]> git.ipfire.org Git - thirdparty/qemu.git/blame - linux-headers/linux/kvm.h
linux-headers: Update to Linux v6.7-rc5
[thirdparty/qemu.git] / linux-headers / linux / kvm.h
CommitLineData
dd873966 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
51b24e34
JK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
8 * Note: you must update KVM_API_VERSION if you change this interface.
9 */
10
278f064e 11#include <linux/const.h>
51b24e34
JK
12#include <linux/types.h>
13
14#include <linux/ioctl.h>
15#include <asm/kvm.h>
16
17#define KVM_API_VERSION 12
18
19/* *** Deprecated interfaces *** */
20
21#define KVM_TRC_SHIFT 16
22
23#define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT)
24#define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1))
25
26#define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01)
27#define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02)
28#define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01)
29
30#define KVM_TRC_HEAD_SIZE 12
31#define KVM_TRC_CYCLE_SIZE 8
32#define KVM_TRC_EXTRA_MAX 7
33
34#define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02)
35#define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03)
36#define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04)
37#define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05)
38#define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06)
39#define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07)
40#define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08)
41#define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09)
42#define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A)
43#define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B)
44#define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C)
45#define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D)
46#define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E)
47#define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F)
48#define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10)
49#define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11)
50#define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12)
51#define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13)
52#define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14)
53#define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15)
54#define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16)
55#define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17)
56#define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18)
57#define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19)
58
59struct kvm_user_trace_setup {
60 __u32 buf_size;
61 __u32 buf_nr;
62};
63
64#define __KVM_DEPRECATED_MAIN_W_0x06 \
65 _IOW(KVMIO, 0x06, struct kvm_user_trace_setup)
66#define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07)
67#define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08)
68
69#define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq)
70
71struct kvm_breakpoint {
72 __u32 enabled;
73 __u32 padding;
74 __u64 address;
75};
76
77struct kvm_debug_guest {
78 __u32 enabled;
79 __u32 pad;
80 struct kvm_breakpoint breakpoints[4];
81 __u32 singlestep;
82};
83
84#define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest)
85
86/* *** End of deprecated interfaces *** */
87
88
51b24e34
JK
89/* for KVM_SET_USER_MEMORY_REGION */
90struct kvm_userspace_memory_region {
91 __u32 slot;
92 __u32 flags;
93 __u64 guest_phys_addr;
94 __u64 memory_size; /* bytes */
95 __u64 userspace_addr; /* start of the userspace allocated memory */
96};
97
716b8e4d 98/*
93d7620c
AH
99 * The bit 0 ~ bit 15 of kvm_userspace_memory_region::flags are visible for
100 * userspace, other bits are reserved for kvm internal use which are defined
101 * in include/linux/kvm_host.h.
716b8e4d
AW
102 */
103#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
104#define KVM_MEM_READONLY (1UL << 1)
51b24e34
JK
105
106/* for KVM_IRQ_LINE */
107struct kvm_irq_level {
108 /*
109 * ACPI gsi notion of irq.
110 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
111 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
f76b348e 112 * For ARM: See Documentation/virt/kvm/api.rst
51b24e34
JK
113 */
114 union {
115 __u32 irq;
116 __s32 status;
117 };
118 __u32 level;
119};
120
121
122struct kvm_irqchip {
123 __u32 chip_id;
124 __u32 pad;
125 union {
126 char dummy[512]; /* reserving space */
127#ifdef __KVM_HAVE_PIT
128 struct kvm_pic_state pic;
129#endif
130#ifdef __KVM_HAVE_IOAPIC
131 struct kvm_ioapic_state ioapic;
132#endif
133 } chip;
134};
135
136/* for KVM_CREATE_PIT2 */
137struct kvm_pit_config {
138 __u32 flags;
139 __u32 pad[15];
140};
141
142#define KVM_PIT_SPEAKER_DUMMY 1
143
7a52ce8a
CH
144struct kvm_s390_skeys {
145 __u64 start_gfn;
146 __u64 count;
147 __u64 skeydata_addr;
148 __u32 flags;
149 __u32 reserved[9];
150};
fff02bc0 151
3272f0e2
CB
152#define KVM_S390_CMMA_PEEK (1 << 0)
153
154/**
155 * kvm_s390_cmma_log - Used for CMMA migration.
156 *
157 * Used both for input and output.
158 *
159 * @start_gfn: Guest page number to start from.
160 * @count: Size of the result buffer.
161 * @flags: Control operation mode via KVM_S390_CMMA_* flags
162 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
163 * pages are still remaining.
164 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
165 * in the PGSTE.
166 * @values: Pointer to the values buffer.
167 *
168 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
169 */
170struct kvm_s390_cmma_log {
171 __u64 start_gfn;
172 __u32 count;
173 __u32 flags;
174 union {
175 __u64 remaining;
176 __u64 mask;
177 };
178 __u64 values;
179};
180
fff02bc0
PB
181struct kvm_hyperv_exit {
182#define KVM_EXIT_HYPERV_SYNIC 1
b89485a5 183#define KVM_EXIT_HYPERV_HCALL 2
f76b348e 184#define KVM_EXIT_HYPERV_SYNDBG 3
fff02bc0 185 __u32 type;
f76b348e 186 __u32 pad1;
fff02bc0
PB
187 union {
188 struct {
189 __u32 msr;
f76b348e 190 __u32 pad2;
fff02bc0
PB
191 __u64 control;
192 __u64 evt_page;
193 __u64 msg_page;
194 } synic;
b89485a5
PB
195 struct {
196 __u64 input;
197 __u64 result;
198 __u64 params[2];
199 } hcall;
f76b348e
CH
200 struct {
201 __u32 msr;
202 __u32 pad2;
203 __u64 control;
204 __u64 status;
205 __u64 send_page;
206 __u64 recv_page;
207 __u64 pending_page;
208 } syndbg;
fff02bc0
PB
209 } u;
210};
211
278f064e
EH
212struct kvm_xen_exit {
213#define KVM_EXIT_XEN_HCALL 1
214 __u32 type;
215 union {
216 struct {
217 __u32 longmode;
218 __u32 cpl;
219 __u64 input;
220 __u64 result;
221 __u64 params[6];
222 } hcall;
223 } u;
224};
225
7a52ce8a
CH
226#define KVM_S390_GET_SKEYS_NONE 1
227#define KVM_S390_SKEYS_MAX 1048576
228
51b24e34
JK
229#define KVM_EXIT_UNKNOWN 0
230#define KVM_EXIT_EXCEPTION 1
231#define KVM_EXIT_IO 2
232#define KVM_EXIT_HYPERCALL 3
233#define KVM_EXIT_DEBUG 4
234#define KVM_EXIT_HLT 5
235#define KVM_EXIT_MMIO 6
236#define KVM_EXIT_IRQ_WINDOW_OPEN 7
237#define KVM_EXIT_SHUTDOWN 8
238#define KVM_EXIT_FAIL_ENTRY 9
239#define KVM_EXIT_INTR 10
240#define KVM_EXIT_SET_TPR 11
241#define KVM_EXIT_TPR_ACCESS 12
242#define KVM_EXIT_S390_SIEIC 13
243#define KVM_EXIT_S390_RESET 14
a9fd1654 244#define KVM_EXIT_DCR 15 /* deprecated */
51b24e34
JK
245#define KVM_EXIT_NMI 16
246#define KVM_EXIT_INTERNAL_ERROR 17
247#define KVM_EXIT_OSI 18
7c6da3de 248#define KVM_EXIT_PAPR_HCALL 19
1529ae1b 249#define KVM_EXIT_S390_UCONTROL 20
d4834ff9 250#define KVM_EXIT_WATCHDOG 21
d3dccee1
AG
251#define KVM_EXIT_S390_TSCH 22
252#define KVM_EXIT_EPR 23
b061808d 253#define KVM_EXIT_SYSTEM_EVENT 24
7a52ce8a 254#define KVM_EXIT_S390_STSI 25
3a824b15 255#define KVM_EXIT_IOAPIC_EOI 26
fff02bc0 256#define KVM_EXIT_HYPERV 27
2a886794 257#define KVM_EXIT_ARM_NISV 28
53ba2eee
MR
258#define KVM_EXIT_X86_RDMSR 29
259#define KVM_EXIT_X86_WRMSR 30
b3c818a4 260#define KVM_EXIT_DIRTY_RING_FULL 31
278f064e
EH
261#define KVM_EXIT_AP_RESET_HOLD 32
262#define KVM_EXIT_X86_BUS_LOCK 33
263#define KVM_EXIT_XEN 34
43709a0c 264#define KVM_EXIT_RISCV_SBI 35
d525f73f
CQ
265#define KVM_EXIT_RISCV_CSR 36
266#define KVM_EXIT_NOTIFY 37
efb91426 267#define KVM_EXIT_LOONGARCH_IOCSR 38
51b24e34
JK
268
269/* For KVM_EXIT_INTERNAL_ERROR */
d4834ff9
AG
270/* Emulate instruction failed. */
271#define KVM_INTERNAL_ERROR_EMULATION 1
272/* Encounter unexpected simultaneous exceptions. */
273#define KVM_INTERNAL_ERROR_SIMUL_EX 2
274/* Encounter unexpected vm-exit due to delivery event. */
275#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
f363d039
EA
276/* Encounter unexpected vm-exit reason */
277#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
51b24e34 278
327d4b7f
BR
279/* Flags that describe what fields in emulation_failure hold valid data. */
280#define KVM_INTERNAL_ERROR_EMULATION_FLAG_INSTRUCTION_BYTES (1ULL << 0)
281
51b24e34
JK
282/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
283struct kvm_run {
284 /* in */
285 __u8 request_interrupt_window;
3a5eb5b4
PB
286 __u8 immediate_exit;
287 __u8 padding1[6];
51b24e34
JK
288
289 /* out */
290 __u32 exit_reason;
291 __u8 ready_for_interrupt_injection;
292 __u8 if_flag;
24a31426 293 __u16 flags;
51b24e34
JK
294
295 /* in (pre_kvm_run), out (post_kvm_run) */
296 __u64 cr8;
297 __u64 apic_base;
298
299#ifdef __KVM_S390
300 /* the processor status word for s390 */
301 __u64 psw_mask; /* psw upper half */
302 __u64 psw_addr; /* psw lower half */
303#endif
304 union {
305 /* KVM_EXIT_UNKNOWN */
306 struct {
307 __u64 hardware_exit_reason;
308 } hw;
309 /* KVM_EXIT_FAIL_ENTRY */
310 struct {
311 __u64 hardware_entry_failure_reason;
e6546342 312 __u32 cpu;
51b24e34
JK
313 } fail_entry;
314 /* KVM_EXIT_EXCEPTION */
315 struct {
316 __u32 exception;
317 __u32 error_code;
318 } ex;
319 /* KVM_EXIT_IO */
320 struct {
321#define KVM_EXIT_IO_IN 0
322#define KVM_EXIT_IO_OUT 1
323 __u8 direction;
324 __u8 size; /* bytes */
325 __u16 port;
326 __u32 count;
327 __u64 data_offset; /* relative to kvm_run start */
328 } io;
3a824b15 329 /* KVM_EXIT_DEBUG */
51b24e34
JK
330 struct {
331 struct kvm_debug_exit_arch arch;
332 } debug;
333 /* KVM_EXIT_MMIO */
334 struct {
335 __u64 phys_addr;
336 __u8 data[8];
337 __u32 len;
338 __u8 is_write;
339 } mmio;
efb91426
DHB
340 /* KVM_EXIT_LOONGARCH_IOCSR */
341 struct {
342 __u64 phys_addr;
343 __u8 data[8];
344 __u32 len;
345 __u8 is_write;
346 } iocsr_io;
51b24e34
JK
347 /* KVM_EXIT_HYPERCALL */
348 struct {
349 __u64 nr;
350 __u64 args[6];
351 __u64 ret;
d0bf492f
CLG
352
353 union {
354 __u32 longmode;
355 __u64 flags;
356 };
51b24e34
JK
357 } hypercall;
358 /* KVM_EXIT_TPR_ACCESS */
359 struct {
360 __u64 rip;
361 __u32 is_write;
362 __u32 pad;
363 } tpr_access;
364 /* KVM_EXIT_S390_SIEIC */
365 struct {
366 __u8 icptcode;
367 __u16 ipa;
368 __u32 ipb;
369 } s390_sieic;
370 /* KVM_EXIT_S390_RESET */
371#define KVM_S390_RESET_POR 1
372#define KVM_S390_RESET_CLEAR 2
373#define KVM_S390_RESET_SUBSYSTEM 4
374#define KVM_S390_RESET_CPU_INIT 8
375#define KVM_S390_RESET_IPL 16
376 __u64 s390_reset_flags;
1529ae1b
AG
377 /* KVM_EXIT_S390_UCONTROL */
378 struct {
379 __u64 trans_exc_code;
380 __u32 pgm_code;
381 } s390_ucontrol;
a9fd1654 382 /* KVM_EXIT_DCR (deprecated) */
51b24e34
JK
383 struct {
384 __u32 dcrn;
385 __u32 data;
386 __u8 is_write;
387 } dcr;
3a824b15 388 /* KVM_EXIT_INTERNAL_ERROR */
51b24e34
JK
389 struct {
390 __u32 suberror;
391 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
392 __u32 ndata;
393 __u64 data[16];
394 } internal;
327d4b7f
BR
395 /*
396 * KVM_INTERNAL_ERROR_EMULATION
397 *
398 * "struct emulation_failure" is an overlay of "struct internal"
399 * that is used for the KVM_INTERNAL_ERROR_EMULATION sub-type of
400 * KVM_EXIT_INTERNAL_ERROR. Note, unlike other internal error
401 * sub-types, this struct is ABI! It also needs to be backwards
402 * compatible with "struct internal". Take special care that
403 * "ndata" is correct, that new fields are enumerated in "flags",
404 * and that each flag enumerates fields that are 64-bit aligned
405 * and sized (so that ndata+internal.data[] is valid/accurate).
