Lines Matching +full:0 +full:x6040

159 You probably want to use 0 as machine type.
189 address used by the VM. The IPA_Bits is encoded in bits[7-0] of the
199 0 Implies default size, 40bits (for backward compatibility)
225 :Returns: 0 on success; -1 on error
239 __u32 indices[0];
269 :Returns: 0 if unsupported; 1 (or some other positive integer) if supported
274 Generally 0 means no and 1 means yes, but some extensions may report
317 The vcpu id is an integer in the range [0, max_vcpu_id).
361 :Returns: 0 on success, -1 on error
376 since the last call to this ioctl. Bit 0 is the first page in the
399 :Returns: 0 on success, -1 on error
414 obtained by mmap()ing the vcpu fd at offset 0, with the size given by
426 :Returns: 0 on success, -1 on error
466 :Returns: 0 on success, -1 on error
480 :Returns: 0 on success, -1 on error
511 :Returns: 0 on success, -1 on error
524 :Returns: 0 on success, -1 on error
551 :Returns: 0 on success, negative on failure.
569 0 on success,
669 struct kvm_msr_entry entries[0];
712 :Returns: 0 on success, -1 on error
741 struct kvm_cpuid_entry entries[0];
752 :Returns: 0 on success, -1 on error
767 __u8 sigset[0];
778 :Returns: 0 on success, -1 on error
816 :Returns: 0 on success, -1 on error
854 :Returns: 0 on success, -1 on error
858 future vcpus to have a local APIC. IRQ routing for GSIs 0-15 is set to both
876 :Returns: 0 on success, -1 on error
881 interrupts require the level to be set to 1 and then back to 0.
885 means active (asserted), 0 means inactive (deasserted).
902 bits: | 31 ... 28 | 27 ... 24 | 23 ... 16 | 15 ... 0 |
908 out-of-kernel GIC: irq_id 0 is IRQ, irq_id 1 is FIQ
934 __u32 level; /* 0 or 1 */
945 :Returns: 0 on success, -1 on error
953 __u32 chip_id; /* 0 = PIC1, 1 = PIC2, 2 = IOAPIC */
970 :Returns: 0 on success, -1 on error
978 __u32 chip_id; /* 0 = PIC1, 1 = PIC2, 2 = IOAPIC */
995 :Returns: 0 on success, -1 on error
1003 The MSR index must be in the range [0x40000000, 0x4fffffff], i.e. must reside
1045 :Returns: 0 on success, -1 on error
1095 :Returns: 0 on success, -1 on error
1131 :Returns: 0 on success, -1 on error
1257 :Returns: 0 on success, -1 on error
1325 :Returns: 0 on success, -1 on error
1347 :Returns: 0 on success, -1 on error
1362 :Returns: 0 on success, -1 on error
1375 #define KVM_MEM_LOG_DIRTY_PAGES (1UL << 0)
1379 memory slot. Bits 0-15 of "slot" specify the slot id and this value
1420 Read only region isn't supported. Only as-id 0 is supported.
1444 :Returns: 0 on success, -1 on error
1466 :Returns: 0 on success; -1 on error
1472 :Returns: 0 on success; -1 on error
1497 A bitfield indicating future enhancements. Has to be 0 for now.
1521 :Returns: 0 on success; -1 on error
1602 :Returns: 0 on success; -1 on error
1627 :Returns: 0 on success, -1 on error
1635 Setting the address to 0 will result in resetting the address to its default
1636 (0xfffbc000).
1651 :Returns: 0 on success, -1 on error
1655 is vcpu 0. This ioctl has to be called before vcpu creation,
1666 :Returns: 0 on success, -1 on error
1673 __u32 extra[0];
1686 :Returns: 0 on success, -1 on error
1693 __u32 extra[0];
1704 contents of CPUID leaf 0xD on the host.
