]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - include/uapi/linux/kvm.h
KVM: VMX: Enable SGX virtualization for SGX1, SGX2 and LC
[thirdparty/kernel/stable.git] / include / uapi / linux / kvm.h
CommitLineData
6f52b16c 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
6aa8b732
AK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
dea8caee 8 * Note: you must update KVM_API_VERSION if you change this interface.
6aa8b732
AK
9 */
10
00bfddaf 11#include <linux/types.h>
97646202 12#include <linux/compiler.h>
6aa8b732 13#include <linux/ioctl.h>
f6a40e3b 14#include <asm/kvm.h>
6aa8b732 15
2ff81f70 16#define KVM_API_VERSION 12
0b76e20b 17
c54d2aba
JK
18/* *** Deprecated interfaces *** */
19
20#define KVM_TRC_SHIFT 16
21
22#define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT)
23#define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1))
24
25#define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01)
26#define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02)
27#define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01)
28
29#define KVM_TRC_HEAD_SIZE 12
30#define KVM_TRC_CYCLE_SIZE 8
31#define KVM_TRC_EXTRA_MAX 7
32
33#define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02)
34#define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03)
35#define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04)
36#define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05)
37#define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06)
38#define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07)
39#define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08)
40#define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09)
41#define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A)
42#define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B)
43#define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C)
44#define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D)
45#define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E)
46#define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F)
47#define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10)
48#define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11)
49#define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12)
50#define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13)
51#define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14)
52#define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15)
53#define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16)
54#define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17)
55#define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18)
56#define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19)
57
2714d1d3 58struct kvm_user_trace_setup {
c54d2aba
JK
59 __u32 buf_size;
60 __u32 buf_nr;
61};
62
63#define __KVM_DEPRECATED_MAIN_W_0x06 \
64 _IOW(KVMIO, 0x06, struct kvm_user_trace_setup)
65#define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07)
66#define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08)
67
68#define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq)
69
70struct kvm_breakpoint {
71 __u32 enabled;
72 __u32 padding;
73 __u64 address;
74};
75
76struct kvm_debug_guest {
77 __u32 enabled;
78 __u32 pad;
79 struct kvm_breakpoint breakpoints[4];
80 __u32 singlestep;
2714d1d3
FEL
81};
82
c54d2aba
JK
83#define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest)
84
85/* *** End of deprecated interfaces *** */
86
87
6aa8b732
AK
88/* for KVM_CREATE_MEMORY_REGION */
89struct kvm_memory_region {
90 __u32 slot;
91 __u32 flags;
92 __u64 guest_phys_addr;
93 __u64 memory_size; /* bytes */
94};
95
6fc138d2
IE
96/* for KVM_SET_USER_MEMORY_REGION */
97struct kvm_userspace_memory_region {
98 __u32 slot;
99 __u32 flags;
100 __u64 guest_phys_addr;
101 __u64 memory_size; /* bytes */
102 __u64 userspace_addr; /* start of the userspace allocated memory */
103};
104
67b29204
XG
105/*
106 * The bit 0 ~ bit 15 of kvm_memory_region::flags are visible for userspace,
107 * other bits are reserved for kvm internal use which are defined in
108 * include/linux/kvm_host.h.
109 */
4d8b81ab
XG
110#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
111#define KVM_MEM_READONLY (1UL << 1)
6aa8b732 112
97222cc8 113/* for KVM_IRQ_LINE */
85f455f7
ED
114struct kvm_irq_level {
115 /*
116 * ACPI gsi notion of irq.
117 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
118 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
3ecad8c2 119 * For ARM: See Documentation/virt/kvm/api.rst
85f455f7 120 */
4925663a
GN
121 union {
122 __u32 irq;
123 __s32 status;
124 };
85f455f7
ED
125 __u32 level;
126};
127
6ceb9d79
HQ
128
129struct kvm_irqchip {
130 __u32 chip_id;
131 __u32 pad;
132 union {
133 char dummy[512]; /* reserving space */
7a0eb196 134#ifdef __KVM_HAVE_PIT
6ceb9d79 135 struct kvm_pic_state pic;
ec10f475 136#endif
7a0eb196 137#ifdef __KVM_HAVE_IOAPIC
6bf9e962 138 struct kvm_ioapic_state ioapic;
51e29625 139#endif
6ceb9d79
HQ
140 } chip;
141};
142
c5ff41ce
JK
143/* for KVM_CREATE_PIT2 */
144struct kvm_pit_config {
145 __u32 flags;
146 __u32 pad[15];
147};
148
149#define KVM_PIT_SPEAKER_DUMMY 1
150
30ee2a98
JH
151struct kvm_s390_skeys {
152 __u64 start_gfn;
153 __u64 count;
154 __u64 skeydata_addr;
155 __u32 flags;
156 __u32 reserved[9];
157};
db397571 158
4036e387
CI
159#define KVM_S390_CMMA_PEEK (1 << 0)
160
161/**
162 * kvm_s390_cmma_log - Used for CMMA migration.
163 *
164 * Used both for input and output.
165 *
166 * @start_gfn: Guest page number to start from.
167 * @count: Size of the result buffer.
168 * @flags: Control operation mode via KVM_S390_CMMA_* flags
169 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
170 * pages are still remaining.
171 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
172 * in the PGSTE.
173 * @values: Pointer to the values buffer.
174 *
175 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
176 */
177struct kvm_s390_cmma_log {
178 __u64 start_gfn;
179 __u32 count;
180 __u32 flags;
181 union {
182 __u64 remaining;
183 __u64 mask;
184 };
185 __u64 values;
186};
187
db397571
AS
188struct kvm_hyperv_exit {
189#define KVM_EXIT_HYPERV_SYNIC 1
83326e43 190#define KVM_EXIT_HYPERV_HCALL 2
f97f5a56 191#define KVM_EXIT_HYPERV_SYNDBG 3
db397571 192 __u32 type;
f7d31e65 193 __u32 pad1;
db397571
AS
194 union {
195 struct {
196 __u32 msr;
f7d31e65 197 __u32 pad2;
db397571
AS
198 __u64 control;
199 __u64 evt_page;
200 __u64 msg_page;
201 } synic;
83326e43
AS
202 struct {
203 __u64 input;
204 __u64 result;
205 __u64 params[2];
206 } hcall;
f97f5a56
JD
207 struct {
208 __u32 msr;
209 __u32 pad2;
210 __u64 control;
211 __u64 status;
212 __u64 send_page;
213 __u64 recv_page;
214 __u64 pending_page;
215 } syndbg;
db397571
AS
216 } u;
217};
218
23200b7a
JM
219struct kvm_xen_exit {
