]> git.proxmox.com Git - mirror_qemu.git/blame - linux-headers/linux/kvm.h
linux-headers: Update to Linux v6.8-rc6
[mirror_qemu.git] / linux-headers / linux / kvm.h
CommitLineData
dd873966 1/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
51b24e34
JK
2#ifndef __LINUX_KVM_H
3#define __LINUX_KVM_H
4
5/*
6 * Userspace interface for /dev/kvm - kernel based virtual machine
7 *
8 * Note: you must update KVM_API_VERSION if you change this interface.
9 */
10
278f064e 11#include <linux/const.h>
51b24e34
JK
12#include <linux/types.h>
13
14#include <linux/ioctl.h>
15#include <asm/kvm.h>
16
17#define KVM_API_VERSION 12
18
51b24e34
JK
19/* for KVM_SET_USER_MEMORY_REGION */
20struct kvm_userspace_memory_region {
21 __u32 slot;
22 __u32 flags;
23 __u64 guest_phys_addr;
24 __u64 memory_size; /* bytes */
25 __u64 userspace_addr; /* start of the userspace allocated memory */
26};
27
6a02465f
DHB
28/* for KVM_SET_USER_MEMORY_REGION2 */
29struct kvm_userspace_memory_region2 {
30 __u32 slot;
31 __u32 flags;
32 __u64 guest_phys_addr;
33 __u64 memory_size;
34 __u64 userspace_addr;
35 __u64 guest_memfd_offset;
36 __u32 guest_memfd;
37 __u32 pad1;
38 __u64 pad2[14];
39};
40
716b8e4d 41/*
93d7620c
AH
42 * The bit 0 ~ bit 15 of kvm_userspace_memory_region::flags are visible for
43 * userspace, other bits are reserved for kvm internal use which are defined
44 * in include/linux/kvm_host.h.
716b8e4d
AW
45 */
46#define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
47#define KVM_MEM_READONLY (1UL << 1)
6a02465f 48#define KVM_MEM_GUEST_MEMFD (1UL << 2)
51b24e34
JK
49
50/* for KVM_IRQ_LINE */
51struct kvm_irq_level {
52 /*
53 * ACPI gsi notion of irq.
54 * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
55 * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
f76b348e 56 * For ARM: See Documentation/virt/kvm/api.rst
51b24e34
JK
57 */
58 union {
59 __u32 irq;
60 __s32 status;
61 };
62 __u32 level;
63};
64
65
66struct kvm_irqchip {
67 __u32 chip_id;
68 __u32 pad;
69 union {
70 char dummy[512]; /* reserving space */
71#ifdef __KVM_HAVE_PIT
72 struct kvm_pic_state pic;
73#endif
74#ifdef __KVM_HAVE_IOAPIC
75 struct kvm_ioapic_state ioapic;
76#endif
77 } chip;
78};
79
80/* for KVM_CREATE_PIT2 */
81struct kvm_pit_config {
82 __u32 flags;
83 __u32 pad[15];
84};
85
86#define KVM_PIT_SPEAKER_DUMMY 1
87
7a52ce8a
CH
88struct kvm_s390_skeys {
89 __u64 start_gfn;
90 __u64 count;
91 __u64 skeydata_addr;
92 __u32 flags;
93 __u32 reserved[9];
94};
fff02bc0 95
3272f0e2
CB
96#define KVM_S390_CMMA_PEEK (1 << 0)
97
98/**
99 * kvm_s390_cmma_log - Used for CMMA migration.
100 *
101 * Used both for input and output.
102 *
103 * @start_gfn: Guest page number to start from.
104 * @count: Size of the result buffer.
105 * @flags: Control operation mode via KVM_S390_CMMA_* flags
106 * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty
107 * pages are still remaining.
108 * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set
109 * in the PGSTE.
110 * @values: Pointer to the values buffer.
111 *
112 * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls.
113 */
114struct kvm_s390_cmma_log {
115 __u64 start_gfn;
116 __u32 count;
117 __u32 flags;
118 union {
119 __u64 remaining;
120 __u64 mask;
121 };
122 __u64 values;
123};
124
fff02bc0
PB
125struct kvm_hyperv_exit {
126#define KVM_EXIT_HYPERV_SYNIC 1
b89485a5 127#define KVM_EXIT_HYPERV_HCALL 2
f76b348e 128#define KVM_EXIT_HYPERV_SYNDBG 3
fff02bc0 129 __u32 type;
f76b348e 130 __u32 pad1;
fff02bc0
PB
131 union {
132 struct {
133 __u32 msr;
f76b348e 134 __u32 pad2;
fff02bc0
PB
135 __u64 control;
136 __u64 evt_page;
137 __u64 msg_page;
138 } synic;
b89485a5
PB
139 struct {
140 __u64 input;
141 __u64 result;
142 __u64 params[2];
143 } hcall;
f76b348e
CH
144 struct {
145 __u32 msr;
146 __u32 pad2;
147 __u64 control;
148 __u64 status;
149 __u64 send_page;
150 __u64 recv_page;
151 __u64 pending_page;
152 } syndbg;
fff02bc0
PB
153 } u;
154};
155
278f064e
EH
156struct kvm_xen_exit {
157#define KVM_EXIT_XEN_HCALL 1
158 __u32 type;
159 union {
160 struct {
161 __u32 longmode;
162 __u32 cpl;
163 __u64 input;
164 __u64 result;
165 __u64 params[6];
166 } hcall;
167 } u;
168};
169
7a52ce8a
CH
170#define KVM_S390_GET_SKEYS_NONE 1
171#define KVM_S390_SKEYS_MAX 1048576
172
51b24e34
JK
173#define KVM_EXIT_UNKNOWN 0
174#define KVM_EXIT_EXCEPTION 1
175#define KVM_EXIT_IO 2
176#define KVM_EXIT_HYPERCALL 3
177#define KVM_EXIT_DEBUG 4
178#define KVM_EXIT_HLT 5
179#define KVM_EXIT_MMIO 6
180#define KVM_EXIT_IRQ_WINDOW_OPEN 7
181#define KVM_EXIT_SHUTDOWN 8
182#define KVM_EXIT_FAIL_ENTRY 9
183#define KVM_EXIT_INTR 10
184#define KVM_EXIT_SET_TPR 11
185#define KVM_EXIT_TPR_ACCESS 12
186#define KVM_EXIT_S390_SIEIC 13
187#define KVM_EXIT_S390_RESET 14
a9fd1654 188#define KVM_EXIT_DCR 15 /* deprecated */
51b24e34
JK
189#define KVM_EXIT_NMI 16
190#define KVM_EXIT_INTERNAL_ERROR 17
191#define KVM_EXIT_OSI 18
7c6da3de 192#define KVM_EXIT_PAPR_HCALL 19
1529ae1b 193#define KVM_EXIT_S390_UCONTROL 20
d4834ff9 194#define KVM_EXIT_WATCHDOG 21
d3dccee1
AG
195#define KVM_EXIT_S390_TSCH 22
196#define KVM_EXIT_EPR 23
b061808d 197#define KVM_EXIT_SYSTEM_EVENT 24
7a52ce8a 198#define KVM_EXIT_S390_STSI 25
3a824b15 199#define KVM_EXIT_IOAPIC_EOI 26
fff02bc0 200#define KVM_EXIT_HYPERV 27
2a886794 201#define KVM_EXIT_ARM_NISV 28
53ba2eee
MR
202#define KVM_EXIT_X86_RDMSR 29
203#define KVM_EXIT_X86_WRMSR 30
b3c818a4 204#define KVM_EXIT_DIRTY_RING_FULL 31
278f064e
EH
205#define KVM_EXIT_AP_RESET_HOLD 32
206#define KVM_EXIT_X86_BUS_LOCK 33
207#define KVM_EXIT_XEN 34
43709a0c 208#define KVM_EXIT_RISCV_SBI 35
d525f73f
CQ
209#define KVM_EXIT_RISCV_CSR 36
210#define KVM_EXIT_NOTIFY 37
efb91426 211#define KVM_EXIT_LOONGARCH_IOCSR 38
6a02465f 212#define KVM_EXIT_MEMORY_FAULT 39
51b24e34
JK
213
214/* For KVM_EXIT_INTERNAL_ERROR */
d4834ff9
AG
215/* Emulate instruction failed. */
216#define KVM_INTERNAL_ERROR_EMULATION 1
217/* Encounter unexpected simultaneous exceptions. */
218#define KVM_INTERNAL_ERROR_SIMUL_EX 2
219/* Encounter unexpected vm-exit due to delivery event. */
220#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
f363d039
EA
221/* Encounter unexpected vm-exit reason */
222#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
51b24e34 223
327d4b7f
BR
224/* Flags that describe what fields in emulation_failure hold valid data. */
225#define KVM_INTERNAL_ERROR_EMULATION_FLAG_INSTRUCTION_BYTES (1ULL << 0)
226
51b24e34
JK
227/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
228struct kvm_run {
229 /* in */
230 __u8 request_interrupt_window;
3a5eb5b4
PB
231 __u8 immediate_exit;
232 __u8 padding1[6];
51b24e34
JK
233
234 /* out */
235 __u32 exit_reason;
236 __u8 ready_for_interrupt_injection;
237 __u8 if_flag;
24a31426 238 __u16 flags;
51b24e34
JK
239
240 /* in (pre_kvm_run), out (post_kvm_run) */
241 __u64 cr8;
242 __u64 apic_base;
243
244#ifdef __KVM_S390
245 /* the processor status word for s390 */
246 __u64 psw_mask; /* psw upper half */
247 __u64 psw_addr; /* psw lower half */
248#endif
249 union {
250 /* KVM_EXIT_UNKNOWN */
251 struct {
252 __u64 hardware_exit_reason;
253 } hw;
254 /* KVM_EXIT_FAIL_ENTRY */
255 struct {
256 __u64 hardware_entry_failure_reason;
e6546342 257 __u32 cpu;
51b24e34
JK
258 } fail_entry;
259 /* KVM_EXIT_EXCEPTION */
260 struct {
261 __u32 exception;
262 __u32 error_code;
263 } ex;
264 /* KVM_EXIT_IO */
265 struct {
266#define KVM_EXIT_IO_IN 0
267#define KVM_EXIT_IO_OUT 1
268 __u8 direction;
269 __u8 size; /* bytes */
270 __u16 port;
271 __u32 count;
272 __u64 data_offset; /* relative to kvm_run start */
273 } io;
3a824b15 274 /* KVM_EXIT_DEBUG */
51b24e34
JK
275 struct {
276 struct kvm_debug_exit_arch arch;
277 } debug;
278 /* KVM_EXIT_MMIO */
279 struct {
280 __u64 phys_addr;
281 __u8 data[8];
282 __u32 len;
283 __u8 is_write;
284 } mmio;
efb91426
DHB
285 /* KVM_EXIT_LOONGARCH_IOCSR */
286 struct {
287 __u64 phys_addr;
288 __u8 data[8];
289 __u32 len;
290 __u8 is_write;
291 } iocsr_io;
51b24e34
JK
292 /* KVM_EXIT_HYPERCALL */
293 struct {
294 __u64 nr;
295 __u64 args[6];
296 __u64 ret;
d0bf492f
CLG
297
298 union {
299 __u32 longmode;
300 __u64 flags;
301 };
51b24e34
JK
302 } hypercall;
303 /* KVM_EXIT_TPR_ACCESS */
304 struct {
305 __u64 rip;
306 __u32 is_write;
307 __u32 pad;
308 } tpr_access;
309 /* KVM_EXIT_S390_SIEIC */
310 struct {
311 __u8 icptcode;
312 __u16 ipa;
313 __u32 ipb;
314 } s390_sieic;
315 /* KVM_EXIT_S390_RESET */
316#define KVM_S390_RESET_POR 1
317#define KVM_S390_RESET_CLEAR 2
318#define KVM_S390_RESET_SUBSYSTEM 4
319#define KVM_S390_RESET_CPU_INIT 8
320#define KVM_S390_RESET_IPL 16
321 __u64 s390_reset_flags;
1529ae1b
AG
322 /* KVM_EXIT_S390_UCONTROL */
323 struct {
324 __u64 trans_exc_code;
325 __u32 pgm_code;
326 } s390_ucontrol;
a9fd1654 327 /* KVM_EXIT_DCR (deprecated) */
51b24e34
JK
328 struct {
329 __u32 dcrn;
330 __u32 data;
331 __u8 is_write;
332 } dcr;
3a824b15 333 /* KVM_EXIT_INTERNAL_ERROR */
51b24e34
JK
334 struct {
335 __u32 suberror;
336 /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */
337 __u32 ndata;
338 __u64 data[16];
339 } internal;
327d4b7f
BR
340 /*
341 * KVM_INTERNAL_ERROR_EMULATION
342 *
343 * "struct emulation_failure" is an overlay of "struct internal"
344 * that is used for the KVM_INTERNAL_ERROR_EMULATION sub-type of
345 * KVM_EXIT_INTERNAL_ERROR. Note, unlike other internal error
346 * sub-types, this struct is ABI! It also needs to be backwards
347 * compatible with "struct internal". Take special care that
348 * "ndata" is correct, that new fields are enumerated in "flags",
349 * and that each flag enumerates fields that are 64-bit aligned
350 * and sized (so that ndata+internal.data[] is valid/accurate).
