/linux-master/drivers/misc/cxl/ |
H A D | Makefile | 8 cxl-$(CONFIG_PPC_PSERIES) += flash.o guest.o of.o hcalls.o
|
/linux-master/tools/virtio/ringtest/ |
H A D | main.c | 226 .name = "guest-affinity", 278 " [--guest-affinity G]" 295 pthread_t host, guest; local 383 ret = pthread_create(&guest, NULL, start_guest, guest_arg); 386 ret = pthread_join(guest, &tret);
|
H A D | ring.c | 59 struct guest { struct 65 } guest; variable in typeref:struct:guest 92 guest.avail_idx = 0; 93 guest.kicked_avail_idx = -1; 94 guest.last_used_idx = 0; 103 guest.num_free = ring_size; 111 /* guest side */ 116 if (!guest.num_free) 119 guest.num_free--; 120 head = (ring_size - 1) & (guest [all...] |
H A D | run-on-all.sh | 13 #Don't run guest and host on same CPU 20 "$@" --host-affinity $HOST_AFFINITY --guest-affinity $cpu
|
H A D | virtio_ring_0_9.c | 41 struct guest { struct 52 } guest; variable in typeref:struct:guest 78 guest.avail_idx = 0; 79 guest.kicked_avail_idx = -1; 80 guest.last_used_idx = 0; 83 guest.free_head = 0; 89 guest.num_free = ring_size; 98 /* guest side */ 107 if (!guest.num_free) 111 head = (ring_size - 1) & (guest [all...] |
/linux-master/arch/arm64/kvm/ |
H A D | Makefile | 15 guest.o debug.o reset.o sys_regs.o stacktrace.o \
|
/linux-master/arch/arm64/kvm/hyp/include/hyp/ |
H A D | switch.h | 42 /* Check whether the FP regs are owned by the guest */ 332 * restore the guest context lazily. 334 * instruction exception to the guest. Similarly for trapped SVE accesses. 382 /* Restore the guest state */ 528 /* Check for guest hypervisor trapping */ 570 * Uphold the requirements of the architecture by masking guest writes 661 * to the guest, or false if it hasn't. 682 * Are we single-stepping the guest, and took a PAC exception from the 695 * Return true when we were able to fixup the guest exit and should return to 696 * the guest, fals [all...] |
/linux-master/arch/mips/include/asm/ |
H A D | cpu-features.h | 666 #define cpu_guest_has_conf1 (cpu_data[0].guest.conf & (1 << 1)) 669 #define cpu_guest_has_conf2 (cpu_data[0].guest.conf & (1 << 2)) 672 #define cpu_guest_has_conf3 (cpu_data[0].guest.conf & (1 << 3)) 675 #define cpu_guest_has_conf4 (cpu_data[0].guest.conf & (1 << 4)) 678 #define cpu_guest_has_conf5 (cpu_data[0].guest.conf & (1 << 5)) 681 #define cpu_guest_has_conf6 (cpu_data[0].guest.conf & (1 << 6)) 684 #define cpu_guest_has_conf7 (cpu_data[0].guest.conf & (1 << 7)) 687 #define cpu_guest_has_fpu (cpu_data[0].guest.options & MIPS_CPU_FPU) 690 #define cpu_guest_has_watch (cpu_data[0].guest.options & MIPS_CPU_WATCH) 693 #define cpu_guest_has_contextconfig (cpu_data[0].guest [all...] |
H A D | cpu-info.h | 104 struct guest_info guest; member in struct:cpuinfo_mips
|
/linux-master/arch/mips/kernel/ |
H A D | cpu-probe.c | 798 * Probe for certain guest capabilities by writing config bits and reading back. 812 * Probe for dynamic guest capabilities by changing certain config bits and 832 c->guest.conf |= BIT(1); 845 c->guest.options |= MIPS_CPU_FPU; 847 c->guest.options_dyn |= MIPS_CPU_FPU; 850 c->guest.options |= MIPS_CPU_WATCH; 852 c->guest.options_dyn |= MIPS_CPU_WATCH; 855 c->guest.options |= MIPS_CPU_PERF; 857 c->guest.options_dyn |= MIPS_CPU_PERF; 860 c->guest [all...] |
/linux-master/arch/mips/kvm/ |
