]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - include/uapi/linux/kvm.h
KVM: x86/xen: Fix __user pointer handling for hypercall page installation
[thirdparty/kernel/stable.git] / include / uapi / linux / kvm.h
CommitLineData
6f52b16c 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
6aa8b732
AK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
dea8caee 8 * Note: you must update KVM_API_VERSION if you change this interface.
6aa8b732
AK
9 */
10
00bfddaf 11#include <linux/types.h>
97646202 12#include <linux/compiler.h>
6aa8b732 13#include <linux/ioctl.h>
f6a40e3b 14#include <asm/kvm.h>
6aa8b732 15
2ff81f70 16#define KVM_API_VERSION 12
0b76e20b 17
c54d2aba
JK
18/* *** Deprecated interfaces *** */
19
20#define KVM_TRC_SHIFT 16
21
22#define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT)
23#define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1))
24
25#define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01)
26#define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02)
27#define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01)
28
29#define KVM_TRC_HEAD_SIZE 12
30#define KVM_TRC_CYCLE_SIZE 8
31#define KVM_TRC_EXTRA_MAX 7
32
33#define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02)
34#define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03)
35#define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04)
36#define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05)
37#define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06)
38#define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07)
39#define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08)
40#define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09)
41#define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A)
42#define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B)
43#define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C)
44#define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D)
45#define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E)
46#define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F)
47#define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10)
48#define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11)
49#define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12)
50#define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13)
51#define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14)
52#define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15)
53#define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16)
54#define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17)
55#define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18)
56#define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19)
57
2714d1d3 58struct kvm_user_trace_setup {
c54d2aba
JK
59 __u32 buf_size;
60 __u32 buf_nr;
61};
62
63#define __KVM_DEPRECATED_MAIN_W_0x06 \
64 _IOW(KVMIO, 0x06, struct kvm_user_trace_setup)
65#define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07)
66#define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08)
67
68#define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq)
69
70struct kvm_breakpoint {
71 __u32 enabled;
72 __u32 padding;
73 __u64 address;
74};
75
76struct kvm_debug_guest {
77 __u32 enabled;
78 __u32 pad;
79 struct kvm_breakpoint breakpoints[4];
80 __u32 singlestep;
2714d1d3
FEL
81};
82
c54d2aba
JK
83#define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest)
84
85/* *** End of deprecated interfaces *** */
86
87
6aa8b732
AK
88/* for KVM_CREATE_MEMORY_REGION */
89struct kvm_memory_region {
90 __u32 slot;
91 __u32 flags;
92 __u64 guest_phys_addr;
93 __u64 memory_size; /* bytes */
94};
95
6fc138d2
IE
96/* for KVM_SET_USER_MEMORY_REGION */
97struct kvm_userspace_memory_region {
98 __u32 slot;
99 __u32 flags;
100 __u64 guest_phys_addr;
101 __u64 memory_size; /* bytes */
102 __u64 userspace_addr; /* start of the userspace allocated memory */
103};
104
67b29204
XG
105/*
106 * The bit 0 ~ bit 15 of kvm_memory_region::flags are visible for userspace,
107 * other bits are reserved for kvm internal use which are defined in
108 * include/linux/kvm_host.h.
109 */
4d8b81ab
XG
110#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
111#define KVM_MEM_READONLY (1UL << 1)
6aa8b732 112
97222cc8 113/* for KVM_IRQ_LINE */
85f455f7
ED
114struct kvm_irq_level {
115 /*
116 * ACPI gsi notion of irq.
117 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
118 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
3ecad8c2 119 * For ARM: See Documentation/virt/kvm/api.rst
85f455f7 120 */
4925663a
GN
121 union {
122 __u32 irq;
123 __s32 status;
124 };
85f455f7
ED
125 __u32 level;
126};
127
6ceb9d79
HQ
128
129struct kvm_irqchip {
130 __u32 chip_id;
131 __u32 pad;
132 union {
133 char dummy[512]; /* reserving space */
7a0eb196 134#ifdef __KVM_HAVE_PIT
6ceb9d79 135 struct kvm_pic_state pic;
ec10f475 136#endif
7a0eb196 137#ifdef __KVM_HAVE_IOAPIC
6bf9e962 138 struct kvm_ioapic_state ioapic;
51e29625 139#endif
6ceb9d79
HQ
140 } chip;
141};
142
c5ff41ce
JK
143/* for KVM_CREATE_PIT2 */
144struct kvm_pit_config {
145 __u32 flags;
146 __u32 pad[15];
147};
148
149#define KVM_PIT_SPEAKER_DUMMY 1
150
30ee2a98
JH
151struct kvm_s390_skeys {
152 __u64 start_gfn;
153 __u64 count;
154 __u64 skeydata_addr;
155 __u32 flags;
156 __u32 reserved[9];
157};
db397571 158
4036e387
CI
159#define KVM_S390_CMMA_PEEK (1 << 0)
160
161/**
162 * kvm_s390_cmma_log - Used for CMMA migration.
163 *
164 * Used both for input and output.
165 *
166 * @start_gfn: Guest page number to start from.
167 * @count: Size of the result buffer.
168 * @flags: Control operation mode via KVM_S390_CMMA_* flags
169 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
170 * pages are still remaining.
171 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
172 * in the PGSTE.
173 * @values: Pointer to the values buffer.
174 *
175 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
176 */
177struct kvm_s390_cmma_log {
178 __u64 start_gfn;
179 __u32 count;
180 __u32 flags;
181 union {
182 __u64 remaining;
183 __u64 mask;
184 };
185 __u64 values;
186};
187
db397571
AS
188struct kvm_hyperv_exit {
189#define KVM_EXIT_HYPERV_SYNIC 1
83326e43 190#define KVM_EXIT_HYPERV_HCALL 2
f97f5a56 191#define KVM_EXIT_HYPERV_SYNDBG 3
db397571 192 __u32 type;
f7d31e65 193 __u32 pad1;
db397571
AS
194 union {
195 struct {
196 __u32 msr;
f7d31e65 197 __u32 pad2;
db397571
AS
198 __u64 control;
199 __u64 evt_page;
200 __u64 msg_page;
201 } synic;
83326e43
AS
202 struct {
203 __u64 input;
204 __u64 result;
205 __u64 params[2];
206 } hcall;
f97f5a56
JD
207 struct {
208 __u32 msr;
209 __u32 pad2;
210 __u64 control;
