Home
last modified time | relevance | path

Searched +full:num +full:- +full:guest +full:- +full:ids (Results 1 – 25 of 32) sorted by relevance

12

/linux-6.12.1/Documentation/devicetree/bindings/interrupt-controller/
Driscv,imsics.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/interrupt-controller/riscv,imsics.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: RISC-V Incoming MSI Controller (IMSIC)
10 - Anup Patel <anup@brainfault.org>
13 The RISC-V advanced interrupt architecture (AIA) defines a per-CPU incoming
14 MSI controller (IMSIC) for handling MSIs in a RISC-V platform. The RISC-V
15 AIA specification can be found at https://github.com/riscv/riscv-aia.
17 The IMSIC is a per-CPU (or per-HART) device with separate interrupt file
[all …]
/linux-6.12.1/arch/powerpc/include/asm/
Dkvm_book3s.h1 /* SPDX-License-Identifier: GPL-2.0-only */
15 #include <asm/guest-state-buffer.h>
37 #define SID_MAP_MASK (SID_MAP_NUM - 1)
88 u64 tb_offset; /* guest timebase - host timebase */
389 return vcpu->arch.book3s; in to_book3s()
401 static inline void kvmppc_set_gpr(struct kvm_vcpu *vcpu, int num, ulong val) in kvmppc_set_gpr() argument
403 vcpu->arch.regs.gpr[num] = val; in kvmppc_set_gpr()
404 kvmhv_nestedv2_mark_dirty(vcpu, KVMPPC_GSID_GPR(num)); in kvmppc_set_gpr()
407 static inline ulong kvmppc_get_gpr(struct kvm_vcpu *vcpu, int num) in kvmppc_get_gpr() argument
409 WARN_ON(kvmhv_nestedv2_cached_reload(vcpu, KVMPPC_GSID_GPR(num)) < 0); in kvmppc_get_gpr()
[all …]
/linux-6.12.1/include/uapi/linux/
Dvirtio_ring.h42 /* This marks a buffer as write-only (otherwise read-only). */
54 /* The Host uses this in used->flags to advise the Guest: don't kick me when
55 * you add a buffer. It's unreliable, so it's simply an optimization. Guest
58 /* The Guest uses this in avail->flags to advise the Host: don't interrupt me
83 /* The Guest publishes the used index for which it expects an interrupt
84 * at the end of the avail ring. Host should ignore the avail->flags field. */
86 * at the end of the used ring. Guest should ignore the used->flags field. */
90 * When using pre-virtio 1.0 layout, these fall out naturally.
97 * struct vring_desc - Virtio ring descriptors,
100 * @addr: buffer address (guest-physical)
[all …]
Dvhost.h1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
4 /* Userspace interface for in-kernel virtio accelerators. */
8 * Existing virtio net code is used in the guest without modification.
18 #define VHOST_FILE_UNBIND -1
76 /* Get accessor: reads index, writes value in num */
79 /* Set the vring byte order in num. Valid values are VHOST_VRING_LITTLE_ENDIAN
80 * or VHOST_VRING_BIG_ENDIAN (other values return -EINVAL).
82 * returns -EBUSY.
130 * used for transmit. Pass fd -1 to unbind from the socket and the transmit
151 /* Get the device id. The device ids follow the same definition of
[all …]
/linux-6.12.1/drivers/irqchip/
Dirq-riscv-imsic-state.c1 // SPDX-License-Identifier: GPL-2.0
7 #define pr_fmt(fmt) "riscv-imsic: " fmt
22 #include "irq-riscv-imsic-state.h"
63 return imsic ? &imsic->global : NULL; in imsic_get_global_config()
74 imask = BIT(id & (__riscv_xlen - 1)); in __imsic_eix_read_clear()
102 * are XLEN-wide and we must not touch IDs which in __imsic_eix_update()
106 for (i = id & (__riscv_xlen - 1); id < last_id && i < __riscv_xlen; i++) { in __imsic_eix_update()
133 lockdep_assert_held(&lpriv->lock); in __imsic_local_sync()
135 for_each_set_bit(i, lpriv->dirty_bitmap, imsic->global.nr_ids + 1) { in __imsic_local_sync()
138 vec = &lpriv->vectors[i]; in __imsic_local_sync()
[all …]
/linux-6.12.1/arch/x86/kernel/cpu/
Dtopology.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * The APIC IDs describe the system topology in multiple domain levels.
