Searched refs:guest (Results 1 - 25 of 64) sorted by path

123

/linux-master/drivers/misc/cxl/
H A DMakefile8 cxl-$(CONFIG_PPC_PSERIES) += flash.o guest.o of.o hcalls.o
/linux-master/tools/virtio/ringtest/
H A Dmain.c226 .name = "guest-affinity",
278 " [--guest-affinity G]"
295 pthread_t host, guest; local
383 ret = pthread_create(&guest, NULL, start_guest, guest_arg);
386 ret = pthread_join(guest, &tret);
H A Dring.c59 struct guest { struct
65 } guest; variable in typeref:struct:guest
92 guest.avail_idx = 0;
93 guest.kicked_avail_idx = -1;
94 guest.last_used_idx = 0;
103 guest.num_free = ring_size;
111 /* guest side */
116 if (!guest.num_free)
119 guest.num_free--;
120 head = (ring_size - 1) & (guest
[all...]
H A Drun-on-all.sh13 #Don't run guest and host on same CPU
20 "$@" --host-affinity $HOST_AFFINITY --guest-affinity $cpu
H A Dvirtio_ring_0_9.c41 struct guest { struct
52 } guest; variable in typeref:struct:guest
78 guest.avail_idx = 0;
79 guest.kicked_avail_idx = -1;
80 guest.last_used_idx = 0;
83 guest.free_head = 0;
89 guest.num_free = ring_size;
98 /* guest side */
107 if (!guest.num_free)
111 head = (ring_size - 1) & (guest
[all...]
/linux-master/arch/arm64/kvm/
H A DMakefile15 guest.o debug.o reset.o sys_regs.o stacktrace.o \
/linux-master/arch/arm64/kvm/hyp/include/hyp/
H A Dswitch.h42 /* Check whether the FP regs are owned by the guest */
332 * restore the guest context lazily.
334 * instruction exception to the guest. Similarly for trapped SVE accesses.
382 /* Restore the guest state */
528 /* Check for guest hypervisor trapping */
570 * Uphold the requirements of the architecture by masking guest writes
661 * to the guest, or false if it hasn't.
682 * Are we single-stepping the guest, and took a PAC exception from the
695 * Return true when we were able to fixup the guest exit and should return to
696 * the guest, fals
[all...]
/linux-master/arch/mips/include/asm/
H A Dcpu-features.h666 #define cpu_guest_has_conf1 (cpu_data[0].guest.conf & (1 << 1))
669 #define cpu_guest_has_conf2 (cpu_data[0].guest.conf & (1 << 2))
672 #define cpu_guest_has_conf3 (cpu_data[0].guest.conf & (1 << 3))
675 #define cpu_guest_has_conf4 (cpu_data[0].guest.conf & (1 << 4))
678 #define cpu_guest_has_conf5 (cpu_data[0].guest.conf & (1 << 5))
681 #define cpu_guest_has_conf6 (cpu_data[0].guest.conf & (1 << 6))
684 #define cpu_guest_has_conf7 (cpu_data[0].guest.conf & (1 << 7))
687 #define cpu_guest_has_fpu (cpu_data[0].guest.options & MIPS_CPU_FPU)
690 #define cpu_guest_has_watch (cpu_data[0].guest.options & MIPS_CPU_WATCH)
693 #define cpu_guest_has_contextconfig (cpu_data[0].guest
[all...]
H A Dcpu-info.h104 struct guest_info guest; member in struct:cpuinfo_mips
/linux-master/arch/mips/kernel/
H A Dcpu-probe.c798 * Probe for certain guest capabilities by writing config bits and reading back.
812 * Probe for dynamic guest capabilities by changing certain config bits and
832 c->guest.conf |= BIT(1);
845 c->guest.options |= MIPS_CPU_FPU;
847 c->guest.options_dyn |= MIPS_CPU_FPU;
850 c->guest.options |= MIPS_CPU_WATCH;
852 c->guest.options_dyn |= MIPS_CPU_WATCH;
855 c->guest.options |= MIPS_CPU_PERF;
857 c->guest.options_dyn |= MIPS_CPU_PERF;
860 c->guest
[all...]
