1 | /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ |
2 | #ifndef __LINUX_KVM_H |
3 | #define __LINUX_KVM_H |
4 | |
5 | /* |
6 | * Userspace interface for /dev/kvm - kernel based virtual machine |
7 | * |
8 | * Note: you must update KVM_API_VERSION if you change this interface. |
9 | */ |
10 | |
11 | #include <linux/const.h> |
12 | #include <linux/types.h> |
13 | #include <linux/compiler.h> |
14 | #include <linux/ioctl.h> |
15 | #include <asm/kvm.h> |
16 | |
17 | #define KVM_API_VERSION 12 |
18 | |
19 | /* *** Deprecated interfaces *** */ |
20 | |
21 | #define KVM_TRC_SHIFT 16 |
22 | |
23 | #define KVM_TRC_ENTRYEXIT (1 << KVM_TRC_SHIFT) |
24 | #define KVM_TRC_HANDLER (1 << (KVM_TRC_SHIFT + 1)) |
25 | |
26 | #define KVM_TRC_VMENTRY (KVM_TRC_ENTRYEXIT + 0x01) |
27 | #define KVM_TRC_VMEXIT (KVM_TRC_ENTRYEXIT + 0x02) |
28 | #define KVM_TRC_PAGE_FAULT (KVM_TRC_HANDLER + 0x01) |
29 | |
30 | #define KVM_TRC_HEAD_SIZE 12 |
31 | #define KVM_TRC_CYCLE_SIZE 8 |
32 | #define 7 |
33 | |
34 | #define KVM_TRC_INJ_VIRQ (KVM_TRC_HANDLER + 0x02) |
35 | #define KVM_TRC_REDELIVER_EVT (KVM_TRC_HANDLER + 0x03) |
36 | #define KVM_TRC_PEND_INTR (KVM_TRC_HANDLER + 0x04) |
37 | #define KVM_TRC_IO_READ (KVM_TRC_HANDLER + 0x05) |
38 | #define KVM_TRC_IO_WRITE (KVM_TRC_HANDLER + 0x06) |
39 | #define KVM_TRC_CR_READ (KVM_TRC_HANDLER + 0x07) |
40 | #define KVM_TRC_CR_WRITE (KVM_TRC_HANDLER + 0x08) |
41 | #define KVM_TRC_DR_READ (KVM_TRC_HANDLER + 0x09) |
42 | #define KVM_TRC_DR_WRITE (KVM_TRC_HANDLER + 0x0A) |
43 | #define KVM_TRC_MSR_READ (KVM_TRC_HANDLER + 0x0B) |
44 | #define KVM_TRC_MSR_WRITE (KVM_TRC_HANDLER + 0x0C) |
45 | #define KVM_TRC_CPUID (KVM_TRC_HANDLER + 0x0D) |
46 | #define KVM_TRC_INTR (KVM_TRC_HANDLER + 0x0E) |
47 | #define KVM_TRC_NMI (KVM_TRC_HANDLER + 0x0F) |
48 | #define KVM_TRC_VMMCALL (KVM_TRC_HANDLER + 0x10) |
49 | #define KVM_TRC_HLT (KVM_TRC_HANDLER + 0x11) |
50 | #define KVM_TRC_CLTS (KVM_TRC_HANDLER + 0x12) |
51 | #define KVM_TRC_LMSW (KVM_TRC_HANDLER + 0x13) |
52 | #define KVM_TRC_APIC_ACCESS (KVM_TRC_HANDLER + 0x14) |
53 | #define KVM_TRC_TDP_FAULT (KVM_TRC_HANDLER + 0x15) |
54 | #define KVM_TRC_GTLB_WRITE (KVM_TRC_HANDLER + 0x16) |
55 | #define KVM_TRC_STLB_WRITE (KVM_TRC_HANDLER + 0x17) |
56 | #define KVM_TRC_STLB_INVAL (KVM_TRC_HANDLER + 0x18) |
57 | #define KVM_TRC_PPC_INSTR (KVM_TRC_HANDLER + 0x19) |
58 | |
59 | struct kvm_user_trace_setup { |
60 | __u32 buf_size; |
61 | __u32 buf_nr; |
62 | }; |
63 | |
64 | #define __KVM_DEPRECATED_MAIN_W_0x06 \ |
65 | _IOW(KVMIO, 0x06, struct kvm_user_trace_setup) |
66 | #define __KVM_DEPRECATED_MAIN_0x07 _IO(KVMIO, 0x07) |
67 | #define __KVM_DEPRECATED_MAIN_0x08 _IO(KVMIO, 0x08) |
68 | |
69 | #define __KVM_DEPRECATED_VM_R_0x70 _IOR(KVMIO, 0x70, struct kvm_assigned_irq) |
70 | |
71 | struct kvm_breakpoint { |
72 | __u32 enabled; |
73 | __u32 padding; |
74 | __u64 address; |
75 | }; |
76 | |
77 | struct kvm_debug_guest { |
78 | __u32 enabled; |
79 | __u32 pad; |
80 | struct kvm_breakpoint breakpoints[4]; |
81 | __u32 singlestep; |
82 | }; |
83 | |
84 | #define __KVM_DEPRECATED_VCPU_W_0x87 _IOW(KVMIO, 0x87, struct kvm_debug_guest) |
85 | |
86 | /* *** End of deprecated interfaces *** */ |
87 | |
88 | |
89 | /* for KVM_SET_USER_MEMORY_REGION */ |
90 | struct kvm_userspace_memory_region { |
91 | __u32 slot; |
92 | __u32 flags; |
93 | __u64 guest_phys_addr; |
94 | __u64 memory_size; /* bytes */ |
95 | __u64 userspace_addr; /* start of the userspace allocated memory */ |
96 | }; |
97 | |
98 | /* |
99 | * The bit 0 ~ bit 15 of kvm_userspace_memory_region::flags are visible for |
100 | * userspace, other bits are reserved for kvm internal use which are defined |
101 | * in include/linux/kvm_host.h. |
102 | */ |
103 | #define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0) |
104 | #define KVM_MEM_READONLY (1UL << 1) |
105 | |
106 | /* for KVM_IRQ_LINE */ |
107 | struct kvm_irq_level { |
108 | /* |
109 | * ACPI gsi notion of irq. |
110 | * For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47.. |
111 | * For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23.. |
112 | * For ARM: See Documentation/virt/kvm/api.rst |
113 | */ |
114 | union { |
115 | __u32 irq; |
116 | __s32 status; |
117 | }; |
118 | __u32 level; |
119 | }; |
120 | |
121 | |
122 | struct kvm_irqchip { |
123 | __u32 chip_id; |
124 | __u32 pad; |
125 | union { |
126 | char dummy[512]; /* reserving space */ |
127 | #ifdef __KVM_HAVE_PIT |
128 | struct kvm_pic_state pic; |
129 | #endif |
130 | #ifdef __KVM_HAVE_IOAPIC |
131 | struct kvm_ioapic_state ioapic; |
132 | #endif |
133 | } chip; |
134 | }; |
135 | |
136 | /* for KVM_CREATE_PIT2 */ |
137 | struct kvm_pit_config { |
138 | __u32 flags; |
139 | __u32 pad[15]; |
140 | }; |
141 | |
142 | #define KVM_PIT_SPEAKER_DUMMY 1 |
143 | |
144 | struct kvm_s390_skeys { |
145 | __u64 start_gfn; |
146 | __u64 count; |
147 | __u64 skeydata_addr; |
148 | __u32 flags; |
149 | __u32 reserved[9]; |
150 | }; |
151 | |
152 | #define KVM_S390_CMMA_PEEK (1 << 0) |
153 | |
154 | /** |
155 | * kvm_s390_cmma_log - Used for CMMA migration. |
156 | * |
157 | * Used both for input and output. |
158 | * |
159 | * @start_gfn: Guest page number to start from. |
160 | * @count: Size of the result buffer. |
161 | * @flags: Control operation mode via KVM_S390_CMMA_* flags |
162 | * @remaining: Used with KVM_S390_GET_CMMA_BITS. Indicates how many dirty |
163 | * pages are still remaining. |
164 | * @mask: Used with KVM_S390_SET_CMMA_BITS. Bitmap of bits to actually set |
165 | * in the PGSTE. |
166 | * @values: Pointer to the values buffer. |
167 | * |
168 | * Used in KVM_S390_{G,S}ET_CMMA_BITS ioctls. |
169 | */ |
170 | struct kvm_s390_cmma_log { |
171 | __u64 start_gfn; |
172 | __u32 count; |
173 | __u32 flags; |
174 | union { |
175 | __u64 remaining; |
176 | __u64 mask; |
177 | }; |
178 | __u64 values; |
179 | }; |
180 | |
181 | struct kvm_hyperv_exit { |
182 | #define KVM_EXIT_HYPERV_SYNIC 1 |
183 | #define KVM_EXIT_HYPERV_HCALL 2 |
184 | #define KVM_EXIT_HYPERV_SYNDBG 3 |
185 | __u32 type; |
186 | __u32 pad1; |
187 | union { |
188 | struct { |
189 | __u32 msr; |
190 | __u32 pad2; |
191 | __u64 control; |
192 | __u64 evt_page; |
193 | __u64 msg_page; |
194 | } synic; |
195 | struct { |
196 | __u64 input; |
197 | __u64 result; |
198 | __u64 params[2]; |
199 | } hcall; |
200 | struct { |
201 | __u32 msr; |
202 | __u32 pad2; |
203 | __u64 control; |
204 | __u64 status; |
205 | __u64 send_page; |
206 | __u64 recv_page; |
207 | __u64 pending_page; |
208 | } syndbg; |
209 | } u; |
210 | }; |
211 | |
212 | struct kvm_xen_exit { |
213 | #define KVM_EXIT_XEN_HCALL 1 |
214 | __u32 type; |
215 | union { |
216 | struct { |
217 | __u32 longmode; |
218 | __u32 cpl; |
219 | __u64 input; |
220 | __u64 result; |
221 | __u64 params[6]; |
222 | } hcall; |
223 | } u; |
224 | }; |
225 | |
226 | #define KVM_S390_GET_SKEYS_NONE 1 |
227 | #define KVM_S390_SKEYS_MAX 1048576 |
228 | |
229 | #define KVM_EXIT_UNKNOWN 0 |
230 | #define KVM_EXIT_EXCEPTION 1 |
231 | #define KVM_EXIT_IO 2 |
232 | #define KVM_EXIT_HYPERCALL 3 |
233 | #define KVM_EXIT_DEBUG 4 |
234 | #define KVM_EXIT_HLT 5 |
235 | #define KVM_EXIT_MMIO 6 |
236 | #define KVM_EXIT_IRQ_WINDOW_OPEN 7 |
237 | #define KVM_EXIT_SHUTDOWN 8 |
238 | #define KVM_EXIT_FAIL_ENTRY 9 |
239 | #define KVM_EXIT_INTR 10 |
240 | #define KVM_EXIT_SET_TPR 11 |
241 | #define KVM_EXIT_TPR_ACCESS 12 |
242 | #define KVM_EXIT_S390_SIEIC 13 |
243 | #define KVM_EXIT_S390_RESET 14 |
244 | #define KVM_EXIT_DCR 15 /* deprecated */ |
245 | #define KVM_EXIT_NMI 16 |
246 | #define KVM_EXIT_INTERNAL_ERROR 17 |
247 | #define KVM_EXIT_OSI 18 |
248 | #define KVM_EXIT_PAPR_HCALL 19 |
249 | #define KVM_EXIT_S390_UCONTROL 20 |
250 | #define KVM_EXIT_WATCHDOG 21 |
251 | #define KVM_EXIT_S390_TSCH 22 |
252 | #define KVM_EXIT_EPR 23 |
253 | #define KVM_EXIT_SYSTEM_EVENT 24 |
254 | #define KVM_EXIT_S390_STSI 25 |
255 | #define KVM_EXIT_IOAPIC_EOI 26 |
256 | #define KVM_EXIT_HYPERV 27 |
257 | #define KVM_EXIT_ARM_NISV 28 |
258 | #define KVM_EXIT_X86_RDMSR 29 |
259 | #define KVM_EXIT_X86_WRMSR 30 |
260 | #define KVM_EXIT_DIRTY_RING_FULL 31 |
261 | #define KVM_EXIT_AP_RESET_HOLD 32 |
262 | #define KVM_EXIT_X86_BUS_LOCK 33 |
263 | #define KVM_EXIT_XEN 34 |
264 | #define KVM_EXIT_RISCV_SBI 35 |
265 | #define KVM_EXIT_RISCV_CSR 36 |
266 | #define KVM_EXIT_NOTIFY 37 |
267 | #define KVM_EXIT_LOONGARCH_IOCSR 38 |
268 | |
269 | /* For KVM_EXIT_INTERNAL_ERROR */ |
270 | /* Emulate instruction failed. */ |
271 | #define KVM_INTERNAL_ERROR_EMULATION 1 |
272 | /* Encounter unexpected simultaneous exceptions. */ |
273 | #define KVM_INTERNAL_ERROR_SIMUL_EX 2 |
274 | /* Encounter unexpected vm-exit due to delivery event. */ |
275 | #define KVM_INTERNAL_ERROR_DELIVERY_EV 3 |
276 | /* Encounter unexpected vm-exit reason */ |
277 | #define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4 |
278 | |
279 | /* Flags that describe what fields in emulation_failure hold valid data. */ |
280 | #define KVM_INTERNAL_ERROR_EMULATION_FLAG_INSTRUCTION_BYTES (1ULL << 0) |
281 | |
282 | /* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */ |
283 | struct kvm_run { |
284 | /* in */ |
285 | __u8 request_interrupt_window; |
286 | __u8 immediate_exit; |
287 | __u8 padding1[6]; |
288 | |
289 | /* out */ |
290 | __u32 exit_reason; |
291 | __u8 ready_for_interrupt_injection; |
292 | __u8 if_flag; |
293 | __u16 flags; |
294 | |
295 | /* in (pre_kvm_run), out (post_kvm_run) */ |
296 | __u64 cr8; |
297 | __u64 apic_base; |
298 | |
299 | #ifdef __KVM_S390 |
300 | /* the processor status word for s390 */ |
301 | __u64 psw_mask; /* psw upper half */ |
302 | __u64 psw_addr; /* psw lower half */ |
303 | #endif |
304 | union { |
305 | /* KVM_EXIT_UNKNOWN */ |
306 | struct { |
307 | __u64 hardware_exit_reason; |
308 | } hw; |
309 | /* KVM_EXIT_FAIL_ENTRY */ |
310 | struct { |
311 | __u64 hardware_entry_failure_reason; |
312 | __u32 cpu; |
313 | } fail_entry; |
314 | /* KVM_EXIT_EXCEPTION */ |
315 | struct { |
316 | __u32 exception; |
317 | __u32 error_code; |
318 | } ex; |
319 | /* KVM_EXIT_IO */ |
320 | struct { |
321 | #define KVM_EXIT_IO_IN 0 |
322 | #define KVM_EXIT_IO_OUT 1 |
