]> git.proxmox.com Git - mirror_qemu.git/blame - linux-headers/linux/kvm.h
Merge remote-tracking branch 'remotes/ehabkost-gl/tags/x86-next-pull-request' into...
[mirror_qemu.git] / linux-headers / linux / kvm.h
CommitLineData
dd873966 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
51b24e34
JK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
8 * Note: you must update KVM_API_VERSION if you change this interface.
9 */
10
278f064e 11#include <linux/const.h>
51b24e34
JK
12#include <linux/types.h>
13
14#include <linux/ioctl.h>
15#include <asm/kvm.h>
16
17#define KVM_API_VERSION 12
18
19/* *** Deprecated interfaces *** */
20
21#define KVM_TRC_SHIFT 16
22
23#define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT)
24#define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1))
25
26#define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01)
27#define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02)
28#define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01)
29
30#define KVM_TRC_HEAD_SIZE 12
31#define KVM_TRC_CYCLE_SIZE 8
32#define KVM_TRC_EXTRA_MAX 7
33
34#define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02)
35#define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03)
36#define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04)
37#define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05)
38#define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06)
39#define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07)
40#define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08)
41#define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09)
42#define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A)
43#define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B)
44#define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C)
45#define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D)
46#define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E)
47#define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F)
48#define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10)
49#define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11)
50#define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12)
51#define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13)
52#define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14)
53#define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15)
54#define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16)
55#define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17)
56#define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18)
57#define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19)
58
59struct kvm_user_trace_setup {
60 __u32 buf_size;
61 __u32 buf_nr;
62};
63
64#define __KVM_DEPRECATED_MAIN_W_0x06 \
65 _IOW(KVMIO, 0x06, struct kvm_user_trace_setup)
66#define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07)
67#define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08)
68
69#define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq)
70
71struct kvm_breakpoint {
72 __u32 enabled;
73 __u32 padding;
74 __u64 address;
75};
76
77struct kvm_debug_guest {
78 __u32 enabled;
79 __u32 pad;
80 struct kvm_breakpoint breakpoints[4];
81 __u32 singlestep;
82};
83
84#define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest)
85
86/* *** End of deprecated interfaces *** */
87
88
89/* for KVM_CREATE_MEMORY_REGION */
90struct kvm_memory_region {
91 __u32 slot;
92 __u32 flags;
93 __u64 guest_phys_addr;
94 __u64 memory_size; /* bytes */
95};
96
97/* for KVM_SET_USER_MEMORY_REGION */
98struct kvm_userspace_memory_region {
99 __u32 slot;
100 __u32 flags;
101 __u64 guest_phys_addr;
102 __u64 memory_size; /* bytes */
103 __u64 userspace_addr; /* start of the userspace allocated memory */
104};
105
716b8e4d
AW
106/*
107 * The bit 0 ~ bit 15 of kvm_memory_region::flags are visible for userspace,
108 * other bits are reserved for kvm internal use which are defined in
109 * include/linux/kvm_host.h.
110 */
111#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
112#define KVM_MEM_READONLY (1UL << 1)
51b24e34
JK
113
114/* for KVM_IRQ_LINE */
115struct kvm_irq_level {
116 /*
117 * ACPI gsi notion of irq.
118 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
119 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
f76b348e 120 * For ARM: See Documentation/virt/kvm/api.rst
51b24e34
JK
121 */
122 union {
123 __u32 irq;
124 __s32 status;
125 };
126 __u32 level;
127};
128
129
130struct kvm_irqchip {
131 __u32 chip_id;
132 __u32 pad;
133 union {
134 char dummy[512]; /* reserving space */
135#ifdef __KVM_HAVE_PIT
136 struct kvm_pic_state pic;
137#endif
138#ifdef __KVM_HAVE_IOAPIC
139 struct kvm_ioapic_state ioapic;
140#endif
141 } chip;
142};
143
144/* for KVM_CREATE_PIT2 */
145struct kvm_pit_config {
146 __u32 flags;
147 __u32 pad[15];
148};
149
150#define KVM_PIT_SPEAKER_DUMMY 1
151
7a52ce8a
CH
152struct kvm_s390_skeys {
153 __u64 start_gfn;
154 __u64 count;
155 __u64 skeydata_addr;
156 __u32 flags;
157 __u32 reserved[9];
158};
fff02bc0 159
3272f0e2
CB
160#define KVM_S390_CMMA_PEEK (1 << 0)
161
162/**
163 * kvm_s390_cmma_log - Used for CMMA migration.
164 *
165 * Used both for input and output.
166 *
167 * @start_gfn: Guest page number to start from.
168 * @count: Size of the result buffer.
169 * @flags: Control operation mode via KVM_S390_CMMA_* flags
170 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
171 * pages are still remaining.
172 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
173 * in the PGSTE.
174 * @values: Pointer to the values buffer.
175 *
176 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
177 */
178struct kvm_s390_cmma_log {
179 __u64 start_gfn;
180 __u32 count;
181 __u32 flags;
182 union {
183 __u64 remaining;
184 __u64 mask;
185 };
186 __u64 values;
187};
188
fff02bc0
PB
189struct kvm_hyperv_exit {
190#define KVM_EXIT_HYPERV_SYNIC 1
b89485a5 191#define KVM_EXIT_HYPERV_HCALL 2
f76b348e 192#define KVM_EXIT_HYPERV_SYNDBG 3
fff02bc0 193 __u32 type;
f76b348e 194 __u32 pad1;
fff02bc0
PB
195 union {
196 struct {
197 __u32 msr;
f76b348e 198 __u32 pad2;
fff02bc0
PB
199 __u64 control;
200 __u64 evt_page;
201 __u64 msg_page;
202 } synic;
b89485a5
PB
203 struct {
204 __u64 input;
205 __u64 result;
206 __u64 params[2];
207 } hcall;
f76b348e
CH
208 struct {
209 __u32 msr;
210 __u32 pad2;
211 __u64 control;
212 __u64 status;
213 __u64 send_page;
214 __u64 recv_page;
215 __u64 pending_page;
216 } syndbg;
fff02bc0
PB
