/linux-master/Documentation/trace/ |
H A D | function-graph-fold.vim | 5 " use the usual vim fold commands, such as "za", to open and close nested
|
/linux-master/drivers/gpu/drm/nouveau/include/nvkm/subdev/bios/ |
H A D | init.h | 16 u32 nested; member in struct:nvbios_init
|
/linux-master/arch/arm/kernel/ |
H A D | entry-armv.S | 310 @ save/restore lr_abt and spsr_abt to make nested aborts safe.
|
/linux-master/arch/arm64/kvm/ |
H A D | Makefile | 17 arch_timer.o trng.o vmid.o emulate-nested.o nested.o \
|
/linux-master/arch/powerpc/ |
H A D | Makefile | 143 CFLAGS-$(CONFIG_PPC64) += $(call cc-option,-mno-pointers-to-nested-functions)
|
/linux-master/arch/powerpc/include/asm/ |
H A D | kvm_book3s.h | 200 extern bool kvmppc_hv_handle_set_rc(struct kvm *kvm, bool nested,
|
H A D | kvm_book3s_64.h | 20 * Structure for a nested guest, that is, for a guest that is managed by 24 struct kvm *l1_host; /* L1 VM that owns this nested guest */ 26 int shadow_lpid; /* real lpid of this nested guest */ 35 u8 radix; /* is this nested guest radix */ 39 * We define a nested rmap entry as a single 64-bit quantity 49 /* Structure for a nested guest rmap entry */ 56 * for_each_nest_rmap_safe - iterate over the list of nested rmap entries 71 * Note that the iterator below assumes that a nested rmap entry is always 135 if (vcpu->arch.nested) 136 radix = vcpu->arch.nested [all...] |
H A D | kvm_host.h | 42 * Limit the nested partition table to 4096 entries (because that's what 843 /* For support of nested guests */ 844 struct kvm_nested_guest *nested; member in struct:kvmppc_slb::kvm_vcpu_arch 845 u64 nested_hfscr; /* HFSCR that the L1 requested for the nested guest */ 848 /* For nested APIv2 guests*/
|
/linux-master/arch/powerpc/kvm/ |
H A D | book3s_64_mmu_radix.c | 109 /* Should we be using the nested lpid */ 110 if (vcpu->arch.nested) 111 lpid = vcpu->arch.nested->shadow_lpid; 793 bool kvmppc_hv_handle_set_rc(struct kvm *kvm, bool nested, bool writing, argument 809 if (nested) 1068 /* Also clear bit in ptes in shadow pgtable for nested guests */ 1143 /* Also clear bit in ptes in shadow pgtable for nested guests */ 1310 struct kvm_nested_guest *nested; local 1346 nested = NULL; 1352 if (nested) { [all...] |
H A D | book3s_hv.c | 130 /* If set, guests are allowed to create and control nested guests */ 131 static bool nested = true; variable 132 module_param(nested, bool, S_IRUGO | S_IWUSR); 133 MODULE_PARM_DESC(nested, "Enable nested virtualization (only on POWER9)"); 187 /* If we're a nested hypervisor, fall back to ordinary IPIs for now */ 1081 * H_RPT_INVALIDATE hcall handler for nested guests. 1083 * Handles only nested process-scoped invalidation requests in L0. 1101 do_h_rpt_invalidate_prt(pid, vcpu->arch.nested->shadow_lpid, 1120 * Partition-scoped invalidation for nested guest 3240 struct kvm_nested_guest *nested = vcpu->arch.nested; local 3293 struct kvm_nested_guest *nested = vcpu->arch.nested; local 4262 struct kvm_nested_guest *nested = vcpu->arch.nested; local 4721 struct kvm_nested_guest *nested = vcpu->arch.nested; local [all...] |
H A D | book3s_hv_nested.c | 7 * Description: KVM functions specific to running nested KVM-HV guests 364 vcpu->arch.nested = l2; 391 vcpu->arch.nested = NULL; 475 pr_err("kvm-hv: failed to allocated nested partition table\n"); 581 * r4 = L1 lpid of nested guest 620 /* Load from the nested guest into our buffer */ 640 /* Store from our buffer into the nested guest */ 748 * Free up any resources allocated for a nested guest. 787 * Free up all nested resources allocated for this guest. 961 * If the pfn has changed then this is a stale rmap entry, the nested [all...] |