323 | __u8 direction; |
324 | __u8 size; /* bytes */ |
325 | __u16 port; |
326 | __u32 count; |
327 | __u64 data_offset; /* relative to kvm_run start */ |
328 | } io; |
329 | /* KVM_EXIT_DEBUG */ |
330 | struct { |
331 | struct kvm_debug_exit_arch arch; |
332 | } debug; |
333 | /* KVM_EXIT_MMIO */ |
334 | struct { |
335 | __u64 phys_addr; |
336 | __u8 data[8]; |
337 | __u32 len; |
338 | __u8 is_write; |
339 | } mmio; |
340 | /* KVM_EXIT_LOONGARCH_IOCSR */ |
341 | struct { |
342 | __u64 phys_addr; |
343 | __u8 data[8]; |
344 | __u32 len; |
345 | __u8 is_write; |
346 | } iocsr_io; |
347 | /* KVM_EXIT_HYPERCALL */ |
348 | struct { |
349 | __u64 nr; |
350 | __u64 args[6]; |
351 | __u64 ret; |
352 | |
353 | union { |
354 | #ifndef __KERNEL__ |
355 | __u32 longmode; |
356 | #endif |
357 | __u64 flags; |
358 | }; |
359 | } hypercall; |
360 | /* KVM_EXIT_TPR_ACCESS */ |
361 | struct { |
362 | __u64 rip; |
363 | __u32 is_write; |
364 | __u32 pad; |
365 | } tpr_access; |
366 | /* KVM_EXIT_S390_SIEIC */ |
367 | struct { |
368 | __u8 icptcode; |
369 | __u16 ipa; |
370 | __u32 ipb; |
371 | } s390_sieic; |
372 | /* KVM_EXIT_S390_RESET */ |
373 | #define KVM_S390_RESET_POR 1 |
374 | #define KVM_S390_RESET_CLEAR 2 |
375 | #define KVM_S390_RESET_SUBSYSTEM 4 |
376 | #define KVM_S390_RESET_CPU_INIT 8 |
377 | #define KVM_S390_RESET_IPL 16 |
378 | __u64 s390_reset_flags; |
379 | /* KVM_EXIT_S390_UCONTROL */ |
380 | struct { |
381 | __u64 trans_exc_code; |
382 | __u32 pgm_code; |
383 | } s390_ucontrol; |
384 | /* KVM_EXIT_DCR (deprecated) */ |
385 | struct { |
386 | __u32 dcrn; |
387 | __u32 data; |
388 | __u8 is_write; |
389 | } dcr; |
390 | /* KVM_EXIT_INTERNAL_ERROR */ |
391 | struct { |
392 | __u32 suberror; |
393 | /* Available with KVM_CAP_INTERNAL_ERROR_DATA: */ |
394 | __u32 ndata; |
395 | __u64 data[16]; |
396 | } internal; |
397 | /* |
398 | * KVM_INTERNAL_ERROR_EMULATION |
399 | * |
400 | * "struct emulation_failure" is an overlay of "struct internal" |
401 | * that is used for the KVM_INTERNAL_ERROR_EMULATION sub-type of |
402 | * KVM_EXIT_INTERNAL_ERROR. Note, unlike other internal error |
403 | * sub-types, this struct is ABI! It also needs to be backwards |
404 | * compatible with "struct internal". Take special care that |
405 | * "ndata" is correct, that new fields are enumerated in "flags", |
406 | * and that each flag enumerates fields that are 64-bit aligned |
407 | * and sized (so that ndata+internal.data[] is valid/accurate). |
408 | * |
409 | * Space beyond the defined fields may be used to store arbitrary |
410 | * debug information relating to the emulation failure. It is |
411 | * accounted for in "ndata" but the format is unspecified and is |
412 | * not represented in "flags". Any such information is *not* ABI! |
413 | */ |
414 | struct { |
415 | __u32 suberror; |
416 | __u32 ndata; |
417 | __u64 flags; |
418 | union { |
419 | struct { |
420 | __u8 insn_size; |
421 | __u8 insn_bytes[15]; |
422 | }; |
423 | }; |
424 | /* Arbitrary debug data may follow. */ |
425 | } emulation_failure; |
426 | /* KVM_EXIT_OSI */ |
427 | struct { |
428 | __u64 gprs[32]; |
429 | } osi; |
430 | /* KVM_EXIT_PAPR_HCALL */ |
431 | struct { |
432 | __u64 nr; |
433 | __u64 ret; |
434 | __u64 args[9]; |
435 | } papr_hcall; |
436 | /* KVM_EXIT_S390_TSCH */ |
437 | struct { |
438 | __u16 subchannel_id; |
439 | __u16 subchannel_nr; |
440 | __u32 io_int_parm; |
441 | __u32 io_int_word; |
442 | __u32 ipb; |
443 | __u8 dequeued; |
444 | } s390_tsch; |
445 | /* KVM_EXIT_EPR */ |
446 | struct { |
447 | __u32 epr; |
448 | } epr; |
449 | /* KVM_EXIT_SYSTEM_EVENT */ |
450 | struct { |
451 | #define KVM_SYSTEM_EVENT_SHUTDOWN 1 |
452 | #define KVM_SYSTEM_EVENT_RESET 2 |
453 | #define KVM_SYSTEM_EVENT_CRASH 3 |
454 | #define KVM_SYSTEM_EVENT_WAKEUP 4 |
455 | #define KVM_SYSTEM_EVENT_SUSPEND 5 |
456 | #define KVM_SYSTEM_EVENT_SEV_TERM 6 |
457 | __u32 type; |
458 | __u32 ndata; |
459 | union { |
460 | #ifndef __KERNEL__ |
461 | __u64 flags; |
462 | #endif |
463 | __u64 data[16]; |
464 | }; |
465 | } system_event; |
466 | /* KVM_EXIT_S390_STSI */ |
467 | struct { |
468 | __u64 addr; |
469 | __u8 ar; |
470 | __u8 reserved; |
471 | __u8 fc; |
472 | __u8 sel1; |
473 | __u16 sel2; |
474 | } s390_stsi; |
475 | /* KVM_EXIT_IOAPIC_EOI */ |
476 | struct { |
477 | __u8 vector; |
478 | } eoi; |
479 | /* KVM_EXIT_HYPERV */ |
480 | struct kvm_hyperv_exit hyperv; |
481 | /* KVM_EXIT_ARM_NISV */ |
482 | struct { |
483 | __u64 esr_iss; |
484 | __u64 fault_ipa; |
485 | } arm_nisv; |
486 | /* KVM_EXIT_X86_RDMSR / KVM_EXIT_X86_WRMSR */ |
487 | struct { |
488 | __u8 error; /* user -> kernel */ |
489 | __u8 pad[7]; |
490 | #define KVM_MSR_EXIT_REASON_INVAL (1 << 0) |
491 | #define KVM_MSR_EXIT_REASON_UNKNOWN (1 << 1) |
492 | #define KVM_MSR_EXIT_REASON_FILTER (1 << 2) |
493 | #define KVM_MSR_EXIT_REASON_VALID_MASK (KVM_MSR_EXIT_REASON_INVAL | \ |
494 | KVM_MSR_EXIT_REASON_UNKNOWN | \ |
495 | KVM_MSR_EXIT_REASON_FILTER) |
496 | __u32 reason; /* kernel -> user */ |
497 | __u32 index; /* kernel -> user */ |
498 | __u64 data; /* kernel <-> user */ |
499 | } msr; |
500 | /* KVM_EXIT_XEN */ |
501 | struct kvm_xen_exit xen; |
502 | /* KVM_EXIT_RISCV_SBI */ |
503 | struct { |
504 | unsigned long extension_id; |
505 | unsigned long function_id; |
506 | unsigned long args[6]; |
507 | unsigned long ret[2]; |
508 | } riscv_sbi; |
509 | /* KVM_EXIT_RISCV_CSR */ |
510 | struct { |
511 | unsigned long csr_num; |
512 | unsigned long new_value; |
513 | unsigned long write_mask; |
514 | unsigned long ret_value; |
515 | } riscv_csr; |
516 | /* KVM_EXIT_NOTIFY */ |
517 | struct { |
518 | #define KVM_NOTIFY_CONTEXT_INVALID (1 << 0) |
519 | __u32 flags; |
520 | } notify; |
521 | /* Fix the size of the union. */ |
522 | char padding[256]; |
523 | }; |
524 | |
525 | /* 2048 is the size of the char array used to bound/pad the size |
526 | * of the union that holds sync regs. |
527 | */ |
528 | #define SYNC_REGS_SIZE_BYTES 2048 |
529 | /* |
530 | * shared registers between kvm and userspace. |
531 | * kvm_valid_regs specifies the register classes set by the host |
532 | * kvm_dirty_regs specified the register classes dirtied by userspace |
533 | * struct kvm_sync_regs is architecture specific, as well as the |
534 | * bits for kvm_valid_regs and kvm_dirty_regs |
535 | */ |
536 | __u64 kvm_valid_regs; |
537 | __u64 kvm_dirty_regs; |
538 | union { |
539 | struct kvm_sync_regs regs; |
540 | char padding[SYNC_REGS_SIZE_BYTES]; |
541 | } s; |
542 | }; |
543 | |
544 | /* for KVM_REGISTER_COALESCED_MMIO / KVM_UNREGISTER_COALESCED_MMIO */ |
545 | |
546 | struct kvm_coalesced_mmio_zone { |
547 | __u64 addr; |
548 | __u32 size; |
549 | union { |
550 | __u32 pad; |
551 | __u32 pio; |
552 | }; |
553 | }; |
554 | |
555 | struct kvm_coalesced_mmio { |
556 | __u64 phys_addr; |
557 | __u32 len; |
558 | union { |
559 | __u32 pad; |
560 | __u32 pio; |
561 | }; |
562 | __u8 data[8]; |
563 | }; |
564 | |
565 | struct kvm_coalesced_mmio_ring { |
566 | __u32 first, last; |
567 | struct kvm_coalesced_mmio coalesced_mmio[]; |
568 | }; |
569 | |
570 | #define KVM_COALESCED_MMIO_MAX \ |
571 | ((PAGE_SIZE - sizeof(struct kvm_coalesced_mmio_ring)) / \ |
572 | sizeof(struct kvm_coalesced_mmio)) |
573 | |
574 | /* for KVM_TRANSLATE */ |
575 | struct kvm_translation { |
576 | /* in */ |
577 | __u64 linear_address; |
578 | |
579 | /* out */ |
580 | __u64 physical_address; |
581 | __u8 valid; |
582 | __u8 writeable; |
583 | __u8 usermode; |
584 | __u8 pad[5]; |
585 | }; |
586 | |
587 | /* for KVM_S390_MEM_OP */ |
588 | struct kvm_s390_mem_op { |
589 | /* in */ |
590 | __u64 gaddr; /* the guest address */ |
591 | __u64 flags; /* flags */ |
592 | __u32 size; /* amount of bytes */ |
593 | __u32 op; /* type of operation */ |
594 | __u64 buf; /* buffer in userspace */ |
595 | union { |
596 | struct { |
597 | __u8 ar; /* the access register number */ |
598 | __u8 key; /* access key, ignored if flag unset */ |
599 | __u8 pad1[6]; /* ignored */ |
600 | __u64 old_addr; /* ignored if cmpxchg flag unset */ |
601 | }; |
602 | __u32 sida_offset; /* offset into the sida */ |
603 | __u8 reserved[32]; /* ignored */ |
604 | }; |
605 | }; |
606 | /* types for kvm_s390_mem_op->op */ |
607 | #define KVM_S390_MEMOP_LOGICAL_READ 0 |
608 | #define KVM_S390_MEMOP_LOGICAL_WRITE 1 |
609 | #define KVM_S390_MEMOP_SIDA_READ 2 |
610 | #define KVM_S390_MEMOP_SIDA_WRITE 3 |
611 | #define KVM_S390_MEMOP_ABSOLUTE_READ 4 |
612 | #define KVM_S390_MEMOP_ABSOLUTE_WRITE 5 |
613 | #define KVM_S390_MEMOP_ABSOLUTE_CMPXCHG 6 |
614 | |
615 | /* flags for kvm_s390_mem_op->flags */ |
616 | #define KVM_S390_MEMOP_F_CHECK_ONLY (1ULL << 0) |
617 | #define KVM_S390_MEMOP_F_INJECT_EXCEPTION (1ULL << 1) |
618 | #define KVM_S390_MEMOP_F_SKEY_PROTECTION (1ULL << 2) |
619 | |
620 | /* flags specifying extension support via KVM_CAP_S390_MEM_OP_EXTENSION */ |
621 | #define KVM_S390_MEMOP_EXTENSION_CAP_BASE (1 << 0) |
622 | #define KVM_S390_MEMOP_EXTENSION_CAP_CMPXCHG (1 << 1) |
623 | |
624 | /* for KVM_INTERRUPT */ |
625 | struct kvm_interrupt { |
626 | /* in */ |
627 | __u32 irq; |
628 | }; |
629 | |
630 | /* for KVM_GET_DIRTY_LOG */ |
631 | struct kvm_dirty_log { |
632 | __u32 slot; |
633 | __u32 padding1; |
634 | union { |
635 | void __user *dirty_bitmap; /* one bit per page */ |
636 | __u64 padding2; |
637 | }; |
638 | }; |
639 | |
640 | /* for KVM_CLEAR_DIRTY_LOG */ |
641 | struct kvm_clear_dirty_log { |
642 | __u32 slot; |
643 | __u32 num_pages; |
644 | __u64 first_page; |
645 | union { |
646 | void __user *dirty_bitmap; /* one bit per page */ |
647 | __u64 padding2; |
648 | }; |
649 | }; |
650 | |
651 | /* for KVM_SET_SIGNAL_MASK */ |
652 | struct kvm_signal_mask { |
653 | __u32 len; |
654 | __u8 sigset[]; |
655 | }; |
656 | |
657 | /* for KVM_TPR_ACCESS_REPORTING */ |
658 | struct kvm_tpr_access_ctl { |
659 | __u32 enabled; |
660 | __u32 flags; |
661 | __u32 reserved[8]; |
662 | }; |
663 | |
664 | /* for KVM_SET_VAPIC_ADDR */ |
665 | struct kvm_vapic_addr { |
666 | __u64 vapic_addr; |
667 | }; |
668 | |
669 | /* for KVM_SET_MP_STATE */ |
670 | |
671 | /* not all states are valid on all architectures */ |
672 | #define KVM_MP_STATE_RUNNABLE 0 |
