Searched refs:KVM (Results 1 - 152 of 152) sorted by relevance

/linux-4.1.27/arch/x86/kvm/
H A DMakefile8 KVM := ../../../virt/kvm macro
10 kvm-y += $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o \
11 $(KVM)/eventfd.o $(KVM)/irqchip.o $(KVM)/vfio.o
12 kvm-$(CONFIG_KVM_ASYNC_PF) += $(KVM)/async_pf.o
H A Dmmu_audit.c4 * Audit code for KVM MMU
H A Dlapic.c635 /* KVM APIC implementation has two quirks
1559 pr_warn_once("APIC base relocation is unsupported by KVM"); kvm_lapic_set_base()
H A Dx86.c76 * - enable syscall per default because its emulated by KVM
77 * - enable LME and LMA per default on 64 bit KVM
2946 mark_tsc_unstable("KVM discovered backwards TSC"); kvm_arch_vcpu_load()
3801 * bitmap may be corrupt. Regardless of previous outcome the KVM logging API
4114 /* skip the first msrs in the list. KVM-specific */ kvm_init_msr_list()
6421 * Profile KVM exit RIPs: vcpu_enter_guest()
7226 * before any KVM threads can be running. Unfortunately, we can't
7236 * gets a chance to run again. In the event that no KVM threads get a
H A Dsvm.c200 /* allow nested virtualization in KVM/SVM */
1431 * running KVM nested. It also helps cross-vendor migration, because svm_get_segment()
1856 pr_err("KVM: Guest triggered AMD Erratum 383\n"); svm_handle_mce()
3552 pr_err("KVM: FAILED VMRUN WITH VMCB:\n"); handle_exit()
H A Dvmx.c2111 * KVM wants to inject page-faults which it got to the guest. This function
2795 * it is not supported on KVM. vmx_set_msr()
2873 "activate TXT before enabling KVM\n"); vmx_disabled_by_bios()
3680 * hardware. However KVM always uses paging mode without vmx_set_cr4()
6175 * But in KVM, it only use the highest eight bits. Need to hardware_setup()
9908 * (KVM doesn't change it)- no reason to call set_cr4_guest_host_mask(); load_vmcs12_host_state()
H A Dmmu.c604 * KVM does not hold the refcount of the page used by mmu_spte_clear_track_bits()
4669 * destroyed, in these cases, we should ensure that KVM MMU does
/linux-4.1.27/arch/arm64/kvm/
H A DMakefile9 KVM=../../../virt/kvm macro
14 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o $(KVM)/eventfd.o
22 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic.o
23 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic-v2.o
24 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic-v2-emul.o
26 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic-v3.o
27 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic-v3-emul.o
29 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o
/linux-4.1.27/arch/arm/kvm/
H A DMakefile17 KVM := ../../../virt/kvm macro
18 kvm-arm-y = $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o $(KVM)/eventfd.o
23 obj-y += $(KVM)/arm/vgic.o
24 obj-y += $(KVM)/arm/vgic-v2.o
25 obj-y += $(KVM)/arm/vgic-v2-emul.o
26 obj-y += $(KVM)/arm/arch_timer.o
H A Dpsci.c48 * This means for KVM the wakeup events are interrupts and kvm_psci_vcpu_suspend()
55 * for KVM will preserve the register state. kvm_psci_vcpu_suspend()
167 * The KVM ABI specifies that a system event exit may call KVM_RUN kvm_prepare_system_event()
H A Dhandle_exit.c151 panic("KVM: Hypervisor undefined exception!\n"); handle_exit()
H A Darm.c111 * @kvm: pointer to the KVM struct
151 * @kvm: pointer to the KVM struct
296 * The arch-generic KVM code expects the cpu field of a vcpu to be -1 kvm_arch_vcpu_put()
816 * bitmap may be corrupt. Regardless of previous outcome the KVM logging API
H A Dmmu.c657 * @kvm: The KVM struct pointer for the VM.
811 * @kvm: The KVM struct pointer for the VM.