43709a0c
PB
351 *
352 * Space beyond the defined fields may be used to store arbitrary
353 * debug information relating to the emulation failure. It is
354 * accounted for in "ndata" but the format is unspecified and is
355 * not represented in "flags". Any such information is *not* ABI!
327d4b7f
BR
356 */
357 struct {
358 __u32 suberror;
359 __u32 ndata;
360 __u64 flags;
43709a0c
PB
361 union {
362 struct {
363 __u8 insn_size;
364 __u8 insn_bytes[15];
365 };
366 };
367 /* Arbitrary debug data may follow. */
327d4b7f 368 } emulation_failure;
51b24e34
JK
369 /* KVM_EXIT_OSI */
370 struct {
371 __u64 gprs[32];
372 } osi;
3a824b15 373 /* KVM_EXIT_PAPR_HCALL */
7c6da3de
AG
374 struct {
375 __u64 nr;
376 __u64 ret;
377 __u64 args[9];
378 } papr_hcall;
d3dccee1
AG
379 /* KVM_EXIT_S390_TSCH */
380 struct {
381 __u16 subchannel_id;
382 __u16 subchannel_nr;
383 __u32 io_int_parm;
384 __u32 io_int_word;
385 __u32 ipb;
386 __u8 dequeued;
387 } s390_tsch;
388 /* KVM_EXIT_EPR */
389 struct {
390 __u32 epr;
391 } epr;
b061808d
AG
392 /* KVM_EXIT_SYSTEM_EVENT */
393 struct {
394#define KVM_SYSTEM_EVENT_SHUTDOWN 1
395#define KVM_SYSTEM_EVENT_RESET 2
120758fb 396#define KVM_SYSTEM_EVENT_CRASH 3
d525f73f
CQ
397#define KVM_SYSTEM_EVENT_WAKEUP 4
398#define KVM_SYSTEM_EVENT_SUSPEND 5
399#define KVM_SYSTEM_EVENT_SEV_TERM 6
b061808d 400 __u32 type;
e4082063
AW
401 __u32 ndata;
402 union {
403 __u64 flags;
404 __u64 data[16];
405 };
b061808d 406 } system_event;
7a52ce8a
CH
407 /* KVM_EXIT_S390_STSI */
408 struct {
409 __u64 addr;
410 __u8 ar;
411 __u8 reserved;
412 __u8 fc;
413 __u8 sel1;
414 __u16 sel2;
415 } s390_stsi;
3a824b15
PB
416 /* KVM_EXIT_IOAPIC_EOI */
417 struct {
418 __u8 vector;
419 } eoi;
fff02bc0
PB
420 /* KVM_EXIT_HYPERV */
421 struct kvm_hyperv_exit hyperv;
2a886794
GK
422 /* KVM_EXIT_ARM_NISV */
423 struct {
424 __u64 esr_iss;
425 __u64 fault_ipa;
426 } arm_nisv;
53ba2eee
MR
427 /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */
428 struct {
429 __u8 error; /* user -> kernel */
430 __u8 pad[7];
431#define KVM_MSR_EXIT_REASON_INVAL (1 << 0)
432#define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1)
433#define KVM_MSR_EXIT_REASON_FILTER (1 << 2)
93d7620c
AH
434#define KVM_MSR_EXIT_REASON_VALID_MASK (KVM_MSR_EXIT_REASON_INVAL | \
435 KVM_MSR_EXIT_REASON_UNKNOWN | \
436 KVM_MSR_EXIT_REASON_FILTER)
53ba2eee
MR
437 __u32 reason; /* kernel -> user */
438 __u32 index; /* kernel -> user */
439 __u64 data; /* kernel <-> user */
440 } msr;
278f064e
EH
441 /* KVM_EXIT_XEN */
442 struct kvm_xen_exit xen;
43709a0c
PB
443 /* KVM_EXIT_RISCV_SBI */
444 struct {
445 unsigned long extension_id;
446 unsigned long function_id;
447 unsigned long args[6];
448 unsigned long ret[2];
449 } riscv_sbi;
d525f73f
CQ
450 /* KVM_EXIT_RISCV_CSR */
451 struct {
452 unsigned long csr_num;
453 unsigned long new_value;
454 unsigned long write_mask;
455 unsigned long ret_value;
456 } riscv_csr;
457 /* KVM_EXIT_NOTIFY */
458 struct {
459#define KVM_NOTIFY_CONTEXT_INVALID (1 << 0)
460 __u32 flags;
461 } notify;
6a02465f
DHB
462 /* KVM_EXIT_MEMORY_FAULT */
463 struct {
464#define KVM_MEMORY_EXIT_FLAG_PRIVATE (1ULL << 3)
465 __u64 flags;
466 __u64 gpa;
467 __u64 size;
468 } memory_fault;
51b24e34
JK
469 /* Fix the size of the union. */
470 char padding[256];
471 };
1529ae1b 472
65a6d8dd
PM
473 /* 2048 is the size of the char array used to bound/pad the size
474 * of the union that holds sync regs.
475 */
476 #define SYNC_REGS_SIZE_BYTES 2048
1529ae1b
AG
477 /*
478 * shared registers between kvm and userspace.
479 * kvm_valid_regs specifies the register classes set by the host
480 * kvm_dirty_regs specified the register classes dirtied by userspace
481 * struct kvm_sync_regs is architecture specific, as well as the
482 * bits for kvm_valid_regs and kvm_dirty_regs
483 */
484 __u64 kvm_valid_regs;
485 __u64 kvm_dirty_regs;
486 union {
487 struct kvm_sync_regs regs;
65a6d8dd 488 char padding[SYNC_REGS_SIZE_BYTES];
1529ae1b 489 } s;
51b24e34
JK
490};
491
492/* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */
493
494struct kvm_coalesced_mmio_zone {
495 __u64 addr;
496 __u32 size;
966f2ec3
PB
497 union {
498 __u32 pad;
499 __u32 pio;
500 };
51b24e34
JK
501};
502
503struct kvm_coalesced_mmio {
504 __u64 phys_addr;
505 __u32 len;
966f2ec3
PB
506 union {
507 __u32 pad;
508 __u32 pio;
509 };
51b24e34
JK
510 __u8 data[8];
511};
512
513struct kvm_coalesced_mmio_ring {
514 __u32 first, last;
d525f73f 515 struct kvm_coalesced_mmio coalesced_mmio[];
51b24e34
JK
516};
517
518#define KVM_COALESCED_MMIO_MAX \
519 ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \
520 sizeof(struct kvm_coalesced_mmio))
521
522/* for KVM_TRANSLATE */
523struct kvm_translation {
524 /* in */
525 __u64 linear_address;
526
527 /* out */
528 __u64 physical_address;
529 __u8 valid;
530 __u8 writeable;
531 __u8 usermode;
532 __u8 pad[5];
533};
534
7a52ce8a
CH
535/* for KVM_S390_MEM_OP */
536struct kvm_s390_mem_op {
537 /* in */
538 __u64 gaddr; /* the guest address */
539 __u64 flags; /* flags */
540 __u32 size; /* amount of bytes */
541 __u32 op; /* type of operation */
542 __u64 buf; /* buffer in userspace */
dc6f8d45 543 union {
e4082063
AW
544 struct {
545 __u8 ar; /* the access register number */
546 __u8 key; /* access key, ignored if flag unset */
c5c0fdbe
DDT
547 __u8 pad1[6]; /* ignored */
548 __u64 old_addr; /* ignored if cmpxchg flag unset */
e4082063 549 };
dc6f8d45 550 __u32 sida_offset; /* offset into the sida */
e4082063 551 __u8 reserved[32]; /* ignored */
dc6f8d45 552 };
7a52ce8a
CH
553};
554/* types for kvm_s390_mem_op->op */
555#define KVM_S390_MEMOP_LOGICAL_READ 0
556#define KVM_S390_MEMOP_LOGICAL_WRITE 1
dc6f8d45
CH
557#define KVM_S390_MEMOP_SIDA_READ 2
558#define KVM_S390_MEMOP_SIDA_WRITE 3
e4082063
AW
559#define KVM_S390_MEMOP_ABSOLUTE_READ 4
560#define KVM_S390_MEMOP_ABSOLUTE_WRITE 5
c5c0fdbe
DDT
561#define KVM_S390_MEMOP_ABSOLUTE_CMPXCHG 6
562
7a52ce8a
CH
563/* flags for kvm_s390_mem_op->flags */
564#define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0)
565#define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1)
e4082063 566#define KVM_S390_MEMOP_F_SKEY_PROTECTION (1ULL << 2)
7a52ce8a 567
c5c0fdbe
DDT
568/* flags specifying extension support via KVM_CAP_S390_MEM_OP_EXTENSION */
569#define KVM_S390_MEMOP_EXTENSION_CAP_BASE (1 << 0)
570#define KVM_S390_MEMOP_EXTENSION_CAP_CMPXCHG (1 << 1)
571
51b24e34
JK
572/* for KVM_INTERRUPT */
573struct kvm_interrupt {
574 /* in */
575 __u32 irq;
576};
577
578/* for KVM_GET_DIRTY_LOG */
579struct kvm_dirty_log {
580 __u32 slot;
581 __u32 padding1;
582 union {
583 void *dirty_bitmap; /* one bit per page */
584 __u64 padding2;
585 };
586};
587
da054c64
PB
588/* for KVM_CLEAR_DIRTY_LOG */
589struct kvm_clear_dirty_log {
590 __u32 slot;
591 __u32 num_pages;
592 __u64 first_page;
593 union {
594 void *dirty_bitmap; /* one bit per page */
595 __u64 padding2;
596 };
597};
598
51b24e34
JK
599/* for KVM_SET_SIGNAL_MASK */
600struct kvm_signal_mask {
601 __u32 len;
d525f73f 602 __u8 sigset[];
51b24e34
JK
603};
604
605/* for KVM_TPR_ACCESS_REPORTING */
606struct kvm_tpr_access_ctl {
607 __u32 enabled;
608 __u32 flags;
609 __u32 reserved[8];
610};
611
612/* for KVM_SET_VAPIC_ADDR */
613struct kvm_vapic_addr {
614 __u64 vapic_addr;
615};
616
a9fd1654 617/* for KVM_SET_MP_STATE */
51b24e34 618
a9fd1654 619/* not all states are valid on all architectures */
51b24e34
JK
620#define KVM_MP_STATE_RUNNABLE 0
621#define KVM_MP_STATE_UNINITIALIZED 1
622#define KVM_MP_STATE_INIT_RECEIVED 2
623#define KVM_MP_STATE_HALTED 3
624#define KVM_MP_STATE_SIPI_RECEIVED 4
a9fd1654
JF
625#define KVM_MP_STATE_STOPPED 5
626#define KVM_MP_STATE_CHECK_STOP 6
627#define KVM_MP_STATE_OPERATING 7
628#define KVM_MP_STATE_LOAD 8
278f064e 629#define KVM_MP_STATE_AP_RESET_HOLD 9
d525f73f 630#define KVM_MP_STATE_SUSPENDED 10
51b24e34
JK
631
632struct kvm_mp_state {
633 __u32 mp_state;
634};
635
636struct kvm_s390_psw {
637 __u64 mask;
638 __u64 addr;
639};
640
641/* valid values for type in kvm_s390_interrupt */
642#define KVM_S390_SIGP_STOP 0xfffe0000u