43709a0c
PB
406 *
407 * Space beyond the defined fields may be used to store arbitrary
408 * debug information relating to the emulation failure. It is
409 * accounted for in "ndata" but the format is unspecified and is
410 * not represented in "flags". Any such information is *not* ABI!
327d4b7f
BR
411 */
412 struct {
413 __u32 suberror;
414 __u32 ndata;
415 __u64 flags;
43709a0c
PB
416 union {
417 struct {
418 __u8 insn_size;
419 __u8 insn_bytes[15];
420 };
421 };
422 /* Arbitrary debug data may follow. */
327d4b7f 423 } emulation_failure;
51b24e34
JK
424 /* KVM_EXIT_OSI */
425 struct {
426 __u64 gprs[32];
427 } osi;
3a824b15 428 /* KVM_EXIT_PAPR_HCALL */
7c6da3de
AG
429 struct {
430 __u64 nr;
431 __u64 ret;
432 __u64 args[9];
433 } papr_hcall;
d3dccee1
AG
434 /* KVM_EXIT_S390_TSCH */
435 struct {
436 __u16 subchannel_id;
437 __u16 subchannel_nr;
438 __u32 io_int_parm;
439 __u32 io_int_word;
440 __u32 ipb;
441 __u8 dequeued;
442 } s390_tsch;
443 /* KVM_EXIT_EPR */
444 struct {
445 __u32 epr;
446 } epr;
b061808d
AG
447 /* KVM_EXIT_SYSTEM_EVENT */
448 struct {
449#define KVM_SYSTEM_EVENT_SHUTDOWN 1
450#define KVM_SYSTEM_EVENT_RESET 2
120758fb 451#define KVM_SYSTEM_EVENT_CRASH 3
d525f73f
CQ
452#define KVM_SYSTEM_EVENT_WAKEUP 4
453#define KVM_SYSTEM_EVENT_SUSPEND 5
454#define KVM_SYSTEM_EVENT_SEV_TERM 6
b061808d 455 __u32 type;
e4082063
AW
456 __u32 ndata;
457 union {
458 __u64 flags;
459 __u64 data[16];
460 };
b061808d 461 } system_event;
7a52ce8a
CH
462 /* KVM_EXIT_S390_STSI */
463 struct {
464 __u64 addr;
465 __u8 ar;
466 __u8 reserved;
467 __u8 fc;
468 __u8 sel1;
469 __u16 sel2;
470 } s390_stsi;
3a824b15
PB
471 /* KVM_EXIT_IOAPIC_EOI */
472 struct {
473 __u8 vector;
474 } eoi;
fff02bc0
PB
475 /* KVM_EXIT_HYPERV */
476 struct kvm_hyperv_exit hyperv;
2a886794
GK
477 /* KVM_EXIT_ARM_NISV */
478 struct {
479 __u64 esr_iss;
480 __u64 fault_ipa;
481 } arm_nisv;
53ba2eee
MR
482 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
483 struct {
484 __u8 error; /* user -> kernel */
485 __u8 pad[7];
486#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
487#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
488#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
93d7620c
AH
489#define KVM_MSR_EXIT_REASON_VALID_MASK (KVM_MSR_EXIT_REASON_INVAL | \
490 KVM_MSR_EXIT_REASON_UNKNOWN | \
491 KVM_MSR_EXIT_REASON_FILTER)
53ba2eee
MR
492 __u32 reason; /* kernel -> user */
493 __u32 index; /* kernel -> user */
494 __u64 data; /* kernel <-> user */
495 } msr;
278f064e
EH
496 /* KVM_EXIT_XEN */
497 struct kvm_xen_exit xen;
43709a0c
PB
498 /* KVM_EXIT_RISCV_SBI */
499 struct {
500 unsigned long extension_id;
501 unsigned long function_id;
502 unsigned long args[6];
503 unsigned long ret[2];
504 } riscv_sbi;
d525f73f
CQ
505 /* KVM_EXIT_RISCV_CSR */
506 struct {
507 unsigned long csr_num;
508 unsigned long new_value;
509 unsigned long write_mask;
510 unsigned long ret_value;
511 } riscv_csr;
512 /* KVM_EXIT_NOTIFY */
513 struct {
514#define KVM_NOTIFY_CONTEXT_INVALID (1 << 0)
515 __u32 flags;
516 } notify;
51b24e34
JK
517 /* Fix the size of the union. */
518 char padding[256];
519 };
1529ae1b 520
65a6d8dd
PM
521 /* 2048 is the size of the char array used to bound/pad the size
522 * of the union that holds sync regs.
523 */
524 #define SYNC_REGS_SIZE_BYTES 2048
1529ae1b
AG
525 /*
526 * shared registers between kvm and userspace.
527 * kvm_valid_regs specifies the register classes set by the host
528 * kvm_dirty_regs specified the register classes dirtied by userspace
529 * struct kvm_sync_regs is architecture specific, as well as the
530 * bits for kvm_valid_regs and kvm_dirty_regs
531 */
532 __u64 kvm_valid_regs;
533 __u64 kvm_dirty_regs;
534 union {
535 struct kvm_sync_regs regs;
65a6d8dd 536 char padding[SYNC_REGS_SIZE_BYTES];
1529ae1b 537 } s;
51b24e34
JK
538};
539
540/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
541
542struct kvm_coalesced_mmio_zone {
543 __u64 addr;
544 __u32 size;
966f2ec3
PB
545 union {
546 __u32 pad;
547 __u32 pio;
548 };
51b24e34
JK
549};
550
551struct kvm_coalesced_mmio {
552 __u64 phys_addr;
553 __u32 len;
966f2ec3
PB
554 union {
555 __u32 pad;
556 __u32 pio;
557 };
51b24e34
JK
558 __u8 data[8];
559};
560
561struct kvm_coalesced_mmio_ring {
562 __u32 first, last;
d525f73f 563 struct kvm_coalesced_mmio coalesced_mmio[];
51b24e34
JK
564};
565
566#define KVM_COALESCED_MMIO_MAX \
567 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
568 sizeof(struct kvm_coalesced_mmio))
569
570/* for KVM_TRANSLATE */
571struct kvm_translation {
572 /* in */
573 __u64 linear_address;
574
575 /* out */
576 __u64 physical_address;
577 __u8 valid;
578 __u8 writeable;
579 __u8 usermode;
580 __u8 pad[5];
581};
582
7a52ce8a
CH
583/* for KVM_S390_MEM_OP */
584struct kvm_s390_mem_op {
585 /* in */
586 __u64 gaddr; /* the guest address */
587 __u64 flags; /* flags */
588 __u32 size; /* amount of bytes */
589 __u32 op; /* type of operation */
590 __u64 buf; /* buffer in userspace */
dc6f8d45 591 union {
e4082063
AW
592 struct {
593 __u8 ar; /* the access register number */
594 __u8 key; /* access key, ignored if flag unset */
c5c0fdbe
DDT
595 __u8 pad1[6]; /* ignored */
596 __u64 old_addr; /* ignored if cmpxchg flag unset */
e4082063 597 };
dc6f8d45 598 __u32 sida_offset; /* offset into the sida */
e4082063 599 __u8 reserved[32]; /* ignored */
dc6f8d45 600 };
7a52ce8a
CH
601};
602/* types for kvm_s390_mem_op->op */
603#define KVM_S390_MEMOP_LOGICAL_READ 0
604#define KVM_S390_MEMOP_LOGICAL_WRITE 1
dc6f8d45
CH
605#define KVM_S390_MEMOP_SIDA_READ 2
606#define KVM_S390_MEMOP_SIDA_WRITE 3
e4082063
AW
607#define KVM_S390_MEMOP_ABSOLUTE_READ 4
608#define KVM_S390_MEMOP_ABSOLUTE_WRITE 5
c5c0fdbe
DDT
609#define KVM_S390_MEMOP_ABSOLUTE_CMPXCHG 6
610
7a52ce8a
CH
611/* flags for kvm_s390_mem_op->flags */
612#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
613#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
e4082063 614#define KVM_S390_MEMOP_F_SKEY_PROTECTION (1ULL << 2)
7a52ce8a 615
c5c0fdbe
DDT
616/* flags specifying extension support via KVM_CAP_S390_MEM_OP_EXTENSION */
617#define KVM_S390_MEMOP_EXTENSION_CAP_BASE (1 << 0)
618#define KVM_S390_MEMOP_EXTENSION_CAP_CMPXCHG (1 << 1)
619
51b24e34
JK
620/* for KVM_INTERRUPT */
621struct kvm_interrupt {
622 /* in */
623 __u32 irq;
624};
625
626/* for KVM_GET_DIRTY_LOG */
627struct kvm_dirty_log {
628 __u32 slot;
629 __u32 padding1;
630 union {
631 void *dirty_bitmap; /* one bit per page */
632 __u64 padding2;
633 };
634};
635
da054c64
PB
636/* for KVM_CLEAR_DIRTY_LOG */
637struct kvm_clear_dirty_log {
638 __u32 slot;
639 __u32 num_pages;
640 __u64 first_page;
641 union {
642 void *dirty_bitmap; /* one bit per page */
643 __u64 padding2;
644 };
645};
646
51b24e34
JK
647/* for KVM_SET_SIGNAL_MASK */
648struct kvm_signal_mask {
649 __u32 len;
d525f73f 650 __u8 sigset[];
51b24e34
JK
651};
652
653/* for KVM_TPR_ACCESS_REPORTING */
654struct kvm_tpr_access_ctl {
655 __u32 enabled;
656 __u32 flags;
657 __u32 reserved[8];
658};
659
660/* for KVM_SET_VAPIC_ADDR */
661struct kvm_vapic_addr {
662 __u64 vapic_addr;
663};
664
a9fd1654 665/* for KVM_SET_MP_STATE */
51b24e34 666
a9fd1654 667/* not all states are valid on all architectures */
51b24e34
JK
668#define KVM_MP_STATE_RUNNABLE 0
669#define KVM_MP_STATE_UNINITIALIZED 1
670#define KVM_MP_STATE_INIT_RECEIVED 2
671#define KVM_MP_STATE_HALTED 3
672#define KVM_MP_STATE_SIPI_RECEIVED 4
a9fd1654
JF
673#define KVM_MP_STATE_STOPPED 5
674#define KVM_MP_STATE_CHECK_STOP 6
675#define KVM_MP_STATE_OPERATING 7
676#define KVM_MP_STATE_LOAD 8
278f064e 677#define KVM_MP_STATE_AP_RESET_HOLD 9
d525f73f 678#define KVM_MP_STATE_SUSPENDED 10
51b24e34
JK
679
680struct kvm_mp_state {
681 __u32 mp_state;
682};
683
684struct kvm_s390_psw {
