]>
Commit | Line | Data |
---|---|---|
6f52b16c | 1 | /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ |
6aa8b732 AK |
2 | #ifndef __LINUX_KVM_H |
3 | #define __LINUX_KVM_H | |
4 | ||
5 | /* | |
6 | * Userspace interface for /dev/kvm - kernel based virtual machine | |
7 | * | |
dea8caee | 8 | * Note: you must update KVM_API_VERSION if you change this interface. |
6aa8b732 AK |
9 | */ |
10 | ||
fb1070d1 | 11 | #include <linux/const.h> |
00bfddaf | 12 | #include <linux/types.h> |
97646202 | 13 | #include <linux/compiler.h> |
6aa8b732 | 14 | #include <linux/ioctl.h> |
f6a40e3b | 15 | #include <asm/kvm.h> |
6aa8b732 | 16 | |
2ff81f70 | 17 | #define KVM_API_VERSION 12 |
0b76e20b | 18 | |
6bda055d PB |
19 | /* |
20 | * Backwards-compatible definitions. | |
21 | */ | |
22 | #define __KVM_HAVE_GUEST_DEBUG | |
23 | ||
6fc138d2 IE |
24 | /* for KVM_SET_USER_MEMORY_REGION */ |
25 | struct kvm_userspace_memory_region { | |
26 | __u32 slot; | |
27 | __u32 flags; | |
28 | __u64 guest_phys_addr; | |
29 | __u64 memory_size; /* bytes */ | |
30 | __u64 userspace_addr; /* start of the userspace allocated memory */ | |
31 | }; | |
32 | ||
bb58b90b SC |
33 | /* for KVM_SET_USER_MEMORY_REGION2 */ |
34 | struct kvm_userspace_memory_region2 { | |
35 | __u32 slot; | |
36 | __u32 flags; | |
37 | __u64 guest_phys_addr; | |
38 | __u64 memory_size; | |
39 | __u64 userspace_addr; | |
a7800aa8 SC |
40 | __u64 guest_memfd_offset; |
41 | __u32 guest_memfd; | |
42 | __u32 pad1; | |
43 | __u64 pad2[14]; | |
bb58b90b SC |
44 | }; |
45 | ||
67b29204 | 46 | /* |
30ee198c JMC |
47 | * The bit 0 ~ bit 15 of kvm_userspace_memory_region::flags are visible for |
48 | * userspace, other bits are reserved for kvm internal use which are defined | |
49 | * in include/linux/kvm_host.h. | |
67b29204 | 50 | */ |
4d8b81ab XG |
51 | #define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0) |
52 | #define KVM_MEM_READONLY (1UL << 1) | |
a7800aa8 | 53 | #define KVM_MEM_GUEST_MEMFD (1UL << 2) |
6aa8b732 | 54 | |
97222cc8 | 55 | /* for KVM_IRQ_LINE */ |
85f455f7 ED |
56 | struct kvm_irq_level { |
57 | /* | |
58 | * ACPI gsi notion of irq. | |
59 | * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47.. | |
60 | * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23.. | |
3ecad8c2 | 61 | * For ARM: See Documentation/virt/kvm/api.rst |
85f455f7 | 62 | */ |
4925663a GN |
63 | union { |
64 | __u32 irq; | |
65 | __s32 status; | |
66 | }; | |
85f455f7 ED |
67 | __u32 level; |
68 | }; | |
69 | ||
6ceb9d79 HQ |
70 | |
71 | struct kvm_irqchip { | |
72 | __u32 chip_id; | |
73 | __u32 pad; | |
74 | union { | |
75 | char dummy[512]; /* reserving space */ | |
7a0eb196 | 76 | #ifdef __KVM_HAVE_PIT |
6ceb9d79 | 77 | struct kvm_pic_state pic; |
ec10f475 | 78 | #endif |
7a0eb196 | 79 | #ifdef __KVM_HAVE_IOAPIC |
6bf9e962 | 80 | struct kvm_ioapic_state ioapic; |
51e29625 | 81 | #endif |
6ceb9d79 HQ |
82 | } chip; |
83 | }; | |
84 | ||
c5ff41ce JK |
85 | /* for KVM_CREATE_PIT2 */ |
86 | struct kvm_pit_config { | |
87 | __u32 flags; | |
88 | __u32 pad[15]; | |
89 | }; | |
90 | ||
91 | #define KVM_PIT_SPEAKER_DUMMY 1 | |
92 | ||
db397571 AS |
93 | struct kvm_hyperv_exit { |
94 | #define KVM_EXIT_HYPERV_SYNIC 1 | |
83326e43 | 95 | #define KVM_EXIT_HYPERV_HCALL 2 |
f97f5a56 | 96 | #define KVM_EXIT_HYPERV_SYNDBG 3 |
db397571 | 97 | __u32 type; |
f7d31e65 | 98 | __u32 pad1; |
db397571 AS |
99 | union { |
100 | struct { | |
101 | __u32 msr; | |
f7d31e65 | 102 | __u32 pad2; |
db397571 AS |
103 | __u64 control; |
104 | __u64 evt_page; | |
105 | __u64 msg_page; | |
106 | } synic; | |
83326e43 AS |
107 | struct { |
108 | __u64 input; | |
109 | __u64 result; | |
110 | __u64 params[2]; | |
111 | } hcall; | |
f97f5a56 JD |
112 | struct { |
113 | __u32 msr; | |
114 | __u32 pad2; | |
115 | __u64 control; | |
116 | __u64 status; | |
117 | __u64 send_page; | |
118 | __u64 recv_page; | |
119 | __u64 pending_page; | |
120 | } syndbg; | |
db397571 AS |
121 | } u; |
122 | }; | |
123 | ||
23200b7a JM |
124 | struct kvm_xen_exit { |
125 | #define KVM_EXIT_XEN_HCALL 1 | |
126 | __u32 type; | |
127 | union { | |
128 | struct { | |
129 | __u32 longmode; | |
130 | __u32 cpl; | |
131 | __u64 input; | |
132 | __u64 result; | |
133 | __u64 params[6]; | |
134 | } hcall; | |
135 | } u; | |
136 | }; | |
137 | ||
30ee2a98 JH |
138 | #define KVM_S390_GET_SKEYS_NONE 1 |
139 | #define KVM_S390_SKEYS_MAX 1048576 | |
140 | ||
8a45450d AK |
141 | #define KVM_EXIT_UNKNOWN 0 |
142 | #define KVM_EXIT_EXCEPTION 1 | |
143 | #define KVM_EXIT_IO 2 | |
144 | #define KVM_EXIT_HYPERCALL 3 | |
145 | #define KVM_EXIT_DEBUG 4 | |
146 | #define KVM_EXIT_HLT 5 | |
147 | #define KVM_EXIT_MMIO 6 | |
148 | #define KVM_EXIT_IRQ_WINDOW_OPEN 7 | |
149 | #define KVM_EXIT_SHUTDOWN 8 | |
150 | #define KVM_EXIT_FAIL_ENTRY 9 | |
151 | #define KVM_EXIT_INTR 10 | |
152 | #define KVM_EXIT_SET_TPR 11 | |
b209749f | 153 | #define KVM_EXIT_TPR_ACCESS 12 |
8f2abe6a | 154 | #define KVM_EXIT_S390_SIEIC 13 |
e28acfea | 155 | #define KVM_EXIT_S390_RESET 14 |
ce91ddc4 | 156 | #define KVM_EXIT_DCR 15 /* deprecated */ |
c4abb7c9 | 157 | #define KVM_EXIT_NMI 16 |
3f5d18a9 | 158 | #define KVM_EXIT_INTERNAL_ERROR 17 |
ad0a048b | 159 | #define KVM_EXIT_OSI 18 |
de56a948 | 160 | #define KVM_EXIT_PAPR_HCALL 19 |
e168bf8d | 161 | #define KVM_EXIT_S390_UCONTROL 20 |
f61c94bb | 162 | #define KVM_EXIT_WATCHDOG 21 |
fa6b7fe9 | 163 | #define KVM_EXIT_S390_TSCH 22 |
1c810636 | 164 | #define KVM_EXIT_EPR 23 |
8ad6b634 | 165 | #define KVM_EXIT_SYSTEM_EVENT 24 |
e44fc8c9 | 166 | #define KVM_EXIT_S390_STSI 25 |
7543a635 | 167 | #define KVM_EXIT_IOAPIC_EOI 26 |
db397571 | 168 | #define KVM_EXIT_HYPERV 27 |
c726200d | 169 | #define KVM_EXIT_ARM_NISV 28 |
1ae09954 AG |
170 | #define KVM_EXIT_X86_RDMSR 29 |
171 | #define KVM_EXIT_X86_WRMSR 30 | |
fb04a1ed | 172 | #define KVM_EXIT_DIRTY_RING_FULL 31 |
647daca2 | 173 | #define KVM_EXIT_AP_RESET_HOLD 32 |
fe6b6bc8 | 174 | #define KVM_EXIT_X86_BUS_LOCK 33 |
23200b7a | 175 | #define KVM_EXIT_XEN 34 |
dea8ee31 | 176 | #define KVM_EXIT_RISCV_SBI 35 |
8a061562 | 177 | #define KVM_EXIT_RISCV_CSR 36 |
63f4b210 | 178 | #define KVM_EXIT_NOTIFY 37 |
b37e6b68 | 179 | #define KVM_EXIT_LOONGARCH_IOCSR 38 |
16f95f3b | 180 | #define KVM_EXIT_MEMORY_FAULT 39 |
cf207eac | 181 | #define KVM_EXIT_TDX 40 |
3f5d18a9 AK |
182 | |
183 | /* For KVM_EXIT_INTERNAL_ERROR */ | |
b9bf6882 XG |
184 | /* Emulate instruction failed. */ |
185 | #define KVM_INTERNAL_ERROR_EMULATION 1 | |
186 | /* Encounter unexpected simultaneous exceptions. */ | |
187 | #define KVM_INTERNAL_ERROR_SIMUL_EX 2 | |
188 | /* Encounter unexpected vm-exit due to delivery event. */ | |
189 | #define KVM_INTERNAL_ERROR_DELIVERY_EV 3 | |
7396d337 LA |
190 | /* Encounter unexpected vm-exit reason */ |
191 | #define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4 | |
6aa8b732 | 192 | |
19238e75 AL |
193 | /* Flags that describe what fields in emulation_failure hold valid data. */ |
194 | #define KVM_INTERNAL_ERROR_EMULATION_FLAG_INSTRUCTION_BYTES (1ULL << 0) | |
195 | ||
4b23e0c1 DM |
196 | /* |
197 | * struct kvm_run can be modified by userspace at any time, so KVM must be | |
198 | * careful to avoid TOCTOU bugs. In order to protect KVM, HINT_UNSAFE_IN_KVM() | |
199 | * renames fields in struct kvm_run from <symbol> to <symbol>__unsafe when | |
200 | * compiled into the kernel, ensuring that any use within KVM is obvious and | |
201 | * gets extra scrutiny. | |
202 | */ | |
203 | #ifdef __KERNEL__ | |
204 | #define HINT_UNSAFE_IN_KVM(_symbol) _symbol##__unsafe | |
205 | #else | |
206 | #define HINT_UNSAFE_IN_KVM(_symbol) _symbol | |
207 | #endif | |
208 | ||
9a2bb7f4 | 209 | /* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */ |
6aa8b732 AK |
210 | struct kvm_run { |
211 | /* in */ | |
c1150d8c | 212 | __u8 request_interrupt_window; |
4b23e0c1 | 213 | __u8 HINT_UNSAFE_IN_KVM(immediate_exit); |
460df4c1 | 214 | __u8 padding1[6]; |
6aa8b732 AK |
215 | |
216 | /* out */ | |
6aa8b732 | 217 | __u32 exit_reason; |
c1150d8c DL |
218 | __u8 ready_for_interrupt_injection; |
219 | __u8 if_flag; | |
f077825a | 220 | __u16 flags; |
54810342 DL |
221 | |
222 | /* in (pre_kvm_run), out (post_kvm_run) */ | |
c1150d8c DL |
223 | __u64 cr8; |
224 | __u64 apic_base; | |
225 | ||
d7b0b5eb CO |
226 | #ifdef __KVM_S390 |
227 | /* the processor status word for s390 */ | |
228 | __u64 psw_mask; /* psw upper half */ | |
229 | __u64 psw_addr; /* psw lower half */ | |
230 | #endif | |
6aa8b732 AK |
231 | union { |
232 | /* KVM_EXIT_UNKNOWN */ | |
233 | struct { | |
8eb7d334 | 234 | __u64 hardware_exit_reason; |
6aa8b732 | 235 | } hw; |
8eb7d334 AK |
236 | /* KVM_EXIT_FAIL_ENTRY */ |
237 | struct { | |
238 | __u64 hardware_entry_failure_reason; | |
1aa561b1 | 239 | __u32 cpu; |
8eb7d334 | 240 | } fail_entry; |
6aa8b732 AK |
