diff options
author | Jan Kiszka <jan.kiszka@siemens.com> | 2012-04-24 10:40:15 -0400 |
---|---|---|
committer | Marcelo Tosatti <mtosatti@redhat.com> | 2012-04-27 18:40:28 -0400 |
commit | 414fa985f91bdf61fe2baf8111c0ddbdb94808ea (patch) | |
tree | da6a3d6b54295515134fc4a926fe47565e5e5b08 /Documentation/virtual/kvm | |
parent | 38e8a2ddc9ada5dd1f2def95bebb733bf619bbef (diff) |
KVM: Improve readability of KVM API doc
This helps to identify sections and it also fixes the numbering from
4.54 to 4.61.
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Diffstat (limited to 'Documentation/virtual/kvm')
-rw-r--r-- | Documentation/virtual/kvm/api.txt | 99 |
1 files changed, 92 insertions, 7 deletions
diff --git a/Documentation/virtual/kvm/api.txt b/Documentation/virtual/kvm/api.txt index a1552210b16d..b48f92786ab3 100644 --- a/Documentation/virtual/kvm/api.txt +++ b/Documentation/virtual/kvm/api.txt | |||
@@ -2,6 +2,7 @@ The Definitive KVM (Kernel-based Virtual Machine) API Documentation | |||
2 | =================================================================== | 2 | =================================================================== |
3 | 3 | ||
4 | 1. General description | 4 | 1. General description |
5 | ---------------------- | ||
5 | 6 | ||
6 | The kvm API is a set of ioctls that are issued to control various aspects | 7 | The kvm API is a set of ioctls that are issued to control various aspects |
7 | of a virtual machine. The ioctls belong to three classes | 8 | of a virtual machine. The ioctls belong to three classes |
@@ -23,7 +24,9 @@ of a virtual machine. The ioctls belong to three classes | |||
23 | Only run vcpu ioctls from the same thread that was used to create the | 24 | Only run vcpu ioctls from the same thread that was used to create the |
24 | vcpu. | 25 | vcpu. |
25 | 26 | ||
27 | |||
26 | 2. File descriptors | 28 | 2. File descriptors |
29 | ------------------- | ||
27 | 30 | ||
28 | The kvm API is centered around file descriptors. An initial | 31 | The kvm API is centered around file descriptors. An initial |
29 | open("/dev/kvm") obtains a handle to the kvm subsystem; this handle | 32 | open("/dev/kvm") obtains a handle to the kvm subsystem; this handle |
@@ -41,7 +44,9 @@ not cause harm to the host, their actual behavior is not guaranteed by | |||
41 | the API. The only supported use is one virtual machine per process, | 44 | the API. The only supported use is one virtual machine per process, |
42 | and one vcpu per thread. | 45 | and one vcpu per thread. |
43 | 46 | ||
47 | |||
44 | 3. Extensions | 48 | 3. Extensions |
49 | ------------- | ||
45 | 50 | ||
46 | As of Linux 2.6.22, the KVM ABI has been stabilized: no backward | 51 | As of Linux 2.6.22, the KVM ABI has been stabilized: no backward |
47 | incompatible change are allowed. However, there is an extension | 52 | incompatible change are allowed. However, there is an extension |
@@ -53,7 +58,9 @@ Instead, kvm defines extension identifiers and a facility to query | |||
53 | whether a particular extension identifier is available. If it is, a | 58 | whether a particular extension identifier is available. If it is, a |
54 | set of ioctls is available for application use. | 59 | set of ioctls is available for application use. |
55 | 60 | ||
61 | |||
56 | 4. API description | 62 | 4. API description |
63 | ------------------ | ||
57 | 64 | ||
58 | This section describes ioctls that can be used to control kvm guests. | 65 | This section describes ioctls that can be used to control kvm guests. |
59 | For each ioctl, the following information is provided along with a | 66 | For each ioctl, the following information is provided along with a |
@@ -75,6 +82,7 @@ description: | |||
75 | Returns: the return value. General error numbers (EBADF, ENOMEM, EINVAL) | 82 | Returns: the return value. General error numbers (EBADF, ENOMEM, EINVAL) |
76 | are not detailed, but errors with specific meanings are. | 83 | are not detailed, but errors with specific meanings are. |
77 | 84 | ||
85 | |||
78 | 4.1 KVM_GET_API_VERSION | 86 | 4.1 KVM_GET_API_VERSION |
79 | 87 | ||
80 | Capability: basic | 88 | Capability: basic |
@@ -90,6 +98,7 @@ supported. Applications should refuse to run if KVM_GET_API_VERSION | |||
90 | returns a value other than 12. If this check passes, all ioctls | 98 | returns a value other than 12. If this check passes, all ioctls |
91 | described as 'basic' will be available. | 99 | described as 'basic' will be available. |
92 | 100 | ||
101 | |||
93 | 4.2 KVM_CREATE_VM | 102 | 4.2 KVM_CREATE_VM |
94 | 103 | ||
95 | Capability: basic | 104 | Capability: basic |
@@ -109,6 +118,7 @@ In order to create user controlled virtual machines on S390, check | |||
109 | KVM_CAP_S390_UCONTROL and use the flag KVM_VM_S390_UCONTROL as | 118 | KVM_CAP_S390_UCONTROL and use the flag KVM_VM_S390_UCONTROL as |