211 __u64 status;
212 __u64 send_page;
213 __u64 recv_page;
214 __u64 pending_page;
215 } syndbg;
db397571
AS
216 } u;
217};
218
30ee2a98
JH
219#define KVM_S390_GET_SKEYS_NONE 1
220#define KVM_S390_SKEYS_MAX 1048576
221
8a45450d
AK
222#define KVM_EXIT_UNKNOWN 0
223#define KVM_EXIT_EXCEPTION 1
224#define KVM_EXIT_IO 2
225#define KVM_EXIT_HYPERCALL 3
226#define KVM_EXIT_DEBUG 4
227#define KVM_EXIT_HLT 5
228#define KVM_EXIT_MMIO 6
229#define KVM_EXIT_IRQ_WINDOW_OPEN 7
230#define KVM_EXIT_SHUTDOWN 8
231#define KVM_EXIT_FAIL_ENTRY 9
232#define KVM_EXIT_INTR 10
233#define KVM_EXIT_SET_TPR 11
b209749f 234#define KVM_EXIT_TPR_ACCESS 12
8f2abe6a 235#define KVM_EXIT_S390_SIEIC 13
e28acfea 236#define KVM_EXIT_S390_RESET 14
ce91ddc4 237#define KVM_EXIT_DCR 15 /* deprecated */
c4abb7c9 238#define KVM_EXIT_NMI 16
3f5d18a9 239#define KVM_EXIT_INTERNAL_ERROR 17
ad0a048b 240#define KVM_EXIT_OSI 18
de56a948 241#define KVM_EXIT_PAPR_HCALL 19
e168bf8d 242#define KVM_EXIT_S390_UCONTROL 20
f61c94bb 243#define KVM_EXIT_WATCHDOG 21
fa6b7fe9 244#define KVM_EXIT_S390_TSCH 22
1c810636 245#define KVM_EXIT_EPR 23
8ad6b634 246#define KVM_EXIT_SYSTEM_EVENT 24
e44fc8c9 247#define KVM_EXIT_S390_STSI 25
7543a635 248#define KVM_EXIT_IOAPIC_EOI 26
db397571 249#define KVM_EXIT_HYPERV 27
c726200d 250#define KVM_EXIT_ARM_NISV 28
1ae09954
AG
251#define KVM_EXIT_X86_RDMSR 29
252#define KVM_EXIT_X86_WRMSR 30
fb04a1ed 253#define KVM_EXIT_DIRTY_RING_FULL 31
647daca2 254#define KVM_EXIT_AP_RESET_HOLD 32
fe6b6bc8 255#define KVM_EXIT_X86_BUS_LOCK 33
3f5d18a9
AK
256
257/* For KVM_EXIT_INTERNAL_ERROR */
b9bf6882
XG
258/* Emulate instruction failed. */
259#define KVM_INTERNAL_ERROR_EMULATION 1
260/* Encounter unexpected simultaneous exceptions. */
261#define KVM_INTERNAL_ERROR_SIMUL_EX 2
262/* Encounter unexpected vm-exit due to delivery event. */
263#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
7396d337
LA
264/* Encounter unexpected vm-exit reason */
265#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
6aa8b732 266
9a2bb7f4 267/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
6aa8b732
AK
268struct kvm_run {
269 /* in */
c1150d8c 270 __u8 request_interrupt_window;
460df4c1
PB
271 __u8 immediate_exit;
272 __u8 padding1[6];
6aa8b732
AK
273
274 /* out */
6aa8b732 275 __u32 exit_reason;
c1150d8c
DL
276 __u8 ready_for_interrupt_injection;
277 __u8 if_flag;
f077825a 278 __u16 flags;
54810342
DL
279
280 /* in (pre_kvm_run), out (post_kvm_run) */
c1150d8c
DL
281 __u64 cr8;
282 __u64 apic_base;
283
d7b0b5eb
CO
284#ifdef __KVM_S390
285 /* the processor status word for s390 */
286 __u64 psw_mask; /* psw upper half */
287 __u64 psw_addr; /* psw lower half */
288#endif
6aa8b732
AK
289 union {
290 /* KVM_EXIT_UNKNOWN */
291 struct {
8eb7d334 292 __u64 hardware_exit_reason;
6aa8b732 293 } hw;
8eb7d334
AK
294 /* KVM_EXIT_FAIL_ENTRY */
295 struct {
296 __u64 hardware_entry_failure_reason;
1aa561b1 297 __u32 cpu;
8eb7d334 298 } fail_entry;
6aa8b732
AK
299 /* KVM_EXIT_EXCEPTION */
300 struct {
301 __u32 exception;
302 __u32 error_code;
303 } ex;
304 /* KVM_EXIT_IO */
2f8b9ee1 305 struct {
6aa8b732
AK
306#define KVM_EXIT_IO_IN 0
307#define KVM_EXIT_IO_OUT 1
308 __u8 direction;
309 __u8 size; /* bytes */
6aa8b732 310 __u16 port;
039576c0
AK
311 __u32 count;
312 __u64 data_offset; /* relative to kvm_run start */
6aa8b732 313 } io;
8ab30c15 314 /* KVM_EXIT_DEBUG */
6aa8b732 315 struct {
d0bfb940 316 struct kvm_debug_exit_arch arch;
6aa8b732
AK
317 } debug;
318 /* KVM_EXIT_MMIO */
319 struct {
320 __u64 phys_addr;
321 __u8 data[8];
322 __u32 len;
323 __u8 is_write;
324 } mmio;
b4e63f56
AK
325 /* KVM_EXIT_HYPERCALL */
326 struct {
519ef353 327 __u64 nr;
b4e63f56
AK
328 __u64 args[6];
329 __u64 ret;
330 __u32 longmode;
331 __u32 pad;
332 } hypercall;
b209749f
AK
333 /* KVM_EXIT_TPR_ACCESS */
334 struct {
335 __u64 rip;
336 __u32 is_write;
337 __u32 pad;
338 } tpr_access;
8f2abe6a
CB
339 /* KVM_EXIT_S390_SIEIC */
340 struct {
341 __u8 icptcode;
8f2abe6a
CB
342 __u16 ipa;
343 __u32 ipb;
344 } s390_sieic;
e28acfea
CB
345 /* KVM_EXIT_S390_RESET */
346#define KVM_S390_RESET_POR 1
347#define KVM_S390_RESET_CLEAR 2
348#define KVM_S390_RESET_SUBSYSTEM 4
349#define KVM_S390_RESET_CPU_INIT 8
350#define KVM_S390_RESET_IPL 16
351 __u64 s390_reset_flags;
e168bf8d
CO
352 /* KVM_EXIT_S390_UCONTROL */
353 struct {
354 __u64 trans_exc_code;
355 __u32 pgm_code;
356 } s390_ucontrol;
ce91ddc4 357 /* KVM_EXIT_DCR (deprecated) */
b2312f05
HB
358 struct {
359 __u32 dcrn;
360 __u32 data;
361 __u8 is_write;
362 } dcr;
8ab30c15 363 /* KVM_EXIT_INTERNAL_ERROR */
3f5d18a9
AK
364 struct {
365 __u32 suberror;
a9c7399d
AK
366 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
367 __u32 ndata;
368 __u64 data[16];
3f5d18a9 369 } internal;
ad0a048b
AG
370 /* KVM_EXIT_OSI */
371 struct {
372 __u64 gprs[32];
373 } osi;
8ab30c15 374 /* KVM_EXIT_PAPR_HCALL */
de56a948
PM
375 struct {
376 __u64 nr;
377 __u64 ret;
378 __u64 args[9];
379 } papr_hcall;
fa6b7fe9
CH
380 /* KVM_EXIT_S390_TSCH */
381 struct {
382 __u16 subchannel_id;
383 __u16 subchannel_nr;
384 __u32 io_int_parm;
385 __u32 io_int_word;
386 __u32 ipb;
387 __u8 dequeued;
388 } s390_tsch;
1c810636
AG
389 /* KVM_EXIT_EPR */
390 struct {
391 __u32 epr;
392 } epr;
8ad6b634
AP
393 /* KVM_EXIT_SYSTEM_EVENT */
394 struct {
395#define KVM_SYSTEM_EVENT_SHUTDOWN 1
396#define KVM_SYSTEM_EVENT_RESET 2
2ce79189 397#define KVM_SYSTEM_EVENT_CRASH 3
8ad6b634
AP
398 __u32 type;
399 __u64 flags;
400 } system_event;
e44fc8c9
ET
401 /* KVM_EXIT_S390_STSI */
402 struct {
403 __u64 addr;
404 __u8 ar;
405 __u8 reserved;
406 __u8 fc;
407 __u8 sel1;
408 __u16 sel2;
409 } s390_stsi;
7543a635
SR
410 /* KVM_EXIT_IOAPIC_EOI */
411 struct {
412 __u8 vector;
413 } eoi;
db397571
AS
414 /* KVM_EXIT_HYPERV */
415 struct kvm_hyperv_exit hyperv;
c726200d
CD
416 /* KVM_EXIT_ARM_NISV */
417 struct {
418 __u64 esr_iss;
419 __u64 fault_ipa;
420 } arm_nisv;
1ae09954
AG
421 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
422 struct {
423 __u8 error; /* user -> kernel */
424 __u8 pad[7];
425#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
426#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
1a155254 427#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
1ae09954
AG
428 __u32 reason; /* kernel -> user */
429 __u32 index; /* kernel -> user */
430 __u64 data; /* kernel <-> user */
431 } msr;
24cbc7e9
AK
432 /* Fix the size of the union. */
433 char padding[256];
6aa8b732 434 };
b9e5dc8d 435
7b7e3952
KH
436 /* 2048 is the size of the char array used to bound/pad the size
437 * of the union that holds sync regs.
438 */
439 #define SYNC_REGS_SIZE_BYTES 2048
b9e5dc8d
CB
440 /*
441 * shared registers between kvm and userspace.