959 * @kvm: The KVM pointer
1120 * @kvm: The KVM pointer
1149 * @kvm: The KVM pointer
1174 * @kvm: The KVM pointer
1754 * space addressable by the KVM guest IPA space. kvm_arch_prepare_memory_region()
H A Dinterrupts.S254 * The KVM/ARM Hypervisor ABI is defined as follows:
/linux-4.1.27/arch/s390/kvm/
H A DMakefile9 KVM := ../../../virt/kvm macro
10 common-objs = $(KVM)/kvm_main.o $(KVM)/eventfd.o $(KVM)/async_pf.o $(KVM)/irqchip.o
H A Dpriv.c498 memcpy(mem->vm[0].cpi, "KVM/Linux ", 16); handle_stsi_3_2_2()
/linux-4.1.27/arch/powerpc/kvm/
H A DMakefile8 KVM := ../../../virt/kvm macro
10 common-objs-y = $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o \
11 $(KVM)/eventfd.o
64 $(KVM)/coalesced_mmio.o
91 $(KVM)/kvm_main.o \
92 $(KVM)/eventfd.o \
116 kvm-objs-$(CONFIG_HAVE_KVM_IRQ_ROUTING) += $(KVM)/irqchip.o
H A Dbook3s_32_mmu_host.c195 dprintk_mmu("KVM: old PTEG: %p (%d)\n", pteg, rr); kvmppc_mmu_map_page()
196 dprintk_mmu("KVM: %08x - %08x\n", pteg[0], pteg[1]); kvmppc_mmu_map_page()
197 dprintk_mmu("KVM: %08x - %08x\n", pteg[2], pteg[3]); kvmppc_mmu_map_page()
198 dprintk_mmu("KVM: %08x - %08x\n", pteg[4], pteg[5]); kvmppc_mmu_map_page()
199 dprintk_mmu("KVM: %08x - %08x\n", pteg[6], pteg[7]); kvmppc_mmu_map_page()
200 dprintk_mmu("KVM: %08x - %08x\n", pteg[8], pteg[9]); kvmppc_mmu_map_page()
201 dprintk_mmu("KVM: %08x - %08x\n", pteg[10], pteg[11]); kvmppc_mmu_map_page()
202 dprintk_mmu("KVM: %08x - %08x\n", pteg[12], pteg[13]); kvmppc_mmu_map_page()
203 dprintk_mmu("KVM: %08x - %08x\n", pteg[14], pteg[15]); kvmppc_mmu_map_page()
231 dprintk_mmu("KVM: new PTEG: %p\n", pteg); kvmppc_mmu_map_page()
232 dprintk_mmu("KVM: %08x - %08x\n", pteg[0], pteg[1]); kvmppc_mmu_map_page()
233 dprintk_mmu("KVM: %08x - %08x\n", pteg[2], pteg[3]); kvmppc_mmu_map_page()
234 dprintk_mmu("KVM: %08x - %08x\n", pteg[4], pteg[5]); kvmppc_mmu_map_page()
235 dprintk_mmu("KVM: %08x - %08x\n", pteg[6], pteg[7]); kvmppc_mmu_map_page()
236 dprintk_mmu("KVM: %08x - %08x\n", pteg[8], pteg[9]); kvmppc_mmu_map_page()
237 dprintk_mmu("KVM: %08x - %08x\n", pteg[10], pteg[11]); kvmppc_mmu_map_page()
238 dprintk_mmu("KVM: %08x - %08x\n", pteg[12], pteg[13]); kvmppc_mmu_map_page()
239 dprintk_mmu("KVM: %08x - %08x\n", pteg[14], pteg[15]); kvmppc_mmu_map_page()
251 dprintk_mmu("KVM: %c%c Map 0x%llx: [%lx] 0x%llx (0x%llx) -> %lx\n", kvmppc_mmu_map_page()
H A Dbook3s_64_mmu.c65 dprintk("KVM: No SLB entry found for 0x%lx [%llx | %llx]\n", kvmppc_mmu_book3s_64_find_slbe()
268 printk(KERN_ERR "KVM can't copy data from 0x%lx!\n", ptegp); kvmppc_mmu_book3s_64_xlate()
337 dprintk("KVM MMU: Translated 0x%lx [0x%llx] -> 0x%llx " kvmppc_mmu_book3s_64_xlate()
374 dprintk("KVM MMU: Trigger segment fault\n"); kvmppc_mmu_book3s_64_xlate()
385 dprintk("KVM MMU: slbmte(0x%llx, 0x%llx)\n", rs, rb); kvmppc_mmu_book3s_64_slbmte()
459 dprintk("KVM MMU: slbie(0x%llx)\n", ea); kvmppc_mmu_book3s_64_slbie()
466 dprintk("KVM MMU: slbie(0x%llx, 0x%llx)\n", ea, slbe->esid); kvmppc_mmu_book3s_64_slbie()
480 dprintk("KVM MMU: slbia()\n"); kvmppc_mmu_book3s_64_slbia()
517 dprintk("KVM MMU: mtsrin(0x%x, 0x%lx)\n", srnum, value); kvmppc_mmu_book3s_64_mtsrin()
541 dprintk("KVM MMU: tlbie(0x%lx)\n", va); kvmppc_mmu_book3s_64_tlbie()
H A Dbook3s_rmhandlers.S58 * from a KVM guest or a Linux process.