H A D | tlb.c | 92 * Sets the root GuestID to match the current guest GuestID, for TLB operation 121 /* Set root GuestID for root probe and write of guest TLB entry */ 153 * kvm_vz_guest_tlb_lookup() - Lookup a guest VZ TLB mapping. 155 * @gpa: Guest virtual address in a TLB mapped guest segment. 156 * @gpa: Pointer to output guest physical address it maps to. 158 * Converts a guest virtual address in a guest TLB mapped segment to a guest 159 * physical address, by probing the guest TLB. 161 * Returns: 0 if guest TL [all...] |
H A D | vz.c | 44 * Number of guest VTLB entries to use, so we can catch inconsistency between 75 * These Config bits may be writable by the guest: 119 * Permit guest FPU mode changes if FPU is enabled and the relevant 199 /* VZ guest has already converted gva to gpa */ 218 * timer expiry is asynchronous to vcpu execution therefore defer guest 227 * timer expiry is asynchronous to vcpu execution therefore defer guest 239 * interrupts are asynchronous to vcpu execution therefore defer guest 251 * interrupts are asynchronous to vcpu execution therefore defer guest 329 * VZ guest timer handling. 333 * kvm_vz_should_use_htimer() - Find whether to use the VZ hard guest time [all...] |
/linux-master/arch/powerpc/ |
H A D | Makefile | 254 $(call merge_into_defconfig,ppc64_defconfig,le guest kvm_guest) 258 $(call merge_into_defconfig,ppc64_defconfig,be guest kvm_guest)
|
/linux-master/arch/powerpc/include/asm/ |
H A D | kvm_book3s.h | 15 #include <asm/guest-state-buffer.h> 88 u64 tb_offset; /* guest timebase - host timebase */ 653 * [0..KVM_MAX_VCPUS) space, using knowledge of the guest's core stride 658 * 0) unchanged: if the guest is filling each VCORE completely then it will be 666 * possible if the guest is leaving at least 1/2 of each VCORE empty, so IDs 671 * (blocks 2 and 3) are seen, the guest must be leaving at least 3/4 of each 674 * Finally, VCPU IDs from blocks 5..7 will only be seen if the guest is using a 679 * block number if the stride is 8. For cases where the guest's stride is less
|
H A D | kvm_host.h | 28 #include <asm/guest-state-buffer.h> 43 * hardware supports). Both guest and host use this value. 217 * which stores the guest's view of the second word of the HPTE 218 * (including the guest physical address of the mapping), 229 * The rmap array of size number of guest pages is allocated for each memslot. 230 * This array is used to store usage specific information about the guest page. 236 #define KVMPPC_RMAP_HPT 0x0100000000000000 /* HPT guest */ 239 * rmap usage definition for a hash page table (hpt) guest: 244 * The bottom 32 bits are the index in the guest HPT of a HPTE that points to 260 /* Host virtual (linear mapping) address of guest HP [all...] |
/linux-master/arch/powerpc/kvm/ |
H A D | Makefile | 91 guest-state-buffer.o \ 95 obj-$(CONFIG_GUEST_STATE_BUFFER_TEST) += test-guest-state-buffer.o
|
H A D | book3s_hv_nestedv2.c | 9 * processors as a NESTEDv2 guest. 27 #include <asm/guest-state-buffer.h> 718 * @iden: guest state ID 720 * Mark a guest state ID as having been changed by the L1 host and thus 746 * @iden: guest state ID 748 * Reload the value for the guest state ID from the L0 host into the L1 host. 801 pr_err("KVM-NESTEDv2: couldn't set guest wide elements\n"); 823 * @lpid: guest id
|
H A D | guest-state-buffer.c | 6 #include <asm/guest-state-buffer.h> 18 * kvmppc_gsb_new() - create a new guest state buffer 19 * @size: total size of the guest state buffer (includes header) 24 * Returns a guest state buffer. 56 * kvmppc_gsb_free() - free a guest state buffer 57 * @gsb: guest state buffer 67 * kvmppc_gsb_put() - allocate space in a guest state buffer 177 * kvmppc_gsid_flags() - the flags for a guest state ID 178 * @iden: guest state ID 180 * Returns any flags for the guest stat [all...] |
