1358
e098b453
AK
1359/*
1360 * Device control API, available with KVM_CAP_DEVICE_CTRL
1361 */
1362#define KVM_CREATE_DEVICE_TEST 1
1363
1364struct kvm_create_device {
1365 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1366 __u32 fd; /* out: device handle */
1367 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1368};
1369
1370struct kvm_device_attr {
1371 __u32 flags; /* no flags currently defined */
1372 __u32 group; /* device-defined */
1373 __u64 attr; /* group-defined */
1374 __u64 addr; /* userspace address of attr data */
1375};
1376
bf63839f
AW
1377#define KVM_DEV_VFIO_GROUP 1
1378#define KVM_DEV_VFIO_GROUP_ADD 1
1379#define KVM_DEV_VFIO_GROUP_DEL 2
74c98e20 1380#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
444b1996
AB
1381
1382enum kvm_device_type {
1383 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1384#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1385 KVM_DEV_TYPE_FSL_MPIC_42,
1386#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1387 KVM_DEV_TYPE_XICS,
1388#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1389 KVM_DEV_TYPE_VFIO,
1390#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1391 KVM_DEV_TYPE_ARM_VGIC_V2,
1392#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1393 KVM_DEV_TYPE_FLIC,
1394#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
51628b18
CB
1395 KVM_DEV_TYPE_ARM_VGIC_V3,
1396#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
dbdfea92
CH
1397 KVM_DEV_TYPE_ARM_VGIC_ITS,
1398#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
d9cb4336
CH
1399 KVM_DEV_TYPE_XIVE,
1400#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
2a886794
GK
1401 KVM_DEV_TYPE_ARM_PV_TIME,
1402#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
444b1996
AB
1403 KVM_DEV_TYPE_MAX,
1404};
e098b453 1405
74c98e20
CH
1406struct kvm_vfio_spapr_tce {
1407 __s32 groupfd;
1408 __s32 tablefd;
1409};
1410
51b24e34
JK
1411/*
1412 * ioctls for VM fds
1413 */
1414#define KVM_SET_MEMORY_REGION _IOW(KVMIO, 0x40, struct kvm_memory_region)
1415/*
1416 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1417 * a vcpu fd.
1418 */
1419#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1420#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
1421/* KVM_SET_MEMORY_ALIAS is obsolete: */
1422#define KVM_SET_MEMORY_ALIAS _IOW(KVMIO, 0x43, struct kvm_memory_alias)
1423#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
1424#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45)
1425#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
1426 struct kvm_userspace_memory_region)
1427#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1428#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
1529ae1b
AG
1429
1430/* enable ucontrol for s390 */
1431struct kvm_s390_ucas_mapping {
1432 __u64 user_addr;
1433 __u64 vcpu_addr;
1434 __u64 length;
1435};
1436#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1437#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
1438#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
1439
51b24e34
JK
1440/* Device model IOC */
1441#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1442#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1443#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1444#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1445#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1446#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1447#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1448#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
1449#define KVM_REGISTER_COALESCED_MMIO \
1450 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1451#define KVM_UNREGISTER_COALESCED_MMIO \
1452 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
1453#define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \
1454 struct kvm_assigned_pci_dev)
1455#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
1456/* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */
1457#define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70
1458#define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq)
1459#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
1460#define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \
1461 struct kvm_assigned_pci_dev)
1462#define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \
1463 struct kvm_assigned_msix_nr)
1464#define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \
1465 struct kvm_assigned_msix_entry)
1466#define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq)
1467#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1468#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1469#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1470#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1471#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1472#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1473#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1474/* Available with KVM_CAP_PIT_STATE2 */