/linux-master/arch/mips/kvm/
H A Dtlb.c92 * Sets the root GuestID to match the current guest GuestID, for TLB operation
121 /* Set root GuestID for root probe and write of guest TLB entry */
153 * kvm_vz_guest_tlb_lookup() - Lookup a guest VZ TLB mapping.
155 * @gpa: Guest virtual address in a TLB mapped guest segment.
156 * @gpa: Pointer to output guest physical address it maps to.
158 * Converts a guest virtual address in a guest TLB mapped segment to a guest
159 * physical address, by probing the guest TLB.
161 * Returns: 0 if guest TL
[all...]
H A Dvz.c44 * Number of guest VTLB entries to use, so we can catch inconsistency between
75 * These Config bits may be writable by the guest:
119 * Permit guest FPU mode changes if FPU is enabled and the relevant
199 /* VZ guest has already converted gva to gpa */
218 * timer expiry is asynchronous to vcpu execution therefore defer guest
227 * timer expiry is asynchronous to vcpu execution therefore defer guest
239 * interrupts are asynchronous to vcpu execution therefore defer guest
251 * interrupts are asynchronous to vcpu execution therefore defer guest
329 * VZ guest timer handling.
333 * kvm_vz_should_use_htimer() - Find whether to use the VZ hard guest time
[all...]
/linux-master/arch/powerpc/
H A DMakefile254 $(call merge_into_defconfig,ppc64_defconfig,le guest kvm_guest)
258 $(call merge_into_defconfig,ppc64_defconfig,be guest kvm_guest)
/linux-master/arch/powerpc/include/asm/
H A Dkvm_book3s.h15 #include <asm/guest-state-buffer.h>
88 u64 tb_offset; /* guest timebase - host timebase */
653 * [0..KVM_MAX_VCPUS) space, using knowledge of the guest's core stride
658 * 0) unchanged: if the guest is filling each VCORE completely then it will be
666 * possible if the guest is leaving at least 1/2 of each VCORE empty, so IDs
671 * (blocks 2 and 3) are seen, the guest must be leaving at least 3/4 of each
674 * Finally, VCPU IDs from blocks 5..7 will only be seen if the guest is using a
679 * block number if the stride is 8. For cases where the guest's stride is less
H A Dkvm_host.h28 #include <asm/guest-state-buffer.h>
43 * hardware supports). Both guest and host use this value.
217 * which stores the guest's view of the second word of the HPTE
218 * (including the guest physical address of the mapping),
229 * The rmap array of size number of guest pages is allocated for each memslot.
230 * This array is used to store usage specific information about the guest page.
236 #define KVMPPC_RMAP_HPT 0x0100000000000000 /* HPT guest */
239 * rmap usage definition for a hash page table (hpt) guest:
244 * The bottom 32 bits are the index in the guest HPT of a HPTE that points to
260 /* Host virtual (linear mapping) address of guest HP
[all...]
/linux-master/arch/powerpc/kvm/
H A DMakefile91 guest-state-buffer.o \
95 obj-$(CONFIG_GUEST_STATE_BUFFER_TEST) += test-guest-state-buffer.o
H A Dbook3s_hv_nestedv2.c9 * processors as a NESTEDv2 guest.
27 #include <asm/guest-state-buffer.h>
718 * @iden: guest state ID
720 * Mark a guest state ID as having been changed by the L1 host and thus
746 * @iden: guest state ID
748 * Reload the value for the guest state ID from the L0 host into the L1 host.
801 pr_err("KVM-NESTEDv2: couldn't set guest wide elements\n");
823 * @lpid: guest id
H A Dguest-state-buffer.c6 #include <asm/guest-state-buffer.h>
18 * kvmppc_gsb_new() - create a new guest state buffer
19 * @size: total size of the guest state buffer (includes header)
24 * Returns a guest state buffer.
