]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - include/uapi/linux/kvm.h
KVM: SVM: Add KVM_SEV_RECEIVE_UPDATE_DATA command
[mirror_ubuntu-jammy-kernel.git] / include / uapi / linux / kvm.h
CommitLineData
6f52b16c 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
6aa8b732
AK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
dea8caee 8 * Note: you must update KVM_API_VERSION if you change this interface.
6aa8b732
AK
9 */
10
00bfddaf 11#include <linux/types.h>
97646202 12#include <linux/compiler.h>
6aa8b732 13#include <linux/ioctl.h>
f6a40e3b 14#include <asm/kvm.h>
6aa8b732 15
2ff81f70 16#define KVM_API_VERSION 12
0b76e20b 17
c54d2aba
JK
18/* *** Deprecated interfaces *** */
19
20#define KVM_TRC_SHIFT 16
21
22#define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT)
23#define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1))
24
25#define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01)
26#define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02)
27#define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01)
28
29#define KVM_TRC_HEAD_SIZE 12
30#define KVM_TRC_CYCLE_SIZE 8
31#define KVM_TRC_EXTRA_MAX 7
32
33#define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02)
34#define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03)
35#define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04)
36#define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05)
37#define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06)
38#define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07)
39#define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08)
40#define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09)
41#define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A)
42#define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B)
43#define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C)
44#define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D)
45#define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E)
46#define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F)
47#define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10)
48#define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11)
49#define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12)
50#define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13)
51#define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14)
52#define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15)
53#define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16)
54#define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17)
55#define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18)
56#define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19)
57
2714d1d3 58struct kvm_user_trace_setup {
c54d2aba
JK
59 __u32 buf_size;
60 __u32 buf_nr;
61};
62
63#define __KVM_DEPRECATED_MAIN_W_0x06 \
64 _IOW(KVMIO, 0x06, struct kvm_user_trace_setup)
65#define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07)
66#define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08)
67
68#define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq)
69
70struct kvm_breakpoint {
71 __u32 enabled;
72 __u32 padding;
73 __u64 address;
74};
75
76struct kvm_debug_guest {
77 __u32 enabled;
78 __u32 pad;
79 struct kvm_breakpoint breakpoints[4];
80 __u32 singlestep;
2714d1d3
FEL
81};
82
c54d2aba
JK
83#define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest)
84
85/* *** End of deprecated interfaces *** */
86
87
6aa8b732
AK
88/* for KVM_CREATE_MEMORY_REGION */
89struct kvm_memory_region {
90 __u32 slot;
91 __u32 flags;
92 __u64 guest_phys_addr;
93 __u64 memory_size; /* bytes */
94};
95
6fc138d2
IE
96/* for KVM_SET_USER_MEMORY_REGION */
97struct kvm_userspace_memory_region {
98 __u32 slot;
99 __u32 flags;
100 __u64 guest_phys_addr;
101 __u64 memory_size; /* bytes */
102 __u64 userspace_addr; /* start of the userspace allocated memory */
103};
104
67b29204
XG
105/*
106 * The bit 0 ~ bit 15 of kvm_memory_region::flags are visible for userspace,
107 * other bits are reserved for kvm internal use which are defined in
108 * include/linux/kvm_host.h.
109 */
4d8b81ab
XG
110#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
111#define KVM_MEM_READONLY (1UL << 1)
6aa8b732 112
97222cc8 113/* for KVM_IRQ_LINE */
85f455f7
ED
114struct kvm_irq_level {
115 /*
116 * ACPI gsi notion of irq.
117 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
118 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
3ecad8c2 119 * For ARM: See Documentation/virt/kvm/api.rst
85f455f7 120 */
4925663a
GN
121 union {
122 __u32 irq;
123 __s32 status;
124 };
85f455f7
ED
125 __u32 level;
126};
127
6ceb9d79
HQ
128
129struct kvm_irqchip {
130 __u32 chip_id;
131 __u32 pad;
132 union {
133 char dummy[512]; /* reserving space */
7a0eb196 134#ifdef __KVM_HAVE_PIT
6ceb9d79 135 struct kvm_pic_state pic;
ec10f475 136#endif
7a0eb196 137#ifdef __KVM_HAVE_IOAPIC
6bf9e962 138 struct kvm_ioapic_state ioapic;
51e29625 139#endif
6ceb9d79
HQ
140 } chip;
141};
142
c5ff41ce
JK
143/* for KVM_CREATE_PIT2 */
144struct kvm_pit_config {
145 __u32 flags;
146 __u32 pad[15];
147};
148
149#define KVM_PIT_SPEAKER_DUMMY 1
150
30ee2a98
JH
151struct kvm_s390_skeys {
152 __u64 start_gfn;
153 __u64 count;
154 __u64 skeydata_addr;
155 __u32 flags;
156 __u32 reserved[9];
157};
db397571 158
4036e387
CI
159#define KVM_S390_CMMA_PEEK (1 << 0)
160
161/**
162 * kvm_s390_cmma_log - Used for CMMA migration.
163 *
164 * Used both for input and output.
165 *
166 * @start_gfn: Guest page number to start from.
167 * @count: Size of the result buffer.
168 * @flags: Control operation mode via KVM_S390_CMMA_* flags
169 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
170 * pages are still remaining.
171 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
172 * in the PGSTE.
173 * @values: Pointer to the values buffer.
174 *
175 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
176 */
177struct kvm_s390_cmma_log {
178 __u64 start_gfn;
179 __u32 count;
180 __u32 flags;
181 union {
182 __u64 remaining;
183 __u64 mask;
184 };
185 __u64 values;
186};
187
db397571
AS
188struct kvm_hyperv_exit {
189#define KVM_EXIT_HYPERV_SYNIC 1
83326e43 190#define KVM_EXIT_HYPERV_HCALL 2
f97f5a56 191#define KVM_EXIT_HYPERV_SYNDBG 3
db397571 192 __u32 type;
f7d31e65 193 __u32 pad1;
db397571
AS
194 union {
195 struct {
196 __u32 msr;
f7d31e65 197 __u32 pad2;
db397571
AS
198 __u64 control;
199 __u64 evt_page;
200 __u64 msg_page;
201 } synic;
83326e43
AS
202 struct {
203 __u64 input;
204 __u64 result;
205 __u64 params[2];
206 } hcall;
f97f5a56
JD
207 struct {
208 __u32 msr;
209 __u32 pad2;
210 __u64 control;
211 __u64 status;
212 __u64 send_page;
213 __u64 recv_page;
214 __u64 pending_page;
215 } syndbg;
db397571
AS
216 } u;
217};
218
23200b7a
JM
219struct kvm_xen_exit {
220#define KVM_EXIT_XEN_HCALL 1