1714 :Returns: 0 on success, -1 on error
1741 :Returns: 0 on success, -1 on error
1768 :Returns: 0 on success, -1 on error
1775 struct kvm_cpuid_entry2 entries[0];
1778 #define KVM_CPUID_FLAG_SIGNIFCANT_INDEX BIT(0)
1860 :Returns: 0 on success, !0 on error
1881 #define KVM_PPC_PVINFO_FLAGS_EV_IDLE (1<<0)
1890 :Returns: 0 on success, -1 on error
1903 struct kvm_irq_routing_entry entries[0];
1967 address_hi bits 31-8 provide bits 31-8 of the destination id. Bits 7-0 of
2007 :Returns: 0 on success, -1 on error
2044 :Returns: 0 on success, -1 on error
2048 #define KVM_APIC_REG_SIZE 0x400
2075 :Returns: 0 on success, -1 on error
2079 #define KVM_APIC_REG_SIZE 0x400
2099 :Returns: 0 on success, !0 on error
2110 __u32 len; /* 0, 1, 2, 4, or 8 bytes */
2145 :Returns: 0 on success, -1 on error
2165 The array is little-endian: the bit 0 is the least significant bit of the
2220 :Returns: 0 on success, -1 on error
2247 :Returns: 0 in case of success
2269 :Returns: 0 in case of success
2291 :Returns: 0 in case of success
2309 :Returns: 0 on success, negative value on failure
2526 MIPS KVM_REG_MIPS_CP0_MAAR(0..63) 64
2530 MIPS KVM_REG_MIPS_FPR_32(0..31) 32
2531 MIPS KVM_REG_MIPS_FPR_64(0..31) 64
2532 MIPS KVM_REG_MIPS_VEC_128(0..31) 128
2544 0x4020 0000 0010 <index into the kvm_regs struct:16>
2548 0x4020 0000 000F <zero:1> <crn:4> <crm:4> <opc1:4> <opc2:3>
2552 0x4030 0000 000F <zero:1> <zero:4> <crm:4> <opc1:4> <zero:3>
2556 0x4020 0000 0011 00 <csselr:8>
2560 0x4020 0000 0012 1 <regno:12>
2564 0x4030 0000 0012 0 <regno:12>
2568 0x4030 0000 0014 <regno:16>
2579 0x60x0 0000 0010 <index into the kvm_regs struct:16>
2586 0x6030 0000 0010 0000 X0 64 regs.regs[0]
2587 0x6030 0000 0010 0002 X1 64 regs.regs[1]
2589 0x6030 0000 0010 003c X30 64 regs.regs[30]
2590 0x6030 0000 0010 003e SP 64 regs.sp
2591 0x6030 0000 0010 0040 PC 64 regs.pc
2592 0x6030 0000 0010 0042 PSTATE 64 regs.pstate
2593 0x6030 0000 0010 0044 SP_EL1 64 sp_el1
2594 0x6030 0000 0010 0046 ELR_EL1 64 elr_el1
2595 0x6030 0000 0010 0048 SPSR_EL1 64 spsr[KVM_SPSR_EL1] (alias SPSR_SVC)
2596 0x6030 0000 0010 004a SPSR_ABT 64 spsr[KVM_SPSR_ABT]
2597 0x6030 0000 0010 004c SPSR_UND 64 spsr[KVM_SPSR_UND]
2598 0x6030 0000 0010 004e SPSR_IRQ 64 spsr[KVM_SPSR_IRQ]
2599 0x6030 0000 0010 0050 SPSR_FIQ 64 spsr[KVM_SPSR_FIQ]
2600 0x6040 0000 0010 0054 V0 128 fp_regs.vregs[0] [1]_
2601 0x6040 0000 0010 0058 V1 128 fp_regs.vregs[1] [1]_
2603 0x6040 0000 0010 00d0 V31 128 fp_regs.vregs[31] [1]_
2604 0x6020 0000 0010 00d4 FPSR 32 fp_regs.fpsr
2605 0x6020 0000 0010 00d5 FPCR 32 fp_regs.fpcr
2611 The equivalent register content can be accessed via bits [127:0] of
2617 0x6020 0000 0011 00 <csselr:8>
2621 0x6030 0000 0013 <op0:2> <op1:3> <crn:4> <crm:4> <op2:3>
2635 0x6030 0000 0014 <regno:16>
2639 0x6080 0000 0015 00 <n:5> <slice:5> Zn bits[2048*slice + 2047 : 2048*slice]
2640 0x6050 0000 0015 04 <n:4> <slice:5> Pn bits[256*slice + 255 : 256*slice]
2641 0x6050 0000 0015 060 <slice:5> FFR bits[256*slice + 255 : 256*slice]
2642 0x6060 0000 0015 ffff KVM_REG_ARM64_SVE_VLS pseudo-register
2698 0x6030 0000 0016 <regno:16>
2720 0x7030 0000 0000 <reg:16>
2725 0x7020 0000 0001 00 <reg:5> <sel:3> (32-bit)
2726 0x7030 0000 0001 00 <reg:5> <sel:3> (64-bit)
2737 0x7030 0000 0001 01 <reg:8>
2741 0x7030 0000 0002 <reg:16>