56 * kvmppc_gsb_free() - free a guest state buffer
57 * @gsb: guest state buffer
67 * kvmppc_gsb_put() - allocate space in a guest state buffer
177 * kvmppc_gsid_flags() - the flags for a guest state ID
178 * @iden: guest state ID
180 * Returns any flags for the guest stat
[all...]
H A Dtest-guest-state-buffer.c7 #include <asm/guest-state-buffer.h>
/linux-master/arch/s390/kernel/
H A Dentry.S181 * %r4 guest register save area
188 stg %r4,__SF_SIE_SAVEAREA(%r15) # save guest register save area
191 lmg %r0,%r13,0(%r4) # load guest gprs 0-13
207 # and handling it in a guest as result of the instruction execution.
229 lg %r14,__SF_SIE_SAVEAREA(%r15) # load guest register save area
230 stmg %r0,%r13,0(%r14) # save guest gprs 0-13
231 xgr %r0,%r0 # clear guest registers to
502 # would cause machine checks targeted at the guest to be
H A Dvtime.c127 u64 timer, clock, user, guest, system, hardirq, softirq; local
153 guest = update_tsk_timer(&tsk->thread.guest_timer,
162 clock - user - guest - system - hardirq - softirq;
170 if (guest) {
171 account_guest_time(tsk, cputime_to_nsecs(guest));
172 tsk->utimescaled += cputime_to_nsecs(scale_vtime(guest));
182 return virt_timer_forward(user + guest + system + hardirq + softirq);
/linux-master/arch/x86/coco/tdx/
H A Dtdx.c85 * It is used in the TDX guest driver module to get the TDREPORT0.
120 * It is used in the TDX guest driver module to get the TD Quote.
159 * to keep the guest running. Call it forever if it
182 * The highest bit of a guest physical address is the "sharing" bit.
214 * - As a result of guest TD execution of a disallowed instruction,
217 * - A notification to the guest TD about anomalous behavior;
267 * enabled status (RFLAGS.IF) of the TD guest and to determine
271 * pending, without hanging/breaking the guest.
704 * TDX guest is responsible for flushing TLB on private->shared
708 * with the guest'
[all...]
/linux-master/arch/x86/events/intel/
H A Dcore.c2918 * We may be running with guest PEBS events created by KVM, and the
2919 * PEBS records are logged into the guest's DS and invisible to host.
2921 * In the case of guest PEBS overflow, we only trigger a fake event
2922 * to emulate the PEBS overflow PMI for guest PEBS counters in KVM.
2923 * The guest will then vm-entry and check the guest DS area to read
2924 * the guest PEBS records.
2926 * The contents and other behavior of the guest event do not matter.
4108 * .host = the value the hardware has when it doesn't run a guest,
4109 * .guest
[all...]
/linux-master/arch/x86/hyperv/
H A Divm.c460 * In Isolation VM, all guest memory is encrypted from host and guest
534 * In Isolation VM, all guest memory is encrypted from host and guest
613 * Hyper-V always provides a single IO-APIC in a guest VM.
615 * in the guest context and must be mapped private.
663 x86_platform.guest.enc_cache_flush_required = hv_vtom_cache_flush_required;
664 x86_platform.guest.enc_tlb_flush_required = hv_vtom_tlb_flush_required;
665 x86_platform.guest.enc_status_change_prepare = hv_vtom_clear_present;
666 x86_platform.guest
[all...]
/linux-master/arch/x86/include/asm/
H A Dperf_event.h394 * We model guest LBR event tracing as another fixed-mode PMC like BTS.
400 * With this fake counter assigned, the guest LBR event user (such as KVM),
407 * Pseudo-encoding the guest LBR event as event=0x00,umask=0x1b,
550 u64 host, guest; member in struct:perf_guest_switch_msr

Completed in 369 milliseconds

123