221 __u32 type;
222 union {
223 struct {
224 __u32 longmode;
225 __u32 cpl;
226 __u64 input;
227 __u64 result;
228 __u64 params[6];
229 } hcall;
230 } u;
231};
232
30ee2a98
JH
233#define KVM_S390_GET_SKEYS_NONE 1
234#define KVM_S390_SKEYS_MAX 1048576
235
8a45450d
AK
236#define KVM_EXIT_UNKNOWN 0
237#define KVM_EXIT_EXCEPTION 1
238#define KVM_EXIT_IO 2
239#define KVM_EXIT_HYPERCALL 3
240#define KVM_EXIT_DEBUG 4
241#define KVM_EXIT_HLT 5
242#define KVM_EXIT_MMIO 6
243#define KVM_EXIT_IRQ_WINDOW_OPEN 7
244#define KVM_EXIT_SHUTDOWN 8
245#define KVM_EXIT_FAIL_ENTRY 9
246#define KVM_EXIT_INTR 10
247#define KVM_EXIT_SET_TPR 11
b209749f 248#define KVM_EXIT_TPR_ACCESS 12
8f2abe6a 249#define KVM_EXIT_S390_SIEIC 13
e28acfea 250#define KVM_EXIT_S390_RESET 14
ce91ddc4 251#define KVM_EXIT_DCR 15 /* deprecated */
c4abb7c9 252#define KVM_EXIT_NMI 16
3f5d18a9 253#define KVM_EXIT_INTERNAL_ERROR 17
ad0a048b 254#define KVM_EXIT_OSI 18
de56a948 255#define KVM_EXIT_PAPR_HCALL 19
e168bf8d 256#define KVM_EXIT_S390_UCONTROL 20
f61c94bb 257#define KVM_EXIT_WATCHDOG 21
fa6b7fe9 258#define KVM_EXIT_S390_TSCH 22
1c810636 259#define KVM_EXIT_EPR 23
8ad6b634 260#define KVM_EXIT_SYSTEM_EVENT 24
e44fc8c9 261#define KVM_EXIT_S390_STSI 25
7543a635 262#define KVM_EXIT_IOAPIC_EOI 26
db397571 263#define KVM_EXIT_HYPERV 27
c726200d 264#define KVM_EXIT_ARM_NISV 28
1ae09954
AG
265#define KVM_EXIT_X86_RDMSR 29
266#define KVM_EXIT_X86_WRMSR 30
fb04a1ed 267#define KVM_EXIT_DIRTY_RING_FULL 31
647daca2 268#define KVM_EXIT_AP_RESET_HOLD 32
fe6b6bc8 269#define KVM_EXIT_X86_BUS_LOCK 33
23200b7a 270#define KVM_EXIT_XEN 34
3f5d18a9
AK
271
272/* For KVM_EXIT_INTERNAL_ERROR */
b9bf6882
XG
273/* Emulate instruction failed. */
274#define KVM_INTERNAL_ERROR_EMULATION 1
275/* Encounter unexpected simultaneous exceptions. */
276#define KVM_INTERNAL_ERROR_SIMUL_EX 2
277/* Encounter unexpected vm-exit due to delivery event. */
278#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
7396d337
LA
279/* Encounter unexpected vm-exit reason */
280#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
6aa8b732 281
9a2bb7f4 282/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
6aa8b732
AK
283struct kvm_run {
284 /* in */
c1150d8c 285 __u8 request_interrupt_window;
460df4c1
PB
286 __u8 immediate_exit;
287 __u8 padding1[6];
6aa8b732
AK
288
289 /* out */
6aa8b732 290 __u32 exit_reason;
c1150d8c
DL
291 __u8 ready_for_interrupt_injection;
292 __u8 if_flag;
f077825a 293 __u16 flags;
54810342
DL
294
295 /* in (pre_kvm_run), out (post_kvm_run) */
c1150d8c
DL
296 __u64 cr8;
297 __u64 apic_base;
298
d7b0b5eb
CO
299#ifdef __KVM_S390
300 /* the processor status word for s390 */
301 __u64 psw_mask; /* psw upper half */
302 __u64 psw_addr; /* psw lower half */
303#endif
6aa8b732
AK
304 union {
305 /* KVM_EXIT_UNKNOWN */
306 struct {
8eb7d334 307 __u64 hardware_exit_reason;
6aa8b732 308 } hw;
8eb7d334
AK
309 /* KVM_EXIT_FAIL_ENTRY */
310 struct {
311 __u64 hardware_entry_failure_reason;
1aa561b1 312 __u32 cpu;
8eb7d334 313 } fail_entry;
6aa8b732
AK
314 /* KVM_EXIT_EXCEPTION */
315 struct {
316 __u32 exception;
317 __u32 error_code;
318 } ex;
319 /* KVM_EXIT_IO */
2f8b9ee1 320 struct {
6aa8b732
AK
321#define KVM_EXIT_IO_IN 0
322#define KVM_EXIT_IO_OUT 1
323 __u8 direction;
324 __u8 size; /* bytes */
6aa8b732 325 __u16 port;
039576c0
AK
326 __u32 count;
327 __u64 data_offset; /* relative to kvm_run start */
6aa8b732 328 } io;
8ab30c15 329 /* KVM_EXIT_DEBUG */
6aa8b732 330 struct {
d0bfb940 331 struct kvm_debug_exit_arch arch;
6aa8b732
AK
332 } debug;
333 /* KVM_EXIT_MMIO */
334 struct {
335 __u64 phys_addr;
336 __u8 data[8];
337 __u32 len;
338 __u8 is_write;
339 } mmio;
b4e63f56
AK
340 /* KVM_EXIT_HYPERCALL */
341 struct {
519ef353 342 __u64 nr;
b4e63f56
AK
343 __u64 args[6];
344 __u64 ret;
345 __u32 longmode;
346 __u32 pad;
347 } hypercall;
b209749f
AK
348 /* KVM_EXIT_TPR_ACCESS */
349 struct {
350 __u64 rip;
351 __u32 is_write;
352 __u32 pad;
353 } tpr_access;
8f2abe6a
CB
354 /* KVM_EXIT_S390_SIEIC */
355 struct {
356 __u8 icptcode;
8f2abe6a
CB
357 __u16 ipa;
358 __u32 ipb;
359 } s390_sieic;
e28acfea
CB
360 /* KVM_EXIT_S390_RESET */
361#define KVM_S390_RESET_POR 1
362#define KVM_S390_RESET_CLEAR 2
363#define KVM_S390_RESET_SUBSYSTEM 4
364#define KVM_S390_RESET_CPU_INIT 8
365#define KVM_S390_RESET_IPL 16
366 __u64 s390_reset_flags;
e168bf8d
CO
367 /* KVM_EXIT_S390_UCONTROL */
368 struct {
369 __u64 trans_exc_code;
370 __u32 pgm_code;
371 } s390_ucontrol;
ce91ddc4 372 /* KVM_EXIT_DCR (deprecated) */
b2312f05
HB
373 struct {
374 __u32 dcrn;
375 __u32 data;
376 __u8 is_write;
377 } dcr;
8ab30c15 378 /* KVM_EXIT_INTERNAL_ERROR */
3f5d18a9
AK
379 struct {
380 __u32 suberror;
a9c7399d
AK
381 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
382 __u32 ndata;
383 __u64 data[16];
3f5d18a9 384 } internal;
ad0a048b
AG
385 /* KVM_EXIT_OSI */
386 struct {
387 __u64 gprs[32];
388 } osi;
8ab30c15 389 /* KVM_EXIT_PAPR_HCALL */
de56a948
PM
390 struct {
391 __u64 nr;
392 __u64 ret;
393 __u64 args[9];
394 } papr_hcall;
fa6b7fe9
CH
395 /* KVM_EXIT_S390_TSCH */
396 struct {
397 __u16 subchannel_id;
398 __u16 subchannel_nr;
399 __u32 io_int_parm;
400 __u32 io_int_word;
401 __u32 ipb;
402 __u8 dequeued;
403 } s390_tsch;
1c810636
AG
404 /* KVM_EXIT_EPR */
405 struct {
406 __u32 epr;
407 } epr;
8ad6b634
AP
408 /* KVM_EXIT_SYSTEM_EVENT */
409 struct {
410#define KVM_SYSTEM_EVENT_SHUTDOWN 1
411#define KVM_SYSTEM_EVENT_RESET 2
2ce79189 412#define KVM_SYSTEM_EVENT_CRASH 3
8ad6b634
AP
413 __u32 type;
414 __u64 flags;
415 } system_event;
e44fc8c9
ET
416 /* KVM_EXIT_S390_STSI */
417 struct {
418 __u64 addr;
419 __u8 ar;
420 __u8 reserved;
421 __u8 fc;
422 __u8 sel1;
423 __u16 sel2;
424 } s390_stsi;
7543a635
SR
425 /* KVM_EXIT_IOAPIC_EOI */
426 struct {
427 __u8 vector;
428 } eoi;
db397571
AS
429 /* KVM_EXIT_HYPERV */
430 struct kvm_hyperv_exit hyperv;
c726200d
CD
431 /* KVM_EXIT_ARM_NISV */
432 struct {
433 __u64 esr_iss;
434 __u64 fault_ipa;
435 } arm_nisv;
1ae09954
AG
436 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
437 struct {
438 __u8 error; /* user -> kernel */
439 __u8 pad[7];
440#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
441#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
1a155254 442#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
1ae09954
AG
443 __u32 reason; /* kernel -> user */
444 __u32 index; /* kernel -> user */
445 __u64 data; /* kernel <-> user */
446 } msr;
23200b7a
JM
447 /* KVM_EXIT_XEN */
448 struct kvm_xen_exit xen;
24cbc7e9
AK
449 /* Fix the size of the union. */
450 char padding[256];
6aa8b732 451 };
b9e5dc8d 452
7b7e3952
KH
453 /* 2048 is the size of the char array used to bound/pad the size
454 * of the union that holds sync regs.
455 */
456 #define SYNC_REGS_SIZE_BYTES 2048
b9e5dc8d
CB
457 /*
458 * shared registers between kvm and userspace.
