/linux-master/arch/powerpc/kvm/ |
H A D | Makefile | 91 guest-state-buffer.o \ 95 obj-$(CONFIG_GUEST_STATE_BUFFER_TEST) += test-guest-state-buffer.o
|
H A D | test-guest-state-buffer.c | 7 #include <asm/guest-state-buffer.h>
|
H A D | guest-state-buffer.c | 6 #include <asm/guest-state-buffer.h> 18 * kvmppc_gsb_new() - create a new guest state buffer 19 * @size: total size of the guest state buffer (includes header) 24 * Returns a guest state buffer. 56 * kvmppc_gsb_free() - free a guest state buffer 57 * @gsb: guest state buffer 67 * kvmppc_gsb_put() - allocate space in a guest state buffer 177 * kvmppc_gsid_flags() - the flags for a guest state ID 178 * @iden: guest state ID 180 * Returns any flags for the guest stat [all...] |
/linux-master/arch/x86/kernel/fpu/ |
H A D | xstate.h | 23 static inline u64 xstate_get_group_perm(bool guest) argument 29 perm = guest ? &fpu->guest_perm : &fpu->perm;
|
/linux-master/arch/x86/coco/tdx/ |
H A D | tdx.c | 85 * It is used in the TDX guest driver module to get the TDREPORT0. 120 * It is used in the TDX guest driver module to get the TD Quote. 159 * to keep the guest running. Call it forever if it 182 * The highest bit of a guest physical address is the "sharing" bit. 214 * - As a result of guest TD execution of a disallowed instruction, 217 * - A notification to the guest TD about anomalous behavior; 267 * enabled status (RFLAGS.IF) of the TD guest and to determine 271 * pending, without hanging/breaking the guest. 704 * TDX guest is responsible for flushing TLB on private->shared 708 * with the guest' [all...] |
/linux-master/arch/x86/hyperv/ |
H A D | ivm.c | 460 * In Isolation VM, all guest memory is encrypted from host and guest 534 * In Isolation VM, all guest memory is encrypted from host and guest 613 * Hyper-V always provides a single IO-APIC in a guest VM. 615 * in the guest context and must be mapped private. 663 x86_platform.guest.enc_cache_flush_required = hv_vtom_cache_flush_required; 664 x86_platform.guest.enc_tlb_flush_required = hv_vtom_tlb_flush_required; 665 x86_platform.guest.enc_status_change_prepare = hv_vtom_clear_present; 666 x86_platform.guest [all...] |
/linux-master/arch/x86/kernel/ |
H A D | x86_init.c | 159 .guest = {
|
/linux-master/arch/x86/kvm/vmx/ |
H A D | vmx.c | 166 * List of MSRs that can be directly passed to the guest. 195 * ple_window: upper bound on the amount of time a guest is allowed to execute 219 /* Default is SYSTEM mode, 1 for host-guest mode */ 399 * Disable VERW's behavior of clearing CPU buffers for the guest if the 412 * If guest will not execute VERW, there is no need to set FB_CLEAR_DIS 413 * at VMEntry. Skip the MSR read/write when a guest has no use case to 898 /* When we are running a nested L2 guest and L1 specified for it a 911 * if MAXPHYADDR is smaller on the guest than on the 925 * might be used in the guest. Always trap #NM in this case 926 * to save guest xfd_er [all...] |
H A D | vmx.h | 71 struct pt_ctx guest; member in struct:pt_desc 98 /* Basic info about guest LBR records. */ 103 * per-vcpu guest LBR event is scheduled on the current pcpu. 120 /* Has the level1 guest done vmxon? */ 125 /* The guest-physical address of the current VMCS L1 keeps for L2 */ 128 * Cache of the guest's VMCS, existing outside of guest memory. 129 * Loaded from guest memory during VMPTRLD. Flushed to guest 134 * Cache of the guest' 298 struct vmx_msrs guest; member in struct:vcpu_vmx::msr_autoload 303 struct vmx_msrs guest; member in struct:vcpu_vmx::msr_autostore [all...] |