643#define KVM_S390_PROGRAM_INT 0xfffe0001u
644#define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u
645#define KVM_S390_RESTART 0xfffe0003u
216db403
CB
646#define KVM_S390_INT_PFAULT_INIT 0xfffe0004u
647#define KVM_S390_INT_PFAULT_DONE 0xfffe0005u
d3dccee1 648#define KVM_S390_MCHK 0xfffe1000u
76eb98d5
JF
649#define KVM_S390_INT_CLOCK_COMP 0xffff1004u
650#define KVM_S390_INT_CPU_TIMER 0xffff1005u
51b24e34
JK
651#define KVM_S390_INT_VIRTIO 0xffff2603u
652#define KVM_S390_INT_SERVICE 0xffff2401u
653#define KVM_S390_INT_EMERGENCY 0xffff1201u
1529ae1b 654#define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u
d3dccee1
AG
655/* Anything below 0xfffe0000u is taken by INT_IO */
656#define KVM_S390_INT_IO(ai,cssid,ssid,schid) \
657 (((schid)) | \
658 ((ssid) << 16) | \
659 ((cssid) << 18) | \
660 ((ai) << 26))
661#define KVM_S390_INT_IO_MIN 0x00000000u
662#define KVM_S390_INT_IO_MAX 0xfffdffffu
120758fb 663#define KVM_S390_INT_IO_AI_MASK 0x04000000u
d3dccee1 664
51b24e34
JK
665
666struct kvm_s390_interrupt {
667 __u32 type;
668 __u32 parm;
669 __u64 parm64;
670};
671
216db403
CB
672struct kvm_s390_io_info {
673 __u16 subchannel_id;
674 __u16 subchannel_nr;
675 __u32 io_int_parm;
676 __u32 io_int_word;
677};
678
679struct kvm_s390_ext_info {
680 __u32 ext_params;
681 __u32 pad;
682 __u64 ext_params2;
683};
684
685struct kvm_s390_pgm_info {
686 __u64 trans_exc_code;
687 __u64 mon_code;
688 __u64 per_address;
689 __u32 data_exc_code;
690 __u16 code;
691 __u16 mon_class_nr;
692 __u8 per_code;
693 __u8 per_atmid;
694 __u8 exc_access_id;
695 __u8 per_access_id;
696 __u8 op_access_id;
66fb2d54
CH
697#define KVM_S390_PGM_FLAGS_ILC_VALID 0x01
698#define KVM_S390_PGM_FLAGS_ILC_0 0x02
699#define KVM_S390_PGM_FLAGS_ILC_1 0x04
700#define KVM_S390_PGM_FLAGS_ILC_MASK 0x06
701#define KVM_S390_PGM_FLAGS_NO_REWIND 0x08
702 __u8 flags;
703 __u8 pad[2];
216db403
CB
704};
705
706struct kvm_s390_prefix_info {
707 __u32 address;
708};
709
710struct kvm_s390_extcall_info {
711 __u16 code;
712};
713
714struct kvm_s390_emerg_info {
715 __u16 code;
716};
717
51628b18
CB
718#define KVM_S390_STOP_FLAG_STORE_STATUS 0x01
719struct kvm_s390_stop_info {
720 __u32 flags;
721};
722
216db403
CB
723struct kvm_s390_mchk_info {
724 __u64 cr14;
725 __u64 mcic;
726 __u64 failing_storage_address;
727 __u32 ext_damage_code;
728 __u32 pad;
729 __u8 fixed_logout[16];
730};
731
732struct kvm_s390_irq {
733 __u64 type;
734 union {
735 struct kvm_s390_io_info io;
736 struct kvm_s390_ext_info ext;
737 struct kvm_s390_pgm_info pgm;
738 struct kvm_s390_emerg_info emerg;
739 struct kvm_s390_extcall_info extcall;
740 struct kvm_s390_prefix_info prefix;
51628b18 741 struct kvm_s390_stop_info stop;
216db403
CB
742 struct kvm_s390_mchk_info mchk;
743 char reserved[64];
744 } u;
745};
746
7a52ce8a
CH
747struct kvm_s390_irq_state {
748 __u64 buf;
9cbb6362 749 __u32 flags; /* will stay unused for compatibility reasons */
7a52ce8a 750 __u32 len;
9cbb6362 751 __u32 reserved[4]; /* will stay unused for compatibility reasons */
7a52ce8a
CH
752};
753
51b24e34
JK
754/* for KVM_SET_GUEST_DEBUG */
755
756#define KVM_GUESTDBG_ENABLE 0x00000001
757#define KVM_GUESTDBG_SINGLESTEP 0x00000002
758
759struct kvm_guest_debug {
760 __u32 control;
761 __u32 pad;
762 struct kvm_guest_debug_arch arch;
763};
764
765enum {
766 kvm_ioeventfd_flag_nr_datamatch,
767 kvm_ioeventfd_flag_nr_pio,
768 kvm_ioeventfd_flag_nr_deassign,
cae7f586 769 kvm_ioeventfd_flag_nr_virtio_ccw_notify,
76eb98d5 770 kvm_ioeventfd_flag_nr_fast_mmio,
51b24e34
JK
771 kvm_ioeventfd_flag_nr_max,
772};
773
774#define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch)
775#define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio)
776#define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign)
cae7f586
AG
777#define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \
778 (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify)
51b24e34
JK
779
780#define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1)
781
782struct kvm_ioeventfd {
783 __u64 datamatch;
784 __u64 addr; /* legal pio/mmio address */
76eb98d5 785 __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */
51b24e34
JK
786 __s32 fd;
787 __u32 flags;
788 __u8 pad[36];
789};
790
65a6d8dd 791#define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
77d361b1 792#define KVM_X86_DISABLE_EXITS_HLT (1 << 1)
65a6d8dd 793#define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2)
d38d201f 794#define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3)
65a6d8dd 795#define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \
77d361b1 796 KVM_X86_DISABLE_EXITS_HLT | \
d38d201f
WL
797 KVM_X86_DISABLE_EXITS_PAUSE | \
798 KVM_X86_DISABLE_EXITS_CSTATE)
65a6d8dd 799
51b24e34
JK
800/* for KVM_ENABLE_CAP */
801struct kvm_enable_cap {
802 /* in */
803 __u32 cap;
804 __u32 flags;
805 __u64 args[4];
806 __u8 pad[64];
807};
808
809/* for KVM_PPC_GET_PVINFO */
3a5eb5b4
PB
810
811#define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
812
51b24e34
JK
813struct kvm_ppc_pvinfo {
814 /* out */
815 __u32 flags;
816 __u32 hcall[4];
817 __u8 pad[108];
818};
819
80a3eb10
JK
820/* for KVM_PPC_GET_SMMU_INFO */
821#define KVM_PPC_PAGE_SIZES_MAX_SZ 8
822
823struct kvm_ppc_one_page_size {
824 __u32 page_shift; /* Page shift (or 0) */
825 __u32 pte_enc; /* Encoding in the HPTE (>>12) */
826};
827
828struct kvm_ppc_one_seg_page_size {
829 __u32 page_shift; /* Base page shift of segment (or 0) */
830 __u32 slb_enc; /* SLB encoding for BookS */
831 struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ];
832};
833
834#define KVM_PPC_PAGE_SIZES_REAL 0x00000001
835#define KVM_PPC_1T_SEGMENTS 0x00000002
966f2ec3 836#define KVM_PPC_NO_HASH 0x00000004
80a3eb10
JK
837
838struct kvm_ppc_smmu_info {
839 __u64 flags;
840 __u32 slb_size;
d4083f50
AP
841 __u16 data_keys; /* # storage keys supported for data */
842 __u16 instr_keys; /* # storage keys supported for instructions */
80a3eb10
JK
843 struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ];
844};
845
3a5eb5b4
PB
846/* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */
847struct kvm_ppc_resize_hpt {
848 __u64 flags;
849 __u32 shift;
850 __u32 pad;
851};
d4834ff9 852
51b24e34
JK
853#define KVMIO 0xAE
854
1529ae1b
AG
855/* machine type bits, to be used as argument to KVM_CREATE_VM */
856#define KVM_VM_S390_UCONTROL 1
857
bf63839f
AW
858/* on ppc, 0 indicate default, 1 should force HV and 2 PR */
859#define KVM_VM_PPC_HV 1
860#define KVM_VM_PPC_PR 2
861
94c7fefc
AJ
862/* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */
863#define KVM_VM_MIPS_AUTO 0
74c98e20 864#define KVM_VM_MIPS_VZ 1
94c7fefc 865#define KVM_VM_MIPS_TE 2
74c98e20 866
1529ae1b
AG
867#define KVM_S390_SIE_PAGE_OFFSET 1
868
da054c64
PB
869/*
870 * On arm64, machine type can be used to request the physical
871 * address size for the VM. Bits[7-0] are reserved for the guest
872 * PA size shift (i.e, log2(PA_Size)). For backward compatibility,
873 * value 0 implies the default IPA size, 40bits.
874 */
875#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL
876#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \
877 ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK)
51b24e34
JK
878/*
879 * ioctls for /dev/kvm fds:
880 */
881#define KVM_GET_API_VERSION _IO(KVMIO, 0x00)
882#define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */
883#define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list)
884
885#define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06)
886/*
887 * Check if a kvm extension is available. Argument is extension number,
888 * return is 1 (yes) or 0 (no, sorry).
889 */
890#define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03)
891/*
892 * Get size for mmap(vcpu_fd)
893 */
894#define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */
895#define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2)
bf63839f 896#define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2)
9f2d175d 897#define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list)
51b24e34
JK
898
899/*
900 * Extension capability list.
