]> Git Repo - qemu.git/blame - linux-headers/linux/kvm.h
Merge remote-tracking branch 'remotes/thuth-gitlab/tags/pull-request-2021-06-02'...
[qemu.git] / linux-headers / linux / kvm.h
CommitLineData
dd873966 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
51b24e34
JK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
8 * Note: you must update KVM_API_VERSION if you change this interface.
9 */
10
11#include <linux/types.h>
12
13#include <linux/ioctl.h>
14#include <asm/kvm.h>
15
16#define KVM_API_VERSION 12
17
18/* *** Deprecated interfaces *** */
19
20#define KVM_TRC_SHIFT 16
21
22#define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT)
23#define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1))
24
25#define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01)
26#define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02)
27#define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01)
28
29#define KVM_TRC_HEAD_SIZE 12
30#define KVM_TRC_CYCLE_SIZE 8
31#define KVM_TRC_EXTRA_MAX 7
32
33#define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02)
34#define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03)
35#define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04)
36#define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05)
37#define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06)
38#define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07)
39#define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08)
40#define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09)
41#define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A)
42#define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B)
43#define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C)
44#define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D)
45#define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E)
46#define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F)
47#define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10)
48#define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11)
49#define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12)
50#define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13)
51#define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14)
52#define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15)
53#define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16)
54#define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17)
55#define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18)
56#define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19)
57
58struct kvm_user_trace_setup {
59 __u32 buf_size;
60 __u32 buf_nr;
61};
62
63#define __KVM_DEPRECATED_MAIN_W_0x06 \
64 _IOW(KVMIO, 0x06, struct kvm_user_trace_setup)
65#define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07)
66#define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08)
67
68#define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq)
69
70struct kvm_breakpoint {
71 __u32 enabled;
72 __u32 padding;
73 __u64 address;
74};
75
76struct kvm_debug_guest {
77 __u32 enabled;
78 __u32 pad;
79 struct kvm_breakpoint breakpoints[4];
80 __u32 singlestep;
81};
82
83#define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest)
84
85/* *** End of deprecated interfaces *** */
86
87
88/* for KVM_CREATE_MEMORY_REGION */
89struct kvm_memory_region {
90 __u32 slot;
91 __u32 flags;
92 __u64 guest_phys_addr;
93 __u64 memory_size; /* bytes */
94};
95
96/* for KVM_SET_USER_MEMORY_REGION */
97struct kvm_userspace_memory_region {
98 __u32 slot;
99 __u32 flags;
100 __u64 guest_phys_addr;
101 __u64 memory_size; /* bytes */
102 __u64 userspace_addr; /* start of the userspace allocated memory */
103};
104
716b8e4d
AW
105/*
106 * The bit 0 ~ bit 15 of kvm_memory_region::flags are visible for userspace,
107 * other bits are reserved for kvm internal use which are defined in
108 * include/linux/kvm_host.h.
109 */
110#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
111#define KVM_MEM_READONLY (1UL << 1)
51b24e34
JK
112
113/* for KVM_IRQ_LINE */
114struct kvm_irq_level {
115 /*
116 * ACPI gsi notion of irq.
117 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
118 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
f76b348e 119 * For ARM: See Documentation/virt/kvm/api.rst
51b24e34
JK
120 */
121 union {
122 __u32 irq;
123 __s32 status;
124 };
125 __u32 level;
126};
127
128
129struct kvm_irqchip {
130 __u32 chip_id;
131 __u32 pad;
132 union {
133 char dummy[512]; /* reserving space */
134#ifdef __KVM_HAVE_PIT
135 struct kvm_pic_state pic;
136#endif
137#ifdef __KVM_HAVE_IOAPIC
138 struct kvm_ioapic_state ioapic;
139#endif
140 } chip;
141};
142
143/* for KVM_CREATE_PIT2 */
144struct kvm_pit_config {
145 __u32 flags;
146 __u32 pad[15];
147};
148
149#define KVM_PIT_SPEAKER_DUMMY 1
150
7a52ce8a
CH
151struct kvm_s390_skeys {
152 __u64 start_gfn;
153 __u64 count;
154 __u64 skeydata_addr;
155 __u32 flags;
156 __u32 reserved[9];
157};
fff02bc0 158
3272f0e2
CB
159#define KVM_S390_CMMA_PEEK (1 << 0)
160
161/**
162 * kvm_s390_cmma_log - Used for CMMA migration.
163 *
164 * Used both for input and output.
165 *
166 * @start_gfn: Guest page number to start from.
167 * @count: Size of the result buffer.
168 * @flags: Control operation mode via KVM_S390_CMMA_* flags
169 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
170 * pages are still remaining.
171 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
172 * in the PGSTE.
173 * @values: Pointer to the values buffer.
174 *
175 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
176 */
177struct kvm_s390_cmma_log {
178 __u64 start_gfn;
179 __u32 count;
180 __u32 flags;
181 union {
182 __u64 remaining;
183 __u64 mask;
184 };
185 __u64 values;
186};
187
fff02bc0
PB
188struct kvm_hyperv_exit {
189#define KVM_EXIT_HYPERV_SYNIC 1
b89485a5 190#define KVM_EXIT_HYPERV_HCALL 2
f76b348e 191#define KVM_EXIT_HYPERV_SYNDBG 3
fff02bc0 192 __u32 type;
f76b348e 193 __u32 pad1;
fff02bc0
PB
194 union {
195 struct {
196 __u32 msr;
f76b348e 197 __u32 pad2;
fff02bc0
PB
198 __u64 control;
199 __u64 evt_page;
200 __u64 msg_page;
201 } synic;
b89485a5
PB
202 struct {
203 __u64 input;
204 __u64 result;
205 __u64 params[2];
206 } hcall;
f76b348e
CH
207 struct {
