]>
Commit | Line | Data |
---|---|---|
dd873966 | 1 | /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ |
51b24e34 JK |
2 | #ifndef __LINUX_KVM_H |
3 | #define __LINUX_KVM_H | |
4 | ||
5 | /* | |
6 | * Userspace interface for /dev/kvm - kernel based virtual machine | |
7 | * | |
8 | * Note: you must update KVM_API_VERSION if you change this interface. | |
9 | */ | |
10 | ||
278f064e | 11 | #include <linux/const.h> |
51b24e34 JK |
12 | #include <linux/types.h> |
13 | ||
14 | #include <linux/ioctl.h> | |
15 | #include <asm/kvm.h> | |
16 | ||
17 | #define KVM_API_VERSION 12 | |
18 | ||
19 | /* *** Deprecated interfaces *** */ | |
20 | ||
21 | #define KVM_TRC_SHIFT 16 | |
22 | ||
23 | #define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT) | |
24 | #define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1)) | |
25 | ||
26 | #define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01) | |
27 | #define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02) | |
28 | #define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01) | |
29 | ||
30 | #define KVM_TRC_HEAD_SIZE 12 | |
31 | #define KVM_TRC_CYCLE_SIZE 8 | |
32 | #define KVM_TRC_EXTRA_MAX 7 | |
33 | ||
34 | #define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02) | |
35 | #define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03) | |
36 | #define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04) | |
37 | #define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05) | |
38 | #define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06) | |
39 | #define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07) | |
40 | #define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08) | |
41 | #define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09) | |
42 | #define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A) | |
43 | #define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B) | |
44 | #define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C) | |
45 | #define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D) | |
46 | #define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E) | |
47 | #define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F) | |
48 | #define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10) | |
49 | #define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11) | |
50 | #define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12) | |
51 | #define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13) | |
52 | #define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14) | |
53 | #define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15) | |
54 | #define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16) | |
55 | #define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17) | |
56 | #define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18) | |
57 | #define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19) | |
58 | ||
59 | struct kvm_user_trace_setup { | |
60 | __u32 buf_size; | |
61 | __u32 buf_nr; | |
62 | }; | |
63 | ||
64 | #define __KVM_DEPRECATED_MAIN_W_0x06 \ | |
65 | _IOW(KVMIO, 0x06, struct kvm_user_trace_setup) | |
66 | #define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07) | |
67 | #define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08) | |
68 | ||
69 | #define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq) | |
70 | ||
71 | struct kvm_breakpoint { | |
72 | __u32 enabled; | |
73 | __u32 padding; | |
74 | __u64 address; | |
75 | }; | |
76 | ||
77 | struct kvm_debug_guest { | |
78 | __u32 enabled; | |
79 | __u32 pad; | |
80 | struct kvm_breakpoint breakpoints[4]; | |
81 | __u32 singlestep; | |
82 | }; | |
83 | ||
84 | #define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest) | |
85 | ||
86 | /* *** End of deprecated interfaces *** */ | |
87 | ||
88 | ||
89 | /* for KVM_CREATE_MEMORY_REGION */ | |
90 | struct kvm_memory_region { | |
91 | __u32 slot; | |
92 | __u32 flags; | |
93 | __u64 guest_phys_addr; | |
94 | __u64 memory_size; /* bytes */ | |
95 | }; | |
96 | ||
97 | /* for KVM_SET_USER_MEMORY_REGION */ | |
98 | struct kvm_userspace_memory_region { | |
99 | __u32 slot; | |
100 | __u32 flags; | |
101 | __u64 guest_phys_addr; | |
102 | __u64 memory_size; /* bytes */ | |
103 | __u64 userspace_addr; /* start of the userspace allocated memory */ | |
104 | }; | |
105 | ||
716b8e4d AW |
106 | /* |
107 | * The bit 0 ~ bit 15 of kvm_memory_region::flags are visible for userspace, | |
108 | * other bits are reserved for kvm internal use which are defined in | |
109 | * include/linux/kvm_host.h. | |
110 | */ | |
111 | #define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0) | |
112 | #define KVM_MEM_READONLY (1UL << 1) | |
51b24e34 JK |
113 | |
114 | /* for KVM_IRQ_LINE */ | |
115 | struct kvm_irq_level { | |
116 | /* | |
117 | * ACPI gsi notion of irq. | |
118 | * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47.. | |
119 | * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23.. | |
f76b348e | 120 | * For ARM: See Documentation/virt/kvm/api.rst |
51b24e34 JK |
121 | */ |
122 | union { | |
123 | __u32 irq; | |
124 | __s32 status; | |
125 | }; | |
126 | __u32 level; | |
127 | }; | |
128 | ||
129 | ||
130 | struct kvm_irqchip { | |
131 | __u32 chip_id; | |
132 | __u32 pad; | |
133 | union { | |
134 | char dummy[512]; /* reserving space */ | |
135 | #ifdef __KVM_HAVE_PIT | |
136 | struct kvm_pic_state pic; | |
137 | #endif | |
138 | #ifdef __KVM_HAVE_IOAPIC | |
139 | struct kvm_ioapic_state ioapic; | |
140 | #endif | |
141 | } chip; | |
142 | }; | |
143 | ||
144 | /* for KVM_CREATE_PIT2 */ | |
145 | struct kvm_pit_config { | |
146 | __u32 flags; | |
147 | __u32 pad[15]; | |
148 | }; | |
149 | ||
150 | #define KVM_PIT_SPEAKER_DUMMY 1 | |
151 | ||
7a52ce8a CH |
152 | struct kvm_s390_skeys { |
153 | __u64 start_gfn; | |
154 | __u64 count; | |
155 | __u64 skeydata_addr; | |
156 | __u32 flags; | |
157 | __u32 reserved[9]; | |
158 | }; | |
fff02bc0 | 159 | |
3272f0e2 CB |
160 | #define KVM_S390_CMMA_PEEK (1 << 0) |
161 | ||
162 | /** | |
163 | * kvm_s390_cmma_log - Used for CMMA migration. | |
164 | * | |
165 | * Used both for input and output. | |
166 | * | |
167 | * @start_gfn: Guest page number to start from. | |
168 | * @count: Size of the result buffer. | |
169 | * @flags: Control operation mode via KVM_S390_CMMA_* flags | |
170 | * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty | |
171 | * pages are still remaining. | |
172 | * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set | |
173 | * in the PGSTE. | |
174 | * @values: Pointer to the values buffer. | |
175 | * | |
176 | * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls. | |
177 | */ | |
178 | struct kvm_s390_cmma_log { | |
179 | __u64 start_gfn; | |
180 | __u32 count; | |
181 | __u32 flags; | |
182 | union { | |
183 | __u64 remaining; | |
184 | __u64 mask; | |
185 | }; | |
186 | __u64 values; | |
187 | }; | |
188 | ||
fff02bc0 PB |
189 | struct kvm_hyperv_exit { |
190 | #define KVM_EXIT_HYPERV_SYNIC 1 | |
b89485a5 | 191 | #define KVM_EXIT_HYPERV_HCALL 2 |
f76b348e | 192 | #define KVM_EXIT_HYPERV_SYNDBG 3 |
fff02bc0 | 193 | __u32 type; |
f76b348e | 194 | __u32 pad1; |
fff02bc0 PB |
195 | union { |
196 | struct { | |
197 | __u32 msr; | |
f76b348e | 198 | __u32 pad2; |
fff02bc0 PB |
199 | __u64 control; |
200 | __u64 evt_page; | |
201 | __u64 msg_page; | |
202 | } synic; | |
b89485a5 PB |
203 | struct { |
204 | __u64 input; | |
205 | __u64 result; | |
206 | __u64 params[2]; | |
207 | } hcall; | |
f76b348e CH |
208 | struct { |
209 | __u32 msr; | |
210 | __u32 pad2; | |
211 | __u64 control; | |
212 | __u64 status; | |
213 | __u64 send_page; | |
214 | __u64 recv_page; | |
215 | __u64 pending_page; | |
216 | } syndbg; | |
fff02bc0 PB |
217 | } u; |
218 | }; | |
219 | ||
278f064e EH |
220 | struct kvm_xen_exit { |
221 | #define KVM_EXIT_XEN_HCALL 1 | |
222 | __u32 type; | |
223 | union { | |
224 | struct { | |
225 | __u32 longmode; | |
226 | __u32 cpl; | |
227 | __u64 input; | |
228 | __u64 result; | |
229 | __u64 params[6]; | |
230 | } hcall; | |
231 | } u; | |
232 | }; | |
233 | ||
7a52ce8a CH |
234 | #define KVM_S390_GET_SKEYS_NONE 1 |
235 | #define KVM_S390_SKEYS_MAX 1048576 | |
236 | ||
51b24e34 JK |
237 | #define KVM_EXIT_UNKNOWN 0 |
238 | #define KVM_EXIT_EXCEPTION 1 | |
239 | #define KVM_EXIT_IO 2 | |
240 | #define KVM_EXIT_HYPERCALL 3 | |
241 | #define KVM_EXIT_DEBUG 4 | |
242 | #define KVM_EXIT_HLT 5 | |
243 | #define KVM_EXIT_MMIO 6 | |
244 | #define KVM_EXIT_IRQ_WINDOW_OPEN 7 | |
245 | #define KVM_EXIT_SHUTDOWN 8 | |
246 | #define KVM_EXIT_FAIL_ENTRY 9 | |
247 | #define KVM_EXIT_INTR 10 | |
248 | #define KVM_EXIT_SET_TPR 11 | |
249 | #define KVM_EXIT_TPR_ACCESS 12 | |
250 | #define KVM_EXIT_S390_SIEIC 13 | |
251 | #define KVM_EXIT_S390_RESET 14 | |
a9fd1654 | 252 | #define KVM_EXIT_DCR 15 /* deprecated */ |
51b24e34 JK |
253 | #define KVM_EXIT_NMI 16 |
254 | #define KVM_EXIT_INTERNAL_ERROR 17 | |
255 | #define KVM_EXIT_OSI 18 | |
7c6da3de | 256 | #define KVM_EXIT_PAPR_HCALL 19 |
1529ae1b | 257 | #define KVM_EXIT_S390_UCONTROL 20 |
d4834ff9 | 258 | #define KVM_EXIT_WATCHDOG 21 |
d3dccee1 AG |
259 | #define KVM_EXIT_S390_TSCH 22 |
260 | #define KVM_EXIT_EPR 23 | |
b061808d | 261 | #define KVM_EXIT_SYSTEM_EVENT 24 |
7a52ce8a | 262 | #define KVM_EXIT_S390_STSI 25 |
3a824b15 | 263 | #define KVM_EXIT_IOAPIC_EOI 26 |
fff02bc0 | 264 | #define KVM_EXIT_HYPERV 27 |
2a886794 | 265 | #define KVM_EXIT_ARM_NISV 28 |
53ba2eee MR |
266 | #define KVM_EXIT_X86_RDMSR 29 |
267 | #define KVM_EXIT_X86_WRMSR 30 | |
b3c818a4 | 268 | #define KVM_EXIT_DIRTY_RING_FULL 31 |
278f064e EH |
269 | #define KVM_EXIT_AP_RESET_HOLD 32 |
270 | #define KVM_EXIT_X86_BUS_LOCK 33 | |
271 | #define KVM_EXIT_XEN 34 | |
43709a0c | 272 | #define KVM_EXIT_RISCV_SBI 35 |
51b24e34 JK |
273 | |
274 | /* For KVM_EXIT_INTERNAL_ERROR */ | |
d4834ff9 AG |
275 | /* Emulate instruction failed. */ |
276 | #define KVM_INTERNAL_ERROR_EMULATION 1 | |
277 | /* Encounter unexpected simultaneous exceptions. */ | |
278 | #define KVM_INTERNAL_ERROR_SIMUL_EX 2 | |
279 | /* Encounter unexpected vm-exit due to delivery event. */ | |
280 | #define KVM_INTERNAL_ERROR_DELIVERY_EV 3 | |
f363d039 EA |
281 | /* Encounter unexpected vm-exit reason */ |
282 | #define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4 | |
