/linux-4.1.27/arch/x86/kvm/ |
H A D | Makefile | 8 KVM := ../../../virt/kvm macro 10 kvm-y += $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o \ 11 $(KVM)/eventfd.o $(KVM)/irqchip.o $(KVM)/vfio.o 12 kvm-$(CONFIG_KVM_ASYNC_PF) += $(KVM)/async_pf.o
|
H A D | mmu_audit.c | 4 * Audit code for KVM MMU
|
H A D | lapic.c | 635 /* KVM APIC implementation has two quirks 1559 pr_warn_once("APIC base relocation is unsupported by KVM"); kvm_lapic_set_base()
|
H A D | x86.c | 76 * - enable syscall per default because its emulated by KVM 77 * - enable LME and LMA per default on 64 bit KVM 2946 mark_tsc_unstable("KVM discovered backwards TSC"); kvm_arch_vcpu_load() 3801 * bitmap may be corrupt. Regardless of previous outcome the KVM logging API 4114 /* skip the first msrs in the list. KVM-specific */ kvm_init_msr_list() 6421 * Profile KVM exit RIPs: vcpu_enter_guest() 7226 * before any KVM threads can be running. Unfortunately, we can't 7236 * gets a chance to run again. In the event that no KVM threads get a
|
H A D | svm.c | 200 /* allow nested virtualization in KVM/SVM */ 1431 * running KVM nested. It also helps cross-vendor migration, because svm_get_segment() 1856 pr_err("KVM: Guest triggered AMD Erratum 383\n"); svm_handle_mce() 3552 pr_err("KVM: FAILED VMRUN WITH VMCB:\n"); handle_exit()
|
H A D | vmx.c | 2111 * KVM wants to inject page-faults which it got to the guest. This function 2795 * it is not supported on KVM. vmx_set_msr() 2873 "activate TXT before enabling KVM\n"); vmx_disabled_by_bios() 3680 * hardware. However KVM always uses paging mode without vmx_set_cr4() 6175 * But in KVM, it only use the highest eight bits. Need to hardware_setup() 9908 * (KVM doesn't change it)- no reason to call set_cr4_guest_host_mask(); load_vmcs12_host_state()
|
H A D | mmu.c | 604 * KVM does not hold the refcount of the page used by mmu_spte_clear_track_bits() 4669 * destroyed, in these cases, we should ensure that KVM MMU does
|
/linux-4.1.27/arch/arm64/kvm/ |
H A D | Makefile | 9 KVM=../../../virt/kvm macro 14 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o $(KVM)/eventfd.o 22 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic.o 23 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic-v2.o 24 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic-v2-emul.o 26 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic-v3.o 27 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic-v3-emul.o 29 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o
|
/linux-4.1.27/arch/arm/kvm/ |
H A D | Makefile | 17 KVM := ../../../virt/kvm macro 18 kvm-arm-y = $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o $(KVM)/eventfd.o 23 obj-y += $(KVM)/arm/vgic.o 24 obj-y += $(KVM)/arm/vgic-v2.o 25 obj-y += $(KVM)/arm/vgic-v2-emul.o 26 obj-y += $(KVM)/arm/arch_timer.o
|
H A D | psci.c | 48 * This means for KVM the wakeup events are interrupts and kvm_psci_vcpu_suspend() 55 * for KVM will preserve the register state. kvm_psci_vcpu_suspend() 167 * The KVM ABI specifies that a system event exit may call KVM_RUN kvm_prepare_system_event()
|
H A D | handle_exit.c | 151 panic("KVM: Hypervisor undefined exception!\n"); handle_exit()
|