217 } u;
218};
219
278f064e
EH
220struct kvm_xen_exit {
221#define KVM_EXIT_XEN_HCALL 1
222 __u32 type;
223 union {
224 struct {
225 __u32 longmode;
226 __u32 cpl;
227 __u64 input;
228 __u64 result;
229 __u64 params[6];
230 } hcall;
231 } u;
232};
233
7a52ce8a
CH
234#define KVM_S390_GET_SKEYS_NONE 1
235#define KVM_S390_SKEYS_MAX 1048576
236
51b24e34
JK
237#define KVM_EXIT_UNKNOWN 0
238#define KVM_EXIT_EXCEPTION 1
239#define KVM_EXIT_IO 2
240#define KVM_EXIT_HYPERCALL 3
241#define KVM_EXIT_DEBUG 4
242#define KVM_EXIT_HLT 5
243#define KVM_EXIT_MMIO 6
244#define KVM_EXIT_IRQ_WINDOW_OPEN 7
245#define KVM_EXIT_SHUTDOWN 8
246#define KVM_EXIT_FAIL_ENTRY 9
247#define KVM_EXIT_INTR 10
248#define KVM_EXIT_SET_TPR 11
249#define KVM_EXIT_TPR_ACCESS 12
250#define KVM_EXIT_S390_SIEIC 13
251#define KVM_EXIT_S390_RESET 14
a9fd1654 252#define KVM_EXIT_DCR 15 /* deprecated */
51b24e34
JK
253#define KVM_EXIT_NMI 16
254#define KVM_EXIT_INTERNAL_ERROR 17
255#define KVM_EXIT_OSI 18
7c6da3de 256#define KVM_EXIT_PAPR_HCALL 19
1529ae1b 257#define KVM_EXIT_S390_UCONTROL 20
d4834ff9 258#define KVM_EXIT_WATCHDOG 21
d3dccee1
AG
259#define KVM_EXIT_S390_TSCH 22
260#define KVM_EXIT_EPR 23
b061808d 261#define KVM_EXIT_SYSTEM_EVENT 24
7a52ce8a 262#define KVM_EXIT_S390_STSI 25
3a824b15 263#define KVM_EXIT_IOAPIC_EOI 26
fff02bc0 264#define KVM_EXIT_HYPERV 27
2a886794 265#define KVM_EXIT_ARM_NISV 28
53ba2eee
MR
266#define KVM_EXIT_X86_RDMSR 29
267#define KVM_EXIT_X86_WRMSR 30
b3c818a4 268#define KVM_EXIT_DIRTY_RING_FULL 31
278f064e
EH
269#define KVM_EXIT_AP_RESET_HOLD 32
270#define KVM_EXIT_X86_BUS_LOCK 33
271#define KVM_EXIT_XEN 34
51b24e34
JK
272
273/* For KVM_EXIT_INTERNAL_ERROR */
d4834ff9
AG
274/* Emulate instruction failed. */
275#define KVM_INTERNAL_ERROR_EMULATION 1
276/* Encounter unexpected simultaneous exceptions. */
277#define KVM_INTERNAL_ERROR_SIMUL_EX 2
278/* Encounter unexpected vm-exit due to delivery event. */
279#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
f363d039
EA
280/* Encounter unexpected vm-exit reason */
281#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
51b24e34
JK
282
283/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
284struct kvm_run {
285 /* in */
286 __u8 request_interrupt_window;
3a5eb5b4
PB
287 __u8 immediate_exit;
288 __u8 padding1[6];
51b24e34
JK
289
290 /* out */
291 __u32 exit_reason;
292 __u8 ready_for_interrupt_injection;
293 __u8 if_flag;
24a31426 294 __u16 flags;
51b24e34
JK
295
296 /* in (pre_kvm_run), out (post_kvm_run) */
297 __u64 cr8;
298 __u64 apic_base;
299
300#ifdef __KVM_S390
301 /* the processor status word for s390 */
302 __u64 psw_mask; /* psw upper half */
303 __u64 psw_addr; /* psw lower half */
304#endif
305 union {
306 /* KVM_EXIT_UNKNOWN */
307 struct {
308 __u64 hardware_exit_reason;
309 } hw;
310 /* KVM_EXIT_FAIL_ENTRY */
311 struct {
312 __u64 hardware_entry_failure_reason;
e6546342 313 __u32 cpu;
51b24e34
JK
314 } fail_entry;
315 /* KVM_EXIT_EXCEPTION */
316 struct {
317 __u32 exception;
318 __u32 error_code;
319 } ex;
320 /* KVM_EXIT_IO */
321 struct {
322#define KVM_EXIT_IO_IN 0
323#define KVM_EXIT_IO_OUT 1
324 __u8 direction;
325 __u8 size; /* bytes */
326 __u16 port;
327 __u32 count;
328 __u64 data_offset; /* relative to kvm_run start */
329 } io;
3a824b15 330 /* KVM_EXIT_DEBUG */
51b24e34
JK
331 struct {
332 struct kvm_debug_exit_arch arch;
333 } debug;
334 /* KVM_EXIT_MMIO */
335 struct {
336 __u64 phys_addr;
337 __u8 data[8];
338 __u32 len;
339 __u8 is_write;
340 } mmio;
341 /* KVM_EXIT_HYPERCALL */
342 struct {
343 __u64 nr;
344 __u64 args[6];
345 __u64 ret;
346 __u32 longmode;
347 __u32 pad;
348 } hypercall;
349 /* KVM_EXIT_TPR_ACCESS */
350 struct {
351 __u64 rip;
352 __u32 is_write;
353 __u32 pad;
354 } tpr_access;
355 /* KVM_EXIT_S390_SIEIC */
356 struct {
357 __u8 icptcode;
358 __u16 ipa;
359 __u32 ipb;
360 } s390_sieic;
361 /* KVM_EXIT_S390_RESET */
362#define KVM_S390_RESET_POR 1
363#define KVM_S390_RESET_CLEAR 2
364#define KVM_S390_RESET_SUBSYSTEM 4
365#define KVM_S390_RESET_CPU_INIT 8
366#define KVM_S390_RESET_IPL 16
367 __u64 s390_reset_flags;
1529ae1b
AG
368 /* KVM_EXIT_S390_UCONTROL */
369 struct {
370 __u64 trans_exc_code;
371 __u32 pgm_code;
372 } s390_ucontrol;
a9fd1654 373 /* KVM_EXIT_DCR (deprecated) */
51b24e34
JK
374 struct {
375 __u32 dcrn;
376 __u32 data;
377 __u8 is_write;
378 } dcr;
3a824b15 379 /* KVM_EXIT_INTERNAL_ERROR */
51b24e34
JK
380 struct {
381 __u32 suberror;
382 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
383 __u32 ndata;
384 __u64 data[16];
385 } internal;
386 /* KVM_EXIT_OSI */
387 struct {
388 __u64 gprs[32];
389 } osi;
3a824b15 390 /* KVM_EXIT_PAPR_HCALL */
7c6da3de
AG
391 struct {
392 __u64 nr;
393 __u64 ret;
394 __u64 args[9];
395 } papr_hcall;
d3dccee1
AG
396 /* KVM_EXIT_S390_TSCH */
397 struct {
398 __u16 subchannel_id;
399 __u16 subchannel_nr;
400 __u32 io_int_parm;
401 __u32 io_int_word;
402 __u32 ipb;
403 __u8 dequeued;
404 } s390_tsch;
405 /* KVM_EXIT_EPR */
406 struct {
407 __u32 epr;
408 } epr;
b061808d
AG
409 /* KVM_EXIT_SYSTEM_EVENT */
410 struct {
411#define KVM_SYSTEM_EVENT_SHUTDOWN 1
412#define KVM_SYSTEM_EVENT_RESET 2
120758fb 413#define KVM_SYSTEM_EVENT_CRASH 3
b061808d
AG
414 __u32 type;
415 __u64 flags;
416 } system_event;
7a52ce8a
CH
417 /* KVM_EXIT_S390_STSI */
418 struct {
419 __u64 addr;
420 __u8 ar;
421 __u8 reserved;
422 __u8 fc;
423 __u8 sel1;
424 __u16 sel2;
425 } s390_stsi;
3a824b15
PB
426 /* KVM_EXIT_IOAPIC_EOI */
427 struct {
428 __u8 vector;
429 } eoi;
fff02bc0
PB
430 /* KVM_EXIT_HYPERV */
431 struct kvm_hyperv_exit hyperv;
2a886794
GK
432 /* KVM_EXIT_ARM_NISV */
433 struct {
434 __u64 esr_iss;
435 __u64 fault_ipa;
436 } arm_nisv;
53ba2eee
MR
437 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
438 struct {
439 __u8 error; /* user -> kernel */
440 __u8 pad[7];
441#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
442#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
443#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
444 __u32 reason; /* kernel -> user */
445 __u32 index; /* kernel -> user */
446 __u64 data; /* kernel <-> user */
447 } msr;
278f064e
EH
448 /* KVM_EXIT_XEN */
449 struct kvm_xen_exit xen;
51b24e34
JK
450 /* Fix the size of the union. */
451 char padding[256];
452 };
1529ae1b 453
65a6d8dd
PM
454 /* 2048 is the size of the char array used to bound/pad the size
455 * of the union that holds sync regs.
456 */
457 #define SYNC_REGS_SIZE_BYTES 2048
1529ae1b
AG
458 /*
459 * shared registers between kvm and userspace.
