Lines Matching full:capability
96 Capability:
102 support this ioctl, there's no capability bit to check its
124 :Capability: basic
141 :Capability: basic
175 is dependent on the CPU capability and the kernel configuration. The limit can
182 Please note that configuring the IPA size does not affect the capability
191 :Capability: basic, KVM_CAP_GET_MSR_FEATURES for KVM_GET_MSR_FEATURE_INDEX_LIST
233 :Capability: basic, KVM_CAP_CHECK_EXTENSION_VM for vm ioctl
252 :Capability: basic
278 :Capability: basic
306 same partition.) The KVM_CAP_PPC_SMT capability indicates the number
325 :Capability: basic
354 see the description of the capability.
363 :Capability: basic
390 :Capability: basic
423 :Capability: basic
437 :Capability: basic
468 :Capability: basic
481 :Capability: basic
508 :Capability: basic
599 :Capability: basic
611 :Capability: basic (vcpu), KVM_CAP_GET_MSR_FEATURES (system)
651 :Capability: basic
673 :Capability: basic
713 :Capability: basic
739 :Capability: basic
768 :Capability: basic
797 :Capability: KVM_CAP_IRQCHIP, KVM_CAP_S390_IRQCHIP (s390)
812 Note that on s390 the KVM_CAP_S390_IRQCHIP vm capability needs to be enabled
819 :Capability: KVM_CAP_IRQCHIP
840 capability is present (or unless it is not using the in-kernel irqchip,
870 Note that on arm64, the KVM_CAP_IRQCHIP capability only conditions
888 :Capability: KVM_CAP_IRQCHIP
913 :Capability: KVM_CAP_IRQCHIP
938 :Capability: KVM_CAP_XEN_HVM
984 :Capability: KVM_CAP_ADJUST_CLOCK
1034 :Capability: KVM_CAP_ADJUST_CLOCK
1069 :Capability: KVM_CAP_VCPU_EVENTS
1192 :Capability: KVM_CAP_VCPU_EVENTS
1259 :Capability: KVM_CAP_DEBUGREGS
1281 :Capability: KVM_CAP_DEBUGREGS
1296 :Capability: KVM_CAP_USER_MEMORY
1325 KVM_CAP_MULTI_ADDRESS_SPACE capability. Slots in separate address spaces
1348 use it. The latter can be set, if KVM_CAP_READONLY_MEM capability allows it,
1352 When the KVM_CAP_SYNC_MMU capability is available, changes in the backing of
1369 :Capability: KVM_CAP_SET_TSS_ADDR
1389 :Capability: KVM_CAP_ENABLE_CAP
1395 :Capability: KVM_CAP_ENABLE_CAP_VM
1409 To check if a capability can be enabled, the KVM_CHECK_EXTENSION ioctl should
1418 The capability that is supposed to get enabled.
1444 :Capability: KVM_CAP_MP_STATE
1522 :Capability: KVM_CAP_MP_STATE
1544 :Capability: KVM_CAP_SET_IDENTITY_MAP_ADDR
1568 :Capability: KVM_CAP_SET_BOOT_CPU_ID
1583 :Capability: KVM_CAP_XSAVE
1603 :Capability: KVM_CAP_XSAVE and KVM_CAP_XSAVE2
1631 :Capability: KVM_CAP_XCRS
1658 :Capability: KVM_CAP_XCRS
1685 :Capability: KVM_CAP_EXT_CPUID
1774 :Capability: KVM_CAP_PPC_GET_PVINFO
1804 :Capability: KVM_CAP_IRQ_ROUTING
1854 KVM_CAP_MSI_DEVID capability advertises the requirement to provide
1855 the device ID. If this capability is not available, userspace should
1881 feature of KVM_CAP_X2APIC_API capability is enabled. If it is enabled,
1918 :Capability: KVM_CAP_TSC_CONTROL / KVM_CAP_VM_TSC_CONTROL
1927 If the KVM_CAP_VM_TSC_CONTROL capability is advertised, this can also
1934 :Capability: KVM_CAP_GET_TSC_KHZ / KVM_CAP_VM_TSC_CONTROL
1948 :Capability: KVM_CAP_IRQCHIP
1979 :Capability: KVM_CAP_IRQCHIP
1996 regs field) depends on the state of the KVM_CAP_X2APIC_API capability.