11 * The root space contains the package (socket) IDs.
49 u32 cpuid_to_apicid[] __ro_after_init = { [0 ... NR_CPUS - 1] = BAD_APICID, };
80 if (!(apicid & (__max_threads_per_core - 1))) in cpu_mark_primary_thread()
95 return apicid & (UINT_MAX << x86_topo_system.dom_shifts[dom - 1]); in topo_apicid()
107 return -ENODEV; in topo_lookup_cpuid()
231 * of the APICs via firmware parsers or VM guest in topo_register_apic()
246 * on bare metal. Allow the bogosity in a guest. in topo_register_apic()
250 pr_info_once("Ignoring hot-pluggable APIC ID %x in present package.\n", in topo_register_apic()
[all …]
/linux-6.12.1/tools/perf/trace/beauty/include/uapi/linux/
Dvhost.h1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
4 /* Userspace interface for in-kernel virtio accelerators. */
8 * Existing virtio net code is used in the guest without modification.
18 #define VHOST_FILE_UNBIND -1
76 /* Get accessor: reads index, writes value in num */
79 /* Set the vring byte order in num. Valid values are VHOST_VRING_LITTLE_ENDIAN
80 * or VHOST_VRING_BIG_ENDIAN (other values return -EINVAL).
82 * returns -EBUSY.
130 * used for transmit. Pass fd -1 to unbind from the socket and the transmit
151 /* Get the device id. The device ids follow the same definition of
[all …]
/linux-6.12.1/drivers/crypto/intel/qat/qat_common/
Dadf_dev_mgr.c1 // SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only)
2 /* Copyright(c) 2014 - 2020 Intel Corporation */
24 return ((7 * (PCI_SLOT(accel_to_pci_dev(vf)->devfn) - 1)) + in adf_get_vf_id()
25 PCI_FUNC(accel_to_pci_dev(vf)->devfn) + in adf_get_vf_id()
26 (PCI_SLOT(accel_to_pci_dev(vf)->devfn) - 1)); in adf_get_vf_id()
31 return (accel_to_pci_dev(vf)->bus->number << 8) | adf_get_vf_id(vf); in adf_get_vf_num()
42 if (ptr->bdf == bdf) in adf_find_vf()
55 if (ptr->fake_id == fake) in adf_get_vf_real_id()
56 return ptr->id; in adf_get_vf_real_id()
58 return -1; in adf_get_vf_real_id()
[all …]
/linux-6.12.1/Documentation/networking/device_drivers/ethernet/intel/
Diavf.rst1 .. SPDX-License-Identifier: GPL-2.0+
8 Copyright(c) 2013-2018 Intel Corporation.
13 - Overview
14 - Identifying Your Adapter
15 - Additional Configurations
16 - Known Issues/Troubleshooting
17 - Support
30 The guest OS loading the iavf driver must support MSI-X interrupts.
53 ---------------------
58 # dmesg -n 8
[all …]
/linux-6.12.1/Documentation/arch/powerpc/
Dkvm-nested.rst1 .. SPDX-License-Identifier: GPL-2.0
10 This document explains how a guest operating system can act as a
15 guest virtual machine that is directly run under L0 and is initiated
16 and controlled by L0. L2 is a guest virtual machine that is initiated
36 KVM: PPC: Book3S HV: Nested guest entry via hypercall
44 vCPU (except in the short sequence in the L0 on L1 -> L2 entry and L2
45 -> L1 exit).