110 | privileged user (CAP_SYS_ADMIN). | 119 | privileged user (CAP_SYS_ADMIN). |
111 | 120 | ||
121 | |||
112 | 4.3 KVM_GET_MSR_INDEX_LIST | 122 | 4.3 KVM_GET_MSR_INDEX_LIST |
113 | 123 | ||
114 | Capability: basic | 124 | Capability: basic |
@@ -135,6 +145,7 @@ Note: if kvm indicates supports MCE (KVM_CAP_MCE), then the MCE bank MSRs are | |||
135 | not returned in the MSR list, as different vcpus can have a different number | 145 | not returned in the MSR list, as different vcpus can have a different number |
136 | of banks, as set via the KVM_X86_SETUP_MCE ioctl. | 146 | of banks, as set via the KVM_X86_SETUP_MCE ioctl. |
137 | 147 | ||
148 | |||
138 | 4.4 KVM_CHECK_EXTENSION | 149 | 4.4 KVM_CHECK_EXTENSION |
139 | 150 | ||
140 | Capability: basic | 151 | Capability: basic |
@@ -149,6 +160,7 @@ receives an integer that describes the extension availability. | |||
149 | Generally 0 means no and 1 means yes, but some extensions may report | 160 | Generally 0 means no and 1 means yes, but some extensions may report |
150 | additional information in the integer return value. | 161 | additional information in the integer return value. |
151 | 162 | ||
163 | |||
152 | 4.5 KVM_GET_VCPU_MMAP_SIZE | 164 | 4.5 KVM_GET_VCPU_MMAP_SIZE |
153 | 165 | ||
154 | Capability: basic | 166 | Capability: basic |
@@ -161,6 +173,7 @@ The KVM_RUN ioctl (cf.) communicates with userspace via a shared | |||
161 | memory region. This ioctl returns the size of that region. See the | 173 | memory region. This ioctl returns the size of that region. See the |
162 | KVM_RUN documentation for details. | 174 | KVM_RUN documentation for details. |
163 | 175 | ||
176 | |||
164 | 4.6 KVM_SET_MEMORY_REGION | 177 | 4.6 KVM_SET_MEMORY_REGION |
165 | 178 | ||
166 | Capability: basic | 179 | Capability: basic |
@@ -171,6 +184,7 @@ Returns: 0 on success, -1 on error | |||
171 | 184 | ||
172 | This ioctl is obsolete and has been removed. | 185 | This ioctl is obsolete and has been removed. |
173 | 186 | ||
187 | |||
174 | 4.7 KVM_CREATE_VCPU | 188 | 4.7 KVM_CREATE_VCPU |
175 | 189 | ||
176 | Capability: basic | 190 | Capability: basic |
@@ -223,6 +237,7 @@ machines, the resulting vcpu fd can be memory mapped at page offset | |||
223 | KVM_S390_SIE_PAGE_OFFSET in order to obtain a memory map of the virtual | 237 | KVM_S390_SIE_PAGE_OFFSET in order to obtain a memory map of the virtual |
224 | cpu's hardware control block. | 238 | cpu's hardware control block. |
225 | 239 | ||
240 | |||
226 | 4.8 KVM_GET_DIRTY_LOG (vm ioctl) | 241 | 4.8 KVM_GET_DIRTY_LOG (vm ioctl) |
227 | 242 | ||
228 | Capability: basic | 243 | Capability: basic |
@@ -246,6 +261,7 @@ since the last call to this ioctl. Bit 0 is the first page in the | |||
246 | memory slot. Ensure the entire structure is cleared to avoid padding | 261 | memory slot. Ensure the entire structure is cleared to avoid padding |
247 | issues. | 262 | issues. |
248 | 263 | ||
264 | |||
249 | 4.9 KVM_SET_MEMORY_ALIAS | 265 | 4.9 KVM_SET_MEMORY_ALIAS |
250 | 266 | ||
251 | Capability: basic | 267 | Capability: basic |
@@ -256,6 +272,7 @@ Returns: 0 (success), -1 (error) | |||
256 | 272 | ||
257 | This ioctl is obsolete and has been removed. | 273 | This ioctl is obsolete and has been removed. |
258 | 274 | ||
275 | |||
259 | 4.10 KVM_RUN | 276 | 4.10 KVM_RUN |
260 | 277 | ||
261 | Capability: basic | 278 | Capability: basic |
@@ -272,6 +289,7 @@ obtained by mmap()ing the vcpu fd at offset 0, with the size given by | |||
272 | KVM_GET_VCPU_MMAP_SIZE. The parameter block is formatted as a 'struct | 289 | KVM_GET_VCPU_MMAP_SIZE. The parameter block is formatted as a 'struct |
273 | kvm_run' (see below). | 290 | kvm_run' (see below). |
274 | 291 | ||
292 | |||
275 | 4.11 KVM_GET_REGS | 293 | 4.11 KVM_GET_REGS |
276 | 294 | ||
277 | Capability: basic | 295 | Capability: basic |
@@ -292,6 +310,7 @@ struct kvm_regs { | |||
292 | __u64 rip, rflags; | 310 | __u64 rip, rflags; |
293 | }; | 311 | }; |
294 | 312 | ||
313 | |||
295 | 4.12 KVM_SET_REGS | 314 | 4.12 KVM_SET_REGS |
296 | 315 | ||
297 | Capability: basic | 316 | Capability: basic |
@@ -304,6 +323,7 @@ Writes the general purpose registers into the vcpu. | |||
304 | 323 | ||
305 | See KVM_GET_REGS for the data structure. | 324 | See KVM_GET_REGS for the data structure. |
306 | 325 | ||
326 | |||
307 | 4.13 KVM_GET_SREGS | 327 | 4.13 KVM_GET_SREGS |
308 | 328 | ||
309 | Capability: basic | 329 | Capability: basic |
@@ -331,6 +351,7 @@ interrupt_bitmap is a bitmap of pending external interrupts. At most | |||
331 | one bit may be set. This interrupt has been acknowledged by the APIC | 351 | one bit may be set. This interrupt has been acknowledged by the APIC |
332 | but not yet injected into the cpu core. | 352 | but not yet injected into the cpu core. |
