]> git.ipfire.org Git - thirdparty/qemu.git/blame - linux-headers/linux/kvm.h
linux-headers: Update to v6.1
[thirdparty/qemu.git] / linux-headers / linux / kvm.h
CommitLineData
dd873966 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
51b24e34
JK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
8 * Note: you must update KVM_API_VERSION if you change this interface.
9 */
10
278f064e 11#include <linux/const.h>
51b24e34
JK
12#include <linux/types.h>
13
14#include <linux/ioctl.h>
15#include <asm/kvm.h>
16
17#define KVM_API_VERSION 12
18
19/* *** Deprecated interfaces *** */
20
21#define KVM_TRC_SHIFT 16
22
23#define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT)
24#define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1))
25
26#define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01)
27#define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02)
28#define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01)
29
30#define KVM_TRC_HEAD_SIZE 12
31#define KVM_TRC_CYCLE_SIZE 8
32#define KVM_TRC_EXTRA_MAX 7
33
34#define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02)
35#define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03)
36#define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04)
37#define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05)
38#define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06)
39#define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07)
40#define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08)
41#define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09)
42#define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A)
43#define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B)
44#define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C)
45#define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D)
46#define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E)
47#define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F)
48#define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10)
49#define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11)
50#define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12)
51#define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13)
52#define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14)
53#define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15)
54#define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16)
55#define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17)
56#define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18)
57#define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19)
58
59struct kvm_user_trace_setup {
60 __u32 buf_size;
61 __u32 buf_nr;
62};
63
64#define __KVM_DEPRECATED_MAIN_W_0x06 \
65 _IOW(KVMIO, 0x06, struct kvm_user_trace_setup)
66#define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07)
67#define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08)
68
69#define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq)
70
71struct kvm_breakpoint {
72 __u32 enabled;
73 __u32 padding;
74 __u64 address;
75};
76
77struct kvm_debug_guest {
78 __u32 enabled;
79 __u32 pad;
80 struct kvm_breakpoint breakpoints[4];
81 __u32 singlestep;
82};
83
84#define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest)
85
86/* *** End of deprecated interfaces *** */
87
88
89/* for KVM_CREATE_MEMORY_REGION */
90struct kvm_memory_region {
91 __u32 slot;
92 __u32 flags;
93 __u64 guest_phys_addr;
94 __u64 memory_size; /* bytes */
95};
96
97/* for KVM_SET_USER_MEMORY_REGION */
98struct kvm_userspace_memory_region {
99 __u32 slot;
100 __u32 flags;
101 __u64 guest_phys_addr;
102 __u64 memory_size; /* bytes */
103 __u64 userspace_addr; /* start of the userspace allocated memory */
104};
105
716b8e4d
AW
106/*
107 * The bit 0 ~ bit 15 of kvm_memory_region::flags are visible for userspace,
108 * other bits are reserved for kvm internal use which are defined in
109 * include/linux/kvm_host.h.
110 */
111#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
112#define KVM_MEM_READONLY (1UL << 1)
51b24e34
JK
113
114/* for KVM_IRQ_LINE */
115struct kvm_irq_level {
116 /*
117 * ACPI gsi notion of irq.
118 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
119 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
f76b348e 120 * For ARM: See Documentation/virt/kvm/api.rst
51b24e34
JK
121 */
122 union {
123 __u32 irq;
124 __s32 status;
125 };
126 __u32 level;
127};
128
129
130struct kvm_irqchip {
131 __u32 chip_id;
132 __u32 pad;
133 union {
134 char dummy[512]; /* reserving space */
135#ifdef __KVM_HAVE_PIT
136 struct kvm_pic_state pic;
137#endif
138#ifdef __KVM_HAVE_IOAPIC
139 struct kvm_ioapic_state ioapic;
140#endif
141 } chip;
142};
143
144/* for KVM_CREATE_PIT2 */
145struct kvm_pit_config {
146 __u32 flags;
147 __u32 pad[15];
148};
149
150#define KVM_PIT_SPEAKER_DUMMY 1
151
7a52ce8a
CH
152struct kvm_s390_skeys {
153 __u64 start_gfn;
154 __u64 count;
155 __u64 skeydata_addr;
156 __u32 flags;
157 __u32 reserved[9];
158};
fff02bc0 159
3272f0e2
CB
160#define KVM_S390_CMMA_PEEK (1 << 0)
161
162/**
163 * kvm_s390_cmma_log - Used for CMMA migration.
164 *
165 * Used both for input and output.
166 *
167 * @start_gfn: Guest page number to start from.
168 * @count: Size of the result buffer.
169 * @flags: Control operation mode via KVM_S390_CMMA_* flags
170 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
171 * pages are still remaining.
172 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
173 * in the PGSTE.
174 * @values: Pointer to the values buffer.
175 *
176 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
177 */
178struct kvm_s390_cmma_log {
179 __u64 start_gfn;
180 __u32 count;
181 __u32 flags;
182 union {
183 __u64 remaining;
184 __u64 mask;
185 };
186 __u64 values;
187};
188
fff02bc0
PB
189struct kvm_hyperv_exit {
190#define KVM_EXIT_HYPERV_SYNIC 1
b89485a5 191#define KVM_EXIT_HYPERV_HCALL 2
f76b348e 192#define KVM_EXIT_HYPERV_SYNDBG 3
fff02bc0 193 __u32 type;
f76b348e 194 __u32 pad1;
fff02bc0
PB
195 union {
196 struct {
197 __u32 msr;
f76b348e 198 __u32 pad2;
fff02bc0
PB
199 __u64 control;
200 __u64 evt_page;
201 __u64 msg_page;
202 } synic;
b89485a5
PB
203 struct {
204 __u64 input;
205 __u64 result;
206 __u64 params[2];
207 } hcall;
f76b348e
CH
208 struct {
209 __u32 msr;
210 __u32 pad2;
211 __u64 control;
212 __u64 status;
213 __u64 send_page;
214 __u64 recv_page;
215 __u64 pending_page;
216 } syndbg;
fff02bc0
PB
217 } u;
218};
219
278f064e
EH
220struct kvm_xen_exit {
221#define KVM_EXIT_XEN_HCALL 1
222 __u32 type;
223 union {
224 struct {
225 __u32 longmode;
226 __u32 cpl;
227 __u64 input;
228 __u64 result;
229 __u64 params[6];
230 } hcall;
231 } u;
232};
233
7a52ce8a
CH
234#define KVM_S390_GET_SKEYS_NONE 1
235#define KVM_S390_SKEYS_MAX 1048576
236
51b24e34
JK
237#define KVM_EXIT_UNKNOWN 0
238#define KVM_EXIT_EXCEPTION 1
239#define KVM_EXIT_IO 2
240#define KVM_EXIT_HYPERCALL 3
241#define KVM_EXIT_DEBUG 4
242#define KVM_EXIT_HLT 5
243#define KVM_EXIT_MMIO 6
244#define KVM_EXIT_IRQ_WINDOW_OPEN 7
245#define KVM_EXIT_SHUTDOWN 8
246#define KVM_EXIT_FAIL_ENTRY 9
247#define KVM_EXIT_INTR 10
248#define KVM_EXIT_SET_TPR 11
249#define KVM_EXIT_TPR_ACCESS 12
250#define KVM_EXIT_S390_SIEIC 13
251#define KVM_EXIT_S390_RESET 14
a9fd1654 252#define KVM_EXIT_DCR 15 /* deprecated */
51b24e34
JK
253#define KVM_EXIT_NMI 16
254#define KVM_EXIT_INTERNAL_ERROR 17
255#define KVM_EXIT_OSI 18
7c6da3de 256#define KVM_EXIT_PAPR_HCALL 19
1529ae1b 257#define KVM_EXIT_S390_UCONTROL 20
d4834ff9 258#define KVM_EXIT_WATCHDOG 21