460 * kvm_valid_regs specifies the register classes set by the host
461 * kvm_dirty_regs specified the register classes dirtied by userspace
462 * struct kvm_sync_regs is architecture specific, as well as the
463 * bits for kvm_valid_regs and kvm_dirty_regs
464 */
465 __u64 kvm_valid_regs;
466 __u64 kvm_dirty_regs;
467 union {
468 struct kvm_sync_regs regs;
65a6d8dd 469 char padding[SYNC_REGS_SIZE_BYTES];
1529ae1b 470 } s;
51b24e34
JK
471};
472
473/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
474
475struct kvm_coalesced_mmio_zone {
476 __u64 addr;
477 __u32 size;
966f2ec3
PB
478 union {
479 __u32 pad;
480 __u32 pio;
481 };
51b24e34
JK
482};
483
484struct kvm_coalesced_mmio {
485 __u64 phys_addr;
486 __u32 len;
966f2ec3
PB
487 union {
488 __u32 pad;
489 __u32 pio;
490 };
51b24e34
JK
491 __u8 data[8];
492};
493
494struct kvm_coalesced_mmio_ring {
495 __u32 first, last;
496 struct kvm_coalesced_mmio coalesced_mmio[0];
497};
498
499#define KVM_COALESCED_MMIO_MAX \
500 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
501 sizeof(struct kvm_coalesced_mmio))
502
503/* for KVM_TRANSLATE */
504struct kvm_translation {
505 /* in */
506 __u64 linear_address;
507
508 /* out */
509 __u64 physical_address;
510 __u8 valid;
511 __u8 writeable;
512 __u8 usermode;
513 __u8 pad[5];
514};
515
7a52ce8a
CH
516/* for KVM_S390_MEM_OP */
517struct kvm_s390_mem_op {
518 /* in */
519 __u64 gaddr; /* the guest address */
520 __u64 flags; /* flags */
521 __u32 size; /* amount of bytes */
522 __u32 op; /* type of operation */
523 __u64 buf; /* buffer in userspace */
dc6f8d45
CH
524 union {
525 __u8 ar; /* the access register number */
526 __u32 sida_offset; /* offset into the sida */
527 __u8 reserved[32]; /* should be set to 0 */
528 };
7a52ce8a
CH
529};
530/* types for kvm_s390_mem_op->op */
531#define KVM_S390_MEMOP_LOGICAL_READ 0
532#define KVM_S390_MEMOP_LOGICAL_WRITE 1
dc6f8d45
CH
533#define KVM_S390_MEMOP_SIDA_READ 2
534#define KVM_S390_MEMOP_SIDA_WRITE 3
7a52ce8a
CH
535/* flags for kvm_s390_mem_op->flags */
536#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
537#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
538
51b24e34
JK
539/* for KVM_INTERRUPT */
540struct kvm_interrupt {
541 /* in */
542 __u32 irq;
543};
544
545/* for KVM_GET_DIRTY_LOG */
546struct kvm_dirty_log {
547 __u32 slot;
548 __u32 padding1;
549 union {
550 void *dirty_bitmap; /* one bit per page */
551 __u64 padding2;
552 };
553};
554
da054c64
PB
555/* for KVM_CLEAR_DIRTY_LOG */
556struct kvm_clear_dirty_log {
557 __u32 slot;
558 __u32 num_pages;
559 __u64 first_page;
560 union {
561 void *dirty_bitmap; /* one bit per page */
562 __u64 padding2;
563 };
564};
565
51b24e34
JK
566/* for KVM_SET_SIGNAL_MASK */
567struct kvm_signal_mask {
568 __u32 len;
569 __u8 sigset[0];
570};
571
572/* for KVM_TPR_ACCESS_REPORTING */
573struct kvm_tpr_access_ctl {
574 __u32 enabled;
575 __u32 flags;
576 __u32 reserved[8];
577};
578
579/* for KVM_SET_VAPIC_ADDR */
580struct kvm_vapic_addr {
581 __u64 vapic_addr;
582};
583
a9fd1654 584/* for KVM_SET_MP_STATE */
51b24e34 585
a9fd1654 586/* not all states are valid on all architectures */
51b24e34
JK
587#define KVM_MP_STATE_RUNNABLE 0
588#define KVM_MP_STATE_UNINITIALIZED 1
589#define KVM_MP_STATE_INIT_RECEIVED 2
590#define KVM_MP_STATE_HALTED 3
591#define KVM_MP_STATE_SIPI_RECEIVED 4
a9fd1654
JF
592#define KVM_MP_STATE_STOPPED 5
593#define KVM_MP_STATE_CHECK_STOP 6
594#define KVM_MP_STATE_OPERATING 7
595#define KVM_MP_STATE_LOAD 8
278f064e 596#define KVM_MP_STATE_AP_RESET_HOLD 9
51b24e34
JK
597
598struct kvm_mp_state {
599 __u32 mp_state;
600};
601
602struct kvm_s390_psw {
603 __u64 mask;
604 __u64 addr;
605};
606
607/* valid values for type in kvm_s390_interrupt */
608#define KVM_S390_SIGP_STOP 0xfffe0000u
609#define KVM_S390_PROGRAM_INT 0xfffe0001u
610#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
611#define KVM_S390_RESTART 0xfffe0003u
216db403
CB
612#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
613#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
d3dccee1 614#define KVM_S390_MCHK 0xfffe1000u
76eb98d5
JF
615#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
616#define KVM_S390_INT_CPU_TIMER 0xffff1005u
51b24e34
JK
617#define KVM_S390_INT_VIRTIO 0xffff2603u
618#define KVM_S390_INT_SERVICE 0xffff2401u
619#define KVM_S390_INT_EMERGENCY 0xffff1201u
1529ae1b 620#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d3dccee1
AG
621/* Anything below 0xfffe0000u is taken by INT_IO */
622#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
623 (((schid)) | \
624 ((ssid) << 16) | \
625 ((cssid) << 18) | \
626 ((ai) << 26))
627#define KVM_S390_INT_IO_MIN 0x00000000u
628#define KVM_S390_INT_IO_MAX 0xfffdffffu
120758fb 629#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d3dccee1 630
51b24e34
JK
631
632struct kvm_s390_interrupt {
633 __u32 type;
634 __u32 parm;
635 __u64 parm64;
636};
637
216db403
CB
638struct kvm_s390_io_info {
639 __u16 subchannel_id;
640 __u16 subchannel_nr;
641 __u32 io_int_parm;
642 __u32 io_int_word;
643};
644
645struct kvm_s390_ext_info {
646 __u32 ext_params;
647 __u32 pad;
648 __u64 ext_params2;
649};
650
651struct kvm_s390_pgm_info {
652 __u64 trans_exc_code;
653 __u64 mon_code;
654 __u64 per_address;
655 __u32 data_exc_code;
656 __u16 code;
657 __u16 mon_class_nr;
658 __u8 per_code;
659 __u8 per_atmid;
660 __u8 exc_access_id;
661 __u8 per_access_id;
662 __u8 op_access_id;
66fb2d54
CH
663#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
664#define KVM_S390_PGM_FLAGS_ILC_0 0x02
665#define KVM_S390_PGM_FLAGS_ILC_1 0x04
666#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
667#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
668 __u8 flags;
669 __u8 pad[2];
216db403
CB
670};
671
672struct kvm_s390_prefix_info {
673 __u32 address;
674};
675
676struct kvm_s390_extcall_info {
677 __u16 code;
678};
679
680struct kvm_s390_emerg_info {
681 __u16 code;
682};
683
51628b18
CB
684#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
685struct kvm_s390_stop_info {
686 __u32 flags;
687};
688
216db403
CB
689struct kvm_s390_mchk_info {
690 __u64 cr14;
691 __u64 mcic;
692 __u64 failing_storage_address;
693 __u32 ext_damage_code;
694 __u32 pad;
695 __u8 fixed_logout[16];
696};
697
698struct kvm_s390_irq {
699 __u64 type;
700 union {
701 struct kvm_s390_io_info io;
702 struct kvm_s390_ext_info ext;
703 struct kvm_s390_pgm_info pgm;
704 struct kvm_s390_emerg_info emerg;
705 struct kvm_s390_extcall_info extcall;
706 struct kvm_s390_prefix_info prefix;
51628b18 707 struct kvm_s390_stop_info stop;
216db403
CB
708 struct kvm_s390_mchk_info mchk;
709 char reserved[64];
710 } u;
711};
712
7a52ce8a
CH
713struct kvm_s390_irq_state {
714 __u64 buf;
9cbb6362 715 __u32 flags; /* will stay unused for compatibility reasons */
7a52ce8a 716 __u32 len;
9cbb6362 717 __u32 reserved[4]; /* will stay unused for compatibility reasons */
7a52ce8a
CH
718};
719
51b24e34
JK
720/* for KVM_SET_GUEST_DEBUG */
721
722#define KVM_GUESTDBG_ENABLE 0x00000001
723#define KVM_GUESTDBG_SINGLESTEP 0x00000002
724
725struct kvm_guest_debug {
726 __u32 control;
727 __u32 pad;
728 struct kvm_guest_debug_arch arch;
729};
730
731enum {
732 kvm_ioeventfd_flag_nr_datamatch,
733 kvm_ioeventfd_flag_nr_pio,
734 kvm_ioeventfd_flag_nr_deassign,
cae7f586 735 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
76eb98d5 736 kvm_ioeventfd_flag_nr_fast_mmio,
51b24e34
JK
737 kvm_ioeventfd_flag_nr_max,
738};
739
740#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
741#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
742#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
cae7f586
AG
743#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
744 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