51b24e34 | 283 | |
327d4b7f BR |
284 | /* Flags that describe what fields in emulation_failure hold valid data. */ |
285 | #define KVM_INTERNAL_ERROR_EMULATION_FLAG_INSTRUCTION_BYTES (1ULL << 0) | |
286 | ||
51b24e34 JK |
287 | /* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */ |
288 | struct kvm_run { | |
289 | /* in */ | |
290 | __u8 request_interrupt_window; | |
3a5eb5b4 PB |
291 | __u8 immediate_exit; |
292 | __u8 padding1[6]; | |
51b24e34 JK |
293 | |
294 | /* out */ | |
295 | __u32 exit_reason; | |
296 | __u8 ready_for_interrupt_injection; | |
297 | __u8 if_flag; | |
24a31426 | 298 | __u16 flags; |
51b24e34 JK |
299 | |
300 | /* in (pre_kvm_run), out (post_kvm_run) */ | |
301 | __u64 cr8; | |
302 | __u64 apic_base; | |
303 | ||
304 | #ifdef __KVM_S390 | |
305 | /* the processor status word for s390 */ | |
306 | __u64 psw_mask; /* psw upper half */ | |
307 | __u64 psw_addr; /* psw lower half */ | |
308 | #endif | |
309 | union { | |
310 | /* KVM_EXIT_UNKNOWN */ | |
311 | struct { | |
312 | __u64 hardware_exit_reason; | |
313 | } hw; | |
314 | /* KVM_EXIT_FAIL_ENTRY */ | |
315 | struct { | |
316 | __u64 hardware_entry_failure_reason; | |
e6546342 | 317 | __u32 cpu; |
51b24e34 JK |
318 | } fail_entry; |
319 | /* KVM_EXIT_EXCEPTION */ | |
320 | struct { | |
321 | __u32 exception; | |
322 | __u32 error_code; | |
323 | } ex; | |
324 | /* KVM_EXIT_IO */ | |
325 | struct { | |
326 | #define KVM_EXIT_IO_IN 0 | |
327 | #define KVM_EXIT_IO_OUT 1 | |
328 | __u8 direction; | |
329 | __u8 size; /* bytes */ | |
330 | __u16 port; | |
331 | __u32 count; | |
332 | __u64 data_offset; /* relative to kvm_run start */ | |
333 | } io; | |
3a824b15 | 334 | /* KVM_EXIT_DEBUG */ |
51b24e34 JK |
335 | struct { |
336 | struct kvm_debug_exit_arch arch; | |
337 | } debug; | |
338 | /* KVM_EXIT_MMIO */ | |
339 | struct { | |
340 | __u64 phys_addr; | |
341 | __u8 data[8]; | |
342 | __u32 len; | |
343 | __u8 is_write; | |
344 | } mmio; | |
345 | /* KVM_EXIT_HYPERCALL */ | |
346 | struct { | |
347 | __u64 nr; | |
348 | __u64 args[6]; | |
349 | __u64 ret; | |
350 | __u32 longmode; | |
351 | __u32 pad; | |
352 | } hypercall; | |
353 | /* KVM_EXIT_TPR_ACCESS */ | |
354 | struct { | |
355 | __u64 rip; | |
356 | __u32 is_write; | |
357 | __u32 pad; | |
358 | } tpr_access; | |
359 | /* KVM_EXIT_S390_SIEIC */ | |
360 | struct { | |
361 | __u8 icptcode; | |
362 | __u16 ipa; | |
363 | __u32 ipb; | |
364 | } s390_sieic; | |
365 | /* KVM_EXIT_S390_RESET */ | |
366 | #define KVM_S390_RESET_POR 1 | |
367 | #define KVM_S390_RESET_CLEAR 2 | |
368 | #define KVM_S390_RESET_SUBSYSTEM 4 | |
369 | #define KVM_S390_RESET_CPU_INIT 8 | |
370 | #define KVM_S390_RESET_IPL 16 | |
371 | __u64 s390_reset_flags; | |
1529ae1b AG |
372 | /* KVM_EXIT_S390_UCONTROL */ |
373 | struct { | |
374 | __u64 trans_exc_code; | |
375 | __u32 pgm_code; | |
376 | } s390_ucontrol; | |
a9fd1654 | 377 | /* KVM_EXIT_DCR (deprecated) */ |
51b24e34 JK |
378 | struct { |
379 | __u32 dcrn; | |
380 | __u32 data; | |
381 | __u8 is_write; | |
382 | } dcr; | |
3a824b15 | 383 | /* KVM_EXIT_INTERNAL_ERROR */ |
51b24e34 JK |
384 | struct { |
385 | __u32 suberror; | |
386 | /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */ | |
387 | __u32 ndata; | |
388 | __u64 data[16]; | |
389 | } internal; | |
327d4b7f BR |
390 | /* |
391 | * KVM_INTERNAL_ERROR_EMULATION | |
392 | * | |
393 | * "struct emulation_failure" is an overlay of "struct internal" | |
394 | * that is used for the KVM_INTERNAL_ERROR_EMULATION sub-type of | |
395 | * KVM_EXIT_INTERNAL_ERROR. Note, unlike other internal error | |
396 | * sub-types, this struct is ABI! It also needs to be backwards | |
397 | * compatible with "struct internal". Take special care that | |
398 | * "ndata" is correct, that new fields are enumerated in "flags", | |
399 | * and that each flag enumerates fields that are 64-bit aligned | |
400 | * and sized (so that ndata+internal.data[] is valid/accurate). | |
43709a0c PB |
401 | * |
402 | * Space beyond the defined fields may be used to store arbitrary | |
403 | * debug information relating to the emulation failure. It is | |
404 | * accounted for in "ndata" but the format is unspecified and is | |
405 | * not represented in "flags". Any such information is *not* ABI! | |
327d4b7f BR |
406 | */ |
407 | struct { | |
408 | __u32 suberror; | |
409 | __u32 ndata; | |
410 | __u64 flags; | |
43709a0c PB |
411 | union { |
412 | struct { | |
413 | __u8 insn_size; | |
414 | __u8 insn_bytes[15]; | |
415 | }; | |
416 | }; | |
417 | /* Arbitrary debug data may follow. */ | |
327d4b7f | 418 | } emulation_failure; |
51b24e34 JK |
419 | /* KVM_EXIT_OSI */ |
420 | struct { | |
421 | __u64 gprs[32]; | |
422 | } osi; | |
3a824b15 | 423 | /* KVM_EXIT_PAPR_HCALL */ |
7c6da3de AG |
424 | struct { |
425 | __u64 nr; | |
426 | __u64 ret; | |
427 | __u64 args[9]; | |
428 | } papr_hcall; | |
d3dccee1 AG |
429 | /* KVM_EXIT_S390_TSCH */ |
430 | struct { | |
431 | __u16 subchannel_id; | |
432 | __u16 subchannel_nr; | |
433 | __u32 io_int_parm; | |
434 | __u32 io_int_word; | |
435 | __u32 ipb; | |
436 | __u8 dequeued; | |
437 | } s390_tsch; | |
438 | /* KVM_EXIT_EPR */ | |
439 | struct { | |
440 | __u32 epr; | |
441 | } epr; | |
b061808d AG |
442 | /* KVM_EXIT_SYSTEM_EVENT */ |
443 | struct { | |
444 | #define KVM_SYSTEM_EVENT_SHUTDOWN 1 | |
445 | #define KVM_SYSTEM_EVENT_RESET 2 | |
120758fb | 446 | #define KVM_SYSTEM_EVENT_CRASH 3 |
b061808d AG |
447 | __u32 type; |
448 | __u64 flags; | |
449 | } system_event; | |
7a52ce8a CH |
450 | /* KVM_EXIT_S390_STSI */ |
451 | struct { | |
452 | __u64 addr; | |
453 | __u8 ar; | |
454 | __u8 reserved; | |
455 | __u8 fc; | |
456 | __u8 sel1; | |
457 | __u16 sel2; | |
458 | } s390_stsi; | |
3a824b15 PB |
459 | /* KVM_EXIT_IOAPIC_EOI */ |
460 | struct { | |
461 | __u8 vector; | |
462 | } eoi; | |
fff02bc0 PB |
463 | /* KVM_EXIT_HYPERV */ |
464 | struct kvm_hyperv_exit hyperv; | |
2a886794 GK |
465 | /* KVM_EXIT_ARM_NISV */ |
466 | struct { | |
467 | __u64 esr_iss; | |
468 | __u64 fault_ipa; | |
469 | } arm_nisv; | |
53ba2eee MR |
470 | /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */ |
471 | struct { | |
472 | __u8 error; /* user -> kernel */ | |
473 | __u8 pad[7]; | |
474 | #define KVM_MSR_EXIT_REASON_INVAL (1 << 0) | |
475 | #define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1) | |
476 | #define KVM_MSR_EXIT_REASON_FILTER (1 << 2) | |
477 | __u32 reason; /* kernel -> user */ | |
478 | __u32 index; /* kernel -> user */ | |
479 | __u64 data; /* kernel <-> user */ | |
480 | } msr; | |
278f064e EH |
481 | /* KVM_EXIT_XEN */ |
482 | struct kvm_xen_exit xen; | |
43709a0c PB |
483 | /* KVM_EXIT_RISCV_SBI */ |
484 | struct { | |
485 | unsigned long extension_id; | |
486 | unsigned long function_id; | |
487 | unsigned long args[6]; | |
488 | unsigned long ret[2]; | |
489 | } riscv_sbi; | |
51b24e34 JK |
490 | /* Fix the size of the union. */ |
491 | char padding[256]; | |
492 | }; | |
1529ae1b | 493 | |
65a6d8dd PM |
494 | /* 2048 is the size of the char array used to bound/pad the size |
495 | * of the union that holds sync regs. | |
496 | */ | |
497 | #define SYNC_REGS_SIZE_BYTES 2048 | |
1529ae1b AG |
498 | /* |
499 | * shared registers between kvm and userspace. | |
500 | * kvm_valid_regs specifies the register classes set by the host | |
501 | * kvm_dirty_regs specified the register classes dirtied by userspace | |
502 | * struct kvm_sync_regs is architecture specific, as well as the | |
503 | * bits for kvm_valid_regs and kvm_dirty_regs | |
504 | */ | |
505 | __u64 kvm_valid_regs; | |
506 | __u64 kvm_dirty_regs; | |
507 | union { | |
508 | struct kvm_sync_regs regs; | |
65a6d8dd | 509 | char padding[SYNC_REGS_SIZE_BYTES]; |
1529ae1b | 510 | } s; |
51b24e34 JK |
511 | }; |
512 | ||
513 | /* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */ | |
514 | ||
515 | struct kvm_coalesced_mmio_zone { | |
516 | __u64 addr; | |
517 | __u32 size; | |
966f2ec3 PB |
518 | union { |
519 | __u32 pad; | |
520 | __u32 pio; | |
521 | }; | |
51b24e34 JK |
522 | }; |
523 | ||
524 | struct kvm_coalesced_mmio { | |
525 | __u64 phys_addr; | |
526 | __u32 len; | |
966f2ec3 PB |
527 | union { |
528 | __u32 pad; | |
529 | __u32 pio; | |
530 | }; | |
51b24e34 JK |
531 | __u8 data[8]; |
532 | }; | |
533 | ||
534 | struct kvm_coalesced_mmio_ring { | |
535 | __u32 first, last; | |
536 | struct kvm_coalesced_mmio coalesced_mmio[0]; | |
537 | }; | |
538 | ||
539 | #define KVM_COALESCED_MMIO_MAX \ | |
540 | ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \ | |
541 | sizeof(struct kvm_coalesced_mmio)) | |
542 | ||
543 | /* for KVM_TRANSLATE */ | |
544 | struct kvm_translation { | |
545 | /* in */ | |
546 | __u64 linear_address; | |
547 | ||
548 | /* out */ | |
549 | __u64 physical_address; | |
550 | __u8 valid; | |
551 | __u8 writeable; | |
552 | __u8 usermode; | |
553 | __u8 pad[5]; | |
554 | }; | |
555 | ||
7a52ce8a CH |
556 | /* for KVM_S390_MEM_OP */ |
557 | struct kvm_s390_mem_op { | |
558 | /* in */ | |
559 | __u64 gaddr; /* the guest address */ | |
560 | __u64 flags; /* flags */ | |
561 | __u32 size; /* amount of bytes */ | |
562 | __u32 op; /* type of operation */ | |
563 | __u64 buf; /* buffer in userspace */ | |
dc6f8d45 CH |
564 | union { |
565 | __u8 ar; /* the access register number */ | |
566 | __u32 sida_offset; /* offset into the sida */ | |
567 | __u8 reserved[32]; /* should be set to 0 */ | |
568 | }; | |
7a52ce8a CH |
569 | }; |
570 | /* types for kvm_s390_mem_op->op */ | |
571 | #define KVM_S390_MEMOP_LOGICAL_READ 0 | |
572 | #define KVM_S390_MEMOP_LOGICAL_WRITE 1 | |
dc6f8d45 CH |
573 | #define KVM_S390_MEMOP_SIDA_READ 2 |
574 | #define KVM_S390_MEMOP_SIDA_WRITE 3 | |
7a52ce8a CH |
575 | /* flags for kvm_s390_mem_op->flags */ |
576 | #define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0) | |
577 | #define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1) | |
578 | ||
51b24e34 JK |
579 | /* for KVM_INTERRUPT */ |
580 | struct kvm_interrupt { | |
581 | /* in */ | |
582 | __u32 irq; | |
583 | }; | |
584 | ||
585 | /* for KVM_GET_DIRTY_LOG */ | |
586 | struct kvm_dirty_log { | |
587 | __u32 slot; | |
588 | __u32 padding1; | |
589 | union { | |
590 | void *dirty_bitmap; /* one bit per page */ | |
591 | __u64 padding2; | |
592 | }; | |
