Home
last modified time | relevance | path

Searched +full:guest +full:- +full:side (Results 1 – 25 of 312) sorted by relevance

12345678910>>...13

/kernel/linux/linux-6.6/tools/testing/selftests/kvm/x86_64/
Dtsc_msrs_test.c1 // SPDX-License-Identifier: GPL-2.0
15 #define ROUND(x) ((x + UNITY / 2) & -UNITY)
26 /* Guest: writes to MSR_IA32_TSC affect both MSRs. */ in guest_code()
32 /* Guest: writes to MSR_IA32_TSC_ADJUST affect both MSRs. */ in guest_code()
45 * Guest: writes to MSR_IA32_TSC_ADJUST do not destroy the in guest_code()
46 * host-side offset and affect both MSRs. in guest_code()
55 * Guest: writes to MSR_IA32_TSC affect both MSRs, so the host-side in guest_code()
62 GUEST_ASSERT_EQ(rounded_rdmsr(MSR_IA32_TSC_ADJUST), val - HOST_ADJUST); in guest_code()
90 exit_reason_str(vcpu->run->exit_reason)); in run_vcpu()
109 /* Guest: writes to MSR_IA32_TSC affect both MSRs. */ in main()
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/kvm/x86_64/
Dtsc_msrs_test.c1 // SPDX-License-Identifier: GPL-2.0
17 #define ROUND(x) ((x + UNITY / 2) & -UNITY)
26 "Failed guest assert: " \
37 /* Guest: writes to MSR_IA32_TSC affect both MSRs. */ in guest_code()
43 /* Guest: writes to MSR_IA32_TSC_ADJUST affect both MSRs. */ in guest_code()
56 * Guest: writes to MSR_IA32_TSC_ADJUST do not destroy the in guest_code()
57 * host-side offset and affect both MSRs. in guest_code()
66 * Guest: writes to MSR_IA32_TSC affect both MSRs, so the host-side in guest_code()
73 GUEST_ASSERT_EQ(rounded_rdmsr(MSR_IA32_TSC_ADJUST), val - HOST_ADJUST); in guest_code()
100 exit_reason_str(vcpu_state(vm, vcpuid)->exit_reason)); in run_vcpu()
[all …]
/kernel/linux/linux-6.6/Documentation/admin-guide/hw-vuln/
Dspectre.rst1 .. SPDX-License-Identifier: GPL-2.0
3 Spectre Side Channels
6 Spectre is a class of side channel attacks that exploit branch prediction
8 bypassing access controls. Speculative execution side channel exploits
14 -------------------
16 Speculative execution side channel methods affect a wide range of modern
22 - Intel Core, Atom, Pentium, and Xeon processors
24 - AMD Phenom, EPYC, and Zen processors
26 - IBM POWER and zSeries processors
28 - Higher end ARM processors
[all …]
/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/
Dspectre.rst1 .. SPDX-License-Identifier: GPL-2.0
3 Spectre Side Channels
6 Spectre is a class of side channel attacks that exploit branch prediction
8 bypassing access controls. Speculative execution side channel exploits
14 -------------------
16 Speculative execution side channel methods affect a wide range of modern
22 - Intel Core, Atom, Pentium, and Xeon processors
24 - AMD Phenom, EPYC, and Zen processors
26 - IBM POWER and zSeries processors
28 - Higher end ARM processors
[all …]
/kernel/linux/linux-6.6/Documentation/virt/kvm/x86/
Dcpuid.rst1 .. SPDX-License-Identifier: GPL-2.0
9 A guest running on a kvm host, can check some of its features using
11 mask-out some, or even all KVM-related cpuid features before launching
12 a guest.
65 KVM_FEATURE_PV_UNHALT 7 guest checks this feature bit
69 KVM_FEATURE_PV_TLB_FLUSH 9 guest checks this feature bit
77 KVM_FEATURE_PV_SEND_IPI 11 guest checks this feature bit
81 KVM_FEATURE_POLL_CONTROL 12 host-side polling on HLT can