901 */
902#define KVM_CAP_IRQCHIP 0
903#define KVM_CAP_HLT 1
904#define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2
905#define KVM_CAP_USER_MEMORY 3
906#define KVM_CAP_SET_TSS_ADDR 4
907#define KVM_CAP_VAPIC 6
908#define KVM_CAP_EXT_CPUID 7
909#define KVM_CAP_CLOCKSOURCE 8
7c6da3de 910#define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */
51b24e34
JK
911#define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */
912#define KVM_CAP_PIT 11
913#define KVM_CAP_NOP_IO_DELAY 12
914#define KVM_CAP_PV_MMU 13
915#define KVM_CAP_MP_STATE 14
916#define KVM_CAP_COALESCED_MMIO 15
917#define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */
51b24e34 918#define KVM_CAP_IOMMU 18
51b24e34
JK
919/* Bug in KVM_SET_USER_MEMORY_REGION fixed: */
920#define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21
51b24e34 921#define KVM_CAP_USER_NMI 22
51b24e34
JK
922#ifdef __KVM_HAVE_GUEST_DEBUG
923#define KVM_CAP_SET_GUEST_DEBUG 23
924#endif
925#ifdef __KVM_HAVE_PIT
926#define KVM_CAP_REINJECT_CONTROL 24
927#endif
51b24e34 928#define KVM_CAP_IRQ_ROUTING 25
51b24e34 929#define KVM_CAP_IRQ_INJECT_STATUS 26
51b24e34
JK
930#define KVM_CAP_ASSIGN_DEV_IRQ 29
931/* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */
932#define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30
933#ifdef __KVM_HAVE_MCE
934#define KVM_CAP_MCE 31
935#endif
936#define KVM_CAP_IRQFD 32
937#ifdef __KVM_HAVE_PIT
938#define KVM_CAP_PIT2 33
939#endif
940#define KVM_CAP_SET_BOOT_CPU_ID 34
941#ifdef __KVM_HAVE_PIT_STATE2
942#define KVM_CAP_PIT_STATE2 35
943#endif
944#define KVM_CAP_IOEVENTFD 36
945#define KVM_CAP_SET_IDENTITY_MAP_ADDR 37
946#ifdef __KVM_HAVE_XEN_HVM
947#define KVM_CAP_XEN_HVM 38
948#endif
949#define KVM_CAP_ADJUST_CLOCK 39
950#define KVM_CAP_INTERNAL_ERROR_DATA 40
951#ifdef __KVM_HAVE_VCPU_EVENTS
952#define KVM_CAP_VCPU_EVENTS 41
953#endif
954#define KVM_CAP_S390_PSW 42
955#define KVM_CAP_PPC_SEGSTATE 43
956#define KVM_CAP_HYPERV 44
957#define KVM_CAP_HYPERV_VAPIC 45
958#define KVM_CAP_HYPERV_SPIN 46
959#define KVM_CAP_PCI_SEGMENT 47
960#define KVM_CAP_PPC_PAIRED_SINGLES 48
961#define KVM_CAP_INTR_SHADOW 49
962#ifdef __KVM_HAVE_DEBUGREGS
963#define KVM_CAP_DEBUGREGS 50
964#endif
965#define KVM_CAP_X86_ROBUST_SINGLESTEP 51
966#define KVM_CAP_PPC_OSI 52
967#define KVM_CAP_PPC_UNSET_IRQ 53
968#define KVM_CAP_ENABLE_CAP 54
969#ifdef __KVM_HAVE_XSAVE
970#define KVM_CAP_XSAVE 55
971#endif
972#ifdef __KVM_HAVE_XCRS
973#define KVM_CAP_XCRS 56
974#endif
975#define KVM_CAP_PPC_GET_PVINFO 57
976#define KVM_CAP_PPC_IRQ_LEVEL 58
977#define KVM_CAP_ASYNC_PF 59
978#define KVM_CAP_TSC_CONTROL 60
979#define KVM_CAP_GET_TSC_KHZ 61
980#define KVM_CAP_PPC_BOOKE_SREGS 62
7c6da3de
AG
981#define KVM_CAP_SPAPR_TCE 63
982#define KVM_CAP_PPC_SMT 64
983#define KVM_CAP_PPC_RMA 65
984#define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */
9d4e4f8c 985#define KVM_CAP_PPC_HIOR 67
7c6da3de 986#define KVM_CAP_PPC_PAPR 68
a54fc080 987#define KVM_CAP_SW_TLB 69
9d4e4f8c 988#define KVM_CAP_ONE_REG 70
1529ae1b
AG
989#define KVM_CAP_S390_GMAP 71
990#define KVM_CAP_TSC_DEADLINE_TIMER 72
991#define KVM_CAP_S390_UCONTROL 73
992#define KVM_CAP_SYNC_REGS 74
9ab2195d
MT
993#define KVM_CAP_PCI_2_3 75
994#define KVM_CAP_KVMCLOCK_CTRL 76
80a3eb10
JK
995#define KVM_CAP_SIGNAL_MSI 77
996#define KVM_CAP_PPC_GET_SMMU_INFO 78
2a60dba4 997#define KVM_CAP_S390_COW 79
651682dc 998#define KVM_CAP_PPC_ALLOC_HTAB 80
716b8e4d 999#define KVM_CAP_READONLY_MEM 81
716b8e4d 1000#define KVM_CAP_IRQFD_RESAMPLE 82
d4834ff9
AG
1001#define KVM_CAP_PPC_BOOKE_WATCHDOG 83
1002#define KVM_CAP_PPC_HTAB_FD 84
d3dccee1
AG
1003#define KVM_CAP_S390_CSS_SUPPORT 85
1004#define KVM_CAP_PPC_EPR 86
eadd0e44
PM
1005#define KVM_CAP_ARM_PSCI 87
1006#define KVM_CAP_ARM_SET_DEVICE_ADDR 88
e098b453
AK
1007#define KVM_CAP_DEVICE_CTRL 89
1008#define KVM_CAP_IRQ_MPIC 90
1009#define KVM_CAP_PPC_RTAS 91
1010#define KVM_CAP_IRQ_XICS 92
c5daeae1 1011#define KVM_CAP_ARM_EL1_32BIT 93
4f265607 1012#define KVM_CAP_SPAPR_MULTITCE 94
bf63839f 1013#define KVM_CAP_EXT_EMUL_CPUID 95
48a5f3bc 1014#define KVM_CAP_HYPERV_TIME 96
9ffd2685
CH
1015#define KVM_CAP_IOAPIC_POLARITY_IGNORED 97
1016#define KVM_CAP_ENABLE_CAP_VM 98
1017#define KVM_CAP_S390_IRQCHIP 99
76eb98d5
JF
1018#define KVM_CAP_IOEVENTFD_NO_LENGTH 100
1019#define KVM_CAP_VM_ATTRIBUTES 101
b061808d
AG
1020#define KVM_CAP_ARM_PSCI_0_2 102
1021#define KVM_CAP_PPC_FIXUP_HCALL 103
a9fd1654
JF
1022#define KVM_CAP_PPC_ENABLE_HCALL 104
1023#define KVM_CAP_CHECK_EXTENSION_VM 105
51628b18 1024#define KVM_CAP_S390_USER_SIGP 106
7a52ce8a
CH
1025#define KVM_CAP_S390_VECTOR_REGISTERS 107
1026#define KVM_CAP_S390_MEM_OP 108
1027#define KVM_CAP_S390_USER_STSI 109
1028#define KVM_CAP_S390_SKEYS 110
1029#define KVM_CAP_MIPS_FPU 111
1030#define KVM_CAP_MIPS_MSA 112
1031#define KVM_CAP_S390_INJECT_IRQ 113
1032#define KVM_CAP_S390_IRQ_STATE 114
1033#define KVM_CAP_PPC_HWRNG 115
24a31426
PB
1034#define KVM_CAP_DISABLE_QUIRKS 116
1035#define KVM_CAP_X86_SMM 117
1036#define KVM_CAP_MULTI_ADDRESS_SPACE 118
3a824b15
PB
1037#define KVM_CAP_GUEST_DEBUG_HW_BPS 119
1038#define KVM_CAP_GUEST_DEBUG_HW_WPS 120
1039#define KVM_CAP_SPLIT_IRQCHIP 121
1040#define KVM_CAP_IOEVENTFD_ANY_LENGTH 122
fff02bc0 1041#define KVM_CAP_HYPERV_SYNIC 123
66fb2d54 1042#define KVM_CAP_S390_RI 124
b89485a5
PB
1043#define KVM_CAP_SPAPR_TCE_64 125
1044#define KVM_CAP_ARM_PMU_V3 126
1045#define KVM_CAP_VCPU_ATTRIBUTES 127
ff804f15 1046#define KVM_CAP_MAX_VCPU_ID 128
dbdfea92
CH
1047#define KVM_CAP_X2APIC_API 129
1048#define KVM_CAP_S390_USER_INSTR0 130
1049#define KVM_CAP_MSI_DEVID 131
1050#define KVM_CAP_PPC_HTM 132
3a5eb5b4
PB
1051#define KVM_CAP_SPAPR_RESIZE_HPT 133
1052#define KVM_CAP_PPC_MMU_RADIX 134
1053#define KVM_CAP_PPC_MMU_HASH_V3 135
1054#define KVM_CAP_IMMEDIATE_EXIT 136
74c98e20
CH
1055#define KVM_CAP_MIPS_VZ 137
1056#define KVM_CAP_MIPS_TE 138
1057#define KVM_CAP_MIPS_64BIT 139
1058#define KVM_CAP_S390_GS 140
1059#define KVM_CAP_S390_AIS 141
1060#define KVM_CAP_SPAPR_TCE_VFIO 142
65a6d8dd 1061#define KVM_CAP_X86_DISABLE_EXITS 143
74c98e20 1062#define KVM_CAP_ARM_USER_IRQ 144
3272f0e2
CB
1063#define KVM_CAP_S390_CMMA_MIGRATION 145
1064#define KVM_CAP_PPC_FWNMI 146
1065#define KVM_CAP_PPC_SMT_POSSIBLE 147
ab6e1550
CB
1066#define KVM_CAP_HYPERV_SYNIC2 148
1067#define KVM_CAP_HYPERV_VP_INDEX 149
dd873966 1068#define KVM_CAP_S390_AIS_MIGRATION 150
9cbb6362
CH
1069#define KVM_CAP_PPC_GET_CPU_CHAR 151
1070#define KVM_CAP_S390_BPB 152
9f2d175d 1071#define KVM_CAP_GET_MSR_FEATURES 153
65a6d8dd 1072#define KVM_CAP_HYPERV_EVENTFD 154
77d361b1 1073#define KVM_CAP_HYPERV_TLBFLUSH 155
d36f7de8
CH
1074#define KVM_CAP_S390_HPAGE_1M 156
1075#define KVM_CAP_NESTED_STATE 157
8f3cd250
CH
1076#define KVM_CAP_ARM_INJECT_SERROR_ESR 158
1077#define KVM_CAP_MSR_PLATFORM_INFO 159
966f2ec3
PB
1078#define KVM_CAP_PPC_NESTED_HV 160
1079#define KVM_CAP_HYPERV_SEND_IPI 161
1080#define KVM_CAP_COALESCED_PIO 162
1081#define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163
1082#define KVM_CAP_EXCEPTION_PAYLOAD 164
da054c64 1083#define KVM_CAP_ARM_VM_IPA_SIZE 165
d9cb4336 1084#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */
da054c64 1085#define KVM_CAP_HYPERV_CPUID 167
d9cb4336
CH
1086#define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168
1087#define KVM_CAP_PPC_IRQ_XIVE 169
1088#define KVM_CAP_ARM_SVE 170
1089#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