593 | }; | |
594 | ||
da054c64 PB |
595 | /* for KVM_CLEAR_DIRTY_LOG */ |
596 | struct kvm_clear_dirty_log { | |
597 | __u32 slot; | |
598 | __u32 num_pages; | |
599 | __u64 first_page; | |
600 | union { | |
601 | void *dirty_bitmap; /* one bit per page */ | |
602 | __u64 padding2; | |
603 | }; | |
604 | }; | |
605 | ||
51b24e34 JK |
606 | /* for KVM_SET_SIGNAL_MASK */ |
607 | struct kvm_signal_mask { | |
608 | __u32 len; | |
609 | __u8 sigset[0]; | |
610 | }; | |
611 | ||
612 | /* for KVM_TPR_ACCESS_REPORTING */ | |
613 | struct kvm_tpr_access_ctl { | |
614 | __u32 enabled; | |
615 | __u32 flags; | |
616 | __u32 reserved[8]; | |
617 | }; | |
618 | ||
619 | /* for KVM_SET_VAPIC_ADDR */ | |
620 | struct kvm_vapic_addr { | |
621 | __u64 vapic_addr; | |
622 | }; | |
623 | ||
a9fd1654 | 624 | /* for KVM_SET_MP_STATE */ |
51b24e34 | 625 | |
a9fd1654 | 626 | /* not all states are valid on all architectures */ |
51b24e34 JK |
627 | #define KVM_MP_STATE_RUNNABLE 0 |
628 | #define KVM_MP_STATE_UNINITIALIZED 1 | |
629 | #define KVM_MP_STATE_INIT_RECEIVED 2 | |
630 | #define KVM_MP_STATE_HALTED 3 | |
631 | #define KVM_MP_STATE_SIPI_RECEIVED 4 | |
a9fd1654 JF |
632 | #define KVM_MP_STATE_STOPPED 5 |
633 | #define KVM_MP_STATE_CHECK_STOP 6 | |
634 | #define KVM_MP_STATE_OPERATING 7 | |
635 | #define KVM_MP_STATE_LOAD 8 | |
278f064e | 636 | #define KVM_MP_STATE_AP_RESET_HOLD 9 |
51b24e34 JK |
637 | |
638 | struct kvm_mp_state { | |
639 | __u32 mp_state; | |
640 | }; | |
641 | ||
642 | struct kvm_s390_psw { | |
643 | __u64 mask; | |
644 | __u64 addr; | |
645 | }; | |
646 | ||
647 | /* valid values for type in kvm_s390_interrupt */ | |
648 | #define KVM_S390_SIGP_STOP 0xfffe0000u | |
649 | #define KVM_S390_PROGRAM_INT 0xfffe0001u | |
650 | #define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u | |
651 | #define KVM_S390_RESTART 0xfffe0003u | |
216db403 CB |
652 | #define KVM_S390_INT_PFAULT_INIT 0xfffe0004u |
653 | #define KVM_S390_INT_PFAULT_DONE 0xfffe0005u | |
d3dccee1 | 654 | #define KVM_S390_MCHK 0xfffe1000u |
76eb98d5 JF |
655 | #define KVM_S390_INT_CLOCK_COMP 0xffff1004u |
656 | #define KVM_S390_INT_CPU_TIMER 0xffff1005u | |
51b24e34 JK |
657 | #define KVM_S390_INT_VIRTIO 0xffff2603u |
658 | #define KVM_S390_INT_SERVICE 0xffff2401u | |
659 | #define KVM_S390_INT_EMERGENCY 0xffff1201u | |
1529ae1b | 660 | #define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u |
d3dccee1 AG |
661 | /* Anything below 0xfffe0000u is taken by INT_IO */ |
662 | #define KVM_S390_INT_IO(ai,cssid,ssid,schid) \ | |
663 | (((schid)) | \ | |
664 | ((ssid) << 16) | \ | |
665 | ((cssid) << 18) | \ | |
666 | ((ai) << 26)) | |
667 | #define KVM_S390_INT_IO_MIN 0x00000000u | |
668 | #define KVM_S390_INT_IO_MAX 0xfffdffffu | |
120758fb | 669 | #define KVM_S390_INT_IO_AI_MASK 0x04000000u |
d3dccee1 | 670 | |
51b24e34 JK |
671 | |
672 | struct kvm_s390_interrupt { | |
673 | __u32 type; | |
674 | __u32 parm; | |
675 | __u64 parm64; | |
676 | }; | |
677 | ||
216db403 CB |
678 | struct kvm_s390_io_info { |
679 | __u16 subchannel_id; | |
680 | __u16 subchannel_nr; | |
681 | __u32 io_int_parm; | |
682 | __u32 io_int_word; | |
683 | }; | |
684 | ||
685 | struct kvm_s390_ext_info { | |
686 | __u32 ext_params; | |
687 | __u32 pad; | |
688 | __u64 ext_params2; | |
689 | }; | |
690 | ||
691 | struct kvm_s390_pgm_info { | |
692 | __u64 trans_exc_code; | |
693 | __u64 mon_code; | |
694 | __u64 per_address; | |
695 | __u32 data_exc_code; | |
696 | __u16 code; | |
697 | __u16 mon_class_nr; | |
698 | __u8 per_code; | |
699 | __u8 per_atmid; | |
700 | __u8 exc_access_id; | |
701 | __u8 per_access_id; | |
702 | __u8 op_access_id; | |
66fb2d54 CH |
703 | #define KVM_S390_PGM_FLAGS_ILC_VALID 0x01 |
704 | #define KVM_S390_PGM_FLAGS_ILC_0 0x02 | |
705 | #define KVM_S390_PGM_FLAGS_ILC_1 0x04 | |
706 | #define KVM_S390_PGM_FLAGS_ILC_MASK 0x06 | |
707 | #define KVM_S390_PGM_FLAGS_NO_REWIND 0x08 | |
708 | __u8 flags; | |
709 | __u8 pad[2]; | |
216db403 CB |
710 | }; |
711 | ||
712 | struct kvm_s390_prefix_info { | |
713 | __u32 address; | |
714 | }; | |
715 | ||
716 | struct kvm_s390_extcall_info { | |
717 | __u16 code; | |
718 | }; | |
719 | ||
720 | struct kvm_s390_emerg_info { | |
721 | __u16 code; | |
722 | }; | |
723 | ||
51628b18 CB |
724 | #define KVM_S390_STOP_FLAG_STORE_STATUS 0x01 |
725 | struct kvm_s390_stop_info { | |
726 | __u32 flags; | |
727 | }; | |
728 | ||
216db403 CB |
729 | struct kvm_s390_mchk_info { |
730 | __u64 cr14; | |
731 | __u64 mcic; | |
732 | __u64 failing_storage_address; | |
733 | __u32 ext_damage_code; | |
734 | __u32 pad; | |
735 | __u8 fixed_logout[16]; | |
736 | }; | |
737 | ||
738 | struct kvm_s390_irq { | |
739 | __u64 type; | |
740 | union { | |
741 | struct kvm_s390_io_info io; | |
742 | struct kvm_s390_ext_info ext; | |
743 | struct kvm_s390_pgm_info pgm; | |
744 | struct kvm_s390_emerg_info emerg; | |
745 | struct kvm_s390_extcall_info extcall; | |
746 | struct kvm_s390_prefix_info prefix; | |
51628b18 | 747 | struct kvm_s390_stop_info stop; |
216db403 CB |
748 | struct kvm_s390_mchk_info mchk; |
749 | char reserved[64]; | |
750 | } u; | |
751 | }; | |
752 | ||
7a52ce8a CH |
753 | struct kvm_s390_irq_state { |
754 | __u64 buf; | |
9cbb6362 | 755 | __u32 flags; /* will stay unused for compatibility reasons */ |
7a52ce8a | 756 | __u32 len; |
9cbb6362 | 757 | __u32 reserved[4]; /* will stay unused for compatibility reasons */ |
7a52ce8a CH |
758 | }; |
759 | ||
51b24e34 JK |
760 | /* for KVM_SET_GUEST_DEBUG */ |
761 | ||
762 | #define KVM_GUESTDBG_ENABLE 0x00000001 | |
763 | #define KVM_GUESTDBG_SINGLESTEP 0x00000002 | |
764 | ||
765 | struct kvm_guest_debug { | |
766 | __u32 control; | |
767 | __u32 pad; | |
768 | struct kvm_guest_debug_arch arch; | |
769 | }; | |
770 | ||
771 | enum { | |
772 | kvm_ioeventfd_flag_nr_datamatch, | |
773 | kvm_ioeventfd_flag_nr_pio, | |
774 | kvm_ioeventfd_flag_nr_deassign, | |
cae7f586 | 775 | kvm_ioeventfd_flag_nr_virtio_ccw_notify, |
76eb98d5 | 776 | kvm_ioeventfd_flag_nr_fast_mmio, |
51b24e34 JK |
777 | kvm_ioeventfd_flag_nr_max, |
778 | }; | |
779 | ||
780 | #define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch) | |
781 | #define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio) | |
782 | #define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign) | |
cae7f586 AG |
783 | #define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \ |
784 | (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify) | |
51b24e34 JK |
785 | |
786 | #define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1) | |
787 | ||
788 | struct kvm_ioeventfd { | |
789 | __u64 datamatch; | |
790 | __u64 addr; /* legal pio/mmio address */ | |
76eb98d5 | 791 | __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */ |
51b24e34 JK |
792 | __s32 fd; |
793 | __u32 flags; | |
794 | __u8 pad[36]; | |
795 | }; | |
796 | ||
65a6d8dd | 797 | #define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0) |
77d361b1 | 798 | #define KVM_X86_DISABLE_EXITS_HLT (1 << 1) |
65a6d8dd | 799 | #define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2) |
d38d201f | 800 | #define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3) |
65a6d8dd | 801 | #define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \ |
77d361b1 | 802 | KVM_X86_DISABLE_EXITS_HLT | \ |
d38d201f WL |
803 | KVM_X86_DISABLE_EXITS_PAUSE | \ |
804 | KVM_X86_DISABLE_EXITS_CSTATE) | |
65a6d8dd | 805 | |
51b24e34 JK |
806 | /* for KVM_ENABLE_CAP */ |
807 | struct kvm_enable_cap { | |
808 | /* in */ | |
809 | __u32 cap; | |
810 | __u32 flags; | |
811 | __u64 args[4]; | |
812 | __u8 pad[64]; | |
813 | }; | |
814 | ||
815 | /* for KVM_PPC_GET_PVINFO */ | |
3a5eb5b4 PB |
816 | |
817 | #define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0) | |
818 | ||
51b24e34 JK |
819 | struct kvm_ppc_pvinfo { |
820 | /* out */ | |
821 | __u32 flags; | |
822 | __u32 hcall[4]; | |
823 | __u8 pad[108]; | |
824 | }; | |
825 | ||
80a3eb10 JK |
826 | /* for KVM_PPC_GET_SMMU_INFO */ |
827 | #define KVM_PPC_PAGE_SIZES_MAX_SZ 8 | |
828 | ||
829 | struct kvm_ppc_one_page_size { | |
830 | __u32 page_shift; /* Page shift (or 0) */ | |
831 | __u32 pte_enc; /* Encoding in the HPTE (>>12) */ | |
832 | }; | |
833 | ||
834 | struct kvm_ppc_one_seg_page_size { | |
835 | __u32 page_shift; /* Base page shift of segment (or 0) */ | |
836 | __u32 slb_enc; /* SLB encoding for BookS */ | |
837 | struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ]; | |
838 | }; | |
839 | ||
840 | #define KVM_PPC_PAGE_SIZES_REAL 0x00000001 | |
841 | #define KVM_PPC_1T_SEGMENTS 0x00000002 | |
966f2ec3 | 842 | #define KVM_PPC_NO_HASH 0x00000004 |
80a3eb10 JK |
843 | |
844 | struct kvm_ppc_smmu_info { | |
845 | __u64 flags; | |
846 | __u32 slb_size; | |
d4083f50 AP |
847 | __u16 data_keys; /* # storage keys supported for data */ |
848 | __u16 instr_keys; /* # storage keys supported for instructions */ | |
80a3eb10 JK |
849 | struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ]; |
850 | }; | |
851 | ||
3a5eb5b4 PB |
852 | /* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */ |
853 | struct kvm_ppc_resize_hpt { | |
854 | __u64 flags; | |
855 | __u32 shift; | |
856 | __u32 pad; | |
857 | }; | |
d4834ff9 | 858 | |
51b24e34 JK |
859 | #define KVMIO 0xAE |
860 | ||
1529ae1b AG |
861 | /* machine type bits, to be used as argument to KVM_CREATE_VM */ |
862 | #define KVM_VM_S390_UCONTROL 1 | |
863 | ||
bf63839f AW |
864 | /* on ppc, 0 indicate default, 1 should force HV and 2 PR */ |
865 | #define KVM_VM_PPC_HV 1 | |
866 | #define KVM_VM_PPC_PR 2 | |
867 | ||
94c7fefc AJ |
868 | /* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */ |
869 | #define KVM_VM_MIPS_AUTO 0 | |
74c98e20 | 870 | #define KVM_VM_MIPS_VZ 1 |
94c7fefc | 871 | #define KVM_VM_MIPS_TE 2 |
74c98e20 | 872 | |
1529ae1b AG |
873 | #define KVM_S390_SIE_PAGE_OFFSET 1 |
874 | ||
da054c64 PB |
875 | /* |
876 | * On arm64, machine type can be used to request the physical | |
877 | * address size for the VM. Bits[7-0] are reserved for the guest | |
878 | * PA size shift (i.e, log2(PA_Size)). For backward compatibility, | |
879 | * value 0 implies the default IPA size, 40bits. | |
880 | */ | |
881 | #define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL | |
882 | #define KVM_VM_TYPE_ARM_IPA_SIZE(x) \ | |
