/linux-6.12.1/Documentation/devicetree/bindings/interrupt-controller/ |
D | riscv,imsics.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/interrupt-controller/riscv,imsics.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: RISC-V Incoming MSI Controller (IMSIC) 10 - Anup Patel <anup@brainfault.org> 13 The RISC-V advanced interrupt architecture (AIA) defines a per-CPU incoming 14 MSI controller (IMSIC) for handling MSIs in a RISC-V platform. The RISC-V 15 AIA specification can be found at https://github.com/riscv/riscv-aia. 17 The IMSIC is a per-CPU (or per-HART) device with separate interrupt file [all …]
|
/linux-6.12.1/arch/powerpc/include/asm/ |
D | kvm_book3s.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 15 #include <asm/guest-state-buffer.h> 37 #define SID_MAP_MASK (SID_MAP_NUM - 1) 88 u64 tb_offset; /* guest timebase - host timebase */ 389 return vcpu->arch.book3s; in to_book3s() 401 static inline void kvmppc_set_gpr(struct kvm_vcpu *vcpu, int num, ulong val) in kvmppc_set_gpr() argument 403 vcpu->arch.regs.gpr[num] = val; in kvmppc_set_gpr() 404 kvmhv_nestedv2_mark_dirty(vcpu, KVMPPC_GSID_GPR(num)); in kvmppc_set_gpr() 407 static inline ulong kvmppc_get_gpr(struct kvm_vcpu *vcpu, int num) in kvmppc_get_gpr() argument 409 WARN_ON(kvmhv_nestedv2_cached_reload(vcpu, KVMPPC_GSID_GPR(num)) < 0); in kvmppc_get_gpr() [all …]
|
/linux-6.12.1/include/uapi/linux/ |
D | virtio_ring.h | 42 /* This marks a buffer as write-only (otherwise read-only). */ 54 /* The Host uses this in used->flags to advise the Guest: don't kick me when 55 * you add a buffer. It's unreliable, so it's simply an optimization. Guest 58 /* The Guest uses this in avail->flags to advise the Host: don't interrupt me 83 /* The Guest publishes the used index for which it expects an interrupt 84 * at the end of the avail ring. Host should ignore the avail->flags field. */ 86 * at the end of the used ring. Guest should ignore the used->flags field. */ 90 * When using pre-virtio 1.0 layout, these fall out naturally. 97 * struct vring_desc - Virtio ring descriptors, 100 * @addr: buffer address (guest-physical) [all …]
|
D | vhost.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 4 /* Userspace interface for in-kernel virtio accelerators. */ 8 * Existing virtio net code is used in the guest without modification. 18 #define VHOST_FILE_UNBIND -1 76 /* Get accessor: reads index, writes value in num */ 79 /* Set the vring byte order in num. Valid values are VHOST_VRING_LITTLE_ENDIAN 80 * or VHOST_VRING_BIG_ENDIAN (other values return -EINVAL). 82 * returns -EBUSY. 130 * used for transmit. Pass fd -1 to unbind from the socket and the transmit 151 /* Get the device id. The device ids follow the same definition of [all …]
|
/linux-6.12.1/drivers/irqchip/ |
D | irq-riscv-imsic-state.c | 1 // SPDX-License-Identifier: GPL-2.0 7 #define pr_fmt(fmt) "riscv-imsic: " fmt 22 #include "irq-riscv-imsic-state.h" 63 return imsic ? &imsic->global : NULL; in imsic_get_global_config() 74 imask = BIT(id & (__riscv_xlen - 1)); in __imsic_eix_read_clear() 102 * are XLEN-wide and we must not touch IDs which in __imsic_eix_update() 106 for (i = id & (__riscv_xlen - 1); id < last_id && i < __riscv_xlen; i++) { in __imsic_eix_update() 133 lockdep_assert_held(&lpriv->lock); in __imsic_local_sync() 135 for_each_set_bit(i, lpriv->dirty_bitmap, imsic->global.nr_ids + 1) { in __imsic_local_sync() 138 vec = &lpriv->vectors[i]; in __imsic_local_sync() [all …]