1090#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
f363d039
EA
1091#define KVM_CAP_PMU_EVENT_FILTER 173
1092#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
1093#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
2a886794
GK
1094#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176
1095#define KVM_CAP_ARM_NISV_TO_USER 177
1096#define KVM_CAP_ARM_INJECT_EXT_DABT 178
ddda3748 1097#define KVM_CAP_S390_VCPU_RESETS 179
dc6f8d45
CH
1098#define KVM_CAP_S390_PROTECTED 180
1099#define KVM_CAP_PPC_SECURE_GUEST 181
f76b348e
CH
1100#define KVM_CAP_HALT_POLL 182
1101#define KVM_CAP_ASYNC_PF_INT 183
e6546342
JW
1102#define KVM_CAP_LAST_CPU 184
1103#define KVM_CAP_SMALLER_MAXPHYADDR 185
1104#define KVM_CAP_S390_DIAG318 186
94c7fefc 1105#define KVM_CAP_STEAL_TIME 187
53ba2eee
MR
1106#define KVM_CAP_X86_USER_SPACE_MSR 188
1107#define KVM_CAP_X86_MSR_FILTER 189
1108#define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190
b3c818a4
EF
1109#define KVM_CAP_SYS_HYPERV_CPUID 191
1110#define KVM_CAP_DIRTY_LOG_RING 192
278f064e
EH
1111#define KVM_CAP_X86_BUS_LOCK_EXIT 193
1112#define KVM_CAP_PPC_DAWR1 194
1113#define KVM_CAP_SET_GUEST_DEBUG2 195
1114#define KVM_CAP_SGX_ATTRIBUTE 196
1115#define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197
1116#define KVM_CAP_PTP_KVM 198
327d4b7f
BR
1117#define KVM_CAP_HYPERV_ENFORCE_CPUID 199
1118#define KVM_CAP_SREGS2 200
1119#define KVM_CAP_EXIT_HYPERCALL 201
1120#define KVM_CAP_PPC_RPT_INVALIDATE 202
1121#define KVM_CAP_BINARY_STATS_FD 203
1122#define KVM_CAP_EXIT_ON_EMULATION_FAILURE 204
1123#define KVM_CAP_ARM_MTE 205
ef17dd6a
VG
1124#define KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM 206
1125#define KVM_CAP_VM_GPA_BITS 207
1126#define KVM_CAP_XSAVE2 208
1ea5208f 1127#define KVM_CAP_SYS_ATTRIBUTES 209
e4082063
AW
1128#define KVM_CAP_PPC_AIL_MODE_3 210
1129#define KVM_CAP_S390_MEM_OP_EXTENSION 211
1130#define KVM_CAP_PMU_CAPABILITY 212
1131#define KVM_CAP_DISABLE_QUIRKS2 213
d525f73f 1132#define KVM_CAP_VM_TSC_CONTROL 214
e4082063 1133#define KVM_CAP_SYSTEM_EVENT_DATA 215
d525f73f
CQ
1134#define KVM_CAP_ARM_SYSTEM_SUSPEND 216
1135#define KVM_CAP_S390_PROTECTED_DUMP 217
1136#define KVM_CAP_X86_TRIPLE_FAULT_EVENT 218
1137#define KVM_CAP_X86_NOTIFY_VMEXIT 219
1138#define KVM_CAP_VM_DISABLE_NX_HUGE_PAGES 220
1139#define KVM_CAP_S390_ZPCI_OP 221
1140#define KVM_CAP_S390_CPU_TOPOLOGY 222
93e0932b 1141#define KVM_CAP_DIRTY_LOG_RING_ACQ_REL 223
93d7620c
AH
1142#define KVM_CAP_S390_PROTECTED_ASYNC_DISABLE 224
1143#define KVM_CAP_DIRTY_LOG_RING_WITH_BITMAP 225
c5c0fdbe 1144#define KVM_CAP_PMU_EVENT_MASKED_EVENTS 226
d0bf492f
CLG
1145#define KVM_CAP_COUNTER_OFFSET 227
1146#define KVM_CAP_ARM_EAGER_SPLIT_CHUNK_SIZE 228
1147#define KVM_CAP_ARM_SUPPORTED_BLOCK_SIZES 229
efb91426 1148#define KVM_CAP_ARM_SUPPORTED_REG_MASK_RANGES 230
6a02465f
DHB
1149#define KVM_CAP_USER_MEMORY2 231
1150#define KVM_CAP_MEMORY_FAULT_INFO 232
1151#define KVM_CAP_MEMORY_ATTRIBUTES 233
1152#define KVM_CAP_GUEST_MEMFD 234
1153#define KVM_CAP_VM_TYPES 235
51b24e34
JK
1154
1155#ifdef KVM_CAP_IRQ_ROUTING
1156
1157struct kvm_irq_routing_irqchip {
1158 __u32 irqchip;
1159 __u32 pin;
1160};
1161
1162struct kvm_irq_routing_msi {
1163 __u32 address_lo;
1164 __u32 address_hi;
1165 __u32 data;
dbdfea92
CH
1166 union {
1167 __u32 pad;
1168 __u32 devid;
1169 };
51b24e34
JK
1170};
1171
9ffd2685
CH
1172struct kvm_irq_routing_s390_adapter {
1173 __u64 ind_addr;
1174 __u64 summary_addr;
1175 __u64 ind_offset;
1176 __u32 summary_offset;
1177 __u32 adapter_id;
1178};
1179
fff02bc0
PB
1180struct kvm_irq_routing_hv_sint {
1181 __u32 vcpu;
1182 __u32 sint;
1183};
1184
ef17dd6a
VG
1185struct kvm_irq_routing_xen_evtchn {
1186 __u32 port;
1187 __u32 vcpu;
1188 __u32 priority;
1189};
1190
1191#define KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL ((__u32)(-1))
1192
51b24e34
JK
1193/* gsi routing entry types */
1194#define KVM_IRQ_ROUTING_IRQCHIP 1
1195#define KVM_IRQ_ROUTING_MSI 2
9ffd2685 1196#define KVM_IRQ_ROUTING_S390_ADAPTER 3
fff02bc0 1197#define KVM_IRQ_ROUTING_HV_SINT 4
ef17dd6a 1198#define KVM_IRQ_ROUTING_XEN_EVTCHN 5
51b24e34
JK
1199
1200struct kvm_irq_routing_entry {
1201 __u32 gsi;
1202 __u32 type;
1203 __u32 flags;
1204 __u32 pad;
1205 union {
1206 struct kvm_irq_routing_irqchip irqchip;
1207 struct kvm_irq_routing_msi msi;
9ffd2685 1208 struct kvm_irq_routing_s390_adapter adapter;
fff02bc0 1209 struct kvm_irq_routing_hv_sint hv_sint;
ef17dd6a 1210 struct kvm_irq_routing_xen_evtchn xen_evtchn;
51b24e34
JK
1211 __u32 pad[8];
1212 } u;
1213};
1214
1215struct kvm_irq_routing {
1216 __u32 nr;
1217 __u32 flags;
d525f73f 1218 struct kvm_irq_routing_entry entries[];
51b24e34
JK
1219};
1220
1221#endif
1222
1223#ifdef KVM_CAP_MCE
1224/* x86 MCE */
1225struct kvm_x86_mce {
1226 __u64 status;
1227 __u64 addr;
1228 __u64 misc;
1229 __u64 mcg_status;
1230 __u8 bank;
1231 __u8 pad1[7];
1232 __u64 pad2[3];
1233};
1234#endif
1235
1236#ifdef KVM_CAP_XEN_HVM
278f064e
EH
1237#define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0)
1238#define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1)
1239#define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2)
1240#define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3)
ef17dd6a 1241#define KVM_XEN_HVM_CONFIG_EVTCHN_2LEVEL (1 << 4)
d525f73f 1242#define KVM_XEN_HVM_CONFIG_EVTCHN_SEND (1 << 5)
93d7620c 1243#define KVM_XEN_HVM_CONFIG_RUNSTATE_UPDATE_FLAG (1 << 6)
6a02465f 1244#define KVM_XEN_HVM_CONFIG_PVCLOCK_TSC_UNSTABLE (1 << 7)
278f064e 1245
51b24e34
JK
1246struct kvm_xen_hvm_config {
1247 __u32 flags;
1248 __u32 msr;
1249 __u64 blob_addr_32;
1250 __u64 blob_addr_64;
1251 __u8 blob_size_32;
1252 __u8 blob_size_64;
1253 __u8 pad2[30];
1254};
1255#endif
1256
1257#define KVM_IRQFD_FLAG_DEASSIGN (1 << 0)
716b8e4d
AW
1258/*
1259 * Available with KVM_CAP_IRQFD_RESAMPLE
1260 *
1261 * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
1262 * the irqfd to operate in resampling mode for level triggered interrupt
f76b348e 1263 * emulation. See Documentation/virt/kvm/api.rst.
716b8e4d
AW
1264 */
1265#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
51b24e34
JK
1266
1267struct kvm_irqfd {
1268 __u32 fd;
1269 __u32 gsi;
1270 __u32 flags;
716b8e4d
AW
1271 __u32 resamplefd;
1272 __u8 pad[16];
51b24e34
JK
1273};
1274
bc204035
MT
1275/* For KVM_CAP_ADJUST_CLOCK */
1276
1277/* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */
1278#define KVM_CLOCK_TSC_STABLE 2
43709a0c
PB
1279#define KVM_CLOCK_REALTIME (1 << 2)
1280#define KVM_CLOCK_HOST_TSC (1 << 3)
bc204035 1281
51b24e34
JK
1282struct kvm_clock_data {
1283 __u64 clock;
1284 __u32 flags;
43709a0c
PB
1285 __u32 pad0;
1286 __u64 realtime;
1287 __u64 host_tsc;
1288 __u32 pad[4];
51b24e34
JK
1289};
1290
bc204035
MT
1291/* For KVM_CAP_SW_TLB */
1292
a54fc080
AG
1293#define KVM_MMU_FSL_BOOKE_NOHV 0
1294#define KVM_MMU_FSL_BOOKE_HV 1
1295
1296struct kvm_config_tlb {
1297 __u64 params;
1298 __u64 array;
1299 __u32 mmu_type;
1300 __u32 array_len;
1301};
1302
1303struct kvm_dirty_tlb {
1304 __u64 bitmap;
1305 __u32 num_dirty;
1306};
1307
9d4e4f8c
AG
1308/* Available with KVM_CAP_ONE_REG */
1309
a31be480
AG
1310#define KVM_REG_ARCH_MASK 0xff00000000000000ULL
1311#define KVM_REG_GENERIC 0x0000000000000000ULL
9d4e4f8c
AG
1312
1313/*
1314 * Architecture specific registers are to be defined in arch headers and
1315 * ORed with the arch identifier.
