Lines Matching full:capability

96   Capability:
102 support this ioctl, there's no capability bit to check its
124 :Capability: basic
141 :Capability: basic
181 is dependent on the CPU capability and the kernel configuration. The limit can
188 Please note that configuring the IPA size does not affect the capability
197 :Capability: basic, KVM_CAP_GET_MSR_FEATURES for KVM_GET_MSR_FEATURE_INDEX_LIST
239 :Capability: basic, KVM_CAP_CHECK_EXTENSION_VM for vm ioctl
258 :Capability: basic
284 :Capability: basic
296 :Capability: basic
324 same partition.) The KVM_CAP_PPC_SMT capability indicates the number
343 :Capability: basic
372 see the description of the capability.
377 :Capability: basic
389 :Capability: basic
416 :Capability: basic
449 :Capability: basic
463 :Capability: basic
494 :Capability: basic
507 :Capability: basic
534 :Capability: basic
608 :Capability: basic
620 :Capability: basic (vcpu), KVM_CAP_GET_MSR_FEATURES (system)
660 :Capability: basic
682 :Capability: basic
722 :Capability: basic
748 :Capability: basic
777 :Capability: basic
806 :Capability: KVM_CAP_IRQCHIP, KVM_CAP_S390_IRQCHIP (s390)
821 Note that on s390 the KVM_CAP_S390_IRQCHIP vm capability needs to be enabled
828 :Capability: KVM_CAP_IRQCHIP
849 capability is present (or unless it is not using the in-kernel irqchip,
879 Note that on arm/arm64, the KVM_CAP_IRQCHIP capability only conditions
897 :Capability: KVM_CAP_IRQCHIP
922 :Capability: KVM_CAP_IRQCHIP
947 :Capability: KVM_CAP_XEN_HVM
983 :Capability: KVM_CAP_ADJUST_CLOCK
1016 :Capability: KVM_CAP_ADJUST_CLOCK
1038 :Capability: KVM_CAP_VCPU_EVENTS
1157 :Capability: KVM_CAP_VCPU_EVENTS
1220 :Capability: KVM_CAP_DEBUGREGS
1242 :Capability: KVM_CAP_DEBUGREGS
1257 :Capability: KVM_CAP_USER_MEMORY
1286 KVM_CAP_MULTI_ADDRESS_SPACE capability. Slots in separate address spaces
1309 use it. The latter can be set, if KVM_CAP_READONLY_MEM capability allows it,
1313 When the KVM_CAP_SYNC_MMU capability is available, changes in the backing of
1326 :Capability: KVM_CAP_SET_TSS_ADDR
1346 :Capability: KVM_CAP_ENABLE_CAP
1352 :Capability: KVM_CAP_ENABLE_CAP_VM
1366 To check if a capability can be enabled, the KVM_CHECK_EXTENSION ioctl should
1375 The capability that is supposed to get enabled.
1401 :Capability: KVM_CAP_MP_STATE
1449 :Capability: KVM_CAP_MP_STATE
1471 :Capability: KVM_CAP_SET_IDENTITY_MAP_ADDR
1495 :Capability: KVM_CAP_SET_BOOT_CPU_ID
1510 :Capability: KVM_CAP_XSAVE
1529 :Capability: KVM_CAP_XSAVE
1548 :Capability: KVM_CAP_XCRS
1575 :Capability: KVM_CAP_XCRS
1602 :Capability: KVM_CAP_EXT_CPUID
1687 :Capability: KVM_CAP_PPC_GET_PVINFO
1717 :Capability: KVM_CAP_IRQ_ROUTING
1765 KVM_CAP_MSI_DEVID capability advertises the requirement to provide
1766 the device ID. If this capability is not available, userspace should
1792 feature of KVM_CAP_X2APIC_API capability is enabled. If it is enabled,
1815 :Capability: KVM_CAP_TSC_CONTROL
1828 :Capability: KVM_CAP_GET_TSC_KHZ
1842 :Capability: KVM_CAP_IRQCHIP
1873 :Capability: KVM_CAP_IRQCHIP
1890 regs field) depends on the state of the KVM_CAP_X2APIC_API capability.
1897 :Capability: KVM_CAP_IOEVENTFD
1943 :Capability: KVM_CAP_SW_TLB
1979 :Capability: KVM_CAP_SPAPR_TCE
1988 and provides a scatter/gather capability for PAPR virtual I/O.