241 | /* KVM_EXIT_EXCEPTION */ |
242 | struct { | |
243 | __u32 exception; | |
244 | __u32 error_code; | |
245 | } ex; | |
246 | /* KVM_EXIT_IO */ | |
2f8b9ee1 | 247 | struct { |
6aa8b732 AK |
248 | #define KVM_EXIT_IO_IN 0 |
249 | #define KVM_EXIT_IO_OUT 1 | |
250 | __u8 direction; | |
251 | __u8 size; /* bytes */ | |
6aa8b732 | 252 | __u16 port; |
039576c0 AK |
253 | __u32 count; |
254 | __u64 data_offset; /* relative to kvm_run start */ | |
6aa8b732 | 255 | } io; |
8ab30c15 | 256 | /* KVM_EXIT_DEBUG */ |
6aa8b732 | 257 | struct { |
d0bfb940 | 258 | struct kvm_debug_exit_arch arch; |
6aa8b732 AK |
259 | } debug; |
260 | /* KVM_EXIT_MMIO */ | |
261 | struct { | |
262 | __u64 phys_addr; | |
263 | __u8 data[8]; | |
264 | __u32 len; | |
265 | __u8 is_write; | |
266 | } mmio; | |
b37e6b68 TZ |
267 | /* KVM_EXIT_LOONGARCH_IOCSR */ |
268 | struct { | |
269 | __u64 phys_addr; | |
270 | __u8 data[8]; | |
271 | __u32 len; | |
272 | __u8 is_write; | |
273 | } iocsr_io; | |
b4e63f56 AK |
274 | /* KVM_EXIT_HYPERCALL */ |
275 | struct { | |
519ef353 | 276 | __u64 nr; |
b4e63f56 AK |
277 | __u64 args[6]; |
278 | __u64 ret; | |
e65733b5 OU |
279 | |
280 | union { | |
281 | #ifndef __KERNEL__ | |
282 | __u32 longmode; | |
283 | #endif | |
284 | __u64 flags; | |
285 | }; | |
b4e63f56 | 286 | } hypercall; |
b209749f AK |
287 | /* KVM_EXIT_TPR_ACCESS */ |
288 | struct { | |
289 | __u64 rip; | |
290 | __u32 is_write; | |
291 | __u32 pad; | |
292 | } tpr_access; | |
8f2abe6a CB |
293 | /* KVM_EXIT_S390_SIEIC */ |
294 | struct { | |
295 | __u8 icptcode; | |
8f2abe6a CB |
296 | __u16 ipa; |
297 | __u32 ipb; | |
298 | } s390_sieic; | |
e28acfea | 299 | /* KVM_EXIT_S390_RESET */ |
e28acfea | 300 | __u64 s390_reset_flags; |
e168bf8d CO |
301 | /* KVM_EXIT_S390_UCONTROL */ |
302 | struct { | |
303 | __u64 trans_exc_code; | |
304 | __u32 pgm_code; | |
305 | } s390_ucontrol; | |
ce91ddc4 | 306 | /* KVM_EXIT_DCR (deprecated) */ |
b2312f05 HB |
307 | struct { |
308 | __u32 dcrn; | |
309 | __u32 data; | |
310 | __u8 is_write; | |
311 | } dcr; | |
8ab30c15 | 312 | /* KVM_EXIT_INTERNAL_ERROR */ |
3f5d18a9 AK |
313 | struct { |
314 | __u32 suberror; | |
a9c7399d AK |
315 | /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */ |
316 | __u32 ndata; | |
317 | __u64 data[16]; | |
3f5d18a9 | 318 | } internal; |
19238e75 AL |
319 | /* |
320 | * KVM_INTERNAL_ERROR_EMULATION | |
321 | * | |
322 | * "struct emulation_failure" is an overlay of "struct internal" | |
323 | * that is used for the KVM_INTERNAL_ERROR_EMULATION sub-type of | |
324 | * KVM_EXIT_INTERNAL_ERROR. Note, unlike other internal error | |
325 | * sub-types, this struct is ABI! It also needs to be backwards | |
326 | * compatible with "struct internal". Take special care that | |
327 | * "ndata" is correct, that new fields are enumerated in "flags", | |
328 | * and that each flag enumerates fields that are 64-bit aligned | |
329 | * and sized (so that ndata+internal.data[] is valid/accurate). | |
e615e355 DE |
330 | * |
331 | * Space beyond the defined fields may be used to store arbitrary | |
332 | * debug information relating to the emulation failure. It is | |
333 | * accounted for in "ndata" but the format is unspecified and is | |
334 | * not represented in "flags". Any such information is *not* ABI! | |
19238e75 AL |
335 | */ |
336 | struct { | |
337 | __u32 suberror; | |
338 | __u32 ndata; | |
339 | __u64 flags; | |
a9d496d8 DE |
340 | union { |
341 | struct { | |
342 | __u8 insn_size; | |
343 | __u8 insn_bytes[15]; | |
344 | }; | |
345 | }; | |
e615e355 | 346 | /* Arbitrary debug data may follow. */ |
19238e75 | 347 | } emulation_failure; |
ad0a048b AG |
348 | /* KVM_EXIT_OSI */ |
349 | struct { | |
350 | __u64 gprs[32]; | |
351 | } osi; | |
8ab30c15 | 352 | /* KVM_EXIT_PAPR_HCALL */ |
de56a948 PM |
353 | struct { |
354 | __u64 nr; | |
355 | __u64 ret; | |
356 | __u64 args[9]; | |
357 | } papr_hcall; | |
fa6b7fe9 CH |
358 | /* KVM_EXIT_S390_TSCH */ |
359 | struct { | |
360 | __u16 subchannel_id; | |
361 | __u16 subchannel_nr; | |
362 | __u32 io_int_parm; | |
363 | __u32 io_int_word; | |
364 | __u32 ipb; | |
365 | __u8 dequeued; | |
366 | } s390_tsch; | |
1c810636 AG |
367 | /* KVM_EXIT_EPR */ |
368 | struct { | |
369 | __u32 epr; | |
370 | } epr; | |
8ad6b634 AP |
371 | /* KVM_EXIT_SYSTEM_EVENT */ |
372 | struct { | |
373 | #define KVM_SYSTEM_EVENT_SHUTDOWN 1 | |
374 | #define KVM_SYSTEM_EVENT_RESET 2 | |
2ce79189 | 375 | #define KVM_SYSTEM_EVENT_CRASH 3 |
7b33a09d | 376 | #define KVM_SYSTEM_EVENT_WAKEUP 4 |
bfbab445 | 377 | #define KVM_SYSTEM_EVENT_SUSPEND 5 |
47e8eec8 | 378 | #define KVM_SYSTEM_EVENT_SEV_TERM 6 |
79462faa | 379 | #define KVM_SYSTEM_EVENT_TDX_FATAL 7 |
8ad6b634 | 380 | __u32 type; |
c24a950e | 381 | __u32 ndata; |
d495f942 PB |
382 | union { |
383 | #ifndef __KERNEL__ | |
384 | __u64 flags; | |
385 | #endif | |
386 | __u64 data[16]; | |
387 | }; | |
8ad6b634 | 388 | } system_event; |
e44fc8c9 ET |
389 | /* KVM_EXIT_S390_STSI */ |
390 | struct { | |
391 | __u64 addr; | |
392 | __u8 ar; | |
393 | __u8 reserved; | |
394 | __u8 fc; | |
395 | __u8 sel1; | |
396 | __u16 sel2; | |
397 | } s390_stsi; | |
7543a635 SR |
398 | /* KVM_EXIT_IOAPIC_EOI */ |
399 | struct { | |
400 | __u8 vector; | |
401 | } eoi; | |
db397571 AS |
402 | /* KVM_EXIT_HYPERV */ |
403 | struct kvm_hyperv_exit hyperv; | |
c726200d CD |
404 | /* KVM_EXIT_ARM_NISV */ |
405 | struct { | |
406 | __u64 esr_iss; | |
407 | __u64 fault_ipa; | |
408 | } arm_nisv; | |
1ae09954 AG |
409 | /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */ |
410 | struct { | |
411 | __u8 error; /* user -> kernel */ | |
412 | __u8 pad[7]; | |
413 | #define KVM_MSR_EXIT_REASON_INVAL (1 << 0) | |
414 | #define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1) | |
1a155254 | 415 | #define KVM_MSR_EXIT_REASON_FILTER (1 << 2) |
db205f7e AL |
416 | #define KVM_MSR_EXIT_REASON_VALID_MASK (KVM_MSR_EXIT_REASON_INVAL | \ |
417 | KVM_MSR_EXIT_REASON_UNKNOWN | \ | |
418 | KVM_MSR_EXIT_REASON_FILTER) | |
1ae09954 AG |
419 | __u32 reason; /* kernel -> user */ |
420 | __u32 index; /* kernel -> user */ | |
421 | __u64 data; /* kernel <-> user */ | |
422 | } msr; | |
23200b7a JM |
423 | /* KVM_EXIT_XEN */ |
424 | struct kvm_xen_exit xen; | |
dea8ee31 AP |
425 | /* KVM_EXIT_RISCV_SBI */ |
426 | struct { | |
427 | unsigned long extension_id; | |
428 | unsigned long function_id; | |
429 | unsigned long args[6]; | |
430 | unsigned long ret[2]; | |
431 | } riscv_sbi; | |
8a061562 AP |
432 | /* KVM_EXIT_RISCV_CSR */ |
433 | struct { | |
434 | unsigned long csr_num; | |
435 | unsigned long new_value; | |
436 | unsigned long write_mask; | |
437 | unsigned long ret_value; | |
438 | } riscv_csr; | |
2f4073e0 TX |
439 | /* KVM_EXIT_NOTIFY */ |
440 | struct { | |
441 | #define KVM_NOTIFY_CONTEXT_INVALID (1 << 0) | |
442 | __u32 flags; | |
443 | } notify; | |
16f95f3b CP |
444 | /* KVM_EXIT_MEMORY_FAULT */ |
445 | struct { | |
8dd2eee9 | 446 | #define KVM_MEMORY_EXIT_FLAG_PRIVATE (1ULL << 3) |
16f95f3b CP |
447 | __u64 flags; |
448 | __u64 gpa; | |
449 | __u64 size; | |
450 | } memory_fault; | |
cf207eac BW |
451 | /* KVM_EXIT_TDX */ |
452 | struct { | |
453 | __u64 flags; | |
454 | __u64 nr; | |
455 | union { | |
456 | struct { | |
457 | __u64 ret; | |
458 | __u64 data[5]; | |
459 | } unknown; | |
460 | struct { | |
461 | __u64 ret; | |
462 | __u64 gpa; | |
463 | __u64 size; | |
464 | } get_quote; | |
25e8b1dd BW |
465 | struct { |
466 | __u64 ret; | |
467 | __u64 leaf; | |
468 | __u64 r11, r12, r13, r14; | |
469 | } get_tdvmcall_info; | |
cf207eac BW |
470 | }; |
471 | } tdx; | |
24cbc7e9 AK |
472 | /* Fix the size of the union. */ |
473 | char padding[256]; | |
6aa8b732 | 474 | }; |
b9e5dc8d | 475 | |
7b7e3952 KH |
476 | /* 2048 is the size of the char array used to bound/pad the size |
477 | * of the union that holds sync regs. | |
478 | */ | |
479 | #define SYNC_REGS_SIZE_BYTES 2048 | |
b9e5dc8d CB |
480 | /* |
481 | * shared registers between kvm and userspace. | |
482 | * kvm_valid_regs specifies the register classes set by the host | |
483 | * kvm_dirty_regs specified the register classes dirtied by userspace | |
484 | * struct kvm_sync_regs is architecture specific, as well as the | |
485 | * bits for kvm_valid_regs and kvm_dirty_regs | |
486 | */ | |
487 | __u64 kvm_valid_regs; | |
488 | __u64 kvm_dirty_regs; | |
489 | union { | |
490 | struct kvm_sync_regs regs; | |
7b7e3952 | 491 | char padding[SYNC_REGS_SIZE_BYTES]; |
b9e5dc8d | 492 | } s; |
6aa8b732 AK |
493 | }; |
494 | ||
5f94c174 LV |
495 | /* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */ |
496 | ||
497 | struct kvm_coalesced_mmio_zone { | |
498 | __u64 addr; | |
499 | __u32 size; | |
0804c849 PH |
500 | union { |
501 | __u32 pad; | |
502 | __u32 pio; | |
503 | }; | |
5f94c174 LV |