220#define KVM_EXIT_XEN_HCALL 1
221 __u32 type;
222 union {
223 struct {
224 __u32 longmode;
225 __u32 cpl;
226 __u64 input;
227 __u64 result;
228 __u64 params[6];
229 } hcall;
230 } u;
231};
232
30ee2a98
JH
233#define KVM_S390_GET_SKEYS_NONE 1
234#define KVM_S390_SKEYS_MAX 1048576
235
8a45450d
AK
236#define KVM_EXIT_UNKNOWN 0
237#define KVM_EXIT_EXCEPTION 1
238#define KVM_EXIT_IO 2
239#define KVM_EXIT_HYPERCALL 3
240#define KVM_EXIT_DEBUG 4
241#define KVM_EXIT_HLT 5
242#define KVM_EXIT_MMIO 6
243#define KVM_EXIT_IRQ_WINDOW_OPEN 7
244#define KVM_EXIT_SHUTDOWN 8
245#define KVM_EXIT_FAIL_ENTRY 9
246#define KVM_EXIT_INTR 10
247#define KVM_EXIT_SET_TPR 11
b209749f 248#define KVM_EXIT_TPR_ACCESS 12
8f2abe6a 249#define KVM_EXIT_S390_SIEIC 13
e28acfea 250#define KVM_EXIT_S390_RESET 14
ce91ddc4 251#define KVM_EXIT_DCR 15 /* deprecated */
c4abb7c9 252#define KVM_EXIT_NMI 16
3f5d18a9 253#define KVM_EXIT_INTERNAL_ERROR 17
ad0a048b 254#define KVM_EXIT_OSI 18
de56a948 255#define KVM_EXIT_PAPR_HCALL 19
e168bf8d 256#define KVM_EXIT_S390_UCONTROL 20
f61c94bb 257#define KVM_EXIT_WATCHDOG 21
fa6b7fe9 258#define KVM_EXIT_S390_TSCH 22
1c810636 259#define KVM_EXIT_EPR 23
8ad6b634 260#define KVM_EXIT_SYSTEM_EVENT 24
e44fc8c9 261#define KVM_EXIT_S390_STSI 25
7543a635 262#define KVM_EXIT_IOAPIC_EOI 26
db397571 263#define KVM_EXIT_HYPERV 27
c726200d 264#define KVM_EXIT_ARM_NISV 28
1ae09954
AG
265#define KVM_EXIT_X86_RDMSR 29
266#define KVM_EXIT_X86_WRMSR 30
fb04a1ed 267#define KVM_EXIT_DIRTY_RING_FULL 31
647daca2 268#define KVM_EXIT_AP_RESET_HOLD 32
fe6b6bc8 269#define KVM_EXIT_X86_BUS_LOCK 33
23200b7a 270#define KVM_EXIT_XEN 34
3f5d18a9
AK
271
272/* For KVM_EXIT_INTERNAL_ERROR */
b9bf6882
XG
273/* Emulate instruction failed. */
274#define KVM_INTERNAL_ERROR_EMULATION 1
275/* Encounter unexpected simultaneous exceptions. */
276#define KVM_INTERNAL_ERROR_SIMUL_EX 2
277/* Encounter unexpected vm-exit due to delivery event. */
278#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
7396d337
LA
279/* Encounter unexpected vm-exit reason */
280#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
6aa8b732 281
9a2bb7f4 282/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
6aa8b732
AK
283struct kvm_run {
284 /* in */
c1150d8c 285 __u8 request_interrupt_window;
460df4c1
PB
286 __u8 immediate_exit;
287 __u8 padding1[6];
6aa8b732
AK
288
289 /* out */
6aa8b732 290 __u32 exit_reason;
c1150d8c
DL
291 __u8 ready_for_interrupt_injection;
292 __u8 if_flag;
f077825a 293 __u16 flags;
54810342
DL
294
295 /* in (pre_kvm_run), out (post_kvm_run) */
c1150d8c
DL
296 __u64 cr8;
297 __u64 apic_base;
298
d7b0b5eb
CO
299#ifdef __KVM_S390
300 /* the processor status word for s390 */
301 __u64 psw_mask; /* psw upper half */
302 __u64 psw_addr; /* psw lower half */
303#endif
6aa8b732
AK
304 union {
305 /* KVM_EXIT_UNKNOWN */
306 struct {
8eb7d334 307 __u64 hardware_exit_reason;
6aa8b732 308 } hw;
8eb7d334
AK
309 /* KVM_EXIT_FAIL_ENTRY */
310 struct {
311 __u64 hardware_entry_failure_reason;
1aa561b1 312 __u32 cpu;
8eb7d334 313 } fail_entry;
6aa8b732
AK
314 /* KVM_EXIT_EXCEPTION */
315 struct {
316 __u32 exception;
317 __u32 error_code;
318 } ex;
319 /* KVM_EXIT_IO */
2f8b9ee1 320 struct {
6aa8b732
AK
321#define KVM_EXIT_IO_IN 0
322#define KVM_EXIT_IO_OUT 1
323 __u8 direction;
324 __u8 size; /* bytes */
6aa8b732 325 __u16 port;
039576c0
AK
326 __u32 count;
327 __u64 data_offset; /* relative to kvm_run start */
6aa8b732 328 } io;
8ab30c15 329 /* KVM_EXIT_DEBUG */
6aa8b732 330 struct {
d0bfb940 331 struct kvm_debug_exit_arch arch;
6aa8b732
AK
332 } debug;
333 /* KVM_EXIT_MMIO */
334 struct {
335 __u64 phys_addr;
336 __u8 data[8];
337 __u32 len;
338 __u8 is_write;
339 } mmio;
b4e63f56
AK
340 /* KVM_EXIT_HYPERCALL */
341 struct {
519ef353 342 __u64 nr;
b4e63f56
AK
343 __u64 args[6];
344 __u64 ret;
345 __u32 longmode;
346 __u32 pad;
347 } hypercall;
b209749f
AK
348 /* KVM_EXIT_TPR_ACCESS */
349 struct {
350 __u64 rip;
351 __u32 is_write;
352 __u32 pad;
353 } tpr_access;
8f2abe6a
CB
354 /* KVM_EXIT_S390_SIEIC */
355 struct {
356 __u8 icptcode;
8f2abe6a
CB
357 __u16 ipa;
358 __u32 ipb;
359 } s390_sieic;
e28acfea
CB
360 /* KVM_EXIT_S390_RESET */
361#define KVM_S390_RESET_POR 1
362#define KVM_S390_RESET_CLEAR 2
363#define KVM_S390_RESET_SUBSYSTEM 4
364#define KVM_S390_RESET_CPU_INIT 8
365#define KVM_S390_RESET_IPL 16
366 __u64 s390_reset_flags;
e168bf8d
CO
367 /* KVM_EXIT_S390_UCONTROL */
368 struct {
369 __u64 trans_exc_code;
370 __u32 pgm_code;
371 } s390_ucontrol;
ce91ddc4 372 /* KVM_EXIT_DCR (deprecated) */
b2312f05
HB
373 struct {
374 __u32 dcrn;
375 __u32 data;
376 __u8 is_write;
377 } dcr;
8ab30c15 378 /* KVM_EXIT_INTERNAL_ERROR */
3f5d18a9
AK
379 struct {
380 __u32 suberror;
a9c7399d
AK
381 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
382 __u32 ndata;
383 __u64 data[16];
3f5d18a9 384 } internal;
ad0a048b
AG
385 /* KVM_EXIT_OSI */
386 struct {
387 __u64 gprs[32];
388 } osi;
8ab30c15 389 /* KVM_EXIT_PAPR_HCALL */
de56a948
PM
390 struct {
391 __u64 nr;
392 __u64 ret;
393 __u64 args[9];
394 } papr_hcall;
fa6b7fe9
CH
395 /* KVM_EXIT_S390_TSCH */
396 struct {
397 __u16 subchannel_id;
398 __u16 subchannel_nr;
399 __u32 io_int_parm;
400 __u32 io_int_word;
401 __u32 ipb;
402 __u8 dequeued;
403 } s390_tsch;
1c810636
AG
404 /* KVM_EXIT_EPR */
405 struct {
406 __u32 epr;
407 } epr;
8ad6b634
AP
408 /* KVM_EXIT_SYSTEM_EVENT */
409 struct {
410#define KVM_SYSTEM_EVENT_SHUTDOWN 1
411#define KVM_SYSTEM_EVENT_RESET 2
2ce79189 412#define KVM_SYSTEM_EVENT_CRASH 3
8ad6b634
AP
413 __u32 type;
414 __u64 flags;
415 } system_event;
e44fc8c9
ET
416 /* KVM_EXIT_S390_STSI */
417 struct {
418 __u64 addr;
419 __u8 ar;
420 __u8 reserved;
421 __u8 fc;
422 __u8 sel1;
423 __u16 sel2;
424 } s390_stsi;
7543a635
SR
425 /* KVM_EXIT_IOAPIC_EOI */
426 struct {
427 __u8 vector;
428 } eoi;
db397571
AS
429 /* KVM_EXIT_HYPERV */
430 struct kvm_hyperv_exit hyperv;
c726200d
CD
431 /* KVM_EXIT_ARM_NISV */
432 struct {
433 __u64 esr_iss;
434 __u64 fault_ipa;
435 } arm_nisv;
1ae09954
AG
436 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
437 struct {
438 __u8 error; /* user -> kernel */
439 __u8 pad[7];
440#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
441#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
1a155254 442#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
1ae09954
AG
443 __u32 reason; /* kernel -> user */
444 __u32 index; /* kernel -> user */
445 __u64 data; /* kernel <-> user */
446 } msr;
23200b7a
JM
447 /* KVM_EXIT_XEN */
448 struct kvm_xen_exit xen;
24cbc7e9
AK
449 /* Fix the size of the union. */
450 char padding[256];
6aa8b732 451 };
b9e5dc8d 452
7b7e3952
KH
453 /* 2048 is the size of the char array used to bound/pad the size
454 * of the union that holds sync regs.
455 */
456 #define SYNC_REGS_SIZE_BYTES 2048
b9e5dc8d
CB
457 /*
458 * shared registers between kvm and userspace.