81 /* No KVM guest? Then jump back to the Linux handler! */
85 /* Now we know we're handling a KVM guest */
H A Dbook3s_64_vio_hv.c41 /* WARNING: This will be called in real-mode on HV KVM and virtual
42 * mode on PR KVM
H A Dbook3s_32_mmu.c220 printk(KERN_INFO "KVM: Invalid PTEG!\n"); kvmppc_mmu_book3s_32_xlate_pte()
227 printk(KERN_ERR "KVM: Can't copy data from 0x%lx!\n", ptegp); kvmppc_mmu_book3s_32_xlate_pte()
293 dprintk_pte("KVM MMU: No PTE found (sdr1=0x%llx ptegp=0x%lx)\n", kvmppc_mmu_book3s_32_xlate_pte()
H A Dbook3s_hv_builtin.c135 * When running HV mode KVM we need to block certain operations while KVM VMs
H A Dbook3s_emulate.c504 printk(KERN_INFO "KVM: invalid SPR write: %d\n", sprn); kvmppc_core_emulate_mtspr_pr()
648 printk(KERN_INFO "KVM: invalid SPR read: %d\n", sprn); kvmppc_core_emulate_mfspr_pr()
690 printk(KERN_INFO "KVM: Unaligned instruction 0x%x\n", inst); kvmppc_alignment_dar()
H A Dbook3s_segment.S36 /* Disable for nested KVM */
85 /* Activate guest mode, so faults get handled by KVM */
H A Dbook3s_paired_singles.c220 dprintk(KERN_INFO "KVM: FPR_LD [0x%llx] at 0x%lx (%d)\n", *(u64*)tmp, kvmppc_emulate_fpr_load()
267 dprintk(KERN_INFO "KVM: FPR_ST [0x%llx] at 0x%lx (%d)\n", kvmppc_emulate_fpr_store()
309 dprintk(KERN_INFO "KVM: PSQ_LD [0x%x, 0x%x] at 0x%lx (%d)\n", tmp[0], kvmppc_emulate_psq_load()
340 dprintk(KERN_INFO "KVM: PSQ_ST [0x%x, 0x%x] at 0x%lx (%d)\n", kvmppc_emulate_psq_store()
H A Dbook3s_pr_papr.c10 * Hypercall handling for running PAPR guests in PR KVM on Book 3S
H A De500.h69 /* KVM internal information associated with each guest TLB entry */
H A Dtrace_pr.h57 TP_printk("KVM: %c%c Map 0x%lx: [%lx] 0x%lx (0x%llx) -> %lx",
H A Dbook3s.c306 printk(KERN_ERR "KVM: Unknown interrupt: 0x%x\n", priority); kvmppc_book3s_irqprio_deliver()
345 printk(KERN_EMERG "KVM: Check pending: %lx\n", vcpu->arch.pending_exceptions); kvmppc_core_prepare_to_enter()
H A Dbookehv_interrupts.S143 * handled by KVM and this implies aditional code in DO_KVM (for
381 * r14: KVM exit number
H A Dbook3s_64_mmu_host.c125 printk(KERN_ERR "KVM: Segment map for 0x%llx (0x%lx) failed\n", kvmppc_mmu_map_page()
H A Dpowerpc.c253 /* HV KVM can only do PAPR mode for now */ kvmppc_sanity_check()
554 * will have secondary threads "offline"), and for other KVM kvm_vm_ioctl_check_extension()
1234 * The hypercall to get into KVM from within guest context is as kvm_vm_ioctl_get_pvinfo()
H A Dbook3s_64_mmu_hv.c99 pr_info("KVM guest htab at %lx (order %ld), LPID %x\n", kvmppc_alloc_hpt()
218 pr_err("KVM: map_vrma at %lx failed, ret=%ld\n", kvmppc_map_vrma()
270 pr_err("KVM: Oops, kvmppc_h_enter returned too hard!\n"); kvmppc_virtmode_do_h_enter()