459 * kvm_valid_regs specifies the register classes set by the host
460 * kvm_dirty_regs specified the register classes dirtied by userspace
461 * struct kvm_sync_regs is architecture specific, as well as the
462 * bits for kvm_valid_regs and kvm_dirty_regs
463 */
464 __u64 kvm_valid_regs;
465 __u64 kvm_dirty_regs;
466 union {
467 struct kvm_sync_regs regs;
7b7e3952 468 char padding[SYNC_REGS_SIZE_BYTES];
b9e5dc8d 469 } s;
6aa8b732
AK
470};
471
5f94c174
LV
472/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
473
474struct kvm_coalesced_mmio_zone {
475 __u64 addr;
476 __u32 size;
0804c849
PH
477 union {
478 __u32 pad;
479 __u32 pio;
480 };
5f94c174
LV
481};
482
483struct kvm_coalesced_mmio {
484 __u64 phys_addr;
485 __u32 len;
0804c849
PH
486 union {
487 __u32 pad;
488 __u32 pio;
489 };
5f94c174
LV
490 __u8 data[8];
491};
492
493struct kvm_coalesced_mmio_ring {
494 __u32 first, last;
495 struct kvm_coalesced_mmio coalesced_mmio[0];
496};
497
498#define KVM_COALESCED_MMIO_MAX \
499 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
500 sizeof(struct kvm_coalesced_mmio))
501
6aa8b732
AK
502/* for KVM_TRANSLATE */
503struct kvm_translation {
504 /* in */
505 __u64 linear_address;
6aa8b732
AK
506
507 /* out */
508 __u64 physical_address;
509 __u8 valid;
510 __u8 writeable;
511 __u8 usermode;
8cd13307 512 __u8 pad[5];
6aa8b732
AK
513};
514
41408c28
TH
515/* for KVM_S390_MEM_OP */
516struct kvm_s390_mem_op {
517 /* in */
518 __u64 gaddr; /* the guest address */
519 __u64 flags; /* flags */
520 __u32 size; /* amount of bytes */
521 __u32 op; /* type of operation */
522 __u64 buf; /* buffer in userspace */
19e12277
JF
523 union {
524 __u8 ar; /* the access register number */
525 __u32 sida_offset; /* offset into the sida */
526 __u8 reserved[32]; /* should be set to 0 */
527 };
41408c28
TH
528};
529/* types for kvm_s390_mem_op->op */
530#define KVM_S390_MEMOP_LOGICAL_READ 0
531#define KVM_S390_MEMOP_LOGICAL_WRITE 1
19e12277
JF
532#define KVM_S390_MEMOP_SIDA_READ 2
533#define KVM_S390_MEMOP_SIDA_WRITE 3
41408c28
TH
534/* flags for kvm_s390_mem_op->flags */
535#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
536#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
537
6aa8b732
AK
538/* for KVM_INTERRUPT */
539struct kvm_interrupt {
540 /* in */
6aa8b732
AK
541 __u32 irq;
542};
543
6aa8b732
AK
544/* for KVM_GET_DIRTY_LOG */
545struct kvm_dirty_log {
546 __u32 slot;
2f8b9ee1 547 __u32 padding1;
6aa8b732
AK
548 union {
549 void __user *dirty_bitmap; /* one bit per page */
2f8b9ee1 550 __u64 padding2;
6aa8b732
AK
551 };
552};
553
2a31b9db
PB
554/* for KVM_CLEAR_DIRTY_LOG */
555struct kvm_clear_dirty_log {
556 __u32 slot;
557 __u32 num_pages;
558 __u64 first_page;
559 union {
560 void __user *dirty_bitmap; /* one bit per page */
561 __u64 padding2;
562 };
563};
564
1961d276
AK
565/* for KVM_SET_SIGNAL_MASK */
566struct kvm_signal_mask {
567 __u32 len;
568 __u8 sigset[0];
569};
570
b209749f
AK
571/* for KVM_TPR_ACCESS_REPORTING */
572struct kvm_tpr_access_ctl {
573 __u32 enabled;
574 __u32 flags;
575 __u32 reserved[8];
576};
577
b93463aa
AK
578/* for KVM_SET_VAPIC_ADDR */
579struct kvm_vapic_addr {
580 __u64 vapic_addr;
581};
582
0b4820d6 583/* for KVM_SET_MP_STATE */
62d9f0db 584
0b4820d6 585/* not all states are valid on all architectures */
62d9f0db
MT
586#define KVM_MP_STATE_RUNNABLE 0
587#define KVM_MP_STATE_UNINITIALIZED 1
588#define KVM_MP_STATE_INIT_RECEIVED 2
589#define KVM_MP_STATE_HALTED 3
590#define KVM_MP_STATE_SIPI_RECEIVED 4
6352e4d2
DH
591#define KVM_MP_STATE_STOPPED 5
592#define KVM_MP_STATE_CHECK_STOP 6
593#define KVM_MP_STATE_OPERATING 7
594#define KVM_MP_STATE_LOAD 8
647daca2 595#define KVM_MP_STATE_AP_RESET_HOLD 9
62d9f0db
MT
596
597struct kvm_mp_state {
598 __u32 mp_state;
599};
600
b0c632db
HC
601struct kvm_s390_psw {
602 __u64 mask;
603 __u64 addr;
604};
605
ba5c1e9b
CO
606/* valid values for type in kvm_s390_interrupt */
607#define KVM_S390_SIGP_STOP 0xfffe0000u
608#define KVM_S390_PROGRAM_INT 0xfffe0001u
609#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
610#define KVM_S390_RESTART 0xfffe0003u
3c038e6b
DD
611#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
612#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
48a3e950 613#define KVM_S390_MCHK 0xfffe1000u
e029ae5b
TH
614#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
615#define KVM_S390_INT_CPU_TIMER 0xffff1005u
ba5c1e9b
CO
616#define KVM_S390_INT_VIRTIO 0xffff2603u
617#define KVM_S390_INT_SERVICE 0xffff2401u
618#define KVM_S390_INT_EMERGENCY 0xffff1201u
7697e71f 619#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d8346b7d
CH
620/* Anything below 0xfffe0000u is taken by INT_IO */
621#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
622 (((schid)) | \
623 ((ssid) << 16) | \
624 ((cssid) << 18) | \
625 ((ai) << 26))
626#define KVM_S390_INT_IO_MIN 0x00000000u
627#define KVM_S390_INT_IO_MAX 0xfffdffffu
a37281b6 628#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d8346b7d 629
ba5c1e9b
CO
630
631struct kvm_s390_interrupt {
632 __u32 type;
633 __u32 parm;
634 __u64 parm64;
635};
636
81aa8efe
JF
637struct kvm_s390_io_info {
638 __u16 subchannel_id;
639 __u16 subchannel_nr;
640 __u32 io_int_parm;
641 __u32 io_int_word;
642};
643
644struct kvm_s390_ext_info {
645 __u32 ext_params;
646 __u32 pad;
647 __u64 ext_params2;
648};
649
650struct kvm_s390_pgm_info {
651 __u64 trans_exc_code;
652 __u64 mon_code;
653 __u64 per_address;
654 __u32 data_exc_code;
655 __u16 code;
656 __u16 mon_class_nr;
657 __u8 per_code;
658 __u8 per_atmid;
659 __u8 exc_access_id;
660 __u8 per_access_id;
661 __u8 op_access_id;
634790b8
DH
662#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
663#define KVM_S390_PGM_FLAGS_ILC_0 0x02
664#define KVM_S390_PGM_FLAGS_ILC_1 0x04
665#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
eaa4f416 666#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
634790b8
DH
667 __u8 flags;
668 __u8 pad[2];
81aa8efe
JF
669};
670
671struct kvm_s390_prefix_info {
672 __u32 address;
673};
674
675struct kvm_s390_extcall_info {
676 __u16 code;
677};
678
679struct kvm_s390_emerg_info {
680 __u16 code;
681};
682
2822545f
DH
683#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
684struct kvm_s390_stop_info {
685 __u32 flags;
686};
687
81aa8efe
JF
688struct kvm_s390_mchk_info {
689 __u64 cr14;
690 __u64 mcic;
691 __u64 failing_storage_address;
692 __u32 ext_damage_code;
693 __u32 pad;
694 __u8 fixed_logout[16];
695};
696
697struct kvm_s390_irq {
698 __u64 type;
699 union {
700 struct kvm_s390_io_info io;
701 struct kvm_s390_ext_info ext;
702 struct kvm_s390_pgm_info pgm;
703 struct kvm_s390_emerg_info emerg;
704 struct kvm_s390_extcall_info extcall;
705 struct kvm_s390_prefix_info prefix;
2822545f 706 struct kvm_s390_stop_info stop;
81aa8efe
JF
707 struct kvm_s390_mchk_info mchk;
708 char reserved[64];
709 } u;
710};
711
816c7667
JF
712struct kvm_s390_irq_state {
713 __u64 buf;
bb64da9a 714 __u32 flags; /* will stay unused for compatibility reasons */
816c7667 715 __u32 len;
bb64da9a 716 __u32 reserved[4]; /* will stay unused for compatibility reasons */
816c7667
JF
717};
718
d0bfb940
JK
719/* for KVM_SET_GUEST_DEBUG */
720
721#define KVM_GUESTDBG_ENABLE 0x00000001
722#define KVM_GUESTDBG_SINGLESTEP 0x00000002
723
724struct kvm_guest_debug {
725 __u32 control;
726 __u32 pad;