459 * kvm_valid_regs specifies the register classes set by the host
460 * kvm_dirty_regs specified the register classes dirtied by userspace
461 * struct kvm_sync_regs is architecture specific, as well as the
462 * bits for kvm_valid_regs and kvm_dirty_regs
463 */
464 __u64 kvm_valid_regs;
465 __u64 kvm_dirty_regs;
466 union {
467 struct kvm_sync_regs regs;
7b7e3952 468 char padding[SYNC_REGS_SIZE_BYTES];
b9e5dc8d 469 } s;
6aa8b732
AK
470};
471
5f94c174
LV
472/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
473
474struct kvm_coalesced_mmio_zone {
475 __u64 addr;
476 __u32 size;
0804c849
PH
477 union {
478 __u32 pad;
479 __u32 pio;
480 };
5f94c174
LV
481};
482
483struct kvm_coalesced_mmio {
484 __u64 phys_addr;
485 __u32 len;
0804c849
PH
486 union {
487 __u32 pad;
488 __u32 pio;
489 };
5f94c174
LV
490 __u8 data[8];
491};
492
493struct kvm_coalesced_mmio_ring {
494 __u32 first, last;
495 struct kvm_coalesced_mmio coalesced_mmio[0];
496};
497
498#define KVM_COALESCED_MMIO_MAX \
499 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
500 sizeof(struct kvm_coalesced_mmio))
501
6aa8b732
AK
502/* for KVM_TRANSLATE */
503struct kvm_translation {
504 /* in */
505 __u64 linear_address;
6aa8b732
AK
506
507 /* out */
508 __u64 physical_address;
509 __u8 valid;
510 __u8 writeable;
511 __u8 usermode;
8cd13307 512 __u8 pad[5];
6aa8b732
AK
513};
514
41408c28
TH
515/* for KVM_S390_MEM_OP */
516struct kvm_s390_mem_op {
517 /* in */
518 __u64 gaddr; /* the guest address */
519 __u64 flags; /* flags */
520 __u32 size; /* amount of bytes */
521 __u32 op; /* type of operation */
522 __u64 buf; /* buffer in userspace */
19e12277
JF
523 union {
524 __u8 ar; /* the access register number */
525 __u32 sida_offset; /* offset into the sida */
526 __u8 reserved[32]; /* should be set to 0 */
527 };
41408c28
TH
528};
529/* types for kvm_s390_mem_op->op */
530#define KVM_S390_MEMOP_LOGICAL_READ 0
531#define KVM_S390_MEMOP_LOGICAL_WRITE 1
19e12277
JF
532#define KVM_S390_MEMOP_SIDA_READ 2
533#define KVM_S390_MEMOP_SIDA_WRITE 3
41408c28
TH
534/* flags for kvm_s390_mem_op->flags */
535#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
536#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
537
6aa8b732
AK
538/* for KVM_INTERRUPT */
539struct kvm_interrupt {
540 /* in */
6aa8b732
AK
541 __u32 irq;
542};
543
6aa8b732
AK
544/* for KVM_GET_DIRTY_LOG */
545struct kvm_dirty_log {
546 __u32 slot;
2f8b9ee1 547 __u32 padding1;
6aa8b732
AK
548 union {
549 void __user *dirty_bitmap; /* one bit per page */
2f8b9ee1 550 __u64 padding2;
6aa8b732
AK
551 };
552};
553
2a31b9db
PB
554/* for KVM_CLEAR_DIRTY_LOG */
555struct kvm_clear_dirty_log {
556 __u32 slot;
557 __u32 num_pages;
558 __u64 first_page;
559 union {
560 void __user *dirty_bitmap; /* one bit per page */
561 __u64 padding2;
562 };
563};
564
1961d276
AK
565/* for KVM_SET_SIGNAL_MASK */
566struct kvm_signal_mask {
567 __u32 len;
568 __u8 sigset[0];
569};
570
b209749f
AK
571/* for KVM_TPR_ACCESS_REPORTING */
572struct kvm_tpr_access_ctl {
573 __u32 enabled;
574 __u32 flags;
575 __u32 reserved[8];
576};
577
b93463aa
AK
578/* for KVM_SET_VAPIC_ADDR */
579struct kvm_vapic_addr {
580 __u64 vapic_addr;
581};
582
0b4820d6 583/* for KVM_SET_MP_STATE */
62d9f0db 584
0b4820d6 585/* not all states are valid on all architectures */
62d9f0db
MT
586#define KVM_MP_STATE_RUNNABLE 0
587#define KVM_MP_STATE_UNINITIALIZED 1
588#define KVM_MP_STATE_INIT_RECEIVED 2
589#define KVM_MP_STATE_HALTED 3
590#define KVM_MP_STATE_SIPI_RECEIVED 4
6352e4d2
DH
591#define KVM_MP_STATE_STOPPED 5
592#define KVM_MP_STATE_CHECK_STOP 6
593#define KVM_MP_STATE_OPERATING 7
594#define KVM_MP_STATE_LOAD 8
647daca2 595#define KVM_MP_STATE_AP_RESET_HOLD 9
62d9f0db
MT
596
597struct kvm_mp_state {
598 __u32 mp_state;
599};
600
b0c632db
HC
601struct kvm_s390_psw {
602 __u64 mask;
603 __u64 addr;
604};
605
ba5c1e9b
CO
606/* valid values for type in kvm_s390_interrupt */
607#define KVM_S390_SIGP_STOP 0xfffe0000u
608#define KVM_S390_PROGRAM_INT 0xfffe0001u
609#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
610#define KVM_S390_RESTART 0xfffe0003u
3c038e6b
DD
611#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
612#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
48a3e950 613#define KVM_S390_MCHK 0xfffe1000u
e029ae5b
TH
614#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
615#define KVM_S390_INT_CPU_TIMER 0xffff1005u
ba5c1e9b
CO
616#define KVM_S390_INT_VIRTIO 0xffff2603u
617#define KVM_S390_INT_SERVICE 0xffff2401u
618#define KVM_S390_INT_EMERGENCY 0xffff1201u
7697e71f 619#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d8346b7d
CH
620/* Anything below 0xfffe0000u is taken by INT_IO */
621#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
622 (((schid)) | \
623 ((ssid) << 16) | \
624 ((cssid) << 18) | \
625 ((ai) << 26))
626#define KVM_S390_INT_IO_MIN 0x00000000u
627#define KVM_S390_INT_IO_MAX 0xfffdffffu
a37281b6 628#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d8346b7d 629
ba5c1e9b
CO
630
631struct kvm_s390_interrupt {
632 __u32 type;
633 __u32 parm;
634 __u64 parm64;
635};
636
81aa8efe
JF
637struct kvm_s390_io_info {
638 __u16 subchannel_id;
639 __u16 subchannel_nr;
640 __u32 io_int_parm;
641 __u32 io_int_word;
642};
643
644struct kvm_s390_ext_info {
645 __u32 ext_params;
646 __u32 pad;
647 __u64 ext_params2;
648};
649
650struct kvm_s390_pgm_info {
651 __u64 trans_exc_code;
652 __u64 mon_code;
653 __u64 per_address;
654 __u32 data_exc_code;
655 __u16 code;
656 __u16 mon_class_nr;
657 __u8 per_code;
658 __u8 per_atmid;
659 __u8 exc_access_id;
660 __u8 per_access_id;
661 __u8 op_access_id;
634790b8
DH
662#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
663#define KVM_S390_PGM_FLAGS_ILC_0 0x02
664#define KVM_S390_PGM_FLAGS_ILC_1 0x04
665#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
eaa4f416 666#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
634790b8
DH
667 __u8 flags;
668 __u8 pad[2];
81aa8efe
JF
669};
670
671struct kvm_s390_prefix_info {
672 __u32 address;
673};
674
675struct kvm_s390_extcall_info {
676 __u16 code;
677};
678
679struct kvm_s390_emerg_info {
680 __u16 code;
681};
682
2822545f
DH
683#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
684struct kvm_s390_stop_info {
685 __u32 flags;
686};
687
81aa8efe
JF
688struct kvm_s390_mchk_info {
689 __u64 cr14;
690 __u64 mcic;
691 __u64 failing_storage_address;
692 __u32 ext_damage_code;
693 __u32 pad;
694 __u8 fixed_logout[16];
695};
696
697struct kvm_s390_irq {
698 __u64 type;
699 union {
700 struct kvm_s390_io_info io;
701 struct kvm_s390_ext_info ext;
702 struct kvm_s390_pgm_info pgm;
703 struct kvm_s390_emerg_info emerg;
704 struct kvm_s390_extcall_info extcall;
705 struct kvm_s390_prefix_info prefix;
2822545f 706 struct kvm_s390_stop_info stop;
81aa8efe
JF
707 struct kvm_s390_mchk_info mchk;
708 char reserved[64];
709 } u;
710};
711
816c7667
JF
712struct kvm_s390_irq_state {
713 __u64 buf;
bb64da9a 714 __u32 flags; /* will stay unused for compatibility reasons */
816c7667 715 __u32 len;
bb64da9a 716 __u32 reserved[4]; /* will stay unused for compatibility reasons */
816c7667
JF
717};
718
d0bfb940
JK
719/* for KVM_SET_GUEST_DEBUG */
720
721#define KVM_GUESTDBG_ENABLE 0x00000001
722#define KVM_GUESTDBG_SINGLESTEP 0x00000002
723
724struct kvm_guest_debug {
725 __u32 control;