H A Dbook3s_pr.c10 * Functions relating to running KVM on Book 3S processors where
342 printk(KERN_INFO "KVM: Set MSR to 0x%llx\n", msr); kvmppc_set_msr_pr()
1130 /* KVM PV hypercalls */ kvmppc_handle_exit_pr()
H A Dbook3s_hv.c10 * Description: KVM functions specific to running on Book 3S
1774 pr_err("KVM: couldn't grab cpu %d\n", cpu); kvmppc_grab_hwthread()
1837 pr_err("KVM: CPU %d seems to be stuck\n", cpu + i); kvmppc_wait_for_nap()
2457 pr_err("KVM: Couldn't alloc HPT\n"); kvmppc_hv_setup_htab_rma()
H A Dbook3s_hv_rm_xics.c343 * When implementing real mode for HV KVM, resend will lead to icp_rm_down_cppr()
H A Dbooke_interrupts.S147 * r5: KVM exit number
H A De500_mmu.c682 /* Only allow MMU registers to be set to the config supported by KVM */ kvmppc_set_one_reg_e500_tlb()
H A Dbooke.c1160 * On cores with Vector category, KVM is loaded only if CONFIG_ALTIVEC, kvmppc_handle_exit()
1212 /* KVM PV hypercalls */ kvmppc_handle_exit()
H A Dbook3s_hv_rmhandlers.S310 * maintenance interrupt while the core is in KVM.)
930 /* Activate guest mode, so faults get handled by KVM */
H A Dbook3s_xics.c528 * When implementing real mode for HV KVM, resend will lead to icp_down_cppr()
/linux-4.1.27/arch/mips/kvm/
H A DMakefile1 # Makefile for KVM support for MIPS
H A Dcommpage.h6 * KVM/MIPS: commpage: mapped into get kernel space
H A Dstats.c6 * KVM/MIPS: COP0 access histogram
H A Dinterrupt.h6 * KVM/MIPS: Interrupts
H A Ddyntrans.c6 * KVM/MIPS: Binary Patching for privileged instructions, reduces traps.
H A Dmips.c6 * KVM/MIPS: MIPS specific KVM APIs
132 kvm_debug("%s: 1st KVM instance, setup host TLB parameters\n", kvm_arch_init_vm()
181 kvm_debug("%s: last KVM instance, restoring TLB parameters\n", kvm_arch_destroy_vm()
282 kvm_debug("Allocated %d bytes for KVM Exception Handlers @ %p\n", kvm_arch_vcpu_create()
308 kvm_debug("Installing KVM Exception handlers @ %p, %#x bytes\n", kvm_arch_vcpu_create()
1635 * routines that are part of the the KVM module, which are only kvm_mips_init()
H A Dinterrupt.c6 * KVM/MIPS: Interrupt delivery
H A Dtlb.c6 * KVM/MIPS TLB handling, this file is part of the Linux host kernel so that
40 /* These function pointers are initialized once the KVM module is loaded */
695 kvm_debug("[%d->%d]KVM VCPU[%d] switch\n", kvm_arch_vcpu_load()
H A Dtrap_emul.c6 * KVM/MIPS: Deliver/Emulate exceptions to the guest kernel
160 * All KSEG0 faults are handled by KVM, as the guest kernel does kvm_trap_emul_handle_tlb_st_miss()
H A Demulate.c6 * KVM/MIPS: Instruction/Exception emulation
649 * kvm_mips_set_count_ctl() - Update the count control KVM register.
653 * Set the count control KVM register. The timer is updated accordingly.