H A D | nested.c | 205 /* TODO: not to reset guest simply here. */ 952 * Load guest's/host's msr at nested entry/exit. 1008 int i = vmx_find_loadstore_msr_slot(&vmx->msr_autostore.guest, 1012 u64 val = vmx->msr_autostore.guest.val[i].value; 1099 struct vmx_msrs *autostore = &vmx->msr_autostore.guest; 1132 * Load guest's/host's cr3 at nested entry/exit. @nested_ept is true if we are 1133 * emulating VM-Entry into a guest with EPT enabled. On failure, the expected 1201 * full TLB flush from the guest's perspective. This is required even 1203 * MMU in response to the guest TLB flush. 1206 * EPT is a special snowflake, as guest [all...] |
/linux-master/drivers/gpu/drm/i915/gvt/ |
H A D | gtt.c | 74 /* translate a guest gmadr to host gmadr */ 80 "invalid guest gmadr %llx\n", g_addr)) 92 /* translate a host gmadr to guest gmadr */ 552 bool guest) 559 pte_ops->get_entry(guest ? mm->ppgtt_mm.guest_pdps : 579 bool guest) 583 pte_ops->set_entry(guest ? mm->ppgtt_mm.guest_pdps : 653 bool guest) 664 ret = ops->get_entry(page_table, e, index, guest, 670 update_entry_type_for_real(ops, e, guest 550 _ppgtt_get_root_entry(struct intel_vgpu_mm *mm, struct intel_gvt_gtt_entry *entry, unsigned long index, bool guest) argument 577 _ppgtt_set_root_entry(struct intel_vgpu_mm *mm, struct intel_gvt_gtt_entry *entry, unsigned long index, bool guest) argument 649 ppgtt_spt_get_entry( struct intel_vgpu_ppgtt_spt *spt, void *page_table, int type, struct intel_gvt_gtt_entry *e, unsigned long index, bool guest) argument 678 ppgtt_spt_set_entry( struct intel_vgpu_ppgtt_spt *spt, void *page_table, int type, struct intel_gvt_gtt_entry *e, unsigned long index, bool guest) argument 2040 ppgtt_get_next_level_entry(struct intel_vgpu_mm *mm, struct intel_gvt_gtt_entry *e, unsigned long index, bool guest) argument [all...] |
/linux-master/drivers/media/pci/zoran/ |
H A D | zoran_device.c | 123 int post_office_write(struct zoran *zr, unsigned int guest, argument 129 ZR36057_POR_PO_DIR | ZR36057_POR_PO_TIME | ((guest & 7) << 20) | 136 int post_office_read(struct zoran *zr, unsigned int guest, unsigned int reg) argument 140 por = ZR36057_POR_PO_TIME | ((guest & 7) << 20) | ((reg & 7) << 16); 581 /* set the JPEG codec guest ID */ 953 /* set up GPIO pins and guest bus timing */
|
/linux-master/drivers/virt/coco/tdx-guest/ |
H A D | tdx-guest.c | 3 * TDX guest user interface driver 21 #include <uapi/linux/tdx-guest.h>
|
/linux-master/tools/ |
H A D | Makefile | 71 counter firewire hv guest bootconfig spi usb virtio mm bpf iio gpio objtool leds wmi pci firmware debugging tracing: FORCE
|
/linux-master/arch/x86/include/asm/ |
H A D | sev.h | 12 #include <linux/sev-guest.h> 125 * the guest OS. The guest OS uses the area to save the message sequence
|
H A D | perf_event.h | 394 * We model guest LBR event tracing as another fixed-mode PMC like BTS. 400 * With this fake counter assigned, the guest LBR event user (such as KVM), 407 * Pseudo-encoding the guest LBR event as event=0x00,umask=0x1b, 550 u64 host, guest; member in struct:perf_guest_switch_msr
|
/linux-master/arch/powerpc/ |
H A D | Makefile | 250 $(call merge_into_defconfig,ppc64_defconfig,le guest kvm_guest) 254 $(call merge_into_defconfig,ppc64_defconfig,be guest kvm_guest)
|
/linux-master/arch/arm64/kvm/hyp/include/hyp/ |