2751 0x7020 0000 0003 00 <0:3> <reg:5> (32-bit FPU registers)
2752 0x7030 0000 0003 00 <0:3> <reg:5> (64-bit FPU registers)
2753 0x7040 0000 0003 00 <0:3> <reg:5> (128-bit MSA vector registers)
2758 0x7020 0000 0003 01 <0:3> <reg:5>
2763 0x7020 0000 0003 02 <0:3> <reg:5>
2771 0x8020 0000 01 <index into the kvm_riscv_config struct:24> (32bit Host)
2772 0x8030 0000 01 <index into the kvm_riscv_config struct:24> (64bit Host)
2779 0x80x0 0000 0100 0000 isa ISA feature bitmap of Guest VCPU
2789 0x8020 0000 02 <index into the kvm_riscv_core struct:24> (32bit Host)
2790 0x8030 0000 02 <index into the kvm_riscv_core struct:24> (64bit Host)
2797 0x80x0 0000 0200 0000 regs.pc Program counter
2798 0x80x0 0000 0200 0001 regs.ra Return address
2799 0x80x0 0000 0200 0002 regs.sp Stack pointer
2800 0x80x0 0000 0200 0003 regs.gp Global pointer
2801 0x80x0 0000 0200 0004 regs.tp Task pointer
2802 0x80x0 0000 0200 0005 regs.t0 Caller saved register 0
2803 0x80x0 0000 0200 0006 regs.t1 Caller saved register 1
2804 0x80x0 0000 0200 0007 regs.t2 Caller saved register 2
2805 0x80x0 0000 0200 0008 regs.s0 Callee saved register 0
2806 0x80x0 0000 0200 0009 regs.s1 Callee saved register 1
2807 0x80x0 0000 0200 000a regs.a0 Function argument (or return value) 0
2808 0x80x0 0000 0200 000b regs.a1 Function argument (or return value) 1
2809 0x80x0 0000 0200 000c regs.a2 Function argument 2
2810 0x80x0 0000 0200 000d regs.a3 Function argument 3
2811 0x80x0 0000 0200 000e regs.a4 Function argument 4
2812 0x80x0 0000 0200 000f regs.a5 Function argument 5
2813 0x80x0 0000 0200 0010 regs.a6 Function argument 6
2814 0x80x0 0000 0200 0011 regs.a7 Function argument 7
2815 0x80x0 0000 0200 0012 regs.s2 Callee saved register 2
2816 0x80x0 0000 0200 0013 regs.s3 Callee saved register 3
2817 0x80x0 0000 0200 0014 regs.s4 Callee saved register 4
2818 0x80x0 0000 0200 0015 regs.s5 Callee saved register 5
2819 0x80x0 0000 0200 0016 regs.s6 Callee saved register 6
2820 0x80x0 0000 0200 0017 regs.s7 Callee saved register 7
2821 0x80x0 0000 0200 0018 regs.s8 Callee saved register 8
2822 0x80x0 0000 0200 0019 regs.s9 Callee saved register 9
2823 0x80x0 0000 0200 001a regs.s10 Callee saved register 10
2824 0x80x0 0000 0200 001b regs.s11 Callee saved register 11
2825 0x80x0 0000 0200 001c regs.t3 Caller saved register 3
2826 0x80x0 0000 0200 001d regs.t4 Caller saved register 4
2827 0x80x0 0000 0200 001e regs.t5 Caller saved register 5
2828 0x80x0 0000 0200 001f regs.t6 Caller saved register 6
2829 0x80x0 0000 0200 0020 mode Privilege mode (1 = S-mode or 0 = U-mode)
2835 0x8020 0000 03 <index into the kvm_riscv_csr struct:24> (32bit Host)
2836 0x8030 0000 03 <index into the kvm_riscv_csr struct:24> (64bit Host)
2843 0x80x0 0000 0300 0000 sstatus Supervisor status
2844 0x80x0 0000 0300 0001 sie Supervisor interrupt enable
2845 0x80x0 0000 0300 0002 stvec Supervisor trap vector base
2846 0x80x0 0000 0300 0003 sscratch Supervisor scratch register
2847 0x80x0 0000 0300 0004 sepc Supervisor exception program counter
2848 0x80x0 0000 0300 0005 scause Supervisor trap cause
2849 0x80x0 0000 0300 0006 stval Supervisor bad address or instruction
2850 0x80x0 0000 0300 0007 sip Supervisor interrupt pending
2851 0x80x0 0000 0300 0008 satp Supervisor address translation and protection
2857 0x8030 0000 04 <index into the kvm_riscv_timer struct:24>