333 | 353 | ||
354 | |||
334 | 4.14 KVM_SET_SREGS | 355 | 4.14 KVM_SET_SREGS |
335 | 356 | ||
336 | Capability: basic | 357 | Capability: basic |
@@ -342,6 +363,7 @@ Returns: 0 on success, -1 on error | |||
342 | Writes special registers into the vcpu. See KVM_GET_SREGS for the | 363 | Writes special registers into the vcpu. See KVM_GET_SREGS for the |
343 | data structures. | 364 | data structures. |
344 | 365 | ||
366 | |||
345 | 4.15 KVM_TRANSLATE | 367 | 4.15 KVM_TRANSLATE |
346 | 368 | ||
347 | Capability: basic | 369 | Capability: basic |
@@ -365,6 +387,7 @@ struct kvm_translation { | |||
365 | __u8 pad[5]; | 387 | __u8 pad[5]; |
366 | }; | 388 | }; |
367 | 389 | ||
390 | |||
368 | 4.16 KVM_INTERRUPT | 391 | 4.16 KVM_INTERRUPT |
369 | 392 | ||
370 | Capability: basic | 393 | Capability: basic |
@@ -413,6 +436,7 @@ c) KVM_INTERRUPT_SET_LEVEL | |||
413 | Note that any value for 'irq' other than the ones stated above is invalid | 436 | Note that any value for 'irq' other than the ones stated above is invalid |
414 | and incurs unexpected behavior. | 437 | and incurs unexpected behavior. |
415 | 438 | ||
439 | |||
416 | 4.17 KVM_DEBUG_GUEST | 440 | 4.17 KVM_DEBUG_GUEST |
417 | 441 | ||
418 | Capability: basic | 442 | Capability: basic |
@@ -423,6 +447,7 @@ Returns: -1 on error | |||
423 | 447 | ||
424 | Support for this has been removed. Use KVM_SET_GUEST_DEBUG instead. | 448 | Support for this has been removed. Use KVM_SET_GUEST_DEBUG instead. |
425 | 449 | ||
450 | |||
426 | 4.18 KVM_GET_MSRS | 451 | 4.18 KVM_GET_MSRS |
427 | 452 | ||
428 | Capability: basic | 453 | Capability: basic |
@@ -451,6 +476,7 @@ Application code should set the 'nmsrs' member (which indicates the | |||
451 | size of the entries array) and the 'index' member of each array entry. | 476 | size of the entries array) and the 'index' member of each array entry. |
452 | kvm will fill in the 'data' member. | 477 | kvm will fill in the 'data' member. |
453 | 478 | ||
479 | |||
454 | 4.19 KVM_SET_MSRS | 480 | 4.19 KVM_SET_MSRS |
455 | 481 | ||
456 | Capability: basic | 482 | Capability: basic |
@@ -466,6 +492,7 @@ Application code should set the 'nmsrs' member (which indicates the | |||
466 | size of the entries array), and the 'index' and 'data' members of each | 492 | size of the entries array), and the 'index' and 'data' members of each |
467 | array entry. | 493 | array entry. |
468 | 494 | ||
495 | |||
469 | 4.20 KVM_SET_CPUID | 496 | 4.20 KVM_SET_CPUID |
470 | 497 | ||
471 | Capability: basic | 498 | Capability: basic |
@@ -494,6 +521,7 @@ struct kvm_cpuid { | |||
494 | struct kvm_cpuid_entry entries[0]; | 521 | struct kvm_cpuid_entry entries[0]; |
495 | }; | 522 | }; |
496 | 523 | ||
524 | |||
497 | 4.21 KVM_SET_SIGNAL_MASK | 525 | 4.21 KVM_SET_SIGNAL_MASK |
498 | 526 | ||
499 | Capability: basic | 527 | Capability: basic |
@@ -516,6 +544,7 @@ struct kvm_signal_mask { | |||
516 | __u8 sigset[0]; | 544 | __u8 sigset[0]; |
517 | }; | 545 | }; |
518 | 546 | ||
547 | |||
519 | 4.22 KVM_GET_FPU | 548 | 4.22 KVM_GET_FPU |
520 | 549 | ||
521 | Capability: basic | 550 | Capability: basic |
@@ -541,6 +570,7 @@ struct kvm_fpu { | |||
541 | __u32 pad2; | 570 | __u32 pad2; |
542 | }; | 571 | }; |
543 | 572 | ||
573 | |||
544 | 4.23 KVM_SET_FPU | 574 | 4.23 KVM_SET_FPU |
545 | 575 | ||
546 | Capability: basic | 576 | Capability: basic |
@@ -566,6 +596,7 @@ struct kvm_fpu { | |||
566 | __u32 pad2; | 596 | __u32 pad2; |
567 | }; | 597 | }; |
568 | 598 | ||
599 | |||
569 | 4.24 KVM_CREATE_IRQCHIP | 600 | 4.24 KVM_CREATE_IRQCHIP |
570 | 601 | ||
571 | Capability: KVM_CAP_IRQCHIP | 602 | Capability: KVM_CAP_IRQCHIP |
@@ -579,6 +610,7 @@ ioapic, a virtual PIC (two PICs, nested), and sets up future vcpus to have a | |||
579 | local APIC. IRQ routing for GSIs 0-15 is set to both PIC and IOAPIC; GSI 16-23 | 610 | local APIC. IRQ routing for GSIs 0-15 is set to both PIC and IOAPIC; GSI 16-23 |
580 | only go to the IOAPIC. On ia64, a IOSAPIC is created. | 611 | only go to the IOAPIC. On ia64, a IOSAPIC is created. |
581 | 612 | ||
613 | |||
582 | 4.25 KVM_IRQ_LINE | 614 | 4.25 KVM_IRQ_LINE |
583 | 615 | ||
584 | Capability: KVM_CAP_IRQCHIP | 616 | Capability: KVM_CAP_IRQCHIP |
@@ -600,6 +632,7 @@ struct kvm_irq_level { | |||
600 | __u32 level; /* 0 or 1 */ | 632 | __u32 level; /* 0 or 1 */ |
601 | }; | 633 | }; |
602 | 634 | ||
635 | |||
603 | 4.26 KVM_GET_IRQCHIP | 636 | 4.26 KVM_GET_IRQCHIP |
604 | 637 | ||
605 | Capability: KVM_CAP_IRQCHIP | 638 | Capability: KVM_CAP_IRQCHIP |
@@ -621,6 +654,7 @@ struct kvm_irqchip { | |||
621 | } chip; | 654 | } chip; |
622 | }; | 655 | }; |
623 | 656 | ||
657 | |||
624 | 4.27 KVM_SET_IRQCHIP | 658 | 4.27 KVM_SET_IRQCHIP |
625 | 659 | ||
626 | Capability: KVM_CAP_IRQCHIP | 660 | Capability: KVM_CAP_IRQCHIP |