H A D | arm.c | 111 * @kvm: pointer to the KVM struct 151 * @kvm: pointer to the KVM struct 296 * The arch-generic KVM code expects the cpu field of a vcpu to be -1 kvm_arch_vcpu_put() 816 * bitmap may be corrupt. Regardless of previous outcome the KVM logging API
|
H A D | mmu.c | 657 * @kvm: The KVM struct pointer for the VM. 811 * @kvm: The KVM struct pointer for the VM. 959 * @kvm: The KVM pointer 1120 * @kvm: The KVM pointer 1149 * @kvm: The KVM pointer 1174 * @kvm: The KVM pointer 1754 * space addressable by the KVM guest IPA space. kvm_arch_prepare_memory_region()
|
H A D | interrupts.S | 254 * The KVM/ARM Hypervisor ABI is defined as follows:
|
/linux-4.1.27/arch/s390/kvm/ |
H A D | Makefile | 9 KVM := ../../../virt/kvm macro 10 common-objs = $(KVM)/kvm_main.o $(KVM)/eventfd.o $(KVM)/async_pf.o $(KVM)/irqchip.o
|
H A D | priv.c | 498 memcpy(mem->vm[0].cpi, "KVM/Linux ", 16); handle_stsi_3_2_2()
|
/linux-4.1.27/arch/powerpc/kvm/ |
H A D | Makefile | 8 KVM := ../../../virt/kvm macro 10 common-objs-y = $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o \ 11 $(KVM)/eventfd.o 64 $(KVM)/coalesced_mmio.o 91 $(KVM)/kvm_main.o \ 92 $(KVM)/eventfd.o \ 116 kvm-objs-$(CONFIG_HAVE_KVM_IRQ_ROUTING) += $(KVM)/irqchip.o
|
H A D | book3s_32_mmu_host.c | 195 dprintk_mmu("KVM: old PTEG: %p (%d)\n", pteg, rr); kvmppc_mmu_map_page() 196 dprintk_mmu("KVM: %08x - %08x\n", pteg[0], pteg[1]); kvmppc_mmu_map_page() 197 dprintk_mmu("KVM: %08x - %08x\n", pteg[2], pteg[3]); kvmppc_mmu_map_page() 198 dprintk_mmu("KVM: %08x - %08x\n", pteg[4], pteg[5]); kvmppc_mmu_map_page() 199 dprintk_mmu("KVM: %08x - %08x\n", pteg[6], pteg[7]); kvmppc_mmu_map_page() 200 dprintk_mmu("KVM: %08x - %08x\n", pteg[8], pteg[9]); kvmppc_mmu_map_page() 201 dprintk_mmu("KVM: %08x - %08x\n", pteg[10], pteg[11]); kvmppc_mmu_map_page() 202 dprintk_mmu("KVM: %08x - %08x\n", pteg[12], pteg[13]); kvmppc_mmu_map_page() 203 dprintk_mmu("KVM: %08x - %08x\n", pteg[14], pteg[15]); kvmppc_mmu_map_page() 231 dprintk_mmu("KVM: new PTEG: %p\n", pteg); kvmppc_mmu_map_page() 232 dprintk_mmu("KVM: %08x - %08x\n", pteg[0], pteg[1]); kvmppc_mmu_map_page() 233 dprintk_mmu("KVM: %08x - %08x\n", pteg[2], pteg[3]); kvmppc_mmu_map_page() 234 dprintk_mmu("KVM: %08x - %08x\n", pteg[4], pteg[5]); kvmppc_mmu_map_page() 235 dprintk_mmu("KVM: %08x - %08x\n", pteg[6], pteg[7]); kvmppc_mmu_map_page() 236 dprintk_mmu("KVM: %08x - %08x\n", pteg[8], pteg[9]); kvmppc_mmu_map_page() 237 dprintk_mmu("KVM: %08x - %08x\n", pteg[10], pteg[11]); kvmppc_mmu_map_page() 238 dprintk_mmu("KVM: %08x - %08x\n", pteg[12], pteg[13]); kvmppc_mmu_map_page() 239 dprintk_mmu("KVM: %08x - %08x\n", pteg[14], pteg[15]); kvmppc_mmu_map_page() 251 dprintk_mmu("KVM: %c%c Map 0x%llx: [%lx] 0x%llx (0x%llx) -> %lx\n", kvmppc_mmu_map_page()
|
H A D | book3s_64_mmu.c | 65 dprintk("KVM: No SLB entry found for 0x%lx [%llx | %llx]\n", kvmppc_mmu_book3s_64_find_slbe() 268 printk(KERN_ERR "KVM can't copy data from 0x%lx!\n", ptegp); kvmppc_mmu_book3s_64_xlate() 337 dprintk("KVM MMU: Translated 0x%lx [0x%llx] -> 0x%llx " kvmppc_mmu_book3s_64_xlate() 374 dprintk("KVM MMU: Trigger segment fault\n"); kvmppc_mmu_book3s_64_xlate() 385 dprintk("KVM MMU: slbmte(0x%llx, 0x%llx)\n", rs, rb); kvmppc_mmu_book3s_64_slbmte() 459 dprintk("KVM MMU: slbie(0x%llx)\n", ea); kvmppc_mmu_book3s_64_slbie() 466 dprintk("KVM MMU: slbie(0x%llx, 0x%llx)\n", ea, slbe->esid); kvmppc_mmu_book3s_64_slbie() 480 dprintk("KVM MMU: slbia()\n"); kvmppc_mmu_book3s_64_slbia() 517 dprintk("KVM MMU: mtsrin(0x%x, 0x%lx)\n", srnum, value); kvmppc_mmu_book3s_64_mtsrin() 541 dprintk("KVM MMU: tlbie(0x%lx)\n", va); kvmppc_mmu_book3s_64_tlbie()