726 __u32 pad;
727 struct kvm_guest_debug_arch arch;
728};
729
d34e6b17
GH
730enum {
731 kvm_ioeventfd_flag_nr_datamatch,
732 kvm_ioeventfd_flag_nr_pio,
733 kvm_ioeventfd_flag_nr_deassign,
2b83451b 734 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
68c3b4d1 735 kvm_ioeventfd_flag_nr_fast_mmio,
d34e6b17
GH
736 kvm_ioeventfd_flag_nr_max,
737};
738
739#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
740#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
741#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
2b83451b
CH
742#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
743 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
d34e6b17
GH
744
745#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
746
747struct kvm_ioeventfd {
748 __u64 datamatch;
749 __u64 addr; /* legal pio/mmio address */
f848a5a8 750 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
d34e6b17
GH
751 __s32 fd;
752 __u32 flags;
753 __u8 pad[36];
754};
755
5e62493f 756#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
766d3571 757#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
5e62493f 758#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
b5170063 759#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
5e62493f 760#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
766d3571 761 KVM_X86_DISABLE_EXITS_HLT | \
b5170063
WL
762 KVM_X86_DISABLE_EXITS_PAUSE | \
763 KVM_X86_DISABLE_EXITS_CSTATE)
5e62493f 764
71fbfd5f
AG
765/* for KVM_ENABLE_CAP */
766struct kvm_enable_cap {
767 /* in */
768 __u32 cap;
769 __u32 flags;
770 __u64 args[4];
771 __u8 pad[64];
772};
773
15711e9c 774/* for KVM_PPC_GET_PVINFO */
a91d5df2
DG
775
776#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
777
15711e9c
AG
778struct kvm_ppc_pvinfo {
779 /* out */
780 __u32 flags;
781 __u32 hcall[4];
782 __u8 pad[108];
783};
784
5b74716e
BH
785/* for KVM_PPC_GET_SMMU_INFO */
786#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
787
788struct kvm_ppc_one_page_size {
789 __u32 page_shift; /* Page shift (or 0) */
790 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
791};
792
793struct kvm_ppc_one_seg_page_size {
794 __u32 page_shift; /* Base page shift of segment (or 0) */
795 __u32 slb_enc; /* SLB encoding for BookS */
796 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
797};
798
799#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
800#define KVM_PPC_1T_SEGMENTS 0x00000002
901f8c3f 801#define KVM_PPC_NO_HASH 0x00000004
5b74716e
BH
802
803struct kvm_ppc_smmu_info {
804 __u64 flags;
805 __u32 slb_size;
e3bfed1d
PM
806 __u16 data_keys; /* # storage keys supported for data */
807 __u16 instr_keys; /* # storage keys supported for instructions */
5b74716e
BH
808 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
809};
810
ef1ead0c
DG
811/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
812struct kvm_ppc_resize_hpt {
813 __u64 flags;
814 __u32 shift;
815 __u32 pad;
816};
817
6aa8b732
AK
818#define KVMIO 0xAE
819
e08b9637
CO
820/* machine type bits, to be used as argument to KVM_CREATE_VM */
821#define KVM_VM_S390_UCONTROL 1
822
cbbc58d4
AK
823/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
824#define KVM_VM_PPC_HV 1
825#define KVM_VM_PPC_PR 2
826
15e9e35c
HC
827/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
828#define KVM_VM_MIPS_AUTO 0
a8a3c426 829#define KVM_VM_MIPS_VZ 1
15e9e35c 830#define KVM_VM_MIPS_TE 2
a8a3c426 831
5b1c1493
CO
832#define KVM_S390_SIE_PAGE_OFFSET 1
833
233a7cb2
SP
834/*
835 * On arm64, machine type can be used to request the physical
836 * address size for the VM. Bits[7-0] are reserved for the guest
837 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
838 * value 0 implies the default IPA size, 40bits.
839 */
840#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
841#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
842 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
f17abe9a
AK
843/*
844 * ioctls for /dev/kvm fds:
845 */
739872c5
AK
846#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
847#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
848#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
b0c632db
HC
849
850#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
5d308f45
AK
851/*
852 * Check if a kvm extension is available. Argument is extension number,
853 * return is 1 (yes) or 0 (no, sorry).
854 */
855#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
07c45a36
AK
856/*
857 * Get size for mmap(vcpu_fd)
858 */
859#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
674eea0f 860#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
c54d2aba
JK
861#define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06
862#define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07
863#define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08
9c15bb1d 864#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
801e459a 865#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
c54d2aba 866
85f455f7
ED
867/*
868 * Extension capability list.
869 */
870#define KVM_CAP_IRQCHIP 0
b6958ce4 871#define KVM_CAP_HLT 1
82ce2c96 872#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
6fc138d2 873#define KVM_CAP_USER_MEMORY 3
cbc94022 874#define KVM_CAP_SET_TSS_ADDR 4
b209749f 875#define KVM_CAP_VAPIC 6
674eea0f 876#define KVM_CAP_EXT_CPUID 7
18068523 877#define KVM_CAP_CLOCKSOURCE 8
8c3ba334 878#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
a988b910 879#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
7837699f 880#define KVM_CAP_PIT 11
a28e4f5a 881#define KVM_CAP_NOP_IO_DELAY 12
2f333bcb 882#define KVM_CAP_PV_MMU 13
62d9f0db 883#define KVM_CAP_MP_STATE 14
5f94c174 884#define KVM_CAP_COALESCED_MMIO 15
ed848624 885#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
62c476c7 886#define KVM_CAP_IOMMU 18
1a811b61
AK
887/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
888#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
4531220b 889#define KVM_CAP_USER_NMI 22
91b2ae77 890#ifdef __KVM_HAVE_GUEST_DEBUG
d0bfb940 891#define KVM_CAP_SET_GUEST_DEBUG 23
971cc3dc 892#endif
91b2ae77 893#ifdef __KVM_HAVE_PIT
52d939a0 894#define KVM_CAP_REINJECT_CONTROL 24
399ec807 895#endif
399ec807 896#define KVM_CAP_IRQ_ROUTING 25
4925663a 897#define KVM_CAP_IRQ_INJECT_STATUS 26
e56d532f 898#define KVM_CAP_ASSIGN_DEV_IRQ 29
4cd481f6
JK
899/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
900#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
890ca9ae
HY
901#ifdef __KVM_HAVE_MCE
902#define KVM_CAP_MCE 31
903#endif
721eecbf 904#define KVM_CAP_IRQFD 32
c5ff41ce
JK
905#ifdef __KVM_HAVE_PIT
906#define KVM_CAP_PIT2 33
907#endif
73880c80 908#define KVM_CAP_SET_BOOT_CPU_ID 34
e9f42757
BK
909#ifdef __KVM_HAVE_PIT_STATE2
910#define KVM_CAP_PIT_STATE2 35
911#endif
d34e6b17 912#define KVM_CAP_IOEVENTFD 36
b927a3ce 913#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
ffde22ac
ES
914#ifdef __KVM_HAVE_XEN_HVM
915#define KVM_CAP_XEN_HVM 38
916#endif
afbcf7ab 917#define KVM_CAP_ADJUST_CLOCK 39
a9c7399d 918#define KVM_CAP_INTERNAL_ERROR_DATA 40
3cfc3092
JK
919#ifdef __KVM_HAVE_VCPU_EVENTS
920#define KVM_CAP_VCPU_EVENTS 41
921#endif
d7b0b5eb 922#define KVM_CAP_S390_PSW 42
e15a1137 923#define KVM_CAP_PPC_SEGSTATE 43
55cd8e5a 924#define KVM_CAP_HYPERV 44
10388a07 925#define KVM_CAP_HYPERV_VAPIC 45