711 * kvm_mips_set_count_resume() - Update the count resume KVM register.
715 * Set the count resume KVM register.
2591 * KVM would not have got the exception if this entry was valid in the kvm_mips_handle_tlbmiss()
H A Dlocore.S465 /* Switch EBASE back to the one used by KVM */
/linux-4.1.27/virt/kvm/
H A Dcoalesced_mmio.h5 * KVM coalesced MMIO
H A Dcoalesced_mmio.c2 * KVM coalesced MMIO
H A Deventfd.c2 * kvm eventfd support - use eventfd objects to signal various KVM events
250 /* The eventfd is closing, detach from KVM */ irqfd_wakeup()
258 * deactivated from the KVM side before it is unhooked from irqfd_wakeup()
731 * This function is called as KVM is completely shutting down. We do not
H A Dvfio.c2 * VFIO-KVM bridge pseudo device
/linux-4.1.27/tools/testing/selftests/rcutorture/bin/
H A Dkvm.sh3 # Run a series of 14 tests under KVM. These are not particularly
39 KVM="`pwd`/tools/testing/selftests/rcutorture"; export KVM
40 PATH=${KVM}/bin:$PATH; export PATH
43 TORTURE_INITRD="$KVM/initrd"; export TORTURE_INITRD
165 CONFIGFRAG=${KVM}/configs/${TORTURE_SUITE}; export CONFIGFRAG
174 resdir=$KVM/res
246 KVM="$KVM"; export KVM
280 -v KVM="$KVM" \
303 builddir=KVM "/b" jn
334 builddir=KVM "/b" j
349 builddir=KVM "/b" j
/linux-4.1.27/arch/powerpc/include/uapi/asm/
H A Dkvm_para.h63 * intervening exit to KVM. This also applies to SPRG3 on some
67 * KVM, an exit must occur when changing the guest's MSR[PR].
77 #define KVM_SC_MAGIC_R0 0x4b564d21 /* "KVM!" */
H A Depapr_hcalls.h68 #define EV_KVM_VENDOR_ID 42 /* KVM */
H A Dkvm.h373 * KVM will adjust TLBnCFG based on the sizes configured here,
/linux-4.1.27/arch/mips/include/uapi/asm/
H A Dkvm.h17 * KVM MIPS specific structures and definitions.
59 * Register set = 2: KVM specific registers (see definitions below).
116 * KVM_REG_MIPS_KVM - KVM specific control registers.
183 * KVM MIPS specific structures and definitions
/linux-4.1.27/arch/x86/kernel/
H A Dkvm.c2 * KVM paravirt_ops implementation
83 * No need for any "IO delay" on KVM
285 pv_info.name = "KVM"; paravirt_ops_setup()
288 * KVM isn't paravirt in the sense of paravirt_enabled. A KVM paravirt_ops_setup()
347 printk(KERN_INFO"KVM setup async PF for cpu %d\n", kvm_guest_cpu_init()
557 .name = "KVM",
843 printk(KERN_INFO "KVM setup paravirtual spinlock\n"); kvm_spinlock_init_jump()
H A Dkvmclock.c0 /* KVM paravirtual clock driver. A clocksource implementation
264 pv_info.name = "KVM"; kvmclock_init()
H A Dirqinit.c145 /* IPI for KVM to deliver posted interrupt */ apic_intr_init()
H A Dsmp.c264 * KVM uses this interrupt to force a cpu out of guest mode smp_reschedule_interrupt()
288 * KVM uses this interrupt to force a cpu out of guest mode smp_trace_reschedule_interrupt()
H A Dpci-dma.c43 * useful if a user wants to use an IOMMU only for KVM device assignment to
H A Dreboot.c484 * shouldn't do much harm because KVM always enable VMX on all emergency_vmx_disable_all()
485 * CPUs anyway. But we can miss it on the small window where KVM emergency_vmx_disable_all()
/linux-4.1.27/arch/x86/include/asm/
H A Dpvclock-abi.h8 * Both Xen and KVM are using this.
H A Dkvm_para.h30 /* For KVM hypercalls, a three-byte sequence of either the vmcall or the vmmcall
H A Dvirtext.h10 * Contains code from KVM, Copyright (C) 2006 Qumranet, Inc.