685 __u64 mask;
686 __u64 addr;
687};
688
689/* valid values for type in kvm_s390_interrupt */
690#define KVM_S390_SIGP_STOP 0xfffe0000u
691#define KVM_S390_PROGRAM_INT 0xfffe0001u
692#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
693#define KVM_S390_RESTART 0xfffe0003u
216db403
CB
694#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
695#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
d3dccee1 696#define KVM_S390_MCHK 0xfffe1000u
76eb98d5
JF
697#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
698#define KVM_S390_INT_CPU_TIMER 0xffff1005u
51b24e34
JK
699#define KVM_S390_INT_VIRTIO 0xffff2603u
700#define KVM_S390_INT_SERVICE 0xffff2401u
701#define KVM_S390_INT_EMERGENCY 0xffff1201u
1529ae1b 702#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d3dccee1
AG
703/* Anything below 0xfffe0000u is taken by INT_IO */
704#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
705 (((schid)) | \
706 ((ssid) << 16) | \
707 ((cssid) << 18) | \
708 ((ai) << 26))
709#define KVM_S390_INT_IO_MIN 0x00000000u
710#define KVM_S390_INT_IO_MAX 0xfffdffffu
120758fb 711#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d3dccee1 712
51b24e34
JK
713
714struct kvm_s390_interrupt {
715 __u32 type;
716 __u32 parm;
717 __u64 parm64;
718};
719
216db403
CB
720struct kvm_s390_io_info {
721 __u16 subchannel_id;
722 __u16 subchannel_nr;
723 __u32 io_int_parm;
724 __u32 io_int_word;
725};
726
727struct kvm_s390_ext_info {
728 __u32 ext_params;
729 __u32 pad;
730 __u64 ext_params2;
731};
732
733struct kvm_s390_pgm_info {
734 __u64 trans_exc_code;
735 __u64 mon_code;
736 __u64 per_address;
737 __u32 data_exc_code;
738 __u16 code;
739 __u16 mon_class_nr;
740 __u8 per_code;
741 __u8 per_atmid;
742 __u8 exc_access_id;
743 __u8 per_access_id;
744 __u8 op_access_id;
66fb2d54
CH
745#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
746#define KVM_S390_PGM_FLAGS_ILC_0 0x02
747#define KVM_S390_PGM_FLAGS_ILC_1 0x04
748#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
749#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
750 __u8 flags;
751 __u8 pad[2];
216db403
CB
752};
753
754struct kvm_s390_prefix_info {
755 __u32 address;
756};
757
758struct kvm_s390_extcall_info {
759 __u16 code;
760};
761
762struct kvm_s390_emerg_info {
763 __u16 code;
764};
765
51628b18
CB
766#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
767struct kvm_s390_stop_info {
768 __u32 flags;
769};
770
216db403
CB
771struct kvm_s390_mchk_info {
772 __u64 cr14;
773 __u64 mcic;
774 __u64 failing_storage_address;
775 __u32 ext_damage_code;
776 __u32 pad;
777 __u8 fixed_logout[16];
778};
779
780struct kvm_s390_irq {
781 __u64 type;
782 union {
783 struct kvm_s390_io_info io;
784 struct kvm_s390_ext_info ext;
785 struct kvm_s390_pgm_info pgm;
786 struct kvm_s390_emerg_info emerg;
787 struct kvm_s390_extcall_info extcall;
788 struct kvm_s390_prefix_info prefix;
51628b18 789 struct kvm_s390_stop_info stop;
216db403
CB
790 struct kvm_s390_mchk_info mchk;
791 char reserved[64];
792 } u;
793};
794
7a52ce8a
CH
795struct kvm_s390_irq_state {
796 __u64 buf;
9cbb6362 797 __u32 flags; /* will stay unused for compatibility reasons */
7a52ce8a 798 __u32 len;
9cbb6362 799 __u32 reserved[4]; /* will stay unused for compatibility reasons */
7a52ce8a
CH
800};
801
51b24e34
JK
802/* for KVM_SET_GUEST_DEBUG */
803
804#define KVM_GUESTDBG_ENABLE 0x00000001
805#define KVM_GUESTDBG_SINGLESTEP 0x00000002
806
807struct kvm_guest_debug {
808 __u32 control;
809 __u32 pad;
810 struct kvm_guest_debug_arch arch;
811};
812
813enum {
814 kvm_ioeventfd_flag_nr_datamatch,
815 kvm_ioeventfd_flag_nr_pio,
816 kvm_ioeventfd_flag_nr_deassign,
cae7f586 817 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
76eb98d5 818 kvm_ioeventfd_flag_nr_fast_mmio,
51b24e34
JK
819 kvm_ioeventfd_flag_nr_max,
820};
821
822#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
823#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
824#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
cae7f586
AG
825#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
826 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
51b24e34
JK
827
828#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
829
830struct kvm_ioeventfd {
831 __u64 datamatch;
832 __u64 addr; /* legal pio/mmio address */
76eb98d5 833 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
51b24e34
JK
834 __s32 fd;
835 __u32 flags;
836 __u8 pad[36];
837};
838
65a6d8dd 839#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
77d361b1 840#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
65a6d8dd 841#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
d38d201f 842#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
65a6d8dd 843#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
77d361b1 844 KVM_X86_DISABLE_EXITS_HLT | \
d38d201f
WL
845 KVM_X86_DISABLE_EXITS_PAUSE | \
846 KVM_X86_DISABLE_EXITS_CSTATE)
65a6d8dd 847
51b24e34
JK
848/* for KVM_ENABLE_CAP */
849struct kvm_enable_cap {
850 /* in */
851 __u32 cap;
852 __u32 flags;
853 __u64 args[4];
854 __u8 pad[64];
855};
856
857/* for KVM_PPC_GET_PVINFO */
3a5eb5b4
PB
858
859#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
860
51b24e34
JK
861struct kvm_ppc_pvinfo {
862 /* out */
863 __u32 flags;
864 __u32 hcall[4];
865 __u8 pad[108];
866};
867
80a3eb10
JK
868/* for KVM_PPC_GET_SMMU_INFO */
869#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
870
871struct kvm_ppc_one_page_size {
872 __u32 page_shift; /* Page shift (or 0) */
873 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
874};
875
876struct kvm_ppc_one_seg_page_size {
877 __u32 page_shift; /* Base page shift of segment (or 0) */
878 __u32 slb_enc; /* SLB encoding for BookS */
879 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
880};
881
882#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
883#define KVM_PPC_1T_SEGMENTS 0x00000002
966f2ec3 884#define KVM_PPC_NO_HASH 0x00000004
80a3eb10
JK
885
886struct kvm_ppc_smmu_info {
887 __u64 flags;
888 __u32 slb_size;
d4083f50
AP
889 __u16 data_keys; /* # storage keys supported for data */
890 __u16 instr_keys; /* # storage keys supported for instructions */
80a3eb10
JK
891 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
892};
893
3a5eb5b4
PB
894/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
895struct kvm_ppc_resize_hpt {
896 __u64 flags;
897 __u32 shift;
898 __u32 pad;
899};
d4834ff9 900
51b24e34
JK
901#define KVMIO 0xAE
902
1529ae1b
AG
903/* machine type bits, to be used as argument to KVM_CREATE_VM */
904#define KVM_VM_S390_UCONTROL 1
905
bf63839f
AW
906/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
907#define KVM_VM_PPC_HV 1
908#define KVM_VM_PPC_PR 2
909
94c7fefc
AJ
910/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
911#define KVM_VM_MIPS_AUTO 0
74c98e20 912#define KVM_VM_MIPS_VZ 1
94c7fefc 913#define KVM_VM_MIPS_TE 2
74c98e20 914
1529ae1b
AG
915#define KVM_S390_SIE_PAGE_OFFSET 1
916
da054c64
PB
917/*
918 * On arm64, machine type can be used to request the physical
919 * address size for the VM. Bits[7-0] are reserved for the guest
920 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
921 * value 0 implies the default IPA size, 40bits.
922 */
923#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
924#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
925 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
51b24e34
JK
926/*
927 * ioctls for /dev/kvm fds:
928 */
929#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
930#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
931#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
932
933#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
934/*
935 * Check if a kvm extension is available. Argument is extension number,
936 * return is 1 (yes) or 0 (no, sorry).