1475#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1476#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
1477/* Available with KVM_CAP_PPC_GET_PVINFO */
1478#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
1479/* Available with KVM_CAP_TSC_CONTROL */
1480#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1481#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
9ab2195d
MT
1482/* Available with KVM_CAP_PCI_2_3 */
1483#define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \
1484 struct kvm_assigned_pci_dev)
80a3eb10
JK
1485/* Available with KVM_CAP_SIGNAL_MSI */
1486#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
1487/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1488#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
651682dc
MT
1489/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1490#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
d4834ff9 1491#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
b89485a5
PB
1492#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1493 struct kvm_create_spapr_tce_64)
d4834ff9
AG
1494/* Available with KVM_CAP_RMA */
1495#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
1496/* Available with KVM_CAP_PPC_HTAB_FD */
1497#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
eadd0e44
PM
1498/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1499#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
e098b453
AK
1500/* Available with KVM_CAP_PPC_RTAS */
1501#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
3a5eb5b4
PB
1502/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1503#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1504#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
1505/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1506#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1507/* Available with KVM_CAP_PPC_RADIX_MMU */
1508#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
9cbb6362
CH
1509/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1510#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
f363d039
EA
1511/* Available with KVM_CAP_PMU_EVENT_FILTER */
1512#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
50fd0c37 1513#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
327d4b7f 1514#define KVM_ARM_MTE_COPY_TAGS _IOR(KVMIO, 0xb4, struct kvm_arm_copy_mte_tags)
e098b453
AK
1515
1516/* ioctl for vm fd */
1517#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1518
1519/* ioctls for fds returned by KVM_CREATE_DEVICE */
1520#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1521#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1522#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
51b24e34
JK
1523
1524/*
1525 * ioctls for vcpu fds
1526 */
1527#define KVM_RUN _IO(KVMIO, 0x80)
1528#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1529#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1530#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1531#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1532#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1533#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
1534/* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */
1535#define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87
1536#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1537#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1538#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1539#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
1540#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1541#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
1542#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1543#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
1544#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1545#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
1546/* Available with KVM_CAP_VAPIC */
1547#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
1548/* Available with KVM_CAP_VAPIC */
1549#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
1550/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1551#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
1552/* store status for s390 */
1553#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1554#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1555#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1556/* initial ipl psw for s390 */
1557#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1558/* initial reset for s390 */
1559#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
1560#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1561#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