51b24e34
JK
745
746#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
747
748struct kvm_ioeventfd {
749 __u64 datamatch;
750 __u64 addr; /* legal pio/mmio address */
76eb98d5 751 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
51b24e34
JK
752 __s32 fd;
753 __u32 flags;
754 __u8 pad[36];
755};
756
65a6d8dd 757#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
77d361b1 758#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
65a6d8dd 759#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
d38d201f 760#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
65a6d8dd 761#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
77d361b1 762 KVM_X86_DISABLE_EXITS_HLT | \
d38d201f
WL
763 KVM_X86_DISABLE_EXITS_PAUSE | \
764 KVM_X86_DISABLE_EXITS_CSTATE)
65a6d8dd 765
51b24e34
JK
766/* for KVM_ENABLE_CAP */
767struct kvm_enable_cap {
768 /* in */
769 __u32 cap;
770 __u32 flags;
771 __u64 args[4];
772 __u8 pad[64];
773};
774
775/* for KVM_PPC_GET_PVINFO */
3a5eb5b4
PB
776
777#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
778
51b24e34
JK
779struct kvm_ppc_pvinfo {
780 /* out */
781 __u32 flags;
782 __u32 hcall[4];
783 __u8 pad[108];
784};
785
80a3eb10
JK
786/* for KVM_PPC_GET_SMMU_INFO */
787#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
788
789struct kvm_ppc_one_page_size {
790 __u32 page_shift; /* Page shift (or 0) */
791 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
792};
793
794struct kvm_ppc_one_seg_page_size {
795 __u32 page_shift; /* Base page shift of segment (or 0) */
796 __u32 slb_enc; /* SLB encoding for BookS */
797 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
798};
799
800#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
801#define KVM_PPC_1T_SEGMENTS 0x00000002
966f2ec3 802#define KVM_PPC_NO_HASH 0x00000004
80a3eb10
JK
803
804struct kvm_ppc_smmu_info {
805 __u64 flags;
806 __u32 slb_size;
d4083f50
AP
807 __u16 data_keys; /* # storage keys supported for data */
808 __u16 instr_keys; /* # storage keys supported for instructions */
80a3eb10
JK
809 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
810};
811
3a5eb5b4
PB
812/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
813struct kvm_ppc_resize_hpt {
814 __u64 flags;
815 __u32 shift;
816 __u32 pad;
817};
d4834ff9 818
51b24e34
JK
819#define KVMIO 0xAE
820
1529ae1b
AG
821/* machine type bits, to be used as argument to KVM_CREATE_VM */
822#define KVM_VM_S390_UCONTROL 1
823
bf63839f
AW
824/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
825#define KVM_VM_PPC_HV 1
826#define KVM_VM_PPC_PR 2
827
94c7fefc
AJ
828/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
829#define KVM_VM_MIPS_AUTO 0
74c98e20 830#define KVM_VM_MIPS_VZ 1
94c7fefc 831#define KVM_VM_MIPS_TE 2
74c98e20 832
1529ae1b
AG
833#define KVM_S390_SIE_PAGE_OFFSET 1
834
da054c64
PB
835/*
836 * On arm64, machine type can be used to request the physical
837 * address size for the VM. Bits[7-0] are reserved for the guest
838 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
839 * value 0 implies the default IPA size, 40bits.
840 */
841#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
842#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
843 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
51b24e34
JK
844/*
845 * ioctls for /dev/kvm fds:
846 */
847#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
848#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
849#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
850
851#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
852/*
853 * Check if a kvm extension is available. Argument is extension number,
854 * return is 1 (yes) or 0 (no, sorry).
855 */
856#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
857/*
858 * Get size for mmap(vcpu_fd)
859 */
860#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
861#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
862#define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06
863#define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07
864#define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08
bf63839f 865#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
9f2d175d 866#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
51b24e34
JK
867
868/*
869 * Extension capability list.
870 */
871#define KVM_CAP_IRQCHIP 0
872#define KVM_CAP_HLT 1
873#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
874#define KVM_CAP_USER_MEMORY 3
875#define KVM_CAP_SET_TSS_ADDR 4
876#define KVM_CAP_VAPIC 6
877#define KVM_CAP_EXT_CPUID 7
878#define KVM_CAP_CLOCKSOURCE 8
7c6da3de 879#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
51b24e34
JK
880#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
881#define KVM_CAP_PIT 11
882#define KVM_CAP_NOP_IO_DELAY 12
883#define KVM_CAP_PV_MMU 13
884#define KVM_CAP_MP_STATE 14
885#define KVM_CAP_COALESCED_MMIO 15
886#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
51b24e34 887#define KVM_CAP_IOMMU 18
51b24e34
JK
888/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
889#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
51b24e34 890#define KVM_CAP_USER_NMI 22
51b24e34
JK
891#ifdef __KVM_HAVE_GUEST_DEBUG
892#define KVM_CAP_SET_GUEST_DEBUG 23
893#endif
894#ifdef __KVM_HAVE_PIT
895#define KVM_CAP_REINJECT_CONTROL 24
896#endif
51b24e34 897#define KVM_CAP_IRQ_ROUTING 25
51b24e34 898#define KVM_CAP_IRQ_INJECT_STATUS 26
51b24e34
JK
899#define KVM_CAP_ASSIGN_DEV_IRQ 29
900/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
901#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
902#ifdef __KVM_HAVE_MCE
903#define KVM_CAP_MCE 31
904#endif
905#define KVM_CAP_IRQFD 32
906#ifdef __KVM_HAVE_PIT
907#define KVM_CAP_PIT2 33
908#endif
909#define KVM_CAP_SET_BOOT_CPU_ID 34
910#ifdef __KVM_HAVE_PIT_STATE2
911#define KVM_CAP_PIT_STATE2 35
912#endif
913#define KVM_CAP_IOEVENTFD 36
914#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
915#ifdef __KVM_HAVE_XEN_HVM
916#define KVM_CAP_XEN_HVM 38
917#endif
918#define KVM_CAP_ADJUST_CLOCK 39
919#define KVM_CAP_INTERNAL_ERROR_DATA 40
920#ifdef __KVM_HAVE_VCPU_EVENTS
921#define KVM_CAP_VCPU_EVENTS 41
922#endif
923#define KVM_CAP_S390_PSW 42
924#define KVM_CAP_PPC_SEGSTATE 43
925#define KVM_CAP_HYPERV 44
926#define KVM_CAP_HYPERV_VAPIC 45
927#define KVM_CAP_HYPERV_SPIN 46
928#define KVM_CAP_PCI_SEGMENT 47
929#define KVM_CAP_PPC_PAIRED_SINGLES 48
930#define KVM_CAP_INTR_SHADOW 49
931#ifdef __KVM_HAVE_DEBUGREGS
932#define KVM_CAP_DEBUGREGS 50
933#endif
934#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
935#define KVM_CAP_PPC_OSI 52
936#define KVM_CAP_PPC_UNSET_IRQ 53
937#define KVM_CAP_ENABLE_CAP 54
938#ifdef __KVM_HAVE_XSAVE
939#define KVM_CAP_XSAVE 55
940#endif
941#ifdef __KVM_HAVE_XCRS
942#define KVM_CAP_XCRS 56
943#endif
944#define KVM_CAP_PPC_GET_PVINFO 57
945#define KVM_CAP_PPC_IRQ_LEVEL 58
946#define KVM_CAP_ASYNC_PF 59
947#define KVM_CAP_TSC_CONTROL 60
948#define KVM_CAP_GET_TSC_KHZ 61
949#define KVM_CAP_PPC_BOOKE_SREGS 62
7c6da3de
AG
950#define KVM_CAP_SPAPR_TCE 63
951#define KVM_CAP_PPC_SMT 64
952#define KVM_CAP_PPC_RMA 65
953#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
9d4e4f8c 954#define KVM_CAP_PPC_HIOR 67
7c6da3de 955#define KVM_CAP_PPC_PAPR 68
a54fc080 956#define KVM_CAP_SW_TLB 69
9d4e4f8c 957#define KVM_CAP_ONE_REG 70
1529ae1b
AG
958#define KVM_CAP_S390_GMAP 71
959#define KVM_CAP_TSC_DEADLINE_TIMER 72
960#define KVM_CAP_S390_UCONTROL 73
961#define KVM_CAP_SYNC_REGS 74
9ab2195d
MT
962#define KVM_CAP_PCI_2_3 75
963#define KVM_CAP_KVMCLOCK_CTRL 76
80a3eb10
JK
964#define KVM_CAP_SIGNAL_MSI 77
965#define KVM_CAP_PPC_GET_SMMU_INFO 78
2a60dba4 966#define KVM_CAP_S390_COW 79
651682dc 967#define KVM_CAP_PPC_ALLOC_HTAB 80
716b8e4d 968#define KVM_CAP_READONLY_MEM 81