d3dccee1
AG
259#define KVM_EXIT_S390_TSCH 22
260#define KVM_EXIT_EPR 23
b061808d 261#define KVM_EXIT_SYSTEM_EVENT 24
7a52ce8a 262#define KVM_EXIT_S390_STSI 25
3a824b15 263#define KVM_EXIT_IOAPIC_EOI 26
fff02bc0 264#define KVM_EXIT_HYPERV 27
2a886794 265#define KVM_EXIT_ARM_NISV 28
53ba2eee
MR
266#define KVM_EXIT_X86_RDMSR 29
267#define KVM_EXIT_X86_WRMSR 30
b3c818a4 268#define KVM_EXIT_DIRTY_RING_FULL 31
278f064e
EH
269#define KVM_EXIT_AP_RESET_HOLD 32
270#define KVM_EXIT_X86_BUS_LOCK 33
271#define KVM_EXIT_XEN 34
43709a0c 272#define KVM_EXIT_RISCV_SBI 35
d525f73f
CQ
273#define KVM_EXIT_RISCV_CSR 36
274#define KVM_EXIT_NOTIFY 37
51b24e34
JK
275
276/* For KVM_EXIT_INTERNAL_ERROR */
d4834ff9
AG
277/* Emulate instruction failed. */
278#define KVM_INTERNAL_ERROR_EMULATION 1
279/* Encounter unexpected simultaneous exceptions. */
280#define KVM_INTERNAL_ERROR_SIMUL_EX 2
281/* Encounter unexpected vm-exit due to delivery event. */
282#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
f363d039
EA
283/* Encounter unexpected vm-exit reason */
284#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
51b24e34 285
327d4b7f
BR
286/* Flags that describe what fields in emulation_failure hold valid data. */
287#define KVM_INTERNAL_ERROR_EMULATION_FLAG_INSTRUCTION_BYTES (1ULL << 0)
288
51b24e34
JK
289/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
290struct kvm_run {
291 /* in */
292 __u8 request_interrupt_window;
3a5eb5b4
PB
293 __u8 immediate_exit;
294 __u8 padding1[6];
51b24e34
JK
295
296 /* out */
297 __u32 exit_reason;
298 __u8 ready_for_interrupt_injection;
299 __u8 if_flag;
24a31426 300 __u16 flags;
51b24e34
JK
301
302 /* in (pre_kvm_run), out (post_kvm_run) */
303 __u64 cr8;
304 __u64 apic_base;
305
306#ifdef __KVM_S390
307 /* the processor status word for s390 */
308 __u64 psw_mask; /* psw upper half */
309 __u64 psw_addr; /* psw lower half */
310#endif
311 union {
312 /* KVM_EXIT_UNKNOWN */
313 struct {
314 __u64 hardware_exit_reason;
315 } hw;
316 /* KVM_EXIT_FAIL_ENTRY */
317 struct {
318 __u64 hardware_entry_failure_reason;
e6546342 319 __u32 cpu;
51b24e34
JK
320 } fail_entry;
321 /* KVM_EXIT_EXCEPTION */
322 struct {
323 __u32 exception;
324 __u32 error_code;
325 } ex;
326 /* KVM_EXIT_IO */
327 struct {
328#define KVM_EXIT_IO_IN 0
329#define KVM_EXIT_IO_OUT 1
330 __u8 direction;
331 __u8 size; /* bytes */
332 __u16 port;
333 __u32 count;
334 __u64 data_offset; /* relative to kvm_run start */
335 } io;
3a824b15 336 /* KVM_EXIT_DEBUG */
51b24e34
JK
337 struct {
338 struct kvm_debug_exit_arch arch;
339 } debug;
340 /* KVM_EXIT_MMIO */
341 struct {
342 __u64 phys_addr;
343 __u8 data[8];
344 __u32 len;
345 __u8 is_write;
346 } mmio;
347 /* KVM_EXIT_HYPERCALL */
348 struct {
349 __u64 nr;
350 __u64 args[6];
351 __u64 ret;
352 __u32 longmode;
353 __u32 pad;
354 } hypercall;
355 /* KVM_EXIT_TPR_ACCESS */
356 struct {
357 __u64 rip;
358 __u32 is_write;
359 __u32 pad;
360 } tpr_access;
361 /* KVM_EXIT_S390_SIEIC */
362 struct {
363 __u8 icptcode;
364 __u16 ipa;
365 __u32 ipb;
366 } s390_sieic;
367 /* KVM_EXIT_S390_RESET */
368#define KVM_S390_RESET_POR 1
369#define KVM_S390_RESET_CLEAR 2
370#define KVM_S390_RESET_SUBSYSTEM 4
371#define KVM_S390_RESET_CPU_INIT 8
372#define KVM_S390_RESET_IPL 16
373 __u64 s390_reset_flags;
1529ae1b
AG
374 /* KVM_EXIT_S390_UCONTROL */
375 struct {
376 __u64 trans_exc_code;
377 __u32 pgm_code;
378 } s390_ucontrol;
a9fd1654 379 /* KVM_EXIT_DCR (deprecated) */
51b24e34
JK
380 struct {
381 __u32 dcrn;
382 __u32 data;
383 __u8 is_write;
384 } dcr;
3a824b15 385 /* KVM_EXIT_INTERNAL_ERROR */
51b24e34
JK
386 struct {
387 __u32 suberror;
388 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
389 __u32 ndata;
390 __u64 data[16];
391 } internal;
327d4b7f
BR
392 /*
393 * KVM_INTERNAL_ERROR_EMULATION
394 *
395 * "struct emulation_failure" is an overlay of "struct internal"
396 * that is used for the KVM_INTERNAL_ERROR_EMULATION sub-type of
397 * KVM_EXIT_INTERNAL_ERROR. Note, unlike other internal error
398 * sub-types, this struct is ABI! It also needs to be backwards
399 * compatible with "struct internal". Take special care that
400 * "ndata" is correct, that new fields are enumerated in "flags",
401 * and that each flag enumerates fields that are 64-bit aligned
402 * and sized (so that ndata+internal.data[] is valid/accurate).
43709a0c
PB
403 *
404 * Space beyond the defined fields may be used to store arbitrary
405 * debug information relating to the emulation failure. It is
406 * accounted for in "ndata" but the format is unspecified and is
407 * not represented in "flags". Any such information is *not* ABI!
327d4b7f
BR
408 */
409 struct {
410 __u32 suberror;
411 __u32 ndata;
412 __u64 flags;
43709a0c
PB
413 union {
414 struct {
415 __u8 insn_size;
416 __u8 insn_bytes[15];
417 };
418 };
419 /* Arbitrary debug data may follow. */
327d4b7f 420 } emulation_failure;
51b24e34
JK
421 /* KVM_EXIT_OSI */
422 struct {
423 __u64 gprs[32];
424 } osi;
3a824b15 425 /* KVM_EXIT_PAPR_HCALL */
7c6da3de
AG
426 struct {
427 __u64 nr;
428 __u64 ret;
429 __u64 args[9];
430 } papr_hcall;
d3dccee1
AG
431 /* KVM_EXIT_S390_TSCH */
432 struct {
433 __u16 subchannel_id;
434 __u16 subchannel_nr;
435 __u32 io_int_parm;
436 __u32 io_int_word;
437 __u32 ipb;
438 __u8 dequeued;
439 } s390_tsch;
440 /* KVM_EXIT_EPR */
441 struct {
442 __u32 epr;
443 } epr;
b061808d
AG
444 /* KVM_EXIT_SYSTEM_EVENT */
445 struct {
446#define KVM_SYSTEM_EVENT_SHUTDOWN 1
447#define KVM_SYSTEM_EVENT_RESET 2
120758fb 448#define KVM_SYSTEM_EVENT_CRASH 3
d525f73f
CQ
449#define KVM_SYSTEM_EVENT_WAKEUP 4
450#define KVM_SYSTEM_EVENT_SUSPEND 5
451#define KVM_SYSTEM_EVENT_SEV_TERM 6
b061808d 452 __u32 type;
e4082063
AW
453 __u32 ndata;
454 union {
455 __u64 flags;
456 __u64 data[16];
457 };
b061808d 458 } system_event;
7a52ce8a
CH
459 /* KVM_EXIT_S390_STSI */
460 struct {
461 __u64 addr;
462 __u8 ar;
463 __u8 reserved;
464 __u8 fc;
465 __u8 sel1;
466 __u16 sel2;
467 } s390_stsi;
3a824b15
PB
468 /* KVM_EXIT_IOAPIC_EOI */
469 struct {
470 __u8 vector;
471 } eoi;
fff02bc0
PB
472 /* KVM_EXIT_HYPERV */
473 struct kvm_hyperv_exit hyperv;
2a886794
GK
474 /* KVM_EXIT_ARM_NISV */
475 struct {
476 __u64 esr_iss;
477 __u64 fault_ipa;
478 } arm_nisv;
53ba2eee
MR
479 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
480 struct {
481 __u8 error; /* user -> kernel */
482 __u8 pad[7];
483#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
484#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
485#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
486 __u32 reason; /* kernel -> user */
487 __u32 index; /* kernel -> user */
488 __u64 data; /* kernel <-> user */
489 } msr;
278f064e
EH
490 /* KVM_EXIT_XEN */
491 struct kvm_xen_exit xen;
43709a0c
PB
492 /* KVM_EXIT_RISCV_SBI */
493 struct {
494 unsigned long extension_id;
495 unsigned long function_id;
496 unsigned long args[6];
497 unsigned long ret[2];
498 } riscv_sbi;
d525f73f
CQ
499 /* KVM_EXIT_RISCV_CSR */
500 struct {
501 unsigned long csr_num;
502 unsigned long new_value;
503 unsigned long write_mask;
504 unsigned long ret_value;
505 } riscv_csr;
506 /* KVM_EXIT_NOTIFY */
507 struct {
508#define KVM_NOTIFY_CONTEXT_INVALID (1 << 0)
509 __u32 flags;
510 } notify;
51b24e34
JK
511 /* Fix the size of the union. */
512 char padding[256];
513 };
1529ae1b 514
65a6d8dd
PM
515 /* 2048 is the size of the char array used to bound/pad the size
516 * of the union that holds sync regs.
517 */
518 #define SYNC_REGS_SIZE_BYTES 2048
1529ae1b
AG
519 /*
520 * shared registers between kvm and userspace.