|
H A D | book3s_rmhandlers.S | 58 * from a KVM guest or a Linux process. 81 /* No KVM guest? Then jump back to the Linux handler! */ 85 /* Now we know we're handling a KVM guest */
|
H A D | book3s_64_vio_hv.c | 41 /* WARNING: This will be called in real-mode on HV KVM and virtual 42 * mode on PR KVM
|
H A D | book3s_32_mmu.c | 220 printk(KERN_INFO "KVM: Invalid PTEG!\n"); kvmppc_mmu_book3s_32_xlate_pte() 227 printk(KERN_ERR "KVM: Can't copy data from 0x%lx!\n", ptegp); kvmppc_mmu_book3s_32_xlate_pte() 293 dprintk_pte("KVM MMU: No PTE found (sdr1=0x%llx ptegp=0x%lx)\n", kvmppc_mmu_book3s_32_xlate_pte()
|
H A D | book3s_hv_builtin.c | 135 * When running HV mode KVM we need to block certain operations while KVM VMs
|
H A D | book3s_emulate.c | 504 printk(KERN_INFO "KVM: invalid SPR write: %d\n", sprn); kvmppc_core_emulate_mtspr_pr() 648 printk(KERN_INFO "KVM: invalid SPR read: %d\n", sprn); kvmppc_core_emulate_mfspr_pr() 690 printk(KERN_INFO "KVM: Unaligned instruction 0x%x\n", inst); kvmppc_alignment_dar()
|
H A D | book3s_segment.S | 36 /* Disable for nested KVM */ 85 /* Activate guest mode, so faults get handled by KVM */
|
H A D | book3s_paired_singles.c | 220 dprintk(KERN_INFO "KVM: FPR_LD [0x%llx] at 0x%lx (%d)\n", *(u64*)tmp, kvmppc_emulate_fpr_load() 267 dprintk(KERN_INFO "KVM: FPR_ST [0x%llx] at 0x%lx (%d)\n", kvmppc_emulate_fpr_store() 309 dprintk(KERN_INFO "KVM: PSQ_LD [0x%x, 0x%x] at 0x%lx (%d)\n", tmp[0], kvmppc_emulate_psq_load() 340 dprintk(KERN_INFO "KVM: PSQ_ST [0x%x, 0x%x] at 0x%lx (%d)\n", kvmppc_emulate_psq_store()
|
H A D | book3s_pr_papr.c | 10 * Hypercall handling for running PAPR guests in PR KVM on Book 3S
|
H A D | e500.h | 69 /* KVM internal information associated with each guest TLB entry */
|
H A D | trace_pr.h | 57 TP_printk("KVM: %c%c Map 0x%lx: [%lx] 0x%lx (0x%llx) -> %lx",
|
H A D | book3s.c | 306 printk(KERN_ERR "KVM: Unknown interrupt: 0x%x\n", priority); kvmppc_book3s_irqprio_deliver() 345 printk(KERN_EMERG "KVM: Check pending: %lx\n", vcpu->arch.pending_exceptions); kvmppc_core_prepare_to_enter()
|
H A D | bookehv_interrupts.S | 143 * handled by KVM and this implies aditional code in DO_KVM (for 381 * r14: KVM exit number
|
H A D | book3s_64_mmu_host.c | 125 printk(KERN_ERR "KVM: Segment map for 0x%llx (0x%lx) failed\n", kvmppc_mmu_map_page()
|
H A D | powerpc.c | 253 /* HV KVM can only do PAPR mode for now */ kvmppc_sanity_check() 554 * will have secondary threads "offline"), and for other KVM kvm_vm_ioctl_check_extension() 1234 * The hypercall to get into KVM from within guest context is as kvm_vm_ioctl_get_pvinfo()
|
H A D | book3s_64_mmu_hv.c | 99 pr_info("KVM guest htab at %lx (order %ld), LPID %x\n", kvmppc_alloc_hpt() 218 pr_err("KVM: map_vrma at %lx failed, ret=%ld\n", kvmppc_map_vrma() 270 pr_err("KVM: Oops, kvmppc_h_enter returned too hard!\n"); kvmppc_virtmode_do_h_enter()