|
/linux-6.12.1/arch/x86/kernel/cpu/ |
D | topology.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * The APIC IDs describe the system topology in multiple domain levels. 11 * The root space contains the package (socket) IDs. 49 u32 cpuid_to_apicid[] __ro_after_init = { [0 ... NR_CPUS - 1] = BAD_APICID, }; 80 if (!(apicid & (__max_threads_per_core - 1))) in cpu_mark_primary_thread() 95 return apicid & (UINT_MAX << x86_topo_system.dom_shifts[dom - 1]); in topo_apicid() 107 return -ENODEV; in topo_lookup_cpuid() 231 * of the APICs via firmware parsers or VM guest in topo_register_apic() 246 * on bare metal. Allow the bogosity in a guest. in topo_register_apic() 250 pr_info_once("Ignoring hot-pluggable APIC ID %x in present package.\n", in topo_register_apic() [all …]
|
/linux-6.12.1/tools/perf/trace/beauty/include/uapi/linux/ |
D | vhost.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 4 /* Userspace interface for in-kernel virtio accelerators. */ 8 * Existing virtio net code is used in the guest without modification. 18 #define VHOST_FILE_UNBIND -1 76 /* Get accessor: reads index, writes value in num */ 79 /* Set the vring byte order in num. Valid values are VHOST_VRING_LITTLE_ENDIAN 80 * or VHOST_VRING_BIG_ENDIAN (other values return -EINVAL). 82 * returns -EBUSY. 130 * used for transmit. Pass fd -1 to unbind from the socket and the transmit 151 /* Get the device id. The device ids follow the same definition of [all …]
|
/linux-6.12.1/drivers/crypto/intel/qat/qat_common/ |
D | adf_dev_mgr.c | 1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only) 2 /* Copyright(c) 2014 - 2020 Intel Corporation */ 24 return ((7 * (PCI_SLOT(accel_to_pci_dev(vf)->devfn) - 1)) + in adf_get_vf_id() 25 PCI_FUNC(accel_to_pci_dev(vf)->devfn) + in adf_get_vf_id() 26 (PCI_SLOT(accel_to_pci_dev(vf)->devfn) - 1)); in adf_get_vf_id() 31 return (accel_to_pci_dev(vf)->bus->number << 8) | adf_get_vf_id(vf); in adf_get_vf_num() 42 if (ptr->bdf == bdf) in adf_find_vf() 55 if (ptr->fake_id == fake) in adf_get_vf_real_id() 56 return ptr->id; in adf_get_vf_real_id() 58 return -1; in adf_get_vf_real_id() [all …]
|
/linux-6.12.1/Documentation/networking/device_drivers/ethernet/intel/ |
D | iavf.rst | 1 .. SPDX-License-Identifier: GPL-2.0+ 8 Copyright(c) 2013-2018 Intel Corporation. 13 - Overview 14 - Identifying Your Adapter 15 - Additional Configurations 16 - Known Issues/Troubleshooting 17 - Support 30 The guest OS loading the iavf driver must support MSI-X interrupts. 53 --------------------- 58 # dmesg -n 8 [all …]
|
/linux-6.12.1/Documentation/arch/powerpc/ |
D | kvm-nested.rst | 1 .. SPDX-License-Identifier: GPL-2.0 10 This document explains how a guest operating system can act as a 15 guest virtual machine that is directly run under L0 and is initiated 16 and controlled by L0. L2 is a guest virtual machine that is initiated 36 KVM: PPC: Book3S HV: Nested guest entry via hypercall 44 vCPU (except in the short sequence in the L0 on L1 -> L2 entry and L2 45 -> L1 exit). 74 - L1 and L0 negotiate capabilities with H_GUEST_{G,S}ET_CAPABILITIES() 77 - L1 requests the L0 create an L2 with H_GUEST_CREATE() and receives a token 79 - L1 requests the L0 create an L2 vCPU with H_GUEST_CREATE_VCPU() [all …]