444b1996 1562/* Available with KVM_CAP_USER_NMI */
51b24e34
JK
1563#define KVM_NMI _IO(KVMIO, 0x9a)
1564/* Available with KVM_CAP_SET_GUEST_DEBUG */
1565#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
1566/* MCE for x86 */
1567#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1568#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1569#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
51b24e34
JK
1570/* Available with KVM_CAP_VCPU_EVENTS */
1571#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1572#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
1573/* Available with KVM_CAP_DEBUGREGS */
1574#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1575#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
9ffd2685
CH
1576/*
1577 * vcpu version available with KVM_ENABLE_CAP
1578 * vm version available with KVM_CAP_ENABLE_CAP_VM
1579 */
51b24e34
JK
1580#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
1581/* Available with KVM_CAP_XSAVE */
1582#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1583#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1584/* Available with KVM_CAP_XCRS */
1585#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1586#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
a54fc080
AG
1587/* Available with KVM_CAP_SW_TLB */
1588#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
9d4e4f8c 1589/* Available with KVM_CAP_ONE_REG */
a31be480 1590#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
9d4e4f8c 1591#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
9ab2195d
MT
1592/* VM is being stopped by host */
1593#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
eadd0e44 1594#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
bf63839f 1595#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
eadd0e44 1596#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
7a52ce8a
CH
1597/* Available with KVM_CAP_S390_MEM_OP */
1598#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
1599/* Available with KVM_CAP_S390_SKEYS */
1600#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1601#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
1602/* Available with KVM_CAP_S390_INJECT_IRQ */
1603#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
1604/* Available with KVM_CAP_S390_IRQ_STATE */
1605#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1606#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
24a31426
PB
1607/* Available with KVM_CAP_X86_SMM */
1608#define KVM_SMI _IO(KVMIO, 0xb7)
3272f0e2 1609/* Available with KVM_CAP_S390_CMMA_MIGRATION */
ab6e1550 1610#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
3272f0e2 1611#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
9f2d175d
PB
1612/* Memory Encryption Commands */
1613#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
1614
1615struct kvm_enc_region {
1616 __u64 addr;
1617 __u64 size;
1618};
1619
1620#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1621#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1622
65a6d8dd
PM
1623/* Available with KVM_CAP_HYPERV_EVENTFD */
1624#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1625
d36f7de8
CH
1626/* Available with KVM_CAP_NESTED_STATE */
1627#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1628#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
65a6d8dd 1629
d9cb4336 1630/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
da054c64
PB
1631#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1632
b3c818a4 1633/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
da054c64
PB
1634#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1635
d9cb4336
CH
1636/* Available with KVM_CAP_ARM_SVE */
1637#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1638
ddda3748
CH
1639/* Available with KVM_CAP_S390_VCPU_RESETS */
1640#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1641#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1642
dc6f8d45
CH
1643struct kvm_s390_pv_sec_parm {
1644 __u64 origin;
1645 __u64 length;
1646};
1647
1648struct kvm_s390_pv_unp {
1649 __u64 addr;
1650 __u64 size;
1651 __u64 tweak;
1652};
1653
1654enum pv_cmd_id {
1655 KVM_PV_ENABLE,
1656 KVM_PV_DISABLE,
1657 KVM_PV_SET_SEC_PARMS,
1658 KVM_PV_UNPACK,
1659 KVM_PV_VERIFY,
1660 KVM_PV_PREP_RESET,
1661 KVM_PV_UNSHARE_ALL,
1662};
1663
1664struct kvm_pv_cmd {
1665 __u32 cmd; /* Command to be executed */
1666 __u16 rc; /* Ultravisor return code */
1667 __u16 rrc; /* Ultravisor return reason code */
1668 __u64 data; /* Data or address */
1669 __u32 flags; /* flags for future extensions. Must be 0 for now */
1670 __u32 reserved[3];
1671};
1672
1673/* Available with KVM_CAP_S390_PROTECTED */
1674#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1675
53ba2eee
MR
1676/* Available with KVM_CAP_X86_MSR_FILTER */