673 | #define KVM_MP_STATE_UNINITIALIZED 1 |
674 | #define KVM_MP_STATE_INIT_RECEIVED 2 |
675 | #define KVM_MP_STATE_HALTED 3 |
676 | #define KVM_MP_STATE_SIPI_RECEIVED 4 |
677 | #define KVM_MP_STATE_STOPPED 5 |
678 | #define KVM_MP_STATE_CHECK_STOP 6 |
679 | #define KVM_MP_STATE_OPERATING 7 |
680 | #define KVM_MP_STATE_LOAD 8 |
681 | #define KVM_MP_STATE_AP_RESET_HOLD 9 |
682 | #define KVM_MP_STATE_SUSPENDED 10 |
683 | |
684 | struct kvm_mp_state { |
685 | __u32 mp_state; |
686 | }; |
687 | |
688 | struct kvm_s390_psw { |
689 | __u64 mask; |
690 | __u64 addr; |
691 | }; |
692 | |
693 | /* valid values for type in kvm_s390_interrupt */ |
694 | #define KVM_S390_SIGP_STOP 0xfffe0000u |
695 | #define KVM_S390_PROGRAM_INT 0xfffe0001u |
696 | #define KVM_S390_SIGP_SET_PREFIX 0xfffe0002u |
697 | #define KVM_S390_RESTART 0xfffe0003u |
698 | #define KVM_S390_INT_PFAULT_INIT 0xfffe0004u |
699 | #define KVM_S390_INT_PFAULT_DONE 0xfffe0005u |
700 | #define KVM_S390_MCHK 0xfffe1000u |
701 | #define KVM_S390_INT_CLOCK_COMP 0xffff1004u |
702 | #define KVM_S390_INT_CPU_TIMER 0xffff1005u |
703 | #define KVM_S390_INT_VIRTIO 0xffff2603u |
704 | #define KVM_S390_INT_SERVICE 0xffff2401u |
705 | #define KVM_S390_INT_EMERGENCY 0xffff1201u |
706 | #define KVM_S390_INT_EXTERNAL_CALL 0xffff1202u |
707 | /* Anything below 0xfffe0000u is taken by INT_IO */ |
708 | #define KVM_S390_INT_IO(ai,cssid,ssid,schid) \ |
709 | (((schid)) | \ |
710 | ((ssid) << 16) | \ |
711 | ((cssid) << 18) | \ |
712 | ((ai) << 26)) |
713 | #define KVM_S390_INT_IO_MIN 0x00000000u |
714 | #define KVM_S390_INT_IO_MAX 0xfffdffffu |
715 | #define KVM_S390_INT_IO_AI_MASK 0x04000000u |
716 | |
717 | |
718 | struct kvm_s390_interrupt { |
719 | __u32 type; |
720 | __u32 parm; |
721 | __u64 parm64; |
722 | }; |
723 | |
724 | struct kvm_s390_io_info { |
725 | __u16 subchannel_id; |
726 | __u16 subchannel_nr; |
727 | __u32 io_int_parm; |
728 | __u32 io_int_word; |
729 | }; |
730 | |
731 | struct kvm_s390_ext_info { |
732 | __u32 ext_params; |
733 | __u32 pad; |
734 | __u64 ext_params2; |
735 | }; |
736 | |
737 | struct kvm_s390_pgm_info { |
738 | __u64 trans_exc_code; |
739 | __u64 mon_code; |
740 | __u64 per_address; |
741 | __u32 data_exc_code; |
742 | __u16 code; |
743 | __u16 mon_class_nr; |
744 | __u8 per_code; |
745 | __u8 per_atmid; |
746 | __u8 exc_access_id; |
747 | __u8 per_access_id; |
748 | __u8 op_access_id; |
749 | #define KVM_S390_PGM_FLAGS_ILC_VALID 0x01 |
750 | #define KVM_S390_PGM_FLAGS_ILC_0 0x02 |
751 | #define KVM_S390_PGM_FLAGS_ILC_1 0x04 |
752 | #define KVM_S390_PGM_FLAGS_ILC_MASK 0x06 |
753 | #define KVM_S390_PGM_FLAGS_NO_REWIND 0x08 |
754 | __u8 flags; |
755 | __u8 pad[2]; |
756 | }; |
757 | |
758 | struct kvm_s390_prefix_info { |
759 | __u32 address; |
760 | }; |
761 | |
762 | struct kvm_s390_extcall_info { |
763 | __u16 code; |
764 | }; |
765 | |
766 | struct kvm_s390_emerg_info { |
767 | __u16 code; |
768 | }; |
769 | |
770 | #define KVM_S390_STOP_FLAG_STORE_STATUS 0x01 |
771 | struct kvm_s390_stop_info { |
772 | __u32 flags; |
773 | }; |
774 | |
775 | struct kvm_s390_mchk_info { |
776 | __u64 cr14; |
777 | __u64 mcic; |
778 | __u64 failing_storage_address; |
779 | __u32 ext_damage_code; |
780 | __u32 pad; |
781 | __u8 fixed_logout[16]; |
782 | }; |
783 | |
784 | struct kvm_s390_irq { |
785 | __u64 type; |
786 | union { |
787 | struct kvm_s390_io_info io; |
788 | struct kvm_s390_ext_info ext; |
789 | struct kvm_s390_pgm_info pgm; |
790 | struct kvm_s390_emerg_info emerg; |
791 | struct kvm_s390_extcall_info extcall; |
792 | struct kvm_s390_prefix_info prefix; |
793 | struct kvm_s390_stop_info stop; |
794 | struct kvm_s390_mchk_info mchk; |
795 | char reserved[64]; |
796 | } u; |
797 | }; |
798 | |
799 | struct kvm_s390_irq_state { |
800 | __u64 buf; |
801 | __u32 flags; /* will stay unused for compatibility reasons */ |
802 | __u32 len; |
803 | __u32 reserved[4]; /* will stay unused for compatibility reasons */ |
804 | }; |
805 | |
806 | /* for KVM_SET_GUEST_DEBUG */ |
807 | |
808 | #define KVM_GUESTDBG_ENABLE 0x00000001 |
809 | #define KVM_GUESTDBG_SINGLESTEP 0x00000002 |
810 | |
811 | struct kvm_guest_debug { |
812 | __u32 control; |
813 | __u32 pad; |
814 | struct kvm_guest_debug_arch arch; |
815 | }; |
816 | |
817 | enum { |
818 | kvm_ioeventfd_flag_nr_datamatch, |
819 | kvm_ioeventfd_flag_nr_pio, |
820 | kvm_ioeventfd_flag_nr_deassign, |
821 | kvm_ioeventfd_flag_nr_virtio_ccw_notify, |
822 | kvm_ioeventfd_flag_nr_fast_mmio, |
823 | kvm_ioeventfd_flag_nr_max, |
824 | }; |
825 | |
826 | #define KVM_IOEVENTFD_FLAG_DATAMATCH (1 << kvm_ioeventfd_flag_nr_datamatch) |
827 | #define KVM_IOEVENTFD_FLAG_PIO (1 << kvm_ioeventfd_flag_nr_pio) |
828 | #define KVM_IOEVENTFD_FLAG_DEASSIGN (1 << kvm_ioeventfd_flag_nr_deassign) |
829 | #define KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY \ |
830 | (1 << kvm_ioeventfd_flag_nr_virtio_ccw_notify) |
831 | |
832 | #define KVM_IOEVENTFD_VALID_FLAG_MASK ((1 << kvm_ioeventfd_flag_nr_max) - 1) |
833 | |
834 | struct kvm_ioeventfd { |
835 | __u64 datamatch; |
836 | __u64 addr; /* legal pio/mmio address */ |
837 | __u32 len; /* 1, 2, 4, or 8 bytes; or 0 to ignore length */ |
838 | __s32 fd; |
839 | __u32 flags; |
840 | __u8 pad[36]; |
841 | }; |
842 | |
843 | #define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0) |
844 | #define KVM_X86_DISABLE_EXITS_HLT (1 << 1) |
845 | #define KVM_X86_DISABLE_EXITS_PAUSE (1 << 2) |
846 | #define KVM_X86_DISABLE_EXITS_CSTATE (1 << 3) |
847 | #define KVM_X86_DISABLE_VALID_EXITS (KVM_X86_DISABLE_EXITS_MWAIT | \ |
848 | KVM_X86_DISABLE_EXITS_HLT | \ |
849 | KVM_X86_DISABLE_EXITS_PAUSE | \ |
850 | KVM_X86_DISABLE_EXITS_CSTATE) |
851 | |
852 | /* for KVM_ENABLE_CAP */ |
853 | struct kvm_enable_cap { |
854 | /* in */ |
855 | __u32 cap; |
856 | __u32 flags; |
857 | __u64 args[4]; |
858 | __u8 pad[64]; |
859 | }; |
860 | |
861 | /* for KVM_PPC_GET_PVINFO */ |
862 | |
863 | #define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0) |
864 | |
865 | struct kvm_ppc_pvinfo { |
866 | /* out */ |
867 | __u32 flags; |
868 | __u32 hcall[4]; |
869 | __u8 pad[108]; |
870 | }; |
871 | |
872 | /* for KVM_PPC_GET_SMMU_INFO */ |
873 | #define KVM_PPC_PAGE_SIZES_MAX_SZ 8 |
874 | |
875 | struct kvm_ppc_one_page_size { |
876 | __u32 page_shift; /* Page shift (or 0) */ |
877 | __u32 pte_enc; /* Encoding in the HPTE (>>12) */ |
878 | }; |
879 | |
880 | struct kvm_ppc_one_seg_page_size { |
881 | __u32 page_shift; /* Base page shift of segment (or 0) */ |
882 | __u32 slb_enc; /* SLB encoding for BookS */ |
883 | struct kvm_ppc_one_page_size enc[KVM_PPC_PAGE_SIZES_MAX_SZ]; |
884 | }; |
885 | |
886 | #define KVM_PPC_PAGE_SIZES_REAL 0x00000001 |
887 | #define KVM_PPC_1T_SEGMENTS 0x00000002 |
888 | #define KVM_PPC_NO_HASH 0x00000004 |
889 | |
890 | struct kvm_ppc_smmu_info { |
891 | __u64 flags; |
892 | __u32 slb_size; |
893 | __u16 data_keys; /* # storage keys supported for data */ |
894 | __u16 instr_keys; /* # storage keys supported for instructions */ |
895 | struct kvm_ppc_one_seg_page_size sps[KVM_PPC_PAGE_SIZES_MAX_SZ]; |
896 | }; |
897 | |
898 | /* for KVM_PPC_RESIZE_HPT_{PREPARE,COMMIT} */ |
899 | struct kvm_ppc_resize_hpt { |
900 | __u64 flags; |
901 | __u32 shift; |
902 | __u32 pad; |
903 | }; |
904 | |
905 | #define KVMIO 0xAE |
906 | |
907 | /* machine type bits, to be used as argument to KVM_CREATE_VM */ |
908 | #define KVM_VM_S390_UCONTROL 1 |
909 | |
910 | /* on ppc, 0 indicate default, 1 should force HV and 2 PR */ |
911 | #define KVM_VM_PPC_HV 1 |
912 | #define KVM_VM_PPC_PR 2 |
913 | |
914 | /* on MIPS, 0 indicates auto, 1 forces VZ ASE, 2 forces trap & emulate */ |
915 | #define KVM_VM_MIPS_AUTO 0 |
916 | #define KVM_VM_MIPS_VZ 1 |
917 | #define KVM_VM_MIPS_TE 2 |
918 | |
919 | #define KVM_S390_SIE_PAGE_OFFSET 1 |
920 | |
921 | /* |
922 | * On arm64, machine type can be used to request the physical |
923 | * address size for the VM. Bits[7-0] are reserved for the guest |
924 | * PA size shift (i.e, log2(PA_Size)). For backward compatibility, |
925 | * value 0 implies the default IPA size, 40bits. |
926 | */ |
927 | #define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL |
928 | #define KVM_VM_TYPE_ARM_IPA_SIZE(x) \ |
929 | ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK) |
930 | /* |
931 | * ioctls for /dev/kvm fds: |
932 | */ |
933 | #define KVM_GET_API_VERSION _IO(KVMIO, 0x00) |
934 | #define KVM_CREATE_VM _IO(KVMIO, 0x01) /* returns a VM fd */ |
935 | #define KVM_GET_MSR_INDEX_LIST _IOWR(KVMIO, 0x02, struct kvm_msr_list) |
936 | |
937 | #define KVM_S390_ENABLE_SIE _IO(KVMIO, 0x06) |
938 | /* |
939 | * Check if a kvm extension is available. Argument is extension number, |
940 | * return is 1 (yes) or 0 (no, sorry). |
941 | */ |
942 | #define KVM_CHECK_EXTENSION _IO(KVMIO, 0x03) |
943 | /* |
944 | * Get size for mmap(vcpu_fd) |
945 | */ |
946 | #define KVM_GET_VCPU_MMAP_SIZE _IO(KVMIO, 0x04) /* in bytes */ |
947 | #define KVM_GET_SUPPORTED_CPUID _IOWR(KVMIO, 0x05, struct kvm_cpuid2) |
948 | #define KVM_TRACE_ENABLE __KVM_DEPRECATED_MAIN_W_0x06 |
949 | #define KVM_TRACE_PAUSE __KVM_DEPRECATED_MAIN_0x07 |
950 | #define KVM_TRACE_DISABLE __KVM_DEPRECATED_MAIN_0x08 |
951 | #define KVM_GET_EMULATED_CPUID _IOWR(KVMIO, 0x09, struct kvm_cpuid2) |
952 | #define KVM_GET_MSR_FEATURE_INDEX_LIST _IOWR(KVMIO, 0x0a, struct kvm_msr_list) |
953 | |
954 | /* |
955 | * Extension capability list. |
956 | */ |
957 | #define KVM_CAP_IRQCHIP 0 |
958 | #define KVM_CAP_HLT 1 |
959 | #define KVM_CAP_MMU_SHADOW_CACHE_CONTROL 2 |
960 | #define KVM_CAP_USER_MEMORY 3 |
961 | #define KVM_CAP_SET_TSS_ADDR 4 |
962 | #define KVM_CAP_VAPIC 6 |
963 | #define KVM_CAP_EXT_CPUID 7 |
964 | #define KVM_CAP_CLOCKSOURCE 8 |
965 | #define KVM_CAP_NR_VCPUS 9 /* returns recommended max vcpus per vm */ |
966 | #define KVM_CAP_NR_MEMSLOTS 10 /* returns max memory slots per vm */ |
967 | #define KVM_CAP_PIT 11 |
968 | #define KVM_CAP_NOP_IO_DELAY 12 |
969 | #define KVM_CAP_PV_MMU 13 |
970 | #define KVM_CAP_MP_STATE 14 |
971 | #define KVM_CAP_COALESCED_MMIO 15 |
972 | #define KVM_CAP_SYNC_MMU 16 /* Changes to host mmap are reflected in guest */ |