|
H A D | book3s_pr.c | 10 * Functions relating to running KVM on Book 3S processors where 342 printk(KERN_INFO "KVM: Set MSR to 0x%llx\n", msr); kvmppc_set_msr_pr() 1130 /* KVM PV hypercalls */ kvmppc_handle_exit_pr()
|
H A D | book3s_hv.c | 10 * Description: KVM functions specific to running on Book 3S 1774 pr_err("KVM: couldn't grab cpu %d\n", cpu); kvmppc_grab_hwthread() 1837 pr_err("KVM: CPU %d seems to be stuck\n", cpu + i); kvmppc_wait_for_nap() 2457 pr_err("KVM: Couldn't alloc HPT\n"); kvmppc_hv_setup_htab_rma()
|
H A D | book3s_hv_rm_xics.c | 343 * When implementing real mode for HV KVM, resend will lead to icp_rm_down_cppr()
|
H A D | booke_interrupts.S | 147 * r5: KVM exit number
|
H A D | e500_mmu.c | 682 /* Only allow MMU registers to be set to the config supported by KVM */ kvmppc_set_one_reg_e500_tlb()
|
H A D | booke.c | 1160 * On cores with Vector category, KVM is loaded only if CONFIG_ALTIVEC, kvmppc_handle_exit() 1212 /* KVM PV hypercalls */ kvmppc_handle_exit()
|
H A D | book3s_hv_rmhandlers.S | 310 * maintenance interrupt while the core is in KVM.) 930 /* Activate guest mode, so faults get handled by KVM */
|
H A D | book3s_xics.c | 528 * When implementing real mode for HV KVM, resend will lead to icp_down_cppr()
|
/linux-4.1.27/arch/mips/kvm/ |
H A D | Makefile | 1 # Makefile for KVM support for MIPS
|
H A D | commpage.h | 6 * KVM/MIPS: commpage: mapped into get kernel space
|
H A D | stats.c | 6 * KVM/MIPS: COP0 access histogram
|
H A D | interrupt.h | 6 * KVM/MIPS: Interrupts
|
H A D | dyntrans.c | 6 * KVM/MIPS: Binary Patching for privileged instructions, reduces traps.
|
H A D | mips.c | 6 * KVM/MIPS: MIPS specific KVM APIs 132 kvm_debug("%s: 1st KVM instance, setup host TLB parameters\n", kvm_arch_init_vm() 181 kvm_debug("%s: last KVM instance, restoring TLB parameters\n", kvm_arch_destroy_vm() 282 kvm_debug("Allocated %d bytes for KVM Exception Handlers @ %p\n", kvm_arch_vcpu_create() 308 kvm_debug("Installing KVM Exception handlers @ %p, %#x bytes\n", kvm_arch_vcpu_create() 1635 * routines that are part of the the KVM module, which are only kvm_mips_init()
|
H A D | interrupt.c | 6 * KVM/MIPS: Interrupt delivery
|
H A D | tlb.c | 6 * KVM/MIPS TLB handling, this file is part of the Linux host kernel so that 40 /* These function pointers are initialized once the KVM module is loaded */ 695 kvm_debug("[%d->%d]KVM VCPU[%d] switch\n", kvm_arch_vcpu_load()
|
H A D | trap_emul.c | 6 * KVM/MIPS: Deliver/Emulate exceptions to the guest kernel 160 * All KSEG0 faults are handled by KVM, as the guest kernel does kvm_trap_emul_handle_tlb_st_miss()
|
H A D | emulate.c | 6 * KVM/MIPS: Instruction/Exception emulation 649 * kvm_mips_set_count_ctl() - Update the count control KVM register. 653 * Set the count control KVM register. The timer is updated accordingly. 711 * kvm_mips_set_count_resume() - Update the count resume KVM register. 715 * Set the count resume KVM register. 2591 * KVM would not have got the exception if this entry was valid in the kvm_mips_handle_tlbmiss()
|
H A D | locore.S | 465 /* Switch EBASE back to the one used by KVM */
|
/linux-4.1.27/virt/kvm/ |