|
/linux-6.12.1/arch/um/drivers/ |
D | virtio_uml.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * Virtio vhost-user driver 7 * This driver allows virtio devices to be used over a vhost-user socket. 9 * Guest devices can be instantiated by kernel module or command line 14 * <socket> := vhost-user socket path to connect 21 * Based on Virtio MMIO driver by Pawel Moll, copyright 2011-2014, ARM Ltd. 30 #include <linux/time-internal.h> 31 #include <linux/virtio-uml.h> 32 #include <shared/as-layout.h> 77 #define vu_err(vu_dev, ...) dev_err(&(vu_dev)->pdev->dev, ##__VA_ARGS__) [all …]
|
/linux-6.12.1/arch/mips/include/asm/ |
D | kvm_host.h | 29 /* MIPS KVM register ids */ 102 #define KVM_HVA_ERR_BAD (-1UL) 103 #define KVM_HVA_ERR_RO_BAD (-2UL) 176 /* Guest physical mm */ 247 #define RESUME_FLAG_DR (1<<0) /* Reload guest nonvolatile state? */ 260 EMULATE_EXCEPT, /* A guest exception has been generated */ 265 #define VPN2_MASK GENMASK(cpu_vmbits - 1, 13) 294 /* Host registers preserved across guest mode execution */ 300 /* Host CP0 registers used when handling exits from guest */ 353 /* wired guest TLB entries */ [all …]
|
/linux-6.12.1/tools/testing/selftests/kvm/lib/ |
D | kvm_util.c | 1 // SPDX-License-Identifier: GPL-2.0-only 43 * flags - The flags to pass when opening KVM_DEV_PATH. 85 * 16 bytes to hold a 64-bit value (1 byte per char), 1 byte for the in get_module_param_integer() 95 TEST_ASSERT(value[r - 1] == '\n', in get_module_param_integer() 96 "Expected trailing newline, got char '%c'", value[r - 1]); in get_module_param_integer() 100 * trailing non-NUL characters in the string. in get_module_param_integer() 102 value[r - 1] = '\0'; in get_module_param_integer() 156 * cap - Capability 188 vm->dirty_ring_size = ring_size; in vm_enable_dirty_ring() 193 vm->kvm_fd = _open_kvm_dev_path_or_exit(O_RDWR); in vm_open() [all …]
|
/linux-6.12.1/tools/kvm/kvm_stat/ |
D | kvm_stat | 2 # SPDX-License-Identifier: GPL-2.0-only 4 # top-like utility for displaying kvm statistics 6 # Copyright 2006-2008 Qumranet Technologies 7 # Copyright 2008-2011 Red Hat, Inc. 15 - as a top-like text ui 16 - in a key -> value format 17 - in an all keys, all values format 493 Used to set up performance events, returns a file descriptor or -1 497 - syscall number 498 - struct perf_event_attr * [all …]
|
/linux-6.12.1/arch/powerpc/sysdev/xive/ |
D | common.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 31 #include <asm/xive-regs.h> 34 #include "xive-internal.h" 40 #define DBG_VERBOSE(fmt, ...) pr_devel("cpu %d - " fmt, \ 73 * Use early_cpu_to_node() for hot-plugged CPUs 85 #define XIVE_INVALID_TARGET (-1) 94 return xd->flags & XIVE_IRQ_FLAG_STORE_EOI && xive_store_eoi; in xive_is_store_eoi() 107 if (!q->qpage) in xive_read_eq() 109 cur = be32_to_cpup(q->qpage + q->idx); in xive_read_eq() 112 if ((cur >> 31) == q->toggle) in xive_read_eq() [all …]
|
/linux-6.12.1/arch/loongarch/kvm/ |