208 __u32 msr;
209 __u32 pad2;
210 __u64 control;
211 __u64 status;
212 __u64 send_page;
213 __u64 recv_page;
214 __u64 pending_page;
215 } syndbg;
fff02bc0
PB
216 } u;
217};
218
7a52ce8a
CH
219#define KVM_S390_GET_SKEYS_NONE 1
220#define KVM_S390_SKEYS_MAX 1048576
221
51b24e34
JK
222#define KVM_EXIT_UNKNOWN 0
223#define KVM_EXIT_EXCEPTION 1
224#define KVM_EXIT_IO 2
225#define KVM_EXIT_HYPERCALL 3
226#define KVM_EXIT_DEBUG 4
227#define KVM_EXIT_HLT 5
228#define KVM_EXIT_MMIO 6
229#define KVM_EXIT_IRQ_WINDOW_OPEN 7
230#define KVM_EXIT_SHUTDOWN 8
231#define KVM_EXIT_FAIL_ENTRY 9
232#define KVM_EXIT_INTR 10
233#define KVM_EXIT_SET_TPR 11
234#define KVM_EXIT_TPR_ACCESS 12
235#define KVM_EXIT_S390_SIEIC 13
236#define KVM_EXIT_S390_RESET 14
a9fd1654 237#define KVM_EXIT_DCR 15 /* deprecated */
51b24e34
JK
238#define KVM_EXIT_NMI 16
239#define KVM_EXIT_INTERNAL_ERROR 17
240#define KVM_EXIT_OSI 18
7c6da3de 241#define KVM_EXIT_PAPR_HCALL 19
1529ae1b 242#define KVM_EXIT_S390_UCONTROL 20
d4834ff9 243#define KVM_EXIT_WATCHDOG 21
d3dccee1
AG
244#define KVM_EXIT_S390_TSCH 22
245#define KVM_EXIT_EPR 23
b061808d 246#define KVM_EXIT_SYSTEM_EVENT 24
7a52ce8a 247#define KVM_EXIT_S390_STSI 25
3a824b15 248#define KVM_EXIT_IOAPIC_EOI 26
fff02bc0 249#define KVM_EXIT_HYPERV 27
2a886794 250#define KVM_EXIT_ARM_NISV 28
53ba2eee
MR
251#define KVM_EXIT_X86_RDMSR 29
252#define KVM_EXIT_X86_WRMSR 30
b3c818a4 253#define KVM_EXIT_DIRTY_RING_FULL 31
51b24e34
JK
254
255/* For KVM_EXIT_INTERNAL_ERROR */
d4834ff9
AG
256/* Emulate instruction failed. */
257#define KVM_INTERNAL_ERROR_EMULATION 1
258/* Encounter unexpected simultaneous exceptions. */
259#define KVM_INTERNAL_ERROR_SIMUL_EX 2
260/* Encounter unexpected vm-exit due to delivery event. */
261#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
f363d039
EA
262/* Encounter unexpected vm-exit reason */
263#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
51b24e34
JK
264
265/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
266struct kvm_run {
267 /* in */
268 __u8 request_interrupt_window;
3a5eb5b4
PB
269 __u8 immediate_exit;
270 __u8 padding1[6];
51b24e34
JK
271
272 /* out */
273 __u32 exit_reason;
274 __u8 ready_for_interrupt_injection;
275 __u8 if_flag;
24a31426 276 __u16 flags;
51b24e34
JK
277
278 /* in (pre_kvm_run), out (post_kvm_run) */
279 __u64 cr8;
280 __u64 apic_base;
281
282#ifdef __KVM_S390
283 /* the processor status word for s390 */
284 __u64 psw_mask; /* psw upper half */
285 __u64 psw_addr; /* psw lower half */
286#endif
287 union {
288 /* KVM_EXIT_UNKNOWN */
289 struct {
290 __u64 hardware_exit_reason;
291 } hw;
292 /* KVM_EXIT_FAIL_ENTRY */
293 struct {
294 __u64 hardware_entry_failure_reason;
e6546342 295 __u32 cpu;
51b24e34
JK
296 } fail_entry;
297 /* KVM_EXIT_EXCEPTION */
298 struct {
299 __u32 exception;
300 __u32 error_code;
301 } ex;
302 /* KVM_EXIT_IO */
303 struct {
304#define KVM_EXIT_IO_IN 0
305#define KVM_EXIT_IO_OUT 1
306 __u8 direction;
307 __u8 size; /* bytes */
308 __u16 port;
309 __u32 count;
310 __u64 data_offset; /* relative to kvm_run start */
311 } io;
3a824b15 312 /* KVM_EXIT_DEBUG */
51b24e34
JK
313 struct {
314 struct kvm_debug_exit_arch arch;
315 } debug;
316 /* KVM_EXIT_MMIO */
317 struct {
318 __u64 phys_addr;
319 __u8 data[8];
320 __u32 len;
321 __u8 is_write;
322 } mmio;
323 /* KVM_EXIT_HYPERCALL */
324 struct {
325 __u64 nr;
326 __u64 args[6];
327 __u64 ret;
328 __u32 longmode;
329 __u32 pad;
330 } hypercall;
331 /* KVM_EXIT_TPR_ACCESS */
332 struct {
333 __u64 rip;
334 __u32 is_write;
335 __u32 pad;
336 } tpr_access;
337 /* KVM_EXIT_S390_SIEIC */
338 struct {
339 __u8 icptcode;
340 __u16 ipa;
341 __u32 ipb;
342 } s390_sieic;
343 /* KVM_EXIT_S390_RESET */
344#define KVM_S390_RESET_POR 1
345#define KVM_S390_RESET_CLEAR 2
346#define KVM_S390_RESET_SUBSYSTEM 4
347#define KVM_S390_RESET_CPU_INIT 8
348#define KVM_S390_RESET_IPL 16
349 __u64 s390_reset_flags;
1529ae1b
AG
350 /* KVM_EXIT_S390_UCONTROL */
351 struct {
352 __u64 trans_exc_code;
353 __u32 pgm_code;
354 } s390_ucontrol;
a9fd1654 355 /* KVM_EXIT_DCR (deprecated) */
51b24e34
JK
356 struct {
357 __u32 dcrn;
358 __u32 data;
359 __u8 is_write;
360 } dcr;
3a824b15 361 /* KVM_EXIT_INTERNAL_ERROR */
51b24e34
JK
362 struct {
363 __u32 suberror;
364 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
365 __u32 ndata;
366 __u64 data[16];
367 } internal;
368 /* KVM_EXIT_OSI */
369 struct {
370 __u64 gprs[32];
371 } osi;
3a824b15 372 /* KVM_EXIT_PAPR_HCALL */
7c6da3de
AG
373 struct {
374 __u64 nr;
375 __u64 ret;
376 __u64 args[9];
377 } papr_hcall;
d3dccee1
AG
378 /* KVM_EXIT_S390_TSCH */
379 struct {
380 __u16 subchannel_id;
381 __u16 subchannel_nr;
382 __u32 io_int_parm;
383 __u32 io_int_word;
384 __u32 ipb;
385 __u8 dequeued;
386 } s390_tsch;
387 /* KVM_EXIT_EPR */
388 struct {
389 __u32 epr;
390 } epr;
b061808d
AG
391 /* KVM_EXIT_SYSTEM_EVENT */
392 struct {
393#define KVM_SYSTEM_EVENT_SHUTDOWN 1
394#define KVM_SYSTEM_EVENT_RESET 2
120758fb 395#define KVM_SYSTEM_EVENT_CRASH 3
b061808d
AG
396 __u32 type;
397 __u64 flags;
398 } system_event;
7a52ce8a
CH
399 /* KVM_EXIT_S390_STSI */
400 struct {
401 __u64 addr;
402 __u8 ar;
403 __u8 reserved;
404 __u8 fc;
405 __u8 sel1;
406 __u16 sel2;
407 } s390_stsi;
3a824b15
PB
408 /* KVM_EXIT_IOAPIC_EOI */
409 struct {
410 __u8 vector;
411 } eoi;
fff02bc0
PB
412 /* KVM_EXIT_HYPERV */
413 struct kvm_hyperv_exit hyperv;
2a886794
GK
414 /* KVM_EXIT_ARM_NISV */
415 struct {
416 __u64 esr_iss;
417 __u64 fault_ipa;
418 } arm_nisv;
53ba2eee
MR
419 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
420 struct {
421 __u8 error; /* user -> kernel */
422 __u8 pad[7];
423#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
424#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
425#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
426 __u32 reason; /* kernel -> user */
427 __u32 index; /* kernel -> user */
428 __u64 data; /* kernel <-> user */
429 } msr;
51b24e34
JK
430 /* Fix the size of the union. */
431 char padding[256];
432 };
1529ae1b 433
65a6d8dd
PM
434 /* 2048 is the size of the char array used to bound/pad the size
435 * of the union that holds sync regs.
436 */
437 #define SYNC_REGS_SIZE_BYTES 2048
1529ae1b
AG
438 /*
439 * shared registers between kvm and userspace.