2018 :Capability: KVM_CAP_PPC_RMA
2045 The KVM_CAP_PPC_RMA capability is 1 or 2 if the KVM_ALLOCATE_RMA ioctl
2054 :Capability: KVM_CAP_USER_NMI
2081 :Capability: KVM_CAP_S390_UCONTROL
2103 :Capability: KVM_CAP_S390_UCONTROL
2125 :Capability: KVM_CAP_S390_UCONTROL
2143 :Capability: KVM_CAP_ONE_REG
2584 :Capability: KVM_CAP_ONE_REG
2614 :Capability: KVM_CAP_KVMCLOCK_CTRL
2638 :Capability: KVM_CAP_SIGNAL_MSI
2660 KVM_CAP_MSI_DEVID capability advertises the requirement to provide
2661 the device ID. If this capability is not available, userspace
2669 feature of KVM_CAP_X2APIC_API capability is enabled. If it is enabled,
2677 :Capability: KVM_CAP_PIT2
2710 :Capability: KVM_CAP_PIT_STATE2
2736 :Capability: KVM_CAP_PIT_STATE2
2751 :Capability: KVM_CAP_PPC_GET_SMMU_INFO
2826 :Capability: KVM_CAP_IRQFD
2865 :Capability: KVM_CAP_PPC_ALLOC_HTAB
2874 virtualization. Otherwise the capability doesn't exist and the ioctl
2902 :Capability: basic
2957 :Capability: KVM_CAP_PPC_HTAB_FD
3012 :Capability: KVM_CAP_DEVICE_CTRL
3050 :Capability: KVM_CAP_DEVICE_CTRL, KVM_CAP_VM_ATTRIBUTES for vm device,
3085 :Capability: KVM_CAP_DEVICE_CTRL, KVM_CAP_VM_ATTRIBUTES for vm device,
3106 :Capability: basic
3204 :Capability: basic
3233 :Capability: basic
3260 :Capability: KVM_CAP_ARM_SET_DEVICE_ADDR
3309 :Capability: KVM_CAP_PPC_RTAS
3329 :Capability: KVM_CAP_SET_GUEST_DEBUG
3377 For ppc, the KVM_CAP_PPC_GUEST_DEBUG_SSTEP capability indicates whether
3380 Also when supported, KVM_CAP_SET_GUEST_DEBUG2 capability indicates the
3390 :Capability: KVM_CAP_EXT_EMUL_CPUID
3465 :Capability: KVM_CAP_S390_MEM_OP
3501 KVM_CAP_S390_MEM_OP capability. "buf" is the buffer supplied by the
3514 :Capability: KVM_CAP_S390_SKEYS
3546 :Capability: KVM_CAP_S390_SKEYS
3574 :Capability: KVM_CAP_S390_INJECT_IRQ
3634 :Capability: KVM_CAP_S390_IRQ_STATE
3669 :Capability: KVM_CAP_S390_IRQ_STATE
3707 :Capability: KVM_CAP_X86_SMM
3718 :Capability: KVM_X86_SET_MSR_FILTER
3818 :Capability: KVM_CAP_SPAPR_TCE_64
3827 This capability uses extended struct in ioctl interface::
3851 :Capability: KVM_CAP_REINJECT_CONTROL
3878 :Capability: KVM_CAP_PPC_RADIX_MMU or KVM_CAP_PPC_HASH_MMU_V3
3912 :Capability: KVM_CAP_PPC_RADIX_MMU
3949 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
4003 :Capability: KVM_CAP_SPAPR_RESIZE_HPT
4048 :Capability: KVM_CAP_MCE
4061 :Capability: KVM_CAP_MCE
4068 -EINVAL if requested MCE capability is not supported.
4080 :Capability: KVM_CAP_MCE
4114 :Capability: KVM_CAP_S390_CMMA_MIGRATION
4209 :Capability: KVM_CAP_S390_CMMA_MIGRATION
4257 :Capability: KVM_CAP_PPC_GET_CPU_CHAR
4304 :Capability: basic
4321 :Capability: basic
4345 :Capability: basic
4357 :Capability: KVM_CAP_HYPERV_EVENTFD
4392 :Capability: KVM_CAP_NESTED_STATE
4466 :Capability: KVM_CAP_NESTED_STATE
4478 :Capability: KVM_CAP_COALESCED_MMIO (for coalesced mmio)
4507 :Capability: KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2
4542 is enabled; for more information, see the description of the capability.