2003 :Capability: KVM_CAP_IOEVENTFD
2049 :Capability: KVM_CAP_SW_TLB
2085 :Capability: KVM_CAP_SPAPR_TCE
2094 and provides a scatter/gather capability for PAPR virtual I/O.
2124 :Capability: KVM_CAP_PPC_RMA
2151 The KVM_CAP_PPC_RMA capability is 1 or 2 if the KVM_ALLOCATE_RMA ioctl
2160 :Capability: KVM_CAP_USER_NMI
2187 :Capability: KVM_CAP_S390_UCONTROL
2209 :Capability: KVM_CAP_S390_UCONTROL
2231 :Capability: KVM_CAP_S390_UCONTROL
2249 :Capability: KVM_CAP_ONE_REG
2848 :Capability: KVM_CAP_ONE_REG
2878 :Capability: KVM_CAP_KVMCLOCK_CTRL
2902 :Capability: KVM_CAP_SIGNAL_MSI
2924 KVM_CAP_MSI_DEVID capability advertises the requirement to provide
2925 the device ID. If this capability is not available, userspace
2933 feature of KVM_CAP_X2APIC_API capability is enabled. If it is enabled,
2941 :Capability: KVM_CAP_PIT2
2974 :Capability: KVM_CAP_PIT_STATE2
3002 :Capability: KVM_CAP_PIT_STATE2
3017 :Capability: KVM_CAP_PPC_GET_SMMU_INFO
3092 :Capability: KVM_CAP_IRQFD
3131 :Capability: KVM_CAP_PPC_ALLOC_HTAB
3140 virtualization. Otherwise the capability doesn't exist and the ioctl
3168 :Capability: basic
3223 :Capability: KVM_CAP_PPC_HTAB_FD
3278 :Capability: KVM_CAP_DEVICE_CTRL
3317 :Capability: KVM_CAP_DEVICE_CTRL, KVM_CAP_VM_ATTRIBUTES for vm device,
3354 :Capability: KVM_CAP_DEVICE_CTRL, KVM_CAP_VM_ATTRIBUTES for vm device,
3376 :Capability: basic
3474 :Capability: basic
3503 :Capability: basic
3530 :Capability: KVM_CAP_ARM_SET_DEVICE_ADDR
3579 :Capability: KVM_CAP_PPC_RTAS
3599 :Capability: KVM_CAP_SET_GUEST_DEBUG
3647 For ppc, the KVM_CAP_PPC_GUEST_DEBUG_SSTEP capability indicates whether
3650 Also when supported, KVM_CAP_SET_GUEST_DEBUG2 capability indicates the
3660 :Capability: KVM_CAP_EXT_EMUL_CPUID
3735 :Capability: KVM_CAP_S390_MEM_OP, KVM_CAP_S390_PROTECTED, KVM_CAP_S390_MEM_OP_EXTENSION
3744 The KVM_CAP_S390_MEM_OP_EXTENSION capability specifies what functionality is
3770 KVM_CAP_S390_MEM_OP capability. "buf" is the buffer supplied by the
3871 SIDA accesses are available if the KVM_CAP_S390_PROTECTED capability is available.
3880 :Capability: KVM_CAP_S390_SKEYS
3912 :Capability: KVM_CAP_S390_SKEYS
3940 :Capability: KVM_CAP_S390_INJECT_IRQ
4000 :Capability: KVM_CAP_S390_IRQ_STATE
4035 :Capability: KVM_CAP_S390_IRQ_STATE
4073 :Capability: KVM_CAP_X86_SMM
4084 :Capability: KVM_CAP_X86_MSR_FILTER
4182 :Capability: KVM_CAP_SPAPR_TCE_64
4191 This capability uses extended struct in ioctl interface::
4215 :Capability: KVM_CAP_REINJECT_CONTROL
4242 :Capability: KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3
4276 :Capability: KVM_CAP_PPC_RADIX_MMU
4313 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
4367 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
4412 :Capability: KVM_CAP_MCE
4425 :Capability: KVM_CAP_MCE
4432 -EINVAL if requested MCE capability is not supported.