c25bc163 926#define KVM_CAP_HYPERV_SPIN 46
ab9f4ecb 927#define KVM_CAP_PCI_SEGMENT 47
c10207fe 928#define KVM_CAP_PPC_PAIRED_SINGLES 48
48005f64 929#define KVM_CAP_INTR_SHADOW 49
a1efbe77
JK
930#ifdef __KVM_HAVE_DEBUGREGS
931#define KVM_CAP_DEBUGREGS 50
932#endif
d2be1651 933#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
ad0a048b 934#define KVM_CAP_PPC_OSI 52
18978768 935#define KVM_CAP_PPC_UNSET_IRQ 53
71fbfd5f 936#define KVM_CAP_ENABLE_CAP 54
2d5b5a66
SY
937#ifdef __KVM_HAVE_XSAVE
938#define KVM_CAP_XSAVE 55
939#endif
940#ifdef __KVM_HAVE_XCRS
941#define KVM_CAP_XCRS 56
942#endif
15711e9c 943#define KVM_CAP_PPC_GET_PVINFO 57
7b4203e8 944#define KVM_CAP_PPC_IRQ_LEVEL 58
344d9588 945#define KVM_CAP_ASYNC_PF 59
92a1f12d
JR
946#define KVM_CAP_TSC_CONTROL 60
947#define KVM_CAP_GET_TSC_KHZ 61
5ce941ee 948#define KVM_CAP_PPC_BOOKE_SREGS 62
54738c09 949#define KVM_CAP_SPAPR_TCE 63
371fefd6 950#define KVM_CAP_PPC_SMT 64
aa04b4cc 951#define KVM_CAP_PPC_RMA 65
8c3ba334 952#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
1022fc3d 953#define KVM_CAP_PPC_HIOR 67
930b412a 954#define KVM_CAP_PPC_PAPR 68
dc83b8bc 955#define KVM_CAP_SW_TLB 69
e24ed81f 956#define KVM_CAP_ONE_REG 70
b6cf8788 957#define KVM_CAP_S390_GMAP 71
4d25a066 958#define KVM_CAP_TSC_DEADLINE_TIMER 72
1efd0f59 959#define KVM_CAP_S390_UCONTROL 73
b9e5dc8d 960#define KVM_CAP_SYNC_REGS 74
07700a94 961#define KVM_CAP_PCI_2_3 75
1c0b28c2 962#define KVM_CAP_KVMCLOCK_CTRL 76
07975ad3 963#define KVM_CAP_SIGNAL_MSI 77
5b74716e 964#define KVM_CAP_PPC_GET_SMMU_INFO 78
1526bf9c 965#define KVM_CAP_S390_COW 79
32fad281 966#define KVM_CAP_PPC_ALLOC_HTAB 80
4d8b81ab 967#define KVM_CAP_READONLY_MEM 81
7a84428a 968#define KVM_CAP_IRQFD_RESAMPLE 82
f61c94bb 969#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
a2932923 970#define KVM_CAP_PPC_HTAB_FD 84
fa6b7fe9 971#define KVM_CAP_S390_CSS_SUPPORT 85
1c810636 972#define KVM_CAP_PPC_EPR 86
aa024c2f 973#define KVM_CAP_ARM_PSCI 87
3401d546 974#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
852b6d57 975#define KVM_CAP_DEVICE_CTRL 89
eb1e4f43 976#define KVM_CAP_IRQ_MPIC 90
8e591cb7 977#define KVM_CAP_PPC_RTAS 91
5975a2e0 978#define KVM_CAP_IRQ_XICS 92
0d854a60 979#define KVM_CAP_ARM_EL1_32BIT 93
0bd50dc9 980#define KVM_CAP_SPAPR_MULTITCE 94
9c15bb1d 981#define KVM_CAP_EXT_EMUL_CPUID 95
e984097b 982#define KVM_CAP_HYPERV_TIME 96
100943c5 983#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
d938dc55 984#define KVM_CAP_ENABLE_CAP_VM 98
84223598 985#define KVM_CAP_S390_IRQCHIP 99
f848a5a8 986#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
63b5cf04 987#define KVM_CAP_VM_ATTRIBUTES 101
717abd20 988#define KVM_CAP_ARM_PSCI_0_2 102
53ea2e46 989#define KVM_CAP_PPC_FIXUP_HCALL 103
699a0ea0 990#define KVM_CAP_PPC_ENABLE_HCALL 104
92b591a4 991#define KVM_CAP_CHECK_EXTENSION_VM 105
2444b352 992#define KVM_CAP_S390_USER_SIGP 106
68c55750 993#define KVM_CAP_S390_VECTOR_REGISTERS 107
41408c28 994#define KVM_CAP_S390_MEM_OP 108
e44fc8c9 995#define KVM_CAP_S390_USER_STSI 109
30ee2a98 996#define KVM_CAP_S390_SKEYS 110
5fafd874 997#define KVM_CAP_MIPS_FPU 111
d952bd07 998#define KVM_CAP_MIPS_MSA 112
47b43c52 999#define KVM_CAP_S390_INJECT_IRQ 113
816c7667 1000#define KVM_CAP_S390_IRQ_STATE 114
e928e9cb 1001#define KVM_CAP_PPC_HWRNG 115
90de4a18 1002#define KVM_CAP_DISABLE_QUIRKS 116
f077825a 1003#define KVM_CAP_X86_SMM 117
f481b069 1004#define KVM_CAP_MULTI_ADDRESS_SPACE 118
5540546b
AB
1005#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
1006#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
49df6397 1007#define KVM_CAP_SPLIT_IRQCHIP 121
e9ea5069 1008#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
5c919412 1009#define KVM_CAP_HYPERV_SYNIC 123
c6e5f166 1010#define KVM_CAP_S390_RI 124
01d01d69 1011#define KVM_CAP_SPAPR_TCE_64 125
ab92f308
PB
1012#define KVM_CAP_ARM_PMU_V3 126
1013#define KVM_CAP_VCPU_ATTRIBUTES 127
0b1b1dfd 1014#define KVM_CAP_MAX_VCPU_ID 128
37131313 1015#define KVM_CAP_X2APIC_API 129
6502a34c 1016#define KVM_CAP_S390_USER_INSTR0 130
912902ce 1017#define KVM_CAP_MSI_DEVID 131
23528bb2 1018#define KVM_CAP_PPC_HTM 132
ef1ead0c 1019#define KVM_CAP_SPAPR_RESIZE_HPT 133
c9270132
PM
1020#define KVM_CAP_PPC_MMU_RADIX 134
1021#define KVM_CAP_PPC_MMU_HASH_V3 135
460df4c1 1022#define KVM_CAP_IMMEDIATE_EXIT 136
a8a3c426
JH
1023#define KVM_CAP_MIPS_VZ 137
1024#define KVM_CAP_MIPS_TE 138
578fd61d 1025#define KVM_CAP_MIPS_64BIT 139
f7b1a77d
RK
1026#define KVM_CAP_S390_GS 140
1027#define KVM_CAP_S390_AIS 141
4898d3f4 1028#define KVM_CAP_SPAPR_TCE_VFIO 142
4d5422ce 1029#define KVM_CAP_X86_DISABLE_EXITS 143
c24a7be2 1030#define KVM_CAP_ARM_USER_IRQ 144
4036e387 1031#define KVM_CAP_S390_CMMA_MIGRATION 145
8a53e7e5
PB
1032#define KVM_CAP_PPC_FWNMI 146
1033#define KVM_CAP_PPC_SMT_POSSIBLE 147
efc479e6 1034#define KVM_CAP_HYPERV_SYNIC2 148
d3457c87 1035#define KVM_CAP_HYPERV_VP_INDEX 149
da9a1446 1036#define KVM_CAP_S390_AIS_MIGRATION 150
3214d01f 1037#define KVM_CAP_PPC_GET_CPU_CHAR 151
35b3fde6 1038#define KVM_CAP_S390_BPB 152
801e459a 1039#define KVM_CAP_GET_MSR_FEATURES 153
faeb7833 1040#define KVM_CAP_HYPERV_EVENTFD 154
c1aea919 1041#define KVM_CAP_HYPERV_TLBFLUSH 155
a4499382 1042#define KVM_CAP_S390_HPAGE_1M 156
8fcc4b59 1043#define KVM_CAP_NESTED_STATE 157
63198930 1044#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
6fbbde9a 1045#define KVM_CAP_MSR_PLATFORM_INFO 159
aa069a99 1046#define KVM_CAP_PPC_NESTED_HV 160
214ff83d 1047#define KVM_CAP_HYPERV_SEND_IPI 161
0804c849 1048#define KVM_CAP_COALESCED_PIO 162
57b119da 1049#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
c4f55198 1050#define KVM_CAP_EXCEPTION_PAYLOAD 164
e42b4a50 1051#define KVM_CAP_ARM_VM_IPA_SIZE 165
d7547c55 1052#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
2bc39970 1053#define KVM_CAP_HYPERV_CPUID 167
d7547c55 1054#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
59c5c58c 1055#define KVM_CAP_PPC_IRQ_XIVE 169
dd53f610
PB
1056#define KVM_CAP_ARM_SVE 170
1057#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1058#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
66bb8a06 1059#define KVM_CAP_PMU_EVENT_FILTER 173
92f35b75 1060#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
344c6c80 1061#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
1a9167a2 1062#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
14edff88
PB
1063#define KVM_CAP_ARM_NISV_TO_USER 177
1064#define KVM_CAP_ARM_INJECT_EXT_DABT 178
7de3f142 1065#define KVM_CAP_S390_VCPU_RESETS 179
13da9ae1 1066#define KVM_CAP_S390_PROTECTED 180
9a5788c6 1067#define KVM_CAP_PPC_SECURE_GUEST 181
acd05785 1068#define KVM_CAP_HALT_POLL 182
72de5fa4 1069#define KVM_CAP_ASYNC_PF_INT 183
1aa561b1 1070#define KVM_CAP_LAST_CPU 184
3edd6839 1071#define KVM_CAP_SMALLER_MAXPHYADDR 185
f3633c26 1072#define KVM_CAP_S390_DIAG318 186
004a0124 1073#define KVM_CAP_STEAL_TIME 187
1ae09954 1074#define KVM_CAP_X86_USER_SPACE_MSR 188
1a155254 1075#define KVM_CAP_X86_MSR_FILTER 189
66570e96 1076#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
c21d54f0 1077#define KVM_CAP_SYS_HYPERV_CPUID 191
fb04a1ed 1078#define KVM_CAP_DIRTY_LOG_RING 192
fe6b6bc8 1079#define KVM_CAP_X86_BUS_LOCK_EXIT 193
d9a47eda 1080#define KVM_CAP_PPC_DAWR1 194
8b13c364 1081#define KVM_CAP_SET_GUEST_DEBUG2 195
399ec807
AK
1082
1083#ifdef KVM_CAP_IRQ_ROUTING