727 struct kvm_guest_debug_arch arch;
728};
729
d34e6b17
GH
730enum {
731 kvm_ioeventfd_flag_nr_datamatch,
732 kvm_ioeventfd_flag_nr_pio,
733 kvm_ioeventfd_flag_nr_deassign,
2b83451b 734 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
68c3b4d1 735 kvm_ioeventfd_flag_nr_fast_mmio,
d34e6b17
GH
736 kvm_ioeventfd_flag_nr_max,
737};
738
739#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
740#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
741#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
2b83451b
CH
742#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
743 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
d34e6b17
GH
744
745#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
746
747struct kvm_ioeventfd {
748 __u64 datamatch;
749 __u64 addr; /* legal pio/mmio address */
f848a5a8 750 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
d34e6b17
GH
751 __s32 fd;
752 __u32 flags;
753 __u8 pad[36];
754};
755
5e62493f 756#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
766d3571 757#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
5e62493f 758#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
b5170063 759#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
5e62493f 760#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
766d3571 761 KVM_X86_DISABLE_EXITS_HLT | \
b5170063
WL
762 KVM_X86_DISABLE_EXITS_PAUSE | \
763 KVM_X86_DISABLE_EXITS_CSTATE)
5e62493f 764
71fbfd5f
AG
765/* for KVM_ENABLE_CAP */
766struct kvm_enable_cap {
767 /* in */
768 __u32 cap;
769 __u32 flags;
770 __u64 args[4];
771 __u8 pad[64];
772};
773
15711e9c 774/* for KVM_PPC_GET_PVINFO */
a91d5df2
DG
775
776#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
777
15711e9c
AG
778struct kvm_ppc_pvinfo {
779 /* out */
780 __u32 flags;
781 __u32 hcall[4];
782 __u8 pad[108];
783};
784
5b74716e
BH
785/* for KVM_PPC_GET_SMMU_INFO */
786#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
787
788struct kvm_ppc_one_page_size {
789 __u32 page_shift; /* Page shift (or 0) */
790 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
791};
792
793struct kvm_ppc_one_seg_page_size {
794 __u32 page_shift; /* Base page shift of segment (or 0) */
795 __u32 slb_enc; /* SLB encoding for BookS */
796 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
797};
798
799#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
800#define KVM_PPC_1T_SEGMENTS 0x00000002
901f8c3f 801#define KVM_PPC_NO_HASH 0x00000004
5b74716e
BH
802
803struct kvm_ppc_smmu_info {
804 __u64 flags;
805 __u32 slb_size;
e3bfed1d
PM
806 __u16 data_keys; /* # storage keys supported for data */
807 __u16 instr_keys; /* # storage keys supported for instructions */
5b74716e
BH
808 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
809};
810
ef1ead0c
DG
811/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
812struct kvm_ppc_resize_hpt {
813 __u64 flags;
814 __u32 shift;
815 __u32 pad;
816};
817
6aa8b732
AK
818#define KVMIO 0xAE
819
e08b9637
CO
820/* machine type bits, to be used as argument to KVM_CREATE_VM */
821#define KVM_VM_S390_UCONTROL 1
822
cbbc58d4
AK
823/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
824#define KVM_VM_PPC_HV 1
825#define KVM_VM_PPC_PR 2
826
15e9e35c
HC
827/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
828#define KVM_VM_MIPS_AUTO 0
a8a3c426 829#define KVM_VM_MIPS_VZ 1
15e9e35c 830#define KVM_VM_MIPS_TE 2
a8a3c426 831
5b1c1493
CO
832#define KVM_S390_SIE_PAGE_OFFSET 1
833
233a7cb2
SP
834/*
835 * On arm64, machine type can be used to request the physical
836 * address size for the VM. Bits[7-0] are reserved for the guest
837 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
838 * value 0 implies the default IPA size, 40bits.
839 */
840#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
841#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
842 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
f17abe9a
AK
843/*
844 * ioctls for /dev/kvm fds:
845 */
739872c5
AK
846#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
847#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
848#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
b0c632db
HC
849
850#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
5d308f45
AK
851/*
852 * Check if a kvm extension is available. Argument is extension number,
853 * return is 1 (yes) or 0 (no, sorry).
854 */
855#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
07c45a36
AK
856/*
857 * Get size for mmap(vcpu_fd)
858 */
859#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
674eea0f 860#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
c54d2aba
JK
861#define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06
862#define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07
863#define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08
9c15bb1d 864#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
801e459a 865#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
c54d2aba 866
85f455f7
ED
867/*
868 * Extension capability list.
869 */
870#define KVM_CAP_IRQCHIP 0
b6958ce4 871#define KVM_CAP_HLT 1
82ce2c96 872#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
6fc138d2 873#define KVM_CAP_USER_MEMORY 3
cbc94022 874#define KVM_CAP_SET_TSS_ADDR 4
b209749f 875#define KVM_CAP_VAPIC 6
674eea0f 876#define KVM_CAP_EXT_CPUID 7
18068523 877#define KVM_CAP_CLOCKSOURCE 8
8c3ba334 878#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
a988b910 879#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
7837699f 880#define KVM_CAP_PIT 11
a28e4f5a 881#define KVM_CAP_NOP_IO_DELAY 12
2f333bcb 882#define KVM_CAP_PV_MMU 13
62d9f0db 883#define KVM_CAP_MP_STATE 14
5f94c174 884#define KVM_CAP_COALESCED_MMIO 15
ed848624 885#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
62c476c7 886#define KVM_CAP_IOMMU 18
1a811b61
AK
887/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
888#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
4531220b 889#define KVM_CAP_USER_NMI 22
91b2ae77 890#ifdef __KVM_HAVE_GUEST_DEBUG
d0bfb940 891#define KVM_CAP_SET_GUEST_DEBUG 23
971cc3dc 892#endif
91b2ae77 893#ifdef __KVM_HAVE_PIT
52d939a0 894#define KVM_CAP_REINJECT_CONTROL 24
399ec807 895#endif
399ec807 896#define KVM_CAP_IRQ_ROUTING 25
4925663a 897#define KVM_CAP_IRQ_INJECT_STATUS 26
e56d532f 898#define KVM_CAP_ASSIGN_DEV_IRQ 29
4cd481f6
JK
899/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
900#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
890ca9ae
HY
901#ifdef __KVM_HAVE_MCE
902#define KVM_CAP_MCE 31
903#endif
721eecbf 904#define KVM_CAP_IRQFD 32
c5ff41ce
JK
905#ifdef __KVM_HAVE_PIT
906#define KVM_CAP_PIT2 33
907#endif
73880c80 908#define KVM_CAP_SET_BOOT_CPU_ID 34
e9f42757
BK
909#ifdef __KVM_HAVE_PIT_STATE2
910#define KVM_CAP_PIT_STATE2 35
911#endif
d34e6b17 912#define KVM_CAP_IOEVENTFD 36
b927a3ce 913#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
ffde22ac
ES
914#ifdef __KVM_HAVE_XEN_HVM
915#define KVM_CAP_XEN_HVM 38
916#endif
afbcf7ab 917#define KVM_CAP_ADJUST_CLOCK 39
a9c7399d 918#define KVM_CAP_INTERNAL_ERROR_DATA 40
3cfc3092
JK
919#ifdef __KVM_HAVE_VCPU_EVENTS
920#define KVM_CAP_VCPU_EVENTS 41
921#endif
d7b0b5eb 922#define KVM_CAP_S390_PSW 42
e15a1137 923#define KVM_CAP_PPC_SEGSTATE 43
55cd8e5a 924#define KVM_CAP_HYPERV 44
10388a07 925#define KVM_CAP_HYPERV_VAPIC 45
c25bc163 926#define KVM_CAP_HYPERV_SPIN 46
ab9f4ecb 927#define KVM_CAP_PCI_SEGMENT 47