4444 :Capability: KVM_CAP_MCE
4478 :Capability: KVM_CAP_S390_CMMA_MIGRATION
4579 :Capability: KVM_CAP_S390_CMMA_MIGRATION
4627 :Capability: KVM_CAP_PPC_GET_CPU_CHAR
4674 :Capability: basic
4691 :Capability: basic
4715 :Capability: basic
4727 :Capability: KVM_CAP_HYPERV_EVENTFD
4762 :Capability: KVM_CAP_NESTED_STATE
4836 :Capability: KVM_CAP_NESTED_STATE
4848 :Capability: KVM_CAP_COALESCED_MMIO (for coalesced mmio)
4877 :Capability: KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2
4912 is enabled; for more information, see the description of the capability.
4919 :Capability: KVM_CAP_HYPERV_CPUID (vcpu), KVM_CAP_SYS_HYPERV_CPUID (system)
5032 :Capability: KVM_CAP_PMU_EVENT_FILTER
5079 :Capability: KVM_CAP_PMU_EVENT_MASKED_EVENTS
5130 :Capability: basic
5154 :Capability: KVM_CAP_S390_VCPU_RESETS
5166 :Capability: none
5179 :Capability: KVM_CAP_S390_VCPU_RESETS
5193 :Capability: KVM_CAP_S390_PROTECTED
5254 :Capability: KVM_CAP_S390_PROTECTED_DUMP
5319 :Capability: KVM_CAP_S390_PROTECTED_DUMP
5364 :Capability: KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
5381 :Capability: KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
5396 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO
5505 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO
5518 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO
5617 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO
5632 :Capability: KVM_CAP_ARM_MTE
5670 :Capability: KVM_CAP_SREGS2
5703 :Capability: KVM_CAP_SREGS2
5716 :Capability: KVM_CAP_STATS_BINARY_FD
5919 :Capability: KVM_CAP_XSAVE2
5946 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_EVTCHN_SEND
5966 :Capability: KVM_CAP_S390_PROTECTED_DUMP
5991 :Capability: KVM_CAP_S390_ZPCI_OP
6038 :Capability: KVM_CAP_COUNTER_OFFSET
6044 This capability indicates that userspace is able to apply a single VM-wide
6493 KVM_CAP_ARM_SYSTEM_SUSPEND VM capability. If a guest invokes the PSCI
6604 this capability at VM creation. Once this is done, these types of errors will
6626 Used on x86 systems. When the VM capability KVM_CAP_X86_USER_SPACE_MSR is
6713 Used on x86 systems. When the VM capability KVM_CAP_X86_NOTIFY_VMEXIT is
6773 whether this is a per-vcpu or per-vm capability.
6776 what parameters are accepted by the capability.
6791 This capability enables interception of OSI hypercalls that otherwise would
6796 When this capability is enabled, KVM_EXIT_OSI can occur.
6807 This capability enables interception of PAPR hypercalls. PAPR hypercalls are
6817 When this capability is enabled, KVM_EXIT_PAPR_HCALL can occur.
6875 This capability enables support for handling of channel I/O instructions.
6880 When this capability is enabled, KVM_EXIT_S390_TSCH will occur on TEST
6883 Note that even though this capability is enabled per-vcpu, the complete
6894 This capability enables or disables the delivery of interrupts through the
6903 When this capability is enabled, KVM_EXIT_EPR can occur.
6912 This capability connects the vcpu to an in-kernel MPIC device.
6922 This capability connects the vcpu to an in-kernel XICS device.
6931 This capability enables the in-kernel irqchip for s390. Please refer to
6941 This capability allows the use of the host Floating Point Unit by the guest. It
6955 This capability allows the use of the MIPS SIMD Architecture (MSA) by the guest.
7015 This capability connects the vcpu to an in-kernel XIVE device.
7032 what parameters are accepted by the capability.