504 | }; |
505 | ||
506 | struct kvm_coalesced_mmio { | |
507 | __u64 phys_addr; | |
508 | __u32 len; | |
0804c849 PH |
509 | union { |
510 | __u32 pad; | |
511 | __u32 pio; | |
512 | }; | |
5f94c174 LV |
513 | __u8 data[8]; |
514 | }; | |
515 | ||
516 | struct kvm_coalesced_mmio_ring { | |
517 | __u32 first, last; | |
94dfc73e | 518 | struct kvm_coalesced_mmio coalesced_mmio[]; |
5f94c174 LV |
519 | }; |
520 | ||
521 | #define KVM_COALESCED_MMIO_MAX \ | |
522 | ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \ | |
523 | sizeof(struct kvm_coalesced_mmio)) | |
524 | ||
6aa8b732 AK |
525 | /* for KVM_TRANSLATE */ |
526 | struct kvm_translation { | |
527 | /* in */ | |
528 | __u64 linear_address; | |
6aa8b732 AK |
529 | |
530 | /* out */ | |
531 | __u64 physical_address; | |
532 | __u8 valid; | |
533 | __u8 writeable; | |
534 | __u8 usermode; | |
8cd13307 | 535 | __u8 pad[5]; |
6aa8b732 AK |
536 | }; |
537 | ||
538 | /* for KVM_INTERRUPT */ | |
539 | struct kvm_interrupt { | |
540 | /* in */ | |
6aa8b732 AK |
541 | __u32 irq; |
542 | }; | |
543 | ||
6aa8b732 AK |
544 | /* for KVM_GET_DIRTY_LOG */ |
545 | struct kvm_dirty_log { | |
546 | __u32 slot; | |
2f8b9ee1 | 547 | __u32 padding1; |
6aa8b732 AK |
548 | union { |
549 | void __user *dirty_bitmap; /* one bit per page */ | |
2f8b9ee1 | 550 | __u64 padding2; |
6aa8b732 AK |
551 | }; |
552 | }; | |
553 | ||
2a31b9db PB |
554 | /* for KVM_CLEAR_DIRTY_LOG */ |
555 | struct kvm_clear_dirty_log { | |
556 | __u32 slot; | |
557 | __u32 num_pages; | |
558 | __u64 first_page; | |
559 | union { | |
560 | void __user *dirty_bitmap; /* one bit per page */ | |
561 | __u64 padding2; | |
562 | }; | |
563 | }; | |
564 | ||
1961d276 AK |
565 | /* for KVM_SET_SIGNAL_MASK */ |
566 | struct kvm_signal_mask { | |
567 | __u32 len; | |
94dfc73e | 568 | __u8 sigset[]; |
1961d276 AK |
569 | }; |
570 | ||
b209749f AK |
571 | /* for KVM_TPR_ACCESS_REPORTING */ |
572 | struct kvm_tpr_access_ctl { | |
573 | __u32 enabled; | |
574 | __u32 flags; | |
575 | __u32 reserved[8]; | |
576 | }; | |
577 | ||
b93463aa AK |
578 | /* for KVM_SET_VAPIC_ADDR */ |
579 | struct kvm_vapic_addr { | |
580 | __u64 vapic_addr; | |
581 | }; | |
582 | ||
0b4820d6 | 583 | /* for KVM_SET_MP_STATE */ |
62d9f0db | 584 | |
0b4820d6 | 585 | /* not all states are valid on all architectures */ |
62d9f0db MT |
586 | #define KVM_MP_STATE_RUNNABLE 0 |
587 | #define KVM_MP_STATE_UNINITIALIZED 1 | |
588 | #define KVM_MP_STATE_INIT_RECEIVED 2 | |
589 | #define KVM_MP_STATE_HALTED 3 | |
590 | #define KVM_MP_STATE_SIPI_RECEIVED 4 | |
6352e4d2 DH |
591 | #define KVM_MP_STATE_STOPPED 5 |
592 | #define KVM_MP_STATE_CHECK_STOP 6 | |
593 | #define KVM_MP_STATE_OPERATING 7 | |
594 | #define KVM_MP_STATE_LOAD 8 | |
647daca2 | 595 | #define KVM_MP_STATE_AP_RESET_HOLD 9 |
7b33a09d | 596 | #define KVM_MP_STATE_SUSPENDED 10 |
62d9f0db MT |
597 | |
598 | struct kvm_mp_state { | |
599 | __u32 mp_state; | |
600 | }; | |
601 | ||
d0bfb940 JK |
602 | /* for KVM_SET_GUEST_DEBUG */ |
603 | ||
604 | #define KVM_GUESTDBG_ENABLE 0x00000001 | |
605 | #define KVM_GUESTDBG_SINGLESTEP 0x00000002 | |
606 | ||
607 | struct kvm_guest_debug { | |
608 | __u32 control; | |
609 | __u32 pad; | |
610 | struct kvm_guest_debug_arch arch; | |
611 | }; | |
612 | ||
d34e6b17 GH |
613 | enum { |
614 | kvm_ioeventfd_flag_nr_datamatch, | |
615 | kvm_ioeventfd_flag_nr_pio, | |
616 | kvm_ioeventfd_flag_nr_deassign, | |
2b83451b | 617 | kvm_ioeventfd_flag_nr_virtio_ccw_notify, |
68c3b4d1 | 618 | kvm_ioeventfd_flag_nr_fast_mmio, |
d34e6b17 GH |
619 | kvm_ioeventfd_flag_nr_max, |
620 | }; | |
621 | ||
622 | #define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch) | |
623 | #define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio) | |
624 | #define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign) | |
2b83451b CH |
625 | #define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \ |
626 | (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify) | |
d34e6b17 GH |
627 | |
628 | #define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1) | |
629 | ||
630 | struct kvm_ioeventfd { | |
631 | __u64 datamatch; | |
632 | __u64 addr; /* legal pio/mmio address */ | |
f848a5a8 | 633 | __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */ |
d34e6b17 GH |
634 | __s32 fd; |
635 | __u32 flags; | |
636 | __u8 pad[36]; | |
637 | }; | |
638 | ||
5e62493f | 639 | #define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0) |
766d3571 | 640 | #define KVM_X86_DISABLE_EXITS_HLT (1 << 1) |
5e62493f | 641 | #define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2) |
b5170063 | 642 | #define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3) |
5e62493f | 643 | |
71fbfd5f AG |
644 | /* for KVM_ENABLE_CAP */ |
645 | struct kvm_enable_cap { | |
646 | /* in */ | |
647 | __u32 cap; | |
648 | __u32 flags; | |
649 | __u64 args[4]; | |
650 | __u8 pad[64]; | |
651 | }; | |
652 | ||
6aa8b732 AK |
653 | #define KVMIO 0xAE |
654 | ||
e08b9637 CO |
655 | /* machine type bits, to be used as argument to KVM_CREATE_VM */ |
656 | #define KVM_VM_S390_UCONTROL 1 | |
657 | ||
cbbc58d4 AK |
658 | /* on ppc, 0 indicate default, 1 should force HV and 2 PR */ |
659 | #define KVM_VM_PPC_HV 1 | |
660 | #define KVM_VM_PPC_PR 2 | |
661 | ||
15e9e35c HC |
662 | /* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */ |
663 | #define KVM_VM_MIPS_AUTO 0 | |
a8a3c426 | 664 | #define KVM_VM_MIPS_VZ 1 |
15e9e35c | 665 | #define KVM_VM_MIPS_TE 2 |
a8a3c426 | 666 | |
5b1c1493 CO |
667 | #define KVM_S390_SIE_PAGE_OFFSET 1 |
668 | ||
233a7cb2 SP |
669 | /* |
670 | * On arm64, machine type can be used to request the physical | |
671 | * address size for the VM. Bits[7-0] are reserved for the guest | |
672 | * PA size shift (i.e, log2(PA_Size)). For backward compatibility, | |
673 | * value 0 implies the default IPA size, 40bits. | |
674 | */ | |
675 | #define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL | |
676 | #define KVM_VM_TYPE_ARM_IPA_SIZE(x) \ | |
677 | ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK) | |
f17abe9a AK |
678 | /* |
679 | * ioctls for /dev/kvm fds: | |
680 | */ | |
739872c5 AK |
681 | #define KVM_GET_API_VERSION _IO(KVMIO, 0x00) |
682 | #define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */ | |
683 | #define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list) | |
b0c632db HC |
684 | |
685 | #define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06) | |
5d308f45 AK |
686 | /* |
687 | * Check if a kvm extension is available. Argument is extension number, | |
688 | * return is 1 (yes) or 0 (no, sorry). | |
689 | */ | |
690 | #define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03) | |
07c45a36 AK |
691 | /* |
692 | * Get size for mmap(vcpu_fd) | |
693 | */ | |
694 | #define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */ | |
674eea0f | 695 | #define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2) |
9c15bb1d | 696 | #define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2) |
801e459a | 697 | #define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list) |
c54d2aba | 698 | |
85f455f7 ED |
699 | /* |
700 | * Extension capability list. | |
701 | */ | |
702 | #define KVM_CAP_IRQCHIP 0 | |
b6958ce4 | 703 | #define KVM_CAP_HLT 1 |
82ce2c96 | 704 | #define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2 |
6fc138d2 | 705 | #define KVM_CAP_USER_MEMORY 3 |
cbc94022 | 706 | #define KVM_CAP_SET_TSS_ADDR 4 |
b209749f | 707 | #define KVM_CAP_VAPIC 6 |
674eea0f | 708 | #define KVM_CAP_EXT_CPUID 7 |
18068523 | 709 | #define KVM_CAP_CLOCKSOURCE 8 |
8c3ba334 | 710 | #define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */ |
a988b910 | 711 | #define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */ |
7837699f | 712 | #define KVM_CAP_PIT 11 |
a28e4f5a | 713 | #define KVM_CAP_NOP_IO_DELAY 12 |
2f333bcb | 714 | #define KVM_CAP_PV_MMU 13 |
62d9f0db | 715 | #define KVM_CAP_MP_STATE 14 |
5f94c174 | 716 | #define KVM_CAP_COALESCED_MMIO 15 |
ed848624 | 717 | #define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */ |
62c476c7 | 718 | #define KVM_CAP_IOMMU 18 |
1a811b61 AK |
719 | /* Bug in KVM_SET_USER_MEMORY_REGION fixed: */ |
720 | #define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21 | |
4531220b | 721 | #define KVM_CAP_USER_NMI 22 |
d0bfb940 | 722 | #define KVM_CAP_SET_GUEST_DEBUG 23 |
91b2ae77 | 723 | #ifdef __KVM_HAVE_PIT |
52d939a0 | 724 | #define KVM_CAP_REINJECT_CONTROL 24 |
399ec807 | 725 | #endif |
399ec807 | 726 | #define KVM_CAP_IRQ_ROUTING 25 |
4925663a | 727 | #define KVM_CAP_IRQ_INJECT_STATUS 26 |
e56d532f | 728 | #define KVM_CAP_ASSIGN_DEV_IRQ 29 |
4cd481f6 JK |
729 | /* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */ |
730 | #define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30 | |
890ca9ae YH |