D | vcpu.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Copyright (C) 2020-2023 Loongson Technology Corporation Limited 7 #include <linux/entry-kvm.h> 39 context = this_cpu_ptr(vcpu->kvm->arch.vmcs); in kvm_save_host_pmu() 40 context->perf_cntr[0] = read_csr_perfcntr0(); in kvm_save_host_pmu() 41 context->perf_cntr[1] = read_csr_perfcntr1(); in kvm_save_host_pmu() 42 context->perf_cntr[2] = read_csr_perfcntr2(); in kvm_save_host_pmu() 43 context->perf_cntr[3] = read_csr_perfcntr3(); in kvm_save_host_pmu() 44 context->perf_ctrl[0] = write_csr_perfctrl0(0); in kvm_save_host_pmu() 45 context->perf_ctrl[1] = write_csr_perfctrl1(0); in kvm_save_host_pmu() [all …]
|
/linux-6.12.1/include/linux/ |
D | remoteproc.h | 47 * struct resource_table - firmware resource table header 49 * @num: number of resource entries 75 u32 num; member 81 * struct fw_rsc_hdr - firmware resource entry header 95 * enum fw_resource_type - types of resource entries 99 * @RSC_DEVMEM: request to iommu_map a memory-based peripheral. 126 #define FW_RSC_ADDR_ANY (-1) 129 * struct fw_rsc_carveout - physically contiguous memory request 135 * @name: human-readable name of the requested memory region 181 * struct fw_rsc_devmem - iommu mapping request [all …]
|
/linux-6.12.1/arch/riscv/kvm/ |
D | aia_imsic.c | 1 // SPDX-License-Identifier: GPL-2.0 12 #include <linux/irqchip/riscv-imsic.h> 44 * 1) Hardware: IMSIC VS-file (vsfile_cpu >= 0) 45 * 2) Software: IMSIC SW-file (vsfile_cpu < 0) 48 /* IMSIC VS-file */ 55 /* IMSIC SW-file */ 243 imsic_mrif_atomic_rmw(__mrif, __ptr, __new_val, -1UL) 253 &mrif->eithreshold); in imsic_mrif_topei() 258 eix = &mrif->eix[ei]; in imsic_mrif_topei() 259 eipend[0] = imsic_mrif_atomic_read(mrif, &eix->eie[0]) & in imsic_mrif_topei() [all …]
|
/linux-6.12.1/tools/arch/x86/kcpuid/ |
D | cpuid.csv | 1 # SPDX-License-Identifier: CC0-1.0 2 # Generator: x86-cpuid-db v1.0 5 # Auto-generated file. 6 # Please submit all updates and bugfixes to https://x86-cpuid.org 16 0, 0, ebx, 31:0, cpu_vendorid_0 , CPU vendor ID string bytes 0 - 3 17 0, 0, ecx, 31:0, cpu_vendorid_2 , CPU vendor ID string bytes 8 - 11 18 0, 0, edx, 31:0, cpu_vendorid_1 , CPU vendor ID string bytes 4 - 7 35 1, 0, ecx, 2, dtes64 , 64-bit DS save area 49 1, 0, ecx, 17, pcid , Process-context identifiers 56 1, 0, ecx, 24, tsc_deadline_timer , APIC timer one-shot operation [all …]
|
/linux-6.12.1/arch/x86/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 4 bool "64-bit kernel" if "$(ARCH)" = "x86" 7 Say yes to build a 64-bit kernel - formerly known as x86_64 8 Say no to build a 32-bit kernel - formerly known as i386 13 # Options that are inherently 32-bit kernel only: 27 # Options that are inherently 64-bit kernel only: 55 # ported to 32-bit as well. ) 150 # Word-size accesses may read uninitialized data past the trailing \0 329 default "elf32-i386" if X86_32 330 default "elf64-x86-64" if X86_64 [all …]
|
/linux-6.12.1/drivers/gpu/drm/vmwgfx/ |