2864 0x8030 0000 0400 0000 frequency Time base frequency (read-only)
2865 0x8030 0000 0400 0001 time Time value visible to Guest
2866 0x8030 0000 0400 0002 compare Time compare programmed by Guest
2867 0x8030 0000 0400 0003 state Time compare state (1 = ON or 0 = OFF)
2873 0x8020 0000 05 <index into the __riscv_f_ext_state struct:24>
2880 0x8020 0000 0500 0000 f[0] Floating point register 0
2882 0x8020 0000 0500 001f f[31] Floating point register 31
2883 0x8020 0000 0500 0020 fcsr Floating point control and status register
2889 0x8020 0000 06 <index into the __riscv_d_ext_state struct:24> (fcsr)
2890 0x8030 0000 06 <index into the __riscv_d_ext_state struct:24> (non-fcsr)
2897 0x8030 0000 0600 0000 f[0] Floating point register 0
2899 0x8030 0000 0600 001f f[31] Floating point register 31
2900 0x8020 0000 0600 0020 fcsr Floating point control and status register
2909 0x9030 0000 0001 00 <reg:5> <sel:3> (64-bit)
2914 0x9030 0000 0002 <reg:16>
2917 0x2030 0002 <msr number:32>
2924 0x2030 0003 0000 0000 SSP Shadow Stack Pointer
2934 :Returns: 0 on success, negative value on failure
2964 :Returns: 0 on success, -1 on error
2988 :Returns: >0 on delivery, 0 if guest blocked the MSI, and -1 on error
3016 address_hi bits 31-8 provide bits 31-8 of the destination id. Bits 7-0 of
3027 :Returns: 0 on success, -1 on error
3060 :Returns: 0 on success, -1 on error
3074 #define KVM_PIT_FLAGS_HPET_LEGACY 0x00000001
3076 #define KVM_PIT_FLAGS_SPEAKER_DATA_ON 0x00000002
3088 :Returns: 0 on success, -1 on error
3095 a ``count`` value of 0 in ``struct kvm_pit_channel_state`` is interpreted as
3109 :Returns: 0 on success, -1 on error
3148 __u32 page_shift; /* Base page shift of segment (or 0) */
3153 An entry with a "page_shift" of 0 is unused. Because the array is
3165 8 entries sorted by increasing sizes and an entry with a "0" shift
3169 __u32 page_shift; /* Page shift (or 0) */
3184 :Returns: 0 on success, -1 on error
3223 :Returns: 0 on success, -1 on error
3260 :Returns: 0 on success, -1 on error
3315 :Returns: file descriptor number (>= 0) on success, -1 on error
3332 #define KVM_GET_HTAB_BOLTED_ONLY ((__u64)0x1)
3333 #define KVM_GET_HTAB_WRITE ((__u64)0x2)
3370 :Returns: 0 on success, -1 on error
3411 :Returns: 0 on success, -1 on error
3447 :Returns: 0 on success, -1 on error
3470 :Returns: 0 on success; -1 on error
3490 - General Purpose registers, including PC and SP: set to 0
3491 - FPSIMD/NEON registers: set to 0
3492 - SVE registers: set to 0
3580 :Returns: 0 on success; -1 on error
3609 :Returns: 0 on success; -1 on error
3622 __u64 reg[0];
3659 :Returns: 0 on success, -1 on error
3686 bits: | 63 ... 32 | 31 ... 16 | 15 ... 0 |
3687 field: | 0x00000000 | device id | addr type id |
3708 :Returns: 0 on success, -1 on error
3716 handled by the kernel. If the token value is 0, then any token
3728 :Returns: 0 on success; -1 on error
3789 :Returns: 0 on success, -1 on error
3796 struct kvm_cpuid_entry2 entries[0];
3803 #define KVM_CPUID_FLAG_SIGNIFCANT_INDEX BIT(0)
3864 :Returns: = 0 on success,
3865 < 0 on generic error (e.g. -EFAULT or -ENOMEM),
3894 be 0). The maximum value for "size" can be obtained by checking the
3904 be set to 0.
3921 range is 0..15.
3945 prohibited given the access key designated by "key"; the valid range is 0..15.
3947 is > 0.