1084
1085struct kvm_irq_routing_irqchip {
1086 __u32 irqchip;
1087 __u32 pin;
1088};
1089
79950e10
SY
1090struct kvm_irq_routing_msi {
1091 __u32 address_lo;
1092 __u32 address_hi;
1093 __u32 data;
76a10b86
EA
1094 union {
1095 __u32 pad;
1096 __u32 devid;
1097 };
79950e10
SY
1098};
1099
84223598
CH
1100struct kvm_irq_routing_s390_adapter {
1101 __u64 ind_addr;
1102 __u64 summary_addr;
1103 __u64 ind_offset;
1104 __u32 summary_offset;
1105 __u32 adapter_id;
1106};
1107
5c919412
AS
1108struct kvm_irq_routing_hv_sint {
1109 __u32 vcpu;
1110 __u32 sint;
1111};
1112
399ec807
AK
1113/* gsi routing entry types */
1114#define KVM_IRQ_ROUTING_IRQCHIP 1
79950e10 1115#define KVM_IRQ_ROUTING_MSI 2
84223598 1116#define KVM_IRQ_ROUTING_S390_ADAPTER 3
5c919412 1117#define KVM_IRQ_ROUTING_HV_SINT 4
399ec807
AK
1118
1119struct kvm_irq_routing_entry {
1120 __u32 gsi;
1121 __u32 type;
1122 __u32 flags;
1123 __u32 pad;
1124 union {
1125 struct kvm_irq_routing_irqchip irqchip;
79950e10 1126 struct kvm_irq_routing_msi msi;
84223598 1127 struct kvm_irq_routing_s390_adapter adapter;
5c919412 1128 struct kvm_irq_routing_hv_sint hv_sint;
399ec807
AK
1129 __u32 pad[8];
1130 } u;
1131};
1132
1133struct kvm_irq_routing {
1134 __u32 nr;
1135 __u32 flags;
1136 struct kvm_irq_routing_entry entries[0];
1137};
1138
52d939a0 1139#endif
85f455f7 1140
890ca9ae
HY
1141#ifdef KVM_CAP_MCE
1142/* x86 MCE */
1143struct kvm_x86_mce {
1144 __u64 status;
1145 __u64 addr;
1146 __u64 misc;
1147 __u64 mcg_status;
1148 __u8 bank;
1149 __u8 pad1[7];
1150 __u64 pad2[3];
1151};
1152#endif
1153
ffde22ac 1154#ifdef KVM_CAP_XEN_HVM
23200b7a
JM
1155#define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0)
1156#define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1)
8d4e7e80 1157#define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2)
30b5c851 1158#define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3)
23200b7a 1159
ffde22ac
ES
1160struct kvm_xen_hvm_config {
1161 __u32 flags;
1162 __u32 msr;
1163 __u64 blob_addr_32;
1164 __u64 blob_addr_64;
1165 __u8 blob_size_32;
1166 __u8 blob_size_64;
1167 __u8 pad2[30];
1168};
1169#endif
1170
721eecbf 1171#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
7a84428a
AW
1172/*
1173 * Available with KVM_CAP_IRQFD_RESAMPLE
1174 *
1175 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1176 * the irqfd to operate in resampling mode for level triggered interrupt
3ecad8c2 1177 * emulation. See Documentation/virt/kvm/api.rst.
7a84428a
AW
1178 */
1179#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
721eecbf
GH
1180
1181struct kvm_irqfd {
1182 __u32 fd;
1183 __u32 gsi;
1184 __u32 flags;
7a84428a
AW
1185 __u32 resamplefd;
1186 __u8 pad[16];
721eecbf
GH
1187};
1188
e3fd9a93
PB
1189/* For KVM_CAP_ADJUST_CLOCK */
1190
1191/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1192#define KVM_CLOCK_TSC_STABLE 2
1193
afbcf7ab
GC
1194struct kvm_clock_data {
1195 __u64 clock;
1196 __u32 flags;
1197 __u32 pad[9];
1198};
1199
e3fd9a93
PB
1200/* For KVM_CAP_SW_TLB */
1201
dc83b8bc
SW
1202#define KVM_MMU_FSL_BOOKE_NOHV 0
1203#define KVM_MMU_FSL_BOOKE_HV 1
1204
1205struct kvm_config_tlb {
1206 __u64 params;
1207 __u64 array;
1208 __u32 mmu_type;
1209 __u32 array_len;
1210};
1211
1212struct kvm_dirty_tlb {
1213 __u64 bitmap;
1214 __u32 num_dirty;
1215};
1216
e24ed81f
AG
1217/* Available with KVM_CAP_ONE_REG */
1218
1219#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1220#define KVM_REG_GENERIC 0x0000000000000000ULL
1221
1222/*
1223 * Architecture specific registers are to be defined in arch headers and
1224 * ORed with the arch identifier.
1225 */
1226#define KVM_REG_PPC 0x1000000000000000ULL
1227#define KVM_REG_X86 0x2000000000000000ULL
1228#define KVM_REG_IA64 0x3000000000000000ULL
1229#define KVM_REG_ARM 0x4000000000000000ULL
1230#define KVM_REG_S390 0x5000000000000000ULL
7c8c5e6a 1231#define KVM_REG_ARM64 0x6000000000000000ULL
2a8fedd0 1232#define KVM_REG_MIPS 0x7000000000000000ULL
dee04eee 1233#define KVM_REG_RISCV 0x8000000000000000ULL
e24ed81f
AG
1234
1235#define KVM_REG_SIZE_SHIFT 52
1236#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1237#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1238#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1239#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1240#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1241#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1242#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1243#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1244#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
2b953ea3 1245#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
e24ed81f 1246
749cf76c
CD
1247struct kvm_reg_list {
1248 __u64 n; /* number of regs */
1249 __u64 reg[0];
1250};
1251
e24ed81f
AG
1252struct kvm_one_reg {
1253 __u64 id;
1254 __u64 addr;
1255};
1256
2b8ddd93 1257#define KVM_MSI_VALID_DEVID (1U << 0)
07975ad3
JK
1258struct kvm_msi {
1259 __u32 address_lo;
1260 __u32 address_hi;
1261 __u32 data;
1262 __u32 flags;
2b8ddd93
AP
1263 __u32 devid;
1264 __u8 pad[12];
07975ad3
JK
1265};
1266
3401d546
CD
1267struct kvm_arm_device_addr {
1268 __u64 id;
1269 __u64 addr;
1270};
1271
852b6d57
SW
1272/*
1273 * Device control API, available with KVM_CAP_DEVICE_CTRL
1274 */
1275#define KVM_CREATE_DEVICE_TEST 1
1276
1277struct kvm_create_device {
1278 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1279 __u32 fd; /* out: device handle */
1280 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1281};
1282
1283struct kvm_device_attr {
1284 __u32 flags; /* no flags currently defined */
1285 __u32 group; /* device-defined */
1286 __u64 attr; /* group-defined */
1287 __u64 addr; /* userspace address of attr data */
1288};
1289
ec53500f
AW
1290#define KVM_DEV_VFIO_GROUP 1
1291#define KVM_DEV_VFIO_GROUP_ADD 1
1292#define KVM_DEV_VFIO_GROUP_DEL 2
121f80ba 1293#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
d60eacb0
WD
1294
1295enum kvm_device_type {
1296 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1297#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1298 KVM_DEV_TYPE_FSL_MPIC_42,
1299#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1300 KVM_DEV_TYPE_XICS,
1301#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1302 KVM_DEV_TYPE_VFIO,
1303#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1304 KVM_DEV_TYPE_ARM_VGIC_V2,
1305#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1306 KVM_DEV_TYPE_FLIC,
1307#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
a0675c25
AP
1308 KVM_DEV_TYPE_ARM_VGIC_V3,
1309#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
1085fdc6
AP
1310 KVM_DEV_TYPE_ARM_VGIC_ITS,
1311#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
90c73795
CLG
1312 KVM_DEV_TYPE_XIVE,
1313#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
58772e9a
SP
1314 KVM_DEV_TYPE_ARM_PV_TIME,
1315#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
d60eacb0
WD
1316 KVM_DEV_TYPE_MAX,
1317};
5df554ad 1318
121f80ba
AK
1319struct kvm_vfio_spapr_tce {
1320 __s32 groupfd;
1321 __s32 tablefd;
1322};
1323
f17abe9a
AK
1324/*
1325 * ioctls for VM fds
1326 */
c54d2aba 1327#define KVM_SET_MEMORY_REGION _IOW(KVMIO, 0x40, struct kvm_memory_region)
bccf2150
AK
1328/*
1329 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1330 * a vcpu fd.
