Lines Matching full:capability
96 Capability:
102 support this ioctl, there's no capability bit to check its
124 :Capability: basic
141 :Capability: basic
181 is dependent on the CPU capability and the kernel configuration. The limit can
188 Please note that configuring the IPA size does not affect the capability
197 :Capability: basic, KVM_CAP_GET_MSR_FEATURES for KVM_GET_MSR_FEATURE_INDEX_LIST
239 :Capability: basic, KVM_CAP_CHECK_EXTENSION_VM for vm ioctl
258 :Capability: basic
272 :Capability: basic
284 :Capability: basic
312 same partition.) The KVM_CAP_PPC_SMT capability indicates the number
331 :Capability: basic
357 the KVM_CAP_MULTI_ADDRESS_SPACE capability.
361 see the description of the capability.
366 :Capability: basic
378 :Capability: basic
400 :Capability: basic
433 :Capability: basic
447 :Capability: basic
478 :Capability: basic
491 :Capability: basic
518 :Capability: basic
592 :Capability: basic
604 :Capability: basic (vcpu), KVM_CAP_GET_MSR_FEATURES (system)
644 :Capability: basic
666 :Capability: basic
701 :Capability: basic
727 :Capability: basic
756 :Capability: basic
785 :Capability: KVM_CAP_IRQCHIP, KVM_CAP_S390_IRQCHIP (s390)
800 Note that on s390 the KVM_CAP_S390_IRQCHIP vm capability needs to be enabled
807 :Capability: KVM_CAP_IRQCHIP
828 capability is present (or unless it is not using the in-kernel irqchip,
858 Note that on arm/arm64, the KVM_CAP_IRQCHIP capability only conditions
876 :Capability: KVM_CAP_IRQCHIP
901 :Capability: KVM_CAP_IRQCHIP
926 :Capability: KVM_CAP_XEN_HVM
954 :Capability: KVM_CAP_ADJUST_CLOCK
987 :Capability: KVM_CAP_ADJUST_CLOCK
1009 :Capability: KVM_CAP_VCPU_EVENTS
1128 :Capability: KVM_CAP_VCPU_EVENTS
1191 :Capability: KVM_CAP_DEBUGREGS
1213 :Capability: KVM_CAP_DEBUGREGS
1228 :Capability: KVM_CAP_USER_MEMORY
1257 KVM_CAP_MULTI_ADDRESS_SPACE capability. Slots in separate address spaces
1280 use it. The latter can be set, if KVM_CAP_READONLY_MEM capability allows it,
1284 When the KVM_CAP_SYNC_MMU capability is available, changes in the backing of
1297 :Capability: KVM_CAP_SET_TSS_ADDR
1317 :Capability: KVM_CAP_ENABLE_CAP
1323 :Capability: KVM_CAP_ENABLE_CAP_VM
1337 To check if a capability can be enabled, the KVM_CHECK_EXTENSION ioctl should
1346 The capability that is supposed to get enabled.
1372 :Capability: KVM_CAP_MP_STATE
1420 :Capability: KVM_CAP_MP_STATE
1442 :Capability: KVM_CAP_SET_IDENTITY_MAP_ADDR
1466 :Capability: KVM_CAP_SET_BOOT_CPU_ID
1480 :Capability: KVM_CAP_XSAVE
1499 :Capability: KVM_CAP_XSAVE
1518 :Capability: KVM_CAP_XCRS
1545 :Capability: KVM_CAP_XCRS
1572 :Capability: KVM_CAP_EXT_CPUID
1657 :Capability: KVM_CAP_PPC_GET_PVINFO
1687 :Capability: KVM_CAP_IRQ_ROUTING
1735 KVM_CAP_MSI_DEVID capability advertises the requirement to provide
1736 the device ID. If this capability is not available, userspace should
1762 feature of KVM_CAP_X2APIC_API capability is enabled. If it is enabled,
1785 :Capability: KVM_CAP_TSC_CONTROL
1798 :Capability: KVM_CAP_GET_TSC_KHZ
1812 :Capability: KVM_CAP_IRQCHIP
1843 :Capability: KVM_CAP_IRQCHIP
1860 regs field) depends on the state of the KVM_CAP_X2APIC_API capability.
