@@ -547,7 +547,7 @@ ioctl is useful if the in-kernel PIC is not used.
547547PPC:
548548^^^^
549549
550- Queues an external interrupt to be injected. This ioctl is overleaded
550+ Queues an external interrupt to be injected. This ioctl is overloaded
551551with 3 different irq values:
552552
553553a) KVM_INTERRUPT_SET
@@ -998,7 +998,7 @@ be set in the flags field of this ioctl:
998998The KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL flag requests KVM to generate
999999the contents of the hypercall page automatically; hypercalls will be
10001000intercepted and passed to userspace through KVM_EXIT_XEN. In this
1001- ase , all of the blob size and address fields must be zero.
1001+ case , all of the blob size and address fields must be zero.
10021002
10031003The KVM_XEN_HVM_CONFIG_EVTCHN_SEND flag indicates to KVM that userspace
10041004will always use the KVM_XEN_HVM_EVTCHN_SEND ioctl to deliver event
@@ -1103,7 +1103,7 @@ Other flags returned by ``KVM_GET_CLOCK`` are accepted but ignored.
11031103:Extended by: KVM_CAP_INTR_SHADOW
11041104:Architectures: x86, arm64
11051105:Type: vcpu ioctl
1106- :Parameters: struct kvm_vcpu_event (out)
1106+ :Parameters: struct kvm_vcpu_events (out)
11071107:Returns: 0 on success, -1 on error
11081108
11091109X86:
@@ -1226,7 +1226,7 @@ directly to the virtual CPU).
12261226:Extended by: KVM_CAP_INTR_SHADOW
12271227:Architectures: x86, arm64
12281228:Type: vcpu ioctl
1229- :Parameters: struct kvm_vcpu_event (in)
1229+ :Parameters: struct kvm_vcpu_events (in)
12301230:Returns: 0 on success, -1 on error
12311231
12321232X86:
@@ -3115,7 +3115,7 @@ as follow::
31153115 };
31163116
31173117An entry with a "page_shift" of 0 is unused. Because the array is
3118- organized in increasing order, a lookup can stop when encoutering
3118+ organized in increasing order, a lookup can stop when encountering
31193119such an entry.
31203120
31213121The "slb_enc" field provides the encoding to use in the SLB for the
@@ -3507,7 +3507,7 @@ Possible features:
35073507 - KVM_RUN and KVM_GET_REG_LIST are not available;
35083508
35093509 - KVM_GET_ONE_REG and KVM_SET_ONE_REG cannot be used to access
3510- the scalable archietctural SVE registers
3510+ the scalable architectural SVE registers
35113511 KVM_REG_ARM64_SVE_ZREG(), KVM_REG_ARM64_SVE_PREG() or
35123512 KVM_REG_ARM64_SVE_FFR;
35133513
@@ -4453,7 +4453,7 @@ This will have undefined effects on the guest if it has not already
44534453placed itself in a quiescent state where no vcpu will make MMU enabled
44544454memory accesses.
44554455
4456- On succsful completion, the pending HPT will become the guest's active
4456+ On successful completion, the pending HPT will become the guest's active
44574457HPT and the previous HPT will be discarded.
44584458
44594459On failure, the guest will still be operating on its previous HPT.
@@ -5068,7 +5068,7 @@ before the vcpu is fully usable.
50685068
50695069Between KVM_ARM_VCPU_INIT and KVM_ARM_VCPU_FINALIZE, the feature may be
50705070configured by use of ioctls such as KVM_SET_ONE_REG. The exact configuration
5071- that should be performaned and how to do it are feature-dependent.
5071+ that should be performed and how to do it are feature-dependent.
50725072
50735073Other calls that depend on a particular feature being finalized, such as
50745074KVM_RUN, KVM_GET_REG_LIST, KVM_GET_ONE_REG and KVM_SET_ONE_REG, will fail with
@@ -5176,6 +5176,24 @@ Valid values for 'action'::
51765176 #define KVM_PMU_EVENT_ALLOW 0
51775177 #define KVM_PMU_EVENT_DENY 1
51785178
5179+ Via this API, KVM userspace can also control the behavior of the VM's fixed
5180+ counters (if any) by configuring the "action" and "fixed_counter_bitmap" fields.
5181+
5182+ Specifically, KVM follows the following pseudo-code when determining whether to
5183+ allow the guest FixCtr[i] to count its pre-defined fixed event::
5184+
5185+ FixCtr[i]_is_allowed = (action == ALLOW) && (bitmap & BIT(i)) ||
5186+ (action == DENY) && !(bitmap & BIT(i));
5187+ FixCtr[i]_is_denied = !FixCtr[i]_is_allowed;
5188+
5189+ KVM always consumes fixed_counter_bitmap, it's userspace's responsibility to
5190+ ensure fixed_counter_bitmap is set correctly, e.g. if userspace wants to define
5191+ a filter that only affects general purpose counters.
5192+
5193+ Note, the "events" field also applies to fixed counters' hardcoded event_select
5194+ and unit_mask values. "fixed_counter_bitmap" has higher priority than "events"
5195+ if there is a contradiction between the two.
5196+
517951974.121 KVM_PPC_SVM_OFF
51805198---------------------
51815199
@@ -5527,7 +5545,7 @@ KVM_XEN_ATTR_TYPE_EVTCHN
55275545 from the guest. A given sending port number may be directed back to
55285546 a specified vCPU (by APIC ID) / port / priority on the guest, or to
55295547 trigger events on an eventfd. The vCPU and priority can be changed
5530- by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but but other
5548+ by setting KVM_XEN_EVTCHN_UPDATE in a subsequent call, but other
55315549 fields cannot change for a given sending port. A port mapping is
55325550 removed by using KVM_XEN_EVTCHN_DEASSIGN in the flags field. Passing
55335551 KVM_XEN_EVTCHN_RESET in the flags field removes all interception of
0 commit comments