Searched refs:guest (Results 26 - 50 of 64) sorted by relevance

123

/linux-master/arch/powerpc/kvm/
H A DMakefile91 guest-state-buffer.o \
95 obj-$(CONFIG_GUEST_STATE_BUFFER_TEST) += test-guest-state-buffer.o
H A Dtest-guest-state-buffer.c7 #include <asm/guest-state-buffer.h>
H A Dguest-state-buffer.c6 #include <asm/guest-state-buffer.h>
18 * kvmppc_gsb_new() - create a new guest state buffer
19 * @size: total size of the guest state buffer (includes header)
24 * Returns a guest state buffer.
56 * kvmppc_gsb_free() - free a guest state buffer
57 * @gsb: guest state buffer
67 * kvmppc_gsb_put() - allocate space in a guest state buffer
177 * kvmppc_gsid_flags() - the flags for a guest state ID
178 * @iden: guest state ID
180 * Returns any flags for the guest stat
[all...]
/linux-master/arch/x86/kernel/fpu/
H A Dxstate.h23 static inline u64 xstate_get_group_perm(bool guest) argument
29 perm = guest ? &fpu->guest_perm : &fpu->perm;
/linux-master/arch/x86/coco/tdx/
H A Dtdx.c85 * It is used in the TDX guest driver module to get the TDREPORT0.
120 * It is used in the TDX guest driver module to get the TD Quote.
159 * to keep the guest running. Call it forever if it
182 * The highest bit of a guest physical address is the "sharing" bit.
214 * - As a result of guest TD execution of a disallowed instruction,
217 * - A notification to the guest TD about anomalous behavior;
267 * enabled status (RFLAGS.IF) of the TD guest and to determine
271 * pending, without hanging/breaking the guest.
704 * TDX guest is responsible for flushing TLB on private->shared
708 * with the guest'
[all...]
/linux-master/arch/x86/hyperv/
H A Divm.c460 * In Isolation VM, all guest memory is encrypted from host and guest
534 * In Isolation VM, all guest memory is encrypted from host and guest
613 * Hyper-V always provides a single IO-APIC in a guest VM.
615 * in the guest context and must be mapped private.
663 x86_platform.guest.enc_cache_flush_required = hv_vtom_cache_flush_required;
664 x86_platform.guest.enc_tlb_flush_required = hv_vtom_tlb_flush_required;
665 x86_platform.guest.enc_status_change_prepare = hv_vtom_clear_present;
666 x86_platform.guest
[all...]
/linux-master/arch/x86/kernel/
H A Dx86_init.c159 .guest = {
/linux-master/arch/x86/kvm/vmx/
H A Dvmx.c166 * List of MSRs that can be directly passed to the guest.
195 * ple_window: upper bound on the amount of time a guest is allowed to execute
219 /* Default is SYSTEM mode, 1 for host-guest mode */
399 * Disable VERW's behavior of clearing CPU buffers for the guest if the
412 * If guest will not execute VERW, there is no need to set FB_CLEAR_DIS
413 * at VMEntry. Skip the MSR read/write when a guest has no use case to
898 /* When we are running a nested L2 guest and L1 specified for it a
911 * if MAXPHYADDR is smaller on the guest than on the
925 * might be used in the guest. Always trap #NM in this case
926 * to save guest xfd_er
[all...]
H A Dvmx.h71 struct pt_ctx guest; member in struct:pt_desc
98 /* Basic info about guest LBR records. */
103 * per-vcpu guest LBR event is scheduled on the current pcpu.
120 /* Has the level1 guest done vmxon? */
125 /* The guest-physical address of the current VMCS L1 keeps for L2 */
128 * Cache of the guest's VMCS, existing outside of guest memory.
129 * Loaded from guest memory during VMPTRLD. Flushed to guest
134 * Cache of the guest'
298 struct vmx_msrs guest; member in struct:vcpu_vmx::msr_autoload
303 struct vmx_msrs guest; member in struct:vcpu_vmx::msr_autostore
[all...]