H A Di387.h33 * state from getting corrupted. KVM for example uses this model.
H A Dirq_vectors.h105 /* Vector for KVM to deliver posted interrupt IPI */
H A Dkvm_emulate.h30 * decoder to main KVM so that a decision can be made whether the
H A Dbitops.h267 * KVM relies on this behaviour on x86 for modifying memory that is also
H A Dkvm_host.h69 /* KVM Hugepage definitions for x86 */
/linux-4.1.27/arch/x86/include/uapi/asm/
H A Dkvm_para.h8 * should be used to determine that a VM is running under KVM.
H A Dkvm.h5 * KVM x86 specific structures and definitions
/linux-4.1.27/arch/mips/include/asm/
H A Dkvm_para.h9 * Hypercalls for KVM.
H A Dprocessor.h47 /* User space process size is limited to 1GB in KVM Guest Mode */
H A Dkvm_host.h22 /* MIPS KVM register ids */
403 /* Count timer control KVM register */
H A Dmipsregs.h1988 * Note that under KVM (MIPSVZ) this returns vcpu id.
/linux-4.1.27/include/uapi/linux/
H A Dpsci.h5 * by: ARM kernel, ARM64 kernel, KVM ARM/ARM64 and user space.
H A Dvirtio_pci.h5 * This can be used with QEMU based VMMs like KVM or Xen.
H A Dvirtio_ring.h3 /* An interface for efficient virtio implementation, currently for use by KVM
/linux-4.1.27/arch/powerpc/include/asm/
H A Dkvm_booke_hv_asm.h15 * All exceptions from guest state must go through KVM
H A Dlppaca.h110 * shared or dedicated. This currently works on both KVM and PHYP, but
H A Dkvm_book3s.h287 /* Only PR KVM supports the magic page */ kvmppc_supports_magic_page()
H A Dhvcall.h274 /* Platform specific hcalls, used by KVM */
H A Dprocessor.h291 void* kvm_shadow_vcpu; /* KVM internal data */
H A Dreg.h953 * with KVM type virtualization.
/linux-4.1.27/arch/s390/include/asm/
H A Dkvm_para.h13 * Hypercalls for KVM on s390. The calling convention is similar to the
19 * use 0x500 as KVM hypercall
/linux-4.1.27/arch/s390/include/uapi/asm/
H A Dsie.h11 { 0x500, "DIAG (0x500) KVM virtio functions" }, \
12 { 0x501, "DIAG (0x501) KVM breakpoint" }
H A Dkvm.h4 * KVM s390 specific structures and definitions
/linux-4.1.27/include/linux/irqchip/
H A Darm-gic-v3.h53 * are implemented as RES0 if ARE is 1 (which we do in KVM's emulated GICv3).
67 * In systems with a single security state (what we emulate in KVM)
/linux-4.1.27/arch/powerpc/kernel/
H A Dkvm.c146 printk(KERN_ERR "KVM: No more space (%d + %d)\n", kvm_alloc()
694 * be bad for SPRG4-7, which KVM can't keep in sync kvm_use_magic_page()
710 printk(KERN_INFO "KVM: Live patching for a fast VM %s\n", kvm_use_magic_page()
H A Dmce.c139 * handle routine and in KVM.
H A Dpaca.c103 * update PR KVM to flush and restore them accordingly. free_lppacas()
H A Dsetup_64.c290 /* Reserve large chunks of memory for use by CMA for KVM */ early_setup()
792 * to get false positives in KVM guests, so disable it by default.
H A Dhead_booke.h181 * inside a KVM guest -- so we just handle up to the DO_KVM rather
H A Didle_power7.S154 /* Tell KVM we're napping */
H A Dtime.c570 * left pending on exit from a KVM guest. We don't need to do anything
642 * Don't read the VTB as a host since KVM does not switch in host running_clock()
H A Dexceptions-64e.S130 /* MAS5/8 could have inappropriate values if we interrupted KVM code */
290 DO_KVM intnum,SPRN_##type##_SRR1; /* KVM hook */ \
H A Dexceptions-64s.S311 * that support it) before changing to HMT_MEDIUM. That allows the KVM
826 * KVM: None of these traps are from the guest ; anything that escalated
/linux-4.1.27/drivers/virtio/
H A Dvirtio_pci_common.h7 * This can be used with QEMU based VMMs like KVM or Xen.