1677#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1678
b3c818a4
EF
1679/* Available with KVM_CAP_DIRTY_LOG_RING */
1680#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1681
278f064e
EH
1682/* Per-VM Xen attributes */
1683#define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr)
1684#define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr)
1685
1686struct kvm_xen_hvm_attr {
1687 __u16 type;
1688 __u16 pad[3];
1689 union {
1690 __u8 long_mode;
1691 __u8 vector;
1692 struct {
1693 __u64 gfn;
1694 } shared_info;
1695 __u64 pad[8];
1696 } u;
1697};
1698
1699/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1700#define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0
1701#define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1
1702#define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2
1703
1704/* Per-vCPU Xen attributes */
1705#define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr)
1706#define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr)
1707
327d4b7f
BR
1708#define KVM_GET_SREGS2 _IOR(KVMIO, 0xcc, struct kvm_sregs2)
1709#define KVM_SET_SREGS2 _IOW(KVMIO, 0xcd, struct kvm_sregs2)
1710
278f064e
EH
1711struct kvm_xen_vcpu_attr {
1712 __u16 type;
1713 __u16 pad[3];
1714 union {
1715 __u64 gpa;
1716 __u64 pad[8];
1717 struct {
1718 __u64 state;
1719 __u64 state_entry_time;
1720 __u64 time_running;
1721 __u64 time_runnable;
1722 __u64 time_blocked;
1723 __u64 time_offline;
1724 } runstate;
1725 } u;
1726};
1727
1728/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1729#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0
1730#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1
1731#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2
1732#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3
1733#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4
1734#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5
1735
9f2d175d
PB
1736/* Secure Encrypted Virtualization command */
1737enum sev_cmd_id {
1738 /* Guest initialization commands */
1739 KVM_SEV_INIT = 0,
1740 KVM_SEV_ES_INIT,
1741 /* Guest launch commands */
1742 KVM_SEV_LAUNCH_START,
1743 KVM_SEV_LAUNCH_UPDATE_DATA,
1744 KVM_SEV_LAUNCH_UPDATE_VMSA,
1745 KVM_SEV_LAUNCH_SECRET,
1746 KVM_SEV_LAUNCH_MEASURE,
1747 KVM_SEV_LAUNCH_FINISH,
1748 /* Guest migration commands (outgoing) */
1749 KVM_SEV_SEND_START,
1750 KVM_SEV_SEND_UPDATE_DATA,
1751 KVM_SEV_SEND_UPDATE_VMSA,
1752 KVM_SEV_SEND_FINISH,
1753 /* Guest migration commands (incoming) */
1754 KVM_SEV_RECEIVE_START,
1755 KVM_SEV_RECEIVE_UPDATE_DATA,
1756 KVM_SEV_RECEIVE_UPDATE_VMSA,
1757 KVM_SEV_RECEIVE_FINISH,
1758 /* Guest status and debug commands */
1759 KVM_SEV_GUEST_STATUS,
1760 KVM_SEV_DBG_DECRYPT,
1761 KVM_SEV_DBG_ENCRYPT,
1762 /* Guest certificates commands */
1763 KVM_SEV_CERT_EXPORT,
3ea1a802
BS
1764 /* Attestation report */
1765 KVM_SEV_GET_ATTESTATION_REPORT,
278f064e
EH
1766 /* Guest Migration Extension */
1767 KVM_SEV_SEND_CANCEL,
9f2d175d
PB
1768
1769 KVM_SEV_NR_MAX,
1770};
1771
1772struct kvm_sev_cmd {
1773 __u32 id;
1774 __u64 data;
1775 __u32 error;
1776 __u32 sev_fd;
1777};
1778
1779struct kvm_sev_launch_start {
1780 __u32 handle;
1781 __u32 policy;
1782 __u64 dh_uaddr;
1783 __u32 dh_len;
1784 __u64 session_uaddr;
1785 __u32 session_len;
1786};
1787
1788struct kvm_sev_launch_update_data {
1789 __u64 uaddr;
1790 __u32 len;
1791};
1792
1793
1794struct kvm_sev_launch_secret {
1795 __u64 hdr_uaddr;
1796 __u32 hdr_len;
1797 __u64 guest_uaddr;
1798 __u32 guest_len;
1799 __u64 trans_uaddr;
1800 __u32 trans_len;
1801};
1802
1803struct kvm_sev_launch_measure {
1804 __u64 uaddr;
1805 __u32 len;
1806};
1807
1808struct kvm_sev_guest_status {
1809 __u32 handle;
1810 __u32 policy;
1811 __u32 state;
1812};
1813
1814struct kvm_sev_dbg {
1815 __u64 src_uaddr;
1816 __u64 dst_uaddr;
1817 __u32 len;
1818};
51b24e34 1819
3ea1a802
BS
1820struct kvm_sev_attestation_report {
1821 __u8 mnonce[16];
1822 __u64 uaddr;
1823 __u32 len;
1824};
1825
278f064e
EH
1826struct kvm_sev_send_start {
1827 __u32 policy;
1828 __u64 pdh_cert_uaddr;
1829 __u32 pdh_cert_len;
1830 __u64 plat_certs_uaddr;
1831 __u32 plat_certs_len;
1832 __u64 amd_certs_uaddr;
1833 __u32 amd_certs_len;
1834 __u64 session_uaddr;
1835 __u32 session_len;
1836};
1837
1838struct kvm_sev_send_update_data {
1839 __u64 hdr_uaddr;
1840 __u32 hdr_len;
1841 __u64 guest_uaddr;
1842 __u32 guest_len;
1843 __u64 trans_uaddr;
1844 __u32 trans_len;
1845};
1846
1847struct kvm_sev_receive_start {
1848 __u32 handle;
1849 __u32 policy;
1850 __u64 pdh_uaddr;
1851 __u32 pdh_len;
1852 __u64 session_uaddr;
1853 __u32 session_len;
1854};
1855
1856struct kvm_sev_receive_update_data {
1857 __u64 hdr_uaddr;
1858 __u32 hdr_len;
1859 __u64 guest_uaddr;
1860 __u32 guest_len;
1861 __u64 trans_uaddr;
1862 __u32 trans_len;
1863};
1864