H A D | switch.h | 325 * restore the guest context lazily. 327 * instruction exception to the guest. Similarly for trapped SVE accesses. 375 /* Restore the guest state */ 467 /* Check for guest hypervisor trapping */ 509 * Uphold the requirements of the architecture by masking guest writes 597 * to the guest, or false if it hasn't. 618 * Are we single-stepping the guest, and took a PAC exception from the 631 * Return true when we were able to fixup the guest exit and should return to 632 * the guest, false when we should restore the host state and return to the 679 goto guest; [all...] |
/linux-master/arch/mips/kvm/ |
H A D | tlb.c | 92 * Sets the root GuestID to match the current guest GuestID, for TLB operation 121 /* Set root GuestID for root probe and write of guest TLB entry */ 153 * kvm_vz_guest_tlb_lookup() - Lookup a guest VZ TLB mapping. 155 * @gpa: Guest virtual address in a TLB mapped guest segment. 156 * @gpa: Pointer to output guest physical address it maps to. 158 * Converts a guest virtual address in a guest TLB mapped segment to a guest 159 * physical address, by probing the guest TLB. 161 * Returns: 0 if guest TL [all...] |
/linux-master/tools/testing/selftests/kvm/s390x/ |
H A D | memop.c | 268 /* End of guest code reached */ 392 * candidate to ensure the guest AR (of zero) is used. 526 static void choose_block(bool guest, int i, int *size, int *offset) argument 531 if (guest) { 544 static __uint128_t permutate_bits(bool guest, int i, int size, __uint128_t old) argument 552 if (guest) 829 * the guest in order to be able to read the TEID from guest memory. 830 * Set the guest program new PSW, so the guest stat [all...] |
/linux-master/arch/x86/events/intel/ |
H A D | core.c | 2918 * We may be running with guest PEBS events created by KVM, and the 2919 * PEBS records are logged into the guest's DS and invisible to host. 2921 * In the case of guest PEBS overflow, we only trigger a fake event 2922 * to emulate the PEBS overflow PMI for guest PEBS counters in KVM. 2923 * The guest will then vm-entry and check the guest DS area to read 2924 * the guest PEBS records. 2926 * The contents and other behavior of the guest event do not matter. 4108 * .host = the value the hardware has when it doesn't run a guest, 4109 * .guest [all...] |
/linux-master/tools/perf/scripts/python/ |
H A D | export-to-sqlite.py | 341 'CASE WHEN id=0 THEN \'unknown\' WHEN pid=-1 THEN \'host\' ELSE \'guest\' END AS host_or_guest'
|
/linux-master/drivers/gpu/drm/vmwgfx/ |
H A D | vmwgfx_surface.c | 147 .type_name = "guest backed surfaces", 318 body->guest.ptr = *ptr; 319 body->guest.ptr.offset += cur_offset->bo_offset; 320 body->guest.pitch = vmw_surface_calculate_pitch(desc, cur_size); 339 body->guest.pitch); 400 * May return other errors if the kernel is out of guest resources. 472 * May return other errors if the kernel is out of guest resources.
|
/linux-master/arch/x86/mm/pat/ |
H A D | set_memory.c | 525 * This also fixes the Linux Xen paravirt guest boot failure caused 527 * mappings. In this paravirt guest case, the kernel text mapping 2195 if (x86_platform.guest.enc_tlb_flush_required(enc)) 2196 cpa_flush(&cpa, x86_platform.guest.enc_cache_flush_required()); 2199 if (!x86_platform.guest.enc_status_change_prepare(addr, numpages, enc)) 2217 if (!x86_platform.guest.enc_status_change_finish(addr, numpages, enc))
|
/linux-master/drivers/misc/cxl/ |
H A D | cxl.h | 479 struct cxl_afu_guest *guest; member in struct:cxl_afu 598 * In a guest, we only find out about the pe used by pHyp when the 680 struct cxl_guest *guest; member in struct:cxl 996 * On a guest environment, PSL_PID_An is located on the upper 32 bits and
|