716b8e4d 969#define KVM_CAP_IRQFD_RESAMPLE 82
d4834ff9
AG
970#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
971#define KVM_CAP_PPC_HTAB_FD 84
d3dccee1
AG
972#define KVM_CAP_S390_CSS_SUPPORT 85
973#define KVM_CAP_PPC_EPR 86
eadd0e44
PM
974#define KVM_CAP_ARM_PSCI 87
975#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
e098b453
AK
976#define KVM_CAP_DEVICE_CTRL 89
977#define KVM_CAP_IRQ_MPIC 90
978#define KVM_CAP_PPC_RTAS 91
979#define KVM_CAP_IRQ_XICS 92
c5daeae1 980#define KVM_CAP_ARM_EL1_32BIT 93
4f265607 981#define KVM_CAP_SPAPR_MULTITCE 94
bf63839f 982#define KVM_CAP_EXT_EMUL_CPUID 95
48a5f3bc 983#define KVM_CAP_HYPERV_TIME 96
9ffd2685
CH
984#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
985#define KVM_CAP_ENABLE_CAP_VM 98
986#define KVM_CAP_S390_IRQCHIP 99
76eb98d5
JF
987#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
988#define KVM_CAP_VM_ATTRIBUTES 101
b061808d
AG
989#define KVM_CAP_ARM_PSCI_0_2 102
990#define KVM_CAP_PPC_FIXUP_HCALL 103
a9fd1654
JF
991#define KVM_CAP_PPC_ENABLE_HCALL 104
992#define KVM_CAP_CHECK_EXTENSION_VM 105
51628b18 993#define KVM_CAP_S390_USER_SIGP 106
7a52ce8a
CH
994#define KVM_CAP_S390_VECTOR_REGISTERS 107
995#define KVM_CAP_S390_MEM_OP 108
996#define KVM_CAP_S390_USER_STSI 109
997#define KVM_CAP_S390_SKEYS 110
998#define KVM_CAP_MIPS_FPU 111
999#define KVM_CAP_MIPS_MSA 112
1000#define KVM_CAP_S390_INJECT_IRQ 113
1001#define KVM_CAP_S390_IRQ_STATE 114
1002#define KVM_CAP_PPC_HWRNG 115
24a31426
PB
1003#define KVM_CAP_DISABLE_QUIRKS 116
1004#define KVM_CAP_X86_SMM 117
1005#define KVM_CAP_MULTI_ADDRESS_SPACE 118
3a824b15
PB
1006#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
1007#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
1008#define KVM_CAP_SPLIT_IRQCHIP 121
1009#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
fff02bc0 1010#define KVM_CAP_HYPERV_SYNIC 123
66fb2d54 1011#define KVM_CAP_S390_RI 124
b89485a5
PB
1012#define KVM_CAP_SPAPR_TCE_64 125
1013#define KVM_CAP_ARM_PMU_V3 126
1014#define KVM_CAP_VCPU_ATTRIBUTES 127
ff804f15 1015#define KVM_CAP_MAX_VCPU_ID 128
dbdfea92
CH
1016#define KVM_CAP_X2APIC_API 129
1017#define KVM_CAP_S390_USER_INSTR0 130
1018#define KVM_CAP_MSI_DEVID 131
1019#define KVM_CAP_PPC_HTM 132
3a5eb5b4
PB
1020#define KVM_CAP_SPAPR_RESIZE_HPT 133
1021#define KVM_CAP_PPC_MMU_RADIX 134
1022#define KVM_CAP_PPC_MMU_HASH_V3 135
1023#define KVM_CAP_IMMEDIATE_EXIT 136
74c98e20
CH
1024#define KVM_CAP_MIPS_VZ 137
1025#define KVM_CAP_MIPS_TE 138
1026#define KVM_CAP_MIPS_64BIT 139
1027#define KVM_CAP_S390_GS 140
1028#define KVM_CAP_S390_AIS 141
1029#define KVM_CAP_SPAPR_TCE_VFIO 142
65a6d8dd 1030#define KVM_CAP_X86_DISABLE_EXITS 143
74c98e20 1031#define KVM_CAP_ARM_USER_IRQ 144
3272f0e2
CB
1032#define KVM_CAP_S390_CMMA_MIGRATION 145
1033#define KVM_CAP_PPC_FWNMI 146
1034#define KVM_CAP_PPC_SMT_POSSIBLE 147
ab6e1550
CB
1035#define KVM_CAP_HYPERV_SYNIC2 148
1036#define KVM_CAP_HYPERV_VP_INDEX 149
dd873966 1037#define KVM_CAP_S390_AIS_MIGRATION 150
9cbb6362
CH
1038#define KVM_CAP_PPC_GET_CPU_CHAR 151
1039#define KVM_CAP_S390_BPB 152
9f2d175d 1040#define KVM_CAP_GET_MSR_FEATURES 153
65a6d8dd 1041#define KVM_CAP_HYPERV_EVENTFD 154
77d361b1 1042#define KVM_CAP_HYPERV_TLBFLUSH 155
d36f7de8
CH
1043#define KVM_CAP_S390_HPAGE_1M 156
1044#define KVM_CAP_NESTED_STATE 157
8f3cd250
CH
1045#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
1046#define KVM_CAP_MSR_PLATFORM_INFO 159
966f2ec3
PB
1047#define KVM_CAP_PPC_NESTED_HV 160
1048#define KVM_CAP_HYPERV_SEND_IPI 161
1049#define KVM_CAP_COALESCED_PIO 162
1050#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
1051#define KVM_CAP_EXCEPTION_PAYLOAD 164
da054c64 1052#define KVM_CAP_ARM_VM_IPA_SIZE 165
d9cb4336 1053#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
da054c64 1054#define KVM_CAP_HYPERV_CPUID 167
d9cb4336
CH
1055#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
1056#define KVM_CAP_PPC_IRQ_XIVE 169
1057#define KVM_CAP_ARM_SVE 170
1058#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1059#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
f363d039
EA
1060#define KVM_CAP_PMU_EVENT_FILTER 173
1061#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
1062#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
2a886794
GK
1063#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
1064#define KVM_CAP_ARM_NISV_TO_USER 177
1065#define KVM_CAP_ARM_INJECT_EXT_DABT 178
ddda3748 1066#define KVM_CAP_S390_VCPU_RESETS 179
dc6f8d45
CH
1067#define KVM_CAP_S390_PROTECTED 180
1068#define KVM_CAP_PPC_SECURE_GUEST 181
f76b348e
CH
1069#define KVM_CAP_HALT_POLL 182
1070#define KVM_CAP_ASYNC_PF_INT 183
e6546342
JW
1071#define KVM_CAP_LAST_CPU 184
1072#define KVM_CAP_SMALLER_MAXPHYADDR 185
1073#define KVM_CAP_S390_DIAG318 186
94c7fefc 1074#define KVM_CAP_STEAL_TIME 187
53ba2eee
MR
1075#define KVM_CAP_X86_USER_SPACE_MSR 188
1076#define KVM_CAP_X86_MSR_FILTER 189
1077#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
b3c818a4
EF
1078#define KVM_CAP_SYS_HYPERV_CPUID 191
1079#define KVM_CAP_DIRTY_LOG_RING 192
278f064e
EH
1080#define KVM_CAP_X86_BUS_LOCK_EXIT 193
1081#define KVM_CAP_PPC_DAWR1 194
1082#define KVM_CAP_SET_GUEST_DEBUG2 195
1083#define KVM_CAP_SGX_ATTRIBUTE 196
1084#define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197
1085#define KVM_CAP_PTP_KVM 198
51b24e34
JK
1086
1087#ifdef KVM_CAP_IRQ_ROUTING
1088
1089struct kvm_irq_routing_irqchip {
1090 __u32 irqchip;
1091 __u32 pin;
1092};
1093
1094struct kvm_irq_routing_msi {
1095 __u32 address_lo;
1096 __u32 address_hi;
1097 __u32 data;
dbdfea92
CH
1098 union {
1099 __u32 pad;
1100 __u32 devid;
1101 };
51b24e34
JK
1102};
1103
9ffd2685
CH
1104struct kvm_irq_routing_s390_adapter {
1105 __u64 ind_addr;
1106 __u64 summary_addr;
1107 __u64 ind_offset;
1108 __u32 summary_offset;
1109 __u32 adapter_id;
1110};
1111
fff02bc0
PB
1112struct kvm_irq_routing_hv_sint {
1113 __u32 vcpu;
1114 __u32 sint;
1115};
1116
51b24e34
JK
1117/* gsi routing entry types */
1118#define KVM_IRQ_ROUTING_IRQCHIP 1
1119#define KVM_IRQ_ROUTING_MSI 2
9ffd2685 1120#define KVM_IRQ_ROUTING_S390_ADAPTER 3
fff02bc0 1121#define KVM_IRQ_ROUTING_HV_SINT 4
51b24e34
JK
1122
1123struct kvm_irq_routing_entry {
1124 __u32 gsi;
1125 __u32 type;
1126 __u32 flags;
1127 __u32 pad;
1128 union {
1129 struct kvm_irq_routing_irqchip irqchip;
1130 struct kvm_irq_routing_msi msi;
9ffd2685 1131 struct kvm_irq_routing_s390_adapter adapter;
fff02bc0 1132 struct kvm_irq_routing_hv_sint hv_sint;
51b24e34
JK
1133 __u32 pad[8];
1134 } u;
1135};
1136
1137struct kvm_irq_routing {
1138 __u32 nr;
1139 __u32 flags;
1140 struct kvm_irq_routing_entry entries[0];
1141};
1142
1143#endif
1144
1145#ifdef KVM_CAP_MCE
1146/* x86 MCE */
1147struct kvm_x86_mce {
1148 __u64 status;
1149 __u64 addr;
1150 __u64 misc;
1151 __u64 mcg_status;
1152 __u8 bank;
1153 __u8 pad1[7];
1154 __u64 pad2[3];
1155};
1156#endif
1157
1158#ifdef KVM_CAP_XEN_HVM
278f064e
EH
1159#define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0)
1160#define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1)
1161#define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2)
1162#define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3)
1163
51b24e34
JK
1164struct kvm_xen_hvm_config {
1165 __u32 flags;
1166 __u32 msr;
1167 __u64 blob_addr_32;
1168 __u64 blob_addr_64;
1169 __u8 blob_size_32;
1170 __u8 blob_size_64;
1171 __u8 pad2[30];
1172};
1173#endif
1174
1175#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
716b8e4d
AW
1176/*
1177 * Available with KVM_CAP_IRQFD_RESAMPLE
1178 *
1179 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1180 * the irqfd to operate in resampling mode for level triggered interrupt
f76b348e 1181 * emulation. See Documentation/virt/kvm/api.rst.