c10207fe 928#define KVM_CAP_PPC_PAIRED_SINGLES 48
48005f64 929#define KVM_CAP_INTR_SHADOW 49
a1efbe77
JK
930#ifdef __KVM_HAVE_DEBUGREGS
931#define KVM_CAP_DEBUGREGS 50
932#endif
d2be1651 933#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
ad0a048b 934#define KVM_CAP_PPC_OSI 52
18978768 935#define KVM_CAP_PPC_UNSET_IRQ 53
71fbfd5f 936#define KVM_CAP_ENABLE_CAP 54
2d5b5a66
SY
937#ifdef __KVM_HAVE_XSAVE
938#define KVM_CAP_XSAVE 55
939#endif
940#ifdef __KVM_HAVE_XCRS
941#define KVM_CAP_XCRS 56
942#endif
15711e9c 943#define KVM_CAP_PPC_GET_PVINFO 57
7b4203e8 944#define KVM_CAP_PPC_IRQ_LEVEL 58
344d9588 945#define KVM_CAP_ASYNC_PF 59
92a1f12d
JR
946#define KVM_CAP_TSC_CONTROL 60
947#define KVM_CAP_GET_TSC_KHZ 61
5ce941ee 948#define KVM_CAP_PPC_BOOKE_SREGS 62
54738c09 949#define KVM_CAP_SPAPR_TCE 63
371fefd6 950#define KVM_CAP_PPC_SMT 64
aa04b4cc 951#define KVM_CAP_PPC_RMA 65
8c3ba334 952#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
1022fc3d 953#define KVM_CAP_PPC_HIOR 67
930b412a 954#define KVM_CAP_PPC_PAPR 68
dc83b8bc 955#define KVM_CAP_SW_TLB 69
e24ed81f 956#define KVM_CAP_ONE_REG 70
b6cf8788 957#define KVM_CAP_S390_GMAP 71
4d25a066 958#define KVM_CAP_TSC_DEADLINE_TIMER 72
1efd0f59 959#define KVM_CAP_S390_UCONTROL 73
b9e5dc8d 960#define KVM_CAP_SYNC_REGS 74
07700a94 961#define KVM_CAP_PCI_2_3 75
1c0b28c2 962#define KVM_CAP_KVMCLOCK_CTRL 76
07975ad3 963#define KVM_CAP_SIGNAL_MSI 77
5b74716e 964#define KVM_CAP_PPC_GET_SMMU_INFO 78
1526bf9c 965#define KVM_CAP_S390_COW 79
32fad281 966#define KVM_CAP_PPC_ALLOC_HTAB 80
4d8b81ab 967#define KVM_CAP_READONLY_MEM 81
7a84428a 968#define KVM_CAP_IRQFD_RESAMPLE 82
f61c94bb 969#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
a2932923 970#define KVM_CAP_PPC_HTAB_FD 84
fa6b7fe9 971#define KVM_CAP_S390_CSS_SUPPORT 85
1c810636 972#define KVM_CAP_PPC_EPR 86
aa024c2f 973#define KVM_CAP_ARM_PSCI 87
3401d546 974#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
852b6d57 975#define KVM_CAP_DEVICE_CTRL 89
eb1e4f43 976#define KVM_CAP_IRQ_MPIC 90
8e591cb7 977#define KVM_CAP_PPC_RTAS 91
5975a2e0 978#define KVM_CAP_IRQ_XICS 92
0d854a60 979#define KVM_CAP_ARM_EL1_32BIT 93
0bd50dc9 980#define KVM_CAP_SPAPR_MULTITCE 94
9c15bb1d 981#define KVM_CAP_EXT_EMUL_CPUID 95
e984097b 982#define KVM_CAP_HYPERV_TIME 96
100943c5 983#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
d938dc55 984#define KVM_CAP_ENABLE_CAP_VM 98
84223598 985#define KVM_CAP_S390_IRQCHIP 99
f848a5a8 986#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
63b5cf04 987#define KVM_CAP_VM_ATTRIBUTES 101
717abd20 988#define KVM_CAP_ARM_PSCI_0_2 102
53ea2e46 989#define KVM_CAP_PPC_FIXUP_HCALL 103
699a0ea0 990#define KVM_CAP_PPC_ENABLE_HCALL 104
92b591a4 991#define KVM_CAP_CHECK_EXTENSION_VM 105
2444b352 992#define KVM_CAP_S390_USER_SIGP 106
68c55750 993#define KVM_CAP_S390_VECTOR_REGISTERS 107
41408c28 994#define KVM_CAP_S390_MEM_OP 108
e44fc8c9 995#define KVM_CAP_S390_USER_STSI 109
30ee2a98 996#define KVM_CAP_S390_SKEYS 110
5fafd874 997#define KVM_CAP_MIPS_FPU 111
d952bd07 998#define KVM_CAP_MIPS_MSA 112
47b43c52 999#define KVM_CAP_S390_INJECT_IRQ 113
816c7667 1000#define KVM_CAP_S390_IRQ_STATE 114
e928e9cb 1001#define KVM_CAP_PPC_HWRNG 115
90de4a18 1002#define KVM_CAP_DISABLE_QUIRKS 116
f077825a 1003#define KVM_CAP_X86_SMM 117
f481b069 1004#define KVM_CAP_MULTI_ADDRESS_SPACE 118
5540546b
AB
1005#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
1006#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
49df6397 1007#define KVM_CAP_SPLIT_IRQCHIP 121
e9ea5069 1008#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
5c919412 1009#define KVM_CAP_HYPERV_SYNIC 123
c6e5f166 1010#define KVM_CAP_S390_RI 124
01d01d69 1011#define KVM_CAP_SPAPR_TCE_64 125
ab92f308
PB
1012#define KVM_CAP_ARM_PMU_V3 126
1013#define KVM_CAP_VCPU_ATTRIBUTES 127
0b1b1dfd 1014#define KVM_CAP_MAX_VCPU_ID 128
37131313 1015#define KVM_CAP_X2APIC_API 129
6502a34c 1016#define KVM_CAP_S390_USER_INSTR0 130
912902ce 1017#define KVM_CAP_MSI_DEVID 131
23528bb2 1018#define KVM_CAP_PPC_HTM 132
ef1ead0c 1019#define KVM_CAP_SPAPR_RESIZE_HPT 133
c9270132
PM
1020#define KVM_CAP_PPC_MMU_RADIX 134
1021#define KVM_CAP_PPC_MMU_HASH_V3 135
460df4c1 1022#define KVM_CAP_IMMEDIATE_EXIT 136
a8a3c426
JH
1023#define KVM_CAP_MIPS_VZ 137
1024#define KVM_CAP_MIPS_TE 138
578fd61d 1025#define KVM_CAP_MIPS_64BIT 139
f7b1a77d
RK
1026#define KVM_CAP_S390_GS 140
1027#define KVM_CAP_S390_AIS 141
4898d3f4 1028#define KVM_CAP_SPAPR_TCE_VFIO 142
4d5422ce 1029#define KVM_CAP_X86_DISABLE_EXITS 143
c24a7be2 1030#define KVM_CAP_ARM_USER_IRQ 144
4036e387 1031#define KVM_CAP_S390_CMMA_MIGRATION 145
8a53e7e5
PB
1032#define KVM_CAP_PPC_FWNMI 146
1033#define KVM_CAP_PPC_SMT_POSSIBLE 147
efc479e6 1034#define KVM_CAP_HYPERV_SYNIC2 148
d3457c87 1035#define KVM_CAP_HYPERV_VP_INDEX 149
da9a1446 1036#define KVM_CAP_S390_AIS_MIGRATION 150
3214d01f 1037#define KVM_CAP_PPC_GET_CPU_CHAR 151
35b3fde6 1038#define KVM_CAP_S390_BPB 152
801e459a 1039#define KVM_CAP_GET_MSR_FEATURES 153
faeb7833 1040#define KVM_CAP_HYPERV_EVENTFD 154
c1aea919 1041#define KVM_CAP_HYPERV_TLBFLUSH 155
a4499382 1042#define KVM_CAP_S390_HPAGE_1M 156
8fcc4b59 1043#define KVM_CAP_NESTED_STATE 157
63198930 1044#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
6fbbde9a 1045#define KVM_CAP_MSR_PLATFORM_INFO 159
aa069a99 1046#define KVM_CAP_PPC_NESTED_HV 160
214ff83d 1047#define KVM_CAP_HYPERV_SEND_IPI 161
0804c849 1048#define KVM_CAP_COALESCED_PIO 162
57b119da 1049#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
c4f55198 1050#define KVM_CAP_EXCEPTION_PAYLOAD 164
e42b4a50 1051#define KVM_CAP_ARM_VM_IPA_SIZE 165
d7547c55 1052#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
2bc39970 1053#define KVM_CAP_HYPERV_CPUID 167
d7547c55 1054#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
59c5c58c 1055#define KVM_CAP_PPC_IRQ_XIVE 169
dd53f610
PB
1056#define KVM_CAP_ARM_SVE 170
1057#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1058#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
66bb8a06 1059#define KVM_CAP_PMU_EVENT_FILTER 173
92f35b75 1060#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
344c6c80 1061#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
1a9167a2 1062#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
14edff88
PB
1063#define KVM_CAP_ARM_NISV_TO_USER 177
1064#define KVM_CAP_ARM_INJECT_EXT_DABT 178
7de3f142 1065#define KVM_CAP_S390_VCPU_RESETS 179
13da9ae1 1066#define KVM_CAP_S390_PROTECTED 180
9a5788c6 1067#define KVM_CAP_PPC_SECURE_GUEST 181
acd05785 1068#define KVM_CAP_HALT_POLL 182
72de5fa4 1069#define KVM_CAP_ASYNC_PF_INT 183
1aa561b1 1070#define KVM_CAP_LAST_CPU 184
3edd6839 1071#define KVM_CAP_SMALLER_MAXPHYADDR 185
f3633c26 1072#define KVM_CAP_S390_DIAG318 186
004a0124 1073#define KVM_CAP_STEAL_TIME 187
1ae09954 1074#define KVM_CAP_X86_USER_SPACE_MSR 188
1a155254 1075#define KVM_CAP_X86_MSR_FILTER 189
66570e96 1076#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
c21d54f0 1077#define KVM_CAP_SYS_HYPERV_CPUID 191
fb04a1ed 1078#define KVM_CAP_DIRTY_LOG_RING 192
fe6b6bc8 1079#define KVM_CAP_X86_BUS_LOCK_EXIT 193
d9a47eda 1080#define KVM_CAP_PPC_DAWR1 194
8b13c364 1081#define KVM_CAP_SET_GUEST_DEBUG2 195
fe7e9488 1082#define KVM_CAP_SGX_ATTRIBUTE 196
54526d1f 1083#define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197
399ec807
AK
1084