H A Dnested.c205 /* TODO: not to reset guest simply here. */
952 * Load guest's/host's msr at nested entry/exit.
1008 int i = vmx_find_loadstore_msr_slot(&vmx->msr_autostore.guest,
1012 u64 val = vmx->msr_autostore.guest.val[i].value;
1099 struct vmx_msrs *autostore = &vmx->msr_autostore.guest;
1132 * Load guest's/host's cr3 at nested entry/exit. @nested_ept is true if we are
1133 * emulating VM-Entry into a guest with EPT enabled. On failure, the expected
1201 * full TLB flush from the guest's perspective. This is required even
1203 * MMU in response to the guest TLB flush.
1206 * EPT is a special snowflake, as guest
[all...]
/linux-master/drivers/gpu/drm/i915/gvt/
H A Dgtt.c74 /* translate a guest gmadr to host gmadr */
80 "invalid guest gmadr %llx\n", g_addr))
92 /* translate a host gmadr to guest gmadr */
552 bool guest)
559 pte_ops->get_entry(guest ? mm->ppgtt_mm.guest_pdps :
579 bool guest)
583 pte_ops->set_entry(guest ? mm->ppgtt_mm.guest_pdps :
653 bool guest)
664 ret = ops->get_entry(page_table, e, index, guest,
670 update_entry_type_for_real(ops, e, guest
550 _ppgtt_get_root_entry(struct intel_vgpu_mm *mm, struct intel_gvt_gtt_entry *entry, unsigned long index, bool guest) argument
577 _ppgtt_set_root_entry(struct intel_vgpu_mm *mm, struct intel_gvt_gtt_entry *entry, unsigned long index, bool guest) argument
649 ppgtt_spt_get_entry( struct intel_vgpu_ppgtt_spt *spt, void *page_table, int type, struct intel_gvt_gtt_entry *e, unsigned long index, bool guest) argument
678 ppgtt_spt_set_entry( struct intel_vgpu_ppgtt_spt *spt, void *page_table, int type, struct intel_gvt_gtt_entry *e, unsigned long index, bool guest) argument
2040 ppgtt_get_next_level_entry(struct intel_vgpu_mm *mm, struct intel_gvt_gtt_entry *e, unsigned long index, bool guest) argument
[all...]
/linux-master/drivers/media/pci/zoran/
H A Dzoran_device.c123 int post_office_write(struct zoran *zr, unsigned int guest, argument
129 ZR36057_POR_PO_DIR | ZR36057_POR_PO_TIME | ((guest & 7) << 20) |
136 int post_office_read(struct zoran *zr, unsigned int guest, unsigned int reg) argument
140 por = ZR36057_POR_PO_TIME | ((guest & 7) << 20) | ((reg & 7) << 16);
581 /* set the JPEG codec guest ID */
953 /* set up GPIO pins and guest bus timing */
/linux-master/drivers/virt/coco/tdx-guest/
H A Dtdx-guest.c3 * TDX guest user interface driver
21 #include <uapi/linux/tdx-guest.h>
/linux-master/tools/
H A DMakefile71 counter firewire hv guest bootconfig spi usb virtio mm bpf iio gpio objtool leds wmi pci firmware debugging tracing: FORCE
/linux-master/arch/x86/include/asm/
H A Dsev.h12 #include <linux/sev-guest.h>
125 * the guest OS. The guest OS uses the area to save the message sequence
H A Dperf_event.h394 * We model guest LBR event tracing as another fixed-mode PMC like BTS.
400 * With this fake counter assigned, the guest LBR event user (such as KVM),
407 * Pseudo-encoding the guest LBR event as event=0x00,umask=0x1b,
550 u64 host, guest; member in struct:perf_guest_switch_msr
/linux-master/arch/powerpc/
H A DMakefile250 $(call merge_into_defconfig,ppc64_defconfig,le guest kvm_guest)
254 $(call merge_into_defconfig,ppc64_defconfig,be guest kvm_guest)
/linux-master/arch/arm64/kvm/hyp/include/hyp/
H A Dswitch.h325 * restore the guest context lazily.