716b8e4d
AW
1182 */
1183#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
51b24e34
JK
1184
1185struct kvm_irqfd {
1186 __u32 fd;
1187 __u32 gsi;
1188 __u32 flags;
716b8e4d
AW
1189 __u32 resamplefd;
1190 __u8 pad[16];
51b24e34
JK
1191};
1192
bc204035
MT
1193/* For KVM_CAP_ADJUST_CLOCK */
1194
1195/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1196#define KVM_CLOCK_TSC_STABLE 2
1197
51b24e34
JK
1198struct kvm_clock_data {
1199 __u64 clock;
1200 __u32 flags;
1201 __u32 pad[9];
1202};
1203
bc204035
MT
1204/* For KVM_CAP_SW_TLB */
1205
a54fc080
AG
1206#define KVM_MMU_FSL_BOOKE_NOHV 0
1207#define KVM_MMU_FSL_BOOKE_HV 1
1208
1209struct kvm_config_tlb {
1210 __u64 params;
1211 __u64 array;
1212 __u32 mmu_type;
1213 __u32 array_len;
1214};
1215
1216struct kvm_dirty_tlb {
1217 __u64 bitmap;
1218 __u32 num_dirty;
1219};
1220
9d4e4f8c
AG
1221/* Available with KVM_CAP_ONE_REG */
1222
a31be480
AG
1223#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1224#define KVM_REG_GENERIC 0x0000000000000000ULL
9d4e4f8c
AG
1225
1226/*
1227 * Architecture specific registers are to be defined in arch headers and
1228 * ORed with the arch identifier.
1229 */
a31be480
AG
1230#define KVM_REG_PPC 0x1000000000000000ULL
1231#define KVM_REG_X86 0x2000000000000000ULL
1232#define KVM_REG_IA64 0x3000000000000000ULL
1233#define KVM_REG_ARM 0x4000000000000000ULL
1234#define KVM_REG_S390 0x5000000000000000ULL
c5daeae1
AK
1235#define KVM_REG_ARM64 0x6000000000000000ULL
1236#define KVM_REG_MIPS 0x7000000000000000ULL
f363d039 1237#define KVM_REG_RISCV 0x8000000000000000ULL
a31be480
AG
1238
1239#define KVM_REG_SIZE_SHIFT 52
1240#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1241#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1242#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1243#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1244#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1245#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1246#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1247#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1248#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
d9cb4336 1249#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
9d4e4f8c 1250
eadd0e44
PM
1251struct kvm_reg_list {
1252 __u64 n; /* number of regs */
1253 __u64 reg[0];
1254};
1255
9d4e4f8c
AG
1256struct kvm_one_reg {
1257 __u64 id;
a31be480 1258 __u64 addr;
9d4e4f8c
AG
1259};
1260
dbdfea92 1261#define KVM_MSI_VALID_DEVID (1U << 0)
80a3eb10
JK
1262struct kvm_msi {
1263 __u32 address_lo;
1264 __u32 address_hi;
1265 __u32 data;
1266 __u32 flags;
dbdfea92
CH
1267 __u32 devid;
1268 __u8 pad[12];
80a3eb10
JK
1269};
1270
eadd0e44
PM
1271struct kvm_arm_device_addr {
1272 __u64 id;
1273 __u64 addr;
1274};
1275
e098b453
AK
1276/*
1277 * Device control API, available with KVM_CAP_DEVICE_CTRL
1278 */
1279#define KVM_CREATE_DEVICE_TEST 1
1280
1281struct kvm_create_device {
1282 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1283 __u32 fd; /* out: device handle */
1284 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1285};
1286
1287struct kvm_device_attr {
1288 __u32 flags; /* no flags currently defined */
1289 __u32 group; /* device-defined */
1290 __u64 attr; /* group-defined */
1291 __u64 addr; /* userspace address of attr data */
1292};
1293
bf63839f
AW
1294#define KVM_DEV_VFIO_GROUP 1
1295#define KVM_DEV_VFIO_GROUP_ADD 1
1296#define KVM_DEV_VFIO_GROUP_DEL 2
74c98e20 1297#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
444b1996
AB
1298
1299enum kvm_device_type {
1300 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1301#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1302 KVM_DEV_TYPE_FSL_MPIC_42,
1303#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1304 KVM_DEV_TYPE_XICS,
1305#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1306 KVM_DEV_TYPE_VFIO,
1307#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1308 KVM_DEV_TYPE_ARM_VGIC_V2,
1309#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1310 KVM_DEV_TYPE_FLIC,
1311#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
51628b18
CB
1312 KVM_DEV_TYPE_ARM_VGIC_V3,
1313#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
dbdfea92
CH
1314 KVM_DEV_TYPE_ARM_VGIC_ITS,
1315#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
d9cb4336
CH
1316 KVM_DEV_TYPE_XIVE,
1317#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
2a886794
GK
1318 KVM_DEV_TYPE_ARM_PV_TIME,
1319#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
444b1996
AB
1320 KVM_DEV_TYPE_MAX,
1321};
e098b453 1322
74c98e20
CH
1323struct kvm_vfio_spapr_tce {
1324 __s32 groupfd;
1325 __s32 tablefd;
1326};
1327
51b24e34
JK
1328/*
1329 * ioctls for VM fds
1330 */
1331#define KVM_SET_MEMORY_REGION _IOW(KVMIO, 0x40, struct kvm_memory_region)
1332/*
1333 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1334 * a vcpu fd.