937 */
938#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
939/*
940 * Get size for mmap(vcpu_fd)
941 */
942#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
943#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
944#define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06
945#define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07
946#define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08
bf63839f 947#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
9f2d175d 948#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
51b24e34
JK
949
950/*
951 * Extension capability list.
952 */
953#define KVM_CAP_IRQCHIP 0
954#define KVM_CAP_HLT 1
955#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
956#define KVM_CAP_USER_MEMORY 3
957#define KVM_CAP_SET_TSS_ADDR 4
958#define KVM_CAP_VAPIC 6
959#define KVM_CAP_EXT_CPUID 7
960#define KVM_CAP_CLOCKSOURCE 8
7c6da3de 961#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
51b24e34
JK
962#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
963#define KVM_CAP_PIT 11
964#define KVM_CAP_NOP_IO_DELAY 12
965#define KVM_CAP_PV_MMU 13
966#define KVM_CAP_MP_STATE 14
967#define KVM_CAP_COALESCED_MMIO 15
968#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
51b24e34 969#define KVM_CAP_IOMMU 18
51b24e34
JK
970/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
971#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
51b24e34 972#define KVM_CAP_USER_NMI 22
51b24e34
JK
973#ifdef __KVM_HAVE_GUEST_DEBUG
974#define KVM_CAP_SET_GUEST_DEBUG 23
975#endif
976#ifdef __KVM_HAVE_PIT
977#define KVM_CAP_REINJECT_CONTROL 24
978#endif
51b24e34 979#define KVM_CAP_IRQ_ROUTING 25
51b24e34 980#define KVM_CAP_IRQ_INJECT_STATUS 26
51b24e34
JK
981#define KVM_CAP_ASSIGN_DEV_IRQ 29
982/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
983#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
984#ifdef __KVM_HAVE_MCE
985#define KVM_CAP_MCE 31
986#endif
987#define KVM_CAP_IRQFD 32
988#ifdef __KVM_HAVE_PIT
989#define KVM_CAP_PIT2 33
990#endif
991#define KVM_CAP_SET_BOOT_CPU_ID 34
992#ifdef __KVM_HAVE_PIT_STATE2
993#define KVM_CAP_PIT_STATE2 35
994#endif
995#define KVM_CAP_IOEVENTFD 36
996#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
997#ifdef __KVM_HAVE_XEN_HVM
998#define KVM_CAP_XEN_HVM 38
999#endif
1000#define KVM_CAP_ADJUST_CLOCK 39
1001#define KVM_CAP_INTERNAL_ERROR_DATA 40
1002#ifdef __KVM_HAVE_VCPU_EVENTS
1003#define KVM_CAP_VCPU_EVENTS 41
1004#endif
1005#define KVM_CAP_S390_PSW 42
1006#define KVM_CAP_PPC_SEGSTATE 43
1007#define KVM_CAP_HYPERV 44
1008#define KVM_CAP_HYPERV_VAPIC 45
1009#define KVM_CAP_HYPERV_SPIN 46
1010#define KVM_CAP_PCI_SEGMENT 47
1011#define KVM_CAP_PPC_PAIRED_SINGLES 48
1012#define KVM_CAP_INTR_SHADOW 49
1013#ifdef __KVM_HAVE_DEBUGREGS
1014#define KVM_CAP_DEBUGREGS 50
1015#endif
1016#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
1017#define KVM_CAP_PPC_OSI 52
1018#define KVM_CAP_PPC_UNSET_IRQ 53
1019#define KVM_CAP_ENABLE_CAP 54
1020#ifdef __KVM_HAVE_XSAVE
1021#define KVM_CAP_XSAVE 55
1022#endif
1023#ifdef __KVM_HAVE_XCRS
1024#define KVM_CAP_XCRS 56
1025#endif
1026#define KVM_CAP_PPC_GET_PVINFO 57
1027#define KVM_CAP_PPC_IRQ_LEVEL 58
1028#define KVM_CAP_ASYNC_PF 59
1029#define KVM_CAP_TSC_CONTROL 60
1030#define KVM_CAP_GET_TSC_KHZ 61
1031#define KVM_CAP_PPC_BOOKE_SREGS 62
7c6da3de
AG
1032#define KVM_CAP_SPAPR_TCE 63
1033#define KVM_CAP_PPC_SMT 64
1034#define KVM_CAP_PPC_RMA 65
1035#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
9d4e4f8c 1036#define KVM_CAP_PPC_HIOR 67
7c6da3de 1037#define KVM_CAP_PPC_PAPR 68
a54fc080 1038#define KVM_CAP_SW_TLB 69
9d4e4f8c 1039#define KVM_CAP_ONE_REG 70
1529ae1b
AG
1040#define KVM_CAP_S390_GMAP 71
1041#define KVM_CAP_TSC_DEADLINE_TIMER 72
1042#define KVM_CAP_S390_UCONTROL 73
1043#define KVM_CAP_SYNC_REGS 74
9ab2195d
MT
1044#define KVM_CAP_PCI_2_3 75
1045#define KVM_CAP_KVMCLOCK_CTRL 76
80a3eb10
JK
1046#define KVM_CAP_SIGNAL_MSI 77
1047#define KVM_CAP_PPC_GET_SMMU_INFO 78
2a60dba4 1048#define KVM_CAP_S390_COW 79
651682dc 1049#define KVM_CAP_PPC_ALLOC_HTAB 80
716b8e4d 1050#define KVM_CAP_READONLY_MEM 81
716b8e4d 1051#define KVM_CAP_IRQFD_RESAMPLE 82
d4834ff9
AG
1052#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
1053#define KVM_CAP_PPC_HTAB_FD 84
d3dccee1
AG
1054#define KVM_CAP_S390_CSS_SUPPORT 85
1055#define KVM_CAP_PPC_EPR 86
eadd0e44
PM
1056#define KVM_CAP_ARM_PSCI 87
1057#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
e098b453
AK
1058#define KVM_CAP_DEVICE_CTRL 89
1059#define KVM_CAP_IRQ_MPIC 90
1060#define KVM_CAP_PPC_RTAS 91
1061#define KVM_CAP_IRQ_XICS 92
c5daeae1 1062#define KVM_CAP_ARM_EL1_32BIT 93
4f265607 1063#define KVM_CAP_SPAPR_MULTITCE 94
bf63839f 1064#define KVM_CAP_EXT_EMUL_CPUID 95
48a5f3bc 1065#define KVM_CAP_HYPERV_TIME 96
9ffd2685
CH
1066#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
1067#define KVM_CAP_ENABLE_CAP_VM 98
1068#define KVM_CAP_S390_IRQCHIP 99
76eb98d5
JF
1069#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
1070#define KVM_CAP_VM_ATTRIBUTES 101
b061808d
AG
1071#define KVM_CAP_ARM_PSCI_0_2 102
1072#define KVM_CAP_PPC_FIXUP_HCALL 103
a9fd1654
JF
1073#define KVM_CAP_PPC_ENABLE_HCALL 104
1074#define KVM_CAP_CHECK_EXTENSION_VM 105
51628b18 1075#define KVM_CAP_S390_USER_SIGP 106
7a52ce8a
CH
1076#define KVM_CAP_S390_VECTOR_REGISTERS 107
1077#define KVM_CAP_S390_MEM_OP 108
1078#define KVM_CAP_S390_USER_STSI 109
1079#define KVM_CAP_S390_SKEYS 110
1080#define KVM_CAP_MIPS_FPU 111
1081#define KVM_CAP_MIPS_MSA 112
1082#define KVM_CAP_S390_INJECT_IRQ 113
1083#define KVM_CAP_S390_IRQ_STATE 114
1084#define KVM_CAP_PPC_HWRNG 115
24a31426
PB
1085#define KVM_CAP_DISABLE_QUIRKS 116
1086#define KVM_CAP_X86_SMM 117
1087#define KVM_CAP_MULTI_ADDRESS_SPACE 118
3a824b15
PB
1088#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
1089#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
1090#define KVM_CAP_SPLIT_IRQCHIP 121
1091#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
fff02bc0 1092#define KVM_CAP_HYPERV_SYNIC 123
66fb2d54 1093#define KVM_CAP_S390_RI 124
b89485a5
PB
1094#define KVM_CAP_SPAPR_TCE_64 125
1095#define KVM_CAP_ARM_PMU_V3 126
1096#define KVM_CAP_VCPU_ATTRIBUTES 127
ff804f15 1097#define KVM_CAP_MAX_VCPU_ID 128
dbdfea92
CH
1098#define KVM_CAP_X2APIC_API 129
1099#define KVM_CAP_S390_USER_INSTR0 130
1100#define KVM_CAP_MSI_DEVID 131
1101#define KVM_CAP_PPC_HTM 132
3a5eb5b4
PB
1102#define KVM_CAP_SPAPR_RESIZE_HPT 133
1103#define KVM_CAP_PPC_MMU_RADIX 134
1104#define KVM_CAP_PPC_MMU_HASH_V3 135
1105#define KVM_CAP_IMMEDIATE_EXIT 136
74c98e20
CH
1106#define KVM_CAP_MIPS_VZ 137
1107#define KVM_CAP_MIPS_TE 138
1108#define KVM_CAP_MIPS_64BIT 139
1109#define KVM_CAP_S390_GS 140
1110#define KVM_CAP_S390_AIS 141
1111#define KVM_CAP_SPAPR_TCE_VFIO 142
65a6d8dd 1112#define KVM_CAP_X86_DISABLE_EXITS 143
74c98e20 1113#define KVM_CAP_ARM_USER_IRQ 144
3272f0e2
CB
1114#define KVM_CAP_S390_CMMA_MIGRATION 145
1115#define KVM_CAP_PPC_FWNMI 146
1116#define KVM_CAP_PPC_SMT_POSSIBLE 147
ab6e1550
CB
1117#define KVM_CAP_HYPERV_SYNIC2 148
1118#define KVM_CAP_HYPERV_VP_INDEX 149
dd873966 1119#define KVM_CAP_S390_AIS_MIGRATION 150
9cbb6362
CH
1120#define KVM_CAP_PPC_GET_CPU_CHAR 151
1121#define KVM_CAP_S390_BPB 152
9f2d175d 1122#define KVM_CAP_GET_MSR_FEATURES 153
65a6d8dd 1123#define KVM_CAP_HYPERV_EVENTFD 154
77d361b1 1124#define KVM_CAP_HYPERV_TLBFLUSH 155
d36f7de8
CH
1125#define KVM_CAP_S390_HPAGE_1M 156
1126#define KVM_CAP_NESTED_STATE 157
8f3cd250
CH
1127#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
1128#define KVM_CAP_MSR_PLATFORM_INFO 159
966f2ec3
PB
1129#define KVM_CAP_PPC_NESTED_HV 160
1130#define KVM_CAP_HYPERV_SEND_IPI 161
