• Home
  • Raw
  • Download

Lines Matching full:capability

96   Capability:
102 support this ioctl, there's no capability bit to check its
124 :Capability: basic
141 :Capability: basic
181 is dependent on the CPU capability and the kernel configuration. The limit can
188 Please note that configuring the IPA size does not affect the capability
197 :Capability: basic, KVM_CAP_GET_MSR_FEATURES for KVM_GET_MSR_FEATURE_INDEX_LIST
239 :Capability: basic, KVM_CAP_CHECK_EXTENSION_VM for vm ioctl
258 :Capability: basic
272 :Capability: basic
284 :Capability: basic
312 same partition.) The KVM_CAP_PPC_SMT capability indicates the number
331 :Capability: basic
357 the KVM_CAP_MULTI_ADDRESS_SPACE capability.
361 see the description of the capability.
366 :Capability: basic
378 :Capability: basic
400 :Capability: basic
433 :Capability: basic
447 :Capability: basic
478 :Capability: basic
491 :Capability: basic
518 :Capability: basic
592 :Capability: basic
604 :Capability: basic (vcpu), KVM_CAP_GET_MSR_FEATURES (system)
644 :Capability: basic
666 :Capability: basic
701 :Capability: basic
727 :Capability: basic
756 :Capability: basic
785 :Capability: KVM_CAP_IRQCHIP, KVM_CAP_S390_IRQCHIP (s390)
800 Note that on s390 the KVM_CAP_S390_IRQCHIP vm capability needs to be enabled
807 :Capability: KVM_CAP_IRQCHIP
828 capability is present (or unless it is not using the in-kernel irqchip,
858 Note that on arm/arm64, the KVM_CAP_IRQCHIP capability only conditions
876 :Capability: KVM_CAP_IRQCHIP
901 :Capability: KVM_CAP_IRQCHIP
926 :Capability: KVM_CAP_XEN_HVM
954 :Capability: KVM_CAP_ADJUST_CLOCK
987 :Capability: KVM_CAP_ADJUST_CLOCK
1009 :Capability: KVM_CAP_VCPU_EVENTS
1128 :Capability: KVM_CAP_VCPU_EVENTS
1191 :Capability: KVM_CAP_DEBUGREGS
1213 :Capability: KVM_CAP_DEBUGREGS
1228 :Capability: KVM_CAP_USER_MEMORY
1257 KVM_CAP_MULTI_ADDRESS_SPACE capability. Slots in separate address spaces
1280 use it. The latter can be set, if KVM_CAP_READONLY_MEM capability allows it,
1284 When the KVM_CAP_SYNC_MMU capability is available, changes in the backing of
1297 :Capability: KVM_CAP_SET_TSS_ADDR
1317 :Capability: KVM_CAP_ENABLE_CAP
1323 :Capability: KVM_CAP_ENABLE_CAP_VM
1337 To check if a capability can be enabled, the KVM_CHECK_EXTENSION ioctl should
1346 The capability that is supposed to get enabled.
1372 :Capability: KVM_CAP_MP_STATE
1420 :Capability: KVM_CAP_MP_STATE
1442 :Capability: KVM_CAP_SET_IDENTITY_MAP_ADDR
1466 :Capability: KVM_CAP_SET_BOOT_CPU_ID
1480 :Capability: KVM_CAP_XSAVE
1499 :Capability: KVM_CAP_XSAVE
1518 :Capability: KVM_CAP_XCRS
1545 :Capability: KVM_CAP_XCRS
1572 :Capability: KVM_CAP_EXT_CPUID
1657 :Capability: KVM_CAP_PPC_GET_PVINFO
1687 :Capability: KVM_CAP_IRQ_ROUTING
1735 KVM_CAP_MSI_DEVID capability advertises the requirement to provide
1736 the device ID. If this capability is not available, userspace should
1762 feature of KVM_CAP_X2APIC_API capability is enabled. If it is enabled,
1785 :Capability: KVM_CAP_TSC_CONTROL
1798 :Capability: KVM_CAP_GET_TSC_KHZ
1812 :Capability: KVM_CAP_IRQCHIP
1843 :Capability: KVM_CAP_IRQCHIP
1860 regs field) depends on the state of the KVM_CAP_X2APIC_API capability.