1335 */
1336#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1337#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
1338/* KVM_SET_MEMORY_ALIAS is obsolete: */
1339#define KVM_SET_MEMORY_ALIAS _IOW(KVMIO, 0x43, struct kvm_memory_alias)
1340#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
1341#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45)
1342#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
1343 struct kvm_userspace_memory_region)
1344#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1345#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
1529ae1b
AG
1346
1347/* enable ucontrol for s390 */
1348struct kvm_s390_ucas_mapping {
1349 __u64 user_addr;
1350 __u64 vcpu_addr;
1351 __u64 length;
1352};
1353#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1354#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
1355#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
1356
51b24e34
JK
1357/* Device model IOC */
1358#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1359#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1360#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1361#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1362#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1363#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1364#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1365#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
1366#define KVM_REGISTER_COALESCED_MMIO \
1367 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1368#define KVM_UNREGISTER_COALESCED_MMIO \
1369 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
1370#define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \
1371 struct kvm_assigned_pci_dev)
1372#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
1373/* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */
1374#define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70
1375#define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq)
1376#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
1377#define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \
1378 struct kvm_assigned_pci_dev)
1379#define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \
1380 struct kvm_assigned_msix_nr)
1381#define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \
1382 struct kvm_assigned_msix_entry)
1383#define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq)
1384#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1385#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1386#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1387#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1388#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1389#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1390#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1391/* Available with KVM_CAP_PIT_STATE2 */
1392#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1393#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
1394/* Available with KVM_CAP_PPC_GET_PVINFO */
1395#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
1396/* Available with KVM_CAP_TSC_CONTROL */
1397#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1398#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
9ab2195d
MT
1399/* Available with KVM_CAP_PCI_2_3 */
1400#define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \
1401 struct kvm_assigned_pci_dev)
80a3eb10
JK
1402/* Available with KVM_CAP_SIGNAL_MSI */
1403#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
1404/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1405#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
651682dc
MT
1406/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1407#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
d4834ff9 1408#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
b89485a5
PB
1409#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1410 struct kvm_create_spapr_tce_64)
d4834ff9
AG
1411/* Available with KVM_CAP_RMA */
1412#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
1413/* Available with KVM_CAP_PPC_HTAB_FD */
1414#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
eadd0e44
PM
1415/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1416#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
e098b453
AK
1417/* Available with KVM_CAP_PPC_RTAS */
1418#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
3a5eb5b4
PB
1419/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1420#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1421#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
1422/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1423#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1424/* Available with KVM_CAP_PPC_RADIX_MMU */
1425#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
9cbb6362
CH
1426/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1427#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
f363d039
EA
1428/* Available with KVM_CAP_PMU_EVENT_FILTER */
1429#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
50fd0c37 1430#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
e098b453
AK
1431
1432/* ioctl for vm fd */
1433#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1434
1435/* ioctls for fds returned by KVM_CREATE_DEVICE */
1436#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1437#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1438#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
51b24e34
JK
1439
1440/*
1441 * ioctls for vcpu fds
1442 */
1443#define KVM_RUN _IO(KVMIO, 0x80)
1444#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1445#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1446#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1447#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1448#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1449#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
1450/* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */
1451#define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87
1452#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1453#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1454#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1455#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
1456#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1457#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
1458#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1459#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
1460#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1461#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
1462/* Available with KVM_CAP_VAPIC */
1463#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
1464/* Available with KVM_CAP_VAPIC */
1465#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
1466/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1467#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
1468/* store status for s390 */
1469#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1470#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1471#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1472/* initial ipl psw for s390 */
1473#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1474/* initial reset for s390 */
1475#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
1476#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1477#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
444b1996 1478/* Available with KVM_CAP_USER_NMI */
51b24e34
JK
1479#define KVM_NMI _IO(KVMIO, 0x9a)
1480/* Available with KVM_CAP_SET_GUEST_DEBUG */
1481#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
1482/* MCE for x86 */
1483#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1484#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1485#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
51b24e34
JK
1486/* Available with KVM_CAP_VCPU_EVENTS */
1487#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1488#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
1489/* Available with KVM_CAP_DEBUGREGS */
1490#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1491#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
9ffd2685
CH
1492/*
1493 * vcpu version available with KVM_ENABLE_CAP
1494 * vm version available with KVM_CAP_ENABLE_CAP_VM
1495 */
51b24e34
JK
1496#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
1497/* Available with KVM_CAP_XSAVE */
1498#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1499#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1500/* Available with KVM_CAP_XCRS */
1501#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1502#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
a54fc080
AG
1503/* Available with KVM_CAP_SW_TLB */
1504#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
9d4e4f8c 1505/* Available with KVM_CAP_ONE_REG */
a31be480 1506#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
9d4e4f8c 1507#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
9ab2195d
MT
1508/* VM is being stopped by host */
1509#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
eadd0e44 1510#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
bf63839f 1511#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
eadd0e44 1512#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
7a52ce8a
CH
1513/* Available with KVM_CAP_S390_MEM_OP */
1514#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
1515/* Available with KVM_CAP_S390_SKEYS */
1516#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1517#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
1518/* Available with KVM_CAP_S390_INJECT_IRQ */
1519#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
1520/* Available with KVM_CAP_S390_IRQ_STATE */
1521#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1522#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
24a31426
PB
1523/* Available with KVM_CAP_X86_SMM */
1524#define KVM_SMI _IO(KVMIO, 0xb7)
3272f0e2 1525/* Available with KVM_CAP_S390_CMMA_MIGRATION */
ab6e1550 1526#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
3272f0e2 1527#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
9f2d175d
PB
1528/* Memory Encryption Commands */
1529#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
1530
1531struct kvm_enc_region {
1532 __u64 addr;
1533 __u64 size;
1534};
1535
1536#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1537#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1538
65a6d8dd