440 * kvm_valid_regs specifies the register classes set by the host
441 * kvm_dirty_regs specified the register classes dirtied by userspace
442 * struct kvm_sync_regs is architecture specific, as well as the
443 * bits for kvm_valid_regs and kvm_dirty_regs
444 */
445 __u64 kvm_valid_regs;
446 __u64 kvm_dirty_regs;
447 union {
448 struct kvm_sync_regs regs;
65a6d8dd 449 char padding[SYNC_REGS_SIZE_BYTES];
1529ae1b 450 } s;
51b24e34
JK
451};
452
453/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
454
455struct kvm_coalesced_mmio_zone {
456 __u64 addr;
457 __u32 size;
966f2ec3
PB
458 union {
459 __u32 pad;
460 __u32 pio;
461 };
51b24e34
JK
462};
463
464struct kvm_coalesced_mmio {
465 __u64 phys_addr;
466 __u32 len;
966f2ec3
PB
467 union {
468 __u32 pad;
469 __u32 pio;
470 };
51b24e34
JK
471 __u8 data[8];
472};
473
474struct kvm_coalesced_mmio_ring {
475 __u32 first, last;
476 struct kvm_coalesced_mmio coalesced_mmio[0];
477};
478
479#define KVM_COALESCED_MMIO_MAX \
480 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
481 sizeof(struct kvm_coalesced_mmio))
482
483/* for KVM_TRANSLATE */
484struct kvm_translation {
485 /* in */
486 __u64 linear_address;
487
488 /* out */
489 __u64 physical_address;
490 __u8 valid;
491 __u8 writeable;
492 __u8 usermode;
493 __u8 pad[5];
494};
495
7a52ce8a
CH
496/* for KVM_S390_MEM_OP */
497struct kvm_s390_mem_op {
498 /* in */
499 __u64 gaddr; /* the guest address */
500 __u64 flags; /* flags */
501 __u32 size; /* amount of bytes */
502 __u32 op; /* type of operation */
503 __u64 buf; /* buffer in userspace */
dc6f8d45
CH
504 union {
505 __u8 ar; /* the access register number */
506 __u32 sida_offset; /* offset into the sida */
507 __u8 reserved[32]; /* should be set to 0 */
508 };
7a52ce8a
CH
509};
510/* types for kvm_s390_mem_op->op */
511#define KVM_S390_MEMOP_LOGICAL_READ 0
512#define KVM_S390_MEMOP_LOGICAL_WRITE 1
dc6f8d45
CH
513#define KVM_S390_MEMOP_SIDA_READ 2
514#define KVM_S390_MEMOP_SIDA_WRITE 3
7a52ce8a
CH
515/* flags for kvm_s390_mem_op->flags */
516#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
517#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
518
51b24e34
JK
519/* for KVM_INTERRUPT */
520struct kvm_interrupt {
521 /* in */
522 __u32 irq;
523};
524
525/* for KVM_GET_DIRTY_LOG */
526struct kvm_dirty_log {
527 __u32 slot;
528 __u32 padding1;
529 union {
530 void *dirty_bitmap; /* one bit per page */
531 __u64 padding2;
532 };
533};
534
da054c64
PB
535/* for KVM_CLEAR_DIRTY_LOG */
536struct kvm_clear_dirty_log {
537 __u32 slot;
538 __u32 num_pages;
539 __u64 first_page;
540 union {
541 void *dirty_bitmap; /* one bit per page */
542 __u64 padding2;
543 };
544};
545
51b24e34
JK
546/* for KVM_SET_SIGNAL_MASK */
547struct kvm_signal_mask {
548 __u32 len;
549 __u8 sigset[0];
550};
551
552/* for KVM_TPR_ACCESS_REPORTING */
553struct kvm_tpr_access_ctl {
554 __u32 enabled;
555 __u32 flags;
556 __u32 reserved[8];
557};
558
559/* for KVM_SET_VAPIC_ADDR */
560struct kvm_vapic_addr {
561 __u64 vapic_addr;
562};
563
a9fd1654 564/* for KVM_SET_MP_STATE */
51b24e34 565
a9fd1654 566/* not all states are valid on all architectures */
51b24e34
JK
567#define KVM_MP_STATE_RUNNABLE 0
568#define KVM_MP_STATE_UNINITIALIZED 1
569#define KVM_MP_STATE_INIT_RECEIVED 2
570#define KVM_MP_STATE_HALTED 3
571#define KVM_MP_STATE_SIPI_RECEIVED 4
a9fd1654
JF
572#define KVM_MP_STATE_STOPPED 5
573#define KVM_MP_STATE_CHECK_STOP 6
574#define KVM_MP_STATE_OPERATING 7
575#define KVM_MP_STATE_LOAD 8
51b24e34
JK
576
577struct kvm_mp_state {
578 __u32 mp_state;
579};
580
581struct kvm_s390_psw {
582 __u64 mask;
583 __u64 addr;
584};
585
586/* valid values for type in kvm_s390_interrupt */
587#define KVM_S390_SIGP_STOP 0xfffe0000u
588#define KVM_S390_PROGRAM_INT 0xfffe0001u
589#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
590#define KVM_S390_RESTART 0xfffe0003u
216db403
CB
591#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
592#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
d3dccee1 593#define KVM_S390_MCHK 0xfffe1000u
76eb98d5
JF
594#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
595#define KVM_S390_INT_CPU_TIMER 0xffff1005u
51b24e34
JK
596#define KVM_S390_INT_VIRTIO 0xffff2603u
597#define KVM_S390_INT_SERVICE 0xffff2401u
598#define KVM_S390_INT_EMERGENCY 0xffff1201u
1529ae1b 599#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d3dccee1
AG
600/* Anything below 0xfffe0000u is taken by INT_IO */
601#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
602 (((schid)) | \
603 ((ssid) << 16) | \
604 ((cssid) << 18) | \
605 ((ai) << 26))
606#define KVM_S390_INT_IO_MIN 0x00000000u
607#define KVM_S390_INT_IO_MAX 0xfffdffffu
120758fb 608#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d3dccee1 609
51b24e34
JK
610
611struct kvm_s390_interrupt {
612 __u32 type;
613 __u32 parm;
614 __u64 parm64;
615};
616
216db403
CB
617struct kvm_s390_io_info {
618 __u16 subchannel_id;
619 __u16 subchannel_nr;
620 __u32 io_int_parm;
621 __u32 io_int_word;
622};
623
624struct kvm_s390_ext_info {
625 __u32 ext_params;
626 __u32 pad;
627 __u64 ext_params2;
628};
629
630struct kvm_s390_pgm_info {
631 __u64 trans_exc_code;
632 __u64 mon_code;
633 __u64 per_address;
634 __u32 data_exc_code;
635 __u16 code;
636 __u16 mon_class_nr;
637 __u8 per_code;
638 __u8 per_atmid;
639 __u8 exc_access_id;
640 __u8 per_access_id;
641 __u8 op_access_id;
66fb2d54
CH
642#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
643#define KVM_S390_PGM_FLAGS_ILC_0 0x02
644#define KVM_S390_PGM_FLAGS_ILC_1 0x04
645#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
646#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
647 __u8 flags;
648 __u8 pad[2];
216db403
CB
649};
650
651struct kvm_s390_prefix_info {
652 __u32 address;
653};
654
655struct kvm_s390_extcall_info {
656 __u16 code;
657};
658
659struct kvm_s390_emerg_info {
660 __u16 code;
661};
662
51628b18
CB
663#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
664struct kvm_s390_stop_info {
665 __u32 flags;
666};
667
216db403
CB
668struct kvm_s390_mchk_info {
669 __u64 cr14;
670 __u64 mcic;
671 __u64 failing_storage_address;
672 __u32 ext_damage_code;
673 __u32 pad;
674 __u8 fixed_logout[16];
675};
676
677struct kvm_s390_irq {
678 __u64 type;
679 union {
680 struct kvm_s390_io_info io;
681 struct kvm_s390_ext_info ext;
682 struct kvm_s390_pgm_info pgm;
683 struct kvm_s390_emerg_info emerg;
684 struct kvm_s390_extcall_info extcall;
685 struct kvm_s390_prefix_info prefix;
51628b18 686 struct kvm_s390_stop_info stop;
216db403
CB
687 struct kvm_s390_mchk_info mchk;
688 char reserved[64];
689 } u;
690};
691
7a52ce8a
CH
692struct kvm_s390_irq_state {
693 __u64 buf;
9cbb6362 694 __u32 flags; /* will stay unused for compatibility reasons */
7a52ce8a 695 __u32 len;
9cbb6362 696 __u32 reserved[4]; /* will stay unused for compatibility reasons */
7a52ce8a