973 | #define KVM_CAP_IOMMU 18 |
974 | /* Bug in KVM_SET_USER_MEMORY_REGION fixed: */ |
975 | #define KVM_CAP_DESTROY_MEMORY_REGION_WORKS 21 |
976 | #define KVM_CAP_USER_NMI 22 |
977 | #ifdef __KVM_HAVE_GUEST_DEBUG |
978 | #define KVM_CAP_SET_GUEST_DEBUG 23 |
979 | #endif |
980 | #ifdef __KVM_HAVE_PIT |
981 | #define KVM_CAP_REINJECT_CONTROL 24 |
982 | #endif |
983 | #define KVM_CAP_IRQ_ROUTING 25 |
984 | #define KVM_CAP_IRQ_INJECT_STATUS 26 |
985 | #define KVM_CAP_ASSIGN_DEV_IRQ 29 |
986 | /* Another bug in KVM_SET_USER_MEMORY_REGION fixed: */ |
987 | #define KVM_CAP_JOIN_MEMORY_REGIONS_WORKS 30 |
988 | #ifdef __KVM_HAVE_MCE |
989 | #define KVM_CAP_MCE 31 |
990 | #endif |
991 | #define KVM_CAP_IRQFD 32 |
992 | #ifdef __KVM_HAVE_PIT |
993 | #define KVM_CAP_PIT2 33 |
994 | #endif |
995 | #define KVM_CAP_SET_BOOT_CPU_ID 34 |
996 | #ifdef __KVM_HAVE_PIT_STATE2 |
997 | #define KVM_CAP_PIT_STATE2 35 |
998 | #endif |
999 | #define KVM_CAP_IOEVENTFD 36 |
1000 | #define KVM_CAP_SET_IDENTITY_MAP_ADDR 37 |
1001 | #ifdef __KVM_HAVE_XEN_HVM |
1002 | #define KVM_CAP_XEN_HVM 38 |
1003 | #endif |
1004 | #define KVM_CAP_ADJUST_CLOCK 39 |
1005 | #define KVM_CAP_INTERNAL_ERROR_DATA 40 |
1006 | #ifdef __KVM_HAVE_VCPU_EVENTS |
1007 | #define KVM_CAP_VCPU_EVENTS 41 |
1008 | #endif |
1009 | #define KVM_CAP_S390_PSW 42 |
1010 | #define KVM_CAP_PPC_SEGSTATE 43 |
1011 | #define KVM_CAP_HYPERV 44 |
1012 | #define KVM_CAP_HYPERV_VAPIC 45 |
1013 | #define KVM_CAP_HYPERV_SPIN 46 |
1014 | #define KVM_CAP_PCI_SEGMENT 47 |
1015 | #define KVM_CAP_PPC_PAIRED_SINGLES 48 |
1016 | #define KVM_CAP_INTR_SHADOW 49 |
1017 | #ifdef __KVM_HAVE_DEBUGREGS |
1018 | #define KVM_CAP_DEBUGREGS 50 |
1019 | #endif |
1020 | #define KVM_CAP_X86_ROBUST_SINGLESTEP 51 |
1021 | #define KVM_CAP_PPC_OSI 52 |
1022 | #define KVM_CAP_PPC_UNSET_IRQ 53 |
1023 | #define KVM_CAP_ENABLE_CAP 54 |
1024 | #ifdef __KVM_HAVE_XSAVE |
1025 | #define KVM_CAP_XSAVE 55 |
1026 | #endif |
1027 | #ifdef __KVM_HAVE_XCRS |
1028 | #define KVM_CAP_XCRS 56 |
1029 | #endif |
1030 | #define KVM_CAP_PPC_GET_PVINFO 57 |
1031 | #define KVM_CAP_PPC_IRQ_LEVEL 58 |
1032 | #define KVM_CAP_ASYNC_PF 59 |
1033 | #define KVM_CAP_TSC_CONTROL 60 |
1034 | #define KVM_CAP_GET_TSC_KHZ 61 |
1035 | #define KVM_CAP_PPC_BOOKE_SREGS 62 |
1036 | #define KVM_CAP_SPAPR_TCE 63 |
1037 | #define KVM_CAP_PPC_SMT 64 |
1038 | #define KVM_CAP_PPC_RMA 65 |
1039 | #define KVM_CAP_MAX_VCPUS 66 /* returns max vcpus per vm */ |
1040 | #define KVM_CAP_PPC_HIOR 67 |
1041 | #define KVM_CAP_PPC_PAPR 68 |
1042 | #define KVM_CAP_SW_TLB 69 |
1043 | #define KVM_CAP_ONE_REG 70 |
1044 | #define KVM_CAP_S390_GMAP 71 |
1045 | #define KVM_CAP_TSC_DEADLINE_TIMER 72 |
1046 | #define KVM_CAP_S390_UCONTROL 73 |
1047 | #define KVM_CAP_SYNC_REGS 74 |
1048 | #define KVM_CAP_PCI_2_3 75 |
1049 | #define KVM_CAP_KVMCLOCK_CTRL 76 |
1050 | #define KVM_CAP_SIGNAL_MSI 77 |
1051 | #define KVM_CAP_PPC_GET_SMMU_INFO 78 |
1052 | #define KVM_CAP_S390_COW 79 |
1053 | #define KVM_CAP_PPC_ALLOC_HTAB 80 |
1054 | #define KVM_CAP_READONLY_MEM 81 |
1055 | #define KVM_CAP_IRQFD_RESAMPLE 82 |
1056 | #define KVM_CAP_PPC_BOOKE_WATCHDOG 83 |
1057 | #define KVM_CAP_PPC_HTAB_FD 84 |
1058 | #define KVM_CAP_S390_CSS_SUPPORT 85 |
1059 | #define KVM_CAP_PPC_EPR 86 |
1060 | #define KVM_CAP_ARM_PSCI 87 |
1061 | #define KVM_CAP_ARM_SET_DEVICE_ADDR 88 |
1062 | #define KVM_CAP_DEVICE_CTRL 89 |
1063 | #define KVM_CAP_IRQ_MPIC 90 |
1064 | #define KVM_CAP_PPC_RTAS 91 |
1065 | #define KVM_CAP_IRQ_XICS 92 |
1066 | #define KVM_CAP_ARM_EL1_32BIT 93 |
1067 | #define KVM_CAP_SPAPR_MULTITCE 94 |
1068 | #define KVM_CAP_EXT_EMUL_CPUID 95 |
1069 | #define KVM_CAP_HYPERV_TIME 96 |
1070 | #define KVM_CAP_IOAPIC_POLARITY_IGNORED 97 |
1071 | #define KVM_CAP_ENABLE_CAP_VM 98 |
1072 | #define KVM_CAP_S390_IRQCHIP 99 |
1073 | #define KVM_CAP_IOEVENTFD_NO_LENGTH 100 |
1074 | #define KVM_CAP_VM_ATTRIBUTES 101 |
1075 | #define KVM_CAP_ARM_PSCI_0_2 102 |
1076 | #define KVM_CAP_PPC_FIXUP_HCALL 103 |
1077 | #define KVM_CAP_PPC_ENABLE_HCALL 104 |
1078 | #define KVM_CAP_CHECK_EXTENSION_VM 105 |
1079 | #define KVM_CAP_S390_USER_SIGP 106 |
1080 | #define KVM_CAP_S390_VECTOR_REGISTERS 107 |
1081 | #define KVM_CAP_S390_MEM_OP 108 |
1082 | #define KVM_CAP_S390_USER_STSI 109 |
1083 | #define KVM_CAP_S390_SKEYS 110 |
1084 | #define KVM_CAP_MIPS_FPU 111 |
1085 | #define KVM_CAP_MIPS_MSA 112 |
1086 | #define KVM_CAP_S390_INJECT_IRQ 113 |
1087 | #define KVM_CAP_S390_IRQ_STATE 114 |
1088 | #define KVM_CAP_PPC_HWRNG 115 |
1089 | #define KVM_CAP_DISABLE_QUIRKS 116 |
1090 | #define KVM_CAP_X86_SMM 117 |
1091 | #define KVM_CAP_MULTI_ADDRESS_SPACE 118 |
1092 | #define KVM_CAP_GUEST_DEBUG_HW_BPS 119 |
1093 | #define KVM_CAP_GUEST_DEBUG_HW_WPS 120 |
1094 | #define KVM_CAP_SPLIT_IRQCHIP 121 |
1095 | #define KVM_CAP_IOEVENTFD_ANY_LENGTH 122 |
1096 | #define KVM_CAP_HYPERV_SYNIC 123 |
1097 | #define KVM_CAP_S390_RI 124 |
1098 | #define KVM_CAP_SPAPR_TCE_64 125 |
1099 | #define KVM_CAP_ARM_PMU_V3 126 |
1100 | #define KVM_CAP_VCPU_ATTRIBUTES 127 |
1101 | #define KVM_CAP_MAX_VCPU_ID 128 |
1102 | #define KVM_CAP_X2APIC_API 129 |
1103 | #define KVM_CAP_S390_USER_INSTR0 130 |
1104 | #define KVM_CAP_MSI_DEVID 131 |
1105 | #define KVM_CAP_PPC_HTM 132 |
1106 | #define KVM_CAP_SPAPR_RESIZE_HPT 133 |
1107 | #define KVM_CAP_PPC_MMU_RADIX 134 |
1108 | #define KVM_CAP_PPC_MMU_HASH_V3 135 |
1109 | #define KVM_CAP_IMMEDIATE_EXIT 136 |
1110 | #define KVM_CAP_MIPS_VZ 137 |
1111 | #define KVM_CAP_MIPS_TE 138 |
1112 | #define KVM_CAP_MIPS_64BIT 139 |
1113 | #define KVM_CAP_S390_GS 140 |
1114 | #define KVM_CAP_S390_AIS 141 |
1115 | #define KVM_CAP_SPAPR_TCE_VFIO 142 |
1116 | #define KVM_CAP_X86_DISABLE_EXITS 143 |
1117 | #define KVM_CAP_ARM_USER_IRQ 144 |
1118 | #define KVM_CAP_S390_CMMA_MIGRATION 145 |
1119 | #define KVM_CAP_PPC_FWNMI 146 |
1120 | #define KVM_CAP_PPC_SMT_POSSIBLE 147 |
1121 | #define KVM_CAP_HYPERV_SYNIC2 148 |
1122 | #define KVM_CAP_HYPERV_VP_INDEX 149 |
1123 | #define KVM_CAP_S390_AIS_MIGRATION 150 |
1124 | #define KVM_CAP_PPC_GET_CPU_CHAR 151 |
1125 | #define KVM_CAP_S390_BPB 152 |
1126 | #define KVM_CAP_GET_MSR_FEATURES 153 |
1127 | #define KVM_CAP_HYPERV_EVENTFD 154 |
1128 | #define KVM_CAP_HYPERV_TLBFLUSH 155 |
1129 | #define KVM_CAP_S390_HPAGE_1M 156 |
1130 | #define KVM_CAP_NESTED_STATE 157 |
1131 | #define KVM_CAP_ARM_INJECT_SERROR_ESR 158 |
1132 | #define KVM_CAP_MSR_PLATFORM_INFO 159 |
1133 | #define KVM_CAP_PPC_NESTED_HV 160 |
1134 | #define KVM_CAP_HYPERV_SEND_IPI 161 |
1135 | #define KVM_CAP_COALESCED_PIO 162 |
1136 | #define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163 |
1137 | #define KVM_CAP_EXCEPTION_PAYLOAD 164 |
1138 | #define KVM_CAP_ARM_VM_IPA_SIZE 165 |
1139 | #define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT 166 /* Obsolete */ |
1140 | #define KVM_CAP_HYPERV_CPUID 167 |
1141 | #define KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2 168 |
1142 | #define KVM_CAP_PPC_IRQ_XIVE 169 |
1143 | #define KVM_CAP_ARM_SVE 170 |
1144 | #define KVM_CAP_ARM_PTRAUTH_ADDRESS 171 |
1145 | #define KVM_CAP_ARM_PTRAUTH_GENERIC 172 |
1146 | #define KVM_CAP_PMU_EVENT_FILTER 173 |
1147 | #define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174 |
1148 | #define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175 |
1149 | #define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176 |
1150 | #define KVM_CAP_ARM_NISV_TO_USER 177 |
1151 | #define KVM_CAP_ARM_INJECT_EXT_DABT 178 |
1152 | #define KVM_CAP_S390_VCPU_RESETS 179 |
1153 | #define KVM_CAP_S390_PROTECTED 180 |
1154 | #define KVM_CAP_PPC_SECURE_GUEST 181 |
1155 | #define KVM_CAP_HALT_POLL 182 |
1156 | #define KVM_CAP_ASYNC_PF_INT 183 |
1157 | #define KVM_CAP_LAST_CPU 184 |
1158 | #define KVM_CAP_SMALLER_MAXPHYADDR 185 |
1159 | #define KVM_CAP_S390_DIAG318 186 |
1160 | #define KVM_CAP_STEAL_TIME 187 |
1161 | #define KVM_CAP_X86_USER_SPACE_MSR 188 |
1162 | #define KVM_CAP_X86_MSR_FILTER 189 |
1163 | #define KVM_CAP_ENFORCE_PV_FEATURE_CPUID 190 |
1164 | #define KVM_CAP_SYS_HYPERV_CPUID 191 |
1165 | #define KVM_CAP_DIRTY_LOG_RING 192 |
1166 | #define KVM_CAP_X86_BUS_LOCK_EXIT 193 |
1167 | #define KVM_CAP_PPC_DAWR1 194 |
1168 | #define KVM_CAP_SET_GUEST_DEBUG2 195 |
1169 | #define KVM_CAP_SGX_ATTRIBUTE 196 |
1170 | #define KVM_CAP_VM_COPY_ENC_CONTEXT_FROM 197 |
1171 | #define KVM_CAP_PTP_KVM 198 |
1172 | #define KVM_CAP_HYPERV_ENFORCE_CPUID 199 |
1173 | #define KVM_CAP_SREGS2 200 |
1174 | #define KVM_CAP_EXIT_HYPERCALL 201 |
1175 | #define KVM_CAP_PPC_RPT_INVALIDATE 202 |
1176 | #define KVM_CAP_BINARY_STATS_FD 203 |
1177 | #define KVM_CAP_EXIT_ON_EMULATION_FAILURE 204 |
1178 | #define KVM_CAP_ARM_MTE 205 |
1179 | #define KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM 206 |
1180 | #define KVM_CAP_VM_GPA_BITS 207 |
1181 | #define KVM_CAP_XSAVE2 208 |
1182 | #define KVM_CAP_SYS_ATTRIBUTES 209 |
1183 | #define KVM_CAP_PPC_AIL_MODE_3 210 |
1184 | #define KVM_CAP_S390_MEM_OP_EXTENSION 211 |
1185 | #define KVM_CAP_PMU_CAPABILITY 212 |
1186 | #define KVM_CAP_DISABLE_QUIRKS2 213 |
1187 | #define KVM_CAP_VM_TSC_CONTROL 214 |
1188 | #define KVM_CAP_SYSTEM_EVENT_DATA 215 |
1189 | #define KVM_CAP_ARM_SYSTEM_SUSPEND 216 |
1190 | #define KVM_CAP_S390_PROTECTED_DUMP 217 |
1191 | #define KVM_CAP_X86_TRIPLE_FAULT_EVENT 218 |
1192 | #define KVM_CAP_X86_NOTIFY_VMEXIT 219 |
1193 | #define KVM_CAP_VM_DISABLE_NX_HUGE_PAGES 220 |
1194 | #define KVM_CAP_S390_ZPCI_OP 221 |
1195 | #define KVM_CAP_S390_CPU_TOPOLOGY 222 |
1196 | #define KVM_CAP_DIRTY_LOG_RING_ACQ_REL 223 |
1197 | #define KVM_CAP_S390_PROTECTED_ASYNC_DISABLE 224 |
1198 | #define KVM_CAP_DIRTY_LOG_RING_WITH_BITMAP 225 |
1199 | #define KVM_CAP_PMU_EVENT_MASKED_EVENTS 226 |
1200 | #define KVM_CAP_COUNTER_OFFSET 227 |
1201 | #define KVM_CAP_ARM_EAGER_SPLIT_CHUNK_SIZE 228 |
1202 | #define KVM_CAP_ARM_SUPPORTED_BLOCK_SIZES 229 |
1203 | #define KVM_CAP_ARM_SUPPORTED_REG_MASK_RANGES 230 |
1204 | |
1205 | #ifdef KVM_CAP_IRQ_ROUTING |
1206 | |
1207 | struct kvm_irq_routing_irqchip { |
1208 | __u32 irqchip; |
1209 | __u32 pin; |
1210 | }; |
1211 | |
1212 | struct kvm_irq_routing_msi { |
1213 | __u32 address_lo; |
1214 | __u32 address_hi; |
1215 | __u32 data; |
1216 | union { |