H A Dvirtio_pci_legacy.c5 * This can be used with QEMU based VMMs like KVM or Xen.
H A Dvirtio_pci_common.c5 * This can be used with QEMU based VMMs like KVM or Xen.
H A Dvirtio_pci_modern.c5 * This can be used with QEMU based VMMs like KVM or Xen.
/linux-4.1.27/include/rdma/
H A Dib_umem_odp.h129 * This code is strongly based on the KVM code from ib_umem_mmu_notifier_retry()
/linux-4.1.27/arch/arm64/include/uapi/asm/
H A Dkvm.h200 /* One single KVM irqchip, ie. the VGIC */
/linux-4.1.27/arch/arm/include/uapi/asm/
H A Dkvm.h207 /* One single KVM irqchip, ie. the VGIC */
/linux-4.1.27/arch/x86/vdso/
H A Dvma.c292 /* notifier priority > KVM */ init_vdso()
/linux-4.1.27/arch/powerpc/platforms/powernv/
H A Dsmp.c196 * having finished executing in a KVM guest, then srr1 pnv_smp_cpu_kill_self()
H A Dsubcore.c335 pr_err("Unable to change split core mode while KVM active.\n"); set_subcores_per_core()
H A Dpci-ioda.c1888 * of those VFIO/KVM pass-through devices. We can postpone pnv_pci_ioda2_set_bypass()
/linux-4.1.27/arch/powerpc/sysdev/xics/
H A Dicp-native.c57 /* Handled an interrupt latched by KVM */ icp_native_get_xirr()
/linux-4.1.27/arch/arm64/kernel/
H A Dcpuinfo.c132 /* If different, timekeeping will be broken (especially with KVM) */ cpuinfo_sanity_check()
/linux-4.1.27/virt/kvm/arm/
H A Dvgic.c768 * Any access bigger than 4 bytes (that we currently handle in KVM) call_range_handler()
789 * This is called by the read/write KVM IO device wrappers below.
791 * @this: pointer to the KVM IO device in charge
869 * vgic_register_kvm_io_dev - register VGIC register frame on the KVM I/O bus
878 * respectively the dispatcher function (since the KVM I/O bus framework lacks
1550 * KVM device call. kvm_vgic_inject_irq()
/linux-4.1.27/arch/s390/kernel/
H A Dearly.c226 /* Running under KVM? If not we assume z/VM */ detect_machine_type()
H A Dsetup.c824 pr_info("Linux is running under KVM in 64-bit mode\n"); setup_arch()
/linux-4.1.27/arch/powerpc/mm/
H A Dslb.c97 * and PR KVM appropriately too. */ __slb_flush_and_rebolt()
/linux-4.1.27/include/kvm/
H A Darm_vgic.h41 #error Too many KVM VCPUs, the VGIC only supports up to 255 VCPUs for now
/linux-4.1.27/arch/mips/kernel/
H A Dasm-offsets.c353 COMMENT(" KVM/MIPS Specfic offsets. "); output_kvm_defines()
/linux-4.1.27/arch/ia64/kernel/
H A Dirq_ia64.c595 * KVM uses this interrupt to force a cpu out of guest mode
/linux-4.1.27/kernel/
H A Dprofile.c86 pr_info("kernel KVM profiling enabled (shift: %ld)\n", profile_setup()
/linux-4.1.27/include/linux/
H A Dkvm_host.h786 /* KVM does not hold any references to rcu protected data when it kvm_guest_enter()
918 * PowerPC Book3s HV KVM calls this under a per-page lock mmu_notifier_retry()
/linux-4.1.27/drivers/net/wireless/ath/ath10k/
H A Dhtc.c567 * properly in KVM PCI-passthrough sometimes. ath10k_htc_wait_target()
/linux-4.1.27/drivers/gpu/drm/i915/
H A Dintel_crt.c679 * up, for example many KVM do not pass it through, and so intel_crt_detect()
/linux-4.1.27/arch/x86/kernel/cpu/
H A Dperf_event.h606 * Intel host/guest support (KVM)
H A Dperf_event_intel.c2445 * from KVM works. hsw_hw_config()
3342 * E.g. KVM doesn't support LBR MSR
3356 * E.g. KVM doesn't support offcore event
/linux-4.1.27/sound/pci/
H A Dintel8x0.c105 MODULE_PARM_DESC(inside_vm, "KVM/Parallels optimization.");
2979 /* detect KVM and Parallels virtual environments */ snd_intel8x0_inside_vm()
2990 /* KVM emulated sound, PCI SSID: 1af4:1100 */ snd_intel8x0_inside_vm()
2991 msg = "enable KVM"; snd_intel8x0_inside_vm()
/linux-4.1.27/drivers/input/mouse/
H A Dpsmouse-base.c56 MODULE_PARM_DESC(proto, "Highest protocol extension to probe (bare, imps, exps, any). Useful for KVM switches.");
1486 * such KVM will maintain initially selected protocol. psmouse_switch_protocol()
/linux-4.1.27/drivers/vfio/
H A Dvfio.c1469 * the VFIO group from disposal before KVM exits.