@@ -642,6 +676,7 @@ struct kvm_irqchip { | |||
642 | } chip; | 676 | } chip; |
643 | }; | 677 | }; |
644 | 678 | ||
679 | |||
645 | 4.28 KVM_XEN_HVM_CONFIG | 680 | 4.28 KVM_XEN_HVM_CONFIG |
646 | 681 | ||
647 | Capability: KVM_CAP_XEN_HVM | 682 | Capability: KVM_CAP_XEN_HVM |
@@ -666,6 +701,7 @@ struct kvm_xen_hvm_config { | |||
666 | __u8 pad2[30]; | 701 | __u8 pad2[30]; |
667 | }; | 702 | }; |
668 | 703 | ||
704 | |||
669 | 4.29 KVM_GET_CLOCK | 705 | 4.29 KVM_GET_CLOCK |
670 | 706 | ||
671 | Capability: KVM_CAP_ADJUST_CLOCK | 707 | Capability: KVM_CAP_ADJUST_CLOCK |
@@ -684,6 +720,7 @@ struct kvm_clock_data { | |||
684 | __u32 pad[9]; | 720 | __u32 pad[9]; |
685 | }; | 721 | }; |
686 | 722 | ||
723 | |||
687 | 4.30 KVM_SET_CLOCK | 724 | 4.30 KVM_SET_CLOCK |
688 | 725 | ||
689 | Capability: KVM_CAP_ADJUST_CLOCK | 726 | Capability: KVM_CAP_ADJUST_CLOCK |
@@ -702,6 +739,7 @@ struct kvm_clock_data { | |||
702 | __u32 pad[9]; | 739 | __u32 pad[9]; |
703 | }; | 740 | }; |
704 | 741 | ||
742 | |||
705 | 4.31 KVM_GET_VCPU_EVENTS | 743 | 4.31 KVM_GET_VCPU_EVENTS |
706 | 744 | ||
707 | Capability: KVM_CAP_VCPU_EVENTS | 745 | Capability: KVM_CAP_VCPU_EVENTS |
@@ -741,6 +779,7 @@ struct kvm_vcpu_events { | |||
741 | KVM_VCPUEVENT_VALID_SHADOW may be set in the flags field to signal that | 779 | KVM_VCPUEVENT_VALID_SHADOW may be set in the flags field to signal that |
742 | interrupt.shadow contains a valid state. Otherwise, this field is undefined. | 780 | interrupt.shadow contains a valid state. Otherwise, this field is undefined. |
743 | 781 | ||
782 | |||
744 | 4.32 KVM_SET_VCPU_EVENTS | 783 | 4.32 KVM_SET_VCPU_EVENTS |
745 | 784 | ||
746 | Capability: KVM_CAP_VCPU_EVENTS | 785 | Capability: KVM_CAP_VCPU_EVENTS |
@@ -767,6 +806,7 @@ If KVM_CAP_INTR_SHADOW is available, KVM_VCPUEVENT_VALID_SHADOW can be set in | |||
767 | the flags field to signal that interrupt.shadow contains a valid state and | 806 | the flags field to signal that interrupt.shadow contains a valid state and |
768 | shall be written into the VCPU. | 807 | shall be written into the VCPU. |
769 | 808 | ||
809 | |||
770 | 4.33 KVM_GET_DEBUGREGS | 810 | 4.33 KVM_GET_DEBUGREGS |
771 | 811 | ||
772 | Capability: KVM_CAP_DEBUGREGS | 812 | Capability: KVM_CAP_DEBUGREGS |
@@ -785,6 +825,7 @@ struct kvm_debugregs { | |||
785 | __u64 reserved[9]; | 825 | __u64 reserved[9]; |
786 | }; | 826 | }; |
787 | 827 | ||
828 | |||
788 | 4.34 KVM_SET_DEBUGREGS | 829 | 4.34 KVM_SET_DEBUGREGS |
789 | 830 | ||
790 | Capability: KVM_CAP_DEBUGREGS | 831 | Capability: KVM_CAP_DEBUGREGS |
@@ -798,6 +839,7 @@ Writes debug registers into the vcpu. | |||
798 | See KVM_GET_DEBUGREGS for the data structure. The flags field is unused | 839 | See KVM_GET_DEBUGREGS for the data structure. The flags field is unused |
799 | yet and must be cleared on entry. | 840 | yet and must be cleared on entry. |
800 | 841 | ||
842 | |||
801 | 4.35 KVM_SET_USER_MEMORY_REGION | 843 | 4.35 KVM_SET_USER_MEMORY_REGION |
802 | 844 | ||
803 | Capability: KVM_CAP_USER_MEM | 845 | Capability: KVM_CAP_USER_MEM |
@@ -844,6 +886,7 @@ It is recommended to use this API instead of the KVM_SET_MEMORY_REGION ioctl. | |||
844 | The KVM_SET_MEMORY_REGION does not allow fine grained control over memory | 886 | The KVM_SET_MEMORY_REGION does not allow fine grained control over memory |
845 | allocation and is deprecated. | 887 | allocation and is deprecated. |
846 | 888 | ||
889 | |||
847 | 4.36 KVM_SET_TSS_ADDR | 890 | 4.36 KVM_SET_TSS_ADDR |
848 | 891 | ||
849 | Capability: KVM_CAP_SET_TSS_ADDR | 892 | Capability: KVM_CAP_SET_TSS_ADDR |
@@ -862,6 +905,7 @@ This ioctl is required on Intel-based hosts. This is needed on Intel hardware | |||
862 | because of a quirk in the virtualization implementation (see the internals | 905 | because of a quirk in the virtualization implementation (see the internals |
863 | documentation when it pops into existence). | 906 | documentation when it pops into existence). |
864 | 907 | ||
908 | |||
865 | 4.37 KVM_ENABLE_CAP | 909 | 4.37 KVM_ENABLE_CAP |
866 | 910 | ||
867 | Capability: KVM_CAP_ENABLE_CAP | 911 | Capability: KVM_CAP_ENABLE_CAP |
@@ -897,6 +941,7 @@ function properly, this is the place to put them. | |||
897 | __u8 pad[64]; | 941 | __u8 pad[64]; |
898 | }; | 942 | }; |
899 | 943 | ||
944 | |||
900 | 4.38 KVM_GET_MP_STATE | 945 | 4.38 KVM_GET_MP_STATE |
901 | 946 | ||
902 | Capability: KVM_CAP_MP_STATE | 947 | Capability: KVM_CAP_MP_STATE |
@@ -927,6 +972,7 @@ Possible values are: | |||
927 | This ioctl is only useful after KVM_CREATE_IRQCHIP. Without an in-kernel | 972 | This ioctl is only useful after KVM_CREATE_IRQCHIP. Without an in-kernel |
928 | irqchip, the multiprocessing state must be maintained by userspace. | 973 | irqchip, the multiprocessing state must be maintained by userspace. |
