@@ -547,7 +547,7 @@ ioctl is useful if the in-kernel PIC is not used.
547
547
PPC:
548
548
^^^^
549
549
550
- Queues an external interrupt to be injected. This ioctl is overleaded
550
+ Queues an external interrupt to be injected. This ioctl is overloaded
551
551
with 3 different irq values:
552
552
553
553
a) KVM_INTERRUPT_SET
@@ -998,7 +998,7 @@ be set in the flags field of this ioctl:
998
998
The KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL flag requests KVM to generate
999
999
the contents of the hypercall page automatically; hypercalls will be
1000
1000
intercepted and passed to userspace through KVM_EXIT_XEN. In this
1001
- ase , all of the blob size and address fields must be zero.
1001
+ case , all of the blob size and address fields must be zero.
1002
1002
1003
1003
The KVM_XEN_HVM_CONFIG_EVTCHN_SEND flag indicates to KVM that userspace
1004
1004
will always use the KVM_XEN_HVM_EVTCHN_SEND ioctl to deliver event
@@ -1103,7 +1103,7 @@ Other flags returned by ``KVM_GET_CLOCK`` are accepted but ignored.
1103
1103
:Extended by: KVM_CAP_INTR_SHADOW
1104
1104
:Architectures: x86, arm64
1105
1105
:Type: vcpu ioctl
1106
- :Parameters: struct kvm_vcpu_event (out)
1106
+ :Parameters: struct kvm_vcpu_events (out)
1107
1107
:Returns: 0 on success, -1 on error
1108
1108
1109
1109
X86:
@@ -1226,7 +1226,7 @@ directly to the virtual CPU).
1226
1226
:Extended by: KVM_CAP_INTR_SHADOW
1227
1227
:Architectures: x86, arm64
1228
1228
:Type: vcpu ioctl
1229
- :Parameters: struct kvm_vcpu_event (in)
1229
+ :Parameters: struct kvm_vcpu_events (in)
1230
1230
:Returns: 0 on success, -1 on error
1231
1231
1232
1232
X86:
@@ -3115,7 +3115,7 @@ as follow::
3115
3115
};
3116
3116
3117
3117
An entry with a "page_shift" of 0 is unused. Because the array is
3118
- organized in increasing order, a lookup can stop when encoutering
3118
+ organized in increasing order, a lookup can stop when encountering
3119
3119
such an entry.
3120
3120
3121
3121
The "slb_enc" field provides the encoding to use in the SLB for the
@@ -3507,7 +3507,7 @@ Possible features:
3507
3507
- KVM_RUN and KVM_GET_REG_LIST are not available;
3508
3508
3509
3509
- KVM_GET_ONE_REG and KVM_SET_ONE_REG cannot be used to access
3510
- the scalable archietctural SVE registers
3510
+ the scalable architectural SVE registers
3511
3511
KVM_REG_ARM64_SVE_ZREG(), KVM_REG_ARM64_SVE_PREG() or
3512
3512
KVM_REG_ARM64_SVE_FFR;
3513
3513
@@ -4453,7 +4453,7 @@ This will have undefined effects on the guest if it has not already
4453
4453
placed itself in a quiescent state where no vcpu will make MMU enabled
4454
4454
memory accesses.
4455
4455
4456
- On succsful completion, the pending HPT will become the guest's active
4456
+ On successful completion, the pending HPT will become the guest's active
4457
4457
HPT and the previous HPT will be discarded.
4458
4458
4459
4459
On failure, the guest will still be operating on its previous HPT.
@@ -5068,7 +5068,7 @@ before the vcpu is fully usable.
5068
5068
5069
5069
Between KVM_ARM_VCPU_INIT and KVM_ARM_VCPU_FINALIZE, the feature may be
5070
5070
configured by use of ioctls such as KVM_SET_ONE_REG. The exact configuration
5071
- that should be performaned and how to do it are feature-dependent.
5071
+ that should be performed and how to do it are feature-dependent.
5072
5072
5073
5073
Other calls that depend on a particular feature being finalized, such as
5074
5074
KVM_RUN, KVM_GET_REG_LIST, KVM_GET_ONE_REG and KVM_SET_ONE_REG, will fail with
@@ -5176,6 +5176,24 @@ Valid values for 'action'::
5176
5176
#define KVM_PMU_EVENT_ALLOW 0
5177
5177
#define KVM_PMU_EVENT_DENY 1
5178
5178
5179
+ Via this API, KVM userspace can also control the behavior of the VM's fixed
5180
+ counters (if any) by configuring the "action" and "fixed_counter_bitmap" fields.
5181
+
5182
+ Specifically, KVM follows the following pseudo-code when determining whether to
5183
+ allow the guest FixCtr[i] to count its pre-defined fixed event::
5184
+
5185
+ FixCtr[i]_is_allowed = (action == ALLOW) && (bitmap & BIT(i)) ||
5186
+ (action == DENY) && !(bitmap & BIT(i));
5187
+ FixCtr[i]_is_denied = !FixCtr[i]_is_allowed;
5188
+
5189
+ KVM always consumes fixed_counter_bitmap, it's userspace's responsibility to
5190
+ ensure fixed_counter_bitmap is set correctly, e.g. if userspace wants to define
5191
+ a filter that only affects general purpose counters.
5192
+
5193
+ Note, the "events" field also applies to fixed counters' hardcoded event_select
5194
+ and unit_mask values. "fixed_counter_bitmap" has higher priority than "events"
5195
+ if there is a contradiction between the two.
5196
+
5179
5197
4.121 KVM_PPC_SVM_OFF
5180
5198
---------------------
5181
5199
@@ -5527,7 +5545,7 @@ KVM_XEN_ATTR_TYPE_EVTCHN
5527
5545
from the guest. A given sending port number may be directed back to
5528
5546
a specified vCPU (by APIC ID) / port / priority on the guest, or to
5529
5547
trigger events on an eventfd. The vCPU and priority can be changed
5530
- by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but but other
5548
+ by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but other
5531
5549
fields cannot change for a given sending port. A port mapping is
5532
5550
removed by using KVM_XEN_EVTCHN_DEASSIGN in the flags field. Passing
5533
5551
KVM_XEN_EVTCHN_RESET in the flags field removes all interception of
0 commit comments