1217 | __u32 pad; |
1218 | __u32 devid; |
1219 | }; |
1220 | }; |
1221 | |
1222 | struct kvm_irq_routing_s390_adapter { |
1223 | __u64 ind_addr; |
1224 | __u64 summary_addr; |
1225 | __u64 ind_offset; |
1226 | __u32 summary_offset; |
1227 | __u32 adapter_id; |
1228 | }; |
1229 | |
1230 | struct kvm_irq_routing_hv_sint { |
1231 | __u32 vcpu; |
1232 | __u32 sint; |
1233 | }; |
1234 | |
1235 | struct kvm_irq_routing_xen_evtchn { |
1236 | __u32 port; |
1237 | __u32 vcpu; |
1238 | __u32 priority; |
1239 | }; |
1240 | |
1241 | #define KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL ((__u32)(-1)) |
1242 | |
1243 | /* gsi routing entry types */ |
1244 | #define KVM_IRQ_ROUTING_IRQCHIP 1 |
1245 | #define KVM_IRQ_ROUTING_MSI 2 |
1246 | #define KVM_IRQ_ROUTING_S390_ADAPTER 3 |
1247 | #define KVM_IRQ_ROUTING_HV_SINT 4 |
1248 | #define KVM_IRQ_ROUTING_XEN_EVTCHN 5 |
1249 | |
1250 | struct kvm_irq_routing_entry { |
1251 | __u32 gsi; |
1252 | __u32 type; |
1253 | __u32 flags; |
1254 | __u32 pad; |
1255 | union { |
1256 | struct kvm_irq_routing_irqchip irqchip; |
1257 | struct kvm_irq_routing_msi msi; |
1258 | struct kvm_irq_routing_s390_adapter adapter; |
1259 | struct kvm_irq_routing_hv_sint hv_sint; |
1260 | struct kvm_irq_routing_xen_evtchn xen_evtchn; |
1261 | __u32 pad[8]; |
1262 | } u; |
1263 | }; |
1264 | |
1265 | struct kvm_irq_routing { |
1266 | __u32 nr; |
1267 | __u32 flags; |
1268 | struct kvm_irq_routing_entry entries[]; |
1269 | }; |
1270 | |
1271 | #endif |
1272 | |
1273 | #ifdef KVM_CAP_MCE |
1274 | /* x86 MCE */ |
1275 | struct kvm_x86_mce { |
1276 | __u64 status; |
1277 | __u64 addr; |
1278 | __u64 misc; |
1279 | __u64 mcg_status; |
1280 | __u8 bank; |
1281 | __u8 pad1[7]; |
1282 | __u64 pad2[3]; |
1283 | }; |
1284 | #endif |
1285 | |
1286 | #ifdef KVM_CAP_XEN_HVM |
1287 | #define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0) |
1288 | #define KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL (1 << 1) |
1289 | #define KVM_XEN_HVM_CONFIG_SHARED_INFO (1 << 2) |
1290 | #define KVM_XEN_HVM_CONFIG_RUNSTATE (1 << 3) |
1291 | #define KVM_XEN_HVM_CONFIG_EVTCHN_2LEVEL (1 << 4) |
1292 | #define KVM_XEN_HVM_CONFIG_EVTCHN_SEND (1 << 5) |
1293 | #define KVM_XEN_HVM_CONFIG_RUNSTATE_UPDATE_FLAG (1 << 6) |
1294 | |
1295 | struct kvm_xen_hvm_config { |
1296 | __u32 flags; |
1297 | __u32 msr; |
1298 | __u64 blob_addr_32; |
1299 | __u64 blob_addr_64; |
1300 | __u8 blob_size_32; |
1301 | __u8 blob_size_64; |
1302 | __u8 pad2[30]; |
1303 | }; |
1304 | #endif |
1305 | |
1306 | #define KVM_IRQFD_FLAG_DEASSIGN (1 << 0) |
1307 | /* |
1308 | * Available with KVM_CAP_IRQFD_RESAMPLE |
1309 | * |
1310 | * KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies |
1311 | * the irqfd to operate in resampling mode for level triggered interrupt |
1312 | * emulation. See Documentation/virt/kvm/api.rst. |
1313 | */ |
1314 | #define KVM_IRQFD_FLAG_RESAMPLE (1 << 1) |
1315 | |
1316 | struct kvm_irqfd { |
1317 | __u32 fd; |
1318 | __u32 gsi; |
1319 | __u32 flags; |
1320 | __u32 resamplefd; |
1321 | __u8 pad[16]; |
1322 | }; |
1323 | |
1324 | /* For KVM_CAP_ADJUST_CLOCK */ |
1325 | |
1326 | /* Do not use 1, KVM_CHECK_EXTENSION returned it before we had flags. */ |
1327 | #define KVM_CLOCK_TSC_STABLE 2 |
1328 | #define KVM_CLOCK_REALTIME (1 << 2) |
1329 | #define KVM_CLOCK_HOST_TSC (1 << 3) |
1330 | |
1331 | struct kvm_clock_data { |
1332 | __u64 clock; |
1333 | __u32 flags; |
1334 | __u32 pad0; |
1335 | __u64 realtime; |
1336 | __u64 host_tsc; |
1337 | __u32 pad[4]; |
1338 | }; |
1339 | |
1340 | /* For KVM_CAP_SW_TLB */ |
1341 | |
1342 | #define KVM_MMU_FSL_BOOKE_NOHV 0 |
1343 | #define KVM_MMU_FSL_BOOKE_HV 1 |
1344 | |
1345 | struct kvm_config_tlb { |
1346 | __u64 params; |
1347 | __u64 array; |
1348 | __u32 mmu_type; |
1349 | __u32 array_len; |
1350 | }; |
1351 | |
1352 | struct kvm_dirty_tlb { |
1353 | __u64 bitmap; |
1354 | __u32 num_dirty; |
1355 | }; |
1356 | |
1357 | /* Available with KVM_CAP_ONE_REG */ |
1358 | |
1359 | #define KVM_REG_ARCH_MASK 0xff00000000000000ULL |
1360 | #define KVM_REG_GENERIC 0x0000000000000000ULL |
1361 | |
1362 | /* |
1363 | * Architecture specific registers are to be defined in arch headers and |
1364 | * ORed with the arch identifier. |
1365 | */ |
1366 | #define KVM_REG_PPC 0x1000000000000000ULL |
1367 | #define KVM_REG_X86 0x2000000000000000ULL |
1368 | #define KVM_REG_IA64 0x3000000000000000ULL |
1369 | #define KVM_REG_ARM 0x4000000000000000ULL |
1370 | #define KVM_REG_S390 0x5000000000000000ULL |
1371 | #define KVM_REG_ARM64 0x6000000000000000ULL |
1372 | #define KVM_REG_MIPS 0x7000000000000000ULL |
1373 | #define KVM_REG_RISCV 0x8000000000000000ULL |
1374 | #define KVM_REG_LOONGARCH 0x9000000000000000ULL |
1375 | |
1376 | #define KVM_REG_SIZE_SHIFT 52 |
1377 | #define KVM_REG_SIZE_MASK 0x00f0000000000000ULL |
1378 | #define KVM_REG_SIZE_U8 0x0000000000000000ULL |
1379 | #define KVM_REG_SIZE_U16 0x0010000000000000ULL |
1380 | #define KVM_REG_SIZE_U32 0x0020000000000000ULL |
1381 | #define KVM_REG_SIZE_U64 0x0030000000000000ULL |
1382 | #define KVM_REG_SIZE_U128 0x0040000000000000ULL |
1383 | #define KVM_REG_SIZE_U256 0x0050000000000000ULL |
1384 | #define KVM_REG_SIZE_U512 0x0060000000000000ULL |
1385 | #define KVM_REG_SIZE_U1024 0x0070000000000000ULL |
1386 | #define KVM_REG_SIZE_U2048 0x0080000000000000ULL |
1387 | |
1388 | struct kvm_reg_list { |
1389 | __u64 n; /* number of regs */ |
1390 | __u64 reg[]; |
1391 | }; |
1392 | |
1393 | struct kvm_one_reg { |
1394 | __u64 id; |
1395 | __u64 addr; |
1396 | }; |
1397 | |
1398 | #define KVM_MSI_VALID_DEVID (1U << 0) |
1399 | struct kvm_msi { |
1400 | __u32 address_lo; |
1401 | __u32 address_hi; |
1402 | __u32 data; |
1403 | __u32 flags; |
1404 | __u32 devid; |
1405 | __u8 pad[12]; |
1406 | }; |
1407 | |
1408 | struct kvm_arm_device_addr { |
1409 | __u64 id; |
1410 | __u64 addr; |
1411 | }; |
1412 | |
1413 | /* |
1414 | * Device control API, available with KVM_CAP_DEVICE_CTRL |
1415 | */ |
1416 | #define KVM_CREATE_DEVICE_TEST 1 |
1417 | |
1418 | struct kvm_create_device { |
1419 | __u32 type; /* in: KVM_DEV_TYPE_xxx */ |
1420 | __u32 fd; /* out: device handle */ |
1421 | __u32 flags; /* in: KVM_CREATE_DEVICE_xxx */ |
1422 | }; |
1423 | |
1424 | struct kvm_device_attr { |
1425 | __u32 flags; /* no flags currently defined */ |
1426 | __u32 group; /* device-defined */ |
1427 | __u64 attr; /* group-defined */ |
1428 | __u64 addr; /* userspace address of attr data */ |
1429 | }; |
1430 | |
1431 | #define KVM_DEV_VFIO_FILE 1 |
1432 | |
1433 | #define KVM_DEV_VFIO_FILE_ADD 1 |
1434 | #define KVM_DEV_VFIO_FILE_DEL 2 |
1435 | |
1436 | /* KVM_DEV_VFIO_GROUP aliases are for compile time uapi compatibility */ |
1437 | #define KVM_DEV_VFIO_GROUP KVM_DEV_VFIO_FILE |
1438 | |
1439 | #define KVM_DEV_VFIO_GROUP_ADD KVM_DEV_VFIO_FILE_ADD |
1440 | #define KVM_DEV_VFIO_GROUP_DEL KVM_DEV_VFIO_FILE_DEL |
1441 | #define KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE 3 |
1442 | |
1443 | enum kvm_device_type { |
1444 | KVM_DEV_TYPE_FSL_MPIC_20 = 1, |
1445 | #define KVM_DEV_TYPE_FSL_MPIC_20 KVM_DEV_TYPE_FSL_MPIC_20 |
1446 | KVM_DEV_TYPE_FSL_MPIC_42, |
1447 | #define KVM_DEV_TYPE_FSL_MPIC_42 KVM_DEV_TYPE_FSL_MPIC_42 |
1448 | KVM_DEV_TYPE_XICS, |
1449 | #define KVM_DEV_TYPE_XICS KVM_DEV_TYPE_XICS |
1450 | KVM_DEV_TYPE_VFIO, |
1451 | #define KVM_DEV_TYPE_VFIO KVM_DEV_TYPE_VFIO |
1452 | KVM_DEV_TYPE_ARM_VGIC_V2, |
1453 | #define KVM_DEV_TYPE_ARM_VGIC_V2 KVM_DEV_TYPE_ARM_VGIC_V2 |
1454 | KVM_DEV_TYPE_FLIC, |
1455 | #define KVM_DEV_TYPE_FLIC KVM_DEV_TYPE_FLIC |
1456 | KVM_DEV_TYPE_ARM_VGIC_V3, |
1457 | #define KVM_DEV_TYPE_ARM_VGIC_V3 KVM_DEV_TYPE_ARM_VGIC_V3 |
1458 | KVM_DEV_TYPE_ARM_VGIC_ITS, |
1459 | #define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS |
1460 | KVM_DEV_TYPE_XIVE, |
1461 | #define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE |
1462 | KVM_DEV_TYPE_ARM_PV_TIME, |
1463 | #define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME |
1464 | KVM_DEV_TYPE_RISCV_AIA, |
1465 | #define KVM_DEV_TYPE_RISCV_AIA KVM_DEV_TYPE_RISCV_AIA |
1466 | KVM_DEV_TYPE_MAX, |
1467 | }; |
1468 | |
1469 | struct kvm_vfio_spapr_tce { |
1470 | __s32 groupfd; |
1471 | __s32 tablefd; |
1472 | }; |
1473 | |
1474 | /* |
1475 | * KVM_CREATE_VCPU receives as a parameter the vcpu slot, and returns |
1476 | * a vcpu fd. |
1477 | */ |
1478 | #define KVM_CREATE_VCPU _IO(KVMIO, 0x41) |
1479 | #define KVM_GET_DIRTY_LOG _IOW(KVMIO, 0x42, struct kvm_dirty_log) |
1480 | #define KVM_SET_NR_MMU_PAGES _IO(KVMIO, 0x44) |
1481 | #define KVM_GET_NR_MMU_PAGES _IO(KVMIO, 0x45) /* deprecated */ |
1482 | #define KVM_SET_USER_MEMORY_REGION _IOW(KVMIO, 0x46, \ |
1483 | struct kvm_userspace_memory_region) |
1484 | #define KVM_SET_TSS_ADDR _IO(KVMIO, 0x47) |
1485 | #define KVM_SET_IDENTITY_MAP_ADDR _IOW(KVMIO, 0x48, __u64) |
1486 | |
1487 | /* enable ucontrol for s390 */ |
1488 | struct kvm_s390_ucas_mapping { |
1489 | __u64 user_addr; |
1490 | __u64 vcpu_addr; |
1491 | __u64 length; |
1492 | }; |
1493 | #define KVM_S390_UCAS_MAP _IOW(KVMIO, 0x50, struct kvm_s390_ucas_mapping) |
1494 | #define KVM_S390_UCAS_UNMAP _IOW(KVMIO, 0x51, struct kvm_s390_ucas_mapping) |
1495 | #define KVM_S390_VCPU_FAULT _IOW(KVMIO, 0x52, unsigned long) |
1496 | |
1497 | /* Device model IOC */ |
1498 | #define KVM_CREATE_IRQCHIP _IO(KVMIO, 0x60) |
1499 | #define KVM_IRQ_LINE _IOW(KVMIO, 0x61, struct kvm_irq_level) |
1500 | #define KVM_GET_IRQCHIP _IOWR(KVMIO, 0x62, struct kvm_irqchip) |
1501 | #define KVM_SET_IRQCHIP _IOR(KVMIO, 0x63, struct kvm_irqchip) |
1502 | #define KVM_CREATE_PIT _IO(KVMIO, 0x64) |
1503 | #define KVM_GET_PIT _IOWR(KVMIO, 0x65, struct kvm_pit_state) |
1504 | #define KVM_SET_PIT _IOR(KVMIO, 0x66, struct kvm_pit_state) |
1505 | #define KVM_IRQ_LINE_STATUS _IOWR(KVMIO, 0x67, struct kvm_irq_level) |
1506 | #define KVM_REGISTER_COALESCED_MMIO \ |
1507 | _IOW(KVMIO, 0x67, struct kvm_coalesced_mmio_zone) |
1508 | #define KVM_UNREGISTER_COALESCED_MMIO \ |
1509 | _IOW(KVMIO, 0x68, struct kvm_coalesced_mmio_zone) |
1510 | #define KVM_ASSIGN_PCI_DEVICE _IOR(KVMIO, 0x69, \ |
1511 | struct kvm_assigned_pci_dev) |