521 * kvm_valid_regs specifies the register classes set by the host
522 * kvm_dirty_regs specified the register classes dirtied by userspace
523 * struct kvm_sync_regs is architecture specific, as well as the
524 * bits for kvm_valid_regs and kvm_dirty_regs
525 */
526 __u64 kvm_valid_regs;
527 __u64 kvm_dirty_regs;
528 union {
529 struct kvm_sync_regs regs;
65a6d8dd 530 char padding[SYNC_REGS_SIZE_BYTES];
1529ae1b 531 } s;
51b24e34
JK
532};
533
534/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
535
536struct kvm_coalesced_mmio_zone {
537 __u64 addr;
538 __u32 size;
966f2ec3
PB
539 union {
540 __u32 pad;
541 __u32 pio;
542 };
51b24e34
JK
543};
544
545struct kvm_coalesced_mmio {
546 __u64 phys_addr;
547 __u32 len;
966f2ec3
PB
548 union {
549 __u32 pad;
550 __u32 pio;
551 };
51b24e34
JK
552 __u8 data[8];
553};
554
555struct kvm_coalesced_mmio_ring {
556 __u32 first, last;
d525f73f 557 struct kvm_coalesced_mmio coalesced_mmio[];
51b24e34
JK
558};
559
560#define KVM_COALESCED_MMIO_MAX \
561 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
562 sizeof(struct kvm_coalesced_mmio))
563
564/* for KVM_TRANSLATE */
565struct kvm_translation {
566 /* in */
567 __u64 linear_address;
568
569 /* out */
570 __u64 physical_address;
571 __u8 valid;
572 __u8 writeable;
573 __u8 usermode;
574 __u8 pad[5];
575};
576
7a52ce8a
CH
577/* for KVM_S390_MEM_OP */
578struct kvm_s390_mem_op {
579 /* in */
580 __u64 gaddr; /* the guest address */
581 __u64 flags; /* flags */
582 __u32 size; /* amount of bytes */
583 __u32 op; /* type of operation */
584 __u64 buf; /* buffer in userspace */
dc6f8d45 585 union {
e4082063
AW
586 struct {
587 __u8 ar; /* the access register number */
588 __u8 key; /* access key, ignored if flag unset */
589 };
dc6f8d45 590 __u32 sida_offset; /* offset into the sida */
e4082063 591 __u8 reserved[32]; /* ignored */
dc6f8d45 592 };
7a52ce8a
CH
593};
594/* types for kvm_s390_mem_op->op */
595#define KVM_S390_MEMOP_LOGICAL_READ 0
596#define KVM_S390_MEMOP_LOGICAL_WRITE 1
dc6f8d45
CH
597#define KVM_S390_MEMOP_SIDA_READ 2
598#define KVM_S390_MEMOP_SIDA_WRITE 3
e4082063
AW
599#define KVM_S390_MEMOP_ABSOLUTE_READ 4
600#define KVM_S390_MEMOP_ABSOLUTE_WRITE 5
7a52ce8a
CH
601/* flags for kvm_s390_mem_op->flags */
602#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
603#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
e4082063 604#define KVM_S390_MEMOP_F_SKEY_PROTECTION (1ULL << 2)
7a52ce8a 605
51b24e34
JK
606/* for KVM_INTERRUPT */
607struct kvm_interrupt {
608 /* in */
609 __u32 irq;
610};
611
612/* for KVM_GET_DIRTY_LOG */
613struct kvm_dirty_log {
614 __u32 slot;
615 __u32 padding1;
616 union {
617 void *dirty_bitmap; /* one bit per page */
618 __u64 padding2;
619 };
620};
621
da054c64
PB
622/* for KVM_CLEAR_DIRTY_LOG */
623struct kvm_clear_dirty_log {
624 __u32 slot;
625 __u32 num_pages;
626 __u64 first_page;
627 union {
628 void *dirty_bitmap; /* one bit per page */
629 __u64 padding2;
630 };
631};
632
51b24e34
JK
633/* for KVM_SET_SIGNAL_MASK */
634struct kvm_signal_mask {
635 __u32 len;
d525f73f 636 __u8 sigset[];
51b24e34
JK
637};
638
639/* for KVM_TPR_ACCESS_REPORTING */
640struct kvm_tpr_access_ctl {
641 __u32 enabled;
642 __u32 flags;
643 __u32 reserved[8];
644};
645
646/* for KVM_SET_VAPIC_ADDR */
647struct kvm_vapic_addr {
648 __u64 vapic_addr;
649};
650
a9fd1654 651/* for KVM_SET_MP_STATE */
51b24e34 652
a9fd1654 653/* not all states are valid on all architectures */
51b24e34
JK
654#define KVM_MP_STATE_RUNNABLE 0
655#define KVM_MP_STATE_UNINITIALIZED 1
656#define KVM_MP_STATE_INIT_RECEIVED 2
657#define KVM_MP_STATE_HALTED 3
658#define KVM_MP_STATE_SIPI_RECEIVED 4
a9fd1654
JF
659#define KVM_MP_STATE_STOPPED 5
660#define KVM_MP_STATE_CHECK_STOP 6
661#define KVM_MP_STATE_OPERATING 7
662#define KVM_MP_STATE_LOAD 8
278f064e 663#define KVM_MP_STATE_AP_RESET_HOLD 9
d525f73f 664#define KVM_MP_STATE_SUSPENDED 10
51b24e34
JK
665
666struct kvm_mp_state {
667 __u32 mp_state;
668};
669
670struct kvm_s390_psw {
671 __u64 mask;
672 __u64 addr;
673};
674
675/* valid values for type in kvm_s390_interrupt */
676#define KVM_S390_SIGP_STOP 0xfffe0000u
677#define KVM_S390_PROGRAM_INT 0xfffe0001u
678#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
679#define KVM_S390_RESTART 0xfffe0003u
216db403
CB
680#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
681#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
d3dccee1 682#define KVM_S390_MCHK 0xfffe1000u
76eb98d5
JF
683#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
684#define KVM_S390_INT_CPU_TIMER 0xffff1005u
51b24e34
JK
685#define KVM_S390_INT_VIRTIO 0xffff2603u
686#define KVM_S390_INT_SERVICE 0xffff2401u
687#define KVM_S390_INT_EMERGENCY 0xffff1201u
1529ae1b 688#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d3dccee1
AG
689/* Anything below 0xfffe0000u is taken by INT_IO */
690#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
691 (((schid)) | \
692 ((ssid) << 16) | \
693 ((cssid) << 18) | \
694 ((ai) << 26))
695#define KVM_S390_INT_IO_MIN 0x00000000u
696#define KVM_S390_INT_IO_MAX 0xfffdffffu
120758fb 697#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d3dccee1 698
51b24e34
JK
699
700struct kvm_s390_interrupt {
701 __u32 type;
702 __u32 parm;
703 __u64 parm64;
704};
705
216db403
CB
706struct kvm_s390_io_info {
707 __u16 subchannel_id;
708 __u16 subchannel_nr;
709 __u32 io_int_parm;
710 __u32 io_int_word;
711};
712
713struct kvm_s390_ext_info {
714 __u32 ext_params;
715 __u32 pad;
716 __u64 ext_params2;
717};
718
719struct kvm_s390_pgm_info {
720 __u64 trans_exc_code;
721 __u64 mon_code;
722 __u64 per_address;
723 __u32 data_exc_code;
724 __u16 code;
725 __u16 mon_class_nr;
726 __u8 per_code;
727 __u8 per_atmid;
728 __u8 exc_access_id;
729 __u8 per_access_id;
730 __u8 op_access_id;
66fb2d54
CH
731#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
732#define KVM_S390_PGM_FLAGS_ILC_0 0x02
733#define KVM_S390_PGM_FLAGS_ILC_1 0x04
734#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
735#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
736 __u8 flags;
737 __u8 pad[2];
216db403
CB
738};
739
740struct kvm_s390_prefix_info {
741 __u32 address;
742};
743
744struct kvm_s390_extcall_info {
745 __u16 code;
746};
747
748struct kvm_s390_emerg_info {
749 __u16 code;
750};
751
51628b18
CB
752#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
753struct kvm_s390_stop_info {
754 __u32 flags;
755};
756
216db403
CB
757struct kvm_s390_mchk_info {
758 __u64 cr14;
759 __u64 mcic;
760 __u64 failing_storage_address;
761 __u32 ext_damage_code;
762 __u32 pad;
763 __u8 fixed_logout[16];
764};
765
766struct kvm_s390_irq {
767 __u64 type;
768 union {
769 struct kvm_s390_io_info io;
770 struct kvm_s390_ext_info ext;
771 struct kvm_s390_pgm_info pgm;
772 struct kvm_s390_emerg_info emerg;
773 struct kvm_s390_extcall_info extcall;
774 struct kvm_s390_prefix_info prefix;
51628b18 775 struct kvm_s390_stop_info stop;
216db403
CB
776 struct kvm_s390_mchk_info mchk;
777 char reserved[64];
778 } u;
779};
780
7a52ce8a
CH
781struct kvm_s390_irq_state {
782 __u64 buf;
9cbb6362 783 __u32 flags; /* will stay unused for compatibility reasons */
7a52ce8a 784 __u32 len;
9cbb6362 785 __u32 reserved[4]; /* will stay unused for compatibility reasons */
7a52ce8a
CH
786};
787
51b24e34
JK
788/* for KVM_SET_GUEST_DEBUG */
789
790#define KVM_GUESTDBG_ENABLE 0x00000001
791#define KVM_GUESTDBG_SINGLESTEP 0x00000002
792
793struct kvm_guest_debug {
794 __u32 control;
795 __u32 pad;
796 struct kvm_guest_debug_arch arch;
797};
798
799enum {
800 kvm_ioeventfd_flag_nr_datamatch,
801 kvm_ioeventfd_flag_nr_pio,
802 kvm_ioeventfd_flag_nr_deassign,
cae7f586 803 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
76eb98d5 804 kvm_ioeventfd_flag_nr_fast_mmio,
51b24e34
JK
805 kvm_ioeventfd_flag_nr_max,
806};
807
808#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
809#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
810#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
cae7f586
AG
811#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
812 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
51b24e34
JK
813
814#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
815
816struct kvm_ioeventfd {
817 __u64 datamatch;
818 __u64 addr; /* legal pio/mmio address */
76eb98d5 819 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
51b24e34
JK
820 __s32 fd;
821 __u32 flags;
822 __u8 pad[36];
823};
824
65a6d8dd 825#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
77d361b1 826#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
65a6d8dd 827#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
d38d201f 828#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
65a6d8dd 829#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
77d361b1 830 KVM_X86_DISABLE_EXITS_HLT | \
d38d201f
WL
831 KVM_X86_DISABLE_EXITS_PAUSE | \
832 KVM_X86_DISABLE_EXITS_CSTATE)
65a6d8dd 833
51b24e34
JK
834/* for KVM_ENABLE_CAP */
835struct kvm_enable_cap {
836 /* in */
837 __u32 cap;
838 __u32 flags;
839 __u64 args[4];
840 __u8 pad[64];
841};
842
843/* for KVM_PPC_GET_PVINFO */
3a5eb5b4
PB
844
845#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
846
51b24e34
JK
847struct kvm_ppc_pvinfo {
848 /* out */
849 __u32 flags;
850 __u32 hcall[4];
851 __u8 pad[108];
852};
853
80a3eb10
JK
854/* for KVM_PPC_GET_SMMU_INFO */
855#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
856
857struct kvm_ppc_one_page_size {
858 __u32 page_shift; /* Page shift (or 0) */
859 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
860};
861
862struct kvm_ppc_one_seg_page_size {
863 __u32 page_shift; /* Base page shift of segment (or 0) */
864 __u32 slb_enc; /* SLB encoding for BookS */
865 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
866};
867
868#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
869#define KVM_PPC_1T_SEGMENTS 0x00000002
966f2ec3 870#define KVM_PPC_NO_HASH 0x00000004
80a3eb10
JK
871
872struct kvm_ppc_smmu_info {
873 __u64 flags;
874 __u32 slb_size;
d4083f50
AP
875 __u16 data_keys; /* # storage keys supported for data */
876 __u16 instr_keys; /* # storage keys supported for instructions */
80a3eb10
JK
877 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
878};
879
3a5eb5b4
PB
880/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
881struct kvm_ppc_resize_hpt {
882 __u64 flags;
883 __u32 shift;
884 __u32 pad;
885};
d4834ff9 886
51b24e34
JK
887#define KVMIO 0xAE
888
1529ae1b
AG
889/* machine type bits, to be used as argument to KVM_CREATE_VM */
890#define KVM_VM_S390_UCONTROL 1
891
bf63839f
AW
892/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
893#define KVM_VM_PPC_HV 1
894#define KVM_VM_PPC_PR 2
895
94c7fefc
AJ
896/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
897#define KVM_VM_MIPS_AUTO 0
74c98e20 898#define KVM_VM_MIPS_VZ 1
94c7fefc 899#define KVM_VM_MIPS_TE 2
74c98e20 900
1529ae1b
AG
901#define KVM_S390_SIE_PAGE_OFFSET 1
902
da054c64
PB
903/*
904 * On arm64, machine type can be used to request the physical
905 * address size for the VM. Bits[7-0] are reserved for the guest
906 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
907 * value 0 implies the default IPA size, 40bits.
908 */
909#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
910#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
911 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
51b24e34
JK
912/*
913 * ioctls for /dev/kvm fds:
914 */
915#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
916#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
917#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
918
919#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
920/*
921 * Check if a kvm extension is available. Argument is extension number,
922 * return is 1 (yes) or 0 (no, sorry).