1131#define KVM_CAP_COALESCED_PIO 162
1132#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
1133#define KVM_CAP_EXCEPTION_PAYLOAD 164
da054c64 1134#define KVM_CAP_ARM_VM_IPA_SIZE 165
d9cb4336 1135#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
da054c64 1136#define KVM_CAP_HYPERV_CPUID 167
d9cb4336
CH
1137#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
1138#define KVM_CAP_PPC_IRQ_XIVE 169
1139#define KVM_CAP_ARM_SVE 170
1140#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1141#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
f363d039
EA
1142#define KVM_CAP_PMU_EVENT_FILTER 173
1143#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
1144#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
2a886794
GK
1145#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
1146#define KVM_CAP_ARM_NISV_TO_USER 177
1147#define KVM_CAP_ARM_INJECT_EXT_DABT 178
ddda3748 1148#define KVM_CAP_S390_VCPU_RESETS 179
dc6f8d45
CH
1149#define KVM_CAP_S390_PROTECTED 180
1150#define KVM_CAP_PPC_SECURE_GUEST 181
f76b348e
CH
1151#define KVM_CAP_HALT_POLL 182
1152#define KVM_CAP_ASYNC_PF_INT 183
e6546342
JW
1153#define KVM_CAP_LAST_CPU 184
1154#define KVM_CAP_SMALLER_MAXPHYADDR 185
1155#define KVM_CAP_S390_DIAG318 186
94c7fefc 1156#define KVM_CAP_STEAL_TIME 187
53ba2eee
MR
1157#define KVM_CAP_X86_USER_SPACE_MSR 188
1158#define KVM_CAP_X86_MSR_FILTER 189
1159#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
b3c818a4
EF
1160#define KVM_CAP_SYS_HYPERV_CPUID 191
1161#define KVM_CAP_DIRTY_LOG_RING 192
278f064e
EH
1162#define KVM_CAP_X86_BUS_LOCK_EXIT 193
1163#define KVM_CAP_PPC_DAWR1 194
1164#define KVM_CAP_SET_GUEST_DEBUG2 195
1165#define KVM_CAP_SGX_ATTRIBUTE 196
1166#define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197
1167#define KVM_CAP_PTP_KVM 198
327d4b7f
BR
1168#define KVM_CAP_HYPERV_ENFORCE_CPUID 199
1169#define KVM_CAP_SREGS2 200
1170#define KVM_CAP_EXIT_HYPERCALL 201
1171#define KVM_CAP_PPC_RPT_INVALIDATE 202
1172#define KVM_CAP_BINARY_STATS_FD 203
1173#define KVM_CAP_EXIT_ON_EMULATION_FAILURE 204
1174#define KVM_CAP_ARM_MTE 205
ef17dd6a
VG
1175#define KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM 206
1176#define KVM_CAP_VM_GPA_BITS 207
1177#define KVM_CAP_XSAVE2 208
1ea5208f 1178#define KVM_CAP_SYS_ATTRIBUTES 209
e4082063
AW
1179#define KVM_CAP_PPC_AIL_MODE_3 210
1180#define KVM_CAP_S390_MEM_OP_EXTENSION 211
1181#define KVM_CAP_PMU_CAPABILITY 212
1182#define KVM_CAP_DISABLE_QUIRKS2 213
d525f73f 1183#define KVM_CAP_VM_TSC_CONTROL 214
e4082063 1184#define KVM_CAP_SYSTEM_EVENT_DATA 215
d525f73f
CQ
1185#define KVM_CAP_ARM_SYSTEM_SUSPEND 216
1186#define KVM_CAP_S390_PROTECTED_DUMP 217
1187#define KVM_CAP_X86_TRIPLE_FAULT_EVENT 218
1188#define KVM_CAP_X86_NOTIFY_VMEXIT 219
1189#define KVM_CAP_VM_DISABLE_NX_HUGE_PAGES 220
1190#define KVM_CAP_S390_ZPCI_OP 221
1191#define KVM_CAP_S390_CPU_TOPOLOGY 222
93e0932b 1192#define KVM_CAP_DIRTY_LOG_RING_ACQ_REL 223
93d7620c
AH
1193#define KVM_CAP_S390_PROTECTED_ASYNC_DISABLE 224
1194#define KVM_CAP_DIRTY_LOG_RING_WITH_BITMAP 225
c5c0fdbe 1195#define KVM_CAP_PMU_EVENT_MASKED_EVENTS 226
d0bf492f
CLG
1196#define KVM_CAP_COUNTER_OFFSET 227
1197#define KVM_CAP_ARM_EAGER_SPLIT_CHUNK_SIZE 228
1198#define KVM_CAP_ARM_SUPPORTED_BLOCK_SIZES 229
efb91426 1199#define KVM_CAP_ARM_SUPPORTED_REG_MASK_RANGES 230
51b24e34
JK
1200
1201#ifdef KVM_CAP_IRQ_ROUTING
1202
1203struct kvm_irq_routing_irqchip {
1204 __u32 irqchip;
1205 __u32 pin;
1206};
1207
1208struct kvm_irq_routing_msi {
1209 __u32 address_lo;
1210 __u32 address_hi;
1211 __u32 data;
dbdfea92
CH
1212 union {
1213 __u32 pad;
1214 __u32 devid;
1215 };
51b24e34
JK
1216};
1217
9ffd2685
CH
1218struct kvm_irq_routing_s390_adapter {
1219 __u64 ind_addr;
1220 __u64 summary_addr;
1221 __u64 ind_offset;
1222 __u32 summary_offset;
1223 __u32 adapter_id;
1224};
1225
fff02bc0
PB
1226struct kvm_irq_routing_hv_sint {
1227 __u32 vcpu;
1228 __u32 sint;
1229};
1230
ef17dd6a
VG
1231struct kvm_irq_routing_xen_evtchn {
1232 __u32 port;
1233 __u32 vcpu;
1234 __u32 priority;
1235};
1236
1237#define KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL ((__u32)(-1))
1238
51b24e34
JK
1239/* gsi routing entry types */
1240#define KVM_IRQ_ROUTING_IRQCHIP 1
1241#define KVM_IRQ_ROUTING_MSI 2
9ffd2685 1242#define KVM_IRQ_ROUTING_S390_ADAPTER 3
fff02bc0 1243#define KVM_IRQ_ROUTING_HV_SINT 4
ef17dd6a 1244#define KVM_IRQ_ROUTING_XEN_EVTCHN 5
51b24e34
JK
1245
1246struct kvm_irq_routing_entry {
1247 __u32 gsi;
1248 __u32 type;
1249 __u32 flags;
1250 __u32 pad;
1251 union {
1252 struct kvm_irq_routing_irqchip irqchip;
1253 struct kvm_irq_routing_msi msi;
9ffd2685 1254 struct kvm_irq_routing_s390_adapter adapter;
fff02bc0 1255 struct kvm_irq_routing_hv_sint hv_sint;
ef17dd6a 1256 struct kvm_irq_routing_xen_evtchn xen_evtchn;
51b24e34
JK
1257 __u32 pad[8];
1258 } u;
1259};
1260
1261struct kvm_irq_routing {
1262 __u32 nr;
1263 __u32 flags;
d525f73f 1264 struct kvm_irq_routing_entry entries[];
51b24e34
JK
1265};
1266
1267#endif
1268
1269#ifdef KVM_CAP_MCE
1270/* x86 MCE */
1271struct kvm_x86_mce {
1272 __u64 status;
1273 __u64 addr;
1274 __u64 misc;
1275 __u64 mcg_status;
1276 __u8 bank;
1277 __u8 pad1[7];
1278 __u64 pad2[3];
1279};
1280#endif
1281
1282#ifdef KVM_CAP_XEN_HVM
278f064e
EH
1283#define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0)
1284#define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1)
1285#define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2)
1286#define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3)
ef17dd6a 1287#define KVM_XEN_HVM_CONFIG_EVTCHN_2LEVEL (1 << 4)
d525f73f 1288#define KVM_XEN_HVM_CONFIG_EVTCHN_SEND (1 << 5)
93d7620c 1289#define KVM_XEN_HVM_CONFIG_RUNSTATE_UPDATE_FLAG (1 << 6)
278f064e 1290
51b24e34
JK
1291struct kvm_xen_hvm_config {
1292 __u32 flags;
1293 __u32 msr;
1294 __u64 blob_addr_32;
1295 __u64 blob_addr_64;
1296 __u8 blob_size_32;
1297 __u8 blob_size_64;
1298 __u8 pad2[30];
1299};
1300#endif
1301
1302#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
716b8e4d
AW
1303/*
1304 * Available with KVM_CAP_IRQFD_RESAMPLE
1305 *
1306 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1307 * the irqfd to operate in resampling mode for level triggered interrupt
f76b348e 1308 * emulation. See Documentation/virt/kvm/api.rst.
716b8e4d
AW
1309 */
1310#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
51b24e34
JK
1311
1312struct kvm_irqfd {
1313 __u32 fd;
1314 __u32 gsi;
1315 __u32 flags;
716b8e4d
AW
1316 __u32 resamplefd;
1317 __u8 pad[16];
51b24e34
JK
1318};
1319
bc204035
MT
1320/* For KVM_CAP_ADJUST_CLOCK */
1321
1322/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1323#define KVM_CLOCK_TSC_STABLE 2
43709a0c
PB
1324#define KVM_CLOCK_REALTIME (1 << 2)
1325#define KVM_CLOCK_HOST_TSC (1 << 3)
bc204035 1326
51b24e34
JK
1327struct kvm_clock_data {
1328 __u64 clock;
1329 __u32 flags;
43709a0c
PB
1330 __u32 pad0;
1331 __u64 realtime;
1332 __u64 host_tsc;
1333 __u32 pad[4];
51b24e34
JK
1334};
1335
bc204035
MT
1336/* For KVM_CAP_SW_TLB */
1337
a54fc080
AG
1338#define KVM_MMU_FSL_BOOKE_NOHV 0
1339#define KVM_MMU_FSL_BOOKE_HV 1
1340
1341struct kvm_config_tlb {
1342 __u64 params;
1343 __u64 array;
1344 __u32 mmu_type;
1345 __u32 array_len;
1346};
1347
1348struct kvm_dirty_tlb {
1349 __u64 bitmap;
1350 __u32 num_dirty;
1351};
1352
9d4e4f8c
AG
1353/* Available with KVM_CAP_ONE_REG */
1354
a31be480
AG
1355#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1356#define KVM_REG_GENERIC 0x0000000000000000ULL
9d4e4f8c
AG
1357
1358/*
1359 * Architecture specific registers are to be defined in arch headers and
1360 * ORed with the arch identifier.