1474 * 4. When the external KVM finishes, it calls
/linux-4.1.27/drivers/lguest/x86/
H A Dcore.c240 * The hooks were designed for KVM, but we can also put them to good use.
/linux-4.1.27/drivers/net/
H A Dmacvtap.c496 * so far only KVM virtio_net uses macvtap, enable zero copy between macvtap_open()
/linux-4.1.27/drivers/vhost/
H A Dnet.c236 * of used idx. Once lower device DMA done contiguously, we will signal KVM
H A Dscsi.c1062 * request header if T10_PI is enabled in KVM guest. vhost_scsi_handle_vq()
/linux-4.1.27/arch/powerpc/sysdev/
H A Dfsl_pci.c986 /* Let KVM/QEMU deal with the exception */ fsl_pci_mcheck_exception()
/linux-4.1.27/tools/perf/
H A Dbuiltin-kvm.c988 * This command processes KVM tracepoints from host only kvm_live_open_events()
/linux-4.1.27/drivers/iommu/
H A Darm-smmu.c866 * We will likely want to change this if/when KVM gets arm_smmu_init_domain_context()
/linux-4.1.27/drivers/staging/lustre/lnet/selftest/
H A Dframework.c789 LASSERT(dests != NULL); /* my pages are within KVM always */ sfw_add_test_instance()
/linux-4.1.27/tools/perf/util/
H A Dsession.c1165 "Do you have a KVM guest running and not using 'perf kvm'?\n", perf_session__warn_about_errors()
/linux-4.1.27/arch/x86/kernel/apic/
H A Dapic.c1526 * under KVM try_to_enable_x2apic()
/linux-4.1.27/arch/x86/lguest/
H A Dboot.c465 * This is used to detect if we're running under KVM. We might be, lguest_cpuid()
/linux-4.1.27/drivers/gpu/drm/radeon/
H A Dradeon_connectors.c1373 * cases the DVI port is actually a virtual KVM port connected to the service radeon_dvi_detect()
/linux-4.1.27/drivers/usb/core/
H A Ddevio.c753 * the device to not break KVM. But we warn. check_ctrlrecip()
/linux-4.1.27/drivers/net/ethernet/chelsio/cxgb4vf/
H A Dcxgb4vf_main.c2226 * cases where they're needed -- for instance, some versions of KVM adap_init0()
/linux-4.1.27/drivers/net/ethernet/broadcom/bnx2x/
H A Dbnx2x_sriov.c992 * resulting in an endless loop. This can happen for example in KVM bnx2x_vf_flr_clnup()
/linux-4.1.27/mm/
H A Dpage-writeback.c890 * down by a large amount (eg. on the startup of KVM in a swapless system).
/linux-4.1.27/drivers/net/ethernet/intel/e1000e/
H A Dnetdev.c6196 * the PCI device into guest. For example, the KVM on power is __e1000_shutdown()
/linux-4.1.27/fs/ext4/
H A Dextents.c193 * qemu or KVM writing a raw image file that is going ext4_ext_find_goal()
/linux-4.1.27/kernel/events/
H A Dcore.c4841 * We assume there is only KVM supporting the callbacks.

Completed in 4267 milliseconds