4009 :Returns: 0 on success, KVM_S390_GET_SKEYS_NONE if guest is not using storage
4041 :Returns: 0 on success, negative value on error
4069 :Returns: 0 on success, -1 on error
4130 -EINVAL if buffer size is 0,
4150 the kernel never checked for flags == 0 and QEMU never pre-zeroed flags and
4164 :Returns: 0 on success,
4191 len must be a multiple of sizeof(struct kvm_s390_irq). It must be > 0
4202 :Returns: 0 on success, -1 on error
4213 :Returns: 0 on success, < 0 on error
4218 #define KVM_MSR_FILTER_READ (1 << 0)
4223 __u8 *bitmap; /* a 1 bit allows the operations in flags, 0 denies */
4228 #define KVM_MSR_FILTER_DEFAULT_ALLOW (0 << 0)
4229 #define KVM_MSR_FILTER_DEFAULT_DENY (1 << 0)
4238 Filter read accesses to MSRs using the given bitmap. A 0 in the bitmap
4245 Filter write accesses to MSRs using the given bitmap. A 0 in the bitmap
4284 Calling this ioctl with an empty set of ranges (all nmsrs == 0) disables MSR
4359 :Returns: 0 on success,
4376 pit_reinject = 0 (!reinject mode) is recommended, unless running an old
4386 :Returns: 0 on success,
4420 :Returns: 0 on success,
4444 will have 0 in the page_shift field.
4457 :Returns: 0 on successful completion,
4458 >0 if a new HPT is being prepared, the value is an estimated
4477 If called with shift > 0 when there is no pending HPT for the guest,
4488 * If preparation of the pending HPT is already complete, return 0
4494 If called with shift == 0, discards any currently pending HPT and
4495 returns 0 (i.e. cancels any in-progress preparation).
4501 it returns <= 0. The first call will initiate preparation, subsequent
4511 :Returns: 0 on successful completion,
4535 returned 0 with the same parameters. In other cases
4556 :Returns: 0 on success, -1 on error
4569 :Returns: 0 on success,
4588 :Returns: 0 on success,
4622 :Returns: 0 on success, a negative value on error
4709 still remaining, or 0 if KVM_S390_CMMA_PEEK is set and migration mode is
4723 :Returns: 0 on success, a negative value on error
4748 flags is not used and must be 0.
4759 if the flags field was not 0, with -EFAULT if the userspace address is
4771 :Returns: 0 on successful completion,
4796 (ori 30,30,0 or mtspr SPRN_TRIG2,rN), whether the L1 data cache is set
4799 whether a speculation barrier instruction (ori 31,31,0) is provided.
4818 :Returns: 0 on success; -1 on error
4837 :Returns: 0 on success; -1 on error
4861 :Returns: 0 on success; -1 on error
4890 #define KVM_HYPERV_CONN_ID_MASK 0x00ffffff
4894 #define KVM_HYPERV_EVENTFD_DEASSIGN (1 << 0)
4896 :Returns: 0 on success,
4908 :Returns: 0 on success, -1 on error
4933 struct kvm_vmx_nested_state_data vmx[0];
4934 struct kvm_svm_nested_state_data svm[0];
4938 #define KVM_STATE_NESTED_GUEST_MODE 0x00000001
4939 #define KVM_STATE_NESTED_RUN_PENDING 0x00000002
4940 #define KVM_STATE_NESTED_EVMCS 0x00000004
4942 #define KVM_STATE_NESTED_FORMAT_VMX 0
4945 #define KVM_STATE_NESTED_VMX_VMCS_SIZE 0x1000
4947 #define KVM_STATE_NESTED_VMX_SMM_GUEST_MODE 0x00000001
4948 #define KVM_STATE_NESTED_VMX_SMM_VMXON 0x00000002
4950 #define KVM_STATE_VMX_PREEMPTION_TIMER_DEADLINE 0x00000001
4982 :Returns: 0 on success, -1 on error
4995 :Returns: 0 on success, < 0 on error
5023 :Returns: 0 on success, -1 on error
5040 field. Bit 0 of the bitmap corresponds to page "first_page" in the
5065 :Returns: 0 on success, -1 on error
5072 struct kvm_cpuid_entry2 entries[0];
5094 leaves (0x40000000, 0x40000001).
5135 :Returns: 0 on success, -1 on error
5178 :Returns: 0 on success, -1 on error
5183 EFAULT args[0] cannot be accessed
5184 EINVAL args[0] contains invalid data in the filter or filter events
5197 __u64 events[0];
5210 ``0``
5232 7:0 event select (low bits)
5266 #define KVM_PMU_EVENT_ALLOW 0
5294 :Returns: 0 on successful completion,
5318 :Returns: 0
5330 :Returns: 0
5343 :Returns: 0
5357 :Returns: 0 on success, < 0 on error
5366 __u32 flags; /* flags for future extensions. Must be 0 for now */
5374 code. If KVM changes `rc`, its value will always be greater than 0
5375 hence setting it to 0 before issuing a PV command is advised to be
5560 :Returns: 0 on success, < 0 on error
5683 :Returns: 0 on success, < 0 on error
5696 :Returns: 0 on success, < 0 on error
5810 :Returns: 0 on success, < 0 on error
5825 :Returns: number of bytes copied, < 0 on error (-EINVAL for incorrect
5863 :Returns: 0 on success, -1 on error
5896 :Returns: 0 on success, -1 on error
5909 :Returns: statistics file descriptor on success, < 0 on error
5932 Apart from the header starting at offset 0, please be aware that it is
5955 The ``flags`` field is not used at the moment. It is always read as 0.
5958 (including trailing '\0') which is contained in the "id string" block and
5976 trailing ``'\0'``, is indicated by the ``name_size`` field in the header.