442 * kvm_valid_regs specifies the register classes set by the host
443 * kvm_dirty_regs specified the register classes dirtied by userspace
444 * struct kvm_sync_regs is architecture specific, as well as the
445 * bits for kvm_valid_regs and kvm_dirty_regs
446 */
447 __u64 kvm_valid_regs;
448 __u64 kvm_dirty_regs;
449 union {
450 struct kvm_sync_regs regs;
7b7e3952 451 char padding[SYNC_REGS_SIZE_BYTES];
b9e5dc8d 452 } s;
6aa8b732
AK
453};
454
5f94c174
LV
455/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
456
457struct kvm_coalesced_mmio_zone {
458 __u64 addr;
459 __u32 size;
0804c849
PH
460 union {
461 __u32 pad;
462 __u32 pio;
463 };
5f94c174
LV
464};
465
466struct kvm_coalesced_mmio {
467 __u64 phys_addr;
468 __u32 len;
0804c849
PH
469 union {
470 __u32 pad;
471 __u32 pio;
472 };
5f94c174
LV
473 __u8 data[8];
474};
475
476struct kvm_coalesced_mmio_ring {
477 __u32 first, last;
478 struct kvm_coalesced_mmio coalesced_mmio[0];
479};
480
481#define KVM_COALESCED_MMIO_MAX \
482 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
483 sizeof(struct kvm_coalesced_mmio))
484
6aa8b732
AK
485/* for KVM_TRANSLATE */
486struct kvm_translation {
487 /* in */
488 __u64 linear_address;
6aa8b732
AK
489
490 /* out */
491 __u64 physical_address;
492 __u8 valid;
493 __u8 writeable;
494 __u8 usermode;
8cd13307 495 __u8 pad[5];
6aa8b732
AK
496};
497
41408c28
TH
498/* for KVM_S390_MEM_OP */
499struct kvm_s390_mem_op {
500 /* in */
501 __u64 gaddr; /* the guest address */
502 __u64 flags; /* flags */
503 __u32 size; /* amount of bytes */
504 __u32 op; /* type of operation */
505 __u64 buf; /* buffer in userspace */
19e12277
JF
506 union {
507 __u8 ar; /* the access register number */
508 __u32 sida_offset; /* offset into the sida */
509 __u8 reserved[32]; /* should be set to 0 */
510 };
41408c28
TH
511};
512/* types for kvm_s390_mem_op->op */
513#define KVM_S390_MEMOP_LOGICAL_READ 0
514#define KVM_S390_MEMOP_LOGICAL_WRITE 1
19e12277
JF
515#define KVM_S390_MEMOP_SIDA_READ 2
516#define KVM_S390_MEMOP_SIDA_WRITE 3
41408c28
TH
517/* flags for kvm_s390_mem_op->flags */
518#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
519#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
520
6aa8b732
AK
521/* for KVM_INTERRUPT */
522struct kvm_interrupt {
523 /* in */
6aa8b732
AK
524 __u32 irq;
525};
526
6aa8b732
AK
527/* for KVM_GET_DIRTY_LOG */
528struct kvm_dirty_log {
529 __u32 slot;
2f8b9ee1 530 __u32 padding1;
6aa8b732
AK
531 union {
532 void __user *dirty_bitmap; /* one bit per page */
2f8b9ee1 533 __u64 padding2;
6aa8b732
AK
534 };
535};
536
2a31b9db
PB
537/* for KVM_CLEAR_DIRTY_LOG */
538struct kvm_clear_dirty_log {
539 __u32 slot;
540 __u32 num_pages;
541 __u64 first_page;
542 union {
543 void __user *dirty_bitmap; /* one bit per page */
544 __u64 padding2;
545 };
546};
547
1961d276
AK
548/* for KVM_SET_SIGNAL_MASK */
549struct kvm_signal_mask {
550 __u32 len;
551 __u8 sigset[0];
552};
553
b209749f
AK
554/* for KVM_TPR_ACCESS_REPORTING */
555struct kvm_tpr_access_ctl {
556 __u32 enabled;
557 __u32 flags;
558 __u32 reserved[8];
559};
560
b93463aa
AK
561/* for KVM_SET_VAPIC_ADDR */
562struct kvm_vapic_addr {
563 __u64 vapic_addr;
564};
565
0b4820d6 566/* for KVM_SET_MP_STATE */
62d9f0db 567
0b4820d6 568/* not all states are valid on all architectures */
62d9f0db
MT
569#define KVM_MP_STATE_RUNNABLE 0
570#define KVM_MP_STATE_UNINITIALIZED 1
571#define KVM_MP_STATE_INIT_RECEIVED 2
572#define KVM_MP_STATE_HALTED 3
573#define KVM_MP_STATE_SIPI_RECEIVED 4
6352e4d2
DH
574#define KVM_MP_STATE_STOPPED 5
575#define KVM_MP_STATE_CHECK_STOP 6
576#define KVM_MP_STATE_OPERATING 7
577#define KVM_MP_STATE_LOAD 8
647daca2 578#define KVM_MP_STATE_AP_RESET_HOLD 9
62d9f0db
MT
579
580struct kvm_mp_state {
581 __u32 mp_state;
582};
583
b0c632db
HC
584struct kvm_s390_psw {
585 __u64 mask;
586 __u64 addr;
587};
588
ba5c1e9b
CO
589/* valid values for type in kvm_s390_interrupt */
590#define KVM_S390_SIGP_STOP 0xfffe0000u
591#define KVM_S390_PROGRAM_INT 0xfffe0001u
592#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
593#define KVM_S390_RESTART 0xfffe0003u
3c038e6b
DD
594#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
595#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
48a3e950 596#define KVM_S390_MCHK 0xfffe1000u
e029ae5b
TH
597#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
598#define KVM_S390_INT_CPU_TIMER 0xffff1005u
ba5c1e9b
CO
599#define KVM_S390_INT_VIRTIO 0xffff2603u
600#define KVM_S390_INT_SERVICE 0xffff2401u
601#define KVM_S390_INT_EMERGENCY 0xffff1201u
7697e71f 602#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d8346b7d
CH
603/* Anything below 0xfffe0000u is taken by INT_IO */
604#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
605 (((schid)) | \
606 ((ssid) << 16) | \
607 ((cssid) << 18) | \
608 ((ai) << 26))
609#define KVM_S390_INT_IO_MIN 0x00000000u
610#define KVM_S390_INT_IO_MAX 0xfffdffffu
a37281b6 611#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d8346b7d 612
ba5c1e9b
CO
613
614struct kvm_s390_interrupt {
615 __u32 type;
616 __u32 parm;
617 __u64 parm64;
618};
619
81aa8efe
JF
620struct kvm_s390_io_info {
621 __u16 subchannel_id;
622 __u16 subchannel_nr;
623 __u32 io_int_parm;
624 __u32 io_int_word;
625};
626
627struct kvm_s390_ext_info {
628 __u32 ext_params;
629 __u32 pad;
630 __u64 ext_params2;
631};
632
633struct kvm_s390_pgm_info {
634 __u64 trans_exc_code;
635 __u64 mon_code;
636 __u64 per_address;
637 __u32 data_exc_code;
638 __u16 code;
639 __u16 mon_class_nr;
640 __u8 per_code;
641 __u8 per_atmid;
642 __u8 exc_access_id;
643 __u8 per_access_id;
644 __u8 op_access_id;
634790b8
DH
645#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
646#define KVM_S390_PGM_FLAGS_ILC_0 0x02
647#define KVM_S390_PGM_FLAGS_ILC_1 0x04
648#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
eaa4f416 649#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
634790b8
DH
650 __u8 flags;
651 __u8 pad[2];
81aa8efe
JF
652};
653
654struct kvm_s390_prefix_info {
655 __u32 address;
656};
657
658struct kvm_s390_extcall_info {
659 __u16 code;
660};
661
662struct kvm_s390_emerg_info {
663 __u16 code;
664};
665
2822545f
DH
666#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
667struct kvm_s390_stop_info {
668 __u32 flags;
669};
670
81aa8efe
JF
671struct kvm_s390_mchk_info {
672 __u64 cr14;
673 __u64 mcic;
674 __u64 failing_storage_address;
675 __u32 ext_damage_code;
676 __u32 pad;
677 __u8 fixed_logout[16];
678};
679
680struct kvm_s390_irq {
681 __u64 type;
682 union {
683 struct kvm_s390_io_info io;
684 struct kvm_s390_ext_info ext;
685 struct kvm_s390_pgm_info pgm;
686 struct kvm_s390_emerg_info emerg;
687 struct kvm_s390_extcall_info extcall;
688 struct kvm_s390_prefix_info prefix;
2822545f 689 struct kvm_s390_stop_info stop;
81aa8efe
JF
690 struct kvm_s390_mchk_info mchk;
691 char reserved[64];
692 } u;
693};
694
816c7667
JF
695struct kvm_s390_irq_state {
696 __u64 buf;
bb64da9a 697 __u32 flags; /* will stay unused for compatibility reasons */
816c7667 698 __u32 len;
bb64da9a 699 __u32 reserved[4]; /* will stay unused for compatibility reasons */
816c7667
JF
700};
701
d0bfb940
JK
702/* for KVM_SET_GUEST_DEBUG */
703
704#define KVM_GUESTDBG_ENABLE 0x00000001