883 | ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK) | |
51b24e34 JK |
884 | /* |
885 | * ioctls for /dev/kvm fds: | |
886 | */ | |
887 | #define KVM_GET_API_VERSION _IO(KVMIO, 0x00) | |
888 | #define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */ | |
889 | #define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list) | |
890 | ||
891 | #define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06) | |
892 | /* | |
893 | * Check if a kvm extension is available. Argument is extension number, | |
894 | * return is 1 (yes) or 0 (no, sorry). | |
895 | */ | |
896 | #define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03) | |
897 | /* | |
898 | * Get size for mmap(vcpu_fd) | |
899 | */ | |
900 | #define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */ | |
901 | #define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2) | |
902 | #define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06 | |
903 | #define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07 | |
904 | #define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08 | |
bf63839f | 905 | #define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2) |
9f2d175d | 906 | #define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list) |
51b24e34 JK |
907 | |
908 | /* | |
909 | * Extension capability list. | |
910 | */ | |
911 | #define KVM_CAP_IRQCHIP 0 | |
912 | #define KVM_CAP_HLT 1 | |
913 | #define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2 | |
914 | #define KVM_CAP_USER_MEMORY 3 | |
915 | #define KVM_CAP_SET_TSS_ADDR 4 | |
916 | #define KVM_CAP_VAPIC 6 | |
917 | #define KVM_CAP_EXT_CPUID 7 | |
918 | #define KVM_CAP_CLOCKSOURCE 8 | |
7c6da3de | 919 | #define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */ |
51b24e34 JK |
920 | #define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */ |
921 | #define KVM_CAP_PIT 11 | |
922 | #define KVM_CAP_NOP_IO_DELAY 12 | |
923 | #define KVM_CAP_PV_MMU 13 | |
924 | #define KVM_CAP_MP_STATE 14 | |
925 | #define KVM_CAP_COALESCED_MMIO 15 | |
926 | #define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */ | |
51b24e34 | 927 | #define KVM_CAP_IOMMU 18 |
51b24e34 JK |
928 | /* Bug in KVM_SET_USER_MEMORY_REGION fixed: */ |
929 | #define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21 | |
51b24e34 | 930 | #define KVM_CAP_USER_NMI 22 |
51b24e34 JK |
931 | #ifdef __KVM_HAVE_GUEST_DEBUG |
932 | #define KVM_CAP_SET_GUEST_DEBUG 23 | |
933 | #endif | |
934 | #ifdef __KVM_HAVE_PIT | |
935 | #define KVM_CAP_REINJECT_CONTROL 24 | |
936 | #endif | |
51b24e34 | 937 | #define KVM_CAP_IRQ_ROUTING 25 |
51b24e34 | 938 | #define KVM_CAP_IRQ_INJECT_STATUS 26 |
51b24e34 JK |
939 | #define KVM_CAP_ASSIGN_DEV_IRQ 29 |
940 | /* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */ | |
941 | #define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30 | |
942 | #ifdef __KVM_HAVE_MCE | |
943 | #define KVM_CAP_MCE 31 | |
944 | #endif | |
945 | #define KVM_CAP_IRQFD 32 | |
946 | #ifdef __KVM_HAVE_PIT | |
947 | #define KVM_CAP_PIT2 33 | |
948 | #endif | |
949 | #define KVM_CAP_SET_BOOT_CPU_ID 34 | |
950 | #ifdef __KVM_HAVE_PIT_STATE2 | |
951 | #define KVM_CAP_PIT_STATE2 35 | |
952 | #endif | |
953 | #define KVM_CAP_IOEVENTFD 36 | |
954 | #define KVM_CAP_SET_IDENTITY_MAP_ADDR 37 | |
955 | #ifdef __KVM_HAVE_XEN_HVM | |
956 | #define KVM_CAP_XEN_HVM 38 | |
957 | #endif | |
958 | #define KVM_CAP_ADJUST_CLOCK 39 | |
959 | #define KVM_CAP_INTERNAL_ERROR_DATA 40 | |
960 | #ifdef __KVM_HAVE_VCPU_EVENTS | |
961 | #define KVM_CAP_VCPU_EVENTS 41 | |
962 | #endif | |
963 | #define KVM_CAP_S390_PSW 42 | |
964 | #define KVM_CAP_PPC_SEGSTATE 43 | |
965 | #define KVM_CAP_HYPERV 44 | |
966 | #define KVM_CAP_HYPERV_VAPIC 45 | |
967 | #define KVM_CAP_HYPERV_SPIN 46 | |
968 | #define KVM_CAP_PCI_SEGMENT 47 | |
969 | #define KVM_CAP_PPC_PAIRED_SINGLES 48 | |
970 | #define KVM_CAP_INTR_SHADOW 49 | |
971 | #ifdef __KVM_HAVE_DEBUGREGS | |
972 | #define KVM_CAP_DEBUGREGS 50 | |
973 | #endif | |
974 | #define KVM_CAP_X86_ROBUST_SINGLESTEP 51 | |
975 | #define KVM_CAP_PPC_OSI 52 | |
976 | #define KVM_CAP_PPC_UNSET_IRQ 53 | |
977 | #define KVM_CAP_ENABLE_CAP 54 | |
978 | #ifdef __KVM_HAVE_XSAVE | |
979 | #define KVM_CAP_XSAVE 55 | |
980 | #endif | |
981 | #ifdef __KVM_HAVE_XCRS | |
982 | #define KVM_CAP_XCRS 56 | |
983 | #endif | |
984 | #define KVM_CAP_PPC_GET_PVINFO 57 | |
985 | #define KVM_CAP_PPC_IRQ_LEVEL 58 | |
986 | #define KVM_CAP_ASYNC_PF 59 | |
987 | #define KVM_CAP_TSC_CONTROL 60 | |
988 | #define KVM_CAP_GET_TSC_KHZ 61 | |
989 | #define KVM_CAP_PPC_BOOKE_SREGS 62 | |
7c6da3de AG |
990 | #define KVM_CAP_SPAPR_TCE 63 |
991 | #define KVM_CAP_PPC_SMT 64 | |
992 | #define KVM_CAP_PPC_RMA 65 | |
993 | #define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */ | |
9d4e4f8c | 994 | #define KVM_CAP_PPC_HIOR 67 |
7c6da3de | 995 | #define KVM_CAP_PPC_PAPR 68 |
a54fc080 | 996 | #define KVM_CAP_SW_TLB 69 |
9d4e4f8c | 997 | #define KVM_CAP_ONE_REG 70 |
1529ae1b AG |
998 | #define KVM_CAP_S390_GMAP 71 |
999 | #define KVM_CAP_TSC_DEADLINE_TIMER 72 | |
1000 | #define KVM_CAP_S390_UCONTROL 73 | |
1001 | #define KVM_CAP_SYNC_REGS 74 | |
9ab2195d MT |
1002 | #define KVM_CAP_PCI_2_3 75 |
1003 | #define KVM_CAP_KVMCLOCK_CTRL 76 | |
80a3eb10 JK |
1004 | #define KVM_CAP_SIGNAL_MSI 77 |
1005 | #define KVM_CAP_PPC_GET_SMMU_INFO 78 | |
2a60dba4 | 1006 | #define KVM_CAP_S390_COW 79 |
651682dc | 1007 | #define KVM_CAP_PPC_ALLOC_HTAB 80 |
716b8e4d | 1008 | #define KVM_CAP_READONLY_MEM 81 |
716b8e4d | 1009 | #define KVM_CAP_IRQFD_RESAMPLE 82 |
d4834ff9 AG |
1010 | #define KVM_CAP_PPC_BOOKE_WATCHDOG 83 |
1011 | #define KVM_CAP_PPC_HTAB_FD 84 | |
d3dccee1 AG |
1012 | #define KVM_CAP_S390_CSS_SUPPORT 85 |
1013 | #define KVM_CAP_PPC_EPR 86 | |
eadd0e44 PM |
1014 | #define KVM_CAP_ARM_PSCI 87 |
1015 | #define KVM_CAP_ARM_SET_DEVICE_ADDR 88 | |
e098b453 AK |
1016 | #define KVM_CAP_DEVICE_CTRL 89 |
1017 | #define KVM_CAP_IRQ_MPIC 90 | |
1018 | #define KVM_CAP_PPC_RTAS 91 | |
1019 | #define KVM_CAP_IRQ_XICS 92 | |
c5daeae1 | 1020 | #define KVM_CAP_ARM_EL1_32BIT 93 |
4f265607 | 1021 | #define KVM_CAP_SPAPR_MULTITCE 94 |
bf63839f | 1022 | #define KVM_CAP_EXT_EMUL_CPUID 95 |
48a5f3bc | 1023 | #define KVM_CAP_HYPERV_TIME 96 |
9ffd2685 CH |
1024 | #define KVM_CAP_IOAPIC_POLARITY_IGNORED 97 |
1025 | #define KVM_CAP_ENABLE_CAP_VM 98 | |
1026 | #define KVM_CAP_S390_IRQCHIP 99 | |
76eb98d5 JF |
1027 | #define KVM_CAP_IOEVENTFD_NO_LENGTH 100 |
1028 | #define KVM_CAP_VM_ATTRIBUTES 101 | |
b061808d AG |
1029 | #define KVM_CAP_ARM_PSCI_0_2 102 |
1030 | #define KVM_CAP_PPC_FIXUP_HCALL 103 | |
a9fd1654 JF |
1031 | #define KVM_CAP_PPC_ENABLE_HCALL 104 |
1032 | #define KVM_CAP_CHECK_EXTENSION_VM 105 | |
51628b18 | 1033 | #define KVM_CAP_S390_USER_SIGP 106 |
7a52ce8a CH |
1034 | #define KVM_CAP_S390_VECTOR_REGISTERS 107 |
1035 | #define KVM_CAP_S390_MEM_OP 108 | |
1036 | #define KVM_CAP_S390_USER_STSI 109 | |
1037 | #define KVM_CAP_S390_SKEYS 110 | |
1038 | #define KVM_CAP_MIPS_FPU 111 | |
1039 | #define KVM_CAP_MIPS_MSA 112 | |
1040 | #define KVM_CAP_S390_INJECT_IRQ 113 | |
1041 | #define KVM_CAP_S390_IRQ_STATE 114 | |
1042 | #define KVM_CAP_PPC_HWRNG 115 | |
24a31426 PB |
1043 | #define KVM_CAP_DISABLE_QUIRKS 116 |
1044 | #define KVM_CAP_X86_SMM 117 | |
1045 | #define KVM_CAP_MULTI_ADDRESS_SPACE 118 | |
3a824b15 PB |
1046 | #define KVM_CAP_GUEST_DEBUG_HW_BPS 119 |
1047 | #define KVM_CAP_GUEST_DEBUG_HW_WPS 120 | |
1048 | #define KVM_CAP_SPLIT_IRQCHIP 121 | |
1049 | #define KVM_CAP_IOEVENTFD_ANY_LENGTH 122 | |
fff02bc0 | 1050 | #define KVM_CAP_HYPERV_SYNIC 123 |
66fb2d54 | 1051 | #define KVM_CAP_S390_RI 124 |
b89485a5 PB |
1052 | #define KVM_CAP_SPAPR_TCE_64 125 |
1053 | #define KVM_CAP_ARM_PMU_V3 126 | |
1054 | #define KVM_CAP_VCPU_ATTRIBUTES 127 | |
ff804f15 | 1055 | #define KVM_CAP_MAX_VCPU_ID 128 |
dbdfea92 CH |
1056 | #define KVM_CAP_X2APIC_API 129 |
1057 | #define KVM_CAP_S390_USER_INSTR0 130 | |
1058 | #define KVM_CAP_MSI_DEVID 131 | |
1059 | #define KVM_CAP_PPC_HTM 132 | |
3a5eb5b4 PB |
1060 | #define KVM_CAP_SPAPR_RESIZE_HPT 133 |
1061 | #define KVM_CAP_PPC_MMU_RADIX 134 | |
1062 | #define KVM_CAP_PPC_MMU_HASH_V3 135 | |
1063 | #define KVM_CAP_IMMEDIATE_EXIT 136 | |
74c98e20 CH |
1064 | #define KVM_CAP_MIPS_VZ 137 |
1065 | #define KVM_CAP_MIPS_TE 138 | |
1066 | #define KVM_CAP_MIPS_64BIT 139 | |
1067 | #define KVM_CAP_S390_GS 140 | |
1068 | #define KVM_CAP_S390_AIS 141 | |
1069 | #define KVM_CAP_SPAPR_TCE_VFIO 142 | |
65a6d8dd | 1070 | #define KVM_CAP_X86_DISABLE_EXITS 143 |
74c98e20 | 1071 | #define KVM_CAP_ARM_USER_IRQ 144 |
3272f0e2 CB |
1072 | #define KVM_CAP_S390_CMMA_MIGRATION 145 |
1073 | #define KVM_CAP_PPC_FWNMI 146 | |
1074 | #define KVM_CAP_PPC_SMT_POSSIBLE 147 | |
ab6e1550 CB |
1075 | #define KVM_CAP_HYPERV_SYNIC2 148 |
1076 | #define KVM_CAP_HYPERV_VP_INDEX 149 | |
dd873966 | 1077 | #define KVM_CAP_S390_AIS_MIGRATION 150 |
9cbb6362 CH |
1078 | #define KVM_CAP_PPC_GET_CPU_CHAR 151 |
1079 | #define KVM_CAP_S390_BPB 152 | |
9f2d175d | 1080 | #define KVM_CAP_GET_MSR_FEATURES 153 |
65a6d8dd | 1081 | #define KVM_CAP_HYPERV_EVENTFD 154 |
77d361b1 | 1082 | #define KVM_CAP_HYPERV_TLBFLUSH 155 |
d36f7de8 CH |
1083 | #define KVM_CAP_S390_HPAGE_1M 156 |
1084 | #define KVM_CAP_NESTED_STATE 157 | |
8f3cd250 CH |
1085 | #define KVM_CAP_ARM_INJECT_SERROR_ESR 158 |
1086 | #define KVM_CAP_MSR_PLATFORM_INFO 159 | |
966f2ec3 PB |
1087 | #define KVM_CAP_PPC_NESTED_HV 160 |
1088 | #define KVM_CAP_HYPERV_SEND_IPI 161 | |
1089 | #define KVM_CAP_COALESCED_PIO 162 | |
1090 | #define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163 | |
1091 | #define KVM_CAP_EXCEPTION_PAYLOAD 164 | |
da054c64 | 1092 | #define KVM_CAP_ARM_VM_IPA_SIZE 165 |
d9cb4336 | 1093 | #define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */ |
da054c64 | 1094 | #define KVM_CAP_HYPERV_CPUID 167 |
d9cb4336 CH |
1095 | #define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168 |
1096 | #define KVM_CAP_PPC_IRQ_XIVE 169 | |
1097 | #define KVM_CAP_ARM_SVE 170 | |
1098 | #define KVM_CAP_ARM_PTRAUTH_ADDRESS 171 | |
1099 | #define KVM_CAP_ARM_PTRAUTH_GENERIC 172 | |
f363d039 EA |
1100 | #define KVM_CAP_PMU_EVENT_FILTER 173 |
1101 | #define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174 | |
1102 | #define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175 | |
2a886794 GK |