929 | 974 | ||
975 | |||
930 | 4.39 KVM_SET_MP_STATE | 976 | 4.39 KVM_SET_MP_STATE |
931 | 977 | ||
932 | Capability: KVM_CAP_MP_STATE | 978 | Capability: KVM_CAP_MP_STATE |
@@ -941,6 +987,7 @@ arguments. | |||
941 | This ioctl is only useful after KVM_CREATE_IRQCHIP. Without an in-kernel | 987 | This ioctl is only useful after KVM_CREATE_IRQCHIP. Without an in-kernel |
942 | irqchip, the multiprocessing state must be maintained by userspace. | 988 | irqchip, the multiprocessing state must be maintained by userspace. |
943 | 989 | ||
990 | |||
944 | 4.40 KVM_SET_IDENTITY_MAP_ADDR | 991 | 4.40 KVM_SET_IDENTITY_MAP_ADDR |
945 | 992 | ||
946 | Capability: KVM_CAP_SET_IDENTITY_MAP_ADDR | 993 | Capability: KVM_CAP_SET_IDENTITY_MAP_ADDR |
@@ -959,6 +1006,7 @@ This ioctl is required on Intel-based hosts. This is needed on Intel hardware | |||
959 | because of a quirk in the virtualization implementation (see the internals | 1006 | because of a quirk in the virtualization implementation (see the internals |
960 | documentation when it pops into existence). | 1007 | documentation when it pops into existence). |
961 | 1008 | ||
1009 | |||
962 | 4.41 KVM_SET_BOOT_CPU_ID | 1010 | 4.41 KVM_SET_BOOT_CPU_ID |
963 | 1011 | ||
964 | Capability: KVM_CAP_SET_BOOT_CPU_ID | 1012 | Capability: KVM_CAP_SET_BOOT_CPU_ID |
@@ -971,6 +1019,7 @@ Define which vcpu is the Bootstrap Processor (BSP). Values are the same | |||
971 | as the vcpu id in KVM_CREATE_VCPU. If this ioctl is not called, the default | 1019 | as the vcpu id in KVM_CREATE_VCPU. If this ioctl is not called, the default |
972 | is vcpu 0. | 1020 | is vcpu 0. |
973 | 1021 | ||
1022 | |||
974 | 4.42 KVM_GET_XSAVE | 1023 | 4.42 KVM_GET_XSAVE |
975 | 1024 | ||
976 | Capability: KVM_CAP_XSAVE | 1025 | Capability: KVM_CAP_XSAVE |
@@ -985,6 +1034,7 @@ struct kvm_xsave { | |||
985 | 1034 | ||
986 | This ioctl would copy current vcpu's xsave struct to the userspace. | 1035 | This ioctl would copy current vcpu's xsave struct to the userspace. |
987 | 1036 | ||
1037 | |||
988 | 4.43 KVM_SET_XSAVE | 1038 | 4.43 KVM_SET_XSAVE |
989 | 1039 | ||
990 | Capability: KVM_CAP_XSAVE | 1040 | Capability: KVM_CAP_XSAVE |
@@ -999,6 +1049,7 @@ struct kvm_xsave { | |||
999 | 1049 | ||
1000 | This ioctl would copy userspace's xsave struct to the kernel. | 1050 | This ioctl would copy userspace's xsave struct to the kernel. |
1001 | 1051 | ||
1052 | |||
1002 | 4.44 KVM_GET_XCRS | 1053 | 4.44 KVM_GET_XCRS |
1003 | 1054 | ||
1004 | Capability: KVM_CAP_XCRS | 1055 | Capability: KVM_CAP_XCRS |
@@ -1022,6 +1073,7 @@ struct kvm_xcrs { | |||
1022 | 1073 | ||
1023 | This ioctl would copy current vcpu's xcrs to the userspace. | 1074 | This ioctl would copy current vcpu's xcrs to the userspace. |
1024 | 1075 | ||
1076 | |||
1025 | 4.45 KVM_SET_XCRS | 1077 | 4.45 KVM_SET_XCRS |
1026 | 1078 | ||
1027 | Capability: KVM_CAP_XCRS | 1079 | Capability: KVM_CAP_XCRS |
@@ -1045,6 +1097,7 @@ struct kvm_xcrs { | |||
1045 | 1097 | ||
1046 | This ioctl would set vcpu's xcr to the value userspace specified. | 1098 | This ioctl would set vcpu's xcr to the value userspace specified. |
1047 | 1099 | ||
1100 | |||
1048 | 4.46 KVM_GET_SUPPORTED_CPUID | 1101 | 4.46 KVM_GET_SUPPORTED_CPUID |
1049 | 1102 | ||
1050 | Capability: KVM_CAP_EXT_CPUID | 1103 | Capability: KVM_CAP_EXT_CPUID |
@@ -1119,6 +1172,7 @@ support. Instead it is reported via | |||
1119 | if that returns true and you use KVM_CREATE_IRQCHIP, or if you emulate the | 1172 | if that returns true and you use KVM_CREATE_IRQCHIP, or if you emulate the |
1120 | feature in userspace, then you can enable the feature for KVM_SET_CPUID2. | 1173 | feature in userspace, then you can enable the feature for KVM_SET_CPUID2. |
1121 | 1174 | ||
1175 | |||
1122 | 4.47 KVM_PPC_GET_PVINFO | 1176 | 4.47 KVM_PPC_GET_PVINFO |
1123 | 1177 | ||
1124 | Capability: KVM_CAP_PPC_GET_PVINFO | 1178 | Capability: KVM_CAP_PPC_GET_PVINFO |
@@ -1142,6 +1196,7 @@ of 4 instructions that make up a hypercall. | |||
1142 | If any additional field gets added to this structure later on, a bit for that | 1196 | If any additional field gets added to this structure later on, a bit for that |
1143 | additional piece of information will be set in the flags bitmap. | 1197 | additional piece of information will be set in the flags bitmap. |
1144 | 1198 | ||
1199 | |||
1145 | 4.48 KVM_ASSIGN_PCI_DEVICE | 1200 | 4.48 KVM_ASSIGN_PCI_DEVICE |
1146 | 1201 | ||
1147 | Capability: KVM_CAP_DEVICE_ASSIGNMENT | 1202 | Capability: KVM_CAP_DEVICE_ASSIGNMENT |
@@ -1185,6 +1240,7 @@ Only PCI header type 0 devices with PCI BAR resources are supported by | |||
1185 | device assignment. The user requesting this ioctl must have read/write | 1240 | device assignment. The user requesting this ioctl must have read/write |