1085#ifdef KVM_CAP_IRQ_ROUTING
1086
1087struct kvm_irq_routing_irqchip {
1088 __u32 irqchip;
1089 __u32 pin;
1090};
1091
79950e10
SY
1092struct kvm_irq_routing_msi {
1093 __u32 address_lo;
1094 __u32 address_hi;
1095 __u32 data;
76a10b86
EA
1096 union {
1097 __u32 pad;
1098 __u32 devid;
1099 };
79950e10
SY
1100};
1101
84223598
CH
1102struct kvm_irq_routing_s390_adapter {
1103 __u64 ind_addr;
1104 __u64 summary_addr;
1105 __u64 ind_offset;
1106 __u32 summary_offset;
1107 __u32 adapter_id;
1108};
1109
5c919412
AS
1110struct kvm_irq_routing_hv_sint {
1111 __u32 vcpu;
1112 __u32 sint;
1113};
1114
399ec807
AK
1115/* gsi routing entry types */
1116#define KVM_IRQ_ROUTING_IRQCHIP 1
79950e10 1117#define KVM_IRQ_ROUTING_MSI 2
84223598 1118#define KVM_IRQ_ROUTING_S390_ADAPTER 3
5c919412 1119#define KVM_IRQ_ROUTING_HV_SINT 4
399ec807
AK
1120
1121struct kvm_irq_routing_entry {
1122 __u32 gsi;
1123 __u32 type;
1124 __u32 flags;
1125 __u32 pad;
1126 union {
1127 struct kvm_irq_routing_irqchip irqchip;
79950e10 1128 struct kvm_irq_routing_msi msi;
84223598 1129 struct kvm_irq_routing_s390_adapter adapter;
5c919412 1130 struct kvm_irq_routing_hv_sint hv_sint;
399ec807
AK
1131 __u32 pad[8];
1132 } u;
1133};
1134
1135struct kvm_irq_routing {
1136 __u32 nr;
1137 __u32 flags;
1138 struct kvm_irq_routing_entry entries[0];
1139};
1140
52d939a0 1141#endif
85f455f7 1142
890ca9ae
HY
1143#ifdef KVM_CAP_MCE
1144/* x86 MCE */
1145struct kvm_x86_mce {
1146 __u64 status;
1147 __u64 addr;
1148 __u64 misc;
1149 __u64 mcg_status;
1150 __u8 bank;
1151 __u8 pad1[7];
1152 __u64 pad2[3];
1153};
1154#endif
1155
ffde22ac 1156#ifdef KVM_CAP_XEN_HVM
23200b7a
JM
1157#define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0)
1158#define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1)
8d4e7e80 1159#define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2)
30b5c851 1160#define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3)
23200b7a 1161
ffde22ac
ES
1162struct kvm_xen_hvm_config {
1163 __u32 flags;
1164 __u32 msr;
1165 __u64 blob_addr_32;
1166 __u64 blob_addr_64;
1167 __u8 blob_size_32;
1168 __u8 blob_size_64;
1169 __u8 pad2[30];
1170};
1171#endif
1172
721eecbf 1173#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
7a84428a
AW
1174/*
1175 * Available with KVM_CAP_IRQFD_RESAMPLE
1176 *
1177 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1178 * the irqfd to operate in resampling mode for level triggered interrupt
3ecad8c2 1179 * emulation. See Documentation/virt/kvm/api.rst.
7a84428a
AW
1180 */
1181#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
721eecbf
GH
1182
1183struct kvm_irqfd {
1184 __u32 fd;
1185 __u32 gsi;
1186 __u32 flags;
7a84428a
AW
1187 __u32 resamplefd;
1188 __u8 pad[16];
721eecbf
GH
1189};
1190
e3fd9a93
PB
1191/* For KVM_CAP_ADJUST_CLOCK */
1192
1193/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1194#define KVM_CLOCK_TSC_STABLE 2
1195
afbcf7ab
GC
1196struct kvm_clock_data {
1197 __u64 clock;
1198 __u32 flags;
1199 __u32 pad[9];
1200};
1201
e3fd9a93
PB
1202/* For KVM_CAP_SW_TLB */
1203
dc83b8bc
SW
1204#define KVM_MMU_FSL_BOOKE_NOHV 0
1205#define KVM_MMU_FSL_BOOKE_HV 1
1206
1207struct kvm_config_tlb {
1208 __u64 params;
1209 __u64 array;
1210 __u32 mmu_type;
1211 __u32 array_len;
1212};
1213
1214struct kvm_dirty_tlb {
1215 __u64 bitmap;
1216 __u32 num_dirty;
1217};
1218
e24ed81f
AG
1219/* Available with KVM_CAP_ONE_REG */
1220
1221#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1222#define KVM_REG_GENERIC 0x0000000000000000ULL
1223
1224/*
1225 * Architecture specific registers are to be defined in arch headers and
1226 * ORed with the arch identifier.
1227 */
1228#define KVM_REG_PPC 0x1000000000000000ULL
1229#define KVM_REG_X86 0x2000000000000000ULL
1230#define KVM_REG_IA64 0x3000000000000000ULL
1231#define KVM_REG_ARM 0x4000000000000000ULL
1232#define KVM_REG_S390 0x5000000000000000ULL
7c8c5e6a 1233#define KVM_REG_ARM64 0x6000000000000000ULL
2a8fedd0 1234#define KVM_REG_MIPS 0x7000000000000000ULL
dee04eee 1235#define KVM_REG_RISCV 0x8000000000000000ULL
e24ed81f
AG
1236
1237#define KVM_REG_SIZE_SHIFT 52
1238#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1239#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1240#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1241#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1242#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1243#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1244#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1245#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1246#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
2b953ea3 1247#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
e24ed81f 1248
749cf76c
CD
1249struct kvm_reg_list {
1250 __u64 n; /* number of regs */
1251 __u64 reg[0];
1252};
1253
e24ed81f
AG
1254struct kvm_one_reg {
1255 __u64 id;
1256 __u64 addr;
1257};
1258
2b8ddd93 1259#define KVM_MSI_VALID_DEVID (1U << 0)
07975ad3
JK
1260struct kvm_msi {
1261 __u32 address_lo;
1262 __u32 address_hi;
1263 __u32 data;
1264 __u32 flags;
2b8ddd93
AP
1265 __u32 devid;
1266 __u8 pad[12];
07975ad3
JK
1267};
1268
3401d546
CD
1269struct kvm_arm_device_addr {
1270 __u64 id;
1271 __u64 addr;
1272};
1273
852b6d57
SW
1274/*
1275 * Device control API, available with KVM_CAP_DEVICE_CTRL
1276 */
1277#define KVM_CREATE_DEVICE_TEST 1
1278
1279struct kvm_create_device {
1280 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1281 __u32 fd; /* out: device handle */
1282 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1283};
1284
1285struct kvm_device_attr {
1286 __u32 flags; /* no flags currently defined */
1287 __u32 group; /* device-defined */
1288 __u64 attr; /* group-defined */
1289 __u64 addr; /* userspace address of attr data */
1290};
1291
ec53500f
AW
1292#define KVM_DEV_VFIO_GROUP 1
1293#define KVM_DEV_VFIO_GROUP_ADD 1
1294#define KVM_DEV_VFIO_GROUP_DEL 2
121f80ba 1295#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
d60eacb0
WD
1296
1297enum kvm_device_type {
1298 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1299#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1300 KVM_DEV_TYPE_FSL_MPIC_42,
1301#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1302 KVM_DEV_TYPE_XICS,
1303#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1304 KVM_DEV_TYPE_VFIO,
1305#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1306 KVM_DEV_TYPE_ARM_VGIC_V2,
1307#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1308 KVM_DEV_TYPE_FLIC,
1309#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
a0675c25
AP
1310 KVM_DEV_TYPE_ARM_VGIC_V3,
1311#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
1085fdc6
AP
1312 KVM_DEV_TYPE_ARM_VGIC_ITS,
1313#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
90c73795
CLG
1314 KVM_DEV_TYPE_XIVE,
1315#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
58772e9a
SP
1316 KVM_DEV_TYPE_ARM_PV_TIME,
1317#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
d60eacb0
WD
1318 KVM_DEV_TYPE_MAX,
1319};
5df554ad 1320
121f80ba
AK
1321struct kvm_vfio_spapr_tce {
1322 __s32 groupfd;
1323 __s32 tablefd;
1324};
1325
f17abe9a
AK
1326/*
1327 * ioctls for VM fds
1328 */
c54d2aba 1329#define KVM_SET_MEMORY_REGION _IOW(KVMIO, 0x40, struct kvm_memory_region)
bccf2150
AK
1330/*
1331 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1332 * a vcpu fd.