731 | #ifdef __KVM_HAVE_MCE |
732 | #define KVM_CAP_MCE 31 | |
733 | #endif | |
721eecbf | 734 | #define KVM_CAP_IRQFD 32 |
c5ff41ce JK |
735 | #ifdef __KVM_HAVE_PIT |
736 | #define KVM_CAP_PIT2 33 | |
737 | #endif | |
73880c80 | 738 | #define KVM_CAP_SET_BOOT_CPU_ID 34 |
e9f42757 BK |
739 | #ifdef __KVM_HAVE_PIT_STATE2 |
740 | #define KVM_CAP_PIT_STATE2 35 | |
741 | #endif | |
d34e6b17 | 742 | #define KVM_CAP_IOEVENTFD 36 |
b927a3ce | 743 | #define KVM_CAP_SET_IDENTITY_MAP_ADDR 37 |
ffde22ac ES |
744 | #ifdef __KVM_HAVE_XEN_HVM |
745 | #define KVM_CAP_XEN_HVM 38 | |
746 | #endif | |
afbcf7ab | 747 | #define KVM_CAP_ADJUST_CLOCK 39 |
a9c7399d | 748 | #define KVM_CAP_INTERNAL_ERROR_DATA 40 |
3cfc3092 JK |
749 | #ifdef __KVM_HAVE_VCPU_EVENTS |
750 | #define KVM_CAP_VCPU_EVENTS 41 | |
751 | #endif | |
d7b0b5eb | 752 | #define KVM_CAP_S390_PSW 42 |
e15a1137 | 753 | #define KVM_CAP_PPC_SEGSTATE 43 |
55cd8e5a | 754 | #define KVM_CAP_HYPERV 44 |
10388a07 | 755 | #define KVM_CAP_HYPERV_VAPIC 45 |
c25bc163 | 756 | #define KVM_CAP_HYPERV_SPIN 46 |
ab9f4ecb | 757 | #define KVM_CAP_PCI_SEGMENT 47 |
c10207fe | 758 | #define KVM_CAP_PPC_PAIRED_SINGLES 48 |
48005f64 | 759 | #define KVM_CAP_INTR_SHADOW 49 |
a1efbe77 JK |
760 | #ifdef __KVM_HAVE_DEBUGREGS |
761 | #define KVM_CAP_DEBUGREGS 50 | |
762 | #endif | |
d2be1651 | 763 | #define KVM_CAP_X86_ROBUST_SINGLESTEP 51 |
ad0a048b | 764 | #define KVM_CAP_PPC_OSI 52 |
18978768 | 765 | #define KVM_CAP_PPC_UNSET_IRQ 53 |
71fbfd5f | 766 | #define KVM_CAP_ENABLE_CAP 54 |
2d5b5a66 SY |
767 | #ifdef __KVM_HAVE_XSAVE |
768 | #define KVM_CAP_XSAVE 55 | |
769 | #endif | |
770 | #ifdef __KVM_HAVE_XCRS | |
771 | #define KVM_CAP_XCRS 56 | |
772 | #endif | |
15711e9c | 773 | #define KVM_CAP_PPC_GET_PVINFO 57 |
7b4203e8 | 774 | #define KVM_CAP_PPC_IRQ_LEVEL 58 |
344d9588 | 775 | #define KVM_CAP_ASYNC_PF 59 |
92a1f12d JR |
776 | #define KVM_CAP_TSC_CONTROL 60 |
777 | #define KVM_CAP_GET_TSC_KHZ 61 | |
5ce941ee | 778 | #define KVM_CAP_PPC_BOOKE_SREGS 62 |
54738c09 | 779 | #define KVM_CAP_SPAPR_TCE 63 |
371fefd6 | 780 | #define KVM_CAP_PPC_SMT 64 |
aa04b4cc | 781 | #define KVM_CAP_PPC_RMA 65 |
8c3ba334 | 782 | #define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */ |
1022fc3d | 783 | #define KVM_CAP_PPC_HIOR 67 |
930b412a | 784 | #define KVM_CAP_PPC_PAPR 68 |
dc83b8bc | 785 | #define KVM_CAP_SW_TLB 69 |
e24ed81f | 786 | #define KVM_CAP_ONE_REG 70 |
b6cf8788 | 787 | #define KVM_CAP_S390_GMAP 71 |
4d25a066 | 788 | #define KVM_CAP_TSC_DEADLINE_TIMER 72 |
1efd0f59 | 789 | #define KVM_CAP_S390_UCONTROL 73 |
b9e5dc8d | 790 | #define KVM_CAP_SYNC_REGS 74 |
07700a94 | 791 | #define KVM_CAP_PCI_2_3 75 |
1c0b28c2 | 792 | #define KVM_CAP_KVMCLOCK_CTRL 76 |
07975ad3 | 793 | #define KVM_CAP_SIGNAL_MSI 77 |
5b74716e | 794 | #define KVM_CAP_PPC_GET_SMMU_INFO 78 |
1526bf9c | 795 | #define KVM_CAP_S390_COW 79 |
32fad281 | 796 | #define KVM_CAP_PPC_ALLOC_HTAB 80 |
4d8b81ab | 797 | #define KVM_CAP_READONLY_MEM 81 |
7a84428a | 798 | #define KVM_CAP_IRQFD_RESAMPLE 82 |
f61c94bb | 799 | #define KVM_CAP_PPC_BOOKE_WATCHDOG 83 |
a2932923 | 800 | #define KVM_CAP_PPC_HTAB_FD 84 |
fa6b7fe9 | 801 | #define KVM_CAP_S390_CSS_SUPPORT 85 |
1c810636 | 802 | #define KVM_CAP_PPC_EPR 86 |
aa024c2f | 803 | #define KVM_CAP_ARM_PSCI 87 |
3401d546 | 804 | #define KVM_CAP_ARM_SET_DEVICE_ADDR 88 |
852b6d57 | 805 | #define KVM_CAP_DEVICE_CTRL 89 |
eb1e4f43 | 806 | #define KVM_CAP_IRQ_MPIC 90 |
8e591cb7 | 807 | #define KVM_CAP_PPC_RTAS 91 |
5975a2e0 | 808 | #define KVM_CAP_IRQ_XICS 92 |
0d854a60 | 809 | #define KVM_CAP_ARM_EL1_32BIT 93 |
0bd50dc9 | 810 | #define KVM_CAP_SPAPR_MULTITCE 94 |
9c15bb1d | 811 | #define KVM_CAP_EXT_EMUL_CPUID 95 |
e984097b | 812 | #define KVM_CAP_HYPERV_TIME 96 |
100943c5 | 813 | #define KVM_CAP_IOAPIC_POLARITY_IGNORED 97 |
d938dc55 | 814 | #define KVM_CAP_ENABLE_CAP_VM 98 |
84223598 | 815 | #define KVM_CAP_S390_IRQCHIP 99 |
f848a5a8 | 816 | #define KVM_CAP_IOEVENTFD_NO_LENGTH 100 |
63b5cf04 | 817 | #define KVM_CAP_VM_ATTRIBUTES 101 |
717abd20 | 818 | #define KVM_CAP_ARM_PSCI_0_2 102 |
53ea2e46 | 819 | #define KVM_CAP_PPC_FIXUP_HCALL 103 |
699a0ea0 | 820 | #define KVM_CAP_PPC_ENABLE_HCALL 104 |
92b591a4 | 821 | #define KVM_CAP_CHECK_EXTENSION_VM 105 |
2444b352 | 822 | #define KVM_CAP_S390_USER_SIGP 106 |
68c55750 | 823 | #define KVM_CAP_S390_VECTOR_REGISTERS 107 |
41408c28 | 824 | #define KVM_CAP_S390_MEM_OP 108 |
e44fc8c9 | 825 | #define KVM_CAP_S390_USER_STSI 109 |
30ee2a98 | 826 | #define KVM_CAP_S390_SKEYS 110 |
5fafd874 | 827 | #define KVM_CAP_MIPS_FPU 111 |
d952bd07 | 828 | #define KVM_CAP_MIPS_MSA 112 |
47b43c52 | 829 | #define KVM_CAP_S390_INJECT_IRQ 113 |
816c7667 | 830 | #define KVM_CAP_S390_IRQ_STATE 114 |
e928e9cb | 831 | #define KVM_CAP_PPC_HWRNG 115 |
90de4a18 | 832 | #define KVM_CAP_DISABLE_QUIRKS 116 |
f077825a | 833 | #define KVM_CAP_X86_SMM 117 |
f481b069 | 834 | #define KVM_CAP_MULTI_ADDRESS_SPACE 118 |
5540546b AB |
835 | #define KVM_CAP_GUEST_DEBUG_HW_BPS 119 |
836 | #define KVM_CAP_GUEST_DEBUG_HW_WPS 120 | |
49df6397 | 837 | #define KVM_CAP_SPLIT_IRQCHIP 121 |
e9ea5069 | 838 | #define KVM_CAP_IOEVENTFD_ANY_LENGTH 122 |
5c919412 | 839 | #define KVM_CAP_HYPERV_SYNIC 123 |
c6e5f166 | 840 | #define KVM_CAP_S390_RI 124 |
01d01d69 | 841 | #define KVM_CAP_SPAPR_TCE_64 125 |
ab92f308 PB |
842 | #define KVM_CAP_ARM_PMU_V3 126 |
843 | #define KVM_CAP_VCPU_ATTRIBUTES 127 | |
0b1b1dfd | 844 | #define KVM_CAP_MAX_VCPU_ID 128 |
37131313 | 845 | #define KVM_CAP_X2APIC_API 129 |
6502a34c | 846 | #define KVM_CAP_S390_USER_INSTR0 130 |
912902ce | 847 | #define KVM_CAP_MSI_DEVID 131 |
23528bb2 | 848 | #define KVM_CAP_PPC_HTM 132 |
ef1ead0c | 849 | #define KVM_CAP_SPAPR_RESIZE_HPT 133 |
c9270132 PM |
850 | #define KVM_CAP_PPC_MMU_RADIX 134 |
851 | #define KVM_CAP_PPC_MMU_HASH_V3 135 | |
460df4c1 | 852 | #define KVM_CAP_IMMEDIATE_EXIT 136 |
a8a3c426 JH |
853 | #define KVM_CAP_MIPS_VZ 137 |
854 | #define KVM_CAP_MIPS_TE 138 | |
578fd61d | 855 | #define KVM_CAP_MIPS_64BIT 139 |
f7b1a77d RK |
856 | #define KVM_CAP_S390_GS 140 |
857 | #define KVM_CAP_S390_AIS 141 | |
4898d3f4 | 858 | #define KVM_CAP_SPAPR_TCE_VFIO 142 |
4d5422ce | 859 | #define KVM_CAP_X86_DISABLE_EXITS 143 |
c24a7be2 | 860 | #define KVM_CAP_ARM_USER_IRQ 144 |
4036e387 | 861 | #define KVM_CAP_S390_CMMA_MIGRATION 145 |
8a53e7e5 PB |
862 | #define KVM_CAP_PPC_FWNMI 146 |
863 | #define KVM_CAP_PPC_SMT_POSSIBLE 147 | |
efc479e6 | 864 | #define KVM_CAP_HYPERV_SYNIC2 148 |
d3457c87 | 865 | #define KVM_CAP_HYPERV_VP_INDEX 149 |
da9a1446 | 866 | #define KVM_CAP_S390_AIS_MIGRATION 150 |
3214d01f | 867 | #define KVM_CAP_PPC_GET_CPU_CHAR 151 |
35b3fde6 | 868 | #define KVM_CAP_S390_BPB 152 |
801e459a | 869 | #define KVM_CAP_GET_MSR_FEATURES 153 |
faeb7833 | 870 | #define KVM_CAP_HYPERV_EVENTFD 154 |
c1aea919 | 871 | #define KVM_CAP_HYPERV_TLBFLUSH 155 |
a4499382 | 872 | #define KVM_CAP_S390_HPAGE_1M 156 |
8fcc4b59 | 873 | #define KVM_CAP_NESTED_STATE 157 |
63198930 | 874 | #define KVM_CAP_ARM_INJECT_SERROR_ESR 158 |
6fbbde9a | 875 | #define KVM_CAP_MSR_PLATFORM_INFO 159 |
aa069a99 | 876 | #define KVM_CAP_PPC_NESTED_HV 160 |
214ff83d | 877 | #define KVM_CAP_HYPERV_SEND_IPI 161 |
0804c849 | 878 | #define KVM_CAP_COALESCED_PIO 162 |
57b119da | 879 | #define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163 |
c4f55198 | 880 | #define KVM_CAP_EXCEPTION_PAYLOAD 164 |
e42b4a50 | 881 | #define KVM_CAP_ARM_VM_IPA_SIZE 165 |
d7547c55 | 882 | #define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */ |
2bc39970 | 883 | #define KVM_CAP_HYPERV_CPUID 167 |
d7547c55 | 884 | #define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168 |
59c5c58c | 885 | #define KVM_CAP_PPC_IRQ_XIVE 169 |
dd53f610 PB |
886 | #define KVM_CAP_ARM_SVE 170 |
887 | #define KVM_CAP_ARM_PTRAUTH_ADDRESS 171 | |
888 | #define KVM_CAP_ARM_PTRAUTH_GENERIC 172 | |
66bb8a06 | 889 | #define KVM_CAP_PMU_EVENT_FILTER 173 |
92f35b75 | 890 | #define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174 |
344c6c80 | 891 | #define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175 |
1a9167a2 | 892 | #define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176 |
14edff88 PB |
893 | #define KVM_CAP_ARM_NISV_TO_USER 177 |
894 | #define KVM_CAP_ARM_INJECT_EXT_DABT 178 | |
7de3f142 | 895 | #define KVM_CAP_S390_VCPU_RESETS 179 |
13da9ae1 | 896 | #define KVM_CAP_S390_PROTECTED 180 |
9a5788c6 | 897 | #define KVM_CAP_PPC_SECURE_GUEST 181 |
acd05785 | 898 | #define KVM_CAP_HALT_POLL 182 |
72de5fa4 | 899 | #define KVM_CAP_ASYNC_PF_INT 183 |
1aa561b1 | 900 | #define KVM_CAP_LAST_CPU 184 |
3edd6839 | 901 | #define KVM_CAP_SMALLER_MAXPHYADDR 185 |
f3633c26 | 902 | #define KVM_CAP_S390_DIAG318 186 |
004a0124 | 903 | #define KVM_CAP_STEAL_TIME 187 |
1ae09954 | 904 | #define KVM_CAP_X86_USER_SPACE_MSR 188 |
1a155254 | 905 | #define KVM_CAP_X86_MSR_FILTER 189 |