1512 | #define KVM_SET_GSI_ROUTING _IOW(KVMIO, 0x6a, struct kvm_irq_routing) |
1513 | /* deprecated, replaced by KVM_ASSIGN_DEV_IRQ */ |
1514 | #define KVM_ASSIGN_IRQ __KVM_DEPRECATED_VM_R_0x70 |
1515 | #define KVM_ASSIGN_DEV_IRQ _IOW(KVMIO, 0x70, struct kvm_assigned_irq) |
1516 | #define KVM_REINJECT_CONTROL _IO(KVMIO, 0x71) |
1517 | #define KVM_DEASSIGN_PCI_DEVICE _IOW(KVMIO, 0x72, \ |
1518 | struct kvm_assigned_pci_dev) |
1519 | #define KVM_ASSIGN_SET_MSIX_NR _IOW(KVMIO, 0x73, \ |
1520 | struct kvm_assigned_msix_nr) |
1521 | #define KVM_ASSIGN_SET_MSIX_ENTRY _IOW(KVMIO, 0x74, \ |
1522 | struct kvm_assigned_msix_entry) |
1523 | #define KVM_DEASSIGN_DEV_IRQ _IOW(KVMIO, 0x75, struct kvm_assigned_irq) |
1524 | #define KVM_IRQFD _IOW(KVMIO, 0x76, struct kvm_irqfd) |
1525 | #define KVM_CREATE_PIT2 _IOW(KVMIO, 0x77, struct kvm_pit_config) |
1526 | #define KVM_SET_BOOT_CPU_ID _IO(KVMIO, 0x78) |
1527 | #define KVM_IOEVENTFD _IOW(KVMIO, 0x79, struct kvm_ioeventfd) |
1528 | #define KVM_XEN_HVM_CONFIG _IOW(KVMIO, 0x7a, struct kvm_xen_hvm_config) |
1529 | #define KVM_SET_CLOCK _IOW(KVMIO, 0x7b, struct kvm_clock_data) |
1530 | #define KVM_GET_CLOCK _IOR(KVMIO, 0x7c, struct kvm_clock_data) |
1531 | /* Available with KVM_CAP_PIT_STATE2 */ |
1532 | #define KVM_GET_PIT2 _IOR(KVMIO, 0x9f, struct kvm_pit_state2) |
1533 | #define KVM_SET_PIT2 _IOW(KVMIO, 0xa0, struct kvm_pit_state2) |
1534 | /* Available with KVM_CAP_PPC_GET_PVINFO */ |
1535 | #define KVM_PPC_GET_PVINFO _IOW(KVMIO, 0xa1, struct kvm_ppc_pvinfo) |
1536 | /* Available with KVM_CAP_TSC_CONTROL for a vCPU, or with |
1537 | * KVM_CAP_VM_TSC_CONTROL to set defaults for a VM */ |
1538 | #define KVM_SET_TSC_KHZ _IO(KVMIO, 0xa2) |
1539 | #define KVM_GET_TSC_KHZ _IO(KVMIO, 0xa3) |
1540 | /* Available with KVM_CAP_PCI_2_3 */ |
1541 | #define KVM_ASSIGN_SET_INTX_MASK _IOW(KVMIO, 0xa4, \ |
1542 | struct kvm_assigned_pci_dev) |
1543 | /* Available with KVM_CAP_SIGNAL_MSI */ |
1544 | #define KVM_SIGNAL_MSI _IOW(KVMIO, 0xa5, struct kvm_msi) |
1545 | /* Available with KVM_CAP_PPC_GET_SMMU_INFO */ |
1546 | #define KVM_PPC_GET_SMMU_INFO _IOR(KVMIO, 0xa6, struct kvm_ppc_smmu_info) |
1547 | /* Available with KVM_CAP_PPC_ALLOC_HTAB */ |
1548 | #define KVM_PPC_ALLOCATE_HTAB _IOWR(KVMIO, 0xa7, __u32) |
1549 | #define KVM_CREATE_SPAPR_TCE _IOW(KVMIO, 0xa8, struct kvm_create_spapr_tce) |
1550 | #define KVM_CREATE_SPAPR_TCE_64 _IOW(KVMIO, 0xa8, \ |
1551 | struct kvm_create_spapr_tce_64) |
1552 | /* Available with KVM_CAP_RMA */ |
1553 | #define KVM_ALLOCATE_RMA _IOR(KVMIO, 0xa9, struct kvm_allocate_rma) |
1554 | /* Available with KVM_CAP_PPC_HTAB_FD */ |
1555 | #define KVM_PPC_GET_HTAB_FD _IOW(KVMIO, 0xaa, struct kvm_get_htab_fd) |
1556 | /* Available with KVM_CAP_ARM_SET_DEVICE_ADDR */ |
1557 | #define KVM_ARM_SET_DEVICE_ADDR _IOW(KVMIO, 0xab, struct kvm_arm_device_addr) |
1558 | /* Available with KVM_CAP_PPC_RTAS */ |
1559 | #define KVM_PPC_RTAS_DEFINE_TOKEN _IOW(KVMIO, 0xac, struct kvm_rtas_token_args) |
1560 | /* Available with KVM_CAP_SPAPR_RESIZE_HPT */ |
1561 | #define KVM_PPC_RESIZE_HPT_PREPARE _IOR(KVMIO, 0xad, struct kvm_ppc_resize_hpt) |
1562 | #define KVM_PPC_RESIZE_HPT_COMMIT _IOR(KVMIO, 0xae, struct kvm_ppc_resize_hpt) |
1563 | /* Available with KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3 */ |
1564 | #define KVM_PPC_CONFIGURE_V3_MMU _IOW(KVMIO, 0xaf, struct kvm_ppc_mmuv3_cfg) |
1565 | /* Available with KVM_CAP_PPC_RADIX_MMU */ |
1566 | #define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info) |
1567 | /* Available with KVM_CAP_PPC_GET_CPU_CHAR */ |
1568 | #define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char) |
1569 | /* Available with KVM_CAP_PMU_EVENT_FILTER */ |
1570 | #define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter) |
1571 | #define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3) |
1572 | #define KVM_ARM_MTE_COPY_TAGS _IOR(KVMIO, 0xb4, struct kvm_arm_copy_mte_tags) |
1573 | /* Available with KVM_CAP_COUNTER_OFFSET */ |
1574 | #define KVM_ARM_SET_COUNTER_OFFSET _IOW(KVMIO, 0xb5, struct kvm_arm_counter_offset) |
1575 | #define KVM_ARM_GET_REG_WRITABLE_MASKS _IOR(KVMIO, 0xb6, struct reg_mask_range) |
1576 | |
1577 | /* ioctl for vm fd */ |
1578 | #define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device) |
1579 | |
1580 | /* ioctls for fds returned by KVM_CREATE_DEVICE */ |
1581 | #define KVM_SET_DEVICE_ATTR _IOW(KVMIO, 0xe1, struct kvm_device_attr) |
1582 | #define KVM_GET_DEVICE_ATTR _IOW(KVMIO, 0xe2, struct kvm_device_attr) |
1583 | #define KVM_HAS_DEVICE_ATTR _IOW(KVMIO, 0xe3, struct kvm_device_attr) |
1584 | |
1585 | /* |
1586 | * ioctls for vcpu fds |
1587 | */ |
1588 | #define KVM_RUN _IO(KVMIO, 0x80) |
1589 | #define KVM_GET_REGS _IOR(KVMIO, 0x81, struct kvm_regs) |
1590 | #define KVM_SET_REGS _IOW(KVMIO, 0x82, struct kvm_regs) |
1591 | #define KVM_GET_SREGS _IOR(KVMIO, 0x83, struct kvm_sregs) |
1592 | #define KVM_SET_SREGS _IOW(KVMIO, 0x84, struct kvm_sregs) |
1593 | #define KVM_TRANSLATE _IOWR(KVMIO, 0x85, struct kvm_translation) |
1594 | #define KVM_INTERRUPT _IOW(KVMIO, 0x86, struct kvm_interrupt) |
1595 | /* KVM_DEBUG_GUEST is no longer supported, use KVM_SET_GUEST_DEBUG instead */ |
1596 | #define KVM_DEBUG_GUEST __KVM_DEPRECATED_VCPU_W_0x87 |
1597 | #define KVM_GET_MSRS _IOWR(KVMIO, 0x88, struct kvm_msrs) |
1598 | #define KVM_SET_MSRS _IOW(KVMIO, 0x89, struct kvm_msrs) |
1599 | #define KVM_SET_CPUID _IOW(KVMIO, 0x8a, struct kvm_cpuid) |
1600 | #define KVM_SET_SIGNAL_MASK _IOW(KVMIO, 0x8b, struct kvm_signal_mask) |
1601 | #define KVM_GET_FPU _IOR(KVMIO, 0x8c, struct kvm_fpu) |
1602 | #define KVM_SET_FPU _IOW(KVMIO, 0x8d, struct kvm_fpu) |
1603 | #define KVM_GET_LAPIC _IOR(KVMIO, 0x8e, struct kvm_lapic_state) |
1604 | #define KVM_SET_LAPIC _IOW(KVMIO, 0x8f, struct kvm_lapic_state) |
1605 | #define KVM_SET_CPUID2 _IOW(KVMIO, 0x90, struct kvm_cpuid2) |
1606 | #define KVM_GET_CPUID2 _IOWR(KVMIO, 0x91, struct kvm_cpuid2) |
1607 | /* Available with KVM_CAP_VAPIC */ |
1608 | #define KVM_TPR_ACCESS_REPORTING _IOWR(KVMIO, 0x92, struct kvm_tpr_access_ctl) |
1609 | /* Available with KVM_CAP_VAPIC */ |
1610 | #define KVM_SET_VAPIC_ADDR _IOW(KVMIO, 0x93, struct kvm_vapic_addr) |
1611 | /* valid for virtual machine (for floating interrupt)_and_ vcpu */ |
1612 | #define KVM_S390_INTERRUPT _IOW(KVMIO, 0x94, struct kvm_s390_interrupt) |
1613 | /* store status for s390 */ |
1614 | #define KVM_S390_STORE_STATUS_NOADDR (-1ul) |
1615 | #define KVM_S390_STORE_STATUS_PREFIXED (-2ul) |
1616 | #define KVM_S390_STORE_STATUS _IOW(KVMIO, 0x95, unsigned long) |
1617 | /* initial ipl psw for s390 */ |
1618 | #define KVM_S390_SET_INITIAL_PSW _IOW(KVMIO, 0x96, struct kvm_s390_psw) |
1619 | /* initial reset for s390 */ |
1620 | #define KVM_S390_INITIAL_RESET _IO(KVMIO, 0x97) |
1621 | #define KVM_GET_MP_STATE _IOR(KVMIO, 0x98, struct kvm_mp_state) |
1622 | #define KVM_SET_MP_STATE _IOW(KVMIO, 0x99, struct kvm_mp_state) |
1623 | /* Available with KVM_CAP_USER_NMI */ |
1624 | #define KVM_NMI _IO(KVMIO, 0x9a) |
1625 | /* Available with KVM_CAP_SET_GUEST_DEBUG */ |
1626 | #define KVM_SET_GUEST_DEBUG _IOW(KVMIO, 0x9b, struct kvm_guest_debug) |
1627 | /* MCE for x86 */ |
1628 | #define KVM_X86_SETUP_MCE _IOW(KVMIO, 0x9c, __u64) |
1629 | #define KVM_X86_GET_MCE_CAP_SUPPORTED _IOR(KVMIO, 0x9d, __u64) |
1630 | #define KVM_X86_SET_MCE _IOW(KVMIO, 0x9e, struct kvm_x86_mce) |
1631 | /* Available with KVM_CAP_VCPU_EVENTS */ |
1632 | #define KVM_GET_VCPU_EVENTS _IOR(KVMIO, 0x9f, struct kvm_vcpu_events) |
1633 | #define KVM_SET_VCPU_EVENTS _IOW(KVMIO, 0xa0, struct kvm_vcpu_events) |
1634 | /* Available with KVM_CAP_DEBUGREGS */ |
1635 | #define KVM_GET_DEBUGREGS _IOR(KVMIO, 0xa1, struct kvm_debugregs) |
1636 | #define KVM_SET_DEBUGREGS _IOW(KVMIO, 0xa2, struct kvm_debugregs) |
1637 | /* |
1638 | * vcpu version available with KVM_CAP_ENABLE_CAP |
1639 | * vm version available with KVM_CAP_ENABLE_CAP_VM |
1640 | */ |
1641 | #define KVM_ENABLE_CAP _IOW(KVMIO, 0xa3, struct kvm_enable_cap) |
1642 | /* Available with KVM_CAP_XSAVE */ |
1643 | #define KVM_GET_XSAVE _IOR(KVMIO, 0xa4, struct kvm_xsave) |
1644 | #define KVM_SET_XSAVE _IOW(KVMIO, 0xa5, struct kvm_xsave) |
1645 | /* Available with KVM_CAP_XCRS */ |
1646 | #define KVM_GET_XCRS _IOR(KVMIO, 0xa6, struct kvm_xcrs) |
1647 | #define KVM_SET_XCRS _IOW(KVMIO, 0xa7, struct kvm_xcrs) |
1648 | /* Available with KVM_CAP_SW_TLB */ |
1649 | #define KVM_DIRTY_TLB _IOW(KVMIO, 0xaa, struct kvm_dirty_tlb) |
1650 | /* Available with KVM_CAP_ONE_REG */ |
1651 | #define KVM_GET_ONE_REG _IOW(KVMIO, 0xab, struct kvm_one_reg) |
1652 | #define KVM_SET_ONE_REG _IOW(KVMIO, 0xac, struct kvm_one_reg) |
1653 | /* VM is being stopped by host */ |
1654 | #define KVM_KVMCLOCK_CTRL _IO(KVMIO, 0xad) |
1655 | #define KVM_ARM_VCPU_INIT _IOW(KVMIO, 0xae, struct kvm_vcpu_init) |
1656 | #define KVM_ARM_PREFERRED_TARGET _IOR(KVMIO, 0xaf, struct kvm_vcpu_init) |
1657 | #define KVM_GET_REG_LIST _IOWR(KVMIO, 0xb0, struct kvm_reg_list) |
1658 | /* Available with KVM_CAP_S390_MEM_OP */ |
1659 | #define KVM_S390_MEM_OP _IOW(KVMIO, 0xb1, struct kvm_s390_mem_op) |
1660 | /* Available with KVM_CAP_S390_SKEYS */ |
1661 | #define KVM_S390_GET_SKEYS _IOW(KVMIO, 0xb2, struct kvm_s390_skeys) |
1662 | #define KVM_S390_SET_SKEYS _IOW(KVMIO, 0xb3, struct kvm_s390_skeys) |
1663 | /* Available with KVM_CAP_S390_INJECT_IRQ */ |
1664 | #define KVM_S390_IRQ _IOW(KVMIO, 0xb4, struct kvm_s390_irq) |
1665 | /* Available with KVM_CAP_S390_IRQ_STATE */ |
1666 | #define KVM_S390_SET_IRQ_STATE _IOW(KVMIO, 0xb5, struct kvm_s390_irq_state) |
1667 | #define KVM_S390_GET_IRQ_STATE _IOW(KVMIO, 0xb6, struct kvm_s390_irq_state) |
1668 | /* Available with KVM_CAP_X86_SMM */ |
1669 | #define KVM_SMI _IO(KVMIO, 0xb7) |
1670 | /* Available with KVM_CAP_S390_CMMA_MIGRATION */ |
1671 | #define KVM_S390_GET_CMMA_BITS _IOWR(KVMIO, 0xb8, struct kvm_s390_cmma_log) |
1672 | #define KVM_S390_SET_CMMA_BITS _IOW(KVMIO, 0xb9, struct kvm_s390_cmma_log) |
1673 | /* Memory Encryption Commands */ |
1674 | #define KVM_MEMORY_ENCRYPT_OP _IOWR(KVMIO, 0xba, unsigned long) |
1675 | |
1676 | struct kvm_enc_region { |
1677 | __u64 addr; |
1678 | __u64 size; |
1679 | }; |
1680 | |