1103 | #define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176 |
1104 | #define KVM_CAP_ARM_NISV_TO_USER 177 | |
1105 | #define KVM_CAP_ARM_INJECT_EXT_DABT 178 | |
ddda3748 | 1106 | #define KVM_CAP_S390_VCPU_RESETS 179 |
dc6f8d45 CH |
1107 | #define KVM_CAP_S390_PROTECTED 180 |
1108 | #define KVM_CAP_PPC_SECURE_GUEST 181 | |
f76b348e CH |
1109 | #define KVM_CAP_HALT_POLL 182 |
1110 | #define KVM_CAP_ASYNC_PF_INT 183 | |
e6546342 JW |
1111 | #define KVM_CAP_LAST_CPU 184 |
1112 | #define KVM_CAP_SMALLER_MAXPHYADDR 185 | |
1113 | #define KVM_CAP_S390_DIAG318 186 | |
94c7fefc | 1114 | #define KVM_CAP_STEAL_TIME 187 |
53ba2eee MR |
1115 | #define KVM_CAP_X86_USER_SPACE_MSR 188 |
1116 | #define KVM_CAP_X86_MSR_FILTER 189 | |
1117 | #define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190 | |
b3c818a4 EF |
1118 | #define KVM_CAP_SYS_HYPERV_CPUID 191 |
1119 | #define KVM_CAP_DIRTY_LOG_RING 192 | |
278f064e EH |
1120 | #define KVM_CAP_X86_BUS_LOCK_EXIT 193 |
1121 | #define KVM_CAP_PPC_DAWR1 194 | |
1122 | #define KVM_CAP_SET_GUEST_DEBUG2 195 | |
1123 | #define KVM_CAP_SGX_ATTRIBUTE 196 | |
1124 | #define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197 | |
1125 | #define KVM_CAP_PTP_KVM 198 | |
327d4b7f BR |
1126 | #define KVM_CAP_HYPERV_ENFORCE_CPUID 199 |
1127 | #define KVM_CAP_SREGS2 200 | |
1128 | #define KVM_CAP_EXIT_HYPERCALL 201 | |
1129 | #define KVM_CAP_PPC_RPT_INVALIDATE 202 | |
1130 | #define KVM_CAP_BINARY_STATS_FD 203 | |
1131 | #define KVM_CAP_EXIT_ON_EMULATION_FAILURE 204 | |
1132 | #define KVM_CAP_ARM_MTE 205 | |
ef17dd6a VG |
1133 | #define KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM 206 |
1134 | #define KVM_CAP_VM_GPA_BITS 207 | |
1135 | #define KVM_CAP_XSAVE2 208 | |
1ea5208f | 1136 | #define KVM_CAP_SYS_ATTRIBUTES 209 |
51b24e34 JK |
1137 | |
1138 | #ifdef KVM_CAP_IRQ_ROUTING | |
1139 | ||
1140 | struct kvm_irq_routing_irqchip { | |
1141 | __u32 irqchip; | |
1142 | __u32 pin; | |
1143 | }; | |
1144 | ||
1145 | struct kvm_irq_routing_msi { | |
1146 | __u32 address_lo; | |
1147 | __u32 address_hi; | |
1148 | __u32 data; | |
dbdfea92 CH |
1149 | union { |
1150 | __u32 pad; | |
1151 | __u32 devid; | |
1152 | }; | |
51b24e34 JK |
1153 | }; |
1154 | ||
9ffd2685 CH |
1155 | struct kvm_irq_routing_s390_adapter { |
1156 | __u64 ind_addr; | |
1157 | __u64 summary_addr; | |
1158 | __u64 ind_offset; | |
1159 | __u32 summary_offset; | |
1160 | __u32 adapter_id; | |
1161 | }; | |
1162 | ||
fff02bc0 PB |
1163 | struct kvm_irq_routing_hv_sint { |
1164 | __u32 vcpu; | |
1165 | __u32 sint; | |
1166 | }; | |
1167 | ||
ef17dd6a VG |
1168 | struct kvm_irq_routing_xen_evtchn { |
1169 | __u32 port; | |
1170 | __u32 vcpu; | |
1171 | __u32 priority; | |
1172 | }; | |
1173 | ||
1174 | #define KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL ((__u32)(-1)) | |
1175 | ||
51b24e34 JK |
1176 | /* gsi routing entry types */ |
1177 | #define KVM_IRQ_ROUTING_IRQCHIP 1 | |
1178 | #define KVM_IRQ_ROUTING_MSI 2 | |
9ffd2685 | 1179 | #define KVM_IRQ_ROUTING_S390_ADAPTER 3 |
fff02bc0 | 1180 | #define KVM_IRQ_ROUTING_HV_SINT 4 |
ef17dd6a | 1181 | #define KVM_IRQ_ROUTING_XEN_EVTCHN 5 |
51b24e34 JK |
1182 | |
1183 | struct kvm_irq_routing_entry { | |
1184 | __u32 gsi; | |
1185 | __u32 type; | |
1186 | __u32 flags; | |
1187 | __u32 pad; | |
1188 | union { | |
1189 | struct kvm_irq_routing_irqchip irqchip; | |
1190 | struct kvm_irq_routing_msi msi; | |
9ffd2685 | 1191 | struct kvm_irq_routing_s390_adapter adapter; |
fff02bc0 | 1192 | struct kvm_irq_routing_hv_sint hv_sint; |
ef17dd6a | 1193 | struct kvm_irq_routing_xen_evtchn xen_evtchn; |
51b24e34 JK |
1194 | __u32 pad[8]; |
1195 | } u; | |
1196 | }; | |
1197 | ||
1198 | struct kvm_irq_routing { | |
1199 | __u32 nr; | |
1200 | __u32 flags; | |
1201 | struct kvm_irq_routing_entry entries[0]; | |
1202 | }; | |
1203 | ||
1204 | #endif | |
1205 | ||
1206 | #ifdef KVM_CAP_MCE | |
1207 | /* x86 MCE */ | |
1208 | struct kvm_x86_mce { | |
1209 | __u64 status; | |
1210 | __u64 addr; | |
1211 | __u64 misc; | |
1212 | __u64 mcg_status; | |
1213 | __u8 bank; | |
1214 | __u8 pad1[7]; | |
1215 | __u64 pad2[3]; | |
1216 | }; | |
1217 | #endif | |
1218 | ||
1219 | #ifdef KVM_CAP_XEN_HVM | |
278f064e EH |
1220 | #define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0) |
1221 | #define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1) | |
1222 | #define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2) | |
1223 | #define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3) | |
ef17dd6a | 1224 | #define KVM_XEN_HVM_CONFIG_EVTCHN_2LEVEL (1 << 4) |
278f064e | 1225 | |
51b24e34 JK |
1226 | struct kvm_xen_hvm_config { |
1227 | __u32 flags; | |
1228 | __u32 msr; | |
1229 | __u64 blob_addr_32; | |
1230 | __u64 blob_addr_64; | |
1231 | __u8 blob_size_32; | |
1232 | __u8 blob_size_64; | |
1233 | __u8 pad2[30]; | |
1234 | }; | |
1235 | #endif | |
1236 | ||
1237 | #define KVM_IRQFD_FLAG_DEASSIGN (1 << 0) | |
716b8e4d AW |
1238 | /* |
1239 | * Available with KVM_CAP_IRQFD_RESAMPLE | |
1240 | * | |
1241 | * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies | |
1242 | * the irqfd to operate in resampling mode for level triggered interrupt | |
f76b348e | 1243 | * emulation. See Documentation/virt/kvm/api.rst. |
716b8e4d AW |
1244 | */ |
1245 | #define KVM_IRQFD_FLAG_RESAMPLE (1 << 1) | |
51b24e34 JK |
1246 | |
1247 | struct kvm_irqfd { | |
1248 | __u32 fd; | |
1249 | __u32 gsi; | |
1250 | __u32 flags; | |
716b8e4d AW |
1251 | __u32 resamplefd; |
1252 | __u8 pad[16]; | |
51b24e34 JK |
1253 | }; |
1254 | ||
bc204035 MT |
1255 | /* For KVM_CAP_ADJUST_CLOCK */ |
1256 | ||
1257 | /* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */ | |
1258 | #define KVM_CLOCK_TSC_STABLE 2 | |
43709a0c PB |
1259 | #define KVM_CLOCK_REALTIME (1 << 2) |
1260 | #define KVM_CLOCK_HOST_TSC (1 << 3) | |
bc204035 | 1261 | |
51b24e34 JK |
1262 | struct kvm_clock_data { |
1263 | __u64 clock; | |
1264 | __u32 flags; | |
43709a0c PB |
1265 | __u32 pad0; |
1266 | __u64 realtime; | |
1267 | __u64 host_tsc; | |
1268 | __u32 pad[4]; | |
51b24e34 JK |
1269 | }; |
1270 | ||
bc204035 MT |
1271 | /* For KVM_CAP_SW_TLB */ |
1272 | ||
a54fc080 AG |
1273 | #define KVM_MMU_FSL_BOOKE_NOHV 0 |
1274 | #define KVM_MMU_FSL_BOOKE_HV 1 | |
1275 | ||
1276 | struct kvm_config_tlb { | |
1277 | __u64 params; | |
1278 | __u64 array; | |
1279 | __u32 mmu_type; | |
1280 | __u32 array_len; | |
1281 | }; | |
1282 | ||
1283 | struct kvm_dirty_tlb { | |
1284 | __u64 bitmap; | |
1285 | __u32 num_dirty; | |
1286 | }; | |
1287 | ||
9d4e4f8c AG |
1288 | /* Available with KVM_CAP_ONE_REG */ |
1289 | ||
a31be480 AG |
1290 | #define KVM_REG_ARCH_MASK 0xff00000000000000ULL |
1291 | #define KVM_REG_GENERIC 0x0000000000000000ULL | |
9d4e4f8c AG |
1292 | |
1293 | /* | |
1294 | * Architecture specific registers are to be defined in arch headers and | |
1295 | * ORed with the arch identifier. | |
1296 | */ | |
a31be480 AG |
1297 | #define KVM_REG_PPC 0x1000000000000000ULL |
1298 | #define KVM_REG_X86 0x2000000000000000ULL | |
1299 | #define KVM_REG_IA64 0x3000000000000000ULL | |
1300 | #define KVM_REG_ARM 0x4000000000000000ULL | |
1301 | #define KVM_REG_S390 0x5000000000000000ULL | |
c5daeae1 AK |
1302 | #define KVM_REG_ARM64 0x6000000000000000ULL |
1303 | #define KVM_REG_MIPS 0x7000000000000000ULL | |
f363d039 | 1304 | #define KVM_REG_RISCV 0x8000000000000000ULL |
a31be480 AG |
1305 | |
1306 | #define KVM_REG_SIZE_SHIFT 52 | |
1307 | #define KVM_REG_SIZE_MASK 0x00f0000000000000ULL | |
1308 | #define KVM_REG_SIZE_U8 0x0000000000000000ULL | |
1309 | #define KVM_REG_SIZE_U16 0x0010000000000000ULL | |
1310 | #define KVM_REG_SIZE_U32 0x0020000000000000ULL | |
1311 | #define KVM_REG_SIZE_U64 0x0030000000000000ULL | |
1312 | #define KVM_REG_SIZE_U128 0x0040000000000000ULL | |
1313 | #define KVM_REG_SIZE_U256 0x0050000000000000ULL | |
1314 | #define KVM_REG_SIZE_U512 0x0060000000000000ULL | |
1315 | #define KVM_REG_SIZE_U1024 0x0070000000000000ULL | |
d9cb4336 | 1316 | #define KVM_REG_SIZE_U2048 0x0080000000000000ULL |
9d4e4f8c | 1317 | |
eadd0e44 PM |
1318 | struct kvm_reg_list { |
1319 | __u64 n; /* number of regs */ | |
1320 | __u64 reg[0]; | |
1321 | }; | |
1322 | ||
9d4e4f8c AG |
1323 | struct kvm_one_reg { |
1324 | __u64 id; | |
a31be480 | 1325 | __u64 addr; |
9d4e4f8c AG |
1326 | }; |
1327 | ||
dbdfea92 | 1328 | #define KVM_MSI_VALID_DEVID (1U << 0) |
80a3eb10 JK |
1329 | struct kvm_msi { |
1330 | __u32 address_lo; | |
1331 | __u32 address_hi; | |
1332 | __u32 data; | |
1333 | __u32 flags; | |
dbdfea92 CH |
1334 | __u32 devid; |
1335 | __u8 pad[12]; | |
80a3eb10 JK |
1336 | }; |
1337 | ||
eadd0e44 PM |
1338 | struct kvm_arm_device_addr { |
1339 | __u64 id; | |
1340 | __u64 addr; | |
1341 | }; | |
1342 | ||
e098b453 AK |
1343 | /* |
1344 | * Device control API, available with KVM_CAP_DEVICE_CTRL | |
1345 | */ | |
1346 | #define KVM_CREATE_DEVICE_TEST 1 | |
1347 | ||
1348 | struct kvm_create_device { | |
1349 | __u32 type; /* in: KVM_DEV_TYPE_xxx */ | |
1350 | __u32 fd; /* out: device handle */ | |
1351 | __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */ | |
1352 | }; | |
1353 | ||
1354 | struct kvm_device_attr { | |
1355 | __u32 flags; /* no flags currently defined */ | |
1356 | __u32 group; /* device-defined */ | |
1357 | __u64 attr; /* group-defined */ | |
1358 | __u64 addr; /* userspace address of attr data */ | |
1359 | }; | |
1360 | ||
bf63839f AW |
1361 | #define KVM_DEV_VFIO_GROUP 1 |
1362 | #define KVM_DEV_VFIO_GROUP_ADD 1 | |
1363 | #define KVM_DEV_VFIO_GROUP_DEL 2 | |
74c98e20 | 1364 | #define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3 |
444b1996 AB |
1365 | |
1366 | enum kvm_device_type { | |
1367 | KVM_DEV_TYPE_FSL_MPIC_20 = 1, | |
1368 | #define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20 | |
1369 | KVM_DEV_TYPE_FSL_MPIC_42, | |
1370 | #define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42 | |
1371 | KVM_DEV_TYPE_XICS, | |
1372 | #define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS | |
1373 | KVM_DEV_TYPE_VFIO, | |
1374 | #define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO | |
1375 | KVM_DEV_TYPE_ARM_VGIC_V2, | |
1376 | #define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2 | |
1377 | KVM_DEV_TYPE_FLIC, | |
1378 | #define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC | |
51628b18 CB |
1379 | KVM_DEV_TYPE_ARM_VGIC_V3, |
1380 | #define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3 | |
dbdfea92 CH |
1381 | KVM_DEV_TYPE_ARM_VGIC_ITS, |
1382 | #define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS | |
d9cb4336 CH |
1383 | KVM_DEV_TYPE_XIVE, |
1384 | #define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE | |
2a886794 GK |
1385 | KVM_DEV_TYPE_ARM_PV_TIME, |
1386 | #define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME | |
444b1996 AB |
1387 | KVM_DEV_TYPE_MAX, |
1388 | }; | |
e098b453 | 1389 | |
74c98e20 CH |
1390 | struct kvm_vfio_spapr_tce { |
1391 | __s32 groupfd; | |
1392 | __s32 tablefd; | |
1393 | }; | |
1394 | ||
51b24e34 JK |
1395 | /* |
1396 | * ioctls for VM fds | |
1397 | */ | |
1398 | #define KVM_SET_MEMORY_REGION _IOW(KVMIO, 0x40, struct kvm_memory_region) | |
1399 | /* | |
1400 | * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns | |
1401 | * a vcpu fd. | |
1402 | */ | |
1403 | #define KVM_CREATE_VCPU _IO(KVMIO, 0x41) | |
1404 | #define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log) | |
1405 | /* KVM_SET_MEMORY_ALIAS is obsolete: */ | |
1406 | #define KVM_SET_MEMORY_ALIAS _IOW(KVMIO, 0x43, struct kvm_memory_alias) | |
1407 | #define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44) | |
1408 | #define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45) | |
1409 | #define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \ | |
1410 | struct kvm_userspace_memory_region) | |
1411 | #define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47) | |
1412 | #define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64) | |
1529ae1b AG |
1413 | |
1414 | /* enable ucontrol for s390 */ | |
1415 | struct kvm_s390_ucas_mapping { | |
1416 | __u64 user_addr; | |
1417 | __u64 vcpu_addr; | |
1418 | __u64 length; | |
1419 | }; | |
1420 | #define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping) | |
1421 | #define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping) | |
1422 | #define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long) | |
1423 | ||
51b24e34 JK |
1424 | /* Device model IOC */ |
1425 | #define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60) | |
1426 | #define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level) | |
1427 | #define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip) | |
1428 | #define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip) | |
1429 | #define KVM_CREATE_PIT _IO(KVMIO, 0x64) | |
1430 | #define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state) | |
1431 | #define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state) | |
1432 | #define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level) | |
1433 | #define KVM_REGISTER_COALESCED_MMIO \ | |
1434 | _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone) | |
1435 | #define KVM_UNREGISTER_COALESCED_MMIO \ | |
1436 | _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone) | |
1437 | #define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \ | |
1438 | struct kvm_assigned_pci_dev) | |
1439 | #define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing) | |
1440 | /* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */ | |
1441 | #define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70 | |
1442 | #define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq) | |
1443 | #define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71) | |
1444 | #define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \ | |
1445 | struct kvm_assigned_pci_dev) | |
1446 | #define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \ | |
1447 | struct kvm_assigned_msix_nr) | |
1448 | #define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \ | |
1449 | struct kvm_assigned_msix_entry) | |
1450 | #define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq) | |
1451 | #define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd) | |
1452 | #define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config) | |
1453 | #define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78) | |
1454 | #define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd) | |
1455 | #define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config) | |
1456 | #define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data) | |
1457 | #define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data) | |
1458 | /* Available with KVM_CAP_PIT_STATE2 */ | |
1459 | #define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2) | |
1460 | #define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2) | |
1461 | /* Available with KVM_CAP_PPC_GET_PVINFO */ | |
1462 | #define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo) | |
1463 | /* Available with KVM_CAP_TSC_CONTROL */ | |
1464 | #define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2) | |
1465 | #define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3) | |
9ab2195d MT |
1466 | /* Available with KVM_CAP_PCI_2_3 */ |
1467 | #define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \ | |
1468 | struct kvm_assigned_pci_dev) | |
80a3eb10 JK |
1469 | /* Available with KVM_CAP_SIGNAL_MSI */ |
1470 | #define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi) | |
1471 | /* Available with KVM_CAP_PPC_GET_SMMU_INFO */ | |
1472 | #define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info) | |
651682dc MT |
1473 | /* Available with KVM_CAP_PPC_ALLOC_HTAB */ |
1474 | #define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32) | |
d4834ff9 | 1475 | #define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce) |
b89485a5 PB |
1476 | #define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \ |
1477 | struct kvm_create_spapr_tce_64) | |
d4834ff9 AG |
1478 | /* Available with KVM_CAP_RMA */ |
1479 | #define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma) | |
1480 | /* Available with KVM_CAP_PPC_HTAB_FD */ | |
1481 | #define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd) | |
eadd0e44 PM |
1482 | /* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */ |
1483 | #define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr) | |
e098b453 AK |
1484 | /* Available with KVM_CAP_PPC_RTAS */ |
1485 | #define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args) | |
3a5eb5b4 PB |
1486 | /* Available with KVM_CAP_SPAPR_RESIZE_HPT */ |
1487 | #define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt) | |
1488 | #define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt) | |
1489 | /* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */ | |
1490 | #define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg) | |
1491 | /* Available with KVM_CAP_PPC_RADIX_MMU */ | |
1492 | #define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info) | |
9cbb6362 CH |
1493 | /* Available with KVM_CAP_PPC_GET_CPU_CHAR */ |
1494 | #define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char) | |
f363d039 EA |
1495 | /* Available with KVM_CAP_PMU_EVENT_FILTER */ |
1496 | #define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter) | |
50fd0c37 | 1497 | #define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3) |
327d4b7f | 1498 | #define KVM_ARM_MTE_COPY_TAGS _IOR(KVMIO, 0xb4, struct kvm_arm_copy_mte_tags) |
e098b453 AK |
1499 | |
1500 | /* ioctl for vm fd */ | |
1501 | #define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device) | |
1502 | ||
1503 | /* ioctls for fds returned by KVM_CREATE_DEVICE */ | |
1504 | #define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr) | |
1505 | #define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr) | |
1506 | #define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr) | |
51b24e34 JK |
1507 | |
1508 | /* | |
1509 | * ioctls for vcpu fds | |
1510 | */ | |
1511 | #define KVM_RUN _IO(KVMIO, 0x80) | |
1512 | #define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs) | |
1513 | #define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs) | |
1514 | #define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs) | |
1515 | #define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs) | |
1516 | #define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation) | |
1517 | #define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt) | |
1518 | /* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */ | |
1519 | #define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87 | |
1520 | #define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs) | |
1521 | #define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs) | |
1522 | #define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid) | |
1523 | #define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask) | |
1524 | #define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu) | |
1525 | #define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu) | |
1526 | #define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state) | |
1527 | #define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state) | |
1528 | #define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2) | |
1529 | #define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2) | |
1530 | /* Available with KVM_CAP_VAPIC */ | |
1531 | #define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl) | |
1532 | /* Available with KVM_CAP_VAPIC */ | |
1533 | #define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr) | |
1534 | /* valid for virtual machine (for floating interrupt)_and_ vcpu */ | |
1535 | #define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt) | |
1536 | /* store status for s390 */ | |
1537 | #define KVM_S390_STORE_STATUS_NOADDR (-1ul) | |
1538 | #define KVM_S390_STORE_STATUS_PREFIXED (-2ul) | |
1539 | #define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long) | |
1540 | /* initial ipl psw for s390 */ | |
1541 | #define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw) | |
1542 | /* initial reset for s390 */ | |
1543 | #define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97) | |
1544 | #define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state) | |
1545 | #define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state) | |
444b1996 | 1546 | /* Available with KVM_CAP_USER_NMI */ |
51b24e34 JK |
1547 | #define KVM_NMI _IO(KVMIO, 0x9a) |
1548 | /* Available with KVM_CAP_SET_GUEST_DEBUG */ | |