1316 */
a31be480
AG
1317#define KVM_REG_PPC 0x1000000000000000ULL
1318#define KVM_REG_X86 0x2000000000000000ULL
1319#define KVM_REG_IA64 0x3000000000000000ULL
1320#define KVM_REG_ARM 0x4000000000000000ULL
1321#define KVM_REG_S390 0x5000000000000000ULL
c5daeae1
AK
1322#define KVM_REG_ARM64 0x6000000000000000ULL
1323#define KVM_REG_MIPS 0x7000000000000000ULL
f363d039 1324#define KVM_REG_RISCV 0x8000000000000000ULL
efb91426 1325#define KVM_REG_LOONGARCH 0x9000000000000000ULL
a31be480
AG
1326
1327#define KVM_REG_SIZE_SHIFT 52
1328#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
1329#define KVM_REG_SIZE_U8 0x0000000000000000ULL
1330#define KVM_REG_SIZE_U16 0x0010000000000000ULL
1331#define KVM_REG_SIZE_U32 0x0020000000000000ULL
1332#define KVM_REG_SIZE_U64 0x0030000000000000ULL
1333#define KVM_REG_SIZE_U128 0x0040000000000000ULL
1334#define KVM_REG_SIZE_U256 0x0050000000000000ULL
1335#define KVM_REG_SIZE_U512 0x0060000000000000ULL
1336#define KVM_REG_SIZE_U1024 0x0070000000000000ULL
d9cb4336 1337#define KVM_REG_SIZE_U2048 0x0080000000000000ULL
9d4e4f8c 1338
eadd0e44
PM
1339struct kvm_reg_list {
1340 __u64 n; /* number of regs */
d525f73f 1341 __u64 reg[];
eadd0e44
PM
1342};
1343
9d4e4f8c
AG
1344struct kvm_one_reg {
1345 __u64 id;
a31be480 1346 __u64 addr;
9d4e4f8c
AG
1347};
1348
dbdfea92 1349#define KVM_MSI_VALID_DEVID (1U << 0)
80a3eb10
JK
1350struct kvm_msi {
1351 __u32 address_lo;
1352 __u32 address_hi;
1353 __u32 data;
1354 __u32 flags;
dbdfea92
CH
1355 __u32 devid;
1356 __u8 pad[12];
80a3eb10
JK
1357};
1358
eadd0e44
PM
1359struct kvm_arm_device_addr {
1360 __u64 id;
1361 __u64 addr;
1362};
1363
e098b453
AK
1364/*
1365 * Device control API, available with KVM_CAP_DEVICE_CTRL
1366 */
1367#define KVM_CREATE_DEVICE_TEST 1
1368
1369struct kvm_create_device {
1370 __u32 type; /* in: KVM_DEV_TYPE_xxx */
1371 __u32 fd; /* out: device handle */
1372 __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */
1373};
1374
1375struct kvm_device_attr {
1376 __u32 flags; /* no flags currently defined */
1377 __u32 group; /* device-defined */
1378 __u64 attr; /* group-defined */
1379 __u64 addr; /* userspace address of attr data */
1380};
1381
da3c22c7
TH
1382#define KVM_DEV_VFIO_FILE 1
1383
1384#define KVM_DEV_VFIO_FILE_ADD 1
1385#define KVM_DEV_VFIO_FILE_DEL 2
1386
1387/* KVM_DEV_VFIO_GROUP aliases are for compile time uapi compatibility */
1388#define KVM_DEV_VFIO_GROUP KVM_DEV_VFIO_FILE
1389
1390#define KVM_DEV_VFIO_GROUP_ADD KVM_DEV_VFIO_FILE_ADD
1391#define KVM_DEV_VFIO_GROUP_DEL KVM_DEV_VFIO_FILE_DEL
74c98e20 1392#define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3
444b1996
AB
1393
1394enum kvm_device_type {
1395 KVM_DEV_TYPE_FSL_MPIC_20 = 1,
1396#define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20
1397 KVM_DEV_TYPE_FSL_MPIC_42,
1398#define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42
1399 KVM_DEV_TYPE_XICS,
1400#define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS
1401 KVM_DEV_TYPE_VFIO,
1402#define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO
1403 KVM_DEV_TYPE_ARM_VGIC_V2,
1404#define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2
1405 KVM_DEV_TYPE_FLIC,
1406#define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC
51628b18
CB
1407 KVM_DEV_TYPE_ARM_VGIC_V3,
1408#define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3
dbdfea92
CH
1409 KVM_DEV_TYPE_ARM_VGIC_ITS,
1410#define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS
d9cb4336
CH
1411 KVM_DEV_TYPE_XIVE,
1412#define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE
2a886794
GK
1413 KVM_DEV_TYPE_ARM_PV_TIME,
1414#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME
d0bf492f
CLG
1415 KVM_DEV_TYPE_RISCV_AIA,
1416#define KVM_DEV_TYPE_RISCV_AIA KVM_DEV_TYPE_RISCV_AIA
444b1996
AB
1417 KVM_DEV_TYPE_MAX,
1418};
e098b453 1419
74c98e20
CH
1420struct kvm_vfio_spapr_tce {
1421 __s32 groupfd;
1422 __s32 tablefd;
1423};
1424
51b24e34
JK
1425/*
1426 * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns
1427 * a vcpu fd.
1428 */
1429#define KVM_CREATE_VCPU _IO(KVMIO, 0x41)
1430#define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log)
51b24e34 1431#define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44)
d0bf492f 1432#define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45) /* deprecated */
51b24e34
JK
1433#define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \
1434 struct kvm_userspace_memory_region)
1435#define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47)
1436#define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64)
6a02465f
DHB
1437#define KVM_SET_USER_MEMORY_REGION2 _IOW(KVMIO, 0x49, \
1438 struct kvm_userspace_memory_region2)
1529ae1b
AG
1439
1440/* enable ucontrol for s390 */
1441struct kvm_s390_ucas_mapping {
1442 __u64 user_addr;
1443 __u64 vcpu_addr;
1444 __u64 length;
1445};
1446#define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping)
1447#define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping)
1448#define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long)
1449
51b24e34
JK
1450/* Device model IOC */
1451#define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60)
1452#define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level)
1453#define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip)
1454#define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip)
1455#define KVM_CREATE_PIT _IO(KVMIO, 0x64)
1456#define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state)
1457#define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state)
1458#define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level)
1459#define KVM_REGISTER_COALESCED_MMIO \
1460 _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone)
1461#define KVM_UNREGISTER_COALESCED_MMIO \
1462 _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone)
51b24e34 1463#define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing)
51b24e34 1464#define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71)
51b24e34
JK
1465#define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd)
1466#define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config)
1467#define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78)
1468#define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd)
1469#define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config)
1470#define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data)
1471#define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data)
1472/* Available with KVM_CAP_PIT_STATE2 */
1473#define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2)
1474#define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2)
1475/* Available with KVM_CAP_PPC_GET_PVINFO */
1476#define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo)
d525f73f
CQ
1477/* Available with KVM_CAP_TSC_CONTROL for a vCPU, or with
1478* KVM_CAP_VM_TSC_CONTROL to set defaults for a VM */
51b24e34
JK
1479#define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2)
1480#define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3)
80a3eb10
JK
1481/* Available with KVM_CAP_SIGNAL_MSI */
1482#define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi)
1483/* Available with KVM_CAP_PPC_GET_SMMU_INFO */
1484#define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info)
651682dc
MT
1485/* Available with KVM_CAP_PPC_ALLOC_HTAB */
1486#define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32)
d4834ff9 1487#define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce)
b89485a5
PB
1488#define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \
1489 struct kvm_create_spapr_tce_64)
d4834ff9
AG
1490/* Available with KVM_CAP_RMA */
1491#define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma)
1492/* Available with KVM_CAP_PPC_HTAB_FD */
1493#define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd)
eadd0e44
PM
1494/* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */
1495#define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr)
e098b453
AK
1496/* Available with KVM_CAP_PPC_RTAS */
1497#define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args)
3a5eb5b4
PB
1498/* Available with KVM_CAP_SPAPR_RESIZE_HPT */
1499#define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt)
1500#define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt)
1501/* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */
1502#define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg)
1503/* Available with KVM_CAP_PPC_RADIX_MMU */
1504#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
9cbb6362
CH
1505/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
1506#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
f363d039
EA
1507/* Available with KVM_CAP_PMU_EVENT_FILTER */
1508#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
50fd0c37 1509#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3)
327d4b7f 1510#define KVM_ARM_MTE_COPY_TAGS _IOR(KVMIO, 0xb4, struct kvm_arm_copy_mte_tags)
d0bf492f
CLG
1511/* Available with KVM_CAP_COUNTER_OFFSET */
1512#define KVM_ARM_SET_COUNTER_OFFSET _IOW(KVMIO, 0xb5, struct kvm_arm_counter_offset)
efb91426 1513#define KVM_ARM_GET_REG_WRITABLE_MASKS _IOR(KVMIO, 0xb6, struct reg_mask_range)
e098b453
AK
1514
1515/* ioctl for vm fd */
1516#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
1517
1518/* ioctls for fds returned by KVM_CREATE_DEVICE */
1519#define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr)
1520#define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr)
1521#define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr)
51b24e34
JK
1522
1523/*
1524 * ioctls for vcpu fds
1525 */
1526#define KVM_RUN _IO(KVMIO, 0x80)
1527#define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs)
1528#define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs)
1529#define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs)
1530#define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs)
1531#define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation)
1532#define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt)
51b24e34
JK
1533#define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs)
1534#define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs)
1535#define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid)
1536#define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask)
1537#define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu)
1538#define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu)
1539#define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state)
1540#define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state)
1541#define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2)
1542#define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2)
1543/* Available with KVM_CAP_VAPIC */
1544#define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl)
1545/* Available with KVM_CAP_VAPIC */
1546#define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr)
1547/* valid for virtual machine (for floating interrupt)_and_ vcpu */
1548#define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt)
1549/* store status for s390 */
1550#define KVM_S390_STORE_STATUS_NOADDR (-1ul)
1551#define KVM_S390_STORE_STATUS_PREFIXED (-2ul)
1552#define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long)
1553/* initial ipl psw for s390 */
1554#define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw)
1555/* initial reset for s390 */
1556#define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97)
1557#define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state)
1558#define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state)
444b1996 1559/* Available with KVM_CAP_USER_NMI */
51b24e34
JK
1560#define KVM_NMI _IO(KVMIO, 0x9a)
1561/* Available with KVM_CAP_SET_GUEST_DEBUG */
1562#define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug)
1563/* MCE for x86 */
1564#define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64)
1565#define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64)
1566#define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce)
51b24e34
JK
1567/* Available with KVM_CAP_VCPU_EVENTS */
1568#define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events)
1569#define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events)
1570/* Available with KVM_CAP_DEBUGREGS */
1571#define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs)
1572#define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs)
9ffd2685 1573/*
d0bf492f 1574 * vcpu version available with KVM_CAP_ENABLE_CAP
9ffd2685
CH
1575 * vm version available with KVM_CAP_ENABLE_CAP_VM
1576 */
51b24e34
JK
1577#define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap)
1578/* Available with KVM_CAP_XSAVE */
1579#define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave)
1580#define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave)
1581/* Available with KVM_CAP_XCRS */
1582#define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs)
1583#define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs)
a54fc080
AG
1584/* Available with KVM_CAP_SW_TLB */
1585#define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb)
9d4e4f8c 1586/* Available with KVM_CAP_ONE_REG */
a31be480 1587#define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg)
9d4e4f8c 1588#define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg)
9ab2195d
MT
1589/* VM is being stopped by host */
1590#define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad)
eadd0e44 1591#define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init)