H A D | test-guest-state-buffer.c | 7 #include <asm/guest-state-buffer.h>
|
/linux-master/arch/s390/kernel/ |
H A D | entry.S | 181 * %r4 guest register save area 188 stg %r4,__SF_SIE_SAVEAREA(%r15) # save guest register save area 191 lmg %r0,%r13,0(%r4) # load guest gprs 0-13 207 # and handling it in a guest as result of the instruction execution. 229 lg %r14,__SF_SIE_SAVEAREA(%r15) # load guest register save area 230 stmg %r0,%r13,0(%r14) # save guest gprs 0-13 231 xgr %r0,%r0 # clear guest registers to 502 # would cause machine checks targeted at the guest to be
|
H A D | vtime.c | 127 u64 timer, clock, user, guest, system, hardirq, softirq; local 153 guest = update_tsk_timer(&tsk->thread.guest_timer, 162 clock - user - guest - system - hardirq - softirq; 170 if (guest) { 171 account_guest_time(tsk, cputime_to_nsecs(guest)); 172 tsk->utimescaled += cputime_to_nsecs(scale_vtime(guest)); 182 return virt_timer_forward(user + guest + system + hardirq + softirq);
|
/linux-master/arch/x86/coco/tdx/ |
H A D | tdx.c | 85 * It is used in the TDX guest driver module to get the TDREPORT0. 120 * It is used in the TDX guest driver module to get the TD Quote. 159 * to keep the guest running. Call it forever if it 182 * The highest bit of a guest physical address is the "sharing" bit. 214 * - As a result of guest TD execution of a disallowed instruction, 217 * - A notification to the guest TD about anomalous behavior; 267 * enabled status (RFLAGS.IF) of the TD guest and to determine 271 * pending, without hanging/breaking the guest. 704 * TDX guest is responsible for flushing TLB on private->shared 708 * with the guest' [all...] |
/linux-master/arch/x86/events/intel/ |
H A D | core.c | 2918 * We may be running with guest PEBS events created by KVM, and the 2919 * PEBS records are logged into the guest's DS and invisible to host. 2921 * In the case of guest PEBS overflow, we only trigger a fake event 2922 * to emulate the PEBS overflow PMI for guest PEBS counters in KVM. 2923 * The guest will then vm-entry and check the guest DS area to read 2924 * the guest PEBS records. 2926 * The contents and other behavior of the guest event do not matter. 4108 * .host = the value the hardware has when it doesn't run a guest, 4109 * .guest [all...] |
/linux-master/arch/x86/hyperv/ |
H A D | ivm.c | 460 * In Isolation VM, all guest memory is encrypted from host and guest 534 * In Isolation VM, all guest memory is encrypted from host and guest 613 * Hyper-V always provides a single IO-APIC in a guest VM. 615 * in the guest context and must be mapped private. 663 x86_platform.guest.enc_cache_flush_required = hv_vtom_cache_flush_required; 664 x86_platform.guest.enc_tlb_flush_required = hv_vtom_tlb_flush_required; 665 x86_platform.guest.enc_status_change_prepare = hv_vtom_clear_present; 666 x86_platform.guest [all...] |
/linux-master/arch/x86/include/asm/ |
H A D | perf_event.h | 394 * We model guest LBR event tracing as another fixed-mode PMC like BTS. 400 * With this fake counter assigned, the guest LBR event user (such as KVM), 407 * Pseudo-encoding the guest LBR event as event=0x00,umask=0x1b, 550 u64 host, guest; member in struct:perf_guest_switch_msr
|