H A D | coalesced_mmio.h | 5 * KVM coalesced MMIO
|
H A D | coalesced_mmio.c | 2 * KVM coalesced MMIO
|
H A D | eventfd.c | 2 * kvm eventfd support - use eventfd objects to signal various KVM events 250 /* The eventfd is closing, detach from KVM */ irqfd_wakeup() 258 * deactivated from the KVM side before it is unhooked from irqfd_wakeup() 731 * This function is called as KVM is completely shutting down. We do not
|
H A D | vfio.c | 2 * VFIO-KVM bridge pseudo device
|
/linux-4.1.27/tools/testing/selftests/rcutorture/bin/ |
H A D | kvm.sh | 3 # Run a series of 14 tests under KVM. These are not particularly 39 KVM="`pwd`/tools/testing/selftests/rcutorture"; export KVM 40 PATH=${KVM}/bin:$PATH; export PATH 43 TORTURE_INITRD="$KVM/initrd"; export TORTURE_INITRD 165 CONFIGFRAG=${KVM}/configs/${TORTURE_SUITE}; export CONFIGFRAG 174 resdir=$KVM/res 246 KVM="$KVM"; export KVM 280 -v KVM="$KVM" \ 303 builddir=KVM "/b" jn 334 builddir=KVM "/b" j 349 builddir=KVM "/b" j
|
/linux-4.1.27/arch/powerpc/include/uapi/asm/ |
H A D | kvm_para.h | 63 * intervening exit to KVM. This also applies to SPRG3 on some 67 * KVM, an exit must occur when changing the guest's MSR[PR]. 77 #define KVM_SC_MAGIC_R0 0x4b564d21 /* "KVM!" */
|
H A D | epapr_hcalls.h | 68 #define EV_KVM_VENDOR_ID 42 /* KVM */
|
H A D | kvm.h | 373 * KVM will adjust TLBnCFG based on the sizes configured here,
|
/linux-4.1.27/arch/mips/include/uapi/asm/ |
H A D | kvm.h | 17 * KVM MIPS specific structures and definitions. 59 * Register set = 2: KVM specific registers (see definitions below). 116 * KVM_REG_MIPS_KVM - KVM specific control registers. 183 * KVM MIPS specific structures and definitions
|
/linux-4.1.27/arch/x86/kernel/ |
H A D | kvm.c | 2 * KVM paravirt_ops implementation 83 * No need for any "IO delay" on KVM 285 pv_info.name = "KVM"; paravirt_ops_setup() 288 * KVM isn't paravirt in the sense of paravirt_enabled. A KVM paravirt_ops_setup() 347 printk(KERN_INFO"KVM setup async PF for cpu %d\n", kvm_guest_cpu_init() 557 .name = "KVM", 843 printk(KERN_INFO "KVM setup paravirtual spinlock\n"); kvm_spinlock_init_jump()
|
H A D | kvmclock.c | 0 /* KVM paravirtual clock driver. A clocksource implementation 264 pv_info.name = "KVM"; kvmclock_init()
|
H A D | irqinit.c | 145 /* IPI for KVM to deliver posted interrupt */ apic_intr_init()
|
H A D | smp.c | 264 * KVM uses this interrupt to force a cpu out of guest mode smp_reschedule_interrupt() 288 * KVM uses this interrupt to force a cpu out of guest mode smp_trace_reschedule_interrupt()
|
H A D | pci-dma.c | 43 * useful if a user wants to use an IOMMU only for KVM device assignment to
|
H A D | reboot.c | 484 * shouldn't do much harm because KVM always enable VMX on all emergency_vmx_disable_all() 485 * CPUs anyway. But we can miss it on the small window where KVM emergency_vmx_disable_all()
|
/linux-4.1.27/arch/x86/include/asm/ |
H A D | pvclock-abi.h | 8 * Both Xen and KVM are using this.
|
H A D | kvm_para.h | 30 /* For KVM hypercalls, a three-byte sequence of either the vmcall or the vmmcall
|
H A D | virtext.h | 10 * Contains code from KVM, Copyright (C) 2006 Qumranet, Inc.
|
H A D | i387.h | 33 * state from getting corrupted. KVM for example uses this model.