327 * instruction exception to the guest. Similarly for trapped SVE accesses.
375 /* Restore the guest state */
467 /* Check for guest hypervisor trapping */
509 * Uphold the requirements of the architecture by masking guest writes
597 * to the guest, or false if it hasn't.
618 * Are we single-stepping the guest, and took a PAC exception from the
631 * Return true when we were able to fixup the guest exit and should return to
632 * the guest, false when we should restore the host state and return to the
679 goto guest;
[all...]
/linux-master/arch/mips/kvm/
H A Dtlb.c92 * Sets the root GuestID to match the current guest GuestID, for TLB operation
121 /* Set root GuestID for root probe and write of guest TLB entry */
153 * kvm_vz_guest_tlb_lookup() - Lookup a guest VZ TLB mapping.
155 * @gpa: Guest virtual address in a TLB mapped guest segment.
156 * @gpa: Pointer to output guest physical address it maps to.
158 * Converts a guest virtual address in a guest TLB mapped segment to a guest
159 * physical address, by probing the guest TLB.
161 * Returns: 0 if guest TL
[all...]
/linux-master/tools/testing/selftests/kvm/s390x/
H A Dmemop.c268 /* End of guest code reached */
392 * candidate to ensure the guest AR (of zero) is used.
526 static void choose_block(bool guest, int i, int *size, int *offset) argument
531 if (guest) {
544 static __uint128_t permutate_bits(bool guest, int i, int size, __uint128_t old) argument
552 if (guest)
829 * the guest in order to be able to read the TEID from guest memory.
830 * Set the guest program new PSW, so the guest stat
[all...]
/linux-master/arch/x86/events/intel/
H A Dcore.c2918 * We may be running with guest PEBS events created by KVM, and the
2919 * PEBS records are logged into the guest's DS and invisible to host.
2921 * In the case of guest PEBS overflow, we only trigger a fake event
2922 * to emulate the PEBS overflow PMI for guest PEBS counters in KVM.
2923 * The guest will then vm-entry and check the guest DS area to read
2924 * the guest PEBS records.
2926 * The contents and other behavior of the guest event do not matter.
4108 * .host = the value the hardware has when it doesn't run a guest,
4109 * .guest
[all...]
/linux-master/tools/perf/scripts/python/
H A Dexport-to-sqlite.py341 'CASE WHEN id=0 THEN \'unknown\' WHEN pid=-1 THEN \'host\' ELSE \'guest\' END AS host_or_guest'
/linux-master/drivers/gpu/drm/vmwgfx/
H A Dvmwgfx_surface.c147 .type_name = "guest backed surfaces",
318 body->guest.ptr = *ptr;
319 body->guest.ptr.offset += cur_offset->bo_offset;
320 body->guest.pitch = vmw_surface_calculate_pitch(desc, cur_size);
339 body->guest.pitch);
400 * May return other errors if the kernel is out of guest resources.
472 * May return other errors if the kernel is out of guest resources.
/linux-master/arch/x86/mm/pat/
H A Dset_memory.c525 * This also fixes the Linux Xen paravirt guest boot failure caused
527 * mappings. In this paravirt guest case, the kernel text mapping
2195 if (x86_platform.guest.enc_tlb_flush_required(enc))
2196 cpa_flush(&cpa, x86_platform.guest.enc_cache_flush_required());
2199 if (!x86_platform.guest.enc_status_change_prepare(addr, numpages, enc))
2217 if (!x86_platform.guest.enc_status_change_finish(addr, numpages, enc))
/linux-master/drivers/misc/cxl/
H A Dcxl.h479 struct cxl_afu_guest *guest; member in struct:cxl_afu
598 * In a guest, we only find out about the pe used by pHyp when the
680 struct cxl_guest *guest; member in struct:cxl
996 * On a guest environment, PSL_PID_An is located on the upper 32 bits and

Completed in 486 milliseconds

123