5983 #define KVM_STATS_TYPE_SHIFT 0
5984 #define KVM_STATS_TYPE_MASK (0xF << KVM_STATS_TYPE_SHIFT)
5985 #define KVM_STATS_TYPE_CUMULATIVE (0x0 << KVM_STATS_TYPE_SHIFT)
5986 #define KVM_STATS_TYPE_INSTANT (0x1 << KVM_STATS_TYPE_SHIFT)
5987 #define KVM_STATS_TYPE_PEAK (0x2 << KVM_STATS_TYPE_SHIFT)
5988 #define KVM_STATS_TYPE_LINEAR_HIST (0x3 << KVM_STATS_TYPE_SHIFT)
5989 #define KVM_STATS_TYPE_LOG_HIST (0x4 << KVM_STATS_TYPE_SHIFT)
5993 #define KVM_STATS_UNIT_MASK (0xF << KVM_STATS_UNIT_SHIFT)
5994 #define KVM_STATS_UNIT_NONE (0x0 << KVM_STATS_UNIT_SHIFT)
5995 #define KVM_STATS_UNIT_BYTES (0x1 << KVM_STATS_UNIT_SHIFT)
5996 #define KVM_STATS_UNIT_SECONDS (0x2 << KVM_STATS_UNIT_SHIFT)
5997 #define KVM_STATS_UNIT_CYCLES (0x3 << KVM_STATS_UNIT_SHIFT)
5998 #define KVM_STATS_UNIT_BOOLEAN (0x4 << KVM_STATS_UNIT_SHIFT)
6002 #define KVM_STATS_BASE_MASK (0xF << KVM_STATS_BASE_SHIFT)
6003 #define KVM_STATS_BASE_POW10 (0x0 << KVM_STATS_BASE_SHIFT)
6004 #define KVM_STATS_BASE_POW2 (0x1 << KVM_STATS_BASE_SHIFT)
6020 Bits 0-3 of ``flags`` encode the type:
6048 [0, 1), while the range of the last bucket is [pow(2, ``size``-2), +INF).
6066 It indicates that the statistic will always be either 0 or 1. Boolean
6067 statistics of "peak" type will never go back from 1 to 0. Boolean
6100 the trailing ``'\0'``, is indicated by ``name_size`` in the header.
6112 :Returns: 0 on success, -1 on error
6119 __u32 extra[0];
6130 of CPUID leaf 0xD on the host.
6139 :Returns: 0 on success, < 0 on error
6159 :Returns: 0 on success, < 0 on error
6184 :Returns: 0 on success, <0 on error
6222 set to 0s by userspace.
6231 :Returns: 0 on success, < 0 on error
6253 Any value other than 0 for the "reserved" field may result in an error
6271 :Returns: 0 on success, < 0 on error
6276 #define KVM_ARM_FEATURE_ID_RANGE 0
6297 The ``reserved[13]`` array is reserved for future use and should be 0, or
6300 KVM_ARM_FEATURE_ID_RANGE (0)
6304 op0==3, op1=={0, 1, 3}, CRn==0, CRm=={0-7}, op2=={0-7}.
6319 :Returns: 0 on success, -1 on error
6354 is '0' for all gfns. Userspace can control whether memory is shared/private by
6370 :Returns: 0 on success, <0 on error
6397 The "flags" field is reserved for future extensions and must be '0'.
6406 :Returns: A file descriptor on success, <0 on error
6467 :Returns: 0 if at least one page is processed, < 0 on error
6508 remaining range. If `size` > 0 on return, the caller can just issue
6561 When KVM_RUN has returned successfully (return value 0), this informs
6587 #define KVM_RUN_X86_SMM (1 << 0)
6594 #define KVM_DEBUG_ARCH_HSR_HIGH_VALID (1 << 0)
6649 #define KVM_EXIT_IO_IN 0
6739 conduit to initiate the SMCCC call. If this bit is 0 then the guest
6743 instruction to initiate the SMCCC call. If this bit is 0 then the
6745 bit set to 0.