CH
697};
698
51b24e34
JK
699/* for KVM_SET_GUEST_DEBUG */
700
701#define KVM_GUESTDBG_ENABLE 0x00000001
702#define KVM_GUESTDBG_SINGLESTEP 0x00000002
703
704struct kvm_guest_debug {
705 __u32 control;
706 __u32 pad;
707 struct kvm_guest_debug_arch arch;
708};
709
710enum {
711 kvm_ioeventfd_flag_nr_datamatch,
712 kvm_ioeventfd_flag_nr_pio,
713 kvm_ioeventfd_flag_nr_deassign,
cae7f586 714 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
76eb98d5 715 kvm_ioeventfd_flag_nr_fast_mmio,
51b24e34
JK
716 kvm_ioeventfd_flag_nr_max,
717};
718
719#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
720#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
721#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
cae7f586
AG
722#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
723 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
51b24e34
JK
724
725#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
726
727struct kvm_ioeventfd {
728 __u64 datamatch;
729 __u64 addr; /* legal pio/mmio address */
76eb98d5 730 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
51b24e34
JK
731 __s32 fd;
732 __u32 flags;
733 __u8 pad[36];
734};
735
65a6d8dd 736#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
77d361b1 737#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
65a6d8dd 738#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
d38d201f 739#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
65a6d8dd 740#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
77d361b1 741 KVM_X86_DISABLE_EXITS_HLT | \
d38d201f
WL
742 KVM_X86_DISABLE_EXITS_PAUSE | \
743 KVM_X86_DISABLE_EXITS_CSTATE)
65a6d8dd 744
51b24e34
JK
745/* for KVM_ENABLE_CAP */
746struct kvm_enable_cap {
747 /* in */
748 __u32 cap;
749 __u32 flags;
750 __u64 args[4];
751 __u8 pad[64];
752};
753
754/* for KVM_PPC_GET_PVINFO */
3a5eb5b4
PB
755
756#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
757
51b24e34
JK
758struct kvm_ppc_pvinfo {
759 /* out */
760 __u32 flags;
761 __u32 hcall[4];
762 __u8 pad[108];
763};
764
80a3eb10
JK
765/* for KVM_PPC_GET_SMMU_INFO */
766#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
767
768struct kvm_ppc_one_page_size {
769 __u32 page_shift; /* Page shift (or 0) */
770 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
771};
772
773struct kvm_ppc_one_seg_page_size {
774 __u32 page_shift; /* Base page shift of segment (or 0) */
775 __u32 slb_enc; /* SLB encoding for BookS */
776 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
777};
778
779#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
780#define KVM_PPC_1T_SEGMENTS 0x00000002
966f2ec3 781#define KVM_PPC_NO_HASH 0x00000004
80a3eb10
JK
782
783struct kvm_ppc_smmu_info {
784 __u64 flags;
785 __u32 slb_size;
d4083f50
AP
786 __u16 data_keys; /* # storage keys supported for data */
787 __u16 instr_keys; /* # storage keys supported for instructions */
80a3eb10
JK
788 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
789};
790
3a5eb5b4
PB
791/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
792struct kvm_ppc_resize_hpt {
793 __u64 flags;
794 __u32 shift;
795 __u32 pad;
796};
d4834ff9 797
51b24e34
JK
798#define KVMIO 0xAE
799
1529ae1b
AG
800/* machine type bits, to be used as argument to KVM_CREATE_VM */
801#define KVM_VM_S390_UCONTROL 1
802
bf63839f
AW
803/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
804#define KVM_VM_PPC_HV 1
805#define KVM_VM_PPC_PR 2
806
94c7fefc
AJ
807/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
808#define KVM_VM_MIPS_AUTO 0
74c98e20 809#define KVM_VM_MIPS_VZ 1
94c7fefc 810#define KVM_VM_MIPS_TE 2
74c98e20 811
1529ae1b
AG
812#define KVM_S390_SIE_PAGE_OFFSET 1
813
da054c64
PB
814/*
815 * On arm64, machine type can be used to request the physical
816 * address size for the VM. Bits[7-0] are reserved for the guest
817 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
818 * value 0 implies the default IPA size, 40bits.
819 */
820#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
821#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
822 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
51b24e34
JK
823/*
824 * ioctls for /dev/kvm fds:
825 */
826#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
827#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
828#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
829
830#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
831/*
832 * Check if a kvm extension is available. Argument is extension number,
833 * return is 1 (yes) or 0 (no, sorry).
834 */
835#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
836/*
837 * Get size for mmap(vcpu_fd)
838 */
839#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
840#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
841#define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06
842#define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07
843#define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08
bf63839f 844#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
9f2d175d 845#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
51b24e34
JK
846
847/*
848 * Extension capability list.
849 */
850#define KVM_CAP_IRQCHIP 0
851#define KVM_CAP_HLT 1
852#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
853#define KVM_CAP_USER_MEMORY 3
854#define KVM_CAP_SET_TSS_ADDR 4
855#define KVM_CAP_VAPIC 6
856#define KVM_CAP_EXT_CPUID 7
857#define KVM_CAP_CLOCKSOURCE 8
7c6da3de 858#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
51b24e34
JK
859#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
860#define KVM_CAP_PIT 11
861#define KVM_CAP_NOP_IO_DELAY 12
862#define KVM_CAP_PV_MMU 13
863#define KVM_CAP_MP_STATE 14
864#define KVM_CAP_COALESCED_MMIO 15
865#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
51b24e34 866#define KVM_CAP_IOMMU 18
51b24e34
JK
867/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
868#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
51b24e34 869#define KVM_CAP_USER_NMI 22
51b24e34
JK
870#ifdef __KVM_HAVE_GUEST_DEBUG
871#define KVM_CAP_SET_GUEST_DEBUG 23
872#endif
873#ifdef __KVM_HAVE_PIT
874#define KVM_CAP_REINJECT_CONTROL 24
875#endif
51b24e34 876#define KVM_CAP_IRQ_ROUTING 25
51b24e34 877#define KVM_CAP_IRQ_INJECT_STATUS 26
51b24e34
JK
878#define KVM_CAP_ASSIGN_DEV_IRQ 29
879/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
880#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
881#ifdef __KVM_HAVE_MCE
882#define KVM_CAP_MCE 31
883#endif
884#define KVM_CAP_IRQFD 32
885#ifdef __KVM_HAVE_PIT
886#define KVM_CAP_PIT2 33
887#endif
888#define KVM_CAP_SET_BOOT_CPU_ID 34
889#ifdef __KVM_HAVE_PIT_STATE2
890#define KVM_CAP_PIT_STATE2 35
891#endif
892#define KVM_CAP_IOEVENTFD 36
893#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
894#ifdef __KVM_HAVE_XEN_HVM
895#define KVM_CAP_XEN_HVM 38
896#endif
897#define KVM_CAP_ADJUST_CLOCK 39
898#define KVM_CAP_INTERNAL_ERROR_DATA 40