H A D | book3s_hv_p9_entry.c | 48 * DAR, DSISR, and for nested HV, SPRGs must be set with MSR[RI] 137 if (!vcpu->arch.nested) { 201 if (!vcpu->arch.nested) { 303 struct kvm_nested_guest *nested = vcpu->arch.nested; local 307 lpid = nested ? nested->shadow_lpid : kvm->arch.lpid; 454 struct kvm_nested_guest *nested) 460 if (nested) 461 need_tlb_flush = &nested 453 check_need_tlb_flush(struct kvm *kvm, int pcpu, struct kvm_nested_guest *nested) argument 536 struct kvm_nested_guest *nested = vcpu->arch.nested; local [all...] |
H A D | book3s_hv_p9_perf.c | 111 if (!vcpu->arch.nested && 129 * Save pmu if this guest is capable of running nested guests. 172 * and reflect it into the host's VPA in the case of a nested 182 if (!vcpu->arch.nested)
|
H A D | book3s_xive.c | 846 if (vcpu->arch.ceded || vcpu->arch.nested)
|
/linux-master/arch/riscv/kernel/ |
H A D | kernel_mode_vector.c | 190 #define riscv_v_start_kernel_context(nested) (-ENOENT) 209 bool nested = false; local 216 if (riscv_v_start_kernel_context(&nested)) { 221 if (!nested)
|
/linux-master/arch/s390/kvm/ |
H A D | kvm-s390.c | 194 /* allow nested virtualization in KVM (if enabled by user space) */ 195 static int nested; variable 196 module_param(nested, int, S_IRUGO); 197 MODULE_PARM_DESC(nested, "Nested virtualization support"); 199 /* allow 1m huge page guest backing, if !nested */ 429 !test_facility(3) || !nested) 5844 if (nested && hpage) {
|
/linux-master/arch/um/include/shared/ |
H A D | kern_util.h | 58 extern unsigned long from_irq_stack(int nested);
|
/linux-master/arch/um/kernel/ |
H A D | irq.c | 683 * A nested interrupt interrupting the copying of the thread_info - 685 * A nested interrupt not interrupting the copying of the 696 * Next is to figure out whether we are the outer handler or a nested 709 int nested; local 731 nested = (ti->real_thread != NULL); 732 if (!nested) { 745 *mask_out |= mask | nested; 749 unsigned long from_irq_stack(int nested) argument
|
/linux-master/arch/um/os-Linux/ |
H A D | signal.c | 184 int nested, bail; local 190 * set if this is a nested interrupt. 200 nested = pending & 1; 215 if (!nested) 216 pending = from_irq_stack(nested);
|
/linux-master/arch/x86/hyperv/ |
H A D | Makefile | 2 obj-y := hv_init.o mmu.o nested.o irqdomain.o ivm.o
|
/linux-master/arch/x86/include/asm/ |
H A D | kvm_host.h | 320 * execonly and ad_disabled are only used for nested EPT which has 365 * including on nested transitions, if nothing in the full role changes then 699 } nested; member in struct:kvm_vcpu_hv 790 /* Non-nested MMU for L1 */ 793 /* L1 MMU when running nested */ 797 * Paging state of an L2 guest (used for nested npt) 1249 * AVIC is inhibited on a vCPU because it runs a nested guest. 1253 * a vCPU runs nested.
|
H A D | ptrace.h | 93 nested : 1, member in struct:fred_ss
|
/linux-master/arch/x86/kvm/ |
H A D | Makefile | 19 vmx/nested.o vmx/posted_intr.o 24 kvm-amd-y += svm/svm.o svm/vmenter.o svm/pmu.o svm/nested.o svm/avic.o \
|
H A D | hyperv.c | 165 * Valid vectors are 16-255, however, nested Hyper-V attempts to write 2033 * nested GPA when KVM is handling the call from L2 ('direct' TLB 2164 * The following check races with nested vCPUs entering/exiting 2173 if (!hv_v || hv_v->nested.vm_id != hv_vcpu->nested.vm_id) 2177 !hv_is_vp_in_sparse_set(hv_v->nested.vp_id, valid_bank_mask, 2383 kvm_read_guest(vcpu->kvm, to_hv_vcpu(vcpu)->nested.pa_page_gpa,
|
/linux-master/arch/x86/kvm/svm/ |
H A D | avic.c | 128 * If running nested and the guest uses its own MSR bitmap, there 132 vmcb12_is_intercept(&svm->nested.ctl, INTERCEPT_MSR_PROT)) 294 * Note, AVIC hardware walks the nested page table to check
|