74 - L1 and L0 negotiate capabilities with H_GUEST_{G,S}ET_CAPABILITIES()
77 - L1 requests the L0 create an L2 with H_GUEST_CREATE() and receives a token
79 - L1 requests the L0 create an L2 vCPU with H_GUEST_CREATE_VCPU()
[all …]
/linux-6.12.1/arch/um/drivers/
Dvirtio_uml.c1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * Virtio vhost-user driver
7 * This driver allows virtio devices to be used over a vhost-user socket.
9 * Guest devices can be instantiated by kernel module or command line
14 * <socket> := vhost-user socket path to connect
21 * Based on Virtio MMIO driver by Pawel Moll, copyright 2011-2014, ARM Ltd.
30 #include <linux/time-internal.h>
31 #include <linux/virtio-uml.h>
32 #include <shared/as-layout.h>
77 #define vu_err(vu_dev, ...) dev_err(&(vu_dev)->pdev->dev, ##__VA_ARGS__)
[all …]
/linux-6.12.1/arch/mips/include/asm/
Dkvm_host.h29 /* MIPS KVM register ids */
102 #define KVM_HVA_ERR_BAD (-1UL)
103 #define KVM_HVA_ERR_RO_BAD (-2UL)
176 /* Guest physical mm */
247 #define RESUME_FLAG_DR (1<<0) /* Reload guest nonvolatile state? */
260 EMULATE_EXCEPT, /* A guest exception has been generated */
265 #define VPN2_MASK GENMASK(cpu_vmbits - 1, 13)
294 /* Host registers preserved across guest mode execution */
300 /* Host CP0 registers used when handling exits from guest */
353 /* wired guest TLB entries */
[all …]
/linux-6.12.1/tools/testing/selftests/kvm/lib/
Dkvm_util.c1 // SPDX-License-Identifier: GPL-2.0-only
43 * flags - The flags to pass when opening KVM_DEV_PATH.
85 * 16 bytes to hold a 64-bit value (1 byte per char), 1 byte for the in get_module_param_integer()
95 TEST_ASSERT(value[r - 1] == '\n', in get_module_param_integer()
96 "Expected trailing newline, got char '%c'", value[r - 1]); in get_module_param_integer()
100 * trailing non-NUL characters in the string. in get_module_param_integer()
102 value[r - 1] = '\0'; in get_module_param_integer()
156 * cap - Capability
188 vm->dirty_ring_size = ring_size; in vm_enable_dirty_ring()
193 vm->kvm_fd = _open_kvm_dev_path_or_exit(O_RDWR); in vm_open()
[all …]
/linux-6.12.1/tools/kvm/kvm_stat/
Dkvm_stat2 # SPDX-License-Identifier: GPL-2.0-only
4 # top-like utility for displaying kvm statistics
6 # Copyright 2006-2008 Qumranet Technologies
7 # Copyright 2008-2011 Red Hat, Inc.
15 - as a top-like text ui
16 - in a key -> value format
17 - in an all keys, all values format
493 Used to set up performance events, returns a file descriptor or -1
497 - syscall number
498 - struct perf_event_attr *
[all …]
/linux-6.12.1/arch/powerpc/sysdev/xive/
Dcommon.c1 // SPDX-License-Identifier: GPL-2.0-or-later
31 #include <asm/xive-regs.h>
34 #include "xive-internal.h"
40 #define DBG_VERBOSE(fmt, ...) pr_devel("cpu %d - " fmt, \
73 * Use early_cpu_to_node() for hot-plugged CPUs
85 #define XIVE_INVALID_TARGET (-1)
94 return xd->flags & XIVE_IRQ_FLAG_STORE_EOI && xive_store_eoi; in xive_is_store_eoi()
107 if (!q->qpage) in xive_read_eq()
109 cur = be32_to_cpup(q->qpage + q->idx); in xive_read_eq()
112 if ((cur >> 31) == q->toggle) in xive_read_eq()
[all …]
/linux-6.12.1/arch/loongarch/kvm/
Dvcpu.c1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2020-2023 Loongson Technology Corporation Limited
7 #include <linux/entry-kvm.h>
39 context = this_cpu_ptr(vcpu->kvm->arch.vmcs); in kvm_save_host_pmu()
40 context->perf_cntr[0] = read_csr_perfcntr0(); in kvm_save_host_pmu()
41 context->perf_cntr[1] = read_csr_perfcntr1(); in kvm_save_host_pmu()
42 context->perf_cntr[2] = read_csr_perfcntr2(); in kvm_save_host_pmu()
43 context->perf_cntr[3] = read_csr_perfcntr3(); in kvm_save_host_pmu()
44 context->perf_ctrl[0] = write_csr_perfctrl0(0); in kvm_save_host_pmu()
45 context->perf_ctrl[1] = write_csr_perfctrl1(0); in kvm_save_host_pmu()
[all …]
/linux-6.12.1/include/linux/
Dremoteproc.h47 * struct resource_table - firmware resource table header
49 * @num: number of resource entries
75 u32 num; member
81 * struct fw_rsc_hdr - firmware resource entry header
95 * enum fw_resource_type - types of resource entries
99 * @RSC_DEVMEM: request to iommu_map a memory-based peripheral.