PM
1539/* Available with KVM_CAP_HYPERV_EVENTFD */
1540#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1541
d36f7de8
CH
1542/* Available with KVM_CAP_NESTED_STATE */
1543#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1544#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
65a6d8dd 1545
d9cb4336 1546/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
da054c64
PB
1547#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1548
b3c818a4 1549/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
da054c64
PB
1550#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1551
d9cb4336
CH
1552/* Available with KVM_CAP_ARM_SVE */
1553#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1554
ddda3748
CH
1555/* Available with KVM_CAP_S390_VCPU_RESETS */
1556#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1557#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1558
dc6f8d45
CH
1559struct kvm_s390_pv_sec_parm {
1560 __u64 origin;
1561 __u64 length;
1562};
1563
1564struct kvm_s390_pv_unp {
1565 __u64 addr;
1566 __u64 size;
1567 __u64 tweak;
1568};
1569
1570enum pv_cmd_id {
1571 KVM_PV_ENABLE,
1572 KVM_PV_DISABLE,
1573 KVM_PV_SET_SEC_PARMS,
1574 KVM_PV_UNPACK,
1575 KVM_PV_VERIFY,
1576 KVM_PV_PREP_RESET,
1577 KVM_PV_UNSHARE_ALL,
1578};
1579
1580struct kvm_pv_cmd {
1581 __u32 cmd; /* Command to be executed */
1582 __u16 rc; /* Ultravisor return code */
1583 __u16 rrc; /* Ultravisor return reason code */
1584 __u64 data; /* Data or address */
1585 __u32 flags; /* flags for future extensions. Must be 0 for now */
1586 __u32 reserved[3];
1587};
1588
1589/* Available with KVM_CAP_S390_PROTECTED */
1590#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1591
53ba2eee
MR
1592/* Available with KVM_CAP_X86_MSR_FILTER */
1593#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1594
b3c818a4
EF
1595/* Available with KVM_CAP_DIRTY_LOG_RING */
1596#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1597
278f064e
EH
1598/* Per-VM Xen attributes */
1599#define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr)
1600#define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr)
1601
1602struct kvm_xen_hvm_attr {
1603 __u16 type;
1604 __u16 pad[3];
1605 union {
1606 __u8 long_mode;
1607 __u8 vector;
1608 struct {
1609 __u64 gfn;
1610 } shared_info;
1611 __u64 pad[8];
1612 } u;
1613};
1614
1615/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1616#define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0
1617#define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1
1618#define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2
1619
1620/* Per-vCPU Xen attributes */
1621#define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr)
1622#define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr)
1623
1624struct kvm_xen_vcpu_attr {
1625 __u16 type;
1626 __u16 pad[3];
1627 union {
1628 __u64 gpa;
1629 __u64 pad[8];
1630 struct {
1631 __u64 state;
1632 __u64 state_entry_time;
1633 __u64 time_running;
1634 __u64 time_runnable;
1635 __u64 time_blocked;
1636 __u64 time_offline;
1637 } runstate;
1638 } u;
1639};
1640
1641/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1642#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0
1643#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1
1644#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2
1645#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3
1646#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4
1647#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5
1648
9f2d175d
PB
1649/* Secure Encrypted Virtualization command */
1650enum sev_cmd_id {
1651 /* Guest initialization commands */
1652 KVM_SEV_INIT = 0,
1653 KVM_SEV_ES_INIT,
1654 /* Guest launch commands */
1655 KVM_SEV_LAUNCH_START,
1656 KVM_SEV_LAUNCH_UPDATE_DATA,
1657 KVM_SEV_LAUNCH_UPDATE_VMSA,
1658 KVM_SEV_LAUNCH_SECRET,
1659 KVM_SEV_LAUNCH_MEASURE,
1660 KVM_SEV_LAUNCH_FINISH,
1661 /* Guest migration commands (outgoing) */
1662 KVM_SEV_SEND_START,
1663 KVM_SEV_SEND_UPDATE_DATA,
1664 KVM_SEV_SEND_UPDATE_VMSA,
1665 KVM_SEV_SEND_FINISH,
1666 /* Guest migration commands (incoming) */
1667 KVM_SEV_RECEIVE_START,
1668 KVM_SEV_RECEIVE_UPDATE_DATA,
1669 KVM_SEV_RECEIVE_UPDATE_VMSA,
1670 KVM_SEV_RECEIVE_FINISH,
1671 /* Guest status and debug commands */
1672 KVM_SEV_GUEST_STATUS,
1673 KVM_SEV_DBG_DECRYPT,
1674 KVM_SEV_DBG_ENCRYPT,
1675 /* Guest certificates commands */
1676 KVM_SEV_CERT_EXPORT,
3ea1a802
BS
1677 /* Attestation report */
1678 KVM_SEV_GET_ATTESTATION_REPORT,
278f064e
EH
1679 /* Guest Migration Extension */
1680 KVM_SEV_SEND_CANCEL,
9f2d175d
PB
1681
1682 KVM_SEV_NR_MAX,
1683};
1684
1685struct kvm_sev_cmd {
1686 __u32 id;
1687 __u64 data;
1688 __u32 error;
1689 __u32 sev_fd;
1690};
1691
1692struct kvm_sev_launch_start {
1693 __u32 handle;
1694 __u32 policy;
1695 __u64 dh_uaddr;
1696 __u32 dh_len;
1697 __u64 session_uaddr;
1698 __u32 session_len;
1699};
1700
1701struct kvm_sev_launch_update_data {
1702 __u64 uaddr;
1703 __u32 len;
1704};
1705
1706
1707struct kvm_sev_launch_secret {
1708 __u64 hdr_uaddr;
1709 __u32 hdr_len;
1710 __u64 guest_uaddr;
1711 __u32 guest_len;
1712 __u64 trans_uaddr;
1713 __u32 trans_len;
1714};
1715
1716struct kvm_sev_launch_measure {
1717 __u64 uaddr;
1718 __u32 len;
1719};
1720
1721struct kvm_sev_guest_status {
1722 __u32 handle;
1723 __u32 policy;
1724 __u32 state;
1725};
1726
1727struct kvm_sev_dbg {
1728 __u64 src_uaddr;
1729 __u64 dst_uaddr;
1730 __u32 len;
1731};
51b24e34 1732
3ea1a802
BS
1733struct kvm_sev_attestation_report {
1734 __u8 mnonce[16];
1735 __u64 uaddr;
1736 __u32 len;
1737};
1738
278f064e
EH
1739struct kvm_sev_send_start {
1740 __u32 policy;
1741 __u64 pdh_cert_uaddr;
1742 __u32 pdh_cert_len;
1743 __u64 plat_certs_uaddr;
1744 __u32 plat_certs_len;
1745 __u64 amd_certs_uaddr;
1746 __u32 amd_certs_len;
1747 __u64 session_uaddr;
1748 __u32 session_len;
1749};
1750
1751struct kvm_sev_send_update_data {
1752 __u64 hdr_uaddr;
1753 __u32 hdr_len;
1754 __u64 guest_uaddr;
1755 __u32 guest_len;
1756 __u64 trans_uaddr;
1757 __u32 trans_len;
1758};
1759
1760struct kvm_sev_receive_start {
1761 __u32 handle;
1762 __u32 policy;
1763 __u64 pdh_uaddr;
1764 __u32 pdh_len;
1765 __u64 session_uaddr;
1766 __u32 session_len;
1767};
1768
1769struct kvm_sev_receive_update_data {
1770 __u64 hdr_uaddr;
1771 __u32 hdr_len;
1772 __u64 guest_uaddr;
1773 __u32 guest_len;
1774 __u64 trans_uaddr;
1775 __u32 trans_len;
1776};
1777
51b24e34 1778#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
9ab2195d
MT
1779#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
1780#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
51b24e34
JK
1781
1782struct kvm_assigned_pci_dev {
1783 __u32 assigned_dev_id;
1784 __u32 busnr;
1785 __u32 devfn;
1786 __u32 flags;
1787 __u32 segnr;
1788 union {
1789 __u32 reserved[11];
1790 };
1791};
1792
1793#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
1794#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
1795#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
1796
1797#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
1798#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
1799#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
1800
1801#define KVM_DEV_IRQ_HOST_MASK 0x00ff
1802#define KVM_DEV_IRQ_GUEST_MASK 0xff00
1803
1804struct kvm_assigned_irq {
1805 __u32 assigned_dev_id;
7c6da3de 1806 __u32 host_irq; /* ignored (legacy field) */
51b24e34
JK
1807 __u32 guest_irq;
1808 __u32 flags;
1809 union {
51b24e34
JK
1810 __u32 reserved[12];
1811 };
1812};
1813
51b24e34
JK
1814struct kvm_assigned_msix_nr {
1815 __u32 assigned_dev_id;
1816 __u16 entry_nr;
1817 __u16 padding;
1818};
1819
1820#define KVM_MAX_MSIX_PER_DEV 256
1821struct kvm_assigned_msix_entry {
1822 __u32 assigned_dev_id;
1823 __u32 gsi;
1824 __u16 entry; /* The index of entry in the MSI-X table */
1825 __u16 padding[3];
1826};
1827
dbdfea92
CH
1828#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
1829#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
1830
74c98e20
CH
1831/* Available with KVM_CAP_ARM_USER_IRQ */
1832
1833/* Bits for run->s.regs.device_irq_level */
1834#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
1835#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
1836#define KVM_ARM_DEV_PMU (1 << 2)
1837
65a6d8dd
PM
1838struct kvm_hyperv_eventfd {
1839 __u32 conn_id;
1840 __s32 fd;
1841 __u32 flags;
1842 __u32 padding[3];
1843};
1844
1845#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
1846#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
1847
dc6f8d45
CH
1848#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
1849#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
1850
b3c818a4
EF
1851/*
1852 * Arch needs to define the macro after implementing the dirty ring
1853 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
1854 * starting page offset of the dirty ring structures.
1855 */
1856#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
1857#define KVM_DIRTY_LOG_PAGE_OFFSET 0
1858#endif
1859
1860/*
1861 * KVM dirty GFN flags, defined as:
1862 *
1863 * |---------------+---------------+--------------|
1864 * | bit 1 (reset) | bit 0 (dirty) | Status |
1865 * |---------------+---------------+--------------|
1866 * | 0 | 0 | Invalid GFN |
1867 * | 0 | 1 | Dirty GFN |
1868 * | 1 | X | GFN to reset |
1869 * |---------------+---------------+--------------|
1870 *
1871 * Lifecycle of a dirty GFN goes like:
1872 *
1873 * dirtied harvested reset
1874 * 00 -----------> 01 -------------> 1X -------+
1875 * ^ |
1876 * | |
1877 * +------------------------------------------+
1878 *
1879 * The userspace program is only responsible for the 01->1X state
1880 * conversion after harvesting an entry. Also, it must not skip any
1881 * dirty bits, so that dirty bits are always harvested in sequence.
1882 */
278f064e
EH
1883#define KVM_DIRTY_GFN_F_DIRTY _BITUL(0)
1884#define KVM_DIRTY_GFN_F_RESET _BITUL(1)
b3c818a4
EF
1885#define KVM_DIRTY_GFN_F_MASK 0x3
1886
1887/*
1888 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
1889 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
1890 * size of the gfn buffer is decided by the first argument when
1891 * enabling KVM_CAP_DIRTY_LOG_RING.
1892 */
1893struct kvm_dirty_gfn {
1894 __u32 flags;
1895 __u32 slot;
1896 __u64 offset;
1897};
1898
278f064e
EH
1899#define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
1900#define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1)
1901
51b24e34 1902#endif /* __LINUX_KVM_H */