|
H A D | irq_vectors.h | 105 /* Vector for KVM to deliver posted interrupt IPI */
|
H A D | kvm_emulate.h | 30 * decoder to main KVM so that a decision can be made whether the
|
H A D | bitops.h | 267 * KVM relies on this behaviour on x86 for modifying memory that is also
|
H A D | kvm_host.h | 69 /* KVM Hugepage definitions for x86 */
|
/linux-4.1.27/arch/x86/include/uapi/asm/ |
H A D | kvm_para.h | 8 * should be used to determine that a VM is running under KVM.
|
H A D | kvm.h | 5 * KVM x86 specific structures and definitions
|
/linux-4.1.27/arch/mips/include/asm/ |
H A D | kvm_para.h | 9 * Hypercalls for KVM.
|
H A D | processor.h | 47 /* User space process size is limited to 1GB in KVM Guest Mode */
|
H A D | kvm_host.h | 22 /* MIPS KVM register ids */ 403 /* Count timer control KVM register */
|
H A D | mipsregs.h | 1988 * Note that under KVM (MIPSVZ) this returns vcpu id.
|
/linux-4.1.27/include/uapi/linux/ |
H A D | psci.h | 5 * by: ARM kernel, ARM64 kernel, KVM ARM/ARM64 and user space.
|
H A D | virtio_pci.h | 5 * This can be used with QEMU based VMMs like KVM or Xen.
|
H A D | virtio_ring.h | 3 /* An interface for efficient virtio implementation, currently for use by KVM
|
/linux-4.1.27/arch/powerpc/include/asm/ |
H A D | kvm_booke_hv_asm.h | 15 * All exceptions from guest state must go through KVM
|
H A D | lppaca.h | 110 * shared or dedicated. This currently works on both KVM and PHYP, but
|
H A D | kvm_book3s.h | 287 /* Only PR KVM supports the magic page */ kvmppc_supports_magic_page()
|
H A D | hvcall.h | 274 /* Platform specific hcalls, used by KVM */
|
H A D | processor.h | 291 void* kvm_shadow_vcpu; /* KVM internal data */
|
H A D | reg.h | 953 * with KVM type virtualization.
|
/linux-4.1.27/arch/s390/include/asm/ |
H A D | kvm_para.h | 13 * Hypercalls for KVM on s390. The calling convention is similar to the 19 * use 0x500 as KVM hypercall
|
/linux-4.1.27/arch/s390/include/uapi/asm/ |
H A D | sie.h | 11 { 0x500, "DIAG (0x500) KVM virtio functions" }, \ 12 { 0x501, "DIAG (0x501) KVM breakpoint" }
|
H A D | kvm.h | 4 * KVM s390 specific structures and definitions
|
/linux-4.1.27/include/linux/irqchip/ |
H A D | arm-gic-v3.h | 53 * are implemented as RES0 if ARE is 1 (which we do in KVM's emulated GICv3). 67 * In systems with a single security state (what we emulate in KVM)
|
/linux-4.1.27/arch/powerpc/kernel/ |
H A D | kvm.c | 146 printk(KERN_ERR "KVM: No more space (%d + %d)\n", kvm_alloc() 694 * be bad for SPRG4-7, which KVM can't keep in sync kvm_use_magic_page() 710 printk(KERN_INFO "KVM: Live patching for a fast VM %s\n", kvm_use_magic_page()
|
H A D | mce.c | 139 * handle routine and in KVM.
|
H A D | paca.c | 103 * update PR KVM to flush and restore them accordingly. free_lppacas()
|
H A D | setup_64.c | 290 /* Reserve large chunks of memory for use by CMA for KVM */ early_setup() 792 * to get false positives in KVM guests, so disable it by default.
|
H A D | head_booke.h | 181 * inside a KVM guest -- so we just handle up to the DO_KVM rather
|
H A D | idle_power7.S | 154 /* Tell KVM we're napping */
|
H A D | time.c | 570 * left pending on exit from a KVM guest. We don't need to do anything 642 * Don't read the VTB as a host since KVM does not switch in host running_clock()
|
H A D | exceptions-64e.S | 130 /* MAS5/8 could have inappropriate values if we interrupted KVM code */ 290 DO_KVM intnum,SPRN_##type##_SRR1; /* KVM hook */ \
|
H A D | exceptions-64s.S | 311 * that support it) before changing to HMT_MEDIUM. That allows the KVM 826 * KVM: None of these traps are from the guest ; anything that escalated
|
/linux-4.1.27/drivers/virtio/ |
H A D | virtio_pci_common.h | 7 * This can be used with QEMU based VMMs like KVM or Xen.