705#define KVM_GUESTDBG_SINGLESTEP 0x00000002
706
707struct kvm_guest_debug {
708 __u32 control;
709 __u32 pad;
710 struct kvm_guest_debug_arch arch;
711};
712
d34e6b17
GH
713enum {
714 kvm_ioeventfd_flag_nr_datamatch,
715 kvm_ioeventfd_flag_nr_pio,
716 kvm_ioeventfd_flag_nr_deassign,
2b83451b 717 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
68c3b4d1 718 kvm_ioeventfd_flag_nr_fast_mmio,
d34e6b17
GH
719 kvm_ioeventfd_flag_nr_max,
720};
721
722#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
723#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
724#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
2b83451b
CH
725#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
726 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
d34e6b17
GH
727
728#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
729
730struct kvm_ioeventfd {
731 __u64 datamatch;
732 __u64 addr; /* legal pio/mmio address */
f848a5a8 733 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
d34e6b17
GH
734 __s32 fd;
735 __u32 flags;
736 __u8 pad[36];
737};
738
5e62493f 739#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
766d3571 740#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
5e62493f 741#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
b5170063 742#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
5e62493f 743#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
766d3571 744 KVM_X86_DISABLE_EXITS_HLT | \
b5170063
WL
745 KVM_X86_DISABLE_EXITS_PAUSE | \
746 KVM_X86_DISABLE_EXITS_CSTATE)
5e62493f 747
71fbfd5f
AG
748/* for KVM_ENABLE_CAP */
749struct kvm_enable_cap {
750 /* in */
751 __u32 cap;
752 __u32 flags;
753 __u64 args[4];
754 __u8 pad[64];
755};
756
15711e9c 757/* for KVM_PPC_GET_PVINFO */
a91d5df2
DG
758
759#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
760
15711e9c
AG
761struct kvm_ppc_pvinfo {
762 /* out */
763 __u32 flags;
764 __u32 hcall[4];
765 __u8 pad[108];
766};
767
5b74716e
BH
768/* for KVM_PPC_GET_SMMU_INFO */
769#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
770
771struct kvm_ppc_one_page_size {
772 __u32 page_shift; /* Page shift (or 0) */
773 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
774};
775
776struct kvm_ppc_one_seg_page_size {
777 __u32 page_shift; /* Base page shift of segment (or 0) */
778 __u32 slb_enc; /* SLB encoding for BookS */
779 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
780};
781
782#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
783#define KVM_PPC_1T_SEGMENTS 0x00000002
901f8c3f 784#define KVM_PPC_NO_HASH 0x00000004
5b74716e
BH
785
786struct kvm_ppc_smmu_info {
787 __u64 flags;
788 __u32 slb_size;
e3bfed1d
PM
789 __u16 data_keys; /* # storage keys supported for data */
790 __u16 instr_keys; /* # storage keys supported for instructions */
5b74716e
BH
791 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
792};
793
ef1ead0c
DG
794/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
795struct kvm_ppc_resize_hpt {
796 __u64 flags;
797 __u32 shift;
798 __u32 pad;
799};
800
6aa8b732
AK
801#define KVMIO 0xAE
802
e08b9637
CO
803/* machine type bits, to be used as argument to KVM_CREATE_VM */
804#define KVM_VM_S390_UCONTROL 1
805
cbbc58d4
AK
806/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
807#define KVM_VM_PPC_HV 1
808#define KVM_VM_PPC_PR 2
809
15e9e35c
HC
810/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
811#define KVM_VM_MIPS_AUTO 0
a8a3c426 812#define KVM_VM_MIPS_VZ 1
15e9e35c 813#define KVM_VM_MIPS_TE 2
a8a3c426 814
5b1c1493
CO
815#define KVM_S390_SIE_PAGE_OFFSET 1
816
233a7cb2
SP
817/*
818 * On arm64, machine type can be used to request the physical
819 * address size for the VM. Bits[7-0] are reserved for the guest
820 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
821 * value 0 implies the default IPA size, 40bits.
822 */
823#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
824#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
825 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
f17abe9a
AK
826/*
827 * ioctls for /dev/kvm fds:
828 */
739872c5
AK
829#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
830#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
831#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
b0c632db
HC
832
833#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
5d308f45
AK
834/*
835 * Check if a kvm extension is available. Argument is extension number,
836 * return is 1 (yes) or 0 (no, sorry).
837 */
838#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
07c45a36
AK
839/*
840 * Get size for mmap(vcpu_fd)
841 */
842#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
674eea0f 843#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
c54d2aba
JK
844#define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06
845#define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07
846#define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08
9c15bb1d 847#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
801e459a 848#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
c54d2aba 849
85f455f7
ED
850/*
851 * Extension capability list.
852 */
853#define KVM_CAP_IRQCHIP 0
b6958ce4 854#define KVM_CAP_HLT 1
82ce2c96 855#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
6fc138d2 856#define KVM_CAP_USER_MEMORY 3
cbc94022 857#define KVM_CAP_SET_TSS_ADDR 4
b209749f 858#define KVM_CAP_VAPIC 6
674eea0f 859#define KVM_CAP_EXT_CPUID 7
18068523 860#define KVM_CAP_CLOCKSOURCE 8
8c3ba334 861#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
a988b910 862#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
7837699f 863#define KVM_CAP_PIT 11
a28e4f5a 864#define KVM_CAP_NOP_IO_DELAY 12
2f333bcb 865#define KVM_CAP_PV_MMU 13
62d9f0db 866#define KVM_CAP_MP_STATE 14
5f94c174 867#define KVM_CAP_COALESCED_MMIO 15
ed848624 868#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
62c476c7 869#define KVM_CAP_IOMMU 18
1a811b61
AK
870/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
871#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
4531220b 872#define KVM_CAP_USER_NMI 22
91b2ae77 873#ifdef __KVM_HAVE_GUEST_DEBUG
d0bfb940 874#define KVM_CAP_SET_GUEST_DEBUG 23
971cc3dc 875#endif
91b2ae77 876#ifdef __KVM_HAVE_PIT
52d939a0 877#define KVM_CAP_REINJECT_CONTROL 24
399ec807 878#endif
399ec807 879#define KVM_CAP_IRQ_ROUTING 25
4925663a 880#define KVM_CAP_IRQ_INJECT_STATUS 26
e56d532f 881#define KVM_CAP_ASSIGN_DEV_IRQ 29
4cd481f6
JK
882/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
883#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
890ca9ae
HY
884#ifdef __KVM_HAVE_MCE
885#define KVM_CAP_MCE 31
886#endif
721eecbf 887#define KVM_CAP_IRQFD 32
c5ff41ce
JK
888#ifdef __KVM_HAVE_PIT
889#define KVM_CAP_PIT2 33
890#endif
73880c80 891#define KVM_CAP_SET_BOOT_CPU_ID 34
e9f42757
BK
892#ifdef __KVM_HAVE_PIT_STATE2
893#define KVM_CAP_PIT_STATE2 35
894#endif
d34e6b17 895#define KVM_CAP_IOEVENTFD 36
b927a3ce 896#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
ffde22ac
ES
897#ifdef __KVM_HAVE_XEN_HVM
898#define KVM_CAP_XEN_HVM 38
899#endif
afbcf7ab 900#define KVM_CAP_ADJUST_CLOCK 39
a9c7399d 901#define KVM_CAP_INTERNAL_ERROR_DATA 40
3cfc3092
JK
902#ifdef __KVM_HAVE_VCPU_EVENTS