923 */
924#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
925/*
926 * Get size for mmap(vcpu_fd)
927 */
928#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
929#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
930#define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06
931#define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07
932#define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08
bf63839f 933#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
9f2d175d 934#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
51b24e34
JK
935
936/*
937 * Extension capability list.
938 */
939#define KVM_CAP_IRQCHIP 0
940#define KVM_CAP_HLT 1
941#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
942#define KVM_CAP_USER_MEMORY 3
943#define KVM_CAP_SET_TSS_ADDR 4
944#define KVM_CAP_VAPIC 6
945#define KVM_CAP_EXT_CPUID 7
946#define KVM_CAP_CLOCKSOURCE 8
7c6da3de 947#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
51b24e34
JK
948#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
949#define KVM_CAP_PIT 11
950#define KVM_CAP_NOP_IO_DELAY 12
951#define KVM_CAP_PV_MMU 13
952#define KVM_CAP_MP_STATE 14
953#define KVM_CAP_COALESCED_MMIO 15
954#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
51b24e34 955#define KVM_CAP_IOMMU 18
51b24e34
JK
956/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
957#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
51b24e34 958#define KVM_CAP_USER_NMI 22
51b24e34
JK
959#ifdef __KVM_HAVE_GUEST_DEBUG
960#define KVM_CAP_SET_GUEST_DEBUG 23
961#endif
962#ifdef __KVM_HAVE_PIT
963#define KVM_CAP_REINJECT_CONTROL 24
964#endif
51b24e34 965#define KVM_CAP_IRQ_ROUTING 25
51b24e34 966#define KVM_CAP_IRQ_INJECT_STATUS 26
51b24e34
JK
967#define KVM_CAP_ASSIGN_DEV_IRQ 29
968/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
969#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
970#ifdef __KVM_HAVE_MCE
971#define KVM_CAP_MCE 31
972#endif
973#define KVM_CAP_IRQFD 32
974#ifdef __KVM_HAVE_PIT
975#define KVM_CAP_PIT2 33
976#endif
977#define KVM_CAP_SET_BOOT_CPU_ID 34
978#ifdef __KVM_HAVE_PIT_STATE2
979#define KVM_CAP_PIT_STATE2 35
980#endif
981#define KVM_CAP_IOEVENTFD 36
982#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
983#ifdef __KVM_HAVE_XEN_HVM
984#define KVM_CAP_XEN_HVM 38
985#endif
986#define KVM_CAP_ADJUST_CLOCK 39
987#define KVM_CAP_INTERNAL_ERROR_DATA 40
988#ifdef __KVM_HAVE_VCPU_EVENTS
989#define KVM_CAP_VCPU_EVENTS 41
990#endif
991#define KVM_CAP_S390_PSW 42
992#define KVM_CAP_PPC_SEGSTATE 43
993#define KVM_CAP_HYPERV 44
994#define KVM_CAP_HYPERV_VAPIC 45
995#define KVM_CAP_HYPERV_SPIN 46
996#define KVM_CAP_PCI_SEGMENT 47
997#define KVM_CAP_PPC_PAIRED_SINGLES 48
998#define KVM_CAP_INTR_SHADOW 49
999#ifdef __KVM_HAVE_DEBUGREGS
1000#define KVM_CAP_DEBUGREGS 50
1001#endif
1002#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
1003#define KVM_CAP_PPC_OSI 52
1004#define KVM_CAP_PPC_UNSET_IRQ 53
1005#define KVM_CAP_ENABLE_CAP 54
1006#ifdef __KVM_HAVE_XSAVE
1007#define KVM_CAP_XSAVE 55
1008#endif
1009#ifdef __KVM_HAVE_XCRS
1010#define KVM_CAP_XCRS 56
1011#endif
1012#define KVM_CAP_PPC_GET_PVINFO 57
1013#define KVM_CAP_PPC_IRQ_LEVEL 58
1014#define KVM_CAP_ASYNC_PF 59
1015#define KVM_CAP_TSC_CONTROL 60
1016#define KVM_CAP_GET_TSC_KHZ 61
1017#define KVM_CAP_PPC_BOOKE_SREGS 62
7c6da3de
AG
1018#define KVM_CAP_SPAPR_TCE 63
1019#define KVM_CAP_PPC_SMT 64
1020#define KVM_CAP_PPC_RMA 65
1021#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
9d4e4f8c 1022#define KVM_CAP_PPC_HIOR 67
7c6da3de 1023#define KVM_CAP_PPC_PAPR 68
a54fc080 1024#define KVM_CAP_SW_TLB 69
9d4e4f8c 1025#define KVM_CAP_ONE_REG 70
1529ae1b
AG
1026#define KVM_CAP_S390_GMAP 71
1027#define KVM_CAP_TSC_DEADLINE_TIMER 72
1028#define KVM_CAP_S390_UCONTROL 73
1029#define KVM_CAP_SYNC_REGS 74
9ab2195d
MT
1030#define KVM_CAP_PCI_2_3 75
1031#define KVM_CAP_KVMCLOCK_CTRL 76
80a3eb10
JK
1032#define KVM_CAP_SIGNAL_MSI 77
1033#define KVM_CAP_PPC_GET_SMMU_INFO 78
2a60dba4 1034#define KVM_CAP_S390_COW 79
651682dc 1035#define KVM_CAP_PPC_ALLOC_HTAB 80
716b8e4d 1036#define KVM_CAP_READONLY_MEM 81
716b8e4d 1037#define KVM_CAP_IRQFD_RESAMPLE 82
d4834ff9
AG
1038#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
1039#define KVM_CAP_PPC_HTAB_FD 84
d3dccee1
AG
1040#define KVM_CAP_S390_CSS_SUPPORT 85
1041#define KVM_CAP_PPC_EPR 86
eadd0e44
PM
1042#define KVM_CAP_ARM_PSCI 87
1043#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
e098b453
AK
1044#define KVM_CAP_DEVICE_CTRL 89
1045#define KVM_CAP_IRQ_MPIC 90
1046#define KVM_CAP_PPC_RTAS 91
1047#define KVM_CAP_IRQ_XICS 92
c5daeae1 1048#define KVM_CAP_ARM_EL1_32BIT 93
4f265607 1049#define KVM_CAP_SPAPR_MULTITCE 94
bf63839f 1050#define KVM_CAP_EXT_EMUL_CPUID 95
48a5f3bc 1051#define KVM_CAP_HYPERV_TIME 96
9ffd2685
CH
1052#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
1053#define KVM_CAP_ENABLE_CAP_VM 98
1054#define KVM_CAP_S390_IRQCHIP 99
76eb98d5
JF
1055#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
1056#define KVM_CAP_VM_ATTRIBUTES 101
b061808d
AG
1057#define KVM_CAP_ARM_PSCI_0_2 102
1058#define KVM_CAP_PPC_FIXUP_HCALL 103
a9fd1654
JF
1059#define KVM_CAP_PPC_ENABLE_HCALL 104
1060#define KVM_CAP_CHECK_EXTENSION_VM 105
51628b18 1061#define KVM_CAP_S390_USER_SIGP 106
7a52ce8a
CH
1062#define KVM_CAP_S390_VECTOR_REGISTERS 107
1063#define KVM_CAP_S390_MEM_OP 108
1064#define KVM_CAP_S390_USER_STSI 109
1065#define KVM_CAP_S390_SKEYS 110
1066#define KVM_CAP_MIPS_FPU 111
1067#define KVM_CAP_MIPS_MSA 112
1068#define KVM_CAP_S390_INJECT_IRQ 113
1069#define KVM_CAP_S390_IRQ_STATE 114
1070#define KVM_CAP_PPC_HWRNG 115
24a31426
PB
1071#define KVM_CAP_DISABLE_QUIRKS 116
1072#define KVM_CAP_X86_SMM 117
1073#define KVM_CAP_MULTI_ADDRESS_SPACE 118
3a824b15
PB
1074#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
1075#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
1076#define KVM_CAP_SPLIT_IRQCHIP 121
1077#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
fff02bc0 1078#define KVM_CAP_HYPERV_SYNIC 123
66fb2d54 1079#define KVM_CAP_S390_RI 124
b89485a5
PB
1080#define KVM_CAP_SPAPR_TCE_64 125
1081#define KVM_CAP_ARM_PMU_V3 126
1082#define KVM_CAP_VCPU_ATTRIBUTES 127
ff804f15 1083#define KVM_CAP_MAX_VCPU_ID 128
dbdfea92
CH
1084#define KVM_CAP_X2APIC_API 129
1085#define KVM_CAP_S390_USER_INSTR0 130
1086#define KVM_CAP_MSI_DEVID 131
1087#define KVM_CAP_PPC_HTM 132
3a5eb5b4
PB
1088#define KVM_CAP_SPAPR_RESIZE_HPT 133
1089#define KVM_CAP_PPC_MMU_RADIX 134
1090#define KVM_CAP_PPC_MMU_HASH_V3 135
1091#define KVM_CAP_IMMEDIATE_EXIT 136
74c98e20
CH
1092#define KVM_CAP_MIPS_VZ 137
1093#define KVM_CAP_MIPS_TE 138
1094#define KVM_CAP_MIPS_64BIT 139
1095#define KVM_CAP_S390_GS 140
1096#define KVM_CAP_S390_AIS 141
1097#define KVM_CAP_SPAPR_TCE_VFIO 142
65a6d8dd 1098#define KVM_CAP_X86_DISABLE_EXITS 143
74c98e20 1099#define KVM_CAP_ARM_USER_IRQ 144
3272f0e2
CB
1100#define KVM_CAP_S390_CMMA_MIGRATION 145
1101#define KVM_CAP_PPC_FWNMI 146
1102#define KVM_CAP_PPC_SMT_POSSIBLE 147
ab6e1550
CB
1103#define KVM_CAP_HYPERV_SYNIC2 148
1104#define KVM_CAP_HYPERV_VP_INDEX 149
dd873966 1105#define KVM_CAP_S390_AIS_MIGRATION 150
9cbb6362
CH
1106#define KVM_CAP_PPC_GET_CPU_CHAR 151
1107#define KVM_CAP_S390_BPB 152
9f2d175d 1108#define KVM_CAP_GET_MSR_FEATURES 153
65a6d8dd 1109#define KVM_CAP_HYPERV_EVENTFD 154
77d361b1 1110#define KVM_CAP_HYPERV_TLBFLUSH 155
d36f7de8
CH
1111#define KVM_CAP_S390_HPAGE_1M 156