66570e96 | 906 | #define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190 |
c21d54f0 | 907 | #define KVM_CAP_SYS_HYPERV_CPUID 191 |
fb04a1ed | 908 | #define KVM_CAP_DIRTY_LOG_RING 192 |
fe6b6bc8 | 909 | #define KVM_CAP_X86_BUS_LOCK_EXIT 193 |
d9a47eda | 910 | #define KVM_CAP_PPC_DAWR1 194 |
8b13c364 | 911 | #define KVM_CAP_SET_GUEST_DEBUG2 195 |
fe7e9488 | 912 | #define KVM_CAP_SGX_ATTRIBUTE 196 |
54526d1f | 913 | #define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197 |
c4f71901 | 914 | #define KVM_CAP_PTP_KVM 198 |
644f7067 | 915 | #define KVM_CAP_HYPERV_ENFORCE_CPUID 199 |
6dba9403 | 916 | #define KVM_CAP_SREGS2 200 |
0dbb1123 | 917 | #define KVM_CAP_EXIT_HYPERCALL 201 |
c3ab0e28 | 918 | #define KVM_CAP_PPC_RPT_INVALIDATE 202 |
cb082bfa | 919 | #define KVM_CAP_BINARY_STATS_FD 203 |
19238e75 | 920 | #define KVM_CAP_EXIT_ON_EMULATION_FAILURE 204 |
b8917b4a | 921 | #define KVM_CAP_ARM_MTE 205 |
b5663931 | 922 | #define KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM 206 |
a457fd56 | 923 | #define KVM_CAP_VM_GPA_BITS 207 |
be50b206 | 924 | #define KVM_CAP_XSAVE2 208 |
dd6e6312 | 925 | #define KVM_CAP_SYS_ATTRIBUTES 209 |
93b71801 | 926 | #define KVM_CAP_PPC_AIL_MODE_3 210 |
4dfc4ec2 | 927 | #define KVM_CAP_S390_MEM_OP_EXTENSION 211 |
ba7bb663 | 928 | #define KVM_CAP_PMU_CAPABILITY 212 |
6d849191 | 929 | #define KVM_CAP_DISABLE_QUIRKS2 213 |
ffbb61d0 | 930 | #define KVM_CAP_VM_TSC_CONTROL 214 |
d495f942 | 931 | #define KVM_CAP_SYSTEM_EVENT_DATA 215 |
bfbab445 | 932 | #define KVM_CAP_ARM_SYSTEM_SUSPEND 216 |
e9bf3acb | 933 | #define KVM_CAP_S390_PROTECTED_DUMP 217 |
ed235117 | 934 | #define KVM_CAP_X86_TRIPLE_FAULT_EVENT 218 |
2f4073e0 | 935 | #define KVM_CAP_X86_NOTIFY_VMEXIT 219 |
084cc29f | 936 | #define KVM_CAP_VM_DISABLE_NX_HUGE_PAGES 220 |
db1c875e | 937 | #define KVM_CAP_S390_ZPCI_OP 221 |
f5ecfee9 | 938 | #define KVM_CAP_S390_CPU_TOPOLOGY 222 |
17601bfe | 939 | #define KVM_CAP_DIRTY_LOG_RING_ACQ_REL 223 |
8c516b25 | 940 | #define KVM_CAP_S390_PROTECTED_ASYNC_DISABLE 224 |
eb561891 | 941 | #define KVM_CAP_DIRTY_LOG_RING_WITH_BITMAP 225 |
14329b82 | 942 | #define KVM_CAP_PMU_EVENT_MASKED_EVENTS 226 |
30ec7997 | 943 | #define KVM_CAP_COUNTER_OFFSET 227 |
2f440b72 RK |
944 | #define KVM_CAP_ARM_EAGER_SPLIT_CHUNK_SIZE 228 |
945 | #define KVM_CAP_ARM_SUPPORTED_BLOCK_SIZES 229 | |
3f9cd0ca | 946 | #define KVM_CAP_ARM_SUPPORTED_REG_MASK_RANGES 230 |
bb58b90b | 947 | #define KVM_CAP_USER_MEMORY2 231 |
16f95f3b | 948 | #define KVM_CAP_MEMORY_FAULT_INFO 232 |
5a475554 | 949 | #define KVM_CAP_MEMORY_ATTRIBUTES 233 |
a7800aa8 | 950 | #define KVM_CAP_GUEST_MEMFD 234 |
89ea60c2 | 951 | #define KVM_CAP_VM_TYPES 235 |
bc1a5cd0 | 952 | #define KVM_CAP_PRE_FAULT_MEMORY 236 |
5dcc1e76 PB |
953 | #define KVM_CAP_X86_APIC_BUS_CYCLES_NS 237 |
954 | #define KVM_CAP_X86_GUEST_MODE 238 | |
3adaee78 | 955 | #define KVM_CAP_ARM_WRITABLE_IMP_ID_REGS 239 |
a7484c80 MZ |
956 | #define KVM_CAP_ARM_EL2 240 |
957 | #define KVM_CAP_ARM_EL2_E2H0 241 | |
1f7c9d52 | 958 | #define KVM_CAP_RISCV_MP_STATE_RESET 242 |
399ec807 | 959 | |
399ec807 AK |
960 | struct kvm_irq_routing_irqchip { |
961 | __u32 irqchip; | |
962 | __u32 pin; | |
963 | }; | |
964 | ||
79950e10 SY |
965 | struct kvm_irq_routing_msi { |
966 | __u32 address_lo; | |
967 | __u32 address_hi; | |
968 | __u32 data; | |
76a10b86 EA |
969 | union { |
970 | __u32 pad; | |
971 | __u32 devid; | |
972 | }; | |
79950e10 SY |
973 | }; |
974 | ||
84223598 CH |
975 | struct kvm_irq_routing_s390_adapter { |
976 | __u64 ind_addr; | |
977 | __u64 summary_addr; | |
978 | __u64 ind_offset; | |
979 | __u32 summary_offset; | |
980 | __u32 adapter_id; | |
981 | }; | |
982 | ||
5c919412 AS |
983 | struct kvm_irq_routing_hv_sint { |
984 | __u32 vcpu; | |
985 | __u32 sint; | |
986 | }; | |
987 | ||
14243b38 DW |
988 | struct kvm_irq_routing_xen_evtchn { |
989 | __u32 port; | |
990 | __u32 vcpu; | |
991 | __u32 priority; | |
992 | }; | |
993 | ||
994 | #define KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL ((__u32)(-1)) | |
995 | ||
399ec807 AK |
996 | /* gsi routing entry types */ |
997 | #define KVM_IRQ_ROUTING_IRQCHIP 1 | |
79950e10 | 998 | #define KVM_IRQ_ROUTING_MSI 2 |
84223598 | 999 | #define KVM_IRQ_ROUTING_S390_ADAPTER 3 |
5c919412 | 1000 | #define KVM_IRQ_ROUTING_HV_SINT 4 |
14243b38 | 1001 | #define KVM_IRQ_ROUTING_XEN_EVTCHN 5 |
399ec807 AK |
1002 | |
1003 | struct kvm_irq_routing_entry { | |
1004 | __u32 gsi; | |
1005 | __u32 type; | |
1006 | __u32 flags; | |
1007 | __u32 pad; | |
1008 | union { | |
1009 | struct kvm_irq_routing_irqchip irqchip; | |
79950e10 | 1010 | struct kvm_irq_routing_msi msi; |
84223598 | 1011 | struct kvm_irq_routing_s390_adapter adapter; |
5c919412 | 1012 | struct kvm_irq_routing_hv_sint hv_sint; |
14243b38 | 1013 | struct kvm_irq_routing_xen_evtchn xen_evtchn; |
399ec807 AK |
1014 | __u32 pad[8]; |
1015 | } u; | |
1016 | }; | |
1017 | ||
1018 | struct kvm_irq_routing { | |
1019 | __u32 nr; | |
1020 | __u32 flags; | |
94dfc73e | 1021 | struct kvm_irq_routing_entry entries[]; |
399ec807 AK |
1022 | }; |
1023 | ||
721eecbf | 1024 | #define KVM_IRQFD_FLAG_DEASSIGN (1 << 0) |
7a84428a AW |
1025 | /* |
1026 | * Available with KVM_CAP_IRQFD_RESAMPLE | |
1027 | * | |
1028 | * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies | |
1029 | * the irqfd to operate in resampling mode for level triggered interrupt | |
3ecad8c2 | 1030 | * emulation. See Documentation/virt/kvm/api.rst. |
7a84428a AW |
1031 | */ |
1032 | #define KVM_IRQFD_FLAG_RESAMPLE (1 << 1) | |
721eecbf GH |
1033 | |
1034 | struct kvm_irqfd { | |
1035 | __u32 fd; | |
1036 | __u32 gsi; | |
1037 | __u32 flags; | |
7a84428a AW |
1038 | __u32 resamplefd; |
1039 | __u8 pad[16]; | |
721eecbf GH |
1040 | }; |
1041 | ||
e3fd9a93 PB |
1042 | /* For KVM_CAP_ADJUST_CLOCK */ |
1043 | ||
1044 | /* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */ | |
1045 | #define KVM_CLOCK_TSC_STABLE 2 | |
c68dc1b5 OU |
1046 | #define KVM_CLOCK_REALTIME (1 << 2) |
1047 | #define KVM_CLOCK_HOST_TSC (1 << 3) | |
e3fd9a93 | 1048 | |
afbcf7ab GC |
1049 | struct kvm_clock_data { |
1050 | __u64 clock; | |
1051 | __u32 flags; | |
c68dc1b5 OU |
1052 | __u32 pad0; |
1053 | __u64 realtime; | |
1054 | __u64 host_tsc; | |
1055 | __u32 pad[4]; | |
afbcf7ab GC |
1056 | }; |
1057 | ||
e3fd9a93 PB |
1058 | /* For KVM_CAP_SW_TLB */ |
1059 | ||
dc83b8bc SW |
1060 | #define KVM_MMU_FSL_BOOKE_NOHV 0 |
1061 | #define KVM_MMU_FSL_BOOKE_HV 1 | |
1062 | ||
1063 | struct kvm_config_tlb { | |
1064 | __u64 params; | |
1065 | __u64 array; | |
1066 | __u32 mmu_type; | |
1067 | __u32 array_len; | |
1068 | }; | |
1069 | ||
1070 | struct kvm_dirty_tlb { | |
1071 | __u64 bitmap; | |
1072 | __u32 num_dirty; | |
1073 | }; | |
1074 | ||
e24ed81f AG |
1075 | /* Available with KVM_CAP_ONE_REG */ |
1076 | ||
1077 | #define KVM_REG_ARCH_MASK 0xff00000000000000ULL | |
1078 | #define KVM_REG_GENERIC 0x0000000000000000ULL | |
1079 | ||
1080 | /* | |
1081 | * Architecture specific registers are to be defined in arch headers and | |
1082 | * ORed with the arch identifier. | |
1083 | */ | |
1084 | #define KVM_REG_PPC 0x1000000000000000ULL | |
1085 | #define KVM_REG_X86 0x2000000000000000ULL | |
1086 | #define KVM_REG_IA64 0x3000000000000000ULL | |
1087 | #define KVM_REG_ARM 0x4000000000000000ULL | |
1088 | #define KVM_REG_S390 0x5000000000000000ULL | |
7c8c5e6a | 1089 | #define KVM_REG_ARM64 0x6000000000000000ULL |
2a8fedd0 | 1090 | #define KVM_REG_MIPS 0x7000000000000000ULL |
dee04eee | 1091 | #define KVM_REG_RISCV 0x8000000000000000ULL |
b37e6b68 | 1092 | #define KVM_REG_LOONGARCH 0x9000000000000000ULL |
e24ed81f AG |
1093 | |
1094 | #define KVM_REG_SIZE_SHIFT 52 | |
1095 | #define KVM_REG_SIZE_MASK 0x00f0000000000000ULL | |
915d2f07 SC |
1096 | |
1097 | #define KVM_REG_SIZE(id) \ | |
1098 | (1U << (((id) & KVM_REG_SIZE_MASK) >> KVM_REG_SIZE_SHIFT)) | |
1099 | ||
e24ed81f AG |
1100 | #define KVM_REG_SIZE_U8 0x0000000000000000ULL |
1101 | #define KVM_REG_SIZE_U16 0x0010000000000000ULL | |
1102 | #define KVM_REG_SIZE_U32 0x0020000000000000ULL | |
1103 | #define KVM_REG_SIZE_U64 0x0030000000000000ULL | |
1104 | #define KVM_REG_SIZE_U128 0x0040000000000000ULL | |
1105 | #define KVM_REG_SIZE_U256 0x0050000000000000ULL | |
1106 | #define KVM_REG_SIZE_U512 0x0060000000000000ULL | |
1107 | #define KVM_REG_SIZE_U1024 0x0070000000000000ULL | |
2b953ea3 | 1108 | #define KVM_REG_SIZE_U2048 0x0080000000000000ULL |
e24ed81f | 1109 | |
749cf76c CD |
1110 | struct kvm_reg_list { |
1111 | __u64 n; /* number of regs */ | |
94dfc73e | 1112 | __u64 reg[]; |
749cf76c CD |
1113 | }; |
1114 | ||
e24ed81f AG |
1115 | struct kvm_one_reg { |
1116 | __u64 id; | |
1117 | __u64 addr; | |
1118 | }; | |
1119 | ||
2b8ddd93 | 1120 | #define KVM_MSI_VALID_DEVID (1U << 0) |