903#define KVM_CAP_VCPU_EVENTS 41
904#endif
d7b0b5eb 905#define KVM_CAP_S390_PSW 42
e15a1137 906#define KVM_CAP_PPC_SEGSTATE 43
55cd8e5a 907#define KVM_CAP_HYPERV 44
10388a07 908#define KVM_CAP_HYPERV_VAPIC 45
c25bc163 909#define KVM_CAP_HYPERV_SPIN 46
ab9f4ecb 910#define KVM_CAP_PCI_SEGMENT 47
c10207fe 911#define KVM_CAP_PPC_PAIRED_SINGLES 48
48005f64 912#define KVM_CAP_INTR_SHADOW 49
a1efbe77
JK
913#ifdef __KVM_HAVE_DEBUGREGS
914#define KVM_CAP_DEBUGREGS 50
915#endif
d2be1651 916#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
ad0a048b 917#define KVM_CAP_PPC_OSI 52
18978768 918#define KVM_CAP_PPC_UNSET_IRQ 53
71fbfd5f 919#define KVM_CAP_ENABLE_CAP 54
2d5b5a66
SY
920#ifdef __KVM_HAVE_XSAVE
921#define KVM_CAP_XSAVE 55
922#endif
923#ifdef __KVM_HAVE_XCRS
924#define KVM_CAP_XCRS 56
925#endif
15711e9c 926#define KVM_CAP_PPC_GET_PVINFO 57
7b4203e8 927#define KVM_CAP_PPC_IRQ_LEVEL 58
344d9588 928#define KVM_CAP_ASYNC_PF 59
92a1f12d
JR
929#define KVM_CAP_TSC_CONTROL 60
930#define KVM_CAP_GET_TSC_KHZ 61
5ce941ee 931#define KVM_CAP_PPC_BOOKE_SREGS 62
54738c09 932#define KVM_CAP_SPAPR_TCE 63
371fefd6 933#define KVM_CAP_PPC_SMT 64
aa04b4cc 934#define KVM_CAP_PPC_RMA 65
8c3ba334 935#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
1022fc3d 936#define KVM_CAP_PPC_HIOR 67
930b412a 937#define KVM_CAP_PPC_PAPR 68
dc83b8bc 938#define KVM_CAP_SW_TLB 69
e24ed81f 939#define KVM_CAP_ONE_REG 70
b6cf8788 940#define KVM_CAP_S390_GMAP 71
4d25a066 941#define KVM_CAP_TSC_DEADLINE_TIMER 72
1efd0f59 942#define KVM_CAP_S390_UCONTROL 73
b9e5dc8d 943#define KVM_CAP_SYNC_REGS 74
07700a94 944#define KVM_CAP_PCI_2_3 75
1c0b28c2 945#define KVM_CAP_KVMCLOCK_CTRL 76
07975ad3 946#define KVM_CAP_SIGNAL_MSI 77
5b74716e 947#define KVM_CAP_PPC_GET_SMMU_INFO 78
1526bf9c 948#define KVM_CAP_S390_COW 79
32fad281 949#define KVM_CAP_PPC_ALLOC_HTAB 80
4d8b81ab 950#define KVM_CAP_READONLY_MEM 81
7a84428a 951#define KVM_CAP_IRQFD_RESAMPLE 82
f61c94bb 952#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
a2932923 953#define KVM_CAP_PPC_HTAB_FD 84
fa6b7fe9 954#define KVM_CAP_S390_CSS_SUPPORT 85
1c810636 955#define KVM_CAP_PPC_EPR 86
aa024c2f 956#define KVM_CAP_ARM_PSCI 87
3401d546 957#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
852b6d57 958#define KVM_CAP_DEVICE_CTRL 89
eb1e4f43 959#define KVM_CAP_IRQ_MPIC 90
8e591cb7 960#define KVM_CAP_PPC_RTAS 91
5975a2e0 961#define KVM_CAP_IRQ_XICS 92
0d854a60 962#define KVM_CAP_ARM_EL1_32BIT 93
0bd50dc9 963#define KVM_CAP_SPAPR_MULTITCE 94
9c15bb1d 964#define KVM_CAP_EXT_EMUL_CPUID 95
e984097b 965#define KVM_CAP_HYPERV_TIME 96
100943c5 966#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
d938dc55 967#define KVM_CAP_ENABLE_CAP_VM 98
84223598 968#define KVM_CAP_S390_IRQCHIP 99
f848a5a8 969#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
63b5cf04 970#define KVM_CAP_VM_ATTRIBUTES 101
717abd20 971#define KVM_CAP_ARM_PSCI_0_2 102
53ea2e46 972#define KVM_CAP_PPC_FIXUP_HCALL 103
699a0ea0 973#define KVM_CAP_PPC_ENABLE_HCALL 104
92b591a4 974#define KVM_CAP_CHECK_EXTENSION_VM 105
2444b352 975#define KVM_CAP_S390_USER_SIGP 106
68c55750 976#define KVM_CAP_S390_VECTOR_REGISTERS 107
41408c28 977#define KVM_CAP_S390_MEM_OP 108
e44fc8c9 978#define KVM_CAP_S390_USER_STSI 109
30ee2a98 979#define KVM_CAP_S390_SKEYS 110
5fafd874 980#define KVM_CAP_MIPS_FPU 111
d952bd07 981#define KVM_CAP_MIPS_MSA 112
47b43c52 982#define KVM_CAP_S390_INJECT_IRQ 113
816c7667 983#define KVM_CAP_S390_IRQ_STATE 114
e928e9cb 984#define KVM_CAP_PPC_HWRNG 115
90de4a18 985#define KVM_CAP_DISABLE_QUIRKS 116
f077825a 986#define KVM_CAP_X86_SMM 117
f481b069 987#define KVM_CAP_MULTI_ADDRESS_SPACE 118
5540546b
AB
988#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
989#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
49df6397 990#define KVM_CAP_SPLIT_IRQCHIP 121
e9ea5069 991#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
5c919412 992#define KVM_CAP_HYPERV_SYNIC 123
c6e5f166 993#define KVM_CAP_S390_RI 124
01d01d69 994#define KVM_CAP_SPAPR_TCE_64 125
ab92f308
PB
995#define KVM_CAP_ARM_PMU_V3 126
996#define KVM_CAP_VCPU_ATTRIBUTES 127
0b1b1dfd 997#define KVM_CAP_MAX_VCPU_ID 128
37131313 998#define KVM_CAP_X2APIC_API 129
6502a34c 999#define KVM_CAP_S390_USER_INSTR0 130
912902ce 1000#define KVM_CAP_MSI_DEVID 131
23528bb2 1001#define KVM_CAP_PPC_HTM 132
ef1ead0c 1002#define KVM_CAP_SPAPR_RESIZE_HPT 133
c9270132
PM
1003#define KVM_CAP_PPC_MMU_RADIX 134
1004#define KVM_CAP_PPC_MMU_HASH_V3 135
460df4c1 1005#define KVM_CAP_IMMEDIATE_EXIT 136
a8a3c426
JH
1006#define KVM_CAP_MIPS_VZ 137
1007#define KVM_CAP_MIPS_TE 138
578fd61d 1008#define KVM_CAP_MIPS_64BIT 139
f7b1a77d
RK
1009#define KVM_CAP_S390_GS 140
1010#define KVM_CAP_S390_AIS 141
4898d3f4 1011#define KVM_CAP_SPAPR_TCE_VFIO 142
4d5422ce 1012#define KVM_CAP_X86_DISABLE_EXITS 143
c24a7be2 1013#define KVM_CAP_ARM_USER_IRQ 144
4036e387 1014#define KVM_CAP_S390_CMMA_MIGRATION 145
8a53e7e5
PB
1015#define KVM_CAP_PPC_FWNMI 146
1016#define KVM_CAP_PPC_SMT_POSSIBLE 147
efc479e6 1017#define KVM_CAP_HYPERV_SYNIC2 148
d3457c87 1018#define KVM_CAP_HYPERV_VP_INDEX 149
da9a1446 1019#define KVM_CAP_S390_AIS_MIGRATION 150
3214d01f 1020#define KVM_CAP_PPC_GET_CPU_CHAR 151
35b3fde6 1021#define KVM_CAP_S390_BPB 152
801e459a 1022#define KVM_CAP_GET_MSR_FEATURES 153
faeb7833 1023#define KVM_CAP_HYPERV_EVENTFD 154
c1aea919 1024#define KVM_CAP_HYPERV_TLBFLUSH 155
a4499382 1025#define KVM_CAP_S390_HPAGE_1M 156
8fcc4b59 1026#define KVM_CAP_NESTED_STATE 157
63198930 1027#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
6fbbde9a 1028#define KVM_CAP_MSR_PLATFORM_INFO 159
aa069a99 1029#define KVM_CAP_PPC_NESTED_HV 160
214ff83d 1030#define KVM_CAP_HYPERV_SEND_IPI 161
0804c849 1031#define KVM_CAP_COALESCED_PIO 162
57b119da 1032#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
c4f55198 1033#define KVM_CAP_EXCEPTION_PAYLOAD 164
e42b4a50 1034#define KVM_CAP_ARM_VM_IPA_SIZE 165
d7547c55 1035#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
2bc39970 1036#define KVM_CAP_HYPERV_CPUID 167
d7547c55 1037#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
59c5c58c 1038#define KVM_CAP_PPC_IRQ_XIVE 169
dd53f610
PB
1039#define KVM_CAP_ARM_SVE 170
1040#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1041#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
66bb8a06 1042#define KVM_CAP_PMU_EVENT_FILTER 173
92f35b75 1043#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
344c6c80 1044#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
1a9167a2 1045#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
14edff88
PB
1046#define KVM_CAP_ARM_NISV_TO_USER 177
1047#define KVM_CAP_ARM_INJECT_EXT_DABT 178
7de3f142 1048#define KVM_CAP_S390_VCPU_RESETS 179
13da9ae1 1049#define KVM_CAP_S390_PROTECTED 180
9a5788c6 1050#define KVM_CAP_PPC_SECURE_GUEST 181
acd05785 1051#define KVM_CAP_HALT_POLL 182
72de5fa4 1052#define KVM_CAP_ASYNC_PF_INT 183
1aa561b1 1053#define KVM_CAP_LAST_CPU 184
3edd6839 1054#define KVM_CAP_SMALLER_MAXPHYADDR 185
f3633c26 1055#define KVM_CAP_S390_DIAG318 186
004a0124 1056#define KVM_CAP_STEAL_TIME 187
1ae09954 1057#define KVM_CAP_X86_USER_SPACE_MSR 188
1a155254 1058#define KVM_CAP_X86_MSR_FILTER 189
66570e96 1059#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