1681 | #define KVM_MEMORY_ENCRYPT_REG_REGION _IOR(KVMIO, 0xbb, struct kvm_enc_region) |
1682 | #define KVM_MEMORY_ENCRYPT_UNREG_REGION _IOR(KVMIO, 0xbc, struct kvm_enc_region) |
1683 | |
1684 | /* Available with KVM_CAP_HYPERV_EVENTFD */ |
1685 | #define KVM_HYPERV_EVENTFD _IOW(KVMIO, 0xbd, struct kvm_hyperv_eventfd) |
1686 | |
1687 | /* Available with KVM_CAP_NESTED_STATE */ |
1688 | #define KVM_GET_NESTED_STATE _IOWR(KVMIO, 0xbe, struct kvm_nested_state) |
1689 | #define KVM_SET_NESTED_STATE _IOW(KVMIO, 0xbf, struct kvm_nested_state) |
1690 | |
1691 | /* Available with KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2 */ |
1692 | #define KVM_CLEAR_DIRTY_LOG _IOWR(KVMIO, 0xc0, struct kvm_clear_dirty_log) |
1693 | |
1694 | /* Available with KVM_CAP_HYPERV_CPUID (vcpu) / KVM_CAP_SYS_HYPERV_CPUID (system) */ |
1695 | #define KVM_GET_SUPPORTED_HV_CPUID _IOWR(KVMIO, 0xc1, struct kvm_cpuid2) |
1696 | |
1697 | /* Available with KVM_CAP_ARM_SVE */ |
1698 | #define KVM_ARM_VCPU_FINALIZE _IOW(KVMIO, 0xc2, int) |
1699 | |
1700 | /* Available with KVM_CAP_S390_VCPU_RESETS */ |
1701 | #define KVM_S390_NORMAL_RESET _IO(KVMIO, 0xc3) |
1702 | #define KVM_S390_CLEAR_RESET _IO(KVMIO, 0xc4) |
1703 | |
1704 | struct kvm_s390_pv_sec_parm { |
1705 | __u64 origin; |
1706 | __u64 length; |
1707 | }; |
1708 | |
1709 | struct kvm_s390_pv_unp { |
1710 | __u64 addr; |
1711 | __u64 size; |
1712 | __u64 tweak; |
1713 | }; |
1714 | |
1715 | enum pv_cmd_dmp_id { |
1716 | KVM_PV_DUMP_INIT, |
1717 | KVM_PV_DUMP_CONFIG_STOR_STATE, |
1718 | KVM_PV_DUMP_COMPLETE, |
1719 | KVM_PV_DUMP_CPU, |
1720 | }; |
1721 | |
1722 | struct kvm_s390_pv_dmp { |
1723 | __u64 subcmd; |
1724 | __u64 buff_addr; |
1725 | __u64 buff_len; |
1726 | __u64 gaddr; /* For dump storage state */ |
1727 | __u64 reserved[4]; |
1728 | }; |
1729 | |
1730 | enum pv_cmd_info_id { |
1731 | KVM_PV_INFO_VM, |
1732 | KVM_PV_INFO_DUMP, |
1733 | }; |
1734 | |
1735 | struct kvm_s390_pv_info_dump { |
1736 | __u64 dump_cpu_buffer_len; |
1737 | __u64 dump_config_mem_buffer_per_1m; |
1738 | __u64 dump_config_finalize_len; |
1739 | }; |
1740 | |
1741 | struct kvm_s390_pv_info_vm { |
1742 | __u64 inst_calls_list[4]; |
1743 | __u64 max_cpus; |
1744 | __u64 max_guests; |
1745 | __u64 max_guest_addr; |
1746 | __u64 feature_indication; |
1747 | }; |
1748 | |
1749 | struct { |
1750 | __u32 ; |
1751 | __u32 ; |
1752 | __u32 ; |
1753 | __u32 ; |
1754 | }; |
1755 | |
1756 | struct kvm_s390_pv_info { |
1757 | struct kvm_s390_pv_info_header ; |
1758 | union { |
1759 | struct kvm_s390_pv_info_dump dump; |
1760 | struct kvm_s390_pv_info_vm vm; |
1761 | }; |
1762 | }; |
1763 | |
1764 | enum pv_cmd_id { |
1765 | KVM_PV_ENABLE, |
1766 | KVM_PV_DISABLE, |
1767 | KVM_PV_SET_SEC_PARMS, |
1768 | KVM_PV_UNPACK, |
1769 | KVM_PV_VERIFY, |
1770 | KVM_PV_PREP_RESET, |
1771 | KVM_PV_UNSHARE_ALL, |
1772 | KVM_PV_INFO, |
1773 | KVM_PV_DUMP, |
1774 | KVM_PV_ASYNC_CLEANUP_PREPARE, |
1775 | KVM_PV_ASYNC_CLEANUP_PERFORM, |
1776 | }; |
1777 | |
1778 | struct kvm_pv_cmd { |
1779 | __u32 cmd; /* Command to be executed */ |
1780 | __u16 rc; /* Ultravisor return code */ |
1781 | __u16 rrc; /* Ultravisor return reason code */ |
1782 | __u64 data; /* Data or address */ |
1783 | __u32 flags; /* flags for future extensions. Must be 0 for now */ |
1784 | __u32 reserved[3]; |
1785 | }; |
1786 | |
1787 | /* Available with KVM_CAP_S390_PROTECTED */ |
1788 | #define KVM_S390_PV_COMMAND _IOWR(KVMIO, 0xc5, struct kvm_pv_cmd) |
1789 | |
1790 | /* Available with KVM_CAP_X86_MSR_FILTER */ |
1791 | #define KVM_X86_SET_MSR_FILTER _IOW(KVMIO, 0xc6, struct kvm_msr_filter) |
1792 | |
1793 | /* Available with KVM_CAP_DIRTY_LOG_RING */ |
1794 | #define KVM_RESET_DIRTY_RINGS _IO(KVMIO, 0xc7) |
1795 | |
1796 | /* Per-VM Xen attributes */ |
1797 | #define KVM_XEN_HVM_GET_ATTR _IOWR(KVMIO, 0xc8, struct kvm_xen_hvm_attr) |
1798 | #define KVM_XEN_HVM_SET_ATTR _IOW(KVMIO, 0xc9, struct kvm_xen_hvm_attr) |
1799 | |
1800 | struct kvm_xen_hvm_attr { |
1801 | __u16 type; |
1802 | __u16 pad[3]; |
1803 | union { |
1804 | __u8 long_mode; |
1805 | __u8 vector; |
1806 | __u8 runstate_update_flag; |
1807 | struct { |
1808 | __u64 gfn; |
1809 | #define KVM_XEN_INVALID_GFN ((__u64)-1) |
1810 | } shared_info; |
1811 | struct { |
1812 | __u32 send_port; |
1813 | __u32 type; /* EVTCHNSTAT_ipi / EVTCHNSTAT_interdomain */ |
1814 | __u32 flags; |
1815 | #define KVM_XEN_EVTCHN_DEASSIGN (1 << 0) |
1816 | #define KVM_XEN_EVTCHN_UPDATE (1 << 1) |
1817 | #define KVM_XEN_EVTCHN_RESET (1 << 2) |
1818 | /* |
1819 | * Events sent by the guest are either looped back to |
1820 | * the guest itself (potentially on a different port#) |
1821 | * or signalled via an eventfd. |
1822 | */ |
1823 | union { |
1824 | struct { |
1825 | __u32 port; |
1826 | __u32 vcpu; |
1827 | __u32 priority; |
1828 | } port; |
1829 | struct { |
1830 | __u32 port; /* Zero for eventfd */ |
1831 | __s32 fd; |
1832 | } eventfd; |
1833 | __u32 padding[4]; |
1834 | } deliver; |
1835 | } evtchn; |
1836 | __u32 xen_version; |
1837 | __u64 pad[8]; |
1838 | } u; |
1839 | }; |
1840 | |
1841 | |
1842 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */ |
1843 | #define KVM_XEN_ATTR_TYPE_LONG_MODE 0x0 |
1844 | #define KVM_XEN_ATTR_TYPE_SHARED_INFO 0x1 |
1845 | #define KVM_XEN_ATTR_TYPE_UPCALL_VECTOR 0x2 |
1846 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */ |
1847 | #define KVM_XEN_ATTR_TYPE_EVTCHN 0x3 |
1848 | #define KVM_XEN_ATTR_TYPE_XEN_VERSION 0x4 |
1849 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_RUNSTATE_UPDATE_FLAG */ |
1850 | #define KVM_XEN_ATTR_TYPE_RUNSTATE_UPDATE_FLAG 0x5 |
1851 | |
1852 | /* Per-vCPU Xen attributes */ |
1853 | #define KVM_XEN_VCPU_GET_ATTR _IOWR(KVMIO, 0xca, struct kvm_xen_vcpu_attr) |
1854 | #define KVM_XEN_VCPU_SET_ATTR _IOW(KVMIO, 0xcb, struct kvm_xen_vcpu_attr) |
1855 | |
1856 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */ |
1857 | #define KVM_XEN_HVM_EVTCHN_SEND _IOW(KVMIO, 0xd0, struct kvm_irq_routing_xen_evtchn) |
1858 | |
1859 | #define KVM_GET_SREGS2 _IOR(KVMIO, 0xcc, struct kvm_sregs2) |
1860 | #define KVM_SET_SREGS2 _IOW(KVMIO, 0xcd, struct kvm_sregs2) |
1861 | |
1862 | struct kvm_xen_vcpu_attr { |
1863 | __u16 type; |
1864 | __u16 pad[3]; |
1865 | union { |
1866 | __u64 gpa; |
1867 | #define KVM_XEN_INVALID_GPA ((__u64)-1) |
1868 | __u64 pad[8]; |
1869 | struct { |
1870 | __u64 state; |
1871 | __u64 state_entry_time; |
1872 | __u64 time_running; |
1873 | __u64 time_runnable; |
1874 | __u64 time_blocked; |
1875 | __u64 time_offline; |
1876 | } runstate; |
1877 | __u32 vcpu_id; |
1878 | struct { |
1879 | __u32 port; |
1880 | __u32 priority; |
1881 | __u64 expires_ns; |
1882 | } timer; |
1883 | __u8 vector; |
1884 | } u; |
1885 | }; |
1886 | |
1887 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO */ |
1888 | #define KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO 0x0 |
1889 | #define KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO 0x1 |
1890 | #define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR 0x2 |
1891 | #define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_CURRENT 0x3 |
1892 | #define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_DATA 0x4 |
1893 | #define KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADJUST 0x5 |
1894 | /* Available with KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND */ |
1895 | #define KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID 0x6 |
1896 | #define KVM_XEN_VCPU_ATTR_TYPE_TIMER 0x7 |
1897 | #define KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR 0x8 |
1898 | |
1899 | /* Secure Encrypted Virtualization command */ |
1900 | enum sev_cmd_id { |
1901 | /* Guest initialization commands */ |
1902 | KVM_SEV_INIT = 0, |
1903 | KVM_SEV_ES_INIT, |
1904 | /* Guest launch commands */ |
1905 | KVM_SEV_LAUNCH_START, |
1906 | KVM_SEV_LAUNCH_UPDATE_DATA, |
1907 | KVM_SEV_LAUNCH_UPDATE_VMSA, |
1908 | KVM_SEV_LAUNCH_SECRET, |
1909 | KVM_SEV_LAUNCH_MEASURE, |
1910 | KVM_SEV_LAUNCH_FINISH, |
1911 | /* Guest migration commands (outgoing) */ |
1912 | KVM_SEV_SEND_START, |
1913 | KVM_SEV_SEND_UPDATE_DATA, |
1914 | KVM_SEV_SEND_UPDATE_VMSA, |
1915 | KVM_SEV_SEND_FINISH, |
1916 | /* Guest migration commands (incoming) */ |
1917 | KVM_SEV_RECEIVE_START, |
1918 | KVM_SEV_RECEIVE_UPDATE_DATA, |
1919 | KVM_SEV_RECEIVE_UPDATE_VMSA, |
1920 | KVM_SEV_RECEIVE_FINISH, |
1921 | /* Guest status and debug commands */ |
1922 | KVM_SEV_GUEST_STATUS, |
1923 | KVM_SEV_DBG_DECRYPT, |
1924 | KVM_SEV_DBG_ENCRYPT, |
1925 | /* Guest certificates commands */ |
1926 | KVM_SEV_CERT_EXPORT, |
1927 | /* Attestation report */ |
1928 | KVM_SEV_GET_ATTESTATION_REPORT, |
1929 | /* Guest Migration Extension */ |
1930 | KVM_SEV_SEND_CANCEL, |
1931 | |
1932 | KVM_SEV_NR_MAX, |
1933 | }; |
1934 | |
1935 | struct kvm_sev_cmd { |
1936 | __u32 id; |
1937 | __u64 data; |
1938 | __u32 error; |
1939 | __u32 sev_fd; |
1940 | }; |
1941 | |
1942 | struct kvm_sev_launch_start { |
1943 | __u32 handle; |
1944 | __u32 policy; |
1945 | __u64 dh_uaddr; |
1946 | __u32 dh_len; |
1947 | __u64 session_uaddr; |
1948 | __u32 session_len; |
1949 | }; |
1950 | |
1951 | struct kvm_sev_launch_update_data { |
1952 | __u64 uaddr; |
1953 | __u32 len; |
1954 | }; |
1955 | |
1956 | |
1957 | struct kvm_sev_launch_secret { |
1958 | __u64 hdr_uaddr; |
1959 | __u32 hdr_len; |
1960 | __u64 guest_uaddr; |
1961 | __u32 guest_len; |
1962 | __u64 trans_uaddr; |
1963 | __u32 trans_len; |
1964 | }; |
1965 | |
1966 | struct kvm_sev_launch_measure { |
1967 | __u64 uaddr; |
1968 | __u32 len; |
1969 | }; |
1970 | |
1971 | struct kvm_sev_guest_status { |
1972 | __u32 handle; |
1973 | __u32 policy; |
1974 | __u32 state; |
1975 | }; |
1976 | |
1977 | struct kvm_sev_dbg { |
1978 | __u64 src_uaddr; |
1979 | __u64 dst_uaddr; |
1980 | __u32 len; |
1981 | }; |
1982 | |
1983 | struct kvm_sev_attestation_report { |
1984 | __u8 mnonce[16]; |
1985 | __u64 uaddr; |
1986 | __u32 len; |
1987 | }; |
1988 | |
1989 | struct kvm_sev_send_start { |
1990 | __u32 policy; |
1991 | __u64 pdh_cert_uaddr; |
1992 | __u32 pdh_cert_len; |
1993 | __u64 plat_certs_uaddr; |
1994 | __u32 plat_certs_len; |
1995 | __u64 amd_certs_uaddr; |