1186 | access to the PCI sysfs resource files associated with the device. | 1241 | access to the PCI sysfs resource files associated with the device. |
1187 | 1242 | ||
1243 | |||
1188 | 4.49 KVM_DEASSIGN_PCI_DEVICE | 1244 | 4.49 KVM_DEASSIGN_PCI_DEVICE |
1189 | 1245 | ||
1190 | Capability: KVM_CAP_DEVICE_DEASSIGNMENT | 1246 | Capability: KVM_CAP_DEVICE_DEASSIGNMENT |
@@ -1198,6 +1254,7 @@ Ends PCI device assignment, releasing all associated resources. | |||
1198 | See KVM_CAP_DEVICE_ASSIGNMENT for the data structure. Only assigned_dev_id is | 1254 | See KVM_CAP_DEVICE_ASSIGNMENT for the data structure. Only assigned_dev_id is |
1199 | used in kvm_assigned_pci_dev to identify the device. | 1255 | used in kvm_assigned_pci_dev to identify the device. |
1200 | 1256 | ||
1257 | |||
1201 | 4.50 KVM_ASSIGN_DEV_IRQ | 1258 | 4.50 KVM_ASSIGN_DEV_IRQ |
1202 | 1259 | ||
1203 | Capability: KVM_CAP_ASSIGN_DEV_IRQ | 1260 | Capability: KVM_CAP_ASSIGN_DEV_IRQ |
@@ -1231,6 +1288,7 @@ The following flags are defined: | |||
1231 | It is not valid to specify multiple types per host or guest IRQ. However, the | 1288 | It is not valid to specify multiple types per host or guest IRQ. However, the |
1232 | IRQ type of host and guest can differ or can even be null. | 1289 | IRQ type of host and guest can differ or can even be null. |
1233 | 1290 | ||
1291 | |||
1234 | 4.51 KVM_DEASSIGN_DEV_IRQ | 1292 | 4.51 KVM_DEASSIGN_DEV_IRQ |
1235 | 1293 | ||
1236 | Capability: KVM_CAP_ASSIGN_DEV_IRQ | 1294 | Capability: KVM_CAP_ASSIGN_DEV_IRQ |
@@ -1245,6 +1303,7 @@ See KVM_ASSIGN_DEV_IRQ for the data structure. The target device is specified | |||
1245 | by assigned_dev_id, flags must correspond to the IRQ type specified on | 1303 | by assigned_dev_id, flags must correspond to the IRQ type specified on |
1246 | KVM_ASSIGN_DEV_IRQ. Partial deassignment of host or guest IRQ is allowed. | 1304 | KVM_ASSIGN_DEV_IRQ. Partial deassignment of host or guest IRQ is allowed. |
1247 | 1305 | ||
1306 | |||
1248 | 4.52 KVM_SET_GSI_ROUTING | 1307 | 4.52 KVM_SET_GSI_ROUTING |
1249 | 1308 | ||
1250 | Capability: KVM_CAP_IRQ_ROUTING | 1309 | Capability: KVM_CAP_IRQ_ROUTING |
@@ -1293,6 +1352,7 @@ struct kvm_irq_routing_msi { | |||
1293 | __u32 pad; | 1352 | __u32 pad; |
1294 | }; | 1353 | }; |
1295 | 1354 | ||
1355 | |||
1296 | 4.53 KVM_ASSIGN_SET_MSIX_NR | 1356 | 4.53 KVM_ASSIGN_SET_MSIX_NR |
1297 | 1357 | ||
1298 | Capability: KVM_CAP_DEVICE_MSIX | 1358 | Capability: KVM_CAP_DEVICE_MSIX |
@@ -1314,6 +1374,7 @@ struct kvm_assigned_msix_nr { | |||
1314 | 1374 | ||
1315 | #define KVM_MAX_MSIX_PER_DEV 256 | 1375 | #define KVM_MAX_MSIX_PER_DEV 256 |
1316 | 1376 | ||
1377 | |||
1317 | 4.54 KVM_ASSIGN_SET_MSIX_ENTRY | 1378 | 4.54 KVM_ASSIGN_SET_MSIX_ENTRY |
1318 | 1379 | ||
1319 | Capability: KVM_CAP_DEVICE_MSIX | 1380 | Capability: KVM_CAP_DEVICE_MSIX |
@@ -1332,7 +1393,8 @@ struct kvm_assigned_msix_entry { | |||
1332 | __u16 padding[3]; | 1393 | __u16 padding[3]; |
1333 | }; | 1394 | }; |
1334 | 1395 | ||
1335 | 4.54 KVM_SET_TSC_KHZ | 1396 | |
1397 | 4.55 KVM_SET_TSC_KHZ | ||
1336 | 1398 | ||
1337 | Capability: KVM_CAP_TSC_CONTROL | 1399 | Capability: KVM_CAP_TSC_CONTROL |
1338 | Architectures: x86 | 1400 | Architectures: x86 |
@@ -1343,7 +1405,8 @@ Returns: 0 on success, -1 on error | |||
1343 | Specifies the tsc frequency for the virtual machine. The unit of the | 1405 | Specifies the tsc frequency for the virtual machine. The unit of the |
1344 | frequency is KHz. | 1406 | frequency is KHz. |
1345 | 1407 | ||
1346 | 4.55 KVM_GET_TSC_KHZ | 1408 | |
1409 | 4.56 KVM_GET_TSC_KHZ | ||
1347 | 1410 | ||
1348 | Capability: KVM_CAP_GET_TSC_KHZ | 1411 | Capability: KVM_CAP_GET_TSC_KHZ |
1349 | Architectures: x86 | 1412 | Architectures: x86 |
@@ -1355,7 +1418,8 @@ Returns the tsc frequency of the guest. The unit of the return value is | |||
1355 | KHz. If the host has unstable tsc this ioctl returns -EIO instead as an | 1418 | KHz. If the host has unstable tsc this ioctl returns -EIO instead as an |
1356 | error. | 1419 | error. |
1357 | 1420 | ||
1358 | 4.56 KVM_GET_LAPIC | 1421 | |
1422 | 4.57 KVM_GET_LAPIC | ||
1359 | 1423 | ||
1360 | Capability: KVM_CAP_IRQCHIP | 1424 | Capability: KVM_CAP_IRQCHIP |
1361 | Architectures: x86 | 1425 | Architectures: x86 |
@@ -1371,7 +1435,8 @@ struct kvm_lapic_state { | |||
1371 | Reads the Local APIC registers and copies them into the input argument. The | 1435 | Reads the Local APIC registers and copies them into the input argument. The |
1372 | data format and layout are the same as documented in the architecture manual. | 1436 | data format and layout are the same as documented in the architecture manual. |
1373 | 1437 | ||
1374 | 4.57 KVM_SET_LAPIC | 1438 | |
1439 | 4.58 KVM_SET_LAPIC | ||
1375 | 1440 | ||