1867 :Capability: KVM_CAP_IOEVENTFD
1913 :Capability: KVM_CAP_SW_TLB
1949 :Capability: KVM_CAP_SPAPR_TCE
1958 and provides a scatter/gather capability for PAPR virtual I/O.
1988 :Capability: KVM_CAP_PPC_RMA
2015 The KVM_CAP_PPC_RMA capability is 1 or 2 if the KVM_ALLOCATE_RMA ioctl
2024 :Capability: KVM_CAP_USER_NMI
2051 :Capability: KVM_CAP_S390_UCONTROL
2073 :Capability: KVM_CAP_S390_UCONTROL
2095 :Capability: KVM_CAP_S390_UCONTROL
2113 :Capability: KVM_CAP_ONE_REG
2552 :Capability: KVM_CAP_ONE_REG
2582 :Capability: KVM_CAP_KVMCLOCK_CTRL
2606 :Capability: KVM_CAP_SIGNAL_MSI
2628 KVM_CAP_MSI_DEVID capability advertises the requirement to provide
2629 the device ID. If this capability is not available, userspace
2637 feature of KVM_CAP_X2APIC_API capability is enabled. If it is enabled,
2645 :Capability: KVM_CAP_PIT2
2678 :Capability: KVM_CAP_PIT_STATE2
2704 :Capability: KVM_CAP_PIT_STATE2
2719 :Capability: KVM_CAP_PPC_GET_SMMU_INFO
2794 :Capability: KVM_CAP_IRQFD
2833 :Capability: KVM_CAP_PPC_ALLOC_HTAB
2842 virtualization. Otherwise the capability doesn't exist and the ioctl
2870 :Capability: basic
2925 :Capability: KVM_CAP_PPC_HTAB_FD
2980 :Capability: KVM_CAP_DEVICE_CTRL
3018 :Capability: KVM_CAP_DEVICE_CTRL, KVM_CAP_VM_ATTRIBUTES for vm device,
3053 :Capability: KVM_CAP_DEVICE_CTRL, KVM_CAP_VM_ATTRIBUTES for vm device,
3074 :Capability: basic
3160 :Capability: basic
3189 :Capability: basic
3216 :Capability: KVM_CAP_ARM_SET_DEVICE_ADDR
3265 :Capability: KVM_CAP_PPC_RTAS
3285 :Capability: KVM_CAP_SET_GUEST_DEBUG
3331 For ppc, the KVM_CAP_PPC_GUEST_DEBUG_SSTEP capability indicates whether
3341 :Capability: KVM_CAP_EXT_EMUL_CPUID
3416 :Capability: KVM_CAP_S390_MEM_OP
3452 KVM_CAP_S390_MEM_OP capability. "buf" is the buffer supplied by the
3465 :Capability: KVM_CAP_S390_SKEYS
3497 :Capability: KVM_CAP_S390_SKEYS
3525 :Capability: KVM_CAP_S390_INJECT_IRQ
3585 :Capability: KVM_CAP_S390_IRQ_STATE
3620 :Capability: KVM_CAP_S390_IRQ_STATE
3658 :Capability: KVM_CAP_X86_SMM
3669 :Capability: KVM_CAP_PPC_MULTITCE
3673 This capability means the kernel is capable of handling hypercalls
3690 This capability is always enabled.
3695 :Capability: KVM_CAP_SPAPR_TCE_64
3704 This capability uses extended struct in ioctl interface::
3728 :Capability: KVM_CAP_REINJECT_CONTROL
3755 :Capability: KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3
3789 :Capability: KVM_CAP_PPC_RADIX_MMU
3826 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
3862 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
3917 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
3962 :Capability: KVM_CAP_MCE
3975 :Capability: KVM_CAP_MCE
3982 -EINVAL if requested MCE capability is not supported.