51b24e34 1865#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
9ab2195d
MT
1866#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
1867#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
51b24e34
JK
1868
1869struct kvm_assigned_pci_dev {
1870 __u32 assigned_dev_id;
1871 __u32 busnr;
1872 __u32 devfn;
1873 __u32 flags;
1874 __u32 segnr;
1875 union {
1876 __u32 reserved[11];
1877 };
1878};
1879
1880#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
1881#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
1882#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
1883
1884#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
1885#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
1886#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
1887
1888#define KVM_DEV_IRQ_HOST_MASK 0x00ff
1889#define KVM_DEV_IRQ_GUEST_MASK 0xff00
1890
1891struct kvm_assigned_irq {
1892 __u32 assigned_dev_id;
7c6da3de 1893 __u32 host_irq; /* ignored (legacy field) */
51b24e34
JK
1894 __u32 guest_irq;
1895 __u32 flags;
1896 union {
51b24e34
JK
1897 __u32 reserved[12];
1898 };
1899};
1900
51b24e34
JK
1901struct kvm_assigned_msix_nr {
1902 __u32 assigned_dev_id;
1903 __u16 entry_nr;
1904 __u16 padding;
1905};
1906
1907#define KVM_MAX_MSIX_PER_DEV 256
1908struct kvm_assigned_msix_entry {
1909 __u32 assigned_dev_id;
1910 __u32 gsi;
1911 __u16 entry; /* The index of entry in the MSI-X table */
1912 __u16 padding[3];
1913};
1914
dbdfea92
CH
1915#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
1916#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
1917
74c98e20
CH
1918/* Available with KVM_CAP_ARM_USER_IRQ */
1919
1920/* Bits for run->s.regs.device_irq_level */
1921#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
1922#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
1923#define KVM_ARM_DEV_PMU (1 << 2)
1924
65a6d8dd
PM
1925struct kvm_hyperv_eventfd {
1926 __u32 conn_id;
1927 __s32 fd;
1928 __u32 flags;
1929 __u32 padding[3];
1930};
1931
1932#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
1933#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
1934
dc6f8d45
CH
1935#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
1936#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
1937
b3c818a4
EF
1938/*
1939 * Arch needs to define the macro after implementing the dirty ring
1940 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
1941 * starting page offset of the dirty ring structures.
1942 */
1943#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
1944#define KVM_DIRTY_LOG_PAGE_OFFSET 0
1945#endif
1946
1947/*
1948 * KVM dirty GFN flags, defined as:
1949 *
1950 * |---------------+---------------+--------------|
1951 * | bit 1 (reset) | bit 0 (dirty) | Status |
1952 * |---------------+---------------+--------------|
1953 * | 0 | 0 | Invalid GFN |
1954 * | 0 | 1 | Dirty GFN |
1955 * | 1 | X | GFN to reset |
1956 * |---------------+---------------+--------------|
1957 *
1958 * Lifecycle of a dirty GFN goes like:
1959 *
1960 * dirtied harvested reset
1961 * 00 -----------> 01 -------------> 1X -------+
1962 * ^ |
1963 * | |
1964 * +------------------------------------------+
1965 *
1966 * The userspace program is only responsible for the 01->1X state
1967 * conversion after harvesting an entry. Also, it must not skip any
1968 * dirty bits, so that dirty bits are always harvested in sequence.
1969 */
278f064e
EH
1970#define KVM_DIRTY_GFN_F_DIRTY _BITUL(0)
1971#define KVM_DIRTY_GFN_F_RESET _BITUL(1)
b3c818a4
EF
1972#define KVM_DIRTY_GFN_F_MASK 0x3
1973
1974/*
1975 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
1976 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
1977 * size of the gfn buffer is decided by the first argument when
1978 * enabling KVM_CAP_DIRTY_LOG_RING.
1979 */
1980struct kvm_dirty_gfn {
1981 __u32 flags;
1982 __u32 slot;
1983 __u64 offset;
1984};
1985
278f064e
EH
1986#define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
1987#define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1)
1988
e4082063
AW
1989#define KVM_PMU_CAP_DISABLE (1 << 0)
1990
327d4b7f
BR
1991/**
1992 * struct kvm_stats_header - Header of per vm/vcpu binary statistics data.
1993 * @flags: Some extra information for header, always 0 for now.
1994 * @name_size: The size in bytes of the memory which contains statistics
1995 * name string including trailing '\0'. The memory is allocated
1996 * at the send of statistics descriptor.
1997 * @num_desc: The number of statistics the vm or vcpu has.
1998 * @id_offset: The offset of the vm/vcpu stats' id string in the file pointed
1999 * by vm/vcpu stats fd.
2000 * @desc_offset: The offset of the vm/vcpu stats' descriptor block in the file
2001 * pointd by vm/vcpu stats fd.
2002 * @data_offset: The offset of the vm/vcpu stats' data block in the file
2003 * pointed by vm/vcpu stats fd.