1361 */
a31be480
AG
1362#define KVM_REG_PPC 0x1000000000000000ULL
1363#define KVM_REG_X86 0x2000000000000000ULL
1364#define KVM_REG_IA64 0x3000000000000000ULL
1365#define KVM_REG_ARM 0x4000000000000000ULL
1366#define KVM_REG_S390 0x5000000000000000ULL
c5daeae1
AK
1367#define KVM_REG_ARM64 0x6000000000000000ULL
1368#define KVM_REG_MIPS 0x7000000000000000ULL
f363d039 1369#define KVM_REG_RISCV 0x8000000000000000ULL
efb91426 1370#define KVM_REG_LOONGARCH 0x9000000000000000ULL
a31be480
AG
1371
1372#define KVM_REG_SIZE_SHIFT 52
1373#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1374#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1375#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1376#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1377#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1378#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1379#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1380#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1381#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
d9cb4336 1382#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
9d4e4f8c 1383
eadd0e44
PM
1384struct kvm_reg_list {
1385 __u64 n; /* number of regs */
d525f73f 1386 __u64 reg[];
eadd0e44
PM
1387};
1388
9d4e4f8c
AG
1389struct kvm_one_reg {
1390 __u64 id;
a31be480 1391 __u64 addr;
9d4e4f8c
AG
1392};
1393
dbdfea92 1394#define KVM_MSI_VALID_DEVID (1U << 0)
80a3eb10
JK
1395struct kvm_msi {
1396 __u32 address_lo;
1397 __u32 address_hi;
1398 __u32 data;
1399 __u32 flags;
dbdfea92
CH
1400 __u32 devid;
1401 __u8 pad[12];
80a3eb10
JK
1402};
1403
eadd0e44
PM
1404struct kvm_arm_device_addr {
1405 __u64 id;
1406 __u64 addr;
1407};
1408
e098b453
AK
1409/*
1410 * Device control API, available with KVM_CAP_DEVICE_CTRL
1411 */
1412#define KVM_CREATE_DEVICE_TEST 1
1413
1414struct kvm_create_device {
1415 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1416 __u32 fd; /* out: device handle */
1417 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1418};
1419
1420struct kvm_device_attr {
1421 __u32 flags; /* no flags currently defined */
1422 __u32 group; /* device-defined */
1423 __u64 attr; /* group-defined */
1424 __u64 addr; /* userspace address of attr data */
1425};
1426
da3c22c7
TH
1427#define KVM_DEV_VFIO_FILE 1
1428
1429#define KVM_DEV_VFIO_FILE_ADD 1
1430#define KVM_DEV_VFIO_FILE_DEL 2
1431
1432/* KVM_DEV_VFIO_GROUP aliases are for compile time uapi compatibility */
1433#define KVM_DEV_VFIO_GROUP KVM_DEV_VFIO_FILE
1434
1435#define KVM_DEV_VFIO_GROUP_ADD KVM_DEV_VFIO_FILE_ADD
1436#define KVM_DEV_VFIO_GROUP_DEL KVM_DEV_VFIO_FILE_DEL
74c98e20 1437#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
444b1996
AB
1438
1439enum kvm_device_type {
1440 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1441#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1442 KVM_DEV_TYPE_FSL_MPIC_42,
1443#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1444 KVM_DEV_TYPE_XICS,
1445#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1446 KVM_DEV_TYPE_VFIO,
1447#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1448 KVM_DEV_TYPE_ARM_VGIC_V2,
1449#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1450 KVM_DEV_TYPE_FLIC,
1451#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
51628b18
CB
1452 KVM_DEV_TYPE_ARM_VGIC_V3,
1453#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
dbdfea92
CH
1454 KVM_DEV_TYPE_ARM_VGIC_ITS,
1455#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
d9cb4336
CH
1456 KVM_DEV_TYPE_XIVE,
1457#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
2a886794
GK
1458 KVM_DEV_TYPE_ARM_PV_TIME,
1459#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
d0bf492f
CLG
1460 KVM_DEV_TYPE_RISCV_AIA,
1461#define KVM_DEV_TYPE_RISCV_AIA KVM_DEV_TYPE_RISCV_AIA
444b1996
AB
1462 KVM_DEV_TYPE_MAX,
1463};
e098b453 1464
74c98e20
CH
1465struct kvm_vfio_spapr_tce {
1466 __s32 groupfd;
1467 __s32 tablefd;
1468};
1469
51b24e34
JK
1470/*
1471 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1472 * a vcpu fd.
1473 */
1474#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1475#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
51b24e34 1476#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
d0bf492f 1477#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45) /* deprecated */
51b24e34
JK
1478#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
1479 struct kvm_userspace_memory_region)
1480#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1481#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
1529ae1b
AG
1482
1483/* enable ucontrol for s390 */
1484struct kvm_s390_ucas_mapping {
1485 __u64 user_addr;
1486 __u64 vcpu_addr;
1487 __u64 length;
1488};
1489#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1490#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
1491#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
1492
51b24e34
JK
1493/* Device model IOC */
1494#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1495#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1496#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1497#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1498#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1499#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1500#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1501#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
1502#define KVM_REGISTER_COALESCED_MMIO \
1503 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1504#define KVM_UNREGISTER_COALESCED_MMIO \
1505 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
1506#define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \
1507 struct kvm_assigned_pci_dev)
1508#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
1509/* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */
1510#define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70
1511#define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq)
1512#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
1513#define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \
1514 struct kvm_assigned_pci_dev)
1515#define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \
1516 struct kvm_assigned_msix_nr)
1517#define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \
1518 struct kvm_assigned_msix_entry)
1519#define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq)
1520#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1521#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1522#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1523#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1524#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1525#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1526#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1527/* Available with KVM_CAP_PIT_STATE2 */
1528#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1529#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
1530/* Available with KVM_CAP_PPC_GET_PVINFO */
1531#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
d525f73f
CQ
1532/* Available with KVM_CAP_TSC_CONTROL for a vCPU, or with
1533* KVM_CAP_VM_TSC_CONTROL to set defaults for a VM */
51b24e34
JK
1534#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1535#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
9ab2195d
MT
1536/* Available with KVM_CAP_PCI_2_3 */
1537#define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \
1538 struct kvm_assigned_pci_dev)
80a3eb10
JK
1539/* Available with KVM_CAP_SIGNAL_MSI */
1540#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
1541/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1542#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
651682dc
MT
1543/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1544#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
d4834ff9 1545#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
b89485a5
PB
1546#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1547 struct kvm_create_spapr_tce_64)
d4834ff9
AG
1548/* Available with KVM_CAP_RMA */
1549#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
1550/* Available with KVM_CAP_PPC_HTAB_FD */
1551#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
eadd0e44
PM
1552/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1553#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
e098b453
AK
1554/* Available with KVM_CAP_PPC_RTAS */
1555#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
3a5eb5b4
PB
1556/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1557#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1558#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
1559/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1560#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1561/* Available with KVM_CAP_PPC_RADIX_MMU */
1562#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
9cbb6362
CH
1563/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1564#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
f363d039
EA
1565/* Available with KVM_CAP_PMU_EVENT_FILTER */
1566#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
50fd0c37 1567#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
327d4b7f 1568#define KVM_ARM_MTE_COPY_TAGS _IOR(KVMIO, 0xb4, struct kvm_arm_copy_mte_tags)
d0bf492f
CLG
1569/* Available with KVM_CAP_COUNTER_OFFSET */
1570#define KVM_ARM_SET_COUNTER_OFFSET _IOW(KVMIO, 0xb5, struct kvm_arm_counter_offset)
efb91426 1571#define KVM_ARM_GET_REG_WRITABLE_MASKS _IOR(KVMIO, 0xb6, struct reg_mask_range)
e098b453
AK
1572
1573/* ioctl for vm fd */
1574#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1575
1576/* ioctls for fds returned by KVM_CREATE_DEVICE */
1577#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1578#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1579#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
51b24e34
JK
1580
1581/*
1582 * ioctls for vcpu fds
1583 */
1584#define KVM_RUN _IO(KVMIO, 0x80)
1585#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1586#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1587#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1588#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1589#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1590#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
1591/* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */
1592#define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87
1593#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1594#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1595#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1596#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
1597#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1598#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
1599#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1600#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
1601#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1602#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
1603/* Available with KVM_CAP_VAPIC */
1604#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
1605/* Available with KVM_CAP_VAPIC */
1606#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
1607/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1608#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
1609/* store status for s390 */
1610#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1611#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1612#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1613/* initial ipl psw for s390 */
1614#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1615/* initial reset for s390 */
1616#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
1617#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1618#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
444b1996 1619/* Available with KVM_CAP_USER_NMI */
51b24e34
JK
1620#define KVM_NMI _IO(KVMIO, 0x9a)
1621/* Available with KVM_CAP_SET_GUEST_DEBUG */
1622#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
1623/* MCE for x86 */
1624#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1625#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1626#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
51b24e34
JK
1627/* Available with KVM_CAP_VCPU_EVENTS */
1628#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1629#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
1630/* Available with KVM_CAP_DEBUGREGS */
1631#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1632#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
9ffd2685 1633/*
d0bf492f 1634 * vcpu version available with KVM_CAP_ENABLE_CAP
9ffd2685
CH
1635 * vm version available with KVM_CAP_ENABLE_CAP_VM
1636 */
51b24e34
JK
1637#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
1638/* Available with KVM_CAP_XSAVE */
1639#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1640#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1641/* Available with KVM_CAP_XCRS */
1642#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1643#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
a54fc080
AG
1644/* Available with KVM_CAP_SW_TLB */
1645#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
9d4e4f8c 1646/* Available with KVM_CAP_ONE_REG */
a31be480 1647#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
9d4e4f8c 1648#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
9ab2195d
MT
1649/* VM is being stopped by host */