c21d54f0 1060#define KVM_CAP_SYS_HYPERV_CPUID 191
fb04a1ed 1061#define KVM_CAP_DIRTY_LOG_RING 192
fe6b6bc8 1062#define KVM_CAP_X86_BUS_LOCK_EXIT 193
399ec807
AK
1063
1064#ifdef KVM_CAP_IRQ_ROUTING
1065
1066struct kvm_irq_routing_irqchip {
1067 __u32 irqchip;
1068 __u32 pin;
1069};
1070
79950e10
SY
1071struct kvm_irq_routing_msi {
1072 __u32 address_lo;
1073 __u32 address_hi;
1074 __u32 data;
76a10b86
EA
1075 union {
1076 __u32 pad;
1077 __u32 devid;
1078 };
79950e10
SY
1079};
1080
84223598
CH
1081struct kvm_irq_routing_s390_adapter {
1082 __u64 ind_addr;
1083 __u64 summary_addr;
1084 __u64 ind_offset;
1085 __u32 summary_offset;
1086 __u32 adapter_id;
1087};
1088
5c919412
AS
1089struct kvm_irq_routing_hv_sint {
1090 __u32 vcpu;
1091 __u32 sint;
1092};
1093
399ec807
AK
1094/* gsi routing entry types */
1095#define KVM_IRQ_ROUTING_IRQCHIP 1
79950e10 1096#define KVM_IRQ_ROUTING_MSI 2
84223598 1097#define KVM_IRQ_ROUTING_S390_ADAPTER 3
5c919412 1098#define KVM_IRQ_ROUTING_HV_SINT 4
399ec807
AK
1099
1100struct kvm_irq_routing_entry {
1101 __u32 gsi;
1102 __u32 type;
1103 __u32 flags;
1104 __u32 pad;
1105 union {
1106 struct kvm_irq_routing_irqchip irqchip;
79950e10 1107 struct kvm_irq_routing_msi msi;
84223598 1108 struct kvm_irq_routing_s390_adapter adapter;
5c919412 1109 struct kvm_irq_routing_hv_sint hv_sint;
399ec807
AK
1110 __u32 pad[8];
1111 } u;
1112};
1113
1114struct kvm_irq_routing {
1115 __u32 nr;
1116 __u32 flags;
1117 struct kvm_irq_routing_entry entries[0];
1118};
1119
52d939a0 1120#endif
85f455f7 1121
890ca9ae
HY
1122#ifdef KVM_CAP_MCE
1123/* x86 MCE */
1124struct kvm_x86_mce {
1125 __u64 status;
1126 __u64 addr;
1127 __u64 misc;
1128 __u64 mcg_status;
1129 __u8 bank;
1130 __u8 pad1[7];
1131 __u64 pad2[3];
1132};
1133#endif
1134
ffde22ac
ES
1135#ifdef KVM_CAP_XEN_HVM
1136struct kvm_xen_hvm_config {
1137 __u32 flags;
1138 __u32 msr;
1139 __u64 blob_addr_32;
1140 __u64 blob_addr_64;
1141 __u8 blob_size_32;
1142 __u8 blob_size_64;
1143 __u8 pad2[30];
1144};
1145#endif
1146
721eecbf 1147#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
7a84428a
AW
1148/*
1149 * Available with KVM_CAP_IRQFD_RESAMPLE
1150 *
1151 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1152 * the irqfd to operate in resampling mode for level triggered interrupt
3ecad8c2 1153 * emulation. See Documentation/virt/kvm/api.rst.
7a84428a
AW
1154 */
1155#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
721eecbf
GH
1156
1157struct kvm_irqfd {
1158 __u32 fd;
1159 __u32 gsi;
1160 __u32 flags;
7a84428a
AW
1161 __u32 resamplefd;
1162 __u8 pad[16];
721eecbf
GH
1163};
1164
e3fd9a93
PB
1165/* For KVM_CAP_ADJUST_CLOCK */
1166
1167/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1168#define KVM_CLOCK_TSC_STABLE 2
1169
afbcf7ab
GC
1170struct kvm_clock_data {
1171 __u64 clock;
1172 __u32 flags;
1173 __u32 pad[9];
1174};
1175
e3fd9a93
PB
1176/* For KVM_CAP_SW_TLB */
1177
dc83b8bc
SW
1178#define KVM_MMU_FSL_BOOKE_NOHV 0
1179#define KVM_MMU_FSL_BOOKE_HV 1
1180
1181struct kvm_config_tlb {
1182 __u64 params;
1183 __u64 array;
1184 __u32 mmu_type;
1185 __u32 array_len;
1186};
1187
1188struct kvm_dirty_tlb {
1189 __u64 bitmap;
1190 __u32 num_dirty;
1191};
1192
e24ed81f
AG
1193/* Available with KVM_CAP_ONE_REG */
1194
1195#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1196#define KVM_REG_GENERIC 0x0000000000000000ULL
1197
1198/*
1199 * Architecture specific registers are to be defined in arch headers and
1200 * ORed with the arch identifier.
1201 */
1202#define KVM_REG_PPC 0x1000000000000000ULL
1203#define KVM_REG_X86 0x2000000000000000ULL
1204#define KVM_REG_IA64 0x3000000000000000ULL
1205#define KVM_REG_ARM 0x4000000000000000ULL
1206#define KVM_REG_S390 0x5000000000000000ULL
7c8c5e6a 1207#define KVM_REG_ARM64 0x6000000000000000ULL
2a8fedd0 1208#define KVM_REG_MIPS 0x7000000000000000ULL
dee04eee 1209#define KVM_REG_RISCV 0x8000000000000000ULL
e24ed81f
AG
1210
1211#define KVM_REG_SIZE_SHIFT 52
1212#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1213#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1214#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1215#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1216#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1217#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1218#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1219#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1220#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
2b953ea3 1221#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
e24ed81f 1222
749cf76c
CD
1223struct kvm_reg_list {
1224 __u64 n; /* number of regs */
1225 __u64 reg[0];
1226};
1227
e24ed81f
AG
1228struct kvm_one_reg {
1229 __u64 id;
1230 __u64 addr;
1231};
1232
2b8ddd93 1233#define KVM_MSI_VALID_DEVID (1U << 0)
07975ad3
JK
1234struct kvm_msi {
1235 __u32 address_lo;
1236 __u32 address_hi;
1237 __u32 data;
1238 __u32 flags;
2b8ddd93
AP
1239 __u32 devid;
1240 __u8 pad[12];
07975ad3
JK
1241};
1242
3401d546
CD
1243struct kvm_arm_device_addr {
1244 __u64 id;
1245 __u64 addr;
1246};
1247
852b6d57
SW
1248/*
1249 * Device control API, available with KVM_CAP_DEVICE_CTRL
1250 */
1251#define KVM_CREATE_DEVICE_TEST 1
1252
1253struct kvm_create_device {
1254 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1255 __u32 fd; /* out: device handle */
1256 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1257};
1258
1259struct kvm_device_attr {
1260 __u32 flags; /* no flags currently defined */
1261 __u32 group; /* device-defined */
1262 __u64 attr; /* group-defined */
1263 __u64 addr; /* userspace address of attr data */
1264};
1265
ec53500f
AW
1266#define KVM_DEV_VFIO_GROUP 1
1267#define KVM_DEV_VFIO_GROUP_ADD 1
1268#define KVM_DEV_VFIO_GROUP_DEL 2
121f80ba 1269#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
d60eacb0
WD
1270
1271enum kvm_device_type {
1272 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1273#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1274 KVM_DEV_TYPE_FSL_MPIC_42,
1275#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1276 KVM_DEV_TYPE_XICS,
1277#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1278 KVM_DEV_TYPE_VFIO,
1279#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1280 KVM_DEV_TYPE_ARM_VGIC_V2,
1281#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1282 KVM_DEV_TYPE_FLIC,
1283#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
a0675c25
AP
1284 KVM_DEV_TYPE_ARM_VGIC_V3,
1285#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
1085fdc6
AP
1286 KVM_DEV_TYPE_ARM_VGIC_ITS,
1287#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
90c73795
CLG
1288 KVM_DEV_TYPE_XIVE,
1289#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
58772e9a
SP
1290 KVM_DEV_TYPE_ARM_PV_TIME,
1291#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
d60eacb0
WD
1292 KVM_DEV_TYPE_MAX,
1293};
5df554ad 1294
121f80ba
AK
1295struct kvm_vfio_spapr_tce {
1296 __s32 groupfd;
1297 __s32 tablefd;
1298};
1299
f17abe9a
AK
1300/*
1301 * ioctls for VM fds
1302 */
c54d2aba 1303#define KVM_SET_MEMORY_REGION _IOW(KVMIO, 0x40, struct kvm_memory_region)
bccf2150
AK
1304/*
1305 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1306 * a vcpu fd.