07975ad3 JK |
1121 | struct kvm_msi { |
1122 | __u32 address_lo; | |
1123 | __u32 address_hi; | |
1124 | __u32 data; | |
1125 | __u32 flags; | |
2b8ddd93 AP |
1126 | __u32 devid; |
1127 | __u8 pad[12]; | |
07975ad3 JK |
1128 | }; |
1129 | ||
3401d546 CD |
1130 | struct kvm_arm_device_addr { |
1131 | __u64 id; | |
1132 | __u64 addr; | |
1133 | }; | |
1134 | ||
852b6d57 SW |
1135 | /* |
1136 | * Device control API, available with KVM_CAP_DEVICE_CTRL | |
1137 | */ | |
1138 | #define KVM_CREATE_DEVICE_TEST 1 | |
1139 | ||
1140 | struct kvm_create_device { | |
1141 | __u32 type; /* in: KVM_DEV_TYPE_xxx */ | |
1142 | __u32 fd; /* out: device handle */ | |
1143 | __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */ | |
1144 | }; | |
1145 | ||
1146 | struct kvm_device_attr { | |
1147 | __u32 flags; /* no flags currently defined */ | |
1148 | __u32 group; /* device-defined */ | |
1149 | __u64 attr; /* group-defined */ | |
1150 | __u64 addr; /* userspace address of attr data */ | |
1151 | }; | |
1152 | ||
dcc31ea6 YL |
1153 | #define KVM_DEV_VFIO_FILE 1 |
1154 | ||
1155 | #define KVM_DEV_VFIO_FILE_ADD 1 | |
1156 | #define KVM_DEV_VFIO_FILE_DEL 2 | |
1157 | ||
1158 | /* KVM_DEV_VFIO_GROUP aliases are for compile time uapi compatibility */ | |
1159 | #define KVM_DEV_VFIO_GROUP KVM_DEV_VFIO_FILE | |
1160 | ||
1161 | #define KVM_DEV_VFIO_GROUP_ADD KVM_DEV_VFIO_FILE_ADD | |
1162 | #define KVM_DEV_VFIO_GROUP_DEL KVM_DEV_VFIO_FILE_DEL | |
121f80ba | 1163 | #define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3 |
d60eacb0 WD |
1164 | |
1165 | enum kvm_device_type { | |
1166 | KVM_DEV_TYPE_FSL_MPIC_20 = 1, | |
1167 | #define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20 | |
1168 | KVM_DEV_TYPE_FSL_MPIC_42, | |
1169 | #define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42 | |
1170 | KVM_DEV_TYPE_XICS, | |
1171 | #define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS | |
1172 | KVM_DEV_TYPE_VFIO, | |
1173 | #define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO | |
1174 | KVM_DEV_TYPE_ARM_VGIC_V2, | |
1175 | #define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2 | |
1176 | KVM_DEV_TYPE_FLIC, | |
1177 | #define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC | |
a0675c25 AP |
1178 | KVM_DEV_TYPE_ARM_VGIC_V3, |
1179 | #define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3 | |
1085fdc6 AP |
1180 | KVM_DEV_TYPE_ARM_VGIC_ITS, |
1181 | #define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS | |
90c73795 CLG |
1182 | KVM_DEV_TYPE_XIVE, |
1183 | #define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE | |
58772e9a SP |
1184 | KVM_DEV_TYPE_ARM_PV_TIME, |
1185 | #define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME | |
89d01306 AP |
1186 | KVM_DEV_TYPE_RISCV_AIA, |
1187 | #define KVM_DEV_TYPE_RISCV_AIA KVM_DEV_TYPE_RISCV_AIA | |
c532de5a XL |
1188 | KVM_DEV_TYPE_LOONGARCH_IPI, |
1189 | #define KVM_DEV_TYPE_LOONGARCH_IPI KVM_DEV_TYPE_LOONGARCH_IPI | |
2e8b9df8 XL |
1190 | KVM_DEV_TYPE_LOONGARCH_EIOINTC, |
1191 | #define KVM_DEV_TYPE_LOONGARCH_EIOINTC KVM_DEV_TYPE_LOONGARCH_EIOINTC | |
e785dfac XL |
1192 | KVM_DEV_TYPE_LOONGARCH_PCHPIC, |
1193 | #define KVM_DEV_TYPE_LOONGARCH_PCHPIC KVM_DEV_TYPE_LOONGARCH_PCHPIC | |
c532de5a | 1194 | |
d60eacb0 | 1195 | KVM_DEV_TYPE_MAX, |
c532de5a | 1196 | |
d60eacb0 | 1197 | }; |
5df554ad | 1198 | |
121f80ba AK |
1199 | struct kvm_vfio_spapr_tce { |
1200 | __s32 groupfd; | |
1201 | __s32 tablefd; | |
1202 | }; | |
1203 | ||
bccf2150 AK |
1204 | /* |
1205 | * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns | |
1206 | * a vcpu fd. | |
1207 | */ | |
c54d2aba JK |
1208 | #define KVM_CREATE_VCPU _IO(KVMIO, 0x41) |
1209 | #define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log) | |
c54d2aba | 1210 | #define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44) |
c5edd753 | 1211 | #define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45) /* deprecated */ |
c54d2aba | 1212 | #define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \ |
6a4a9839 | 1213 | struct kvm_userspace_memory_region) |
c54d2aba JK |
1214 | #define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47) |
1215 | #define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64) | |
bb58b90b SC |
1216 | #define KVM_SET_USER_MEMORY_REGION2 _IOW(KVMIO, 0x49, \ |
1217 | struct kvm_userspace_memory_region2) | |
27e0393f CO |
1218 | |
1219 | /* enable ucontrol for s390 */ | |
27e0393f CO |
1220 | #define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping) |
1221 | #define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping) | |
ccc7910f | 1222 | #define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long) |
27e0393f | 1223 | |
85f455f7 | 1224 | /* Device model IOC */ |
c54d2aba JK |
1225 | #define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60) |
1226 | #define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level) | |
1227 | #define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip) | |
1228 | #define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip) | |
1229 | #define KVM_CREATE_PIT _IO(KVMIO, 0x64) | |
1230 | #define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state) | |
1231 | #define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state) | |
1232 | #define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level) | |
5f94c174 LV |
1233 | #define KVM_REGISTER_COALESCED_MMIO \ |
1234 | _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone) | |
1235 | #define KVM_UNREGISTER_COALESCED_MMIO \ | |
1236 | _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone) | |
c54d2aba | 1237 | #define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing) |
c54d2aba | 1238 | #define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71) |
c54d2aba JK |
1239 | #define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd) |
1240 | #define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config) | |
1241 | #define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78) | |
1242 | #define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd) | |
1243 | #define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config) | |
1244 | #define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data) | |
1245 | #define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data) | |
1246 | /* Available with KVM_CAP_PIT_STATE2 */ | |
1247 | #define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2) | |
1248 | #define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2) | |
15711e9c AG |
1249 | /* Available with KVM_CAP_PPC_GET_PVINFO */ |
1250 | #define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo) | |
ffbb61d0 DW |
1251 | /* Available with KVM_CAP_TSC_CONTROL for a vCPU, or with |
1252 | * KVM_CAP_VM_TSC_CONTROL to set defaults for a VM */ | |
92a1f12d JR |
1253 | #define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2) |
1254 | #define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3) | |
07975ad3 JK |
1255 | /* Available with KVM_CAP_SIGNAL_MSI */ |
1256 | #define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi) | |
5b74716e BH |
1257 | /* Available with KVM_CAP_PPC_GET_SMMU_INFO */ |
1258 | #define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info) | |
32fad281 PM |
1259 | /* Available with KVM_CAP_PPC_ALLOC_HTAB */ |
1260 | #define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32) | |
ed7a8d7a | 1261 | #define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce) |
58ded420 AK |
1262 | #define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \ |
1263 | struct kvm_create_spapr_tce_64) | |
ed7a8d7a PM |
1264 | /* Available with KVM_CAP_RMA */ |
1265 | #define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma) | |
a2932923 PM |
1266 | /* Available with KVM_CAP_PPC_HTAB_FD */ |
1267 | #define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd) | |
3401d546 CD |
1268 | /* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */ |
1269 | #define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr) | |
8e591cb7 ME |
1270 | /* Available with KVM_CAP_PPC_RTAS */ |
1271 | #define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args) | |
ef1ead0c DG |
1272 | /* Available with KVM_CAP_SPAPR_RESIZE_HPT */ |
1273 | #define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt) | |
1274 | #define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt) | |
651d61bc | 1275 | /* Available with KVM_CAP_PPC_MMU_RADIX or KVM_CAP_PPC_MMU_HASH_V3 */ |
c9270132 | 1276 | #define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg) |
651d61bc | 1277 | /* Available with KVM_CAP_PPC_MMU_RADIX */ |
c9270132 | 1278 | #define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info) |
3214d01f PM |
1279 | /* Available with KVM_CAP_PPC_GET_CPU_CHAR */ |
1280 | #define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char) | |