1867 :Capability: KVM_CAP_IOEVENTFD
1913 :Capability: KVM_CAP_SW_TLB
1949 :Capability: KVM_CAP_SPAPR_TCE
1958 and provides a scatter/gather capability for PAPR virtual I/O.
1988 :Capability: KVM_CAP_PPC_RMA
2015 The KVM_CAP_PPC_RMA capability is 1 or 2 if the KVM_ALLOCATE_RMA ioctl
2024 :Capability: KVM_CAP_USER_NMI
2051 :Capability: KVM_CAP_S390_UCONTROL
2073 :Capability: KVM_CAP_S390_UCONTROL
2095 :Capability: KVM_CAP_S390_UCONTROL
2113 :Capability: KVM_CAP_ONE_REG
2552 :Capability: KVM_CAP_ONE_REG
2582 :Capability: KVM_CAP_KVMCLOCK_CTRL
2606 :Capability: KVM_CAP_SIGNAL_MSI
2628 KVM_CAP_MSI_DEVID capability advertises the requirement to provide
2629 the device ID. If this capability is not available, userspace
2637 feature of KVM_CAP_X2APIC_API capability is enabled. If it is enabled,
2645 :Capability: KVM_CAP_PIT2
2678 :Capability: KVM_CAP_PIT_STATE2
2704 :Capability: KVM_CAP_PIT_STATE2
2719 :Capability: KVM_CAP_PPC_GET_SMMU_INFO
2794 :Capability: KVM_CAP_IRQFD
2833 :Capability: KVM_CAP_PPC_ALLOC_HTAB
2842 virtualization. Otherwise the capability doesn't exist and the ioctl
2870 :Capability: basic
2925 :Capability: KVM_CAP_PPC_HTAB_FD
2980 :Capability: KVM_CAP_DEVICE_CTRL
3018 :Capability: KVM_CAP_DEVICE_CTRL, KVM_CAP_VM_ATTRIBUTES for vm device,
3053 :Capability: KVM_CAP_DEVICE_CTRL, KVM_CAP_VM_ATTRIBUTES for vm device,
3074 :Capability: basic
3160 :Capability: basic
3189 :Capability: basic
3216 :Capability: KVM_CAP_ARM_SET_DEVICE_ADDR
3265 :Capability: KVM_CAP_PPC_RTAS
3285 :Capability: KVM_CAP_SET_GUEST_DEBUG
3331 For ppc, the KVM_CAP_PPC_GUEST_DEBUG_SSTEP capability indicates whether
3341 :Capability: KVM_CAP_EXT_EMUL_CPUID
3416 :Capability: KVM_CAP_S390_MEM_OP
3452 KVM_CAP_S390_MEM_OP capability. "buf" is the buffer supplied by the
3465 :Capability: KVM_CAP_S390_SKEYS
3497 :Capability: KVM_CAP_S390_SKEYS
3525 :Capability: KVM_CAP_S390_INJECT_IRQ
3585 :Capability: KVM_CAP_S390_IRQ_STATE
3620 :Capability: KVM_CAP_S390_IRQ_STATE
3658 :Capability: KVM_CAP_X86_SMM
3669 :Capability: KVM_CAP_PPC_MULTITCE
3673 This capability means the kernel is capable of handling hypercalls
3690 This capability is always enabled.
3695 :Capability: KVM_CAP_SPAPR_TCE_64
3704 This capability uses extended struct in ioctl interface::
3728 :Capability: KVM_CAP_REINJECT_CONTROL
3755 :Capability: KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3
3789 :Capability: KVM_CAP_PPC_RADIX_MMU
3826 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
3862 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
3917 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
3962 :Capability: KVM_CAP_MCE
3975 :Capability: KVM_CAP_MCE
3982 -EINVAL if requested MCE capability is not supported.