1549 | #define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug) | |
1550 | /* MCE for x86 */ | |
1551 | #define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64) | |
1552 | #define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64) | |
1553 | #define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce) | |
51b24e34 JK |
1554 | /* Available with KVM_CAP_VCPU_EVENTS */ |
1555 | #define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events) | |
1556 | #define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events) | |
1557 | /* Available with KVM_CAP_DEBUGREGS */ | |
1558 | #define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs) | |
1559 | #define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs) | |
9ffd2685 CH |
1560 | /* |
1561 | * vcpu version available with KVM_ENABLE_CAP | |
1562 | * vm version available with KVM_CAP_ENABLE_CAP_VM | |
1563 | */ | |
51b24e34 JK |
1564 | #define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap) |
1565 | /* Available with KVM_CAP_XSAVE */ | |
1566 | #define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave) | |
1567 | #define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave) | |
1568 | /* Available with KVM_CAP_XCRS */ | |
1569 | #define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs) | |
1570 | #define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs) | |
a54fc080 AG |
1571 | /* Available with KVM_CAP_SW_TLB */ |
1572 | #define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb) | |
9d4e4f8c | 1573 | /* Available with KVM_CAP_ONE_REG */ |
a31be480 | 1574 | #define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg) |
9d4e4f8c | 1575 | #define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg) |
9ab2195d MT |
1576 | /* VM is being stopped by host */ |
1577 | #define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad) | |
eadd0e44 | 1578 | #define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init) |
bf63839f | 1579 | #define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init) |
eadd0e44 | 1580 | #define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list) |
7a52ce8a CH |
1581 | /* Available with KVM_CAP_S390_MEM_OP */ |
1582 | #define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op) | |
1583 | /* Available with KVM_CAP_S390_SKEYS */ | |
1584 | #define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys) | |
1585 | #define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys) | |
1586 | /* Available with KVM_CAP_S390_INJECT_IRQ */ | |
1587 | #define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq) | |
1588 | /* Available with KVM_CAP_S390_IRQ_STATE */ | |
1589 | #define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state) | |
1590 | #define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state) | |
24a31426 PB |
1591 | /* Available with KVM_CAP_X86_SMM */ |
1592 | #define KVM_SMI _IO(KVMIO, 0xb7) | |
3272f0e2 | 1593 | /* Available with KVM_CAP_S390_CMMA_MIGRATION */ |
ab6e1550 | 1594 | #define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log) |
3272f0e2 | 1595 | #define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log) |
9f2d175d PB |
1596 | /* Memory Encryption Commands */ |
1597 | #define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long) | |
1598 | ||
1599 | struct kvm_enc_region { | |
1600 | __u64 addr; | |
1601 | __u64 size; | |
1602 | }; | |
1603 | ||
1604 | #define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region) | |
1605 | #define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region) | |
1606 | ||
65a6d8dd PM |
1607 | /* Available with KVM_CAP_HYPERV_EVENTFD */ |
1608 | #define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd) | |
1609 | ||
d36f7de8 CH |
1610 | /* Available with KVM_CAP_NESTED_STATE */ |
1611 | #define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state) | |
1612 | #define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state) | |
65a6d8dd | 1613 | |
d9cb4336 | 1614 | /* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */ |
da054c64 PB |
1615 | #define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log) |
1616 | ||
b3c818a4 | 1617 | /* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */ |
da054c64 PB |
1618 | #define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2) |
1619 | ||
d9cb4336 CH |
1620 | /* Available with KVM_CAP_ARM_SVE */ |
1621 | #define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int) | |
1622 | ||
ddda3748 CH |
1623 | /* Available with KVM_CAP_S390_VCPU_RESETS */ |
1624 | #define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3) | |
1625 | #define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4) | |
1626 | ||
ef17dd6a VG |
1627 | /* Available with KVM_CAP_XSAVE2 */ |
1628 | #define KVM_GET_XSAVE2 _IOR(KVMIO, 0xcf, struct kvm_xsave) | |
1629 | ||
dc6f8d45 CH |
1630 | struct kvm_s390_pv_sec_parm { |
1631 | __u64 origin; | |
1632 | __u64 length; | |
1633 | }; | |
1634 | ||
1635 | struct kvm_s390_pv_unp { | |
1636 | __u64 addr; | |
1637 | __u64 size; | |
1638 | __u64 tweak; | |
1639 | }; | |
1640 | ||
1641 | enum pv_cmd_id { | |
1642 | KVM_PV_ENABLE, | |
1643 | KVM_PV_DISABLE, | |
1644 | KVM_PV_SET_SEC_PARMS, | |
1645 | KVM_PV_UNPACK, | |
1646 | KVM_PV_VERIFY, | |
1647 | KVM_PV_PREP_RESET, | |
1648 | KVM_PV_UNSHARE_ALL, | |
1649 | }; | |
1650 | ||
1651 | struct kvm_pv_cmd { | |
1652 | __u32 cmd; /* Command to be executed */ | |
1653 | __u16 rc; /* Ultravisor return code */ | |
1654 | __u16 rrc; /* Ultravisor return reason code */ | |
1655 | __u64 data; /* Data or address */ | |
1656 | __u32 flags; /* flags for future extensions. Must be 0 for now */ | |
1657 | __u32 reserved[3]; | |
1658 | }; | |
1659 | ||
1660 | /* Available with KVM_CAP_S390_PROTECTED */ | |
1661 | #define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd) | |
1662 | ||
53ba2eee MR |
1663 | /* Available with KVM_CAP_X86_MSR_FILTER */ |
1664 | #define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter) | |
1665 | ||
b3c818a4 EF |
1666 | /* Available with KVM_CAP_DIRTY_LOG_RING */ |
1667 | #define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7) | |
1668 | ||
278f064e EH |
1669 | /* Per-VM Xen attributes */ |
1670 | #define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr) | |
1671 | #define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr) | |
1672 | ||
1673 | struct kvm_xen_hvm_attr { | |
1674 | __u16 type; | |
1675 | __u16 pad[3]; | |
1676 | union { | |
1677 | __u8 long_mode; | |
1678 | __u8 vector; | |
1679 | struct { | |
1680 | __u64 gfn; | |
1681 | } shared_info; | |
1682 | __u64 pad[8]; | |
1683 | } u; | |
1684 | }; | |
1685 | ||
1686 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */ | |
1687 | #define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0 | |
1688 | #define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1 | |
1689 | #define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2 | |
1690 | ||
1691 | /* Per-vCPU Xen attributes */ | |
1692 | #define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr) | |
1693 | #define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr) | |
1694 | ||
327d4b7f BR |
1695 | #define KVM_GET_SREGS2 _IOR(KVMIO, 0xcc, struct kvm_sregs2) |
1696 | #define KVM_SET_SREGS2 _IOW(KVMIO, 0xcd, struct kvm_sregs2) | |
1697 | ||
278f064e EH |
1698 | struct kvm_xen_vcpu_attr { |
1699 | __u16 type; | |
1700 | __u16 pad[3]; | |
1701 | union { | |
1702 | __u64 gpa; | |
1703 | __u64 pad[8]; | |
1704 | struct { | |
1705 | __u64 state; | |
1706 | __u64 state_entry_time; | |
1707 | __u64 time_running; | |
1708 | __u64 time_runnable; | |
1709 | __u64 time_blocked; | |
1710 | __u64 time_offline; | |
1711 | } runstate; | |
1712 | } u; | |
1713 | }; | |
1714 | ||
1715 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */ | |
1716 | #define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0 | |
1717 | #define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1 | |
1718 | #define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2 | |
1719 | #define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3 | |
1720 | #define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4 | |
1721 | #define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5 | |
1722 | ||
9f2d175d PB |
1723 | /* Secure Encrypted Virtualization command */ |
1724 | enum sev_cmd_id { | |
1725 | /* Guest initialization commands */ | |
1726 | KVM_SEV_INIT = 0, | |
1727 | KVM_SEV_ES_INIT, | |
1728 | /* Guest launch commands */ | |
1729 | KVM_SEV_LAUNCH_START, | |
1730 | KVM_SEV_LAUNCH_UPDATE_DATA, | |
1731 | KVM_SEV_LAUNCH_UPDATE_VMSA, | |
1732 | KVM_SEV_LAUNCH_SECRET, | |
1733 | KVM_SEV_LAUNCH_MEASURE, | |
1734 | KVM_SEV_LAUNCH_FINISH, | |
1735 | /* Guest migration commands (outgoing) */ | |
1736 | KVM_SEV_SEND_START, | |
1737 | KVM_SEV_SEND_UPDATE_DATA, | |
1738 | KVM_SEV_SEND_UPDATE_VMSA, | |
1739 | KVM_SEV_SEND_FINISH, | |
1740 | /* Guest migration commands (incoming) */ | |
1741 | KVM_SEV_RECEIVE_START, | |
1742 | KVM_SEV_RECEIVE_UPDATE_DATA, | |
1743 | KVM_SEV_RECEIVE_UPDATE_VMSA, | |
1744 | KVM_SEV_RECEIVE_FINISH, | |
1745 | /* Guest status and debug commands */ | |
1746 | KVM_SEV_GUEST_STATUS, | |
1747 | KVM_SEV_DBG_DECRYPT, | |
1748 | KVM_SEV_DBG_ENCRYPT, | |
1749 | /* Guest certificates commands */ | |
1750 | KVM_SEV_CERT_EXPORT, | |
3ea1a802 BS |
1751 | /* Attestation report */ |
1752 | KVM_SEV_GET_ATTESTATION_REPORT, | |
278f064e EH |
1753 | /* Guest Migration Extension */ |
1754 | KVM_SEV_SEND_CANCEL, | |
9f2d175d PB |
1755 | |
1756 | KVM_SEV_NR_MAX, | |
1757 | }; | |
1758 | ||
1759 | struct kvm_sev_cmd { | |
1760 | __u32 id; | |
1761 | __u64 data; | |
1762 | __u32 error; | |
1763 | __u32 sev_fd; | |
1764 | }; | |
1765 | ||
1766 | struct kvm_sev_launch_start { | |
1767 | __u32 handle; | |
1768 | __u32 policy; | |
1769 | __u64 dh_uaddr; | |
1770 | __u32 dh_len; | |
1771 | __u64 session_uaddr; | |
1772 | __u32 session_len; | |
1773 | }; | |
1774 | ||
1775 | struct kvm_sev_launch_update_data { | |
1776 | __u64 uaddr; | |
1777 | __u32 len; | |
1778 | }; | |
1779 | ||
1780 | ||
1781 | struct kvm_sev_launch_secret { | |
1782 | __u64 hdr_uaddr; | |
1783 | __u32 hdr_len; | |
1784 | __u64 guest_uaddr; | |
1785 | __u32 guest_len; | |
1786 | __u64 trans_uaddr; | |
1787 | __u32 trans_len; | |
1788 | }; | |