899#ifdef __KVM_HAVE_VCPU_EVENTS
900#define KVM_CAP_VCPU_EVENTS 41
901#endif
902#define KVM_CAP_S390_PSW 42
903#define KVM_CAP_PPC_SEGSTATE 43
904#define KVM_CAP_HYPERV 44
905#define KVM_CAP_HYPERV_VAPIC 45
906#define KVM_CAP_HYPERV_SPIN 46
907#define KVM_CAP_PCI_SEGMENT 47
908#define KVM_CAP_PPC_PAIRED_SINGLES 48
909#define KVM_CAP_INTR_SHADOW 49
910#ifdef __KVM_HAVE_DEBUGREGS
911#define KVM_CAP_DEBUGREGS 50
912#endif
913#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
914#define KVM_CAP_PPC_OSI 52
915#define KVM_CAP_PPC_UNSET_IRQ 53
916#define KVM_CAP_ENABLE_CAP 54
917#ifdef __KVM_HAVE_XSAVE
918#define KVM_CAP_XSAVE 55
919#endif
920#ifdef __KVM_HAVE_XCRS
921#define KVM_CAP_XCRS 56
922#endif
923#define KVM_CAP_PPC_GET_PVINFO 57
924#define KVM_CAP_PPC_IRQ_LEVEL 58
925#define KVM_CAP_ASYNC_PF 59
926#define KVM_CAP_TSC_CONTROL 60
927#define KVM_CAP_GET_TSC_KHZ 61
928#define KVM_CAP_PPC_BOOKE_SREGS 62
7c6da3de
AG
929#define KVM_CAP_SPAPR_TCE 63
930#define KVM_CAP_PPC_SMT 64
931#define KVM_CAP_PPC_RMA 65
932#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
9d4e4f8c 933#define KVM_CAP_PPC_HIOR 67
7c6da3de 934#define KVM_CAP_PPC_PAPR 68
a54fc080 935#define KVM_CAP_SW_TLB 69
9d4e4f8c 936#define KVM_CAP_ONE_REG 70
1529ae1b
AG
937#define KVM_CAP_S390_GMAP 71
938#define KVM_CAP_TSC_DEADLINE_TIMER 72
939#define KVM_CAP_S390_UCONTROL 73
940#define KVM_CAP_SYNC_REGS 74
9ab2195d
MT
941#define KVM_CAP_PCI_2_3 75
942#define KVM_CAP_KVMCLOCK_CTRL 76
80a3eb10
JK
943#define KVM_CAP_SIGNAL_MSI 77
944#define KVM_CAP_PPC_GET_SMMU_INFO 78
2a60dba4 945#define KVM_CAP_S390_COW 79
651682dc 946#define KVM_CAP_PPC_ALLOC_HTAB 80
716b8e4d 947#define KVM_CAP_READONLY_MEM 81
716b8e4d 948#define KVM_CAP_IRQFD_RESAMPLE 82
d4834ff9
AG
949#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
950#define KVM_CAP_PPC_HTAB_FD 84
d3dccee1
AG
951#define KVM_CAP_S390_CSS_SUPPORT 85
952#define KVM_CAP_PPC_EPR 86
eadd0e44
PM
953#define KVM_CAP_ARM_PSCI 87
954#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
e098b453
AK
955#define KVM_CAP_DEVICE_CTRL 89
956#define KVM_CAP_IRQ_MPIC 90
957#define KVM_CAP_PPC_RTAS 91
958#define KVM_CAP_IRQ_XICS 92
c5daeae1 959#define KVM_CAP_ARM_EL1_32BIT 93
4f265607 960#define KVM_CAP_SPAPR_MULTITCE 94
bf63839f 961#define KVM_CAP_EXT_EMUL_CPUID 95
48a5f3bc 962#define KVM_CAP_HYPERV_TIME 96
9ffd2685
CH
963#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
964#define KVM_CAP_ENABLE_CAP_VM 98
965#define KVM_CAP_S390_IRQCHIP 99
76eb98d5
JF
966#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
967#define KVM_CAP_VM_ATTRIBUTES 101
b061808d
AG
968#define KVM_CAP_ARM_PSCI_0_2 102
969#define KVM_CAP_PPC_FIXUP_HCALL 103
a9fd1654
JF
970#define KVM_CAP_PPC_ENABLE_HCALL 104
971#define KVM_CAP_CHECK_EXTENSION_VM 105
51628b18 972#define KVM_CAP_S390_USER_SIGP 106
7a52ce8a
CH
973#define KVM_CAP_S390_VECTOR_REGISTERS 107
974#define KVM_CAP_S390_MEM_OP 108
975#define KVM_CAP_S390_USER_STSI 109
976#define KVM_CAP_S390_SKEYS 110
977#define KVM_CAP_MIPS_FPU 111
978#define KVM_CAP_MIPS_MSA 112
979#define KVM_CAP_S390_INJECT_IRQ 113
980#define KVM_CAP_S390_IRQ_STATE 114
981#define KVM_CAP_PPC_HWRNG 115
24a31426
PB
982#define KVM_CAP_DISABLE_QUIRKS 116
983#define KVM_CAP_X86_SMM 117
984#define KVM_CAP_MULTI_ADDRESS_SPACE 118
3a824b15
PB
985#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
986#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
987#define KVM_CAP_SPLIT_IRQCHIP 121
988#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
fff02bc0 989#define KVM_CAP_HYPERV_SYNIC 123
66fb2d54 990#define KVM_CAP_S390_RI 124
b89485a5
PB
991#define KVM_CAP_SPAPR_TCE_64 125
992#define KVM_CAP_ARM_PMU_V3 126
993#define KVM_CAP_VCPU_ATTRIBUTES 127
ff804f15 994#define KVM_CAP_MAX_VCPU_ID 128
dbdfea92
CH
995#define KVM_CAP_X2APIC_API 129
996#define KVM_CAP_S390_USER_INSTR0 130
997#define KVM_CAP_MSI_DEVID 131
998#define KVM_CAP_PPC_HTM 132
3a5eb5b4
PB
999#define KVM_CAP_SPAPR_RESIZE_HPT 133
1000#define KVM_CAP_PPC_MMU_RADIX 134
1001#define KVM_CAP_PPC_MMU_HASH_V3 135
1002#define KVM_CAP_IMMEDIATE_EXIT 136
74c98e20
CH
1003#define KVM_CAP_MIPS_VZ 137
1004#define KVM_CAP_MIPS_TE 138
1005#define KVM_CAP_MIPS_64BIT 139
1006#define KVM_CAP_S390_GS 140
1007#define KVM_CAP_S390_AIS 141
1008#define KVM_CAP_SPAPR_TCE_VFIO 142
65a6d8dd 1009#define KVM_CAP_X86_DISABLE_EXITS 143
74c98e20 1010#define KVM_CAP_ARM_USER_IRQ 144
3272f0e2
CB
1011#define KVM_CAP_S390_CMMA_MIGRATION 145
1012#define KVM_CAP_PPC_FWNMI 146
1013#define KVM_CAP_PPC_SMT_POSSIBLE 147
ab6e1550
CB
1014#define KVM_CAP_HYPERV_SYNIC2 148
1015#define KVM_CAP_HYPERV_VP_INDEX 149
dd873966 1016#define KVM_CAP_S390_AIS_MIGRATION 150
9cbb6362
CH
1017#define KVM_CAP_PPC_GET_CPU_CHAR 151
1018#define KVM_CAP_S390_BPB 152
9f2d175d 1019#define KVM_CAP_GET_MSR_FEATURES 153
65a6d8dd 1020#define KVM_CAP_HYPERV_EVENTFD 154
77d361b1 1021#define KVM_CAP_HYPERV_TLBFLUSH 155
d36f7de8
CH
1022#define KVM_CAP_S390_HPAGE_1M 156
1023#define KVM_CAP_NESTED_STATE 157
8f3cd250
CH
1024#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
1025#define KVM_CAP_MSR_PLATFORM_INFO 159
966f2ec3
PB
1026#define KVM_CAP_PPC_NESTED_HV 160
1027#define KVM_CAP_HYPERV_SEND_IPI 161
1028#define KVM_CAP_COALESCED_PIO 162
1029#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
1030#define KVM_CAP_EXCEPTION_PAYLOAD 164
da054c64 1031#define KVM_CAP_ARM_VM_IPA_SIZE 165
d9cb4336 1032#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
da054c64 1033#define KVM_CAP_HYPERV_CPUID 167
d9cb4336
CH
1034#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
1035#define KVM_CAP_PPC_IRQ_XIVE 169
1036#define KVM_CAP_ARM_SVE 170
1037#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1038#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
f363d039
EA
1039#define KVM_CAP_PMU_EVENT_FILTER 173
1040#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
1041#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
2a886794
GK
1042#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
1043#define KVM_CAP_ARM_NISV_TO_USER 177
1044#define KVM_CAP_ARM_INJECT_EXT_DABT 178
ddda3748 1045#define KVM_CAP_S390_VCPU_RESETS 179
dc6f8d45
CH
1046#define KVM_CAP_S390_PROTECTED 180
1047#define KVM_CAP_PPC_SECURE_GUEST 181
f76b348e
CH
1048#define KVM_CAP_HALT_POLL 182
1049#define KVM_CAP_ASYNC_PF_INT 183
e6546342
JW
1050#define KVM_CAP_LAST_CPU 184
1051#define KVM_CAP_SMALLER_MAXPHYADDR 185
1052#define KVM_CAP_S390_DIAG318 186
94c7fefc 1053#define KVM_CAP_STEAL_TIME 187
53ba2eee
MR
1054#define KVM_CAP_X86_USER_SPACE_MSR 188
1055#define KVM_CAP_X86_MSR_FILTER 189
1056#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
b3c818a4
EF
1057#define KVM_CAP_SYS_HYPERV_CPUID 191
1058#define KVM_CAP_DIRTY_LOG_RING 192
51b24e34
JK
1059
1060#ifdef KVM_CAP_IRQ_ROUTING
1061
1062struct kvm_irq_routing_irqchip {
1063 __u32 irqchip;
1064 __u32 pin;