1112#define KVM_CAP_NESTED_STATE 157
8f3cd250
CH
1113#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
1114#define KVM_CAP_MSR_PLATFORM_INFO 159
966f2ec3
PB
1115#define KVM_CAP_PPC_NESTED_HV 160
1116#define KVM_CAP_HYPERV_SEND_IPI 161
1117#define KVM_CAP_COALESCED_PIO 162
1118#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
1119#define KVM_CAP_EXCEPTION_PAYLOAD 164
da054c64 1120#define KVM_CAP_ARM_VM_IPA_SIZE 165
d9cb4336 1121#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
da054c64 1122#define KVM_CAP_HYPERV_CPUID 167
d9cb4336
CH
1123#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
1124#define KVM_CAP_PPC_IRQ_XIVE 169
1125#define KVM_CAP_ARM_SVE 170
1126#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1127#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
f363d039
EA
1128#define KVM_CAP_PMU_EVENT_FILTER 173
1129#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
1130#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
2a886794
GK
1131#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
1132#define KVM_CAP_ARM_NISV_TO_USER 177
1133#define KVM_CAP_ARM_INJECT_EXT_DABT 178
ddda3748 1134#define KVM_CAP_S390_VCPU_RESETS 179
dc6f8d45
CH
1135#define KVM_CAP_S390_PROTECTED 180
1136#define KVM_CAP_PPC_SECURE_GUEST 181
f76b348e
CH
1137#define KVM_CAP_HALT_POLL 182
1138#define KVM_CAP_ASYNC_PF_INT 183
e6546342
JW
1139#define KVM_CAP_LAST_CPU 184
1140#define KVM_CAP_SMALLER_MAXPHYADDR 185
1141#define KVM_CAP_S390_DIAG318 186
94c7fefc 1142#define KVM_CAP_STEAL_TIME 187
53ba2eee
MR
1143#define KVM_CAP_X86_USER_SPACE_MSR 188
1144#define KVM_CAP_X86_MSR_FILTER 189
1145#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
b3c818a4
EF
1146#define KVM_CAP_SYS_HYPERV_CPUID 191
1147#define KVM_CAP_DIRTY_LOG_RING 192
278f064e
EH
1148#define KVM_CAP_X86_BUS_LOCK_EXIT 193
1149#define KVM_CAP_PPC_DAWR1 194
1150#define KVM_CAP_SET_GUEST_DEBUG2 195
1151#define KVM_CAP_SGX_ATTRIBUTE 196
1152#define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197
1153#define KVM_CAP_PTP_KVM 198
327d4b7f
BR
1154#define KVM_CAP_HYPERV_ENFORCE_CPUID 199
1155#define KVM_CAP_SREGS2 200
1156#define KVM_CAP_EXIT_HYPERCALL 201
1157#define KVM_CAP_PPC_RPT_INVALIDATE 202
1158#define KVM_CAP_BINARY_STATS_FD 203
1159#define KVM_CAP_EXIT_ON_EMULATION_FAILURE 204
1160#define KVM_CAP_ARM_MTE 205
ef17dd6a
VG
1161#define KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM 206
1162#define KVM_CAP_VM_GPA_BITS 207
1163#define KVM_CAP_XSAVE2 208
1ea5208f 1164#define KVM_CAP_SYS_ATTRIBUTES 209
e4082063
AW
1165#define KVM_CAP_PPC_AIL_MODE_3 210
1166#define KVM_CAP_S390_MEM_OP_EXTENSION 211
1167#define KVM_CAP_PMU_CAPABILITY 212
1168#define KVM_CAP_DISABLE_QUIRKS2 213
d525f73f 1169#define KVM_CAP_VM_TSC_CONTROL 214
e4082063 1170#define KVM_CAP_SYSTEM_EVENT_DATA 215
d525f73f
CQ
1171#define KVM_CAP_ARM_SYSTEM_SUSPEND 216
1172#define KVM_CAP_S390_PROTECTED_DUMP 217
1173#define KVM_CAP_X86_TRIPLE_FAULT_EVENT 218
1174#define KVM_CAP_X86_NOTIFY_VMEXIT 219
1175#define KVM_CAP_VM_DISABLE_NX_HUGE_PAGES 220
1176#define KVM_CAP_S390_ZPCI_OP 221
1177#define KVM_CAP_S390_CPU_TOPOLOGY 222
93e0932b 1178#define KVM_CAP_DIRTY_LOG_RING_ACQ_REL 223
51b24e34
JK
1179
1180#ifdef KVM_CAP_IRQ_ROUTING
1181
1182struct kvm_irq_routing_irqchip {
1183 __u32 irqchip;
1184 __u32 pin;
1185};
1186
1187struct kvm_irq_routing_msi {
1188 __u32 address_lo;
1189 __u32 address_hi;
1190 __u32 data;
dbdfea92
CH
1191 union {
1192 __u32 pad;
1193 __u32 devid;
1194 };
51b24e34
JK
1195};
1196
9ffd2685
CH
1197struct kvm_irq_routing_s390_adapter {
1198 __u64 ind_addr;
1199 __u64 summary_addr;
1200 __u64 ind_offset;
1201 __u32 summary_offset;
1202 __u32 adapter_id;
1203};
1204
fff02bc0
PB
1205struct kvm_irq_routing_hv_sint {
1206 __u32 vcpu;
1207 __u32 sint;
1208};
1209
ef17dd6a
VG
1210struct kvm_irq_routing_xen_evtchn {
1211 __u32 port;
1212 __u32 vcpu;
1213 __u32 priority;
1214};
1215
1216#define KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL ((__u32)(-1))
1217
51b24e34
JK
1218/* gsi routing entry types */
1219#define KVM_IRQ_ROUTING_IRQCHIP 1
1220#define KVM_IRQ_ROUTING_MSI 2
9ffd2685 1221#define KVM_IRQ_ROUTING_S390_ADAPTER 3
fff02bc0 1222#define KVM_IRQ_ROUTING_HV_SINT 4
ef17dd6a 1223#define KVM_IRQ_ROUTING_XEN_EVTCHN 5
51b24e34
JK
1224
1225struct kvm_irq_routing_entry {
1226 __u32 gsi;
1227 __u32 type;
1228 __u32 flags;
1229 __u32 pad;
1230 union {
1231 struct kvm_irq_routing_irqchip irqchip;
1232 struct kvm_irq_routing_msi msi;
9ffd2685 1233 struct kvm_irq_routing_s390_adapter adapter;
fff02bc0 1234 struct kvm_irq_routing_hv_sint hv_sint;
ef17dd6a 1235 struct kvm_irq_routing_xen_evtchn xen_evtchn;
51b24e34
JK
1236 __u32 pad[8];
1237 } u;
1238};
1239
1240struct kvm_irq_routing {
1241 __u32 nr;
1242 __u32 flags;
d525f73f 1243 struct kvm_irq_routing_entry entries[];
51b24e34
JK
1244};
1245
1246#endif
1247
1248#ifdef KVM_CAP_MCE
1249/* x86 MCE */
1250struct kvm_x86_mce {
1251 __u64 status;
1252 __u64 addr;
1253 __u64 misc;
1254 __u64 mcg_status;
1255 __u8 bank;
1256 __u8 pad1[7];
1257 __u64 pad2[3];
1258};
1259#endif
1260
1261#ifdef KVM_CAP_XEN_HVM
278f064e
EH
1262#define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0)
1263#define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1)
1264#define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2)
1265#define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3)
ef17dd6a 1266#define KVM_XEN_HVM_CONFIG_EVTCHN_2LEVEL (1 << 4)
d525f73f 1267#define KVM_XEN_HVM_CONFIG_EVTCHN_SEND (1 << 5)
278f064e 1268
51b24e34
JK
1269struct kvm_xen_hvm_config {
1270 __u32 flags;
1271 __u32 msr;
1272 __u64 blob_addr_32;
1273 __u64 blob_addr_64;
1274 __u8 blob_size_32;
1275 __u8 blob_size_64;
1276 __u8 pad2[30];
1277};
1278#endif
1279
1280#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
716b8e4d
AW
1281/*
1282 * Available with KVM_CAP_IRQFD_RESAMPLE
1283 *
1284 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1285 * the irqfd to operate in resampling mode for level triggered interrupt
f76b348e 1286 * emulation. See Documentation/virt/kvm/api.rst.
716b8e4d
AW
1287 */
1288#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
51b24e34
JK
1289
1290struct kvm_irqfd {
1291 __u32 fd;
1292 __u32 gsi;
1293 __u32 flags;
716b8e4d
AW
1294 __u32 resamplefd;
1295 __u8 pad[16];
51b24e34
JK
1296};
1297
bc204035
MT
1298/* For KVM_CAP_ADJUST_CLOCK */
1299
1300/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1301#define KVM_CLOCK_TSC_STABLE 2
43709a0c
PB
1302#define KVM_CLOCK_REALTIME (1 << 2)
1303#define KVM_CLOCK_HOST_TSC (1 << 3)
bc204035 1304
51b24e34
JK
1305struct kvm_clock_data {
1306 __u64 clock;
1307 __u32 flags;
43709a0c
PB
1308 __u32 pad0;
1309 __u64 realtime;
1310 __u64 host_tsc;
1311 __u32 pad[4];
51b24e34
JK
1312};
1313
bc204035
MT
1314/* For KVM_CAP_SW_TLB */
1315
a54fc080
AG
1316#define KVM_MMU_FSL_BOOKE_NOHV 0
1317#define KVM_MMU_FSL_BOOKE_HV 1
1318
1319struct kvm_config_tlb {
1320 __u64 params;
1321 __u64 array;
1322 __u32 mmu_type;
1323 __u32 array_len;
1324};
1325
1326struct kvm_dirty_tlb {
1327 __u64 bitmap;
1328 __u32 num_dirty;
1329};
1330
9d4e4f8c
AG
1331/* Available with KVM_CAP_ONE_REG */
1332
a31be480
AG
1333#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1334#define KVM_REG_GENERIC 0x0000000000000000ULL
9d4e4f8c
AG
1335
1336/*
1337 * Architecture specific registers are to be defined in arch headers and
1338 * ORed with the arch identifier.