3994 :Capability: KVM_CAP_MCE
4028 :Capability: KVM_CAP_S390_CMMA_MIGRATION
4123 :Capability: KVM_CAP_S390_CMMA_MIGRATION
4171 :Capability: KVM_CAP_PPC_GET_CPU_CHAR
4218 :Capability: basic
4235 :Capability: basic
4259 :Capability: basic
4271 :Capability: KVM_CAP_HYPERV_EVENTFD
4306 :Capability: KVM_CAP_NESTED_STATE
4380 :Capability: KVM_CAP_NESTED_STATE
4392 :Capability: KVM_CAP_COALESCED_MMIO (for coalesced mmio)
4421 :Capability: KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2
4454 the KVM_CAP_MULTI_ADDRESS_SPACE capability.
4457 is enabled; for more information, see the description of the capability.
4464 :Capability: KVM_CAP_HYPERV_CPUID
4569 :Capability: KVM_CAP_PMU_EVENT_FILTER
4603 :Capability: basic
4627 :Capability: KVM_CAP_S390_VCPU_RESETS
4639 :Capability: none
4652 :Capability: KVM_CAP_S390_VCPU_RESETS
4666 :Capability: KVM_CAP_S390_PROTECTED
4719 :Capability: KVM_X86_SET_MSR_FILTER
5264 this capability at VM creation. Once this is done, these types of errors will
5287 Used on x86 systems. When the VM capability KVM_CAP_X86_USER_SPACE_MSR is
5367 whether this is a per-vcpu or per-vm capability.
5370 what parameters are accepted by the capability.
5385 This capability enables interception of OSI hypercalls that otherwise would
5390 When this capability is enabled, KVM_EXIT_OSI can occur.
5401 This capability enables interception of PAPR hypercalls. PAPR hypercalls are
5411 When this capability is enabled, KVM_EXIT_PAPR_HCALL can occur.
5469 This capability enables support for handling of channel I/O instructions.
5474 When this capability is enabled, KVM_EXIT_S390_TSCH will occur on TEST
5477 Note that even though this capability is enabled per-vcpu, the complete
5488 This capability enables or disables the delivery of interrupts through the
5497 When this capability is enabled, KVM_EXIT_EPR can occur.
5506 This capability connects the vcpu to an in-kernel MPIC device.
5516 This capability connects the vcpu to an in-kernel XICS device.
5525 This capability enables the in-kernel irqchip for s390. Please refer to
5535 This capability allows the use of the host Floating Point Unit by the guest. It
5549 This capability allows the use of the MIPS SIMD Architecture (MSA) by the guest.
5609 This capability connects the vcpu to an in-kernel XIVE device.
5626 what parameters are accepted by the capability.
5640 This capability controls whether individual sPAPR hypercalls (hcalls)
5645 before this capability was implemented. If disabled, the kernel will
5661 This capability controls which SIGP orders will be handled completely in user
5662 space. With this capability enabled, all fast orders will be handled completely
5674 in the hardware prior to interception). If this capability is not enabled, the
5694 This capability allows post-handlers for the STSI instruction. After
5730 This capability also enables in kernel routing of interrupt requests;
5778 With this capability enabled, all illegal instructions 0x0000 (2 bytes) will
5784 This capability can be enabled dynamically even if VCPUs were already
5812 Enabling this capability on a VM provides userspace with a way to set
5817 be 0. A successful call to enable this capability will result in
5818 vsmt_mode being returned when the KVM_CAP_PPC_SMT capability is
5819 subsequently queried for the VM. This capability is only supported by
5821 The KVM_CAP_PPC_SMT_POSSIBLE capability indicates which virtual SMT
5830 With this capability a machine check exception in the guest address
5833 machine check handling routine. Without this capability KVM will
5850 Enabling this capability on a VM provides userspace with a way to no
5868 With this capability the KVM support for memory backing with 1m pages
5869 through hugetlbfs can be enabled for a VM. After the capability is
5875 this capability, the VM will not be able to run.