1650#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
eadd0e44 1651#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
bf63839f 1652#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
eadd0e44 1653#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
7a52ce8a
CH
1654/* Available with KVM_CAP_S390_MEM_OP */
1655#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
1656/* Available with KVM_CAP_S390_SKEYS */
1657#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1658#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
1659/* Available with KVM_CAP_S390_INJECT_IRQ */
1660#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
1661/* Available with KVM_CAP_S390_IRQ_STATE */
1662#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1663#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
24a31426
PB
1664/* Available with KVM_CAP_X86_SMM */
1665#define KVM_SMI _IO(KVMIO, 0xb7)
3272f0e2 1666/* Available with KVM_CAP_S390_CMMA_MIGRATION */
ab6e1550 1667#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
3272f0e2 1668#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
9f2d175d
PB
1669/* Memory Encryption Commands */
1670#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
1671
1672struct kvm_enc_region {
1673 __u64 addr;
1674 __u64 size;
1675};
1676
1677#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1678#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1679
65a6d8dd
PM
1680/* Available with KVM_CAP_HYPERV_EVENTFD */
1681#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1682
d36f7de8
CH
1683/* Available with KVM_CAP_NESTED_STATE */
1684#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1685#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
65a6d8dd 1686
d9cb4336 1687/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
da054c64
PB
1688#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1689
b3c818a4 1690/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
da054c64
PB
1691#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1692
d9cb4336
CH
1693/* Available with KVM_CAP_ARM_SVE */
1694#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1695
ddda3748
CH
1696/* Available with KVM_CAP_S390_VCPU_RESETS */
1697#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1698#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1699
dc6f8d45
CH
1700struct kvm_s390_pv_sec_parm {
1701 __u64 origin;
1702 __u64 length;
1703};
1704
1705struct kvm_s390_pv_unp {
1706 __u64 addr;
1707 __u64 size;
1708 __u64 tweak;
1709};
1710
d525f73f
CQ
1711enum pv_cmd_dmp_id {
1712 KVM_PV_DUMP_INIT,
1713 KVM_PV_DUMP_CONFIG_STOR_STATE,
1714 KVM_PV_DUMP_COMPLETE,
1715 KVM_PV_DUMP_CPU,
1716};
1717
1718struct kvm_s390_pv_dmp {
1719 __u64 subcmd;
1720 __u64 buff_addr;
1721 __u64 buff_len;
1722 __u64 gaddr; /* For dump storage state */
1723 __u64 reserved[4];
1724};
1725
1726enum pv_cmd_info_id {
1727 KVM_PV_INFO_VM,
1728 KVM_PV_INFO_DUMP,
1729};
1730
1731struct kvm_s390_pv_info_dump {
1732 __u64 dump_cpu_buffer_len;
1733 __u64 dump_config_mem_buffer_per_1m;
1734 __u64 dump_config_finalize_len;
1735};
1736
1737struct kvm_s390_pv_info_vm {
1738 __u64 inst_calls_list[4];
1739 __u64 max_cpus;
1740 __u64 max_guests;
1741 __u64 max_guest_addr;
1742 __u64 feature_indication;
1743};
1744
1745struct kvm_s390_pv_info_header {
1746 __u32 id;
1747 __u32 len_max;
1748 __u32 len_written;
1749 __u32 reserved;
1750};
1751
1752struct kvm_s390_pv_info {
1753 struct kvm_s390_pv_info_header header;
1754 union {
1755 struct kvm_s390_pv_info_dump dump;
1756 struct kvm_s390_pv_info_vm vm;
1757 };
1758};
1759
dc6f8d45
CH
1760enum pv_cmd_id {
1761 KVM_PV_ENABLE,
1762 KVM_PV_DISABLE,
1763 KVM_PV_SET_SEC_PARMS,
1764 KVM_PV_UNPACK,
1765 KVM_PV_VERIFY,
1766 KVM_PV_PREP_RESET,
1767 KVM_PV_UNSHARE_ALL,
d525f73f
CQ
1768 KVM_PV_INFO,
1769 KVM_PV_DUMP,
93d7620c
AH
1770 KVM_PV_ASYNC_CLEANUP_PREPARE,
1771 KVM_PV_ASYNC_CLEANUP_PERFORM,
dc6f8d45
CH
1772};
1773
1774struct kvm_pv_cmd {
1775 __u32 cmd; /* Command to be executed */
1776 __u16 rc; /* Ultravisor return code */
1777 __u16 rrc; /* Ultravisor return reason code */
1778 __u64 data; /* Data or address */
1779 __u32 flags; /* flags for future extensions. Must be 0 for now */
1780 __u32 reserved[3];
1781};
1782
1783/* Available with KVM_CAP_S390_PROTECTED */
1784#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1785
53ba2eee
MR
1786/* Available with KVM_CAP_X86_MSR_FILTER */
1787#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1788
b3c818a4
EF
1789/* Available with KVM_CAP_DIRTY_LOG_RING */
1790#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1791
278f064e
EH
1792/* Per-VM Xen attributes */
1793#define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr)
1794#define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr)
1795
1796struct kvm_xen_hvm_attr {
1797 __u16 type;
1798 __u16 pad[3];
1799 union {
1800 __u8 long_mode;
1801 __u8 vector;
93d7620c 1802 __u8 runstate_update_flag;
278f064e
EH
1803 struct {
1804 __u64 gfn;
93d7620c 1805#define KVM_XEN_INVALID_GFN ((__u64)-1)
278f064e 1806 } shared_info;
d525f73f
CQ
1807 struct {
1808 __u32 send_port;
1809 __u32 type; /* EVTCHNSTAT_ipi / EVTCHNSTAT_interdomain */
1810 __u32 flags;
1811#define KVM_XEN_EVTCHN_DEASSIGN (1 << 0)
1812#define KVM_XEN_EVTCHN_UPDATE (1 << 1)
1813#define KVM_XEN_EVTCHN_RESET (1 << 2)
1814 /*
1815 * Events sent by the guest are either looped back to
1816 * the guest itself (potentially on a different port#)
1817 * or signalled via an eventfd.
1818 */
1819 union {
1820 struct {
1821 __u32 port;
1822 __u32 vcpu;
1823 __u32 priority;
1824 } port;
1825 struct {
1826 __u32 port; /* Zero for eventfd */
1827 __s32 fd;
1828 } eventfd;
1829 __u32 padding[4];
1830 } deliver;
1831 } evtchn;
1832 __u32 xen_version;
278f064e
EH
1833 __u64 pad[8];
1834 } u;
1835};
1836
93d7620c 1837
278f064e
EH
1838/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1839#define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0
1840#define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1
1841#define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2
d525f73f
CQ
1842/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1843#define KVM_XEN_ATTR_TYPE_EVTCHN 0x3
1844#define KVM_XEN_ATTR_TYPE_XEN_VERSION 0x4
93d7620c
AH
1845/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_RUNSTATE_UPDATE_FLAG */
1846#define KVM_XEN_ATTR_TYPE_RUNSTATE_UPDATE_FLAG 0x5
278f064e
EH
1847
1848/* Per-vCPU Xen attributes */
1849#define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr)
1850#define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr)
1851
d525f73f
CQ
1852/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1853#define KVM_XEN_HVM_EVTCHN_SEND _IOW(KVMIO, 0xd0, struct kvm_irq_routing_xen_evtchn)
1854
327d4b7f
BR
1855#define KVM_GET_SREGS2 _IOR(KVMIO, 0xcc, struct kvm_sregs2)
1856#define KVM_SET_SREGS2 _IOW(KVMIO, 0xcd, struct kvm_sregs2)
1857
278f064e
EH
1858struct kvm_xen_vcpu_attr {
1859 __u16 type;
1860 __u16 pad[3];
1861 union {
1862 __u64 gpa;
93d7620c 1863#define KVM_XEN_INVALID_GPA ((__u64)-1)
278f064e
EH
1864 __u64 pad[8];
1865 struct {
1866 __u64 state;
1867 __u64 state_entry_time;
1868 __u64 time_running;
1869 __u64 time_runnable;
1870 __u64 time_blocked;
1871 __u64 time_offline;
1872 } runstate;
d525f73f
CQ
1873 __u32 vcpu_id;
1874 struct {
1875 __u32 port;
1876 __u32 priority;
1877 __u64 expires_ns;
1878 } timer;
1879 __u8 vector;
278f064e
EH
1880 } u;
1881};
1882
1883/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1884#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0
1885#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1
1886#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2
1887#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3
1888#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4
1889#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5
d525f73f
CQ
1890/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1891#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID 0x6
1892#define KVM_XEN_VCPU_ATTR_TYPE_TIMER 0x7
1893#define KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR 0x8
278f064e 1894
9f2d175d
PB
1895/* Secure Encrypted Virtualization command */
1896enum sev_cmd_id {
1897 /* Guest initialization commands */
1898 KVM_SEV_INIT = 0,
1899 KVM_SEV_ES_INIT,
1900 /* Guest launch commands */
1901 KVM_SEV_LAUNCH_START,
1902 KVM_SEV_LAUNCH_UPDATE_DATA,
1903 KVM_SEV_LAUNCH_UPDATE_VMSA,
1904 KVM_SEV_LAUNCH_SECRET,
1905 KVM_SEV_LAUNCH_MEASURE,
1906 KVM_SEV_LAUNCH_FINISH,
1907 /* Guest migration commands (outgoing) */
1908 KVM_SEV_SEND_START,
1909 KVM_SEV_SEND_UPDATE_DATA,
1910 KVM_SEV_SEND_UPDATE_VMSA,
1911 KVM_SEV_SEND_FINISH,
1912 /* Guest migration commands (incoming) */
1913 KVM_SEV_RECEIVE_START,
1914 KVM_SEV_RECEIVE_UPDATE_DATA,
1915 KVM_SEV_RECEIVE_UPDATE_VMSA,
1916 KVM_SEV_RECEIVE_FINISH,
1917 /* Guest status and debug commands */
1918 KVM_SEV_GUEST_STATUS,
1919 KVM_SEV_DBG_DECRYPT,
1920 KVM_SEV_DBG_ENCRYPT,
1921 /* Guest certificates commands */
1922 KVM_SEV_CERT_EXPORT,
3ea1a802
BS
1923 /* Attestation report */
1924 KVM_SEV_GET_ATTESTATION_REPORT,
278f064e
EH
1925 /* Guest Migration Extension */
1926 KVM_SEV_SEND_CANCEL,
9f2d175d
PB
1927
1928 KVM_SEV_NR_MAX,
1929};
1930
1931struct kvm_sev_cmd {
1932 __u32 id;
1933 __u64 data;
1934 __u32 error;
1935 __u32 sev_fd;
1936};
1937
1938struct kvm_sev_launch_start {
1939 __u32 handle;
1940 __u32 policy;
1941 __u64 dh_uaddr;
1942 __u32 dh_len;
1943 __u64 session_uaddr;
1944 __u32 session_len;
1945};
1946
1947struct kvm_sev_launch_update_data {
1948 __u64 uaddr;
1949 __u32 len;
1950};
1951
1952
1953struct kvm_sev_launch_secret {
1954 __u64 hdr_uaddr;
1955 __u32 hdr_len;
1956 __u64 guest_uaddr;
1957 __u32 guest_len;
1958 __u64 trans_uaddr;
1959 __u32 trans_len;
1960};
1961
1962struct kvm_sev_launch_measure {
1963 __u64 uaddr;
1964 __u32 len;
1965};
1966
1967struct kvm_sev_guest_status {
1968 __u32 handle;
1969 __u32 policy;
1970 __u32 state;
1971};
1972
1973struct kvm_sev_dbg {
1974 __u64 src_uaddr;
1975 __u64 dst_uaddr;
1976 __u32 len;
1977};
51b24e34 1978
3ea1a802
BS
1979struct kvm_sev_attestation_report {
1980 __u8 mnonce[16];
1981 __u64 uaddr;
1982 __u32 len;
1983};
1984
278f064e
EH
1985struct kvm_sev_send_start {
1986 __u32 policy;
1987 __u64 pdh_cert_uaddr;
1988 __u32 pdh_cert_len;
1989 __u64 plat_certs_uaddr;
1990 __u32 plat_certs_len;
1991 __u64 amd_certs_uaddr;
1992 __u32 amd_certs_len;
1993 __u64 session_uaddr;
1994 __u32 session_len;
1995};
1996
1997struct kvm_sev_send_update_data {
1998 __u64 hdr_uaddr;
1999 __u32 hdr_len;
2000 __u64 guest_uaddr;
2001 __u32 guest_len;
2002 __u64 trans_uaddr;
2003 __u32 trans_len;
2004};
2005
2006struct kvm_sev_receive_start {
2007 __u32 handle;
2008 __u32 policy;
2009 __u64 pdh_uaddr;
2010 __u32 pdh_len;
2011 __u64 session_uaddr;
2012 __u32 session_len;
2013};
2014
2015struct kvm_sev_receive_update_data {
2016 __u64 hdr_uaddr;
2017 __u32 hdr_len;
2018 __u64 guest_uaddr;
2019 __u32 guest_len;
2020 __u64 trans_uaddr;
2021 __u32 trans_len;
2022};
2023
51b24e34 2024#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
9ab2195d
MT
2025#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
2026#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
51b24e34
JK
2027
2028struct kvm_assigned_pci_dev {
2029 __u32 assigned_dev_id;
2030 __u32 busnr;
2031 __u32 devfn;
2032 __u32 flags;
2033 __u32 segnr;
2034 union {
2035 __u32 reserved[11];
2036 };
2037};
2038
2039#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
2040#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
2041#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
2042
2043#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
2044#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
2045#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
2046
2047#define KVM_DEV_IRQ_HOST_MASK 0x00ff
2048#define KVM_DEV_IRQ_GUEST_MASK 0xff00
2049
2050struct kvm_assigned_irq {
2051 __u32 assigned_dev_id;
7c6da3de 2052 __u32 host_irq; /* ignored (legacy field) */
51b24e34
JK
2053 __u32 guest_irq;
2054 __u32 flags;
2055 union {
51b24e34
JK
2056 __u32 reserved[12];
2057 };
2058};
2059
51b24e34
JK
2060struct kvm_assigned_msix_nr {
2061 __u32 assigned_dev_id;
2062 __u16 entry_nr;
2063 __u16 padding;
2064};
2065
2066#define KVM_MAX_MSIX_PER_DEV 256
2067struct kvm_assigned_msix_entry {
2068 __u32 assigned_dev_id;
2069 __u32 gsi;
2070 __u16 entry; /* The index of entry in the MSI-X table */
2071 __u16 padding[3];
2072};
2073
dbdfea92
CH
2074#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
2075#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
2076
74c98e20
CH
2077/* Available with KVM_CAP_ARM_USER_IRQ */
2078
2079/* Bits for run->s.regs.device_irq_level */
2080#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
2081#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
2082#define KVM_ARM_DEV_PMU (1 << 2)
2083
65a6d8dd
PM
2084struct kvm_hyperv_eventfd {
2085 __u32 conn_id;
2086 __s32 fd;
2087 __u32 flags;
2088 __u32 padding[3];
2089};
2090
2091#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
2092#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
2093
dc6f8d45
CH
2094#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
2095#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
2096
b3c818a4
EF
2097/*
2098 * Arch needs to define the macro after implementing the dirty ring
2099 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
2100 * starting page offset of the dirty ring structures.