6922 The guest physical address of the guest's GHCB is stored in `data[0]`.
6938 - for arm64, data[0] is set to KVM_SYSTEM_EVENT_RESET_FLAG_PSCI_RESET2 if
6942 - for arm64, data[0] is set to KVM_SYSTEM_EVENT_SHUTDOWN_FLAG_PSCI_OFF2
6946 - for RISC-V, data[0] is set to the value of the second argument of the
6950 field is now aliased to `data[0]`. Userspace can assume that it is only
6951 written if ndata is greater than 0.
6982 data[0] set to KVM_SYSTEM_EVENT_SHUTDOWN_FLAG_PSCI_OFF2. The only
7202 accompanies a return code of '-1', not '0'! errno will always be set to EFAULT
7210 #define KVM_NOTIFY_CONTEXT_INVALID (1 << 0)
7357 :Returns: 0 on success; -1 on error
7373 :Returns: 0 on success; -1 on error
7393 :Parameters: args[0] is the address of a struct kvm_config_tlb
7394 :Returns: 0 on success; -1 on error
7441 :Returns: 0 on success; -1 on error
7459 :Parameters: args[0] defines whether the proxy facility is active
7460 :Returns: 0 on success; -1 on error
7465 When enabled (args[0] != 0), every time the guest gets an external interrupt
7469 When disabled (args[0] == 0), behavior is as if this facility is unsupported.
7477 :Parameters: args[0] is the MPIC device fd;
7487 :Parameters: args[0] is the XICS device fd;
7507 :Parameters: args[0] is reserved for future use (should be 0).
7521 :Parameters: args[0] is reserved for future use (should be 0).
7580 :Parameters: args[0] is the XIVE device fd;
7620 hypercalls are handled by Level 0 hypervisor (Hyper-V) bypassing KVM.
7637 Hyper-V identification is set in the HYPERV_CPUID_INTERFACE (0x40000001)
7648 (0x40000001). Otherwise, a guest may use the paravirtual features
7682 :Parameters: args[0] is the sPAPR hcall number;
7683 args[1] is 0 to disable, 1 to enable in-kernel handling
7727 :Returns: 0 on success, negative value on error
7767 :Parameters: args[0] - number of routes reserved for userspace IOAPICs
7768 :Returns: 0 on success, -1 on error
7777 used in the IRQ routing table. The first args[0] MSI routes are reserved
7798 :Parameters: args[0] - features that should be enabled
7799 :Returns: 0 on success, -EINVAL when args[0] contains invalid features
7801 Valid feature flags in args[0] are::
7803 #define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0)
7812 in logical mode or with more than 255 VCPUs. Otherwise, KVM treats 0xff
7815 where 0xff represents CPUs 0-7 in cluster 0.
7823 With this capability enabled, all illegal instructions 0x0000 (2 bytes) will
7837 :Returns: 0 on success; -EINVAL if the machine does not support
7849 :Returns: 0 on success; -EBUSY if a VCPU has already been created.
7862 be 0. A successful call to enable this capability will result in
7879 branch to guests' 0x200 interrupt vector.
7885 :Parameters: args[0] defines which exits are disabled
7886 :Returns: 0 on success, -EINVAL when args[0] contains invalid exits
7889 Valid bits in args[0] are::
7891 #define KVM_X86_DISABLE_EXITS_MWAIT (1 << 0)
7923 ``CPUID.6:ECX.APERFMPERF[bit 0]``. Userspace VMMs that deem this
7933 :Returns: 0 on success, -EINVAL if hpage module parameter was not set
7950 :Parameters: args[0] whether feature should be enabled or not
7961 :Returns: 0 on success, -EINVAL when the implementation doesn't support
7975 :Parameters: args[0] whether feature should be enabled or not
8001 :Parameters: args[0] whether feature should be enabled or not
8005 #define KVM_DIRTY_LOG_MANUAL_PROTECT_ENABLE (1 << 0)
8061 :Parameters: args[0] is the maximum poll time in nanoseconds
8062 :Returns: 0 on success; -1 on error
8077 :Parameters: args[0] contains the mask of KVM_MSR_EXIT_REASON_* events to report
8078 :Returns: 0 on success; -1 on error
8089 args[0] and would trigger a #GP inside the guest will instead trigger
8109 :Parameters: args[0] defines the policy used when bus locks detected in guest
8110 :Returns: 0 on success, -EINVAL when args[0] contains invalid bits
8112 Valid bits in args[0] are::
8114 #define KVM_BUS_LOCK_DETECTION_OFF (1 << 0)
8153 :Returns: 0 on success, -EINVAL when CPU doesn't support 2nd DAWR
8164 :Parameters: args[0] is the fd of the source vm
8165 :Returns: 0 on success; ENOTTY on error
8180 :Parameters: args[0] is a file handle of a SGX attribute file in securityfs
8181 :Returns: 0 on success, -EINVAL if the file handle is invalid or if a requested
8185 more privileged enclave attributes. args[0] must hold a file handle to a valid