1065};
1066
1067struct kvm_irq_routing_msi {
1068 __u32 address_lo;
1069 __u32 address_hi;
1070 __u32 data;
dbdfea92
CH
1071 union {
1072 __u32 pad;
1073 __u32 devid;
1074 };
51b24e34
JK
1075};
1076
9ffd2685
CH
1077struct kvm_irq_routing_s390_adapter {
1078 __u64 ind_addr;
1079 __u64 summary_addr;
1080 __u64 ind_offset;
1081 __u32 summary_offset;
1082 __u32 adapter_id;
1083};
1084
fff02bc0
PB
1085struct kvm_irq_routing_hv_sint {
1086 __u32 vcpu;
1087 __u32 sint;
1088};
1089
51b24e34
JK
1090/* gsi routing entry types */
1091#define KVM_IRQ_ROUTING_IRQCHIP 1
1092#define KVM_IRQ_ROUTING_MSI 2
9ffd2685 1093#define KVM_IRQ_ROUTING_S390_ADAPTER 3
fff02bc0 1094#define KVM_IRQ_ROUTING_HV_SINT 4
51b24e34
JK
1095
1096struct kvm_irq_routing_entry {
1097 __u32 gsi;
1098 __u32 type;
1099 __u32 flags;
1100 __u32 pad;
1101 union {
1102 struct kvm_irq_routing_irqchip irqchip;
1103 struct kvm_irq_routing_msi msi;
9ffd2685 1104 struct kvm_irq_routing_s390_adapter adapter;
fff02bc0 1105 struct kvm_irq_routing_hv_sint hv_sint;
51b24e34
JK
1106 __u32 pad[8];
1107 } u;
1108};
1109
1110struct kvm_irq_routing {
1111 __u32 nr;
1112 __u32 flags;
1113 struct kvm_irq_routing_entry entries[0];
1114};
1115
1116#endif
1117
1118#ifdef KVM_CAP_MCE
1119/* x86 MCE */
1120struct kvm_x86_mce {
1121 __u64 status;
1122 __u64 addr;
1123 __u64 misc;
1124 __u64 mcg_status;
1125 __u8 bank;
1126 __u8 pad1[7];
1127 __u64 pad2[3];
1128};
1129#endif
1130
1131#ifdef KVM_CAP_XEN_HVM
1132struct kvm_xen_hvm_config {
1133 __u32 flags;
1134 __u32 msr;
1135 __u64 blob_addr_32;
1136 __u64 blob_addr_64;
1137 __u8 blob_size_32;
1138 __u8 blob_size_64;
1139 __u8 pad2[30];
1140};
1141#endif
1142
1143#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
716b8e4d
AW
1144/*
1145 * Available with KVM_CAP_IRQFD_RESAMPLE
1146 *
1147 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1148 * the irqfd to operate in resampling mode for level triggered interrupt
f76b348e 1149 * emulation. See Documentation/virt/kvm/api.rst.
716b8e4d
AW
1150 */
1151#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
51b24e34
JK
1152
1153struct kvm_irqfd {
1154 __u32 fd;
1155 __u32 gsi;
1156 __u32 flags;
716b8e4d
AW
1157 __u32 resamplefd;
1158 __u8 pad[16];
51b24e34
JK
1159};
1160
bc204035
MT
1161/* For KVM_CAP_ADJUST_CLOCK */
1162
1163/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1164#define KVM_CLOCK_TSC_STABLE 2
1165
51b24e34
JK
1166struct kvm_clock_data {
1167 __u64 clock;
1168 __u32 flags;
1169 __u32 pad[9];
1170};
1171
bc204035
MT
1172/* For KVM_CAP_SW_TLB */
1173
a54fc080
AG
1174#define KVM_MMU_FSL_BOOKE_NOHV 0
1175#define KVM_MMU_FSL_BOOKE_HV 1
1176
1177struct kvm_config_tlb {
1178 __u64 params;
1179 __u64 array;
1180 __u32 mmu_type;
1181 __u32 array_len;
1182};
1183
1184struct kvm_dirty_tlb {
1185 __u64 bitmap;
1186 __u32 num_dirty;
1187};
1188
9d4e4f8c
AG
1189/* Available with KVM_CAP_ONE_REG */
1190
a31be480
AG
1191#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1192#define KVM_REG_GENERIC 0x0000000000000000ULL
9d4e4f8c
AG
1193
1194/*
1195 * Architecture specific registers are to be defined in arch headers and
1196 * ORed with the arch identifier.
1197 */
a31be480
AG
1198#define KVM_REG_PPC 0x1000000000000000ULL
1199#define KVM_REG_X86 0x2000000000000000ULL
1200#define KVM_REG_IA64 0x3000000000000000ULL
1201#define KVM_REG_ARM 0x4000000000000000ULL
1202#define KVM_REG_S390 0x5000000000000000ULL
c5daeae1
AK
1203#define KVM_REG_ARM64 0x6000000000000000ULL
1204#define KVM_REG_MIPS 0x7000000000000000ULL
f363d039 1205#define KVM_REG_RISCV 0x8000000000000000ULL
a31be480
AG
1206
1207#define KVM_REG_SIZE_SHIFT 52
1208#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1209#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1210#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1211#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1212#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1213#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1214#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1215#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1216#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
d9cb4336 1217#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
9d4e4f8c 1218
eadd0e44
PM
1219struct kvm_reg_list {
1220 __u64 n; /* number of regs */
1221 __u64 reg[0];
1222};
1223
9d4e4f8c
AG
1224struct kvm_one_reg {
1225 __u64 id;
a31be480 1226 __u64 addr;
9d4e4f8c
AG
1227};
1228
dbdfea92 1229#define KVM_MSI_VALID_DEVID (1U << 0)
80a3eb10
JK
1230struct kvm_msi {
1231 __u32 address_lo;
1232 __u32 address_hi;
1233 __u32 data;
1234 __u32 flags;
dbdfea92
CH
1235 __u32 devid;
1236 __u8 pad[12];
80a3eb10
JK
1237};
1238
eadd0e44
PM
1239struct kvm_arm_device_addr {
1240 __u64 id;
1241 __u64 addr;
1242};
1243
e098b453
AK
1244/*
1245 * Device control API, available with KVM_CAP_DEVICE_CTRL
1246 */
1247#define KVM_CREATE_DEVICE_TEST 1
1248
1249struct kvm_create_device {
1250 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1251 __u32 fd; /* out: device handle */
1252 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1253};
1254
1255struct kvm_device_attr {
1256 __u32 flags; /* no flags currently defined */
1257 __u32 group; /* device-defined */
1258 __u64 attr; /* group-defined */
1259 __u64 addr; /* userspace address of attr data */
1260};
1261
bf63839f
AW
1262#define KVM_DEV_VFIO_GROUP 1
1263#define KVM_DEV_VFIO_GROUP_ADD 1
1264#define KVM_DEV_VFIO_GROUP_DEL 2
74c98e20 1265#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
444b1996
AB
1266
1267enum kvm_device_type {
1268 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1269#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1270 KVM_DEV_TYPE_FSL_MPIC_42,
1271#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1272 KVM_DEV_TYPE_XICS,
1273#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1274 KVM_DEV_TYPE_VFIO,
1275#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1276 KVM_DEV_TYPE_ARM_VGIC_V2,
1277#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1278 KVM_DEV_TYPE_FLIC,
1279#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
51628b18
CB
1280 KVM_DEV_TYPE_ARM_VGIC_V3,
1281#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
dbdfea92
CH
1282 KVM_DEV_TYPE_ARM_VGIC_ITS,
1283#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
d9cb4336
CH
1284 KVM_DEV_TYPE_XIVE,
1285#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
2a886794
GK
1286 KVM_DEV_TYPE_ARM_PV_TIME,
1287#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
444b1996
AB
1288 KVM_DEV_TYPE_MAX,
1289};
e098b453 1290
74c98e20
CH
1291struct kvm_vfio_spapr_tce {
1292 __s32 groupfd;
1293 __s32 tablefd;
1294};
1295
51b24e34
JK
1296/*
1297 * ioctls for VM fds
1298 */
1299#define KVM_SET_MEMORY_REGION _IOW(KVMIO, 0x40, struct kvm_memory_region)
1300/*
1301 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1302 * a vcpu fd.