4549 :Capability: KVM_CAP_HYPERV_CPUID (vcpu), KVM_CAP_SYS_HYPERV_CPUID (system)
4662 :Capability: KVM_CAP_PMU_EVENT_FILTER
4696 :Capability: basic
4720 :Capability: KVM_CAP_S390_VCPU_RESETS
4732 :Capability: none
4745 :Capability: KVM_CAP_S390_VCPU_RESETS
4759 :Capability: KVM_CAP_S390_PROTECTED
4812 :Capability: KVM_CAP_X86_MSR_FILTER
4914 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO
4957 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO
4969 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO
5031 :Capability: KVM_CAP_XEN_HVM / KVM_XEN_HVM_CONFIG_SHARED_INFO
5046 :Capability: KVM_CAP_ARM_MTE
5083 :Capability: KVM_CAP_SREGS2
5116 :Capability: KVM_CAP_SREGS2
5129 :Capability: KVM_CAP_STATS_BINARY_FD
5773 this capability at VM creation. Once this is done, these types of errors will
5796 Used on x86 systems. When the VM capability KVM_CAP_X86_USER_SPACE_MSR is
5904 whether this is a per-vcpu or per-vm capability.
5907 what parameters are accepted by the capability.
5922 This capability enables interception of OSI hypercalls that otherwise would
5927 When this capability is enabled, KVM_EXIT_OSI can occur.
5938 This capability enables interception of PAPR hypercalls. PAPR hypercalls are
5948 When this capability is enabled, KVM_EXIT_PAPR_HCALL can occur.
6006 This capability enables support for handling of channel I/O instructions.
6011 When this capability is enabled, KVM_EXIT_S390_TSCH will occur on TEST
6014 Note that even though this capability is enabled per-vcpu, the complete
6025 This capability enables or disables the delivery of interrupts through the
6034 When this capability is enabled, KVM_EXIT_EPR can occur.
6043 This capability connects the vcpu to an in-kernel MPIC device.
6053 This capability connects the vcpu to an in-kernel XICS device.
6062 This capability enables the in-kernel irqchip for s390. Please refer to
6072 This capability allows the use of the host Floating Point Unit by the guest. It
6086 This capability allows the use of the MIPS SIMD Architecture (MSA) by the guest.
6146 This capability connects the vcpu to an in-kernel XIVE device.
6163 what parameters are accepted by the capability.
6177 This capability controls whether individual sPAPR hypercalls (hcalls)
6182 before this capability was implemented. If disabled, the kernel will
6198 This capability controls which SIGP orders will be handled completely in user
6199 space. With this capability enabled, all fast orders will be handled completely
6211 in the hardware prior to interception). If this capability is not enabled, the
6231 This capability allows post-handlers for the STSI instruction. After
6267 This capability also enables in kernel routing of interrupt requests;
6315 With this capability enabled, all illegal instructions 0x0000 (2 bytes) will
6321 This capability can be enabled dynamically even if VCPUs were already
6349 Enabling this capability on a VM provides userspace with a way to set
6354 be 0. A successful call to enable this capability will result in
6355 vsmt_mode being returned when the KVM_CAP_PPC_SMT capability is
6356 subsequently queried for the VM. This capability is only supported by
6358 The KVM_CAP_PPC_SMT_POSSIBLE capability indicates which virtual SMT
6367 With this capability a machine check exception in the guest address
6370 machine check handling routine. Without this capability KVM will
6387 Enabling this capability on a VM provides userspace with a way to no
6405 With this capability the KVM support for memory backing with 1m pages
6406 through hugetlbfs can be enabled for a VM. After the capability is
6412 this capability, the VM will not be able to run.
6420 With this capability, a guest may read the MSR_PLATFORM_INFO MSR. Otherwise,
6422 capability does not enable write permissions of this MSR for the guest.