8202 :Parameters: args[0] whether the feature should be enabled or not
8246 :Parameters: args[0] is the fd of the source vm
8247 :Returns: 0 on success
8258 :Parameters: args[0] - set of KVM quirks to disable
8272 The valid bits in cap.args[0] are:
8276 LINT0 register is 0x700 (APIC_MODE_EXTINT).
8278 is 0x10000 (APIC_LVT_MASKED).
8296 to port 0x7e. When this quirk is disabled,
8340 vCPU's MSR_IA32_PERF_CAPABILITIES (0x345),
8341 MSR_IA32_ARCH_CAPABILITIES (0x10a),
8342 MSR_PLATFORM_INFO (0xce), and all VMX MSRs
8343 (0x480..0x492) to the maximal capabilities
8345 MSR_IA32_UCODE_REV (0x8b) to an arbitrary
8356 not affect VMX MSRs CR0/CR4_FIXED1 (0x487
8357 and 0x489), as KVM does now allow them to
8389 :Parameters: args[0] - maximum APIC ID value set for current VM
8390 :Returns: 0 on success, -EINVAL if args[0] is beyond KVM_MAX_VCPU_IDS
8410 :Parameters: args[0] is the value of notify window as well as some flags
8411 :Returns: 0 on success, -EINVAL if args[0] contains invalid flags or notify
8414 Bits 63:32 of args[0] are used for notify window.
8415 Bits 31:0 of args[0] are for some flags. Valid bits are::
8417 #define KVM_X86_NOTIFY_VMEXIT_ENABLED (1 << 0)
8422 When userspace sets KVM_X86_NOTIFY_VMEXIT_ENABLED bit in args[0], VMM will
8427 If KVM_X86_NOTIFY_VMEXIT_USER is set in args[0], upon notify VM exits happen,
8439 :Parameters: args[0] is the desired APIC bus clock rate, in nanoseconds
8440 :Returns: 0 on success, -EINVAL if args[0] contains an invalid value for the
8448 Note: Userspace is responsible for correctly configuring CPUID 0x15, a.k.a. the
8449 core crystal clock frequency, if a non-zero CPUID 0x15 is exposed to the guest.
8456 :Parameters: args[0] - size of the dirty log ring
8473 #define KVM_DIRTY_GFN_F_DIRTY BIT(0)
8475 #define KVM_DIRTY_GFN_F_MASK 0x3
8505 ``01b`` to ``1Xb`` (bit 0 will be ignored by KVM, but bit 1 must be set
8581 :Parameters: arg[0] is bitmask of PMU virtualization capabilities.
8582 :Returns: 0 on success, -EINVAL when arg[0] contains invalid bits
8595 should adjust CPUID leaf 0xA to reflect that the PMU is disabled.
8602 :Parameters: arg[0] must be 0.
8603 :Returns: 0 on success, -EPERM if the userspace process does not
8604 have CAP_SYS_BOOT, -EINVAL if args[0] is not 0 or any vCPUs have been
8618 :Parameters: arg[0] is the new split chunk size.
8619 :Returns: 0 on success, -EINVAL if any memslot was already created.
8637 0, to disable the eager page splitting.
8672 :Returns: 0 on success, -EINVAL if vCPUs have been created before enabling this
8690 :Returns: 0 on success, -EINVAL if arg[0] is not zero
8765 0 The trap & emulate implementation is in use to run guest code in user
8787 0 MIPS32 or microMIPS32.
8829 number larger than 0 indicating the version of this capability is implemented
8983 The information is associated with the DIAGNOSE 0x318 instruction, which sets
9026 #define KVM_XEN_HVM_CONFIG_HYPERCALL_MSR (1 << 0)
9137 PTF instruction with function codes 0 or 1 and the STSI(15,1,x)
9161 #define KVM_X86_DEFAULT_VM 0
9271 0x0b and 0x1f for Intel systems, 0x8000001e for AMD systems. Different
9277 the APIC ID is found in EDX for all subleaves of 0x0b and 0x1f, and in EAX
9278 for 0x8000001e; the latter also encodes the core id and node id in bits
9279 7:0 of EBX and ECX respectively.