1333 */
c54d2aba
JK
1334#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1335#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
a1f4d395 1336/* KVM_SET_MEMORY_ALIAS is obsolete: */
c54d2aba
JK
1337#define KVM_SET_MEMORY_ALIAS _IOW(KVMIO, 0x43, struct kvm_memory_alias)
1338#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
1339#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45)
1340#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
6a4a9839 1341 struct kvm_userspace_memory_region)
c54d2aba
JK
1342#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1343#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
27e0393f
CO
1344
1345/* enable ucontrol for s390 */
1346struct kvm_s390_ucas_mapping {
1347 __u64 user_addr;
1348 __u64 vcpu_addr;
1349 __u64 length;
1350};
1351#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1352#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
ccc7910f 1353#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
27e0393f 1354
85f455f7 1355/* Device model IOC */
c54d2aba
JK
1356#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1357#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1358#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1359#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1360#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1361#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1362#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1363#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
5f94c174
LV
1364#define KVM_REGISTER_COALESCED_MMIO \
1365 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1366#define KVM_UNREGISTER_COALESCED_MMIO \
1367 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
c54d2aba
JK
1368#define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \
1369 struct kvm_assigned_pci_dev)
1370#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
e56d532f 1371/* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */
c54d2aba
JK
1372#define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70
1373#define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq)
1374#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
1375#define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \
1376 struct kvm_assigned_pci_dev)
1377#define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \
1378 struct kvm_assigned_msix_nr)
1379#define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \
1380 struct kvm_assigned_msix_entry)
1381#define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq)
1382#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1383#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1384#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1385#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1386#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1387#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1388#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1389/* Available with KVM_CAP_PIT_STATE2 */
1390#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1391#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
15711e9c
AG
1392/* Available with KVM_CAP_PPC_GET_PVINFO */
1393#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
92a1f12d
JR
1394/* Available with KVM_CAP_TSC_CONTROL */
1395#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1396#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
07700a94
JK
1397/* Available with KVM_CAP_PCI_2_3 */
1398#define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \
1399 struct kvm_assigned_pci_dev)
07975ad3
JK
1400/* Available with KVM_CAP_SIGNAL_MSI */
1401#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
5b74716e
BH
1402/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1403#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
32fad281
PM
1404/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1405#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
ed7a8d7a 1406#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
58ded420
AK
1407#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1408 struct kvm_create_spapr_tce_64)
ed7a8d7a
PM
1409/* Available with KVM_CAP_RMA */
1410#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
a2932923
PM
1411/* Available with KVM_CAP_PPC_HTAB_FD */
1412#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
3401d546
CD
1413/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1414#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
8e591cb7
ME
1415/* Available with KVM_CAP_PPC_RTAS */
1416#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
ef1ead0c
DG
1417/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1418#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1419#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
c9270132
PM
1420/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1421#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1422/* Available with KVM_CAP_PPC_RADIX_MMU */
1423#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
3214d01f
PM
1424/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1425#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
66bb8a06
EH
1426/* Available with KVM_CAP_PMU_EVENT_FILTER */
1427#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
22945688 1428#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
bccf2150 1429
852b6d57
SW
1430/* ioctl for vm fd */
1431#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1432
1433/* ioctls for fds returned by KVM_CREATE_DEVICE */
1434#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1435#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1436#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
1437
bccf2150
AK
1438/*
1439 * ioctls for vcpu fds
1440 */
739872c5
AK
1441#define KVM_RUN _IO(KVMIO, 0x80)
1442#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1443#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1444#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1445#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1446#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1447#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
d0bfb940 1448/* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */
c54d2aba 1449#define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87
739872c5
AK
1450#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1451#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1452#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1961d276 1453#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
b8836737
AK
1454#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1455#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
96ad2cc6
ED
1456#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1457#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
07716717
DK
1458#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1459#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
b209749f 1460/* Available with KVM_CAP_VAPIC */
c54d2aba 1461#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
b93463aa
AK
1462/* Available with KVM_CAP_VAPIC */
1463#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
ba5c1e9b
CO
1464/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1465#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
b0c632db
HC
1466/* store status for s390 */
1467#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1468#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1469#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1470/* initial ipl psw for s390 */
1471#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1472/* initial reset for s390 */
c54d2aba 1473#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
62d9f0db
MT
1474#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1475#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
44b5ce73 1476/* Available with KVM_CAP_USER_NMI */
c54d2aba 1477#define KVM_NMI _IO(KVMIO, 0x9a)
d0bfb940
JK
1478/* Available with KVM_CAP_SET_GUEST_DEBUG */
1479#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
890ca9ae
HY
1480/* MCE for x86 */
1481#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1482#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1483#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
3cfc3092
JK
1484/* Available with KVM_CAP_VCPU_EVENTS */
1485#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1486#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
a1efbe77
JK
1487/* Available with KVM_CAP_DEBUGREGS */
1488#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1489#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
d938dc55
CH
1490/*
1491 * vcpu version available with KVM_ENABLE_CAP
1492 * vm version available with KVM_CAP_ENABLE_CAP_VM
1493 */
71fbfd5f 1494#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
2d5b5a66
SY
1495/* Available with KVM_CAP_XSAVE */
1496#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1497#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1498/* Available with KVM_CAP_XCRS */
1499#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1500#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
dc83b8bc
SW
1501/* Available with KVM_CAP_SW_TLB */
1502#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
e24ed81f
AG
1503/* Available with KVM_CAP_ONE_REG */
1504#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
1505#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
1c0b28c2
EM
1506/* VM is being stopped by host */
1507#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
749cf76c 1508#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
42c4e0c7 1509#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
749cf76c 1510#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
41408c28
TH
1511/* Available with KVM_CAP_S390_MEM_OP */
1512#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
30ee2a98
JH
1513/* Available with KVM_CAP_S390_SKEYS */
1514#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1515#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
47b43c52
JF
1516/* Available with KVM_CAP_S390_INJECT_IRQ */
1517#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
816c7667
JF
1518/* Available with KVM_CAP_S390_IRQ_STATE */
1519#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1520#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
f077825a
PB
1521/* Available with KVM_CAP_X86_SMM */
1522#define KVM_SMI _IO(KVMIO, 0xb7)
4036e387 1523/* Available with KVM_CAP_S390_CMMA_MIGRATION */
949c0336 1524#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
4036e387 1525#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
5acc5c06
BS
1526/* Memory Encryption Commands */
1527#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
d98e6346 1528
69eaedee
BS
1529struct kvm_enc_region {
1530 __u64 addr;
1531 __u64 size;
1532};
1533
1534#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1535#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1536