2004 *
2005 * This is the header userspace needs to read from stats fd before any other
2006 * readings. It is used by userspace to discover all the information about the
2007 * vm/vcpu's binary statistics.
2008 * Userspace reads this header from the start of the vm/vcpu's stats fd.
2009 */
2010struct kvm_stats_header {
2011 __u32 flags;
2012 __u32 name_size;
2013 __u32 num_desc;
2014 __u32 id_offset;
2015 __u32 desc_offset;
2016 __u32 data_offset;
2017};
2018
2019#define KVM_STATS_TYPE_SHIFT 0
2020#define KVM_STATS_TYPE_MASK (0xF << KVM_STATS_TYPE_SHIFT)
2021#define KVM_STATS_TYPE_CUMULATIVE (0x0 << KVM_STATS_TYPE_SHIFT)
2022#define KVM_STATS_TYPE_INSTANT (0x1 << KVM_STATS_TYPE_SHIFT)
2023#define KVM_STATS_TYPE_PEAK (0x2 << KVM_STATS_TYPE_SHIFT)
43709a0c
PB
2024#define KVM_STATS_TYPE_LINEAR_HIST (0x3 << KVM_STATS_TYPE_SHIFT)
2025#define KVM_STATS_TYPE_LOG_HIST (0x4 << KVM_STATS_TYPE_SHIFT)
2026#define KVM_STATS_TYPE_MAX KVM_STATS_TYPE_LOG_HIST
327d4b7f
BR
2027
2028#define KVM_STATS_UNIT_SHIFT 4
2029#define KVM_STATS_UNIT_MASK (0xF << KVM_STATS_UNIT_SHIFT)
2030#define KVM_STATS_UNIT_NONE (0x0 << KVM_STATS_UNIT_SHIFT)
2031#define KVM_STATS_UNIT_BYTES (0x1 << KVM_STATS_UNIT_SHIFT)
2032#define KVM_STATS_UNIT_SECONDS (0x2 << KVM_STATS_UNIT_SHIFT)
2033#define KVM_STATS_UNIT_CYCLES (0x3 << KVM_STATS_UNIT_SHIFT)
105bb7cd 2034#define KVM_STATS_UNIT_BOOLEAN (0x4 << KVM_STATS_UNIT_SHIFT)
327d4b7f
BR
2035#define KVM_STATS_UNIT_MAX KVM_STATS_UNIT_CYCLES
2036
2037#define KVM_STATS_BASE_SHIFT 8
2038#define KVM_STATS_BASE_MASK (0xF << KVM_STATS_BASE_SHIFT)
2039#define KVM_STATS_BASE_POW10 (0x0 << KVM_STATS_BASE_SHIFT)
2040#define KVM_STATS_BASE_POW2 (0x1 << KVM_STATS_BASE_SHIFT)
2041#define KVM_STATS_BASE_MAX KVM_STATS_BASE_POW2
2042
2043/**
2044 * struct kvm_stats_desc - Descriptor of a KVM statistics.
2045 * @flags: Annotations of the stats, like type, unit, etc.
2046 * @exponent: Used together with @flags to determine the unit.
2047 * @size: The number of data items for this stats.
2048 * Every data item is of type __u64.
2049 * @offset: The offset of the stats to the start of stat structure in
43709a0c
PB
2050 * structure kvm or kvm_vcpu.
2051 * @bucket_size: A parameter value used for histogram stats. It is only used
2052 * for linear histogram stats, specifying the size of the bucket;
327d4b7f
BR
2053 * @name: The name string for the stats. Its size is indicated by the
2054 * &kvm_stats_header->name_size.
2055 */
2056struct kvm_stats_desc {
2057 __u32 flags;
2058 __s16 exponent;
2059 __u16 size;
2060 __u32 offset;
43709a0c 2061 __u32 bucket_size;
327d4b7f
BR
2062 char name[];
2063};
2064
2065#define KVM_GET_STATS_FD _IO(KVMIO, 0xce)
2066
1ea5208f
PB
2067/* Available with KVM_CAP_XSAVE2 */
2068#define KVM_GET_XSAVE2 _IOR(KVMIO, 0xcf, struct kvm_xsave)
2069
51b24e34 2070#endif /* __LINUX_KVM_H */