1331 */
c54d2aba
JK
1332#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1333#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
a1f4d395 1334/* KVM_SET_MEMORY_ALIAS is obsolete: */
c54d2aba
JK
1335#define KVM_SET_MEMORY_ALIAS _IOW(KVMIO, 0x43, struct kvm_memory_alias)
1336#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
1337#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45)
1338#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
6a4a9839 1339 struct kvm_userspace_memory_region)
c54d2aba
JK
1340#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1341#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
27e0393f
CO
1342
1343/* enable ucontrol for s390 */
1344struct kvm_s390_ucas_mapping {
1345 __u64 user_addr;
1346 __u64 vcpu_addr;
1347 __u64 length;
1348};
1349#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1350#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
ccc7910f 1351#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
27e0393f 1352
85f455f7 1353/* Device model IOC */
c54d2aba
JK
1354#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1355#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1356#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1357#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1358#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1359#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1360#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1361#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
5f94c174
LV
1362#define KVM_REGISTER_COALESCED_MMIO \
1363 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1364#define KVM_UNREGISTER_COALESCED_MMIO \
1365 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
c54d2aba
JK
1366#define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \
1367 struct kvm_assigned_pci_dev)
1368#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
e56d532f 1369/* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */
c54d2aba
JK
1370#define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70
1371#define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq)
1372#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
1373#define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \
1374 struct kvm_assigned_pci_dev)
1375#define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \
1376 struct kvm_assigned_msix_nr)
1377#define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \
1378 struct kvm_assigned_msix_entry)
1379#define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq)
1380#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1381#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1382#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1383#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1384#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1385#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1386#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1387/* Available with KVM_CAP_PIT_STATE2 */
1388#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1389#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
15711e9c
AG
1390/* Available with KVM_CAP_PPC_GET_PVINFO */
1391#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
92a1f12d
JR
1392/* Available with KVM_CAP_TSC_CONTROL */
1393#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1394#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
07700a94
JK
1395/* Available with KVM_CAP_PCI_2_3 */
1396#define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \
1397 struct kvm_assigned_pci_dev)
07975ad3
JK
1398/* Available with KVM_CAP_SIGNAL_MSI */
1399#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
5b74716e
BH
1400/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1401#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
32fad281
PM
1402/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1403#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
ed7a8d7a 1404#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
58ded420
AK
1405#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1406 struct kvm_create_spapr_tce_64)
ed7a8d7a
PM
1407/* Available with KVM_CAP_RMA */
1408#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
a2932923
PM
1409/* Available with KVM_CAP_PPC_HTAB_FD */
1410#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
3401d546
CD
1411/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1412#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
8e591cb7
ME
1413/* Available with KVM_CAP_PPC_RTAS */
1414#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
ef1ead0c
DG
1415/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1416#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1417#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
c9270132
PM
1418/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1419#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1420/* Available with KVM_CAP_PPC_RADIX_MMU */
1421#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
3214d01f
PM
1422/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1423#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
66bb8a06
EH
1424/* Available with KVM_CAP_PMU_EVENT_FILTER */
1425#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
22945688 1426#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
bccf2150 1427
852b6d57
SW
1428/* ioctl for vm fd */
1429#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1430
1431/* ioctls for fds returned by KVM_CREATE_DEVICE */
1432#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1433#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1434#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
1435
bccf2150
AK
1436/*
1437 * ioctls for vcpu fds
1438 */
739872c5
AK
1439#define KVM_RUN _IO(KVMIO, 0x80)
1440#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1441#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1442#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1443#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1444#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1445#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
d0bfb940 1446/* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */
c54d2aba 1447#define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87
739872c5
AK
1448#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1449#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1450#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1961d276 1451#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
b8836737
AK
1452#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1453#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
96ad2cc6
ED
1454#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1455#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
07716717
DK
1456#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1457#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
b209749f 1458/* Available with KVM_CAP_VAPIC */
c54d2aba 1459#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
b93463aa
AK
1460/* Available with KVM_CAP_VAPIC */
1461#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
ba5c1e9b
CO
1462/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1463#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
b0c632db
HC
1464/* store status for s390 */
1465#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1466#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1467#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1468/* initial ipl psw for s390 */
1469#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1470/* initial reset for s390 */
c54d2aba 1471#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
62d9f0db
MT
1472#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1473#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
44b5ce73 1474/* Available with KVM_CAP_USER_NMI */
c54d2aba 1475#define KVM_NMI _IO(KVMIO, 0x9a)
d0bfb940
JK
1476/* Available with KVM_CAP_SET_GUEST_DEBUG */
1477#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
890ca9ae
HY
1478/* MCE for x86 */
1479#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1480#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1481#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
3cfc3092
JK
1482/* Available with KVM_CAP_VCPU_EVENTS */
1483#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1484#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
a1efbe77
JK
1485/* Available with KVM_CAP_DEBUGREGS */
1486#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1487#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
d938dc55
CH
1488/*
1489 * vcpu version available with KVM_ENABLE_CAP
1490 * vm version available with KVM_CAP_ENABLE_CAP_VM
1491 */
71fbfd5f 1492#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
2d5b5a66
SY
1493/* Available with KVM_CAP_XSAVE */
1494#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1495#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1496/* Available with KVM_CAP_XCRS */
1497#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1498#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
dc83b8bc
SW
1499/* Available with KVM_CAP_SW_TLB */
1500#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
e24ed81f
AG
1501/* Available with KVM_CAP_ONE_REG */
1502#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
1503#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
1c0b28c2
EM
1504/* VM is being stopped by host */
1505#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
749cf76c 1506#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
42c4e0c7 1507#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
749cf76c 1508#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
41408c28
TH
1509/* Available with KVM_CAP_S390_MEM_OP */
1510#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
30ee2a98
JH
1511/* Available with KVM_CAP_S390_SKEYS */
1512#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1513#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
47b43c52
JF
1514/* Available with KVM_CAP_S390_INJECT_IRQ */
1515#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
816c7667
JF
1516/* Available with KVM_CAP_S390_IRQ_STATE */
1517#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1518#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
f077825a
PB
1519/* Available with KVM_CAP_X86_SMM */
1520#define KVM_SMI _IO(KVMIO, 0xb7)