1339 */
a31be480
AG
1340#define KVM_REG_PPC 0x1000000000000000ULL
1341#define KVM_REG_X86 0x2000000000000000ULL
1342#define KVM_REG_IA64 0x3000000000000000ULL
1343#define KVM_REG_ARM 0x4000000000000000ULL
1344#define KVM_REG_S390 0x5000000000000000ULL
c5daeae1
AK
1345#define KVM_REG_ARM64 0x6000000000000000ULL
1346#define KVM_REG_MIPS 0x7000000000000000ULL
f363d039 1347#define KVM_REG_RISCV 0x8000000000000000ULL
a31be480
AG
1348
1349#define KVM_REG_SIZE_SHIFT 52
1350#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1351#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1352#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1353#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1354#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1355#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1356#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1357#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1358#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
d9cb4336 1359#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
9d4e4f8c 1360
eadd0e44
PM
1361struct kvm_reg_list {
1362 __u64 n; /* number of regs */
d525f73f 1363 __u64 reg[];
eadd0e44
PM
1364};
1365
9d4e4f8c
AG
1366struct kvm_one_reg {
1367 __u64 id;
a31be480 1368 __u64 addr;
9d4e4f8c
AG
1369};
1370
dbdfea92 1371#define KVM_MSI_VALID_DEVID (1U << 0)
80a3eb10
JK
1372struct kvm_msi {
1373 __u32 address_lo;
1374 __u32 address_hi;
1375 __u32 data;
1376 __u32 flags;
dbdfea92
CH
1377 __u32 devid;
1378 __u8 pad[12];
80a3eb10
JK
1379};
1380
eadd0e44
PM
1381struct kvm_arm_device_addr {
1382 __u64 id;
1383 __u64 addr;
1384};
1385
e098b453
AK
1386/*
1387 * Device control API, available with KVM_CAP_DEVICE_CTRL
1388 */
1389#define KVM_CREATE_DEVICE_TEST 1
1390
1391struct kvm_create_device {
1392 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1393 __u32 fd; /* out: device handle */
1394 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1395};
1396
1397struct kvm_device_attr {
1398 __u32 flags; /* no flags currently defined */
1399 __u32 group; /* device-defined */
1400 __u64 attr; /* group-defined */
1401 __u64 addr; /* userspace address of attr data */
1402};
1403
bf63839f
AW
1404#define KVM_DEV_VFIO_GROUP 1
1405#define KVM_DEV_VFIO_GROUP_ADD 1
1406#define KVM_DEV_VFIO_GROUP_DEL 2
74c98e20 1407#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
444b1996
AB
1408
1409enum kvm_device_type {
1410 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1411#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1412 KVM_DEV_TYPE_FSL_MPIC_42,
1413#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1414 KVM_DEV_TYPE_XICS,
1415#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1416 KVM_DEV_TYPE_VFIO,
1417#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1418 KVM_DEV_TYPE_ARM_VGIC_V2,
1419#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1420 KVM_DEV_TYPE_FLIC,
1421#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
51628b18
CB
1422 KVM_DEV_TYPE_ARM_VGIC_V3,
1423#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
dbdfea92
CH
1424 KVM_DEV_TYPE_ARM_VGIC_ITS,
1425#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
d9cb4336
CH
1426 KVM_DEV_TYPE_XIVE,
1427#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
2a886794
GK
1428 KVM_DEV_TYPE_ARM_PV_TIME,
1429#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
444b1996
AB
1430 KVM_DEV_TYPE_MAX,
1431};
e098b453 1432
74c98e20
CH
1433struct kvm_vfio_spapr_tce {
1434 __s32 groupfd;
1435 __s32 tablefd;
1436};
1437
51b24e34
JK
1438/*
1439 * ioctls for VM fds
1440 */
1441#define KVM_SET_MEMORY_REGION _IOW(KVMIO, 0x40, struct kvm_memory_region)
1442/*
1443 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1444 * a vcpu fd.
1445 */
1446#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1447#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
1448/* KVM_SET_MEMORY_ALIAS is obsolete: */
1449#define KVM_SET_MEMORY_ALIAS _IOW(KVMIO, 0x43, struct kvm_memory_alias)
1450#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
1451#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45)
1452#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
1453 struct kvm_userspace_memory_region)
1454#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1455#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
1529ae1b
AG
1456
1457/* enable ucontrol for s390 */
1458struct kvm_s390_ucas_mapping {
1459 __u64 user_addr;
1460 __u64 vcpu_addr;
1461 __u64 length;
1462};
1463#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1464#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
1465#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
1466
51b24e34
JK
1467/* Device model IOC */
1468#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1469#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1470#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1471#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1472#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1473#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1474#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1475#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
1476#define KVM_REGISTER_COALESCED_MMIO \
1477 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1478#define KVM_UNREGISTER_COALESCED_MMIO \
1479 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
1480#define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \
1481 struct kvm_assigned_pci_dev)
1482#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
1483/* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */
1484#define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70
1485#define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq)
1486#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
1487#define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \
1488 struct kvm_assigned_pci_dev)
1489#define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \
1490 struct kvm_assigned_msix_nr)
1491#define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \
1492 struct kvm_assigned_msix_entry)
1493#define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq)
1494#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1495#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1496#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1497#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1498#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1499#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1500#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1501/* Available with KVM_CAP_PIT_STATE2 */
1502#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1503#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
1504/* Available with KVM_CAP_PPC_GET_PVINFO */
1505#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
d525f73f
CQ
1506/* Available with KVM_CAP_TSC_CONTROL for a vCPU, or with
1507* KVM_CAP_VM_TSC_CONTROL to set defaults for a VM */
51b24e34
JK
1508#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1509#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
9ab2195d
MT
1510/* Available with KVM_CAP_PCI_2_3 */
1511#define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \
1512 struct kvm_assigned_pci_dev)
80a3eb10
JK
1513/* Available with KVM_CAP_SIGNAL_MSI */
1514#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
1515/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1516#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
651682dc
MT
1517/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1518#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
d4834ff9 1519#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
b89485a5
PB
1520#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1521 struct kvm_create_spapr_tce_64)
d4834ff9
AG
1522/* Available with KVM_CAP_RMA */
1523#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
1524/* Available with KVM_CAP_PPC_HTAB_FD */
1525#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
eadd0e44
PM
1526/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1527#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
e098b453
AK
1528/* Available with KVM_CAP_PPC_RTAS */
1529#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
3a5eb5b4
PB
1530/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1531#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1532#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
1533/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1534#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1535/* Available with KVM_CAP_PPC_RADIX_MMU */
1536#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
9cbb6362
CH
1537/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1538#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
f363d039
EA
1539/* Available with KVM_CAP_PMU_EVENT_FILTER */
1540#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
50fd0c37 1541#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
327d4b7f 1542#define KVM_ARM_MTE_COPY_TAGS _IOR(KVMIO, 0xb4, struct kvm_arm_copy_mte_tags)
e098b453
AK
1543
1544/* ioctl for vm fd */
1545#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1546
1547/* ioctls for fds returned by KVM_CREATE_DEVICE */
1548#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1549#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1550#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
51b24e34
JK
1551
1552/*
1553 * ioctls for vcpu fds
1554 */
1555#define KVM_RUN _IO(KVMIO, 0x80)
1556#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1557#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1558#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1559#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1560#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1561#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
1562/* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */
1563#define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87
1564#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1565#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1566#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1567#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
1568#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1569#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
1570#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1571#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
1572#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1573#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
1574/* Available with KVM_CAP_VAPIC */
1575#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
1576/* Available with KVM_CAP_VAPIC */
1577#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
1578/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1579#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
1580/* store status for s390 */
1581#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1582#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1583#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1584/* initial ipl psw for s390 */
1585#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1586/* initial reset for s390 */
1587#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
1588#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1589#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
444b1996 1590/* Available with KVM_CAP_USER_NMI */
51b24e34
JK
1591#define KVM_NMI _IO(KVMIO, 0x9a)
1592/* Available with KVM_CAP_SET_GUEST_DEBUG */
1593#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
1594/* MCE for x86 */
1595#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1596#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1597#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
51b24e34
JK
1598/* Available with KVM_CAP_VCPU_EVENTS */
1599#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1600#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
1601/* Available with KVM_CAP_DEBUGREGS */
1602#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1603#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
9ffd2685
CH
1604/*
1605 * vcpu version available with KVM_ENABLE_CAP
1606 * vm version available with KVM_CAP_ENABLE_CAP_VM
1607 */
51b24e34
JK
1608#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
1609/* Available with KVM_CAP_XSAVE */
1610#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1611#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1612/* Available with KVM_CAP_XCRS */
1613#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1614#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
a54fc080
AG
1615/* Available with KVM_CAP_SW_TLB */
1616#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
9d4e4f8c 1617/* Available with KVM_CAP_ONE_REG */
a31be480 1618#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
9d4e4f8c 1619#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
9ab2195d
MT
1620/* VM is being stopped by host */