|
H A D | virtio_pci_legacy.c | 5 * This can be used with QEMU based VMMs like KVM or Xen.
|
H A D | virtio_pci_common.c | 5 * This can be used with QEMU based VMMs like KVM or Xen.
|
H A D | virtio_pci_modern.c | 5 * This can be used with QEMU based VMMs like KVM or Xen.
|
/linux-4.1.27/include/rdma/ |
H A D | ib_umem_odp.h | 129 * This code is strongly based on the KVM code from ib_umem_mmu_notifier_retry()
|
/linux-4.1.27/arch/arm64/include/uapi/asm/ |
H A D | kvm.h | 200 /* One single KVM irqchip, ie. the VGIC */
|
/linux-4.1.27/arch/arm/include/uapi/asm/ |
H A D | kvm.h | 207 /* One single KVM irqchip, ie. the VGIC */
|
/linux-4.1.27/arch/x86/vdso/ |
H A D | vma.c | 292 /* notifier priority > KVM */ init_vdso()
|
/linux-4.1.27/arch/powerpc/platforms/powernv/ |
H A D | smp.c | 196 * having finished executing in a KVM guest, then srr1 pnv_smp_cpu_kill_self()
|
H A D | subcore.c | 335 pr_err("Unable to change split core mode while KVM active.\n"); set_subcores_per_core()
|
H A D | pci-ioda.c | 1888 * of those VFIO/KVM pass-through devices. We can postpone pnv_pci_ioda2_set_bypass()
|
/linux-4.1.27/arch/powerpc/sysdev/xics/ |
H A D | icp-native.c | 57 /* Handled an interrupt latched by KVM */ icp_native_get_xirr()
|
/linux-4.1.27/arch/arm64/kernel/ |
H A D | cpuinfo.c | 132 /* If different, timekeeping will be broken (especially with KVM) */ cpuinfo_sanity_check()
|
/linux-4.1.27/virt/kvm/arm/ |
H A D | vgic.c | 768 * Any access bigger than 4 bytes (that we currently handle in KVM) call_range_handler() 789 * This is called by the read/write KVM IO device wrappers below. 791 * @this: pointer to the KVM IO device in charge 869 * vgic_register_kvm_io_dev - register VGIC register frame on the KVM I/O bus 878 * respectively the dispatcher function (since the KVM I/O bus framework lacks 1550 * KVM device call. kvm_vgic_inject_irq()
|
/linux-4.1.27/arch/s390/kernel/ |
H A D | early.c | 226 /* Running under KVM? If not we assume z/VM */ detect_machine_type()
|
H A D | setup.c | 824 pr_info("Linux is running under KVM in 64-bit mode\n"); setup_arch()
|
/linux-4.1.27/arch/powerpc/mm/ |
H A D | slb.c | 97 * and PR KVM appropriately too. */ __slb_flush_and_rebolt()
|
/linux-4.1.27/include/kvm/ |
H A D | arm_vgic.h | 41 #error Too many KVM VCPUs, the VGIC only supports up to 255 VCPUs for now
|
/linux-4.1.27/arch/mips/kernel/ |
H A D | asm-offsets.c | 353 COMMENT(" KVM/MIPS Specfic offsets. "); output_kvm_defines()
|
/linux-4.1.27/arch/ia64/kernel/ |
H A D | irq_ia64.c | 595 * KVM uses this interrupt to force a cpu out of guest mode
|
/linux-4.1.27/kernel/ |
H A D | profile.c | 86 pr_info("kernel KVM profiling enabled (shift: %ld)\n", profile_setup()
|
/linux-4.1.27/include/linux/ |
H A D | kvm_host.h | 786 /* KVM does not hold any references to rcu protected data when it kvm_guest_enter() 918 * PowerPC Book3s HV KVM calls this under a per-page lock mmu_notifier_retry()
|
/linux-4.1.27/drivers/net/wireless/ath/ath10k/ |
H A D | htc.c | 567 * properly in KVM PCI-passthrough sometimes. ath10k_htc_wait_target()
|
/linux-4.1.27/drivers/gpu/drm/i915/ |
H A D | intel_crt.c | 679 * up, for example many KVM do not pass it through, and so intel_crt_detect()
|
/linux-4.1.27/arch/x86/kernel/cpu/ |
H A D | perf_event.h | 606 * Intel host/guest support (KVM)
|
H A D | perf_event_intel.c | 2445 * from KVM works. hsw_hw_config() 3342 * E.g. KVM doesn't support LBR MSR 3356 * E.g. KVM doesn't support offcore event
|
/linux-4.1.27/sound/pci/ |
H A D | intel8x0.c | 105 MODULE_PARM_DESC(inside_vm, "KVM/Parallels optimization."); 2979 /* detect KVM and Parallels virtual environments */ snd_intel8x0_inside_vm() 2990 /* KVM emulated sound, PCI SSID: 1af4:1100 */ snd_intel8x0_inside_vm() 2991 msg = "enable KVM"; snd_intel8x0_inside_vm()
|
/linux-4.1.27/drivers/input/mouse/ |
H A D | psmouse-base.c | 56 MODULE_PARM_DESC(proto, "Highest protocol extension to probe (bare, imps, exps, any). Useful for KVM switches."); 1486 * such KVM will maintain initially selected protocol. psmouse_switch_protocol()
|
/linux-4.1.27/drivers/vfio/ |
H A D | vfio.c | 1469 * the VFIO group from disposal before KVM exits. 1474 * 4. When the external KVM finishes, it calls
|
/linux-4.1.27/drivers/lguest/x86/ |
H A D | core.c | 240 * The hooks were designed for KVM, but we can also put them to good use.