126 #define FW_RSC_ADDR_ANY (-1)
129 * struct fw_rsc_carveout - physically contiguous memory request
135 * @name: human-readable name of the requested memory region
181 * struct fw_rsc_devmem - iommu mapping request
[all …]
/linux-6.12.1/arch/riscv/kvm/
Daia_imsic.c1 // SPDX-License-Identifier: GPL-2.0
12 #include <linux/irqchip/riscv-imsic.h>
44 * 1) Hardware: IMSIC VS-file (vsfile_cpu >= 0)
45 * 2) Software: IMSIC SW-file (vsfile_cpu < 0)
48 /* IMSIC VS-file */
55 /* IMSIC SW-file */
243 imsic_mrif_atomic_rmw(__mrif, __ptr, __new_val, -1UL)
253 &mrif->eithreshold); in imsic_mrif_topei()
258 eix = &mrif->eix[ei]; in imsic_mrif_topei()
259 eipend[0] = imsic_mrif_atomic_read(mrif, &eix->eie[0]) & in imsic_mrif_topei()
[all …]
/linux-6.12.1/tools/arch/x86/kcpuid/
Dcpuid.csv1 # SPDX-License-Identifier: CC0-1.0
2 # Generator: x86-cpuid-db v1.0
5 # Auto-generated file.
6 # Please submit all updates and bugfixes to https://x86-cpuid.org
16 0, 0, ebx, 31:0, cpu_vendorid_0 , CPU vendor ID string bytes 0 - 3
17 0, 0, ecx, 31:0, cpu_vendorid_2 , CPU vendor ID string bytes 8 - 11
18 0, 0, edx, 31:0, cpu_vendorid_1 , CPU vendor ID string bytes 4 - 7
35 1, 0, ecx, 2, dtes64 , 64-bit DS save area
49 1, 0, ecx, 17, pcid , Process-context identifiers
56 1, 0, ecx, 24, tsc_deadline_timer , APIC timer one-shot operation
[all …]
/linux-6.12.1/arch/x86/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
4 bool "64-bit kernel" if "$(ARCH)" = "x86"
7 Say yes to build a 64-bit kernel - formerly known as x86_64
8 Say no to build a 32-bit kernel - formerly known as i386
13 # Options that are inherently 32-bit kernel only:
27 # Options that are inherently 64-bit kernel only:
55 # ported to 32-bit as well. )
150 # Word-size accesses may read uninitialized data past the trailing \0
329 default "elf32-i386" if X86_32
330 default "elf64-x86-64" if X86_64
[all …]
/linux-6.12.1/drivers/gpu/drm/vmwgfx/
Dvmwgfx_execbuf.c1 // SPDX-License-Identifier: GPL-2.0 OR MIT
4 * Copyright 2009 - 2023 VMware, Inc., Palo Alto, CA., USA
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
47 __sw_context->dx_ctx_node ? __sw_context->dx_ctx_node : ({ \
49 __sw_context->dx_ctx_node; \
60 * struct vmw_relocation - Buffer object relocation
63 * @vbo: Non ref-counted pointer to buffer object
65 * @location: Pointer to location for guest pointer to be modified
77 * enum vmw_resource_relocation_type - Relocation type for resources
84 * validation is -1, the command is replaced with a NOP. Otherwise no action.