6435 state). Enabling this capability on a VM depends on the CPU having
6445 With this capability enabled, CR2 will not be modified prior to the
6457 This capability also enables exception.pending in struct
6511 This capability indicates that KVM is running on a host that has
6519 If present, this capability can be enabled for a VM, meaning that KVM
6531 This capability overrides the kvm module parameter halt_poll_ns for the
6536 controlled by the kvm module parameter halt_poll_ns. This capability allows
6548 This capability enables trapping of #GP invoking RDMSR and WRMSR instructions
6556 this capability. With it enabled, MSR accesses that match the mask specified in
6575 Enabling this capability on a VM provides userspace with a way to select
6591 This capability is aimed to address the thread that VM can exploit bus locks to
6593 capability and select the KVM_BUS_LOCK_DETECTION_EXIT mode, KVM will set the
6606 This capability can be used to check / enable 2nd DAWR feature provided
6618 This capability enables userspace to copy encryption context from the vm
6652 :Capability: KVM_CAP_PPC_RPT_INVALIDATE
6656 This capability indicates that the kernel is capable of handling
6664 This capability is enabled for hypervisors on platforms like POWER9
6673 When this capability is enabled, an emulation failure will result in an exit
6691 This capability indicates that KVM (and the hardware) supports exposing the
6694 available to a guest running in AArch64 mode and enabling this capability will
6702 When this capability is enabled all memory in memslots must be mapped as
6720 This capability, if KVM_CHECK_EXTENSION indicates that it is
6724 with the KVM_CAP_PPC_ENABLE_HCALL capability.
6731 This capability, if KVM_CHECK_EXTENSION indicates that it is
6737 capability via KVM_ENABLE_CAP ioctl on the vcpu fd. Note that this
6746 This capability, if KVM_CHECK_EXTENSION indicates that it is
6756 This capability, if KVM_CHECK_EXTENSION indicates that it is
6766 This capability, if KVM_CHECK_EXTENSION on the main kvm handle indicates that
6772 If KVM_CHECK_EXTENSION on a kvm VM handle indicates that this capability is
6796 This capability, if KVM_CHECK_EXTENSION on the main kvm handle indicates that
6802 If KVM_CHECK_EXTENSION on a kvm VM handle indicates that this capability is
6810 This capability indicates the supported architecture type of the guest, i.e. the
6813 The values returned when this capability is checked by KVM_CHECK_EXTENSION on a
6838 This capability, if KVM_CHECK_EXTENSION indicates that it is available, means
6861 number larger than 0 indicating the version of this capability is implemented
6881 Querying this capability returns a bitmap indicating the possible
6891 This capability enables a newer version of Hyper-V Synthetic interrupt
6901 This capability indicates that userspace can load HV_X64_MSR_VP_INDEX msr. Its
6904 capability is absent, userspace can still query this msr's value.
6912 This capability indicates if the flic device will be able to get/set the
6921 This capability indicates that the PSW is exposed via the kvm_run structure.
6928 This capability indicates that the user space memory used as guest mapping can
6937 This capability indicates that the user space memory used as guest mapping can
6946 This capability indicates that kvm will implement the interfaces to handle
6948 facility 82 should not be provided to the guest without this capability.
6955 This capability indicates that KVM supports paravirtualized Hyper-V TLB Flush
6965 This capability indicates that userspace can specify (via the
6968 If KVM advertises this capability, userspace can only specify the ISS field for
6980 This capability indicates that KVM supports paravirtualized Hyper-V IPI send
6989 This capability indicates that KVM running on top of Hyper-V hypervisor
6993 KVM, enabling this capability effectively disables all hypercall
7004 This capability indicates that the KVM_S390_NORMAL_RESET and
7012 This capability indicates that the Ultravisor has been initialized and
7014 This capability governs the KVM_S390_PV_COMMAND ioctl and the
7023 This capability indicates that KVM supports steal time accounting.
7025 architecture-specific interfaces. This capability and the architecture-
7036 This capability enables a guest to set information about its control program
7048 If this capability is available, then the CPNC and CPVC can be synchronized
7056 This capability indicates that KVM supports deflection of MSR reads and
7067 This capability indicates that KVM supports that accesses to user defined MSRs
7068 may be rejected. With this capability exposed, KVM exports new VM ioctl
7112 ioctl to enable this capability for the new guest and set the size of
7113 the rings. Enabling the capability is only allowed before creating any
7166 NOTE: the capability KVM_CAP_DIRTY_LOG_RING and the corresponding
7178 This capability indicates the features that Xen supports for hosting Xen
7207 :Capability: KVM_CAP_PPC_MULTITCE
7211 This capability means the kernel is capable of handling hypercalls
7228 This capability is always enabled.
7235 This capability indicates that the KVM virtual PTP service is
7253 :Capability: KVM_CAP_EXIT_HYPERCALL
7257 This capability, if enabled, will cause KVM to exit to userspace
7260 Calling KVM_CHECK_EXTENSION for this capability will return a bitmask