5883 With this capability, a guest may read the MSR_PLATFORM_INFO MSR. Otherwise,
5885 capability does not enable write permissions of this MSR for the guest.
5898 state). Enabling this capability on a VM depends on the CPU having
5908 With this capability enabled, CR2 will not be modified prior to the
5920 This capability also enables exception.pending in struct
5974 This capability indicates that KVM is running on a host that has
5982 If present, this capability can be enabled for a VM, meaning that KVM
5994 This capability overrides the kvm module parameter halt_poll_ns for the
5999 controlled by the kvm module parameter halt_poll_ns. This capability allows
6011 This capability enables trapping of #GP invoking RDMSR and WRMSR instructions
6019 this capability. With it enabled, MSR accesses that match the mask specified in
6036 This capability, if KVM_CHECK_EXTENSION indicates that it is
6040 with the KVM_CAP_PPC_ENABLE_HCALL capability.
6047 This capability, if KVM_CHECK_EXTENSION indicates that it is
6053 capability via KVM_ENABLE_CAP ioctl on the vcpu fd. Note that this
6062 This capability, if KVM_CHECK_EXTENSION indicates that it is
6072 This capability, if KVM_CHECK_EXTENSION indicates that it is
6082 This capability, if KVM_CHECK_EXTENSION on the main kvm handle indicates that
6088 If KVM_CHECK_EXTENSION on a kvm VM handle indicates that this capability is
6112 This capability, if KVM_CHECK_EXTENSION on the main kvm handle indicates that
6118 If KVM_CHECK_EXTENSION on a kvm VM handle indicates that this capability is
6126 This capability indicates the supported architecture type of the guest, i.e. the
6129 The values returned when this capability is checked by KVM_CHECK_EXTENSION on a
6154 This capability, if KVM_CHECK_EXTENSION indicates that it is available, means
6177 number larger than 0 indicating the version of this capability is implemented
6197 Querying this capability returns a bitmap indicating the possible
6207 This capability enables a newer version of Hyper-V Synthetic interrupt
6217 This capability indicates that userspace can load HV_X64_MSR_VP_INDEX msr. Its
6220 capability is absent, userspace can still query this msr's value.
6228 This capability indicates if the flic device will be able to get/set the
6237 This capability indicates that the PSW is exposed via the kvm_run structure.
6244 This capability indicates that the user space memory used as guest mapping can
6253 This capability indicates that the user space memory used as guest mapping can
6262 This capability indicates that kvm will implement the interfaces to handle
6264 facility 82 should not be provided to the guest without this capability.
6271 This capability indicates that KVM supports paravirtualized Hyper-V TLB Flush
6281 This capability indicates that userspace can specify (via the
6284 If KVM advertises this capability, userspace can only specify the ISS field for
6296 This capability indicates that KVM supports paravirtualized Hyper-V IPI send
6305 This capability indicates that KVM running on top of Hyper-V hypervisor
6309 KVM, enabling this capability effectively disables all hypercall
6320 This capability indicates that the KVM_S390_NORMAL_RESET and
6328 This capability indicates that the Ultravisor has been initialized and
6330 This capability governs the KVM_S390_PV_COMMAND ioctl and the
6339 This capability indicates that KVM supports steal time accounting.
6341 architecture-specific interfaces. This capability and the architecture-
6352 This capability enables a guest to set information about its control program
6364 If this capability is available, then the CPNC and CPVC can be synchronized
6372 This capability indicates that KVM supports deflection of MSR reads and
6383 This capability indicates that KVM supports that accesses to user defined MSRs
6384 may be rejected. With this capability exposed, KVM exports new VM ioctl