|
/linux-4.1.27/drivers/net/ |
H A D | macvtap.c | 496 * so far only KVM virtio_net uses macvtap, enable zero copy between macvtap_open()
|
/linux-4.1.27/drivers/vhost/ |
H A D | net.c | 236 * of used idx. Once lower device DMA done contiguously, we will signal KVM
|
H A D | scsi.c | 1062 * request header if T10_PI is enabled in KVM guest. vhost_scsi_handle_vq()
|
/linux-4.1.27/arch/powerpc/sysdev/ |
H A D | fsl_pci.c | 986 /* Let KVM/QEMU deal with the exception */ fsl_pci_mcheck_exception()
|
/linux-4.1.27/tools/perf/ |
H A D | builtin-kvm.c | 988 * This command processes KVM tracepoints from host only kvm_live_open_events()
|
/linux-4.1.27/drivers/iommu/ |
H A D | arm-smmu.c | 866 * We will likely want to change this if/when KVM gets arm_smmu_init_domain_context()
|
/linux-4.1.27/drivers/staging/lustre/lnet/selftest/ |
H A D | framework.c | 789 LASSERT(dests != NULL); /* my pages are within KVM always */ sfw_add_test_instance()
|
/linux-4.1.27/tools/perf/util/ |
H A D | session.c | 1165 "Do you have a KVM guest running and not using 'perf kvm'?\n", perf_session__warn_about_errors()
|
/linux-4.1.27/arch/x86/kernel/apic/ |
H A D | apic.c | 1526 * under KVM try_to_enable_x2apic()
|
/linux-4.1.27/arch/x86/lguest/ |
H A D | boot.c | 465 * This is used to detect if we're running under KVM. We might be, lguest_cpuid()
|
/linux-4.1.27/drivers/gpu/drm/radeon/ |
H A D | radeon_connectors.c | 1373 * cases the DVI port is actually a virtual KVM port connected to the service radeon_dvi_detect()
|
/linux-4.1.27/drivers/usb/core/ |
H A D | devio.c | 753 * the device to not break KVM. But we warn. check_ctrlrecip()
|
/linux-4.1.27/drivers/net/ethernet/chelsio/cxgb4vf/ |
H A D | cxgb4vf_main.c | 2226 * cases where they're needed -- for instance, some versions of KVM adap_init0()
|
/linux-4.1.27/drivers/net/ethernet/broadcom/bnx2x/ |
H A D | bnx2x_sriov.c | 992 * resulting in an endless loop. This can happen for example in KVM bnx2x_vf_flr_clnup()
|
/linux-4.1.27/mm/ |
H A D | page-writeback.c | 890 * down by a large amount (eg. on the startup of KVM in a swapless system).
|
/linux-4.1.27/drivers/net/ethernet/intel/e1000e/ |
H A D | netdev.c | 6196 * the PCI device into guest. For example, the KVM on power is __e1000_shutdown()
|
/linux-4.1.27/fs/ext4/ |
H A D | extents.c | 193 * qemu or KVM writing a raw image file that is going ext4_ext_find_goal()
|
/linux-4.1.27/kernel/events/ |
H A D | core.c | 4841 * We assume there is only KVM supporting the callbacks.
|