1996 | __u32 amd_certs_len; |
1997 | __u64 session_uaddr; |
1998 | __u32 session_len; |
1999 | }; |
2000 | |
2001 | struct kvm_sev_send_update_data { |
2002 | __u64 hdr_uaddr; |
2003 | __u32 hdr_len; |
2004 | __u64 guest_uaddr; |
2005 | __u32 guest_len; |
2006 | __u64 trans_uaddr; |
2007 | __u32 trans_len; |
2008 | }; |
2009 | |
2010 | struct kvm_sev_receive_start { |
2011 | __u32 handle; |
2012 | __u32 policy; |
2013 | __u64 pdh_uaddr; |
2014 | __u32 pdh_len; |
2015 | __u64 session_uaddr; |
2016 | __u32 session_len; |
2017 | }; |
2018 | |
2019 | struct kvm_sev_receive_update_data { |
2020 | __u64 hdr_uaddr; |
2021 | __u32 hdr_len; |
2022 | __u64 guest_uaddr; |
2023 | __u32 guest_len; |
2024 | __u64 trans_uaddr; |
2025 | __u32 trans_len; |
2026 | }; |
2027 | |
2028 | #define KVM_DEV_ASSIGN_ENABLE_IOMMU (1 << 0) |
2029 | #define KVM_DEV_ASSIGN_PCI_2_3 (1 << 1) |
2030 | #define KVM_DEV_ASSIGN_MASK_INTX (1 << 2) |
2031 | |
2032 | struct kvm_assigned_pci_dev { |
2033 | __u32 assigned_dev_id; |
2034 | __u32 busnr; |
2035 | __u32 devfn; |
2036 | __u32 flags; |
2037 | __u32 segnr; |
2038 | union { |
2039 | __u32 reserved[11]; |
2040 | }; |
2041 | }; |
2042 | |
2043 | #define KVM_DEV_IRQ_HOST_INTX (1 << 0) |
2044 | #define KVM_DEV_IRQ_HOST_MSI (1 << 1) |
2045 | #define KVM_DEV_IRQ_HOST_MSIX (1 << 2) |
2046 | |
2047 | #define KVM_DEV_IRQ_GUEST_INTX (1 << 8) |
2048 | #define KVM_DEV_IRQ_GUEST_MSI (1 << 9) |
2049 | #define KVM_DEV_IRQ_GUEST_MSIX (1 << 10) |
2050 | |
2051 | #define KVM_DEV_IRQ_HOST_MASK 0x00ff |
2052 | #define KVM_DEV_IRQ_GUEST_MASK 0xff00 |
2053 | |
2054 | struct kvm_assigned_irq { |
2055 | __u32 assigned_dev_id; |
2056 | __u32 host_irq; /* ignored (legacy field) */ |
2057 | __u32 guest_irq; |
2058 | __u32 flags; |
2059 | union { |
2060 | __u32 reserved[12]; |
2061 | }; |
2062 | }; |
2063 | |
2064 | struct kvm_assigned_msix_nr { |
2065 | __u32 assigned_dev_id; |
2066 | __u16 entry_nr; |
2067 | __u16 padding; |
2068 | }; |
2069 | |
2070 | #define KVM_MAX_MSIX_PER_DEV 256 |
2071 | struct kvm_assigned_msix_entry { |
2072 | __u32 assigned_dev_id; |
2073 | __u32 gsi; |
2074 | __u16 entry; /* The index of entry in the MSI-X table */ |
2075 | __u16 padding[3]; |
2076 | }; |
2077 | |
2078 | #define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0) |
2079 | #define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1) |
2080 | |
2081 | /* Available with KVM_CAP_ARM_USER_IRQ */ |
2082 | |
2083 | /* Bits for run->s.regs.device_irq_level */ |
2084 | #define KVM_ARM_DEV_EL1_VTIMER (1 << 0) |
2085 | #define KVM_ARM_DEV_EL1_PTIMER (1 << 1) |
2086 | #define KVM_ARM_DEV_PMU (1 << 2) |
2087 | |
2088 | struct kvm_hyperv_eventfd { |
2089 | __u32 conn_id; |
2090 | __s32 fd; |
2091 | __u32 flags; |
2092 | __u32 padding[3]; |
2093 | }; |
2094 | |
2095 | #define KVM_HYPERV_CONN_ID_MASK 0x00ffffff |
2096 | #define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0) |
2097 | |
2098 | #define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0) |
2099 | #define KVM_DIRTY_LOG_INITIALLY_SET (1 << 1) |
2100 | |
2101 | /* |
2102 | * Arch needs to define the macro after implementing the dirty ring |
2103 | * feature. KVM_DIRTY_LOG_PAGE_OFFSET should be defined as the |
2104 | * starting page offset of the dirty ring structures. |
2105 | */ |
2106 | #ifndef KVM_DIRTY_LOG_PAGE_OFFSET |
2107 | #define KVM_DIRTY_LOG_PAGE_OFFSET 0 |
2108 | #endif |
2109 | |
2110 | /* |
2111 | * KVM dirty GFN flags, defined as: |
2112 | * |
2113 | * |---------------+---------------+--------------| |
2114 | * | bit 1 (reset) | bit 0 (dirty) | Status | |
2115 | * |---------------+---------------+--------------| |
2116 | * | 0 | 0 | Invalid GFN | |
2117 | * | 0 | 1 | Dirty GFN | |
2118 | * | 1 | X | GFN to reset | |
2119 | * |---------------+---------------+--------------| |
2120 | * |
2121 | * Lifecycle of a dirty GFN goes like: |
2122 | * |
2123 | * dirtied harvested reset |
2124 | * 00 -----------> 01 -------------> 1X -------+ |
2125 | * ^ | |
2126 | * | | |
2127 | * +------------------------------------------+ |
2128 | * |
2129 | * The userspace program is only responsible for the 01->1X state |
2130 | * conversion after harvesting an entry. Also, it must not skip any |
2131 | * dirty bits, so that dirty bits are always harvested in sequence. |
2132 | */ |
2133 | #define KVM_DIRTY_GFN_F_DIRTY _BITUL(0) |
2134 | #define KVM_DIRTY_GFN_F_RESET _BITUL(1) |
2135 | #define KVM_DIRTY_GFN_F_MASK 0x3 |
2136 | |
2137 | /* |
2138 | * KVM dirty rings should be mapped at KVM_DIRTY_LOG_PAGE_OFFSET of |
2139 | * per-vcpu mmaped regions as an array of struct kvm_dirty_gfn. The |
2140 | * size of the gfn buffer is decided by the first argument when |
2141 | * enabling KVM_CAP_DIRTY_LOG_RING. |
2142 | */ |
2143 | struct kvm_dirty_gfn { |
2144 | __u32 flags; |
2145 | __u32 slot; |
2146 | __u64 offset; |
2147 | }; |
2148 | |
2149 | #define KVM_BUS_LOCK_DETECTION_OFF (1 << 0) |
2150 | #define KVM_BUS_LOCK_DETECTION_EXIT (1 << 1) |
2151 | |
2152 | #define KVM_PMU_CAP_DISABLE (1 << 0) |
2153 | |
2154 | /** |
2155 | * struct kvm_stats_header - Header of per vm/vcpu binary statistics data. |
2156 | * @flags: Some extra information for header, always 0 for now. |
2157 | * @name_size: The size in bytes of the memory which contains statistics |
2158 | * name string including trailing '\0'. The memory is allocated |
2159 | * at the send of statistics descriptor. |
2160 | * @num_desc: The number of statistics the vm or vcpu has. |
2161 | * @id_offset: The offset of the vm/vcpu stats' id string in the file pointed |
2162 | * by vm/vcpu stats fd. |
2163 | * @desc_offset: The offset of the vm/vcpu stats' descriptor block in the file |
2164 | * pointd by vm/vcpu stats fd. |
2165 | * @data_offset: The offset of the vm/vcpu stats' data block in the file |
2166 | * pointed by vm/vcpu stats fd. |
2167 | * |
2168 | * This is the header userspace needs to read from stats fd before any other |
2169 | * readings. It is used by userspace to discover all the information about the |
2170 | * vm/vcpu's binary statistics. |
2171 | * Userspace reads this header from the start of the vm/vcpu's stats fd. |
2172 | */ |
2173 | struct { |
2174 | __u32 ; |
2175 | __u32 ; |
2176 | __u32 ; |
2177 | __u32 ; |
2178 | __u32 ; |
2179 | __u32 ; |
2180 | }; |
2181 | |
2182 | #define KVM_STATS_TYPE_SHIFT 0 |
2183 | #define KVM_STATS_TYPE_MASK (0xF << KVM_STATS_TYPE_SHIFT) |
2184 | #define KVM_STATS_TYPE_CUMULATIVE (0x0 << KVM_STATS_TYPE_SHIFT) |
2185 | #define KVM_STATS_TYPE_INSTANT (0x1 << KVM_STATS_TYPE_SHIFT) |
2186 | #define KVM_STATS_TYPE_PEAK (0x2 << KVM_STATS_TYPE_SHIFT) |
2187 | #define KVM_STATS_TYPE_LINEAR_HIST (0x3 << KVM_STATS_TYPE_SHIFT) |
2188 | #define KVM_STATS_TYPE_LOG_HIST (0x4 << KVM_STATS_TYPE_SHIFT) |
2189 | #define KVM_STATS_TYPE_MAX KVM_STATS_TYPE_LOG_HIST |
2190 | |
2191 | #define KVM_STATS_UNIT_SHIFT 4 |
2192 | #define KVM_STATS_UNIT_MASK (0xF << KVM_STATS_UNIT_SHIFT) |
2193 | #define KVM_STATS_UNIT_NONE (0x0 << KVM_STATS_UNIT_SHIFT) |
2194 | #define KVM_STATS_UNIT_BYTES (0x1 << KVM_STATS_UNIT_SHIFT) |
2195 | #define KVM_STATS_UNIT_SECONDS (0x2 << KVM_STATS_UNIT_SHIFT) |
2196 | #define KVM_STATS_UNIT_CYCLES (0x3 << KVM_STATS_UNIT_SHIFT) |
2197 | #define KVM_STATS_UNIT_BOOLEAN (0x4 << KVM_STATS_UNIT_SHIFT) |
2198 | #define KVM_STATS_UNIT_MAX KVM_STATS_UNIT_BOOLEAN |
2199 | |
2200 | #define KVM_STATS_BASE_SHIFT 8 |
2201 | #define KVM_STATS_BASE_MASK (0xF << KVM_STATS_BASE_SHIFT) |
2202 | #define KVM_STATS_BASE_POW10 (0x0 << KVM_STATS_BASE_SHIFT) |
2203 | #define KVM_STATS_BASE_POW2 (0x1 << KVM_STATS_BASE_SHIFT) |
2204 | #define KVM_STATS_BASE_MAX KVM_STATS_BASE_POW2 |
2205 | |
2206 | /** |
2207 | * struct kvm_stats_desc - Descriptor of a KVM statistics. |
2208 | * @flags: Annotations of the stats, like type, unit, etc. |
2209 | * @exponent: Used together with @flags to determine the unit. |
2210 | * @size: The number of data items for this stats. |
2211 | * Every data item is of type __u64. |
2212 | * @offset: The offset of the stats to the start of stat structure in |
2213 | * structure kvm or kvm_vcpu. |
2214 | * @bucket_size: A parameter value used for histogram stats. It is only used |
2215 | * for linear histogram stats, specifying the size of the bucket; |
2216 | * @name: The name string for the stats. Its size is indicated by the |
2217 | * &kvm_stats_header->name_size. |
2218 | */ |
2219 | struct kvm_stats_desc { |
2220 | __u32 flags; |
2221 | __s16 exponent; |
2222 | __u16 size; |
2223 | __u32 offset; |
2224 | __u32 bucket_size; |
2225 | char name[]; |
2226 | }; |
2227 | |
2228 | #define KVM_GET_STATS_FD _IO(KVMIO, 0xce) |
2229 | |
2230 | /* Available with KVM_CAP_XSAVE2 */ |
2231 | #define KVM_GET_XSAVE2 _IOR(KVMIO, 0xcf, struct kvm_xsave) |
2232 | |
2233 | /* Available with KVM_CAP_S390_PROTECTED_DUMP */ |
2234 | #define KVM_S390_PV_CPU_COMMAND _IOWR(KVMIO, 0xd0, struct kvm_pv_cmd) |
2235 | |
2236 | /* Available with KVM_CAP_X86_NOTIFY_VMEXIT */ |
2237 | #define KVM_X86_NOTIFY_VMEXIT_ENABLED (1ULL << 0) |
2238 | #define KVM_X86_NOTIFY_VMEXIT_USER (1ULL << 1) |
2239 | |
2240 | /* Available with KVM_CAP_S390_ZPCI_OP */ |
2241 | #define KVM_S390_ZPCI_OP _IOW(KVMIO, 0xd1, struct kvm_s390_zpci_op) |
2242 | |
2243 | struct kvm_s390_zpci_op { |
2244 | /* in */ |
2245 | __u32 fh; /* target device */ |
2246 | __u8 op; /* operation to perform */ |
2247 | __u8 pad[3]; |
2248 | union { |
2249 | /* for KVM_S390_ZPCIOP_REG_AEN */ |
2250 | struct { |
2251 | __u64 ibv; /* Guest addr of interrupt bit vector */ |
2252 | __u64 sb; /* Guest addr of summary bit */ |
2253 | __u32 flags; |
2254 | __u32 noi; /* Number of interrupts */ |
2255 | __u8 isc; /* Guest interrupt subclass */ |
2256 | __u8 sbo; /* Offset of guest summary bit vector */ |
2257 | __u16 pad; |
2258 | } reg_aen; |
2259 | __u64 reserved[8]; |
2260 | } u; |
2261 | }; |
2262 | |
2263 | /* types for kvm_s390_zpci_op->op */ |
2264 | #define KVM_S390_ZPCIOP_REG_AEN 0 |
2265 | #define KVM_S390_ZPCIOP_DEREG_AEN 1 |
2266 | |
2267 | /* flags for kvm_s390_zpci_op->u.reg_aen.flags */ |
2268 | #define KVM_S390_ZPCIOP_REGAEN_HOST (1 << 0) |
2269 | |
2270 | #endif /* __LINUX_KVM_H */ |
2271 | |