1303 */
1304#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1305#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
1306/* KVM_SET_MEMORY_ALIAS is obsolete: */
1307#define KVM_SET_MEMORY_ALIAS _IOW(KVMIO, 0x43, struct kvm_memory_alias)
1308#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
1309#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45)
1310#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
1311 struct kvm_userspace_memory_region)
1312#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1313#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
1529ae1b
AG
1314
1315/* enable ucontrol for s390 */
1316struct kvm_s390_ucas_mapping {
1317 __u64 user_addr;
1318 __u64 vcpu_addr;
1319 __u64 length;
1320};
1321#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1322#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
1323#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
1324
51b24e34
JK
1325/* Device model IOC */
1326#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1327#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1328#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1329#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1330#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1331#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1332#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1333#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
1334#define KVM_REGISTER_COALESCED_MMIO \
1335 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1336#define KVM_UNREGISTER_COALESCED_MMIO \
1337 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
1338#define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \
1339 struct kvm_assigned_pci_dev)
1340#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
1341/* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */
1342#define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70
1343#define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq)
1344#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
1345#define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \
1346 struct kvm_assigned_pci_dev)
1347#define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \
1348 struct kvm_assigned_msix_nr)
1349#define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \
1350 struct kvm_assigned_msix_entry)
1351#define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq)
1352#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1353#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1354#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1355#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1356#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1357#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1358#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1359/* Available with KVM_CAP_PIT_STATE2 */
1360#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1361#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
1362/* Available with KVM_CAP_PPC_GET_PVINFO */
1363#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
1364/* Available with KVM_CAP_TSC_CONTROL */
1365#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1366#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
9ab2195d
MT
1367/* Available with KVM_CAP_PCI_2_3 */
1368#define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \
1369 struct kvm_assigned_pci_dev)
80a3eb10
JK
1370/* Available with KVM_CAP_SIGNAL_MSI */
1371#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
1372/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1373#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
651682dc
MT
1374/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1375#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
d4834ff9 1376#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
b89485a5
PB
1377#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1378 struct kvm_create_spapr_tce_64)
d4834ff9
AG
1379/* Available with KVM_CAP_RMA */
1380#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
1381/* Available with KVM_CAP_PPC_HTAB_FD */
1382#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
eadd0e44
PM
1383/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1384#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
e098b453
AK
1385/* Available with KVM_CAP_PPC_RTAS */
1386#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
3a5eb5b4
PB
1387/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1388#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1389#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
1390/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1391#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1392/* Available with KVM_CAP_PPC_RADIX_MMU */
1393#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
9cbb6362
CH
1394/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1395#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
f363d039
EA
1396/* Available with KVM_CAP_PMU_EVENT_FILTER */
1397#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
50fd0c37 1398#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
e098b453
AK
1399
1400/* ioctl for vm fd */
1401#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1402
1403/* ioctls for fds returned by KVM_CREATE_DEVICE */
1404#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1405#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1406#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
51b24e34
JK
1407
1408/*
1409 * ioctls for vcpu fds
1410 */
1411#define KVM_RUN _IO(KVMIO, 0x80)
1412#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1413#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1414#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1415#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1416#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1417#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
1418/* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */
1419#define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87
1420#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1421#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1422#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1423#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
1424#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1425#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
1426#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1427#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
1428#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1429#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
1430/* Available with KVM_CAP_VAPIC */
1431#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
1432/* Available with KVM_CAP_VAPIC */
1433#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
1434/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1435#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
1436/* store status for s390 */
1437#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1438#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1439#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1440/* initial ipl psw for s390 */
1441#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1442/* initial reset for s390 */
1443#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
1444#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1445#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
444b1996 1446/* Available with KVM_CAP_USER_NMI */
51b24e34
JK
1447#define KVM_NMI _IO(KVMIO, 0x9a)
1448/* Available with KVM_CAP_SET_GUEST_DEBUG */
1449#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
1450/* MCE for x86 */
1451#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1452#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1453#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
51b24e34
JK
1454/* Available with KVM_CAP_VCPU_EVENTS */
1455#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1456#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
1457/* Available with KVM_CAP_DEBUGREGS */
1458#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1459#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
9ffd2685
CH
1460/*
1461 * vcpu version available with KVM_ENABLE_CAP
1462 * vm version available with KVM_CAP_ENABLE_CAP_VM
1463 */
51b24e34
JK
1464#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
1465/* Available with KVM_CAP_XSAVE */
1466#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1467#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1468/* Available with KVM_CAP_XCRS */
1469#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1470#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
a54fc080
AG
1471/* Available with KVM_CAP_SW_TLB */
1472#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
9d4e4f8c 1473/* Available with KVM_CAP_ONE_REG */
a31be480 1474#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
9d4e4f8c 1475#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
9ab2195d
MT
1476/* VM is being stopped by host */
1477#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
eadd0e44 1478#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