3994 :Capability: KVM_CAP_MCE
4028 :Capability: KVM_CAP_S390_CMMA_MIGRATION
4129 :Capability: KVM_CAP_S390_CMMA_MIGRATION
4177 :Capability: KVM_CAP_PPC_GET_CPU_CHAR
4224 :Capability: basic
4241 :Capability: basic
4265 :Capability: basic
4277 :Capability: KVM_CAP_HYPERV_EVENTFD
4312 :Capability: KVM_CAP_NESTED_STATE
4386 :Capability: KVM_CAP_NESTED_STATE
4398 :Capability: KVM_CAP_COALESCED_MMIO (for coalesced mmio)
4427 :Capability: KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2
4460 the KVM_CAP_MULTI_ADDRESS_SPACE capability.
4463 is enabled; for more information, see the description of the capability.
4470 :Capability: KVM_CAP_HYPERV_CPUID
4575 :Capability: KVM_CAP_PMU_EVENT_FILTER
4609 :Capability: basic
4633 :Capability: KVM_CAP_S390_VCPU_RESETS
4645 :Capability: none
4658 :Capability: KVM_CAP_S390_VCPU_RESETS
4672 :Capability: KVM_CAP_S390_PROTECTED
4725 :Capability: KVM_X86_SET_MSR_FILTER
5270 this capability at VM creation. Once this is done, these types of errors will
5293 Used on x86 systems. When the VM capability KVM_CAP_X86_USER_SPACE_MSR is
5373 whether this is a per-vcpu or per-vm capability.
5376 what parameters are accepted by the capability.
5391 This capability enables interception of OSI hypercalls that otherwise would
5396 When this capability is enabled, KVM_EXIT_OSI can occur.
5407 This capability enables interception of PAPR hypercalls. PAPR hypercalls are
5417 When this capability is enabled, KVM_EXIT_PAPR_HCALL can occur.
5475 This capability enables support for handling of channel I/O instructions.
5480 When this capability is enabled, KVM_EXIT_S390_TSCH will occur on TEST
5483 Note that even though this capability is enabled per-vcpu, the complete
5494 This capability enables or disables the delivery of interrupts through the
5503 When this capability is enabled, KVM_EXIT_EPR can occur.
5512 This capability connects the vcpu to an in-kernel MPIC device.
5522 This capability connects the vcpu to an in-kernel XICS device.
5531 This capability enables the in-kernel irqchip for s390. Please refer to
5541 This capability allows the use of the host Floating Point Unit by the guest. It
5555 This capability allows the use of the MIPS SIMD Architecture (MSA) by the guest.
5615 This capability connects the vcpu to an in-kernel XIVE device.
5632 what parameters are accepted by the capability.
5646 This capability controls whether individual sPAPR hypercalls (hcalls)
5651 before this capability was implemented. If disabled, the kernel will
5667 This capability controls which SIGP orders will be handled completely in user
5668 space. With this capability enabled, all fast orders will be handled completely
5680 in the hardware prior to interception). If this capability is not enabled, the
5700 This capability allows post-handlers for the STSI instruction. After
5736 This capability also enables in kernel routing of interrupt requests;
5784 With this capability enabled, all illegal instructions 0x0000 (2 bytes) will
5790 This capability can be enabled dynamically even if VCPUs were already
5818 Enabling this capability on a VM provides userspace with a way to set
5823 be 0. A successful call to enable this capability will result in
5824 vsmt_mode being returned when the KVM_CAP_PPC_SMT capability is
5825 subsequently queried for the VM. This capability is only supported by
5827 The KVM_CAP_PPC_SMT_POSSIBLE capability indicates which virtual SMT
5836 With this capability a machine check exception in the guest address
5839 machine check handling routine. Without this capability KVM will
5856 Enabling this capability on a VM provides userspace with a way to no
5874 With this capability the KVM support for memory backing with 1m pages
5875 through hugetlbfs can be enabled for a VM. After the capability is
5881 this capability, the VM will not be able to run.