1307 */
c54d2aba
JK
1308#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1309#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
a1f4d395 1310/* KVM_SET_MEMORY_ALIAS is obsolete: */
c54d2aba
JK
1311#define KVM_SET_MEMORY_ALIAS _IOW(KVMIO, 0x43, struct kvm_memory_alias)
1312#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
1313#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45)
1314#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
6a4a9839 1315 struct kvm_userspace_memory_region)
c54d2aba
JK
1316#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1317#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
27e0393f
CO
1318
1319/* enable ucontrol for s390 */
1320struct kvm_s390_ucas_mapping {
1321 __u64 user_addr;
1322 __u64 vcpu_addr;
1323 __u64 length;
1324};
1325#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1326#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
ccc7910f 1327#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
27e0393f 1328
85f455f7 1329/* Device model IOC */
c54d2aba
JK
1330#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1331#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1332#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1333#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1334#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1335#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1336#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1337#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
5f94c174
LV
1338#define KVM_REGISTER_COALESCED_MMIO \
1339 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1340#define KVM_UNREGISTER_COALESCED_MMIO \
1341 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
c54d2aba
JK
1342#define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \
1343 struct kvm_assigned_pci_dev)
1344#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
e56d532f 1345/* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */
c54d2aba
JK
1346#define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70
1347#define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq)
1348#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
1349#define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \
1350 struct kvm_assigned_pci_dev)
1351#define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \
1352 struct kvm_assigned_msix_nr)
1353#define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \
1354 struct kvm_assigned_msix_entry)
1355#define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq)
1356#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1357#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1358#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1359#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1360#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1361#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1362#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1363/* Available with KVM_CAP_PIT_STATE2 */
1364#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1365#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
15711e9c
AG
1366/* Available with KVM_CAP_PPC_GET_PVINFO */
1367#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
92a1f12d
JR
1368/* Available with KVM_CAP_TSC_CONTROL */
1369#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1370#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
07700a94
JK
1371/* Available with KVM_CAP_PCI_2_3 */
1372#define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \
1373 struct kvm_assigned_pci_dev)
07975ad3
JK
1374/* Available with KVM_CAP_SIGNAL_MSI */
1375#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
5b74716e
BH
1376/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1377#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
32fad281
PM
1378/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1379#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
ed7a8d7a 1380#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
58ded420
AK
1381#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1382 struct kvm_create_spapr_tce_64)
ed7a8d7a
PM
1383/* Available with KVM_CAP_RMA */
1384#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
a2932923
PM
1385/* Available with KVM_CAP_PPC_HTAB_FD */
1386#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
3401d546
CD
1387/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1388#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
8e591cb7
ME
1389/* Available with KVM_CAP_PPC_RTAS */
1390#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
ef1ead0c
DG
1391/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1392#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1393#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
c9270132
PM
1394/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1395#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1396/* Available with KVM_CAP_PPC_RADIX_MMU */
1397#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
3214d01f
PM
1398/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1399#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
66bb8a06
EH
1400/* Available with KVM_CAP_PMU_EVENT_FILTER */
1401#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
22945688 1402#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
bccf2150 1403
852b6d57
SW
1404/* ioctl for vm fd */
1405#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1406
1407/* ioctls for fds returned by KVM_CREATE_DEVICE */
1408#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1409#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1410#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
1411
bccf2150
AK
1412/*
1413 * ioctls for vcpu fds
1414 */
739872c5
AK
1415#define KVM_RUN _IO(KVMIO, 0x80)
1416#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1417#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1418#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1419#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1420#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1421#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
d0bfb940 1422/* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */
c54d2aba 1423#define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87
739872c5
AK
1424#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1425#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1426#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1961d276 1427#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
b8836737
AK
1428#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1429#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
96ad2cc6
ED
1430#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1431#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
07716717
DK
1432#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1433#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
b209749f 1434/* Available with KVM_CAP_VAPIC */
c54d2aba 1435#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
b93463aa
AK
1436/* Available with KVM_CAP_VAPIC */
1437#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
ba5c1e9b
CO
1438/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1439#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
b0c632db
HC
1440/* store status for s390 */
1441#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1442#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1443#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1444/* initial ipl psw for s390 */
1445#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1446/* initial reset for s390 */
c54d2aba 1447#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
62d9f0db
MT
1448#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1449#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
44b5ce73 1450/* Available with KVM_CAP_USER_NMI */
c54d2aba 1451#define KVM_NMI _IO(KVMIO, 0x9a)
d0bfb940
JK
1452/* Available with KVM_CAP_SET_GUEST_DEBUG */
1453#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
890ca9ae
HY
1454/* MCE for x86 */
1455#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1456#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1457#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
3cfc3092
JK
1458/* Available with KVM_CAP_VCPU_EVENTS */
1459#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1460#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
a1efbe77
JK
1461/* Available with KVM_CAP_DEBUGREGS */
1462#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1463#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
d938dc55
CH
1464/*
1465 * vcpu version available with KVM_ENABLE_CAP
1466 * vm version available with KVM_CAP_ENABLE_CAP_VM
1467 */
71fbfd5f 1468#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
2d5b5a66
SY
1469/* Available with KVM_CAP_XSAVE */
1470#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1471#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1472/* Available with KVM_CAP_XCRS */
1473#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1474#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
dc83b8bc
SW
1475/* Available with KVM_CAP_SW_TLB */
1476#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
e24ed81f
AG
1477/* Available with KVM_CAP_ONE_REG */
1478#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
1479#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
1c0b28c2
EM
1480/* VM is being stopped by host */
1481#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