1376 | Capability: KVM_CAP_IRQCHIP | 1441 | Capability: KVM_CAP_IRQCHIP |
1377 | Architectures: x86 | 1442 | Architectures: x86 |
@@ -1387,7 +1452,8 @@ struct kvm_lapic_state { | |||
1387 | Copies the input argument into the the Local APIC registers. The data format | 1452 | Copies the input argument into the the Local APIC registers. The data format |
1388 | and layout are the same as documented in the architecture manual. | 1453 | and layout are the same as documented in the architecture manual. |
1389 | 1454 | ||
1390 | 4.58 KVM_IOEVENTFD | 1455 | |
1456 | 4.59 KVM_IOEVENTFD | ||
1391 | 1457 | ||
1392 | Capability: KVM_CAP_IOEVENTFD | 1458 | Capability: KVM_CAP_IOEVENTFD |
1393 | Architectures: all | 1459 | Architectures: all |
@@ -1417,7 +1483,8 @@ The following flags are defined: | |||
1417 | If datamatch flag is set, the event will be signaled only if the written value | 1483 | If datamatch flag is set, the event will be signaled only if the written value |
1418 | to the registered address is equal to datamatch in struct kvm_ioeventfd. | 1484 | to the registered address is equal to datamatch in struct kvm_ioeventfd. |
1419 | 1485 | ||
1420 | 4.59 KVM_DIRTY_TLB | 1486 | |
1487 | 4.60 KVM_DIRTY_TLB | ||
1421 | 1488 | ||
1422 | Capability: KVM_CAP_SW_TLB | 1489 | Capability: KVM_CAP_SW_TLB |
1423 | Architectures: ppc | 1490 | Architectures: ppc |
@@ -1449,7 +1516,8 @@ The "num_dirty" field is a performance hint for KVM to determine whether it | |||
1449 | should skip processing the bitmap and just invalidate everything. It must | 1516 | should skip processing the bitmap and just invalidate everything. It must |
1450 | be set to the number of set bits in the bitmap. | 1517 | be set to the number of set bits in the bitmap. |
1451 | 1518 | ||
1452 | 4.60 KVM_ASSIGN_SET_INTX_MASK | 1519 | |
1520 | 4.61 KVM_ASSIGN_SET_INTX_MASK | ||
1453 | 1521 | ||
1454 | Capability: KVM_CAP_PCI_2_3 | 1522 | Capability: KVM_CAP_PCI_2_3 |
1455 | Architectures: x86 | 1523 | Architectures: x86 |
@@ -1482,6 +1550,7 @@ See KVM_ASSIGN_DEV_IRQ for the data structure. The target device is specified | |||
1482 | by assigned_dev_id. In the flags field, only KVM_DEV_ASSIGN_MASK_INTX is | 1550 | by assigned_dev_id. In the flags field, only KVM_DEV_ASSIGN_MASK_INTX is |
1483 | evaluated. | 1551 | evaluated. |
1484 | 1552 | ||
1553 | |||
1485 | 4.62 KVM_CREATE_SPAPR_TCE | 1554 | 4.62 KVM_CREATE_SPAPR_TCE |
1486 | 1555 | ||
1487 | Capability: KVM_CAP_SPAPR_TCE | 1556 | Capability: KVM_CAP_SPAPR_TCE |
@@ -1517,6 +1586,7 @@ the entries written by kernel-handled H_PUT_TCE calls, and also lets | |||
1517 | userspace update the TCE table directly which is useful in some | 1586 | userspace update the TCE table directly which is useful in some |
1518 | circumstances. | 1587 | circumstances. |
1519 | 1588 | ||
1589 | |||
1520 | 4.63 KVM_ALLOCATE_RMA | 1590 | 4.63 KVM_ALLOCATE_RMA |
1521 | 1591 | ||
1522 | Capability: KVM_CAP_PPC_RMA | 1592 | Capability: KVM_CAP_PPC_RMA |
@@ -1549,6 +1619,7 @@ is supported; 2 if the processor requires all virtual machines to have | |||
1549 | an RMA, or 1 if the processor can use an RMA but doesn't require it, | 1619 | an RMA, or 1 if the processor can use an RMA but doesn't require it, |
1550 | because it supports the Virtual RMA (VRMA) facility. | 1620 | because it supports the Virtual RMA (VRMA) facility. |
1551 | 1621 | ||
1622 | |||
1552 | 4.64 KVM_NMI | 1623 | 4.64 KVM_NMI |
1553 | 1624 | ||
1554 | Capability: KVM_CAP_USER_NMI | 1625 | Capability: KVM_CAP_USER_NMI |
@@ -1574,6 +1645,7 @@ following algorithm: | |||
1574 | Some guests configure the LINT1 NMI input to cause a panic, aiding in | 1645 | Some guests configure the LINT1 NMI input to cause a panic, aiding in |
1575 | debugging. | 1646 | debugging. |
1576 | 1647 | ||
1648 | |||
1577 | 4.65 KVM_S390_UCAS_MAP | 1649 | 4.65 KVM_S390_UCAS_MAP |
1578 | 1650 | ||
1579 | Capability: KVM_CAP_S390_UCONTROL | 1651 | Capability: KVM_CAP_S390_UCONTROL |
@@ -1593,6 +1665,7 @@ This ioctl maps the memory at "user_addr" with the length "length" to | |||
1593 | the vcpu's address space starting at "vcpu_addr". All parameters need to | 1665 | the vcpu's address space starting at "vcpu_addr". All parameters need to |
1594 | be alligned by 1 megabyte. | 1666 | be alligned by 1 megabyte. |
1595 | 1667 | ||
1668 | |||
1596 | 4.66 KVM_S390_UCAS_UNMAP | 1669 | 4.66 KVM_S390_UCAS_UNMAP |
1597 | 1670 | ||
1598 | Capability: KVM_CAP_S390_UCONTROL | 1671 | Capability: KVM_CAP_S390_UCONTROL |
@@ -1612,6 +1685,7 @@ This ioctl unmaps the memory in the vcpu's address space starting at | |||
1612 | "vcpu_addr" with the length "length". The field "user_addr" is ignored. | 1685 | "vcpu_addr" with the length "length". The field "user_addr" is ignored. |
1613 | All parameters need to be alligned by 1 megabyte. | 1686 | All parameters need to be alligned by 1 megabyte. |