66bb8a06 EH |
1281 | /* Available with KVM_CAP_PMU_EVENT_FILTER */ |
1282 | #define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter) | |
22945688 | 1283 | #define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3) |
f0376edb | 1284 | #define KVM_ARM_MTE_COPY_TAGS _IOR(KVMIO, 0xb4, struct kvm_arm_copy_mte_tags) |
30ec7997 MZ |
1285 | /* Available with KVM_CAP_COUNTER_OFFSET */ |
1286 | #define KVM_ARM_SET_COUNTER_OFFSET _IOW(KVMIO, 0xb5, struct kvm_arm_counter_offset) | |
3f9cd0ca | 1287 | #define KVM_ARM_GET_REG_WRITABLE_MASKS _IOR(KVMIO, 0xb6, struct reg_mask_range) |
bccf2150 | 1288 | |
852b6d57 SW |
1289 | /* ioctl for vm fd */ |
1290 | #define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device) | |
1291 | ||
1292 | /* ioctls for fds returned by KVM_CREATE_DEVICE */ | |
1293 | #define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr) | |
1294 | #define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr) | |
1295 | #define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr) | |
1296 | ||
bccf2150 AK |
1297 | /* |
1298 | * ioctls for vcpu fds | |
1299 | */ | |
739872c5 AK |
1300 | #define KVM_RUN _IO(KVMIO, 0x80) |
1301 | #define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs) | |
1302 | #define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs) | |
1303 | #define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs) | |
1304 | #define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs) | |
1305 | #define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation) | |
1306 | #define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt) | |
739872c5 AK |
1307 | #define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs) |
1308 | #define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs) | |
1309 | #define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid) | |
1961d276 | 1310 | #define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask) |
b8836737 AK |
1311 | #define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu) |
1312 | #define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu) | |
96ad2cc6 ED |
1313 | #define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state) |
1314 | #define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state) | |
07716717 DK |
1315 | #define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2) |
1316 | #define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2) | |
b209749f | 1317 | /* Available with KVM_CAP_VAPIC */ |
c54d2aba | 1318 | #define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl) |
b93463aa AK |
1319 | /* Available with KVM_CAP_VAPIC */ |
1320 | #define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr) | |
ba5c1e9b CO |
1321 | /* valid for virtual machine (for floating interrupt)_and_ vcpu */ |
1322 | #define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt) | |
b0c632db HC |
1323 | /* store status for s390 */ |
1324 | #define KVM_S390_STORE_STATUS_NOADDR (-1ul) | |
1325 | #define KVM_S390_STORE_STATUS_PREFIXED (-2ul) | |
1326 | #define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long) | |
1327 | /* initial ipl psw for s390 */ | |
1328 | #define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw) | |
1329 | /* initial reset for s390 */ | |
c54d2aba | 1330 | #define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97) |
62d9f0db MT |
1331 | #define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state) |
1332 | #define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state) | |
44b5ce73 | 1333 | /* Available with KVM_CAP_USER_NMI */ |
c54d2aba | 1334 | #define KVM_NMI _IO(KVMIO, 0x9a) |
d0bfb940 JK |
1335 | /* Available with KVM_CAP_SET_GUEST_DEBUG */ |
1336 | #define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug) | |
890ca9ae YH |
1337 | /* MCE for x86 */ |
1338 | #define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64) | |
1339 | #define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64) | |
1340 | #define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce) | |
3cfc3092 JK |
1341 | /* Available with KVM_CAP_VCPU_EVENTS */ |
1342 | #define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events) | |
1343 | #define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events) | |
a1efbe77 JK |
1344 | /* Available with KVM_CAP_DEBUGREGS */ |
1345 | #define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs) | |
1346 | #define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs) | |
d938dc55 | 1347 | /* |
22725266 | 1348 | * vcpu version available with KVM_CAP_ENABLE_CAP |
d938dc55 CH |
1349 | * vm version available with KVM_CAP_ENABLE_CAP_VM |
1350 | */ | |
71fbfd5f | 1351 | #define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap) |
2d5b5a66 SY |
1352 | /* Available with KVM_CAP_XSAVE */ |
1353 | #define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave) | |
1354 | #define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave) | |
1355 | /* Available with KVM_CAP_XCRS */ | |
1356 | #define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs) | |
1357 | #define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs) | |
dc83b8bc SW |
1358 | /* Available with KVM_CAP_SW_TLB */ |
1359 | #define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb) | |
e24ed81f AG |
1360 | /* Available with KVM_CAP_ONE_REG */ |
1361 | #define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg) | |
1362 | #define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg) | |
1c0b28c2 EM |
1363 | /* VM is being stopped by host */ |
1364 | #define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad) | |
749cf76c | 1365 | #define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init) |
42c4e0c7 | 1366 | #define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init) |
749cf76c | 1367 | #define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list) |
41408c28 TH |
1368 | /* Available with KVM_CAP_S390_MEM_OP */ |
1369 | #define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op) | |
30ee2a98 JH |
1370 | /* Available with KVM_CAP_S390_SKEYS */ |
1371 | #define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys) | |
1372 | #define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys) | |
47b43c52 JF |
1373 | /* Available with KVM_CAP_S390_INJECT_IRQ */ |
1374 | #define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq) | |
816c7667 JF |
1375 | /* Available with KVM_CAP_S390_IRQ_STATE */ |
1376 | #define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state) | |
1377 | #define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state) | |
f077825a PB |
1378 | /* Available with KVM_CAP_X86_SMM */ |
1379 | #define KVM_SMI _IO(KVMIO, 0xb7) | |
4036e387 | 1380 | /* Available with KVM_CAP_S390_CMMA_MIGRATION */ |
949c0336 | 1381 | #define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log) |
4036e387 | 1382 | #define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log) |
5acc5c06 BS |
1383 | /* Memory Encryption Commands */ |
1384 | #define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long) | |
d98e6346 | 1385 | |
69eaedee BS |
1386 | struct kvm_enc_region { |
1387 | __u64 addr; | |
1388 | __u64 size; | |
1389 | }; | |
1390 | ||
1391 | #define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region) | |
1392 | #define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region) | |
1393 | ||
faeb7833 RK |
1394 | /* Available with KVM_CAP_HYPERV_EVENTFD */ |
1395 | #define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd) | |
1396 | ||
8fcc4b59 JM |
1397 | /* Available with KVM_CAP_NESTED_STATE */ |
1398 | #define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state) | |
1399 | #define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state) | |
faeb7833 | 1400 | |
d7547c55 | 1401 | /* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */ |
2a31b9db PB |
1402 | #define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log) |
1403 | ||
c21d54f0 | 1404 | /* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */ |
2bc39970 VK |
1405 | #define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2) |
1406 | ||
7dd32a0d DM |
1407 | /* Available with KVM_CAP_ARM_SVE */ |
1408 | #define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int) | |
1409 | ||
7de3f142 JF |
1410 | /* Available with KVM_CAP_S390_VCPU_RESETS */ |
1411 | #define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3) | |
1412 | #define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4) | |
1413 | ||
29b40f10 JF |
1414 | /* Available with KVM_CAP_S390_PROTECTED */ |
1415 | #define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd) | |
1416 | ||
1a155254 AG |
1417 | /* Available with KVM_CAP_X86_MSR_FILTER */ |
1418 | #define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter) | |
1419 | ||