faeb7833
RK
1537/* Available with KVM_CAP_HYPERV_EVENTFD */
1538#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1539
8fcc4b59
JM
1540/* Available with KVM_CAP_NESTED_STATE */
1541#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1542#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
faeb7833 1543
d7547c55 1544/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
2a31b9db
PB
1545#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1546
c21d54f0 1547/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
2bc39970
VK
1548#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1549
7dd32a0d
DM
1550/* Available with KVM_CAP_ARM_SVE */
1551#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1552
7de3f142
JF
1553/* Available with KVM_CAP_S390_VCPU_RESETS */
1554#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1555#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1556
29b40f10
JF
1557struct kvm_s390_pv_sec_parm {
1558 __u64 origin;
1559 __u64 length;
1560};
1561
1562struct kvm_s390_pv_unp {
1563 __u64 addr;
1564 __u64 size;
1565 __u64 tweak;
1566};
1567
1568enum pv_cmd_id {
1569 KVM_PV_ENABLE,
1570 KVM_PV_DISABLE,
1571 KVM_PV_SET_SEC_PARMS,
1572 KVM_PV_UNPACK,
1573 KVM_PV_VERIFY,
e0d2773d
JF
1574 KVM_PV_PREP_RESET,
1575 KVM_PV_UNSHARE_ALL,
29b40f10
JF
1576};
1577
1578struct kvm_pv_cmd {
1579 __u32 cmd; /* Command to be executed */
1580 __u16 rc; /* Ultravisor return code */
1581 __u16 rrc; /* Ultravisor return reason code */
1582 __u64 data; /* Data or address */
1583 __u32 flags; /* flags for future extensions. Must be 0 for now */
1584 __u32 reserved[3];
1585};
1586
1587/* Available with KVM_CAP_S390_PROTECTED */
1588#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1589
1a155254
AG
1590/* Available with KVM_CAP_X86_MSR_FILTER */
1591#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1592
fb04a1ed
PX
1593/* Available with KVM_CAP_DIRTY_LOG_RING */
1594#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1595
3e324615 1596/* Per-VM Xen attributes */
a76b9641
JM
1597#define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr)
1598#define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr)
1599
1600struct kvm_xen_hvm_attr {
1601 __u16 type;
1602 __u16 pad[3];
1603 union {
a3833b81 1604 __u8 long_mode;
40da8ccd 1605 __u8 vector;
13ffb97a
JM
1606 struct {
1607 __u64 gfn;
1608 } shared_info;
a76b9641
JM
1609 __u64 pad[8];
1610 } u;
1611};
1612
8d4e7e80 1613/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
a3833b81 1614#define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0
13ffb97a 1615#define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1
40da8ccd 1616#define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2
a3833b81 1617
3e324615
DW
1618/* Per-vCPU Xen attributes */
1619#define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr)
1620#define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr)
1621
1622struct kvm_xen_vcpu_attr {
1623 __u16 type;
1624 __u16 pad[3];
1625 union {
73e69a86 1626 __u64 gpa;
3e324615 1627 __u64 pad[8];
30b5c851
DW
1628 struct {
1629 __u64 state;
1630 __u64 state_entry_time;
1631 __u64 time_running;
1632 __u64 time_runnable;
1633 __u64 time_blocked;
1634 __u64 time_offline;
1635 } runstate;
3e324615
DW
1636 } u;
1637};
1638
8d4e7e80 1639/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
73e69a86 1640#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0
f2340cd9 1641#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1
30b5c851
DW
1642#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2
1643#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3
1644#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4
1645#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5
73e69a86 1646
dc48bae0
BS
1647/* Secure Encrypted Virtualization command */
1648enum sev_cmd_id {
1649 /* Guest initialization commands */
1650 KVM_SEV_INIT = 0,
1651 KVM_SEV_ES_INIT,
1652 /* Guest launch commands */
1653 KVM_SEV_LAUNCH_START,
1654 KVM_SEV_LAUNCH_UPDATE_DATA,
1655 KVM_SEV_LAUNCH_UPDATE_VMSA,
1656 KVM_SEV_LAUNCH_SECRET,
1657 KVM_SEV_LAUNCH_MEASURE,
1658 KVM_SEV_LAUNCH_FINISH,
1659 /* Guest migration commands (outgoing) */
1660 KVM_SEV_SEND_START,
1661 KVM_SEV_SEND_UPDATE_DATA,
1662 KVM_SEV_SEND_UPDATE_VMSA,
1663 KVM_SEV_SEND_FINISH,
1664 /* Guest migration commands (incoming) */
1665 KVM_SEV_RECEIVE_START,
1666 KVM_SEV_RECEIVE_UPDATE_DATA,
1667 KVM_SEV_RECEIVE_UPDATE_VMSA,
1668 KVM_SEV_RECEIVE_FINISH,
1669 /* Guest status and debug commands */
1670 KVM_SEV_GUEST_STATUS,
1671 KVM_SEV_DBG_DECRYPT,
1672 KVM_SEV_DBG_ENCRYPT,
1673 /* Guest certificates commands */
1674 KVM_SEV_CERT_EXPORT,
2c07ded0
BS
1675 /* Attestation report */
1676 KVM_SEV_GET_ATTESTATION_REPORT,
5569e2e7
SR
1677 /* Guest Migration Extension */
1678 KVM_SEV_SEND_CANCEL,
dc48bae0
BS
1679
1680 KVM_SEV_NR_MAX,
1681};
1682
1683struct kvm_sev_cmd {
1684 __u32 id;
1685 __u64 data;
1686 __u32 error;
1687 __u32 sev_fd;
1688};
1689
1690struct kvm_sev_launch_start {
1691 __u32 handle;
1692 __u32 policy;
1693 __u64 dh_uaddr;
1694 __u32 dh_len;
1695 __u64 session_uaddr;
1696 __u32 session_len;
1697};
1698
1699struct kvm_sev_launch_update_data {
1700 __u64 uaddr;
1701 __u32 len;
1702};
1703
1704
1705struct kvm_sev_launch_secret {
1706 __u64 hdr_uaddr;
1707 __u32 hdr_len;
1708 __u64 guest_uaddr;
1709 __u32 guest_len;
1710 __u64 trans_uaddr;
1711 __u32 trans_len;
1712};
1713
1714struct kvm_sev_launch_measure {
1715 __u64 uaddr;
1716 __u32 len;
1717};
1718
1719struct kvm_sev_guest_status {
1720 __u32 handle;
1721 __u32 policy;
1722 __u32 state;
1723};
1724
1725struct kvm_sev_dbg {
1726 __u64 src_uaddr;
1727 __u64 dst_uaddr;
1728 __u32 len;
1729};
d98e6346 1730
2c07ded0
BS
1731struct kvm_sev_attestation_report {
1732 __u8 mnonce[16];
1733 __u64 uaddr;
1734 __u32 len;
1735};
1736
4cfdd47d
BS
1737struct kvm_sev_send_start {
1738 __u32 policy;
1739 __u64 pdh_cert_uaddr;
1740 __u32 pdh_cert_len;
1741 __u64 plat_certs_uaddr;
1742 __u32 plat_certs_len;
1743 __u64 amd_certs_uaddr;
1744 __u32 amd_certs_len;
1745 __u64 session_uaddr;
1746 __u32 session_len;
1747};
1748
d3d1af85
BS
1749struct kvm_sev_send_update_data {
1750 __u64 hdr_uaddr;
1751 __u32 hdr_len;
1752 __u64 guest_uaddr;
1753 __u32 guest_len;
1754 __u64 trans_uaddr;
1755 __u32 trans_len;
1756};
1757
af43cbbf
BS
1758struct kvm_sev_receive_start {
1759 __u32 handle;
1760 __u32 policy;
1761 __u64 pdh_uaddr;
1762 __u32 pdh_len;
1763 __u64 session_uaddr;
1764 __u32 session_len;
1765};
1766
15fb7de1
BS
1767struct kvm_sev_receive_update_data {
1768 __u64 hdr_uaddr;
1769 __u32 hdr_len;
1770 __u64 guest_uaddr;
1771 __u32 guest_len;
1772 __u64 trans_uaddr;
1773 __u32 trans_len;
1774};
1775
e56d532f 1776#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
07700a94
JK
1777#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
1778#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
e56d532f 1779
4d5c5d0f
BAY
1780struct kvm_assigned_pci_dev {
1781 __u32 assigned_dev_id;
1782 __u32 busnr;
1783 __u32 devfn;
1784 __u32 flags;
ab9f4ecb 1785 __u32 segnr;
bb45e202 1786 union {
ab9f4ecb 1787 __u32 reserved[11];
bb45e202 1788 };
4d5c5d0f
BAY
1789};
1790
e56d532f
SY
1791#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
1792#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
1793#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
1794
1795#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
1796#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
1797#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
1798
1799#define KVM_DEV_IRQ_HOST_MASK 0x00ff
1800#define KVM_DEV_IRQ_GUEST_MASK 0xff00
1801
4d5c5d0f
BAY
1802struct kvm_assigned_irq {
1803 __u32 assigned_dev_id;
91e3d71d 1804 __u32 host_irq; /* ignored (legacy field) */
4d5c5d0f
BAY
1805 __u32 guest_irq;
1806 __u32 flags;
bb45e202
AK
1807 union {
1808 __u32 reserved[12];
1809 };
4d5c5d0f
BAY
1810};
1811
c1e01514
SY
1812struct kvm_assigned_msix_nr {
1813 __u32 assigned_dev_id;
1814 __u16 entry_nr;
1815 __u16 padding;
1816};
1817
e7333391 1818#define KVM_MAX_MSIX_PER_DEV 256
c1e01514
SY
1819struct kvm_assigned_msix_entry {
1820 __u32 assigned_dev_id;
1821 __u32 gsi;
1822 __u16 entry; /* The index of entry in the MSI-X table */
1823 __u16 padding[3];
1824};
1825
37131313 1826#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
c519265f 1827#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
37131313 1828
3fe17e68
AG
1829/* Available with KVM_CAP_ARM_USER_IRQ */
1830
1831/* Bits for run->s.regs.device_irq_level */
1832#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
1833#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
1834#define KVM_ARM_DEV_PMU (1 << 2)
1835
faeb7833
RK
1836struct kvm_hyperv_eventfd {
1837 __u32 conn_id;
1838 __s32 fd;
1839 __u32 flags;
1840 __u32 padding[3];
1841};
1842
1843#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
1844#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
1845
3c9bd400
JZ
1846#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
1847#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
1848
fb04a1ed
PX
1849/*
1850 * Arch needs to define the macro after implementing the dirty ring
1851 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
1852 * starting page offset of the dirty ring structures.
1853 */
1854#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
1855#define KVM_DIRTY_LOG_PAGE_OFFSET 0
1856#endif
1857
1858/*
1859 * KVM dirty GFN flags, defined as:
1860 *
1861 * |---------------+---------------+--------------|
1862 * | bit 1 (reset) | bit 0 (dirty) | Status |
1863 * |---------------+---------------+--------------|
1864 * | 0 | 0 | Invalid GFN |
1865 * | 0 | 1 | Dirty GFN |
1866 * | 1 | X | GFN to reset |
1867 * |---------------+---------------+--------------|
1868 *
1869 * Lifecycle of a dirty GFN goes like:
1870 *
1871 * dirtied harvested reset
1872 * 00 -----------> 01 -------------> 1X -------+
1873 * ^ |
1874 * | |
1875 * +------------------------------------------+
1876 *
1877 * The userspace program is only responsible for the 01->1X state
1878 * conversion after harvesting an entry. Also, it must not skip any
1879 * dirty bits, so that dirty bits are always harvested in sequence.
1880 */
1881#define KVM_DIRTY_GFN_F_DIRTY BIT(0)
1882#define KVM_DIRTY_GFN_F_RESET BIT(1)
1883#define KVM_DIRTY_GFN_F_MASK 0x3
1884
1885/*
1886 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
1887 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
1888 * size of the gfn buffer is decided by the first argument when
1889 * enabling KVM_CAP_DIRTY_LOG_RING.
1890 */
1891struct kvm_dirty_gfn {
1892 __u32 flags;
1893 __u32 slot;
1894 __u64 offset;
1895};
1896
fe6b6bc8
CQ
1897#define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
1898#define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1)
1899
c54d2aba 1900#endif /* __LINUX_KVM_H */