1621#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
eadd0e44 1622#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
bf63839f 1623#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
eadd0e44 1624#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
7a52ce8a
CH
1625/* Available with KVM_CAP_S390_MEM_OP */
1626#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
1627/* Available with KVM_CAP_S390_SKEYS */
1628#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1629#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
1630/* Available with KVM_CAP_S390_INJECT_IRQ */
1631#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
1632/* Available with KVM_CAP_S390_IRQ_STATE */
1633#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1634#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
24a31426
PB
1635/* Available with KVM_CAP_X86_SMM */
1636#define KVM_SMI _IO(KVMIO, 0xb7)
3272f0e2 1637/* Available with KVM_CAP_S390_CMMA_MIGRATION */
ab6e1550 1638#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
3272f0e2 1639#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
9f2d175d
PB
1640/* Memory Encryption Commands */
1641#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
1642
1643struct kvm_enc_region {
1644 __u64 addr;
1645 __u64 size;
1646};
1647
1648#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1649#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1650
65a6d8dd
PM
1651/* Available with KVM_CAP_HYPERV_EVENTFD */
1652#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1653
d36f7de8
CH
1654/* Available with KVM_CAP_NESTED_STATE */
1655#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1656#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
65a6d8dd 1657
d9cb4336 1658/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
da054c64
PB
1659#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1660
b3c818a4 1661/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
da054c64
PB
1662#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1663
d9cb4336
CH
1664/* Available with KVM_CAP_ARM_SVE */
1665#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1666
ddda3748
CH
1667/* Available with KVM_CAP_S390_VCPU_RESETS */
1668#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1669#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1670
dc6f8d45
CH
1671struct kvm_s390_pv_sec_parm {
1672 __u64 origin;
1673 __u64 length;
1674};
1675
1676struct kvm_s390_pv_unp {
1677 __u64 addr;
1678 __u64 size;
1679 __u64 tweak;
1680};
1681
d525f73f
CQ
1682enum pv_cmd_dmp_id {
1683 KVM_PV_DUMP_INIT,
1684 KVM_PV_DUMP_CONFIG_STOR_STATE,
1685 KVM_PV_DUMP_COMPLETE,
1686 KVM_PV_DUMP_CPU,
1687};
1688
1689struct kvm_s390_pv_dmp {
1690 __u64 subcmd;
1691 __u64 buff_addr;
1692 __u64 buff_len;
1693 __u64 gaddr; /* For dump storage state */
1694 __u64 reserved[4];
1695};
1696
1697enum pv_cmd_info_id {
1698 KVM_PV_INFO_VM,
1699 KVM_PV_INFO_DUMP,
1700};
1701
1702struct kvm_s390_pv_info_dump {
1703 __u64 dump_cpu_buffer_len;
1704 __u64 dump_config_mem_buffer_per_1m;
1705 __u64 dump_config_finalize_len;
1706};
1707
1708struct kvm_s390_pv_info_vm {
1709 __u64 inst_calls_list[4];
1710 __u64 max_cpus;
1711 __u64 max_guests;
1712 __u64 max_guest_addr;
1713 __u64 feature_indication;
1714};
1715
1716struct kvm_s390_pv_info_header {
1717 __u32 id;
1718 __u32 len_max;
1719 __u32 len_written;
1720 __u32 reserved;
1721};
1722
1723struct kvm_s390_pv_info {
1724 struct kvm_s390_pv_info_header header;
1725 union {
1726 struct kvm_s390_pv_info_dump dump;
1727 struct kvm_s390_pv_info_vm vm;
1728 };
1729};
1730
dc6f8d45
CH
1731enum pv_cmd_id {
1732 KVM_PV_ENABLE,
1733 KVM_PV_DISABLE,
1734 KVM_PV_SET_SEC_PARMS,
1735 KVM_PV_UNPACK,
1736 KVM_PV_VERIFY,
1737 KVM_PV_PREP_RESET,
1738 KVM_PV_UNSHARE_ALL,
d525f73f
CQ
1739 KVM_PV_INFO,
1740 KVM_PV_DUMP,
dc6f8d45
CH
1741};
1742
1743struct kvm_pv_cmd {
1744 __u32 cmd; /* Command to be executed */
1745 __u16 rc; /* Ultravisor return code */
1746 __u16 rrc; /* Ultravisor return reason code */
1747 __u64 data; /* Data or address */
1748 __u32 flags; /* flags for future extensions. Must be 0 for now */
1749 __u32 reserved[3];
1750};
1751
1752/* Available with KVM_CAP_S390_PROTECTED */
1753#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1754
53ba2eee
MR
1755/* Available with KVM_CAP_X86_MSR_FILTER */
1756#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1757
b3c818a4
EF
1758/* Available with KVM_CAP_DIRTY_LOG_RING */
1759#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1760
278f064e
EH
1761/* Per-VM Xen attributes */
1762#define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr)
1763#define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr)
1764
1765struct kvm_xen_hvm_attr {
1766 __u16 type;
1767 __u16 pad[3];
1768 union {
1769 __u8 long_mode;
1770 __u8 vector;
1771 struct {
1772 __u64 gfn;
1773 } shared_info;
d525f73f
CQ
1774 struct {
1775 __u32 send_port;
1776 __u32 type; /* EVTCHNSTAT_ipi / EVTCHNSTAT_interdomain */
1777 __u32 flags;
1778#define KVM_XEN_EVTCHN_DEASSIGN (1 << 0)
1779#define KVM_XEN_EVTCHN_UPDATE (1 << 1)
1780#define KVM_XEN_EVTCHN_RESET (1 << 2)
1781 /*
1782 * Events sent by the guest are either looped back to
1783 * the guest itself (potentially on a different port#)
1784 * or signalled via an eventfd.
1785 */
1786 union {
1787 struct {
1788 __u32 port;
1789 __u32 vcpu;
1790 __u32 priority;
1791 } port;
1792 struct {
1793 __u32 port; /* Zero for eventfd */
1794 __s32 fd;
1795 } eventfd;
1796 __u32 padding[4];
1797 } deliver;
1798 } evtchn;
1799 __u32 xen_version;
278f064e
EH
1800 __u64 pad[8];
1801 } u;
1802};
1803
1804/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1805#define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0
1806#define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1
1807#define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2
d525f73f
CQ
1808/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1809#define KVM_XEN_ATTR_TYPE_EVTCHN 0x3
1810#define KVM_XEN_ATTR_TYPE_XEN_VERSION 0x4
278f064e
EH
1811
1812/* Per-vCPU Xen attributes */
1813#define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr)
1814#define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr)
1815
d525f73f
CQ
1816/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1817#define KVM_XEN_HVM_EVTCHN_SEND _IOW(KVMIO, 0xd0, struct kvm_irq_routing_xen_evtchn)
1818
327d4b7f
BR
1819#define KVM_GET_SREGS2 _IOR(KVMIO, 0xcc, struct kvm_sregs2)
1820#define KVM_SET_SREGS2 _IOW(KVMIO, 0xcd, struct kvm_sregs2)
1821
278f064e
EH
1822struct kvm_xen_vcpu_attr {
1823 __u16 type;
1824 __u16 pad[3];
1825 union {
1826 __u64 gpa;
1827 __u64 pad[8];
1828 struct {
1829 __u64 state;
1830 __u64 state_entry_time;
1831 __u64 time_running;
1832 __u64 time_runnable;
1833 __u64 time_blocked;
1834 __u64 time_offline;
1835 } runstate;
d525f73f
CQ
1836 __u32 vcpu_id;
1837 struct {
1838 __u32 port;
1839 __u32 priority;
1840 __u64 expires_ns;
1841 } timer;
1842 __u8 vector;
278f064e
EH
1843 } u;
1844};
1845
1846/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1847#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0
1848#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1
1849#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2
1850#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3
1851#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4
1852#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5
d525f73f
CQ
1853/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1854#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID 0x6
1855#define KVM_XEN_VCPU_ATTR_TYPE_TIMER 0x7
1856#define KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR 0x8
278f064e 1857
9f2d175d
PB
1858/* Secure Encrypted Virtualization command */
1859enum sev_cmd_id {
1860 /* Guest initialization commands */
1861 KVM_SEV_INIT = 0,
1862 KVM_SEV_ES_INIT,
1863 /* Guest launch commands */
1864 KVM_SEV_LAUNCH_START,
1865 KVM_SEV_LAUNCH_UPDATE_DATA,
1866 KVM_SEV_LAUNCH_UPDATE_VMSA,
1867 KVM_SEV_LAUNCH_SECRET,
1868 KVM_SEV_LAUNCH_MEASURE,
1869 KVM_SEV_LAUNCH_FINISH,
1870 /* Guest migration commands (outgoing) */
1871 KVM_SEV_SEND_START,
1872 KVM_SEV_SEND_UPDATE_DATA,
1873 KVM_SEV_SEND_UPDATE_VMSA,
1874 KVM_SEV_SEND_FINISH,
1875 /* Guest migration commands (incoming) */
1876 KVM_SEV_RECEIVE_START,
1877 KVM_SEV_RECEIVE_UPDATE_DATA,
1878 KVM_SEV_RECEIVE_UPDATE_VMSA,
1879 KVM_SEV_RECEIVE_FINISH,
1880 /* Guest status and debug commands */
1881 KVM_SEV_GUEST_STATUS,
1882 KVM_SEV_DBG_DECRYPT,
1883 KVM_SEV_DBG_ENCRYPT,
1884 /* Guest certificates commands */
1885 KVM_SEV_CERT_EXPORT,
3ea1a802
BS
1886 /* Attestation report */
1887 KVM_SEV_GET_ATTESTATION_REPORT,
278f064e
EH
1888 /* Guest Migration Extension */
1889 KVM_SEV_SEND_CANCEL,
9f2d175d
PB
1890
1891 KVM_SEV_NR_MAX,
1892};
1893
1894struct kvm_sev_cmd {
1895 __u32 id;
1896 __u64 data;
1897 __u32 error;
1898 __u32 sev_fd;
1899};
1900
1901struct kvm_sev_launch_start {
1902 __u32 handle;
1903 __u32 policy;
1904 __u64 dh_uaddr;
1905 __u32 dh_len;
1906 __u64 session_uaddr;
1907 __u32 session_len;
1908};
1909
1910struct kvm_sev_launch_update_data {
1911 __u64 uaddr;
1912 __u32 len;
1913};
1914
1915
1916struct kvm_sev_launch_secret {
1917 __u64 hdr_uaddr;
1918 __u32 hdr_len;
1919 __u64 guest_uaddr;
1920 __u32 guest_len;
1921 __u64 trans_uaddr;
1922 __u32 trans_len;
1923};
1924
1925struct kvm_sev_launch_measure {
1926 __u64 uaddr;
1927 __u32 len;
1928};
1929
1930struct kvm_sev_guest_status {
1931 __u32 handle;
1932 __u32 policy;
1933 __u32 state;
1934};
1935
1936struct kvm_sev_dbg {
1937 __u64 src_uaddr;
1938 __u64 dst_uaddr;
1939 __u32 len;
1940};
51b24e34 1941
3ea1a802
BS
1942struct kvm_sev_attestation_report {
1943 __u8 mnonce[16];
1944 __u64 uaddr;
1945 __u32 len;
1946};
1947
278f064e
EH
1948struct kvm_sev_send_start {
1949 __u32 policy;
1950 __u64 pdh_cert_uaddr;
1951 __u32 pdh_cert_len;
1952 __u64 plat_certs_uaddr;
1953 __u32 plat_certs_len;
1954 __u64 amd_certs_uaddr;
1955 __u32 amd_certs_len;
1956 __u64 session_uaddr;
1957 __u32 session_len;
1958};
1959
1960struct kvm_sev_send_update_data {
1961 __u64 hdr_uaddr;
1962 __u32 hdr_len;
1963 __u64 guest_uaddr;
1964 __u32 guest_len;
1965 __u64 trans_uaddr;
1966 __u32 trans_len;
1967};
1968
1969struct kvm_sev_receive_start {
1970 __u32 handle;
1971 __u32 policy;
1972 __u64 pdh_uaddr;
1973 __u32 pdh_len;
1974 __u64 session_uaddr;
1975 __u32 session_len;
1976};
1977
1978struct kvm_sev_receive_update_data {
1979 __u64 hdr_uaddr;
1980 __u32 hdr_len;
1981 __u64 guest_uaddr;
1982 __u32 guest_len;
1983 __u64 trans_uaddr;
1984 __u32 trans_len;
1985};
1986
51b24e34 1987#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
9ab2195d
MT
1988#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
1989#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
51b24e34
JK
1990
1991struct kvm_assigned_pci_dev {
1992 __u32 assigned_dev_id;
1993 __u32 busnr;
1994 __u32 devfn;
1995 __u32 flags;
1996 __u32 segnr;
1997 union {
1998 __u32 reserved[11];
1999 };
2000};
2001
2002#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
2003#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
2004#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
2005
2006#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
2007#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
2008#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
2009
2010#define KVM_DEV_IRQ_HOST_MASK 0x00ff
2011#define KVM_DEV_IRQ_GUEST_MASK 0xff00
2012
2013struct kvm_assigned_irq {
2014 __u32 assigned_dev_id;
7c6da3de 2015 __u32 host_irq; /* ignored (legacy field) */
51b24e34
JK
2016 __u32 guest_irq;
2017 __u32 flags;
2018 union {
51b24e34
JK
2019 __u32 reserved[12];
2020 };
2021};
2022
51b24e34
JK
2023struct kvm_assigned_msix_nr {
2024 __u32 assigned_dev_id;
2025 __u16 entry_nr;
2026 __u16 padding;
2027};
2028
2029#define KVM_MAX_MSIX_PER_DEV 256
2030struct kvm_assigned_msix_entry {
2031 __u32 assigned_dev_id;
2032 __u32 gsi;
2033 __u16 entry; /* The index of entry in the MSI-X table */
2034 __u16 padding[3];
2035};
2036
dbdfea92
CH
2037#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
2038#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
2039
74c98e20
CH
2040/* Available with KVM_CAP_ARM_USER_IRQ */
2041
2042/* Bits for run->s.regs.device_irq_level */
2043#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
2044#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
2045#define KVM_ARM_DEV_PMU (1 << 2)
2046
65a6d8dd
PM
2047struct kvm_hyperv_eventfd {
2048 __u32 conn_id;
2049 __s32 fd;
2050 __u32 flags;
2051 __u32 padding[3];
2052};
2053
2054#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
2055#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
2056
dc6f8d45
CH
2057#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
2058#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
2059
b3c818a4
EF
2060/*
2061 * Arch needs to define the macro after implementing the dirty ring
2062 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
2063 * starting page offset of the dirty ring structures.