4036e387 1521/* Available with KVM_CAP_S390_CMMA_MIGRATION */
949c0336 1522#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
4036e387 1523#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
5acc5c06
BS
1524/* Memory Encryption Commands */
1525#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
d98e6346 1526
69eaedee
BS
1527struct kvm_enc_region {
1528 __u64 addr;
1529 __u64 size;
1530};
1531
1532#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1533#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1534
faeb7833
RK
1535/* Available with KVM_CAP_HYPERV_EVENTFD */
1536#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1537
8fcc4b59
JM
1538/* Available with KVM_CAP_NESTED_STATE */
1539#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1540#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
faeb7833 1541
d7547c55 1542/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
2a31b9db
PB
1543#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1544
c21d54f0 1545/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
2bc39970
VK
1546#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1547
7dd32a0d
DM
1548/* Available with KVM_CAP_ARM_SVE */
1549#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1550
7de3f142
JF
1551/* Available with KVM_CAP_S390_VCPU_RESETS */
1552#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1553#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1554
29b40f10
JF
1555struct kvm_s390_pv_sec_parm {
1556 __u64 origin;
1557 __u64 length;
1558};
1559
1560struct kvm_s390_pv_unp {
1561 __u64 addr;
1562 __u64 size;
1563 __u64 tweak;
1564};
1565
1566enum pv_cmd_id {
1567 KVM_PV_ENABLE,
1568 KVM_PV_DISABLE,
1569 KVM_PV_SET_SEC_PARMS,
1570 KVM_PV_UNPACK,
1571 KVM_PV_VERIFY,
e0d2773d
JF
1572 KVM_PV_PREP_RESET,
1573 KVM_PV_UNSHARE_ALL,
29b40f10
JF
1574};
1575
1576struct kvm_pv_cmd {
1577 __u32 cmd; /* Command to be executed */
1578 __u16 rc; /* Ultravisor return code */
1579 __u16 rrc; /* Ultravisor return reason code */
1580 __u64 data; /* Data or address */
1581 __u32 flags; /* flags for future extensions. Must be 0 for now */
1582 __u32 reserved[3];
1583};
1584
1585/* Available with KVM_CAP_S390_PROTECTED */
1586#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1587
1a155254
AG
1588/* Available with KVM_CAP_X86_MSR_FILTER */
1589#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1590
fb04a1ed
PX
1591/* Available with KVM_CAP_DIRTY_LOG_RING */
1592#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1593
3e324615 1594/* Per-VM Xen attributes */
a76b9641
JM
1595#define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr)
1596#define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr)
1597
1598struct kvm_xen_hvm_attr {
1599 __u16 type;
1600 __u16 pad[3];
1601 union {
a3833b81 1602 __u8 long_mode;
40da8ccd 1603 __u8 vector;
13ffb97a
JM
1604 struct {
1605 __u64 gfn;
1606 } shared_info;
a76b9641
JM
1607 __u64 pad[8];
1608 } u;
1609};
1610
8d4e7e80 1611/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
a3833b81 1612#define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0
13ffb97a 1613#define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1
40da8ccd 1614#define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2
a3833b81 1615
3e324615
DW
1616/* Per-vCPU Xen attributes */
1617#define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr)
1618#define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr)
1619
1620struct kvm_xen_vcpu_attr {
1621 __u16 type;
1622 __u16 pad[3];
1623 union {
73e69a86 1624 __u64 gpa;
3e324615 1625 __u64 pad[8];
30b5c851
DW
1626 struct {
1627 __u64 state;
1628 __u64 state_entry_time;
1629 __u64 time_running;
1630 __u64 time_runnable;
1631 __u64 time_blocked;
1632 __u64 time_offline;
1633 } runstate;
3e324615
DW
1634 } u;
1635};
1636
8d4e7e80 1637/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
73e69a86 1638#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0
f2340cd9 1639#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1
30b5c851
DW
1640#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2
1641#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3
1642#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4
1643#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5
73e69a86 1644
dc48bae0
BS
1645/* Secure Encrypted Virtualization command */
1646enum sev_cmd_id {
1647 /* Guest initialization commands */
1648 KVM_SEV_INIT = 0,
1649 KVM_SEV_ES_INIT,
1650 /* Guest launch commands */
1651 KVM_SEV_LAUNCH_START,
1652 KVM_SEV_LAUNCH_UPDATE_DATA,
1653 KVM_SEV_LAUNCH_UPDATE_VMSA,
1654 KVM_SEV_LAUNCH_SECRET,
1655 KVM_SEV_LAUNCH_MEASURE,
1656 KVM_SEV_LAUNCH_FINISH,
1657 /* Guest migration commands (outgoing) */
1658 KVM_SEV_SEND_START,
1659 KVM_SEV_SEND_UPDATE_DATA,
1660 KVM_SEV_SEND_UPDATE_VMSA,
1661 KVM_SEV_SEND_FINISH,
1662 /* Guest migration commands (incoming) */
1663 KVM_SEV_RECEIVE_START,
1664 KVM_SEV_RECEIVE_UPDATE_DATA,
1665 KVM_SEV_RECEIVE_UPDATE_VMSA,
1666 KVM_SEV_RECEIVE_FINISH,
1667 /* Guest status and debug commands */
1668 KVM_SEV_GUEST_STATUS,
1669 KVM_SEV_DBG_DECRYPT,
1670 KVM_SEV_DBG_ENCRYPT,
1671 /* Guest certificates commands */
1672 KVM_SEV_CERT_EXPORT,
2c07ded0
BS
1673 /* Attestation report */
1674 KVM_SEV_GET_ATTESTATION_REPORT,
dc48bae0
BS
1675
1676 KVM_SEV_NR_MAX,
1677};
1678
1679struct kvm_sev_cmd {
1680 __u32 id;
1681 __u64 data;
1682 __u32 error;
1683 __u32 sev_fd;
1684};
1685
1686struct kvm_sev_launch_start {
1687 __u32 handle;
1688 __u32 policy;
1689 __u64 dh_uaddr;
1690 __u32 dh_len;
1691 __u64 session_uaddr;
1692 __u32 session_len;
1693};
1694
1695struct kvm_sev_launch_update_data {
1696 __u64 uaddr;
1697 __u32 len;
1698};
1699
1700
1701struct kvm_sev_launch_secret {
1702 __u64 hdr_uaddr;
1703 __u32 hdr_len;
1704 __u64 guest_uaddr;
1705 __u32 guest_len;
1706 __u64 trans_uaddr;
1707 __u32 trans_len;
1708};
1709
1710struct kvm_sev_launch_measure {
1711 __u64 uaddr;
1712 __u32 len;
1713};
1714
1715struct kvm_sev_guest_status {
1716 __u32 handle;
1717 __u32 policy;
1718 __u32 state;
1719};
1720
1721struct kvm_sev_dbg {
1722 __u64 src_uaddr;
1723 __u64 dst_uaddr;
1724 __u32 len;
1725};
d98e6346 1726
2c07ded0
BS
1727struct kvm_sev_attestation_report {
1728 __u8 mnonce[16];
1729 __u64 uaddr;
1730 __u32 len;
1731};
1732
e56d532f 1733#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
07700a94
JK
1734#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
1735#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
e56d532f 1736
4d5c5d0f
BAY
1737struct kvm_assigned_pci_dev {
1738 __u32 assigned_dev_id;
1739 __u32 busnr;
1740 __u32 devfn;
1741 __u32 flags;
ab9f4ecb 1742 __u32 segnr;
bb45e202 1743 union {
ab9f4ecb 1744 __u32 reserved[11];
bb45e202 1745 };
4d5c5d0f
BAY
1746};
1747
e56d532f
SY
1748#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
1749#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
1750#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
1751
1752#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
1753#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
1754#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
1755
1756#define KVM_DEV_IRQ_HOST_MASK 0x00ff
1757#define KVM_DEV_IRQ_GUEST_MASK 0xff00
1758
4d5c5d0f
BAY
1759struct kvm_assigned_irq {
1760 __u32 assigned_dev_id;
91e3d71d 1761 __u32 host_irq; /* ignored (legacy field) */
4d5c5d0f
BAY
1762 __u32 guest_irq;
1763 __u32 flags;
bb45e202
AK
1764 union {
1765 __u32 reserved[12];
1766 };
4d5c5d0f
BAY
1767};
1768
c1e01514
SY
1769struct kvm_assigned_msix_nr {
1770 __u32 assigned_dev_id;
1771 __u16 entry_nr;
1772 __u16 padding;
1773};
1774
e7333391 1775#define KVM_MAX_MSIX_PER_DEV 256
c1e01514
SY
1776struct kvm_assigned_msix_entry {
1777 __u32 assigned_dev_id;
1778 __u32 gsi;
1779 __u16 entry; /* The index of entry in the MSI-X table */
1780 __u16 padding[3];
1781};
1782
37131313 1783#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
c519265f 1784#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
37131313 1785
3fe17e68
AG
1786/* Available with KVM_CAP_ARM_USER_IRQ */
1787
1788/* Bits for run->s.regs.device_irq_level */
1789#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
1790#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
1791#define KVM_ARM_DEV_PMU (1 << 2)
1792
faeb7833
RK
1793struct kvm_hyperv_eventfd {
1794 __u32 conn_id;
1795 __s32 fd;
1796 __u32 flags;
1797 __u32 padding[3];
1798};
1799
1800#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
1801#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
1802
3c9bd400
JZ
1803#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
1804#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
1805
fb04a1ed
PX
1806/*
1807 * Arch needs to define the macro after implementing the dirty ring
1808 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
1809 * starting page offset of the dirty ring structures.
1810 */
1811#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
1812#define KVM_DIRTY_LOG_PAGE_OFFSET 0
1813#endif
1814
1815/*
1816 * KVM dirty GFN flags, defined as:
1817 *
1818 * |---------------+---------------+--------------|
1819 * | bit 1 (reset) | bit 0 (dirty) | Status |
1820 * |---------------+---------------+--------------|
1821 * | 0 | 0 | Invalid GFN |
1822 * | 0 | 1 | Dirty GFN |
1823 * | 1 | X | GFN to reset |
1824 * |---------------+---------------+--------------|
1825 *
1826 * Lifecycle of a dirty GFN goes like:
1827 *
1828 * dirtied harvested reset
1829 * 00 -----------> 01 -------------> 1X -------+
1830 * ^ |
1831 * | |
1832 * +------------------------------------------+
1833 *
1834 * The userspace program is only responsible for the 01->1X state
1835 * conversion after harvesting an entry. Also, it must not skip any
1836 * dirty bits, so that dirty bits are always harvested in sequence.
1837 */
1838#define KVM_DIRTY_GFN_F_DIRTY BIT(0)
1839#define KVM_DIRTY_GFN_F_RESET BIT(1)
1840#define KVM_DIRTY_GFN_F_MASK 0x3
1841
1842/*
1843 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
1844 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
1845 * size of the gfn buffer is decided by the first argument when
1846 * enabling KVM_CAP_DIRTY_LOG_RING.
1847 */
1848struct kvm_dirty_gfn {
1849 __u32 flags;
1850 __u32 slot;
1851 __u64 offset;
1852};
1853
fe6b6bc8
CQ
1854#define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
1855#define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1)
1856
c54d2aba 1857#endif /* __LINUX_KVM_H */