fb04a1ed PX |
1420 | /* Available with KVM_CAP_DIRTY_LOG_RING */ |
1421 | #define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7) | |
1422 | ||
3e324615 | 1423 | /* Per-VM Xen attributes */ |
a76b9641 JM |
1424 | #define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr) |
1425 | #define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr) | |
1426 | ||
3e324615 DW |
1427 | /* Per-vCPU Xen attributes */ |
1428 | #define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr) | |
1429 | #define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr) | |
1430 | ||
35025735 DW |
1431 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */ |
1432 | #define KVM_XEN_HVM_EVTCHN_SEND _IOW(KVMIO, 0xd0, struct kvm_irq_routing_xen_evtchn) | |
1433 | ||
6dba9403 ML |
1434 | #define KVM_GET_SREGS2 _IOR(KVMIO, 0xcc, struct kvm_sregs2) |
1435 | #define KVM_SET_SREGS2 _IOW(KVMIO, 0xcd, struct kvm_sregs2) | |
1436 | ||
3c9bd400 JZ |
1437 | #define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0) |
1438 | #define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1) | |
1439 | ||
fb04a1ed PX |
1440 | /* |
1441 | * Arch needs to define the macro after implementing the dirty ring | |
1442 | * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the | |
1443 | * starting page offset of the dirty ring structures. | |
1444 | */ | |
1445 | #ifndef KVM_DIRTY_LOG_PAGE_OFFSET | |
1446 | #define KVM_DIRTY_LOG_PAGE_OFFSET 0 | |
1447 | #endif | |
1448 | ||
1449 | /* | |
1450 | * KVM dirty GFN flags, defined as: | |
1451 | * | |
1452 | * |---------------+---------------+--------------| | |
1453 | * | bit 1 (reset) | bit 0 (dirty) | Status | | |
1454 | * |---------------+---------------+--------------| | |
1455 | * | 0 | 0 | Invalid GFN | | |
1456 | * | 0 | 1 | Dirty GFN | | |
1457 | * | 1 | X | GFN to reset | | |
1458 | * |---------------+---------------+--------------| | |
1459 | * | |
1460 | * Lifecycle of a dirty GFN goes like: | |
1461 | * | |
1462 | * dirtied harvested reset | |
1463 | * 00 -----------> 01 -------------> 1X -------+ | |
1464 | * ^ | | |
1465 | * | | | |
1466 | * +------------------------------------------+ | |
1467 | * | |
1468 | * The userspace program is only responsible for the 01->1X state | |
1469 | * conversion after harvesting an entry. Also, it must not skip any | |
1470 | * dirty bits, so that dirty bits are always harvested in sequence. | |
1471 | */ | |
fb1070d1 JR |
1472 | #define KVM_DIRTY_GFN_F_DIRTY _BITUL(0) |
1473 | #define KVM_DIRTY_GFN_F_RESET _BITUL(1) | |
fb04a1ed PX |
1474 | #define KVM_DIRTY_GFN_F_MASK 0x3 |
1475 | ||
1476 | /* | |
1477 | * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of | |
1478 | * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The | |
1479 | * size of the gfn buffer is decided by the first argument when | |
1480 | * enabling KVM_CAP_DIRTY_LOG_RING. | |
1481 | */ | |
1482 | struct kvm_dirty_gfn { | |
1483 | __u32 flags; | |
1484 | __u32 slot; | |
1485 | __u64 offset; | |
1486 | }; | |
1487 | ||
fe6b6bc8 CQ |
1488 | #define KVM_BUS_LOCK_DETECTION_OFF (1 << 0) |
1489 | #define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1) | |
1490 | ||
ba7bb663 DD |
1491 | #define KVM_PMU_CAP_DISABLE (1 << 0) |
1492 | ||
cb082bfa JZ |
1493 | /** |
1494 | * struct kvm_stats_header - Header of per vm/vcpu binary statistics data. | |
1495 | * @flags: Some extra information for header, always 0 for now. | |
1496 | * @name_size: The size in bytes of the memory which contains statistics | |
1497 | * name string including trailing '\0'. The memory is allocated | |
1498 | * at the send of statistics descriptor. | |
1499 | * @num_desc: The number of statistics the vm or vcpu has. | |
1500 | * @id_offset: The offset of the vm/vcpu stats' id string in the file pointed | |
1501 | * by vm/vcpu stats fd. | |
1502 | * @desc_offset: The offset of the vm/vcpu stats' descriptor block in the file | |
1503 | * pointd by vm/vcpu stats fd. | |
1504 | * @data_offset: The offset of the vm/vcpu stats' data block in the file | |
1505 | * pointed by vm/vcpu stats fd. | |
1506 | * | |
1507 | * This is the header userspace needs to read from stats fd before any other | |
1508 | * readings. It is used by userspace to discover all the information about the | |
1509 | * vm/vcpu's binary statistics. | |
1510 | * Userspace reads this header from the start of the vm/vcpu's stats fd. | |
1511 | */ | |
1512 | struct kvm_stats_header { | |
1513 | __u32 flags; | |
1514 | __u32 name_size; | |
1515 | __u32 num_desc; | |
1516 | __u32 id_offset; | |
1517 | __u32 desc_offset; | |
1518 | __u32 data_offset; | |
1519 | }; | |
1520 | ||
1521 | #define KVM_STATS_TYPE_SHIFT 0 | |
1522 | #define KVM_STATS_TYPE_MASK (0xF << KVM_STATS_TYPE_SHIFT) | |
1523 | #define KVM_STATS_TYPE_CUMULATIVE (0x0 << KVM_STATS_TYPE_SHIFT) | |
1524 | #define KVM_STATS_TYPE_INSTANT (0x1 << KVM_STATS_TYPE_SHIFT) | |
1525 | #define KVM_STATS_TYPE_PEAK (0x2 << KVM_STATS_TYPE_SHIFT) | |
f95937cc JZ |
1526 | #define KVM_STATS_TYPE_LINEAR_HIST (0x3 << KVM_STATS_TYPE_SHIFT) |
1527 | #define KVM_STATS_TYPE_LOG_HIST (0x4 << KVM_STATS_TYPE_SHIFT) | |
1528 | #define KVM_STATS_TYPE_MAX KVM_STATS_TYPE_LOG_HIST | |
cb082bfa JZ |
1529 | |
1530 | #define KVM_STATS_UNIT_SHIFT 4 | |
1531 | #define KVM_STATS_UNIT_MASK (0xF << KVM_STATS_UNIT_SHIFT) | |
1532 | #define KVM_STATS_UNIT_NONE (0x0 << KVM_STATS_UNIT_SHIFT) | |
1533 | #define KVM_STATS_UNIT_BYTES (0x1 << KVM_STATS_UNIT_SHIFT) | |
1534 | #define KVM_STATS_UNIT_SECONDS (0x2 << KVM_STATS_UNIT_SHIFT) | |
1535 | #define KVM_STATS_UNIT_CYCLES (0x3 << KVM_STATS_UNIT_SHIFT) | |
1b870fa5 | 1536 | #define KVM_STATS_UNIT_BOOLEAN (0x4 << KVM_STATS_UNIT_SHIFT) |
450a5639 | 1537 | #define KVM_STATS_UNIT_MAX KVM_STATS_UNIT_BOOLEAN |
cb082bfa JZ |
1538 | |
1539 | #define KVM_STATS_BASE_SHIFT 8 | |
1540 | #define KVM_STATS_BASE_MASK (0xF << KVM_STATS_BASE_SHIFT) | |
1541 | #define KVM_STATS_BASE_POW10 (0x0 << KVM_STATS_BASE_SHIFT) | |
1542 | #define KVM_STATS_BASE_POW2 (0x1 << KVM_STATS_BASE_SHIFT) | |
1543 | #define KVM_STATS_BASE_MAX KVM_STATS_BASE_POW2 | |
1544 | ||
1545 | /** | |
1546 | * struct kvm_stats_desc - Descriptor of a KVM statistics. | |
1547 | * @flags: Annotations of the stats, like type, unit, etc. | |
1548 | * @exponent: Used together with @flags to determine the unit. | |
1549 | * @size: The number of data items for this stats. | |
1550 | * Every data item is of type __u64. | |
1551 | * @offset: The offset of the stats to the start of stat structure in | |
f95937cc JZ |
1552 | * structure kvm or kvm_vcpu. |
1553 | * @bucket_size: A parameter value used for histogram stats. It is only used | |
1554 | * for linear histogram stats, specifying the size of the bucket; | |
cb082bfa JZ |
1555 | * @name: The name string for the stats. Its size is indicated by the |
1556 | * &kvm_stats_header->name_size. | |
1557 | */ | |
1558 | struct kvm_stats_desc { | |
1559 | __u32 flags; | |
1560 | __s16 exponent; | |
1561 | __u16 size; | |
1562 | __u32 offset; | |
f95937cc | 1563 | __u32 bucket_size; |
cb082bfa JZ |
1564 | char name[]; |
1565 | }; | |
1566 | ||
1567 | #define KVM_GET_STATS_FD _IO(KVMIO, 0xce) | |
1568 | ||
f6c6804c JF |
1569 | /* Available with KVM_CAP_XSAVE2 */ |
1570 | #define KVM_GET_XSAVE2 _IOR(KVMIO, 0xcf, struct kvm_xsave) | |
1571 | ||
8aba0958 JF |
1572 | /* Available with KVM_CAP_S390_PROTECTED_DUMP */ |
1573 | #define KVM_S390_PV_CPU_COMMAND _IOWR(KVMIO, 0xd0, struct kvm_pv_cmd) | |
1574 | ||
2f4073e0 TX |
1575 | /* Available with KVM_CAP_X86_NOTIFY_VMEXIT */ |
1576 | #define KVM_X86_NOTIFY_VMEXIT_ENABLED (1ULL << 0) | |
1577 | #define KVM_X86_NOTIFY_VMEXIT_USER (1ULL << 1) | |
1578 | ||
db1c875e MR |
1579 | /* Available with KVM_CAP_S390_ZPCI_OP */ |
1580 | #define KVM_S390_ZPCI_OP _IOW(KVMIO, 0xd1, struct kvm_s390_zpci_op) | |
1581 | ||
5a475554 CP |
1582 | /* Available with KVM_CAP_MEMORY_ATTRIBUTES */ |
1583 | #define KVM_SET_MEMORY_ATTRIBUTES _IOW(KVMIO, 0xd2, struct kvm_memory_attributes) | |
1584 | ||
1585 | struct kvm_memory_attributes { | |
1586 | __u64 address; | |
1587 | __u64 size; | |
1588 | __u64 attributes; | |
1589 | __u64 flags; | |
1590 | }; | |
1591 | ||
1592 | #define KVM_MEMORY_ATTRIBUTE_PRIVATE (1ULL << 3) | |
1593 | ||
a7800aa8 SC |
1594 | #define KVM_CREATE_GUEST_MEMFD _IOWR(KVMIO, 0xd4, struct kvm_create_guest_memfd) |
1595 | ||
1596 | struct kvm_create_guest_memfd { | |
1597 | __u64 size; | |
1598 | __u64 flags; | |
1599 | __u64 reserved[6]; | |
1600 | }; | |
1601 | ||
bc1a5cd0 IY |
1602 | #define KVM_PRE_FAULT_MEMORY _IOWR(KVMIO, 0xd5, struct kvm_pre_fault_memory) |
1603 | ||
1604 | struct kvm_pre_fault_memory { | |
1605 | __u64 gpa; | |
1606 | __u64 size; | |
1607 | __u64 flags; | |
1608 | __u64 padding[5]; | |
1609 | }; | |
1610 | ||
c54d2aba | 1611 | #endif /* __LINUX_KVM_H */ |