7046 This capability controls whether individual sPAPR hypercalls (hcalls)
7051 before this capability was implemented. If disabled, the kernel will
7067 This capability controls which SIGP orders will be handled completely in user
7068 space. With this capability enabled, all fast orders will be handled completely
7080 in the hardware prior to interception). If this capability is not enabled, the
7100 This capability allows post-handlers for the STSI instruction. After
7136 This capability also enables in kernel routing of interrupt requests;
7184 With this capability enabled, all illegal instructions 0x0000 (2 bytes) will
7190 This capability can be enabled dynamically even if VCPUs were already
7218 Enabling this capability on a VM provides userspace with a way to set
7223 be 0. A successful call to enable this capability will result in
7224 vsmt_mode being returned when the KVM_CAP_PPC_SMT capability is
7225 subsequently queried for the VM. This capability is only supported by
7227 The KVM_CAP_PPC_SMT_POSSIBLE capability indicates which virtual SMT
7236 With this capability a machine check exception in the guest address
7239 machine check handling routine. Without this capability KVM will
7256 Enabling this capability on a VM provides userspace with a way to no
7274 With this capability the KVM support for memory backing with 1m pages
7275 through hugetlbfs can be enabled for a VM. After the capability is
7281 this capability, the VM will not be able to run.
7289 With this capability, a guest may read the MSR_PLATFORM_INFO MSR. Otherwise,
7291 capability does not enable write permissions of this MSR for the guest.
7304 state). Enabling this capability on a VM depends on the CPU having
7314 With this capability enabled, CR2 will not be modified prior to the
7326 This capability also enables exception.pending in struct
7381 This capability indicates that KVM is running on a host that has
7389 If present, this capability can be enabled for a VM, meaning that KVM
7402 maximum halt-polling time for all vCPUs in the target VM. This capability can
7417 This capability allows userspace to intercept RDMSR and WRMSR instructions if
7425 this capability. With it enabled, MSR accesses that match the mask specified in
7454 Enabling this capability on a VM provides userspace with a way to select
7470 This capability is aimed to address the thread that VM can exploit bus locks to
7472 capability and select the KVM_BUS_LOCK_DETECTION_EXIT mode, KVM will set the
7485 This capability can be used to check / enable 2nd DAWR feature provided
7497 This capability enables userspace to copy encryption context from the vm
7531 :Capability: KVM_CAP_PPC_RPT_INVALIDATE
7535 This capability indicates that the kernel is capable of handling
7543 This capability is enabled for hypervisors on platforms like POWER9
7552 When this capability is enabled, an emulation failure will result in an exit
7570 This capability indicates that KVM (and the hardware) supports exposing the
7573 available to a guest running in AArch64 mode and enabling this capability will
7581 When this capability is enabled all memory in memslots must be mapped as
7597 This capability enables userspace to migrate the encryption context from the VM
7606 :Capability: KVM_CAP_PPC_AIL_MODE_3
7610 This capability indicates that the kernel supports the mode 3 setting for the
7614 This capability allows a guest kernel to use a better-performance mode for
7620 :Capability: KVM_CAP_DISABLE_QUIRKS2
7625 This capability, if enabled, will cause KVM to disable some behavior
7628 Calling KVM_CHECK_EXTENSION for this capability returns a bitmask of
7631 The argument to KVM_ENABLE_CAP for this capability is a bitmask of
7698 This capability allows userspace to specify maximum possible APIC ID
7725 This capability allows userspace to configure the notify VM exit on/off
7735 This capability is aimed to mitigate the threat that malicious VMs can
7750 This capability, if KVM_CHECK_EXTENSION indicates that it is
7754 with the KVM_CAP_PPC_ENABLE_HCALL capability.
7761 This capability, if KVM_CHECK_EXTENSION indicates that it is
7767 capability via KVM_ENABLE_CAP ioctl on the vcpu fd. Note that this
7776 This capability, if KVM_CHECK_EXTENSION indicates that it is
7786 This capability, if KVM_CHECK_EXTENSION indicates that it is
7796 This capability, if KVM_CHECK_EXTENSION on the main kvm handle indicates that
7802 If KVM_CHECK_EXTENSION on a kvm VM handle indicates that this capability is
7826 This capability, if KVM_CHECK_EXTENSION on the main kvm handle indicates that
7832 If KVM_CHECK_EXTENSION on a kvm VM handle indicates that this capability is
7840 This capability indicates the supported architecture type of the guest, i.e. the
7843 The values returned when this capability is checked by KVM_CHECK_EXTENSION on a
7868 This capability, if KVM_CHECK_EXTENSION indicates that it is available, means
7891 number larger than 0 indicating the version of this capability is implemented
7911 Querying this capability returns a bitmap indicating the possible
7921 This capability enables a newer version of Hyper-V Synthetic interrupt
7931 This capability indicates that userspace can load HV_X64_MSR_VP_INDEX msr. Its
7934 capability is absent, userspace can still query this msr's value.