bf63839f 1479#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
eadd0e44 1480#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
7a52ce8a
CH
1481/* Available with KVM_CAP_S390_MEM_OP */
1482#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
1483/* Available with KVM_CAP_S390_SKEYS */
1484#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1485#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
1486/* Available with KVM_CAP_S390_INJECT_IRQ */
1487#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
1488/* Available with KVM_CAP_S390_IRQ_STATE */
1489#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1490#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
24a31426
PB
1491/* Available with KVM_CAP_X86_SMM */
1492#define KVM_SMI _IO(KVMIO, 0xb7)
3272f0e2 1493/* Available with KVM_CAP_S390_CMMA_MIGRATION */
ab6e1550 1494#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
3272f0e2 1495#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
9f2d175d
PB
1496/* Memory Encryption Commands */
1497#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
1498
1499struct kvm_enc_region {
1500 __u64 addr;
1501 __u64 size;
1502};
1503
1504#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1505#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1506
65a6d8dd
PM
1507/* Available with KVM_CAP_HYPERV_EVENTFD */
1508#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1509
d36f7de8
CH
1510/* Available with KVM_CAP_NESTED_STATE */
1511#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1512#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
65a6d8dd 1513
d9cb4336 1514/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
da054c64
PB
1515#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1516
b3c818a4 1517/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
da054c64
PB
1518#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1519
d9cb4336
CH
1520/* Available with KVM_CAP_ARM_SVE */
1521#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1522
ddda3748
CH
1523/* Available with KVM_CAP_S390_VCPU_RESETS */
1524#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1525#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1526
dc6f8d45
CH
1527struct kvm_s390_pv_sec_parm {
1528 __u64 origin;
1529 __u64 length;
1530};
1531
1532struct kvm_s390_pv_unp {
1533 __u64 addr;
1534 __u64 size;
1535 __u64 tweak;
1536};
1537
1538enum pv_cmd_id {
1539 KVM_PV_ENABLE,
1540 KVM_PV_DISABLE,
1541 KVM_PV_SET_SEC_PARMS,
1542 KVM_PV_UNPACK,
1543 KVM_PV_VERIFY,
1544 KVM_PV_PREP_RESET,
1545 KVM_PV_UNSHARE_ALL,
1546};
1547
1548struct kvm_pv_cmd {
1549 __u32 cmd; /* Command to be executed */
1550 __u16 rc; /* Ultravisor return code */
1551 __u16 rrc; /* Ultravisor return reason code */
1552 __u64 data; /* Data or address */
1553 __u32 flags; /* flags for future extensions. Must be 0 for now */
1554 __u32 reserved[3];
1555};
1556
1557/* Available with KVM_CAP_S390_PROTECTED */
1558#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1559
53ba2eee
MR
1560/* Available with KVM_CAP_X86_MSR_FILTER */
1561#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1562
b3c818a4
EF
1563/* Available with KVM_CAP_DIRTY_LOG_RING */
1564#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1565
9f2d175d
PB
1566/* Secure Encrypted Virtualization command */
1567enum sev_cmd_id {
1568 /* Guest initialization commands */
1569 KVM_SEV_INIT = 0,
1570 KVM_SEV_ES_INIT,
1571 /* Guest launch commands */
1572 KVM_SEV_LAUNCH_START,
1573 KVM_SEV_LAUNCH_UPDATE_DATA,
1574 KVM_SEV_LAUNCH_UPDATE_VMSA,
1575 KVM_SEV_LAUNCH_SECRET,
1576 KVM_SEV_LAUNCH_MEASURE,
1577 KVM_SEV_LAUNCH_FINISH,
1578 /* Guest migration commands (outgoing) */
1579 KVM_SEV_SEND_START,
1580 KVM_SEV_SEND_UPDATE_DATA,
1581 KVM_SEV_SEND_UPDATE_VMSA,
1582 KVM_SEV_SEND_FINISH,
1583 /* Guest migration commands (incoming) */
1584 KVM_SEV_RECEIVE_START,
1585 KVM_SEV_RECEIVE_UPDATE_DATA,
1586 KVM_SEV_RECEIVE_UPDATE_VMSA,
1587 KVM_SEV_RECEIVE_FINISH,
1588 /* Guest status and debug commands */
1589 KVM_SEV_GUEST_STATUS,
1590 KVM_SEV_DBG_DECRYPT,
1591 KVM_SEV_DBG_ENCRYPT,
1592 /* Guest certificates commands */
1593 KVM_SEV_CERT_EXPORT,
3ea1a802
BS
1594 /* Attestation report */
1595 KVM_SEV_GET_ATTESTATION_REPORT,
9f2d175d
PB
1596
1597 KVM_SEV_NR_MAX,
1598};
1599
1600struct kvm_sev_cmd {
1601 __u32 id;
1602 __u64 data;
1603 __u32 error;
1604 __u32 sev_fd;
1605};
1606
1607struct kvm_sev_launch_start {
1608 __u32 handle;
1609 __u32 policy;
1610 __u64 dh_uaddr;
1611 __u32 dh_len;
1612 __u64 session_uaddr;
1613 __u32 session_len;
1614};
1615
1616struct kvm_sev_launch_update_data {
1617 __u64 uaddr;
1618 __u32 len;
1619};
1620
1621
1622struct kvm_sev_launch_secret {
1623 __u64 hdr_uaddr;
1624 __u32 hdr_len;
1625 __u64 guest_uaddr;
1626 __u32 guest_len;
1627 __u64 trans_uaddr;
1628 __u32 trans_len;
1629};
1630
1631struct kvm_sev_launch_measure {
1632 __u64 uaddr;
1633 __u32 len;
1634};
1635
1636struct kvm_sev_guest_status {
1637 __u32 handle;
1638 __u32 policy;
1639 __u32 state;
1640};
1641
1642struct kvm_sev_dbg {
1643 __u64 src_uaddr;
1644 __u64 dst_uaddr;
1645 __u32 len;
1646};
51b24e34 1647
3ea1a802
BS
1648struct kvm_sev_attestation_report {
1649 __u8 mnonce[16];
1650 __u64 uaddr;
1651 __u32 len;
1652};
1653
51b24e34 1654#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
9ab2195d
MT
1655#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
1656#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
51b24e34
JK
1657
1658struct kvm_assigned_pci_dev {
1659 __u32 assigned_dev_id;
1660 __u32 busnr;
1661 __u32 devfn;
1662 __u32 flags;
1663 __u32 segnr;
1664 union {
1665 __u32 reserved[11];
1666 };
1667};
1668
1669#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
1670#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
1671#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
1672
1673#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
1674#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
1675#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
1676
1677#define KVM_DEV_IRQ_HOST_MASK 0x00ff
1678#define KVM_DEV_IRQ_GUEST_MASK 0xff00
1679
1680struct kvm_assigned_irq {
1681 __u32 assigned_dev_id;
7c6da3de 1682 __u32 host_irq; /* ignored (legacy field) */
51b24e34
JK
1683 __u32 guest_irq;
1684 __u32 flags;
1685 union {
51b24e34
JK
1686 __u32 reserved[12];
1687 };
1688};
1689
51b24e34
JK
1690struct kvm_assigned_msix_nr {
1691 __u32 assigned_dev_id;
1692 __u16 entry_nr;
1693 __u16 padding;
1694};
1695
1696#define KVM_MAX_MSIX_PER_DEV 256
1697struct kvm_assigned_msix_entry {
1698 __u32 assigned_dev_id;
1699 __u32 gsi;
1700 __u16 entry; /* The index of entry in the MSI-X table */
1701 __u16 padding[3];
1702};
1703
dbdfea92
CH
1704#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
1705#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
1706
74c98e20
CH
1707/* Available with KVM_CAP_ARM_USER_IRQ */
1708
1709/* Bits for run->s.regs.device_irq_level */
1710#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
1711#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
1712#define KVM_ARM_DEV_PMU (1 << 2)
1713
65a6d8dd
PM
1714struct kvm_hyperv_eventfd {
1715 __u32 conn_id;
1716 __s32 fd;
1717 __u32 flags;
1718 __u32 padding[3];
1719};
1720
1721#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
1722#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
1723
dc6f8d45
CH
1724#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
1725#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
1726
b3c818a4
EF
1727/*
1728 * Arch needs to define the macro after implementing the dirty ring
1729 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
1730 * starting page offset of the dirty ring structures.
1731 */
1732#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
1733#define KVM_DIRTY_LOG_PAGE_OFFSET 0
1734#endif
1735
1736/*
1737 * KVM dirty GFN flags, defined as:
1738 *
1739 * |---------------+---------------+--------------|
1740 * | bit 1 (reset) | bit 0 (dirty) | Status |
1741 * |---------------+---------------+--------------|
1742 * | 0 | 0 | Invalid GFN |
1743 * | 0 | 1 | Dirty GFN |
1744 * | 1 | X | GFN to reset |
1745 * |---------------+---------------+--------------|
1746 *
1747 * Lifecycle of a dirty GFN goes like:
1748 *
1749 * dirtied harvested reset
1750 * 00 -----------> 01 -------------> 1X -------+
1751 * ^ |
1752 * | |
1753 * +------------------------------------------+
1754 *
1755 * The userspace program is only responsible for the 01->1X state
1756 * conversion after harvesting an entry. Also, it must not skip any
1757 * dirty bits, so that dirty bits are always harvested in sequence.
1758 */
1759#define KVM_DIRTY_GFN_F_DIRTY BIT(0)
1760#define KVM_DIRTY_GFN_F_RESET BIT(1)
1761#define KVM_DIRTY_GFN_F_MASK 0x3
1762
1763/*
1764 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
1765 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
1766 * size of the gfn buffer is decided by the first argument when
1767 * enabling KVM_CAP_DIRTY_LOG_RING.
1768 */
1769struct kvm_dirty_gfn {
1770 __u32 flags;
1771 __u32 slot;
1772 __u64 offset;
1773};
1774
51b24e34 1775#endif /* __LINUX_KVM_H */
This page took 0.800551 seconds and 4 git commands to generate.