2064 */
2065#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
2066#define KVM_DIRTY_LOG_PAGE_OFFSET 0
2067#endif
2068
2069/*
2070 * KVM dirty GFN flags, defined as:
2071 *
2072 * |---------------+---------------+--------------|
2073 * | bit 1 (reset) | bit 0 (dirty) | Status |
2074 * |---------------+---------------+--------------|
2075 * | 0 | 0 | Invalid GFN |
2076 * | 0 | 1 | Dirty GFN |
2077 * | 1 | X | GFN to reset |
2078 * |---------------+---------------+--------------|
2079 *
2080 * Lifecycle of a dirty GFN goes like:
2081 *
2082 * dirtied harvested reset
2083 * 00 -----------> 01 -------------> 1X -------+
2084 * ^ |
2085 * | |
2086 * +------------------------------------------+
2087 *
2088 * The userspace program is only responsible for the 01->1X state
2089 * conversion after harvesting an entry. Also, it must not skip any
2090 * dirty bits, so that dirty bits are always harvested in sequence.
2091 */
278f064e
EH
2092#define KVM_DIRTY_GFN_F_DIRTY _BITUL(0)
2093#define KVM_DIRTY_GFN_F_RESET _BITUL(1)
b3c818a4
EF
2094#define KVM_DIRTY_GFN_F_MASK 0x3
2095
2096/*
2097 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
2098 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
2099 * size of the gfn buffer is decided by the first argument when
2100 * enabling KVM_CAP_DIRTY_LOG_RING.
2101 */
2102struct kvm_dirty_gfn {
2103 __u32 flags;
2104 __u32 slot;
2105 __u64 offset;
2106};
2107
278f064e
EH
2108#define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
2109#define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1)
2110
e4082063
AW
2111#define KVM_PMU_CAP_DISABLE (1 << 0)
2112
327d4b7f
BR
2113/**
2114 * struct kvm_stats_header - Header of per vm/vcpu binary statistics data.
2115 * @flags: Some extra information for header, always 0 for now.
2116 * @name_size: The size in bytes of the memory which contains statistics
2117 * name string including trailing '\0'. The memory is allocated
2118 * at the send of statistics descriptor.
2119 * @num_desc: The number of statistics the vm or vcpu has.
2120 * @id_offset: The offset of the vm/vcpu stats' id string in the file pointed
2121 * by vm/vcpu stats fd.
2122 * @desc_offset: The offset of the vm/vcpu stats' descriptor block in the file
2123 * pointd by vm/vcpu stats fd.
2124 * @data_offset: The offset of the vm/vcpu stats' data block in the file
2125 * pointed by vm/vcpu stats fd.
2126 *
2127 * This is the header userspace needs to read from stats fd before any other
2128 * readings. It is used by userspace to discover all the information about the
2129 * vm/vcpu's binary statistics.
2130 * Userspace reads this header from the start of the vm/vcpu's stats fd.
2131 */
2132struct kvm_stats_header {
2133 __u32 flags;
2134 __u32 name_size;
2135 __u32 num_desc;
2136 __u32 id_offset;
2137 __u32 desc_offset;
2138 __u32 data_offset;
2139};
2140
2141#define KVM_STATS_TYPE_SHIFT 0
2142#define KVM_STATS_TYPE_MASK (0xF << KVM_STATS_TYPE_SHIFT)
2143#define KVM_STATS_TYPE_CUMULATIVE (0x0 << KVM_STATS_TYPE_SHIFT)
2144#define KVM_STATS_TYPE_INSTANT (0x1 << KVM_STATS_TYPE_SHIFT)
2145#define KVM_STATS_TYPE_PEAK (0x2 << KVM_STATS_TYPE_SHIFT)
43709a0c
PB
2146#define KVM_STATS_TYPE_LINEAR_HIST (0x3 << KVM_STATS_TYPE_SHIFT)
2147#define KVM_STATS_TYPE_LOG_HIST (0x4 << KVM_STATS_TYPE_SHIFT)
2148#define KVM_STATS_TYPE_MAX KVM_STATS_TYPE_LOG_HIST
327d4b7f
BR
2149
2150#define KVM_STATS_UNIT_SHIFT 4
2151#define KVM_STATS_UNIT_MASK (0xF << KVM_STATS_UNIT_SHIFT)
2152#define KVM_STATS_UNIT_NONE (0x0 << KVM_STATS_UNIT_SHIFT)
2153#define KVM_STATS_UNIT_BYTES (0x1 << KVM_STATS_UNIT_SHIFT)
2154#define KVM_STATS_UNIT_SECONDS (0x2 << KVM_STATS_UNIT_SHIFT)
2155#define KVM_STATS_UNIT_CYCLES (0x3 << KVM_STATS_UNIT_SHIFT)
105bb7cd 2156#define KVM_STATS_UNIT_BOOLEAN (0x4 << KVM_STATS_UNIT_SHIFT)
d525f73f 2157#define KVM_STATS_UNIT_MAX KVM_STATS_UNIT_BOOLEAN
327d4b7f
BR
2158
2159#define KVM_STATS_BASE_SHIFT 8
2160#define KVM_STATS_BASE_MASK (0xF << KVM_STATS_BASE_SHIFT)
2161#define KVM_STATS_BASE_POW10 (0x0 << KVM_STATS_BASE_SHIFT)
2162#define KVM_STATS_BASE_POW2 (0x1 << KVM_STATS_BASE_SHIFT)
2163#define KVM_STATS_BASE_MAX KVM_STATS_BASE_POW2
2164
2165/**
2166 * struct kvm_stats_desc - Descriptor of a KVM statistics.
2167 * @flags: Annotations of the stats, like type, unit, etc.
2168 * @exponent: Used together with @flags to determine the unit.
2169 * @size: The number of data items for this stats.
2170 * Every data item is of type __u64.
2171 * @offset: The offset of the stats to the start of stat structure in
43709a0c
PB
2172 * structure kvm or kvm_vcpu.
2173 * @bucket_size: A parameter value used for histogram stats. It is only used
2174 * for linear histogram stats, specifying the size of the bucket;
327d4b7f
BR
2175 * @name: The name string for the stats. Its size is indicated by the
2176 * &kvm_stats_header->name_size.
2177 */
2178struct kvm_stats_desc {
2179 __u32 flags;
2180 __s16 exponent;
2181 __u16 size;
2182 __u32 offset;
43709a0c 2183 __u32 bucket_size;
327d4b7f
BR
2184 char name[];
2185};
2186
2187#define KVM_GET_STATS_FD _IO(KVMIO, 0xce)
2188
1ea5208f
PB
2189/* Available with KVM_CAP_XSAVE2 */
2190#define KVM_GET_XSAVE2 _IOR(KVMIO, 0xcf, struct kvm_xsave)
2191
d525f73f
CQ
2192/* Available with KVM_CAP_S390_PROTECTED_DUMP */
2193#define KVM_S390_PV_CPU_COMMAND _IOWR(KVMIO, 0xd0, struct kvm_pv_cmd)
2194
2195/* Available with KVM_CAP_X86_NOTIFY_VMEXIT */
2196#define KVM_X86_NOTIFY_VMEXIT_ENABLED (1ULL << 0)
2197#define KVM_X86_NOTIFY_VMEXIT_USER (1ULL << 1)
2198
2199/* Available with KVM_CAP_S390_ZPCI_OP */
2200#define KVM_S390_ZPCI_OP _IOW(KVMIO, 0xd1, struct kvm_s390_zpci_op)
2201
2202struct kvm_s390_zpci_op {
2203 /* in */
2204 __u32 fh; /* target device */
2205 __u8 op; /* operation to perform */
2206 __u8 pad[3];
2207 union {
2208 /* for KVM_S390_ZPCIOP_REG_AEN */
2209 struct {
2210 __u64 ibv; /* Guest addr of interrupt bit vector */
2211 __u64 sb; /* Guest addr of summary bit */
2212 __u32 flags;
2213 __u32 noi; /* Number of interrupts */
2214 __u8 isc; /* Guest interrupt subclass */
2215 __u8 sbo; /* Offset of guest summary bit vector */
2216 __u16 pad;
2217 } reg_aen;
2218 __u64 reserved[8];
2219 } u;
2220};
2221
2222/* types for kvm_s390_zpci_op->op */
2223#define KVM_S390_ZPCIOP_REG_AEN 0
2224#define KVM_S390_ZPCIOP_DEREG_AEN 1
2225
2226/* flags for kvm_s390_zpci_op->u.reg_aen.flags */
2227#define KVM_S390_ZPCIOP_REGAEN_HOST (1 << 0)
2228
51b24e34 2229#endif /* __LINUX_KVM_H */