7942 This capability indicates if the flic device will be able to get/set the
7951 This capability indicates that the PSW is exposed via the kvm_run structure.
7958 This capability indicates that the user space memory used as guest mapping can
7967 This capability indicates that the user space memory used as guest mapping can
7976 This capability indicates that kvm will implement the interfaces to handle
7978 facility 82 should not be provided to the guest without this capability.
7985 This capability indicates that KVM supports paravirtualized Hyper-V TLB Flush
7995 This capability indicates that userspace can specify (via the
7998 If KVM advertises this capability, userspace can only specify the ISS field for
8010 This capability indicates that KVM supports paravirtualized Hyper-V IPI send
8019 This capability indicates that KVM running on top of Hyper-V hypervisor
8023 KVM, enabling this capability effectively disables all hypercall
8034 This capability indicates that the KVM_S390_NORMAL_RESET and
8042 This capability indicates that the Ultravisor has been initialized and
8044 This capability governs the KVM_S390_PV_COMMAND ioctl and the
8053 This capability indicates that KVM supports steal time accounting.
8055 architecture-specific interfaces. This capability and the architecture-
8066 This capability enables a guest to set information about its control program
8078 If this capability is available, then the CPNC and CPVC can be synchronized
8086 This capability indicates that KVM supports deflection of MSR reads and
8097 This capability indicates that KVM supports that accesses to user defined MSRs
8098 may be rejected. With this capability exposed, KVM exports new VM ioctl
8142 ioctl to enable this capability for the new guest and set the size of
8143 the rings. Enabling the capability is only allowed before creating any
8201 NOTE: KVM_CAP_DIRTY_LOG_RING_ACQ_REL is the only capability that
8210 capability of KVM_CAP_DIRTY_LOG_RING_WITH_BITMAP to see whether the
8211 ring structures can be backed by per-slot bitmaps. With this capability
8215 can't be enabled if the capability of KVM_CAP_DIRTY_LOG_RING_ACQ_REL
8245 This capability indicates the features that Xen supports for hosting Xen
8301 :Capability: KVM_CAP_PPC_MULTITCE
8305 This capability means the kernel is capable of handling hypercalls
8322 This capability is always enabled.
8329 This capability indicates that the KVM virtual PTP service is
8347 :Capability: KVM_CAP_EXIT_HYPERCALL
8351 This capability, if enabled, will cause KVM to exit to userspace
8354 Calling KVM_CHECK_EXTENSION for this capability will return a bitmask
8366 :Capability: KVM_CAP_PMU_CAPABILITY
8372 This capability alters PMU virtualization in KVM.
8374 Calling KVM_CHECK_EXTENSION for this capability returns a bitmask of
8381 At this time, KVM_PMU_CAP_DISABLE is the only capability. Setting
8382 this capability will disable PMU virtualization for that VM. Usermode
8388 :Capability: KVM_CAP_ARM_SYSTEM_SUSPEND
8398 :Capability: KVM_CAP_S390_PROTECTED_DUMP
8402 This capability indicates that KVM and the Ultravisor support dumping
8411 :Capability: KVM_CAP_VM_DISABLE_NX_HUGE_PAGES
8419 This capability disables the NX huge pages mitigation for iTLB MULTIHIT.
8421 The capability has no effect if the nx_huge_pages module parameter is not set.
8423 This capability may only be set before any vCPUs are created.
8428 :Capability: KVM_CAP_S390_CPU_TOPOLOGY
8432 This capability indicates that KVM will provide the S390 CPU Topology
8439 to the guest without this capability.
8441 When this capability is present, KVM provides a new attribute group
8453 :Capability: KVM_CAP_ARM_EAGER_SPLIT_CHUNK_SIZE
8459 This capability sets the chunk size used in Eager Page Splitting.