5889 With this capability, a guest may read the MSR_PLATFORM_INFO MSR. Otherwise,
5891 capability does not enable write permissions of this MSR for the guest.
5904 state). Enabling this capability on a VM depends on the CPU having
5914 With this capability enabled, CR2 will not be modified prior to the
5926 This capability also enables exception.pending in struct
5980 This capability indicates that KVM is running on a host that has
5988 If present, this capability can be enabled for a VM, meaning that KVM
6000 This capability overrides the kvm module parameter halt_poll_ns for the
6005 controlled by the kvm module parameter halt_poll_ns. This capability allows
6017 This capability enables trapping of #GP invoking RDMSR and WRMSR instructions
6025 this capability. With it enabled, MSR accesses that match the mask specified in
6042 This capability, if KVM_CHECK_EXTENSION indicates that it is
6046 with the KVM_CAP_PPC_ENABLE_HCALL capability.
6053 This capability, if KVM_CHECK_EXTENSION indicates that it is
6059 capability via KVM_ENABLE_CAP ioctl on the vcpu fd. Note that this
6068 This capability, if KVM_CHECK_EXTENSION indicates that it is
6078 This capability, if KVM_CHECK_EXTENSION indicates that it is
6088 This capability, if KVM_CHECK_EXTENSION on the main kvm handle indicates that
6094 If KVM_CHECK_EXTENSION on a kvm VM handle indicates that this capability is
6118 This capability, if KVM_CHECK_EXTENSION on the main kvm handle indicates that
6124 If KVM_CHECK_EXTENSION on a kvm VM handle indicates that this capability is
6132 This capability indicates the supported architecture type of the guest, i.e. the
6135 The values returned when this capability is checked by KVM_CHECK_EXTENSION on a
6160 This capability, if KVM_CHECK_EXTENSION indicates that it is available, means
6183 number larger than 0 indicating the version of this capability is implemented
6203 Querying this capability returns a bitmap indicating the possible
6213 This capability enables a newer version of Hyper-V Synthetic interrupt
6223 This capability indicates that userspace can load HV_X64_MSR_VP_INDEX msr. Its
6226 capability is absent, userspace can still query this msr's value.
6234 This capability indicates if the flic device will be able to get/set the
6243 This capability indicates that the PSW is exposed via the kvm_run structure.
6250 This capability indicates that the user space memory used as guest mapping can
6259 This capability indicates that the user space memory used as guest mapping can
6268 This capability indicates that kvm will implement the interfaces to handle
6270 facility 82 should not be provided to the guest without this capability.
6277 This capability indicates that KVM supports paravirtualized Hyper-V TLB Flush
6287 This capability indicates that userspace can specify (via the
6290 If KVM advertises this capability, userspace can only specify the ISS field for
6302 This capability indicates that KVM supports paravirtualized Hyper-V IPI send
6311 This capability indicates that KVM running on top of Hyper-V hypervisor
6315 KVM, enabling this capability effectively disables all hypercall
6326 This capability indicates that the KVM_S390_NORMAL_RESET and
6334 This capability indicates that the Ultravisor has been initialized and
6336 This capability governs the KVM_S390_PV_COMMAND ioctl and the
6345 This capability indicates that KVM supports steal time accounting.
6347 architecture-specific interfaces. This capability and the architecture-
6358 This capability enables a guest to set information about its control program
6370 If this capability is available, then the CPNC and CPVC can be synchronized
6378 This capability indicates that KVM supports deflection of MSR reads and
6389 This capability indicates that KVM supports that accesses to user defined MSRs
6390 may be rejected. With this capability exposed, KVM exports new VM ioctl