D | vmwgfx_execbuf.c | 1 // SPDX-License-Identifier: GPL-2.0 OR MIT 4 * Copyright 2009 - 2023 VMware, Inc., Palo Alto, CA., USA 20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL 47 __sw_context->dx_ctx_node ? __sw_context->dx_ctx_node : ({ \ 49 __sw_context->dx_ctx_node; \ 60 * struct vmw_relocation - Buffer object relocation 63 * @vbo: Non ref-counted pointer to buffer object 65 * @location: Pointer to location for guest pointer to be modified 77 * enum vmw_resource_relocation_type - Relocation type for resources 84 * validation is -1, the command is replaced with a NOP. Otherwise no action. [all …]
|
/linux-6.12.1/drivers/net/xen-netback/ |
D | xenbus.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 28 struct xenvif_queue *queue = m->private; in xenvif_read_io_ring() 29 struct xen_netif_tx_back_ring *tx_ring = &queue->tx; in xenvif_read_io_ring() 30 struct xen_netif_rx_back_ring *rx_ring = &queue->rx; in xenvif_read_io_ring() 33 if (tx_ring->sring) { in xenvif_read_io_ring() 34 struct xen_netif_tx_sring *sring = tx_ring->sring; in xenvif_read_io_ring() 36 seq_printf(m, "Queue %d\nTX: nr_ents %u\n", queue->id, in xenvif_read_io_ring() 37 tx_ring->nr_ents); in xenvif_read_io_ring() 39 sring->req_prod, in xenvif_read_io_ring() 40 sring->req_prod - sring->rsp_prod, in xenvif_read_io_ring() [all …]
|
/linux-6.12.1/drivers/block/xen-blkback/ |
D | xenbus.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 9 #define pr_fmt(fmt) "xen-blkback: " fmt 18 /* On the XenBus the max length of 'ring-ref%u'. */ 40 return be->dev; in xen_blkbk_xenbus() 58 struct xenbus_device *dev = blkif->be->dev; in blkback_name() 60 devpath = xenbus_read(XBT_NIL, dev->nodename, "dev", NULL); in blkback_name() 70 snprintf(buf, TASK_COMM_LEN, "%d.%s", blkif->domid, devname); in blkback_name() 84 if (!blkif->rings || !blkif->rings[0].irq || !blkif->vbd.bdev_file) in xen_update_blkif_status() 88 if (blkif->be->dev->state == XenbusStateConnected) in xen_update_blkif_status() 92 connect(blkif->be); in xen_update_blkif_status() [all …]
|
/linux-6.12.1/drivers/gpu/drm/amd/amdgpu/ |
D | amdgpu_xgmi.c | 297 * hive ID and individual node IDs, both of which are 64-bit numbers. 302 * Inside the device directory a sub-directory 'xgmi_hive_info' is 312 * set of node sub-directories. 337 return snprintf(buf, PAGE_SIZE, "%llu\n", hive->hive_id); in amdgpu_xgmi_show_attrs() 347 amdgpu_reset_put_reset_domain(hive->reset_domain); in amdgpu_xgmi_hive_release() 348 hive->reset_domain = NULL; in amdgpu_xgmi_hive_release() 350 mutex_destroy(&hive->hive_lock); in amdgpu_xgmi_hive_release() 371 return sysfs_emit(buf, "%llu\n", adev->gmc.xgmi.node_id); in amdgpu_xgmi_show_device_id() 382 return sysfs_emit(buf, "%u\n", adev->gmc.xgmi.physical_node_id); in amdgpu_xgmi_show_physical_id() 392 struct psp_xgmi_topology_info *top = &adev->psp.xgmi_context.top_info; in amdgpu_xgmi_show_num_hops() [all …]
|
/linux-6.12.1/Documentation/admin-guide/ |
D | kernel-parameters.txt | 16 force -- enable ACPI if default was off 17 on -- enable ACPI but allow fallback to DT [arm64,riscv64] 18 off -- disable ACPI if default was on 19 noirq -- do not use ACPI for IRQ routing 20 strict -- Be less tolerant of platforms that are not 22 rsdt -- prefer RSDT over (default) XSDT 23 copy_dsdt -- copy DSDT to memory 24 nospcr -- disable console in ACPI SPCR table as 41 If set to vendor, prefer vendor-specific driver 73 Documentation/firmware-guide/acpi/debug.rst for more information about [all …]
|