1789 | ||
1790 | struct kvm_sev_launch_measure { | |
1791 | __u64 uaddr; | |
1792 | __u32 len; | |
1793 | }; | |
1794 | ||
1795 | struct kvm_sev_guest_status { | |
1796 | __u32 handle; | |
1797 | __u32 policy; | |
1798 | __u32 state; | |
1799 | }; | |
1800 | ||
1801 | struct kvm_sev_dbg { | |
1802 | __u64 src_uaddr; | |
1803 | __u64 dst_uaddr; | |
1804 | __u32 len; | |
1805 | }; | |
51b24e34 | 1806 | |
3ea1a802 BS |
1807 | struct kvm_sev_attestation_report { |
1808 | __u8 mnonce[16]; | |
1809 | __u64 uaddr; | |
1810 | __u32 len; | |
1811 | }; | |
1812 | ||
278f064e EH |
1813 | struct kvm_sev_send_start { |
1814 | __u32 policy; | |
1815 | __u64 pdh_cert_uaddr; | |
1816 | __u32 pdh_cert_len; | |
1817 | __u64 plat_certs_uaddr; | |
1818 | __u32 plat_certs_len; | |
1819 | __u64 amd_certs_uaddr; | |
1820 | __u32 amd_certs_len; | |
1821 | __u64 session_uaddr; | |
1822 | __u32 session_len; | |
1823 | }; | |
1824 | ||
1825 | struct kvm_sev_send_update_data { | |
1826 | __u64 hdr_uaddr; | |
1827 | __u32 hdr_len; | |
1828 | __u64 guest_uaddr; | |
1829 | __u32 guest_len; | |
1830 | __u64 trans_uaddr; | |
1831 | __u32 trans_len; | |
1832 | }; | |
1833 | ||
1834 | struct kvm_sev_receive_start { | |
1835 | __u32 handle; | |
1836 | __u32 policy; | |
1837 | __u64 pdh_uaddr; | |
1838 | __u32 pdh_len; | |
1839 | __u64 session_uaddr; | |
1840 | __u32 session_len; | |
1841 | }; | |
1842 | ||
1843 | struct kvm_sev_receive_update_data { | |
1844 | __u64 hdr_uaddr; | |
1845 | __u32 hdr_len; | |
1846 | __u64 guest_uaddr; | |
1847 | __u32 guest_len; | |
1848 | __u64 trans_uaddr; | |
1849 | __u32 trans_len; | |
1850 | }; | |
1851 | ||
51b24e34 | 1852 | #define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0) |
9ab2195d MT |
1853 | #define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1) |
1854 | #define KVM_DEV_ASSIGN_MASK_INTX (1 << 2) | |
51b24e34 JK |
1855 | |
1856 | struct kvm_assigned_pci_dev { | |
1857 | __u32 assigned_dev_id; | |
1858 | __u32 busnr; | |
1859 | __u32 devfn; | |
1860 | __u32 flags; | |
1861 | __u32 segnr; | |
1862 | union { | |
1863 | __u32 reserved[11]; | |
1864 | }; | |
1865 | }; | |
1866 | ||
1867 | #define KVM_DEV_IRQ_HOST_INTX (1 << 0) | |
1868 | #define KVM_DEV_IRQ_HOST_MSI (1 << 1) | |
1869 | #define KVM_DEV_IRQ_HOST_MSIX (1 << 2) | |
1870 | ||
1871 | #define KVM_DEV_IRQ_GUEST_INTX (1 << 8) | |
1872 | #define KVM_DEV_IRQ_GUEST_MSI (1 << 9) | |
1873 | #define KVM_DEV_IRQ_GUEST_MSIX (1 << 10) | |
1874 | ||
1875 | #define KVM_DEV_IRQ_HOST_MASK 0x00ff | |
1876 | #define KVM_DEV_IRQ_GUEST_MASK 0xff00 | |
1877 | ||
1878 | struct kvm_assigned_irq { | |
1879 | __u32 assigned_dev_id; | |
7c6da3de | 1880 | __u32 host_irq; /* ignored (legacy field) */ |
51b24e34 JK |
1881 | __u32 guest_irq; |
1882 | __u32 flags; | |
1883 | union { | |
51b24e34 JK |
1884 | __u32 reserved[12]; |
1885 | }; | |
1886 | }; | |
1887 | ||
51b24e34 JK |
1888 | struct kvm_assigned_msix_nr { |
1889 | __u32 assigned_dev_id; | |
1890 | __u16 entry_nr; | |
1891 | __u16 padding; | |
1892 | }; | |
1893 | ||
1894 | #define KVM_MAX_MSIX_PER_DEV 256 | |
1895 | struct kvm_assigned_msix_entry { | |
1896 | __u32 assigned_dev_id; | |
1897 | __u32 gsi; | |
1898 | __u16 entry; /* The index of entry in the MSI-X table */ | |
1899 | __u16 padding[3]; | |
1900 | }; | |
1901 | ||
dbdfea92 CH |
1902 | #define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0) |
1903 | #define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1) | |
1904 | ||
74c98e20 CH |
1905 | /* Available with KVM_CAP_ARM_USER_IRQ */ |
1906 | ||
1907 | /* Bits for run->s.regs.device_irq_level */ | |
1908 | #define KVM_ARM_DEV_EL1_VTIMER (1 << 0) | |
1909 | #define KVM_ARM_DEV_EL1_PTIMER (1 << 1) | |
1910 | #define KVM_ARM_DEV_PMU (1 << 2) | |
1911 | ||
65a6d8dd PM |
1912 | struct kvm_hyperv_eventfd { |
1913 | __u32 conn_id; | |
1914 | __s32 fd; | |
1915 | __u32 flags; | |
1916 | __u32 padding[3]; | |
1917 | }; | |
1918 | ||
1919 | #define KVM_HYPERV_CONN_ID_MASK 0x00ffffff | |
1920 | #define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0) | |
1921 | ||
dc6f8d45 CH |
1922 | #define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0) |
1923 | #define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1) | |
1924 | ||
b3c818a4 EF |
1925 | /* |
1926 | * Arch needs to define the macro after implementing the dirty ring | |
1927 | * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the | |
1928 | * starting page offset of the dirty ring structures. | |
1929 | */ | |
1930 | #ifndef KVM_DIRTY_LOG_PAGE_OFFSET | |
1931 | #define KVM_DIRTY_LOG_PAGE_OFFSET 0 | |
1932 | #endif | |
1933 | ||
1934 | /* | |
1935 | * KVM dirty GFN flags, defined as: | |
1936 | * | |
1937 | * |---------------+---------------+--------------| | |
1938 | * | bit 1 (reset) | bit 0 (dirty) | Status | | |
1939 | * |---------------+---------------+--------------| | |
1940 | * | 0 | 0 | Invalid GFN | | |
1941 | * | 0 | 1 | Dirty GFN | | |
1942 | * | 1 | X | GFN to reset | | |
1943 | * |---------------+---------------+--------------| | |
1944 | * | |
1945 | * Lifecycle of a dirty GFN goes like: | |
1946 | * | |
1947 | * dirtied harvested reset | |
1948 | * 00 -----------> 01 -------------> 1X -------+ | |
1949 | * ^ | | |
1950 | * | | | |
1951 | * +------------------------------------------+ | |
1952 | * | |
1953 | * The userspace program is only responsible for the 01->1X state | |
1954 | * conversion after harvesting an entry. Also, it must not skip any | |
1955 | * dirty bits, so that dirty bits are always harvested in sequence. | |
1956 | */ | |
278f064e EH |
1957 | #define KVM_DIRTY_GFN_F_DIRTY _BITUL(0) |
1958 | #define KVM_DIRTY_GFN_F_RESET _BITUL(1) | |
b3c818a4 EF |
1959 | #define KVM_DIRTY_GFN_F_MASK 0x3 |
1960 | ||
1961 | /* | |
1962 | * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of | |
1963 | * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The | |
1964 | * size of the gfn buffer is decided by the first argument when | |
1965 | * enabling KVM_CAP_DIRTY_LOG_RING. | |
1966 | */ | |
1967 | struct kvm_dirty_gfn { | |
1968 | __u32 flags; | |
1969 | __u32 slot; | |
1970 | __u64 offset; | |
1971 | }; | |
1972 | ||
278f064e EH |
1973 | #define KVM_BUS_LOCK_DETECTION_OFF (1 << 0) |
1974 | #define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1) | |
1975 | ||
327d4b7f BR |
1976 | /** |
1977 | * struct kvm_stats_header - Header of per vm/vcpu binary statistics data. | |
1978 | * @flags: Some extra information for header, always 0 for now. | |
1979 | * @name_size: The size in bytes of the memory which contains statistics | |
1980 | * name string including trailing '\0'. The memory is allocated | |
1981 | * at the send of statistics descriptor. | |
1982 | * @num_desc: The number of statistics the vm or vcpu has. | |
1983 | * @id_offset: The offset of the vm/vcpu stats' id string in the file pointed | |
1984 | * by vm/vcpu stats fd. | |
1985 | * @desc_offset: The offset of the vm/vcpu stats' descriptor block in the file | |
1986 | * pointd by vm/vcpu stats fd. | |
1987 | * @data_offset: The offset of the vm/vcpu stats' data block in the file | |
1988 | * pointed by vm/vcpu stats fd. | |
1989 | * | |
1990 | * This is the header userspace needs to read from stats fd before any other | |
1991 | * readings. It is used by userspace to discover all the information about the | |
1992 | * vm/vcpu's binary statistics. | |
1993 | * Userspace reads this header from the start of the vm/vcpu's stats fd. | |
1994 | */ | |
1995 | struct kvm_stats_header { | |
1996 | __u32 flags; | |
1997 | __u32 name_size; | |
1998 | __u32 num_desc; | |
1999 | __u32 id_offset; | |
2000 | __u32 desc_offset; | |
2001 | __u32 data_offset; | |
2002 | }; | |
2003 | ||
2004 | #define KVM_STATS_TYPE_SHIFT 0 | |
2005 | #define KVM_STATS_TYPE_MASK (0xF << KVM_STATS_TYPE_SHIFT) | |
2006 | #define KVM_STATS_TYPE_CUMULATIVE (0x0 << KVM_STATS_TYPE_SHIFT) | |
2007 | #define KVM_STATS_TYPE_INSTANT (0x1 << KVM_STATS_TYPE_SHIFT) | |
2008 | #define KVM_STATS_TYPE_PEAK (0x2 << KVM_STATS_TYPE_SHIFT) | |
43709a0c PB |
2009 | #define KVM_STATS_TYPE_LINEAR_HIST (0x3 << KVM_STATS_TYPE_SHIFT) |
2010 | #define KVM_STATS_TYPE_LOG_HIST (0x4 << KVM_STATS_TYPE_SHIFT) | |
2011 | #define KVM_STATS_TYPE_MAX KVM_STATS_TYPE_LOG_HIST | |
327d4b7f BR |
2012 | |
2013 | #define KVM_STATS_UNIT_SHIFT 4 | |
2014 | #define KVM_STATS_UNIT_MASK (0xF << KVM_STATS_UNIT_SHIFT) | |
2015 | #define KVM_STATS_UNIT_NONE (0x0 << KVM_STATS_UNIT_SHIFT) | |
2016 | #define KVM_STATS_UNIT_BYTES (0x1 << KVM_STATS_UNIT_SHIFT) | |
2017 | #define KVM_STATS_UNIT_SECONDS (0x2 << KVM_STATS_UNIT_SHIFT) | |
2018 | #define KVM_STATS_UNIT_CYCLES (0x3 << KVM_STATS_UNIT_SHIFT) | |
2019 | #define KVM_STATS_UNIT_MAX KVM_STATS_UNIT_CYCLES | |
2020 | ||
2021 | #define KVM_STATS_BASE_SHIFT 8 | |
2022 | #define KVM_STATS_BASE_MASK (0xF << KVM_STATS_BASE_SHIFT) | |
2023 | #define KVM_STATS_BASE_POW10 (0x0 << KVM_STATS_BASE_SHIFT) | |
2024 | #define KVM_STATS_BASE_POW2 (0x1 << KVM_STATS_BASE_SHIFT) | |
2025 | #define KVM_STATS_BASE_MAX KVM_STATS_BASE_POW2 | |
2026 | ||
2027 | /** | |
2028 | * struct kvm_stats_desc - Descriptor of a KVM statistics. | |
2029 | * @flags: Annotations of the stats, like type, unit, etc. | |
2030 | * @exponent: Used together with @flags to determine the unit. | |
2031 | * @size: The number of data items for this stats. | |
2032 | * Every data item is of type __u64. | |
2033 | * @offset: The offset of the stats to the start of stat structure in | |
43709a0c PB |
2034 | * structure kvm or kvm_vcpu. |
2035 | * @bucket_size: A parameter value used for histogram stats. It is only used | |
2036 | * for linear histogram stats, specifying the size of the bucket; | |
327d4b7f BR |
2037 | * @name: The name string for the stats. Its size is indicated by the |
2038 | * &kvm_stats_header->name_size. | |
2039 | */ | |
2040 | struct kvm_stats_desc { | |
2041 | __u32 flags; | |
2042 | __s16 exponent; | |
2043 | __u16 size; | |
2044 | __u32 offset; | |
43709a0c | 2045 | __u32 bucket_size; |
327d4b7f BR |
2046 | char name[]; |
2047 | }; | |
2048 | ||
2049 | #define KVM_GET_STATS_FD _IO(KVMIO, 0xce) | |
2050 | ||
1ea5208f PB |
2051 | /* Available with KVM_CAP_XSAVE2 */ |
2052 | #define KVM_GET_XSAVE2 _IOR(KVMIO, 0xcf, struct kvm_xsave) | |
2053 | ||
51b24e34 | 2054 | #endif /* __LINUX_KVM_H */ |