749cf76c 1482#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
42c4e0c7 1483#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
749cf76c 1484#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
41408c28
TH
1485/* Available with KVM_CAP_S390_MEM_OP */
1486#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
30ee2a98
JH
1487/* Available with KVM_CAP_S390_SKEYS */
1488#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1489#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
47b43c52
JF
1490/* Available with KVM_CAP_S390_INJECT_IRQ */
1491#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
816c7667
JF
1492/* Available with KVM_CAP_S390_IRQ_STATE */
1493#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1494#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
f077825a
PB
1495/* Available with KVM_CAP_X86_SMM */
1496#define KVM_SMI _IO(KVMIO, 0xb7)
4036e387 1497/* Available with KVM_CAP_S390_CMMA_MIGRATION */
949c0336 1498#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
4036e387 1499#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
5acc5c06
BS
1500/* Memory Encryption Commands */
1501#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
d98e6346 1502
69eaedee
BS
1503struct kvm_enc_region {
1504 __u64 addr;
1505 __u64 size;
1506};
1507
1508#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1509#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1510
faeb7833
RK
1511/* Available with KVM_CAP_HYPERV_EVENTFD */
1512#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1513
8fcc4b59
JM
1514/* Available with KVM_CAP_NESTED_STATE */
1515#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1516#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
faeb7833 1517
d7547c55 1518/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
2a31b9db
PB
1519#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1520
c21d54f0 1521/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
2bc39970
VK
1522#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1523
7dd32a0d
DM
1524/* Available with KVM_CAP_ARM_SVE */
1525#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1526
7de3f142
JF
1527/* Available with KVM_CAP_S390_VCPU_RESETS */
1528#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1529#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1530
29b40f10
JF
1531struct kvm_s390_pv_sec_parm {
1532 __u64 origin;
1533 __u64 length;
1534};
1535
1536struct kvm_s390_pv_unp {
1537 __u64 addr;
1538 __u64 size;
1539 __u64 tweak;
1540};
1541
1542enum pv_cmd_id {
1543 KVM_PV_ENABLE,
1544 KVM_PV_DISABLE,
1545 KVM_PV_SET_SEC_PARMS,
1546 KVM_PV_UNPACK,
1547 KVM_PV_VERIFY,
e0d2773d
JF
1548 KVM_PV_PREP_RESET,
1549 KVM_PV_UNSHARE_ALL,
29b40f10
JF
1550};
1551
1552struct kvm_pv_cmd {
1553 __u32 cmd; /* Command to be executed */
1554 __u16 rc; /* Ultravisor return code */
1555 __u16 rrc; /* Ultravisor return reason code */
1556 __u64 data; /* Data or address */
1557 __u32 flags; /* flags for future extensions. Must be 0 for now */
1558 __u32 reserved[3];
1559};
1560
1561/* Available with KVM_CAP_S390_PROTECTED */
1562#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1563
1a155254
AG
1564/* Available with KVM_CAP_X86_MSR_FILTER */
1565#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1566
fb04a1ed
PX
1567/* Available with KVM_CAP_DIRTY_LOG_RING */
1568#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1569
dc48bae0
BS
1570/* Secure Encrypted Virtualization command */
1571enum sev_cmd_id {
1572 /* Guest initialization commands */
1573 KVM_SEV_INIT = 0,
1574 KVM_SEV_ES_INIT,
1575 /* Guest launch commands */
1576 KVM_SEV_LAUNCH_START,
1577 KVM_SEV_LAUNCH_UPDATE_DATA,
1578 KVM_SEV_LAUNCH_UPDATE_VMSA,
1579 KVM_SEV_LAUNCH_SECRET,
1580 KVM_SEV_LAUNCH_MEASURE,
1581 KVM_SEV_LAUNCH_FINISH,
1582 /* Guest migration commands (outgoing) */
1583 KVM_SEV_SEND_START,
1584 KVM_SEV_SEND_UPDATE_DATA,
1585 KVM_SEV_SEND_UPDATE_VMSA,
1586 KVM_SEV_SEND_FINISH,
1587 /* Guest migration commands (incoming) */
1588 KVM_SEV_RECEIVE_START,
1589 KVM_SEV_RECEIVE_UPDATE_DATA,
1590 KVM_SEV_RECEIVE_UPDATE_VMSA,
1591 KVM_SEV_RECEIVE_FINISH,
1592 /* Guest status and debug commands */
1593 KVM_SEV_GUEST_STATUS,
1594 KVM_SEV_DBG_DECRYPT,
1595 KVM_SEV_DBG_ENCRYPT,
1596 /* Guest certificates commands */
1597 KVM_SEV_CERT_EXPORT,
2c07ded0
BS
1598 /* Attestation report */
1599 KVM_SEV_GET_ATTESTATION_REPORT,
dc48bae0
BS
1600
1601 KVM_SEV_NR_MAX,
1602};
1603
1604struct kvm_sev_cmd {
1605 __u32 id;
1606 __u64 data;
1607 __u32 error;
1608 __u32 sev_fd;
1609};
1610
1611struct kvm_sev_launch_start {
1612 __u32 handle;
1613 __u32 policy;
1614 __u64 dh_uaddr;
1615 __u32 dh_len;
1616 __u64 session_uaddr;
1617 __u32 session_len;
1618};
1619
1620struct kvm_sev_launch_update_data {
1621 __u64 uaddr;
1622 __u32 len;
1623};
1624
1625
1626struct kvm_sev_launch_secret {
1627 __u64 hdr_uaddr;
1628 __u32 hdr_len;
1629 __u64 guest_uaddr;
1630 __u32 guest_len;
1631 __u64 trans_uaddr;
1632 __u32 trans_len;
1633};
1634
1635struct kvm_sev_launch_measure {
1636 __u64 uaddr;
1637 __u32 len;
1638};
1639
1640struct kvm_sev_guest_status {
1641 __u32 handle;
1642 __u32 policy;
1643 __u32 state;
1644};
1645
1646struct kvm_sev_dbg {
1647 __u64 src_uaddr;
1648 __u64 dst_uaddr;
1649 __u32 len;
1650};
d98e6346 1651
2c07ded0
BS
1652struct kvm_sev_attestation_report {
1653 __u8 mnonce[16];
1654 __u64 uaddr;
1655 __u32 len;
1656};
1657
e56d532f 1658#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
07700a94
JK
1659#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
1660#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
e56d532f 1661
4d5c5d0f
BAY
1662struct kvm_assigned_pci_dev {
1663 __u32 assigned_dev_id;
1664 __u32 busnr;
1665 __u32 devfn;
1666 __u32 flags;
ab9f4ecb 1667 __u32 segnr;
bb45e202 1668 union {
ab9f4ecb 1669 __u32 reserved[11];
bb45e202 1670 };
4d5c5d0f
BAY
1671};
1672
e56d532f
SY
1673#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
1674#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
1675#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
1676
1677#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
1678#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
1679#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
1680
1681#define KVM_DEV_IRQ_HOST_MASK 0x00ff
1682#define KVM_DEV_IRQ_GUEST_MASK 0xff00
1683
4d5c5d0f
BAY
1684struct kvm_assigned_irq {
1685 __u32 assigned_dev_id;
91e3d71d 1686 __u32 host_irq; /* ignored (legacy field) */
4d5c5d0f
BAY
1687 __u32 guest_irq;
1688 __u32 flags;
bb45e202
AK
1689 union {
1690 __u32 reserved[12];
1691 };
4d5c5d0f
BAY
1692};
1693
c1e01514
SY
1694struct kvm_assigned_msix_nr {
1695 __u32 assigned_dev_id;
1696 __u16 entry_nr;
1697 __u16 padding;
1698};
1699
e7333391 1700#define KVM_MAX_MSIX_PER_DEV 256
c1e01514
SY
1701struct kvm_assigned_msix_entry {
1702 __u32 assigned_dev_id;
1703 __u32 gsi;
1704 __u16 entry; /* The index of entry in the MSI-X table */
1705 __u16 padding[3];
1706};
1707
37131313 1708#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
c519265f 1709#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
37131313 1710
3fe17e68
AG
1711/* Available with KVM_CAP_ARM_USER_IRQ */
1712
1713/* Bits for run->s.regs.device_irq_level */
1714#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
1715#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
1716#define KVM_ARM_DEV_PMU (1 << 2)
1717
faeb7833
RK
1718struct kvm_hyperv_eventfd {
1719 __u32 conn_id;
1720 __s32 fd;
1721 __u32 flags;
1722 __u32 padding[3];
1723};
1724
1725#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
1726#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
1727
3c9bd400
JZ
1728#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
1729#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
1730
fb04a1ed
PX
1731/*
1732 * Arch needs to define the macro after implementing the dirty ring
1733 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
1734 * starting page offset of the dirty ring structures.
1735 */
1736#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
1737#define KVM_DIRTY_LOG_PAGE_OFFSET 0
1738#endif
1739
1740/*
1741 * KVM dirty GFN flags, defined as:
1742 *
1743 * |---------------+---------------+--------------|
1744 * | bit 1 (reset) | bit 0 (dirty) | Status |
1745 * |---------------+---------------+--------------|
1746 * | 0 | 0 | Invalid GFN |
1747 * | 0 | 1 | Dirty GFN |
1748 * | 1 | X | GFN to reset |
1749 * |---------------+---------------+--------------|
1750 *
1751 * Lifecycle of a dirty GFN goes like:
1752 *
1753 * dirtied harvested reset
1754 * 00 -----------> 01 -------------> 1X -------+
1755 * ^ |
1756 * | |
1757 * +------------------------------------------+
1758 *
1759 * The userspace program is only responsible for the 01->1X state
1760 * conversion after harvesting an entry. Also, it must not skip any
1761 * dirty bits, so that dirty bits are always harvested in sequence.
1762 */
1763#define KVM_DIRTY_GFN_F_DIRTY BIT(0)
1764#define KVM_DIRTY_GFN_F_RESET BIT(1)
1765#define KVM_DIRTY_GFN_F_MASK 0x3
1766
1767/*
1768 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
1769 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
1770 * size of the gfn buffer is decided by the first argument when
1771 * enabling KVM_CAP_DIRTY_LOG_RING.
1772 */
1773struct kvm_dirty_gfn {
1774 __u32 flags;
1775 __u32 slot;
1776 __u64 offset;
1777};
1778
fe6b6bc8
CQ
1779#define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
1780#define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1)
1781
c54d2aba 1782#endif /* __LINUX_KVM_H */