bf63839f 1592#define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init)
eadd0e44 1593#define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list)
7a52ce8a
CH
1594/* Available with KVM_CAP_S390_MEM_OP */
1595#define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op)
1596/* Available with KVM_CAP_S390_SKEYS */
1597#define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys)
1598#define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys)
1599/* Available with KVM_CAP_S390_INJECT_IRQ */
1600#define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq)
1601/* Available with KVM_CAP_S390_IRQ_STATE */
1602#define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state)
1603#define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state)
24a31426
PB
1604/* Available with KVM_CAP_X86_SMM */
1605#define KVM_SMI _IO(KVMIO, 0xb7)
3272f0e2 1606/* Available with KVM_CAP_S390_CMMA_MIGRATION */
ab6e1550 1607#define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log)
3272f0e2 1608#define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log)
9f2d175d
PB
1609/* Memory Encryption Commands */
1610#define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long)
1611
1612struct kvm_enc_region {
1613 __u64 addr;
1614 __u64 size;
1615};
1616
1617#define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region)
1618#define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region)
1619
65a6d8dd
PM
1620/* Available with KVM_CAP_HYPERV_EVENTFD */
1621#define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd)
1622
d36f7de8
CH
1623/* Available with KVM_CAP_NESTED_STATE */
1624#define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state)
1625#define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state)
65a6d8dd 1626
d9cb4336 1627/* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */
da054c64
PB
1628#define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log)
1629
b3c818a4 1630/* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */
da054c64
PB
1631#define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2)
1632
d9cb4336
CH
1633/* Available with KVM_CAP_ARM_SVE */
1634#define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int)
1635
ddda3748
CH
1636/* Available with KVM_CAP_S390_VCPU_RESETS */
1637#define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3)
1638#define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4)
1639
dc6f8d45
CH
1640struct kvm_s390_pv_sec_parm {
1641 __u64 origin;
1642 __u64 length;
1643};
1644
1645struct kvm_s390_pv_unp {
1646 __u64 addr;
1647 __u64 size;
1648 __u64 tweak;
1649};
1650
d525f73f
CQ
1651enum pv_cmd_dmp_id {
1652 KVM_PV_DUMP_INIT,
1653 KVM_PV_DUMP_CONFIG_STOR_STATE,
1654 KVM_PV_DUMP_COMPLETE,
1655 KVM_PV_DUMP_CPU,
1656};
1657
1658struct kvm_s390_pv_dmp {
1659 __u64 subcmd;
1660 __u64 buff_addr;
1661 __u64 buff_len;
1662 __u64 gaddr; /* For dump storage state */
1663 __u64 reserved[4];
1664};
1665
1666enum pv_cmd_info_id {
1667 KVM_PV_INFO_VM,
1668 KVM_PV_INFO_DUMP,
1669};
1670
1671struct kvm_s390_pv_info_dump {
1672 __u64 dump_cpu_buffer_len;
1673 __u64 dump_config_mem_buffer_per_1m;
1674 __u64 dump_config_finalize_len;
1675};
1676
1677struct kvm_s390_pv_info_vm {
1678 __u64 inst_calls_list[4];
1679 __u64 max_cpus;
1680 __u64 max_guests;
1681 __u64 max_guest_addr;
1682 __u64 feature_indication;
1683};
1684
1685struct kvm_s390_pv_info_header {
1686 __u32 id;
1687 __u32 len_max;
1688 __u32 len_written;
1689 __u32 reserved;
1690};
1691
1692struct kvm_s390_pv_info {
1693 struct kvm_s390_pv_info_header header;
1694 union {
1695 struct kvm_s390_pv_info_dump dump;
1696 struct kvm_s390_pv_info_vm vm;
1697 };
1698};
1699
dc6f8d45
CH
1700enum pv_cmd_id {
1701 KVM_PV_ENABLE,
1702 KVM_PV_DISABLE,
1703 KVM_PV_SET_SEC_PARMS,
1704 KVM_PV_UNPACK,
1705 KVM_PV_VERIFY,
1706 KVM_PV_PREP_RESET,
1707 KVM_PV_UNSHARE_ALL,
d525f73f
CQ
1708 KVM_PV_INFO,
1709 KVM_PV_DUMP,
93d7620c
AH
1710 KVM_PV_ASYNC_CLEANUP_PREPARE,
1711 KVM_PV_ASYNC_CLEANUP_PERFORM,
dc6f8d45
CH
1712};
1713
1714struct kvm_pv_cmd {
1715 __u32 cmd; /* Command to be executed */
1716 __u16 rc; /* Ultravisor return code */
1717 __u16 rrc; /* Ultravisor return reason code */
1718 __u64 data; /* Data or address */
1719 __u32 flags; /* flags for future extensions. Must be 0 for now */
1720 __u32 reserved[3];
1721};
1722
1723/* Available with KVM_CAP_S390_PROTECTED */
1724#define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd)
1725
53ba2eee
MR
1726/* Available with KVM_CAP_X86_MSR_FILTER */
1727#define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter)
1728
b3c818a4
EF
1729/* Available with KVM_CAP_DIRTY_LOG_RING */
1730#define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7)
1731
278f064e
EH
1732/* Per-VM Xen attributes */
1733#define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr)
1734#define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr)
1735
1736struct kvm_xen_hvm_attr {
1737 __u16 type;
1738 __u16 pad[3];
1739 union {
1740 __u8 long_mode;
1741 __u8 vector;
93d7620c 1742 __u8 runstate_update_flag;
278f064e
EH
1743 struct {
1744 __u64 gfn;
93d7620c 1745#define KVM_XEN_INVALID_GFN ((__u64)-1)
278f064e 1746 } shared_info;
d525f73f
CQ
1747 struct {
1748 __u32 send_port;
1749 __u32 type; /* EVTCHNSTAT_ipi / EVTCHNSTAT_interdomain */
1750 __u32 flags;
1751#define KVM_XEN_EVTCHN_DEASSIGN (1 << 0)
1752#define KVM_XEN_EVTCHN_UPDATE (1 << 1)
1753#define KVM_XEN_EVTCHN_RESET (1 << 2)
1754 /*
1755 * Events sent by the guest are either looped back to
1756 * the guest itself (potentially on a different port#)
1757 * or signalled via an eventfd.
1758 */
1759 union {
1760 struct {
1761 __u32 port;
1762 __u32 vcpu;
1763 __u32 priority;
1764 } port;
1765 struct {
1766 __u32 port; /* Zero for eventfd */
1767 __s32 fd;
1768 } eventfd;
1769 __u32 padding[4];
1770 } deliver;
1771 } evtchn;
1772 __u32 xen_version;
278f064e
EH
1773 __u64 pad[8];
1774 } u;
1775};
1776
93d7620c 1777
278f064e
EH
1778/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1779#define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0
1780#define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1
1781#define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2
d525f73f
CQ
1782/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1783#define KVM_XEN_ATTR_TYPE_EVTCHN 0x3
1784#define KVM_XEN_ATTR_TYPE_XEN_VERSION 0x4
93d7620c
AH
1785/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_RUNSTATE_UPDATE_FLAG */
1786#define KVM_XEN_ATTR_TYPE_RUNSTATE_UPDATE_FLAG 0x5
278f064e
EH
1787
1788/* Per-vCPU Xen attributes */
1789#define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr)
1790#define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr)
1791
d525f73f
CQ
1792/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1793#define KVM_XEN_HVM_EVTCHN_SEND _IOW(KVMIO, 0xd0, struct kvm_irq_routing_xen_evtchn)
1794
327d4b7f
BR
1795#define KVM_GET_SREGS2 _IOR(KVMIO, 0xcc, struct kvm_sregs2)
1796#define KVM_SET_SREGS2 _IOW(KVMIO, 0xcd, struct kvm_sregs2)
1797
278f064e
EH
1798struct kvm_xen_vcpu_attr {
1799 __u16 type;
1800 __u16 pad[3];
1801 union {
1802 __u64 gpa;
93d7620c 1803#define KVM_XEN_INVALID_GPA ((__u64)-1)
278f064e
EH
1804 __u64 pad[8];
1805 struct {
1806 __u64 state;
1807 __u64 state_entry_time;
1808 __u64 time_running;
1809 __u64 time_runnable;
1810 __u64 time_blocked;
1811 __u64 time_offline;
1812 } runstate;
d525f73f
CQ
1813 __u32 vcpu_id;
1814 struct {
1815 __u32 port;
1816 __u32 priority;
1817 __u64 expires_ns;
1818 } timer;
1819 __u8 vector;
278f064e
EH
1820 } u;
1821};
1822
1823/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */
1824#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0
1825#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1
1826#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2
1827#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3
1828#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4
1829#define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5
d525f73f
CQ
1830/* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */
1831#define KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID 0x6
1832#define KVM_XEN_VCPU_ATTR_TYPE_TIMER 0x7
1833#define KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR 0x8
278f064e 1834
9f2d175d
PB
1835/* Secure Encrypted Virtualization command */
1836enum sev_cmd_id {
1837 /* Guest initialization commands */
1838 KVM_SEV_INIT = 0,
1839 KVM_SEV_ES_INIT,
1840 /* Guest launch commands */
1841 KVM_SEV_LAUNCH_START,
1842 KVM_SEV_LAUNCH_UPDATE_DATA,
1843 KVM_SEV_LAUNCH_UPDATE_VMSA,
1844 KVM_SEV_LAUNCH_SECRET,
1845 KVM_SEV_LAUNCH_MEASURE,
1846 KVM_SEV_LAUNCH_FINISH,
1847 /* Guest migration commands (outgoing) */
1848 KVM_SEV_SEND_START,
1849 KVM_SEV_SEND_UPDATE_DATA,
1850 KVM_SEV_SEND_UPDATE_VMSA,
1851 KVM_SEV_SEND_FINISH,
1852 /* Guest migration commands (incoming) */
1853 KVM_SEV_RECEIVE_START,
1854 KVM_SEV_RECEIVE_UPDATE_DATA,
1855 KVM_SEV_RECEIVE_UPDATE_VMSA,
1856 KVM_SEV_RECEIVE_FINISH,
1857 /* Guest status and debug commands */
1858 KVM_SEV_GUEST_STATUS,
1859 KVM_SEV_DBG_DECRYPT,
1860 KVM_SEV_DBG_ENCRYPT,
1861 /* Guest certificates commands */
1862 KVM_SEV_CERT_EXPORT,
3ea1a802
BS
1863 /* Attestation report */
1864 KVM_SEV_GET_ATTESTATION_REPORT,
278f064e
EH
1865 /* Guest Migration Extension */
1866 KVM_SEV_SEND_CANCEL,
9f2d175d
PB
1867
1868 KVM_SEV_NR_MAX,
1869};
1870
1871struct kvm_sev_cmd {
1872 __u32 id;
1873 __u64 data;
1874 __u32 error;
1875 __u32 sev_fd;
1876};
1877
1878struct kvm_sev_launch_start {
1879 __u32 handle;
1880 __u32 policy;
1881 __u64 dh_uaddr;
1882 __u32 dh_len;
1883 __u64 session_uaddr;
1884 __u32 session_len;
1885};
1886
1887struct kvm_sev_launch_update_data {
1888 __u64 uaddr;
1889 __u32 len;
1890};
1891
1892
1893struct kvm_sev_launch_secret {
1894 __u64 hdr_uaddr;
1895 __u32 hdr_len;
1896 __u64 guest_uaddr;
1897 __u32 guest_len;
1898 __u64 trans_uaddr;
1899 __u32 trans_len;
1900};
1901
1902struct kvm_sev_launch_measure {
1903 __u64 uaddr;
1904 __u32 len;
1905};
1906
1907struct kvm_sev_guest_status {
1908 __u32 handle;
1909 __u32 policy;
1910 __u32 state;
1911};
1912
1913struct kvm_sev_dbg {
1914 __u64 src_uaddr;
1915 __u64 dst_uaddr;
1916 __u32 len;
1917};
51b24e34 1918
3ea1a802
BS
1919struct kvm_sev_attestation_report {
1920 __u8 mnonce[16];
1921 __u64 uaddr;
1922 __u32 len;
1923};
1924
278f064e
EH
1925struct kvm_sev_send_start {
1926 __u32 policy;
1927 __u64 pdh_cert_uaddr;
1928 __u32 pdh_cert_len;
1929 __u64 plat_certs_uaddr;
1930 __u32 plat_certs_len;
1931 __u64 amd_certs_uaddr;
1932 __u32 amd_certs_len;
1933 __u64 session_uaddr;
1934 __u32 session_len;
1935};
1936
1937struct kvm_sev_send_update_data {
1938 __u64 hdr_uaddr;
1939 __u32 hdr_len;
1940 __u64 guest_uaddr;
1941 __u32 guest_len;
1942 __u64 trans_uaddr;
1943 __u32 trans_len;
1944};
1945
1946struct kvm_sev_receive_start {
1947 __u32 handle;
1948 __u32 policy;
1949 __u64 pdh_uaddr;
1950 __u32 pdh_len;
1951 __u64 session_uaddr;
1952 __u32 session_len;
1953};
1954
1955struct kvm_sev_receive_update_data {
1956 __u64 hdr_uaddr;
1957 __u32 hdr_len;
1958 __u64 guest_uaddr;
1959 __u32 guest_len;
1960 __u64 trans_uaddr;
1961 __u32 trans_len;
1962};
1963
51b24e34 1964#define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0)
9ab2195d
MT
1965#define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1)
1966#define KVM_DEV_ASSIGN_MASK_INTX (1 << 2)
51b24e34
JK
1967
1968struct kvm_assigned_pci_dev {
1969 __u32 assigned_dev_id;
1970 __u32 busnr;
1971 __u32 devfn;
1972 __u32 flags;
1973 __u32 segnr;
1974 union {
1975 __u32 reserved[11];
1976 };
1977};
1978
1979#define KVM_DEV_IRQ_HOST_INTX (1 << 0)
1980#define KVM_DEV_IRQ_HOST_MSI (1 << 1)
1981#define KVM_DEV_IRQ_HOST_MSIX (1 << 2)
1982
1983#define KVM_DEV_IRQ_GUEST_INTX (1 << 8)
1984#define KVM_DEV_IRQ_GUEST_MSI (1 << 9)
1985#define KVM_DEV_IRQ_GUEST_MSIX (1 << 10)
1986
1987#define KVM_DEV_IRQ_HOST_MASK 0x00ff
1988#define KVM_DEV_IRQ_GUEST_MASK 0xff00
1989
1990struct kvm_assigned_irq {
1991 __u32 assigned_dev_id;
7c6da3de 1992 __u32 host_irq; /* ignored (legacy field) */
51b24e34
JK
1993 __u32 guest_irq;
1994 __u32 flags;
1995 union {
51b24e34
JK
1996 __u32 reserved[12];
1997 };
1998};
1999
51b24e34
JK
2000struct kvm_assigned_msix_nr {
2001 __u32 assigned_dev_id;
2002 __u16 entry_nr;
2003 __u16 padding;
2004};
2005
2006#define KVM_MAX_MSIX_PER_DEV 256
2007struct kvm_assigned_msix_entry {
2008 __u32 assigned_dev_id;
2009 __u32 gsi;
2010 __u16 entry; /* The index of entry in the MSI-X table */
2011 __u16 padding[3];
2012};
2013
dbdfea92
CH
2014#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
2015#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1)
2016
74c98e20
CH
2017/* Available with KVM_CAP_ARM_USER_IRQ */
2018
2019/* Bits for run->s.regs.device_irq_level */
2020#define KVM_ARM_DEV_EL1_VTIMER (1 << 0)
2021#define KVM_ARM_DEV_EL1_PTIMER (1 << 1)
2022#define KVM_ARM_DEV_PMU (1 << 2)
2023
65a6d8dd
PM
2024struct kvm_hyperv_eventfd {
2025 __u32 conn_id;
2026 __s32 fd;
2027 __u32 flags;
2028 __u32 padding[3];
2029};
2030
2031#define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
2032#define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
2033
dc6f8d45
CH
2034#define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
2035#define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1)
2036
b3c818a4
EF
2037/*
2038 * Arch needs to define the macro after implementing the dirty ring
2039 * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the
2040 * starting page offset of the dirty ring structures.