2101 */
2102#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
2103#define KVM_DIRTY_LOG_PAGE_OFFSET 0
2104#endif
2105
2106/*
2107 * KVM dirty GFN flags, defined as:
2108 *
2109 * |---------------+---------------+--------------|
2110 * | bit 1 (reset) | bit 0 (dirty) | Status |
2111 * |---------------+---------------+--------------|
2112 * | 0 | 0 | Invalid GFN |
2113 * | 0 | 1 | Dirty GFN |
2114 * | 1 | X | GFN to reset |
2115 * |---------------+---------------+--------------|
2116 *
2117 * Lifecycle of a dirty GFN goes like:
2118 *
2119 * dirtied harvested reset
2120 * 00 -----------> 01 -------------> 1X -------+
2121 * ^ |
2122 * | |
2123 * +------------------------------------------+
2124 *
2125 * The userspace program is only responsible for the 01->1X state
2126 * conversion after harvesting an entry. Also, it must not skip any
2127 * dirty bits, so that dirty bits are always harvested in sequence.
2128 */
278f064e
EH
2129#define KVM_DIRTY_GFN_F_DIRTY _BITUL(0)
2130#define KVM_DIRTY_GFN_F_RESET _BITUL(1)
b3c818a4
EF
2131#define KVM_DIRTY_GFN_F_MASK 0x3
2132
2133/*
2134 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
2135 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
2136 * size of the gfn buffer is decided by the first argument when
2137 * enabling KVM_CAP_DIRTY_LOG_RING.
2138 */
2139struct kvm_dirty_gfn {
2140 __u32 flags;
2141 __u32 slot;
2142 __u64 offset;
2143};
2144
278f064e
EH
2145#define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
2146#define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1)
2147
e4082063
AW
2148#define KVM_PMU_CAP_DISABLE (1 << 0)
2149
327d4b7f
BR
2150/**
2151 * struct kvm_stats_header - Header of per vm/vcpu binary statistics data.
2152 * @flags: Some extra information for header, always 0 for now.
2153 * @name_size: The size in bytes of the memory which contains statistics
2154 * name string including trailing '\0'. The memory is allocated
2155 * at the send of statistics descriptor.
2156 * @num_desc: The number of statistics the vm or vcpu has.
2157 * @id_offset: The offset of the vm/vcpu stats' id string in the file pointed
2158 * by vm/vcpu stats fd.
2159 * @desc_offset: The offset of the vm/vcpu stats' descriptor block in the file
2160 * pointd by vm/vcpu stats fd.
2161 * @data_offset: The offset of the vm/vcpu stats' data block in the file
2162 * pointed by vm/vcpu stats fd.
2163 *
2164 * This is the header userspace needs to read from stats fd before any other
2165 * readings. It is used by userspace to discover all the information about the
2166 * vm/vcpu's binary statistics.
2167 * Userspace reads this header from the start of the vm/vcpu's stats fd.
2168 */
2169struct kvm_stats_header {
2170 __u32 flags;
2171 __u32 name_size;
2172 __u32 num_desc;
2173 __u32 id_offset;
2174 __u32 desc_offset;
2175 __u32 data_offset;
2176};
2177
2178#define KVM_STATS_TYPE_SHIFT 0
2179#define KVM_STATS_TYPE_MASK (0xF << KVM_STATS_TYPE_SHIFT)
2180#define KVM_STATS_TYPE_CUMULATIVE (0x0 << KVM_STATS_TYPE_SHIFT)
2181#define KVM_STATS_TYPE_INSTANT (0x1 << KVM_STATS_TYPE_SHIFT)
2182#define KVM_STATS_TYPE_PEAK (0x2 << KVM_STATS_TYPE_SHIFT)
43709a0c
PB
2183#define KVM_STATS_TYPE_LINEAR_HIST (0x3 << KVM_STATS_TYPE_SHIFT)
2184#define KVM_STATS_TYPE_LOG_HIST (0x4 << KVM_STATS_TYPE_SHIFT)
2185#define KVM_STATS_TYPE_MAX KVM_STATS_TYPE_LOG_HIST
327d4b7f
BR
2186
2187#define KVM_STATS_UNIT_SHIFT 4
2188#define KVM_STATS_UNIT_MASK (0xF << KVM_STATS_UNIT_SHIFT)
2189#define KVM_STATS_UNIT_NONE (0x0 << KVM_STATS_UNIT_SHIFT)
2190#define KVM_STATS_UNIT_BYTES (0x1 << KVM_STATS_UNIT_SHIFT)
2191#define KVM_STATS_UNIT_SECONDS (0x2 << KVM_STATS_UNIT_SHIFT)
2192#define KVM_STATS_UNIT_CYCLES (0x3 << KVM_STATS_UNIT_SHIFT)
105bb7cd 2193#define KVM_STATS_UNIT_BOOLEAN (0x4 << KVM_STATS_UNIT_SHIFT)
d525f73f 2194#define KVM_STATS_UNIT_MAX KVM_STATS_UNIT_BOOLEAN
327d4b7f
BR
2195
2196#define KVM_STATS_BASE_SHIFT 8
2197#define KVM_STATS_BASE_MASK (0xF << KVM_STATS_BASE_SHIFT)
2198#define KVM_STATS_BASE_POW10 (0x0 << KVM_STATS_BASE_SHIFT)
2199#define KVM_STATS_BASE_POW2 (0x1 << KVM_STATS_BASE_SHIFT)
2200#define KVM_STATS_BASE_MAX KVM_STATS_BASE_POW2
2201
2202/**
2203 * struct kvm_stats_desc - Descriptor of a KVM statistics.
2204 * @flags: Annotations of the stats, like type, unit, etc.
2205 * @exponent: Used together with @flags to determine the unit.
2206 * @size: The number of data items for this stats.
2207 * Every data item is of type __u64.
2208 * @offset: The offset of the stats to the start of stat structure in
43709a0c
PB
2209 * structure kvm or kvm_vcpu.
2210 * @bucket_size: A parameter value used for histogram stats. It is only used
2211 * for linear histogram stats, specifying the size of the bucket;
327d4b7f
BR
2212 * @name: The name string for the stats. Its size is indicated by the
2213 * &kvm_stats_header->name_size.
2214 */
2215struct kvm_stats_desc {
2216 __u32 flags;
2217 __s16 exponent;
2218 __u16 size;
2219 __u32 offset;
43709a0c 2220 __u32 bucket_size;
327d4b7f
BR
2221 char name[];
2222};
2223
2224#define KVM_GET_STATS_FD _IO(KVMIO, 0xce)
2225
1ea5208f
PB
2226/* Available with KVM_CAP_XSAVE2 */
2227#define KVM_GET_XSAVE2 _IOR(KVMIO, 0xcf, struct kvm_xsave)
2228
d525f73f
CQ
2229/* Available with KVM_CAP_S390_PROTECTED_DUMP */
2230#define KVM_S390_PV_CPU_COMMAND _IOWR(KVMIO, 0xd0, struct kvm_pv_cmd)
2231
2232/* Available with KVM_CAP_X86_NOTIFY_VMEXIT */
2233#define KVM_X86_NOTIFY_VMEXIT_ENABLED (1ULL << 0)
2234#define KVM_X86_NOTIFY_VMEXIT_USER (1ULL << 1)
2235
2236/* Available with KVM_CAP_S390_ZPCI_OP */
2237#define KVM_S390_ZPCI_OP _IOW(KVMIO, 0xd1, struct kvm_s390_zpci_op)
2238
2239struct kvm_s390_zpci_op {
2240 /* in */
2241 __u32 fh; /* target device */
2242 __u8 op; /* operation to perform */
2243 __u8 pad[3];
2244 union {
2245 /* for KVM_S390_ZPCIOP_REG_AEN */
2246 struct {
2247 __u64 ibv; /* Guest addr of interrupt bit vector */
2248 __u64 sb; /* Guest addr of summary bit */
2249 __u32 flags;
2250 __u32 noi; /* Number of interrupts */
2251 __u8 isc; /* Guest interrupt subclass */
2252 __u8 sbo; /* Offset of guest summary bit vector */
2253 __u16 pad;
2254 } reg_aen;
2255 __u64 reserved[8];
2256 } u;
2257};
2258
2259/* types for kvm_s390_zpci_op->op */
2260#define KVM_S390_ZPCIOP_REG_AEN 0
2261#define KVM_S390_ZPCIOP_DEREG_AEN 1
2262
2263/* flags for kvm_s390_zpci_op->u.reg_aen.flags */
2264#define KVM_S390_ZPCIOP_REGAEN_HOST (1 << 0)
2265
51b24e34 2266#endif /* __LINUX_KVM_H */