1614 | 1687 | ||
1688 | |||
1615 | 4.67 KVM_S390_VCPU_FAULT | 1689 | 4.67 KVM_S390_VCPU_FAULT |
1616 | 1690 | ||
1617 | Capability: KVM_CAP_S390_UCONTROL | 1691 | Capability: KVM_CAP_S390_UCONTROL |
@@ -1628,6 +1702,7 @@ table upfront. This is useful to handle validity intercepts for user | |||
1628 | controlled virtual machines to fault in the virtual cpu's lowcore pages | 1702 | controlled virtual machines to fault in the virtual cpu's lowcore pages |
1629 | prior to calling the KVM_RUN ioctl. | 1703 | prior to calling the KVM_RUN ioctl. |
1630 | 1704 | ||
1705 | |||
1631 | 4.68 KVM_SET_ONE_REG | 1706 | 4.68 KVM_SET_ONE_REG |
1632 | 1707 | ||
1633 | Capability: KVM_CAP_ONE_REG | 1708 | Capability: KVM_CAP_ONE_REG |
@@ -1653,6 +1728,7 @@ registers, find a list below: | |||
1653 | | | | 1728 | | | |
1654 | PPC | KVM_REG_PPC_HIOR | 64 | 1729 | PPC | KVM_REG_PPC_HIOR | 64 |
1655 | 1730 | ||
1731 | |||
1656 | 4.69 KVM_GET_ONE_REG | 1732 | 4.69 KVM_GET_ONE_REG |
1657 | 1733 | ||
1658 | Capability: KVM_CAP_ONE_REG | 1734 | Capability: KVM_CAP_ONE_REG |
@@ -1669,6 +1745,7 @@ at the memory location pointed to by "addr". | |||
1669 | The list of registers accessible using this interface is identical to the | 1745 | The list of registers accessible using this interface is identical to the |
1670 | list in 4.64. | 1746 | list in 4.64. |
1671 | 1747 | ||
1748 | |||
1672 | 4.70 KVM_KVMCLOCK_CTRL | 1749 | 4.70 KVM_KVMCLOCK_CTRL |
1673 | 1750 | ||
1674 | Capability: KVM_CAP_KVMCLOCK_CTRL | 1751 | Capability: KVM_CAP_KVMCLOCK_CTRL |
@@ -1689,6 +1766,7 @@ where the guest will clear the flag: when the soft lockup watchdog timer resets | |||
1689 | itself or when a soft lockup is detected. This ioctl can be called any time | 1766 | itself or when a soft lockup is detected. This ioctl can be called any time |
1690 | after pausing the vcpu, but before it is resumed. | 1767 | after pausing the vcpu, but before it is resumed. |
1691 | 1768 | ||
1769 | |||
1692 | 4.71 KVM_SIGNAL_MSI | 1770 | 4.71 KVM_SIGNAL_MSI |
1693 | 1771 | ||
1694 | Capability: KVM_CAP_SIGNAL_MSI | 1772 | Capability: KVM_CAP_SIGNAL_MSI |
@@ -1710,7 +1788,9 @@ struct kvm_msi { | |||
1710 | 1788 | ||
1711 | No flags are defined so far. The corresponding field must be 0. | 1789 | No flags are defined so far. The corresponding field must be 0. |
1712 | 1790 | ||
1791 | |||
1713 | 5. The kvm_run structure | 1792 | 5. The kvm_run structure |
1793 | ------------------------ | ||
1714 | 1794 | ||
1715 | Application code obtains a pointer to the kvm_run structure by | 1795 | Application code obtains a pointer to the kvm_run structure by |
1716 | mmap()ing a vcpu fd. From that point, application code can control | 1796 | mmap()ing a vcpu fd. From that point, application code can control |
@@ -1951,7 +2031,9 @@ and usually define the validity of a groups of registers. (e.g. one bit | |||
1951 | 2031 | ||
1952 | }; | 2032 | }; |
1953 | 2033 | ||
2034 | |||
1954 | 6. Capabilities that can be enabled | 2035 | 6. Capabilities that can be enabled |
2036 | ----------------------------------- | ||
1955 | 2037 | ||
1956 | There are certain capabilities that change the behavior of the virtual CPU when | 2038 | There are certain capabilities that change the behavior of the virtual CPU when |
1957 | enabled. To enable them, please see section 4.37. Below you can find a list of | 2039 | enabled. To enable them, please see section 4.37. Below you can find a list of |
@@ -1967,6 +2049,7 @@ The following information is provided along with the description: | |||
1967 | Returns: the return value. General error numbers (EBADF, ENOMEM, EINVAL) | 2049 | Returns: the return value. General error numbers (EBADF, ENOMEM, EINVAL) |
1968 | are not detailed, but errors with specific meanings are. | 2050 | are not detailed, but errors with specific meanings are. |
1969 | 2051 | ||
2052 | |||
1970 | 6.1 KVM_CAP_PPC_OSI | 2053 | 6.1 KVM_CAP_PPC_OSI |
1971 | 2054 | ||
1972 | Architectures: ppc | 2055 | Architectures: ppc |
@@ -1980,6 +2063,7 @@ between the guest and the host. | |||
1980 | 2063 | ||
1981 | When this capability is enabled, KVM_EXIT_OSI can occur. | 2064 | When this capability is enabled, KVM_EXIT_OSI can occur. |
1982 | 2065 | ||
2066 | |||
1983 | 6.2 KVM_CAP_PPC_PAPR | 2067 | 6.2 KVM_CAP_PPC_PAPR |
1984 | 2068 | ||
1985 | Architectures: ppc | 2069 | Architectures: ppc |
@@ -1998,6 +2082,7 @@ HTAB invisible to the guest. | |||
1998 | 2082 | ||
1999 | When this capability is enabled, KVM_EXIT_PAPR_HCALL can occur. | 2083 | When this capability is enabled, KVM_EXIT_PAPR_HCALL can occur. |
2000 | 2084 | ||
2085 | |||
2001 | 6.3 KVM_CAP_SW_TLB | 2086 | 6.3 KVM_CAP_SW_TLB |
2002 | 2087 | ||
2003 | Architectures: ppc | 2088 | Architectures: ppc |