2041 */
2042#ifndef KVM_DIRTY_LOG_PAGE_OFFSET
2043#define KVM_DIRTY_LOG_PAGE_OFFSET 0
2044#endif
2045
2046/*
2047 * KVM dirty GFN flags, defined as:
2048 *
2049 * |---------------+---------------+--------------|
2050 * | bit 1 (reset) | bit 0 (dirty) | Status |
2051 * |---------------+---------------+--------------|
2052 * | 0 | 0 | Invalid GFN |
2053 * | 0 | 1 | Dirty GFN |
2054 * | 1 | X | GFN to reset |
2055 * |---------------+---------------+--------------|
2056 *
2057 * Lifecycle of a dirty GFN goes like:
2058 *
2059 * dirtied harvested reset
2060 * 00 -----------> 01 -------------> 1X -------+
2061 * ^ |
2062 * | |
2063 * +------------------------------------------+
2064 *
2065 * The userspace program is only responsible for the 01->1X state
2066 * conversion after harvesting an entry. Also, it must not skip any
2067 * dirty bits, so that dirty bits are always harvested in sequence.
2068 */
278f064e
EH
2069#define KVM_DIRTY_GFN_F_DIRTY _BITUL(0)
2070#define KVM_DIRTY_GFN_F_RESET _BITUL(1)
b3c818a4
EF
2071#define KVM_DIRTY_GFN_F_MASK 0x3
2072
2073/*
2074 * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of
2075 * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The
2076 * size of the gfn buffer is decided by the first argument when
2077 * enabling KVM_CAP_DIRTY_LOG_RING.
2078 */
2079struct kvm_dirty_gfn {
2080 __u32 flags;
2081 __u32 slot;
2082 __u64 offset;
2083};
2084
278f064e
EH
2085#define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
2086#define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1)
2087
e4082063
AW
2088#define KVM_PMU_CAP_DISABLE (1 << 0)
2089
327d4b7f
BR
2090/**
2091 * struct kvm_stats_header - Header of per vm/vcpu binary statistics data.
2092 * @flags: Some extra information for header, always 0 for now.
2093 * @name_size: The size in bytes of the memory which contains statistics
2094 * name string including trailing '\0'. The memory is allocated
2095 * at the send of statistics descriptor.
2096 * @num_desc: The number of statistics the vm or vcpu has.
2097 * @id_offset: The offset of the vm/vcpu stats' id string in the file pointed
2098 * by vm/vcpu stats fd.
2099 * @desc_offset: The offset of the vm/vcpu stats' descriptor block in the file
2100 * pointd by vm/vcpu stats fd.
2101 * @data_offset: The offset of the vm/vcpu stats' data block in the file
2102 * pointed by vm/vcpu stats fd.
2103 *
2104 * This is the header userspace needs to read from stats fd before any other
2105 * readings. It is used by userspace to discover all the information about the
2106 * vm/vcpu's binary statistics.
2107 * Userspace reads this header from the start of the vm/vcpu's stats fd.
2108 */
2109struct kvm_stats_header {
2110 __u32 flags;
2111 __u32 name_size;
2112 __u32 num_desc;
2113 __u32 id_offset;
2114 __u32 desc_offset;
2115 __u32 data_offset;
2116};
2117
2118#define KVM_STATS_TYPE_SHIFT 0
2119#define KVM_STATS_TYPE_MASK (0xF << KVM_STATS_TYPE_SHIFT)
2120#define KVM_STATS_TYPE_CUMULATIVE (0x0 << KVM_STATS_TYPE_SHIFT)
2121#define KVM_STATS_TYPE_INSTANT (0x1 << KVM_STATS_TYPE_SHIFT)
2122#define KVM_STATS_TYPE_PEAK (0x2 << KVM_STATS_TYPE_SHIFT)
43709a0c
PB
2123#define KVM_STATS_TYPE_LINEAR_HIST (0x3 << KVM_STATS_TYPE_SHIFT)
2124#define KVM_STATS_TYPE_LOG_HIST (0x4 << KVM_STATS_TYPE_SHIFT)
2125#define KVM_STATS_TYPE_MAX KVM_STATS_TYPE_LOG_HIST
327d4b7f
BR
2126
2127#define KVM_STATS_UNIT_SHIFT 4
2128#define KVM_STATS_UNIT_MASK (0xF << KVM_STATS_UNIT_SHIFT)
2129#define KVM_STATS_UNIT_NONE (0x0 << KVM_STATS_UNIT_SHIFT)
2130#define KVM_STATS_UNIT_BYTES (0x1 << KVM_STATS_UNIT_SHIFT)
2131#define KVM_STATS_UNIT_SECONDS (0x2 << KVM_STATS_UNIT_SHIFT)
2132#define KVM_STATS_UNIT_CYCLES (0x3 << KVM_STATS_UNIT_SHIFT)
105bb7cd 2133#define KVM_STATS_UNIT_BOOLEAN (0x4 << KVM_STATS_UNIT_SHIFT)
d525f73f 2134#define KVM_STATS_UNIT_MAX KVM_STATS_UNIT_BOOLEAN
327d4b7f
BR
2135
2136#define KVM_STATS_BASE_SHIFT 8
2137#define KVM_STATS_BASE_MASK (0xF << KVM_STATS_BASE_SHIFT)
2138#define KVM_STATS_BASE_POW10 (0x0 << KVM_STATS_BASE_SHIFT)
2139#define KVM_STATS_BASE_POW2 (0x1 << KVM_STATS_BASE_SHIFT)
2140#define KVM_STATS_BASE_MAX KVM_STATS_BASE_POW2
2141
2142/**
2143 * struct kvm_stats_desc - Descriptor of a KVM statistics.
2144 * @flags: Annotations of the stats, like type, unit, etc.
2145 * @exponent: Used together with @flags to determine the unit.
2146 * @size: The number of data items for this stats.
2147 * Every data item is of type __u64.
2148 * @offset: The offset of the stats to the start of stat structure in
43709a0c
PB
2149 * structure kvm or kvm_vcpu.
2150 * @bucket_size: A parameter value used for histogram stats. It is only used
2151 * for linear histogram stats, specifying the size of the bucket;
327d4b7f
BR
2152 * @name: The name string for the stats. Its size is indicated by the
2153 * &kvm_stats_header->name_size.
2154 */
2155struct kvm_stats_desc {
2156 __u32 flags;
2157 __s16 exponent;
2158 __u16 size;
2159 __u32 offset;
43709a0c 2160 __u32 bucket_size;
327d4b7f
BR
2161 char name[];
2162};
2163
2164#define KVM_GET_STATS_FD _IO(KVMIO, 0xce)
2165
1ea5208f
PB
2166/* Available with KVM_CAP_XSAVE2 */
2167#define KVM_GET_XSAVE2 _IOR(KVMIO, 0xcf, struct kvm_xsave)
2168
d525f73f
CQ
2169/* Available with KVM_CAP_S390_PROTECTED_DUMP */
2170#define KVM_S390_PV_CPU_COMMAND _IOWR(KVMIO, 0xd0, struct kvm_pv_cmd)
2171
2172/* Available with KVM_CAP_X86_NOTIFY_VMEXIT */
2173#define KVM_X86_NOTIFY_VMEXIT_ENABLED (1ULL << 0)
2174#define KVM_X86_NOTIFY_VMEXIT_USER (1ULL << 1)
2175
2176/* Available with KVM_CAP_S390_ZPCI_OP */
2177#define KVM_S390_ZPCI_OP _IOW(KVMIO, 0xd1, struct kvm_s390_zpci_op)
2178
2179struct kvm_s390_zpci_op {
2180 /* in */
2181 __u32 fh; /* target device */
2182 __u8 op; /* operation to perform */
2183 __u8 pad[3];
2184 union {
2185 /* for KVM_S390_ZPCIOP_REG_AEN */
2186 struct {
2187 __u64 ibv; /* Guest addr of interrupt bit vector */
2188 __u64 sb; /* Guest addr of summary bit */
2189 __u32 flags;
2190 __u32 noi; /* Number of interrupts */
2191 __u8 isc; /* Guest interrupt subclass */
2192 __u8 sbo; /* Offset of guest summary bit vector */
2193 __u16 pad;
2194 } reg_aen;
2195 __u64 reserved[8];
2196 } u;
2197};
2198
2199/* types for kvm_s390_zpci_op->op */
2200#define KVM_S390_ZPCIOP_REG_AEN 0
2201#define KVM_S390_ZPCIOP_DEREG_AEN 1
2202
2203/* flags for kvm_s390_zpci_op->u.reg_aen.flags */
2204#define KVM_S390_ZPCIOP_REGAEN_HOST (1 << 0)
2205
6a02465f
DHB
2206/* Available with KVM_CAP_MEMORY_ATTRIBUTES */
2207#define KVM_SET_MEMORY_ATTRIBUTES _IOW(KVMIO, 0xd2, struct kvm_memory_attributes)
2208
2209struct kvm_memory_attributes {
2210 __u64 address;
2211 __u64 size;
2212 __u64 attributes;
2213 __u64 flags;
2214};
2215
2216#define KVM_MEMORY_ATTRIBUTE_PRIVATE (1ULL << 3)
2217
2218#define KVM_CREATE_GUEST_MEMFD _IOWR(KVMIO, 0xd4, struct kvm_create_guest_memfd)
2219
2220struct kvm_create_guest_memfd {
2221 __u64 size;
2222 __u64 flags;
2223 __u64 reserved[6];
2224};
2225
51b24e34 2226#endif /* __LINUX_KVM_H */