[all …]
/linux-6.12.1/drivers/net/xen-netback/
Dxenbus.c1 // SPDX-License-Identifier: GPL-2.0-or-later
28 struct xenvif_queue *queue = m->private; in xenvif_read_io_ring()
29 struct xen_netif_tx_back_ring *tx_ring = &queue->tx; in xenvif_read_io_ring()
30 struct xen_netif_rx_back_ring *rx_ring = &queue->rx; in xenvif_read_io_ring()
33 if (tx_ring->sring) { in xenvif_read_io_ring()
34 struct xen_netif_tx_sring *sring = tx_ring->sring; in xenvif_read_io_ring()
36 seq_printf(m, "Queue %d\nTX: nr_ents %u\n", queue->id, in xenvif_read_io_ring()
37 tx_ring->nr_ents); in xenvif_read_io_ring()
39 sring->req_prod, in xenvif_read_io_ring()
40 sring->req_prod - sring->rsp_prod, in xenvif_read_io_ring()
[all …]
/linux-6.12.1/drivers/block/xen-blkback/
Dxenbus.c1 // SPDX-License-Identifier: GPL-2.0-or-later
9 #define pr_fmt(fmt) "xen-blkback: " fmt
18 /* On the XenBus the max length of 'ring-ref%u'. */
40 return be->dev; in xen_blkbk_xenbus()
58 struct xenbus_device *dev = blkif->be->dev; in blkback_name()
60 devpath = xenbus_read(XBT_NIL, dev->nodename, "dev", NULL); in blkback_name()
70 snprintf(buf, TASK_COMM_LEN, "%d.%s", blkif->domid, devname); in blkback_name()
84 if (!blkif->rings || !blkif->rings[0].irq || !blkif->vbd.bdev_file) in xen_update_blkif_status()
88 if (blkif->be->dev->state == XenbusStateConnected) in xen_update_blkif_status()
92 connect(blkif->be); in xen_update_blkif_status()
[all …]
/linux-6.12.1/drivers/gpu/drm/amd/amdgpu/
Damdgpu_xgmi.c297 * hive ID and individual node IDs, both of which are 64-bit numbers.
302 * Inside the device directory a sub-directory 'xgmi_hive_info' is
312 * set of node sub-directories.
337 return snprintf(buf, PAGE_SIZE, "%llu\n", hive->hive_id); in amdgpu_xgmi_show_attrs()
347 amdgpu_reset_put_reset_domain(hive->reset_domain); in amdgpu_xgmi_hive_release()
348 hive->reset_domain = NULL; in amdgpu_xgmi_hive_release()
350 mutex_destroy(&hive->hive_lock); in amdgpu_xgmi_hive_release()
371 return sysfs_emit(buf, "%llu\n", adev->gmc.xgmi.node_id); in amdgpu_xgmi_show_device_id()
382 return sysfs_emit(buf, "%u\n", adev->gmc.xgmi.physical_node_id); in amdgpu_xgmi_show_physical_id()
392 struct psp_xgmi_topology_info *top = &adev->psp.xgmi_context.top_info; in amdgpu_xgmi_show_num_hops()
[all …]
/linux-6.12.1/Documentation/admin-guide/
Dkernel-parameters.txt16 force -- enable ACPI if default was off
17 on -- enable ACPI but allow fallback to DT [arm64,riscv64]
18 off -- disable ACPI if default was on
19 noirq -- do not use ACPI for IRQ routing
20 strict -- Be less tolerant of platforms that are not
22 rsdt -- prefer RSDT over (default) XSDT
23 copy_dsdt -- copy DSDT to memory
24 nospcr -- disable console in ACPI SPCR table as
41 If set to vendor, prefer vendor-specific driver
73 Documentation/firmware-guide/acpi/debug.rst for more information about
[all …]

12