85 KVM_FEATURE_PV_SCHED_YIELD 13 guest checks this feature bit
89 KVM_FEATURE_ASYNC_PF_INT 14 guest checks this feature bit
[all …]
/kernel/linux/linux-5.10/fs/vboxsf/
Dfile.c1 // SPDX-License-Identifier: MIT
3 * VirtualBox Guest Shared Folders support: Regular file inode and file ops.
5 * Copyright (C) 2006-2018 Oracle Corporation
9 #include <linux/page-flags.h>
31 return ERR_PTR(-ENOMEM); in vboxsf_create_sf_handle()
34 sf_i->force_restat = 1; in vboxsf_create_sf_handle()
37 sf_handle->handle = handle; in vboxsf_create_sf_handle()
38 sf_handle->root = VBOXSF_SBI(inode->i_sb)->root; in vboxsf_create_sf_handle()
39 sf_handle->access_flags = access_flags; in vboxsf_create_sf_handle()
40 kref_init(&sf_handle->refcount); in vboxsf_create_sf_handle()
[all …]
/kernel/linux/linux-5.10/Documentation/virt/kvm/
Dcpuid.rst1 .. SPDX-License-Identifier: GPL-2.0
9 A guest running on a kvm host, can check some of its features using
11 mask-out some, or even all KVM-related cpuid features before launching
12 a guest.
65 KVM_FEATURE_PV_UNHALT 7 guest checks this feature bit
69 KVM_FEATURE_PV_TLB_FLUSH 9 guest checks this feature bit
77 KVM_FEATURE_PV_SEND_IPI 11 guest checks this feature bit
81 KVM_FEATURE_POLL_CONTROL 12 host-side polling on HLT can
85 KVM_FEATURE_PV_SCHED_YIELD 13 guest checks this feature bit
89 KVM_FEATURE_ASYNC_PF_INT 14 guest checks this feature bit
[all …]
/kernel/linux/linux-5.10/tools/perf/Documentation/
Dperf-kvm.txt1 perf-kvm(1)
5 ----
6 perf-kvm - Tool to trace/measure kvm guest os
9 --------
11 'perf kvm' [--host] [--guest] [--guestmount=<path>
12 [--guestkallsyms=<path> --guestmodules=<path> | --guestvmlinux=<path>]]
13 {top|record|report|diff|buildid-list} [<options>]
14 'perf kvm' [--host] [--guest] [--guestkallsyms=<path> --guestmodules=<path>
15 | --guestvmlinux=<path>] {top|record|report|diff|buildid-list|stat} [<options>]
19 -----------
[all …]
/kernel/linux/linux-6.6/tools/perf/Documentation/
Dperf-kvm.txt1 perf-kvm(1)
5 ----
6 perf-kvm - Tool to trace/measure kvm guest os
9 --------
11 'perf kvm' [--host] [--guest] [--guestmount=<path>
12 [--guestkallsyms=<path> --guestmodules=<path> | --guestvmlinux=<path>]]
13 {top|record|report|diff|buildid-list} [<options>]
14 'perf kvm' [--host] [--guest] [--guestkallsyms=<path> --guestmodules=<path>
15 | --guestvmlinux=<path>] {top|record|report|diff|buildid-list|stat} [<options>]
19 -----------
[all …]
/kernel/linux/linux-5.10/arch/arm64/kvm/hyp/
Dentry.S1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Copyright (C) 2015 - ARM Ltd
25 // x1-x17: clobbered by macros
26 // x29: guest context
38 // defer the guest entry. The DSB isn't necessary before v8.2 as any
55 // ptrauth_switch_to_guest(guest cxt, tmp1, tmp2, tmp3)
56 // The below macro to restore guest keys is not implemented in C code
61 // Restore the guest's sp_el0
64 // Restore guest regs x0-x17
75 // Restore guest regs x18-x29, lr
[all …]
/kernel/linux/linux-6.6/fs/vboxsf/
Dfile.c1 // SPDX-License-Identifier: MIT
3 * VirtualBox Guest Shared Folders support: Regular file inode and file ops.
5 * Copyright (C) 2006-2018 Oracle Corporation
9 #include <linux/page-flags.h>
31 return ERR_PTR(-ENOMEM); in vboxsf_create_sf_handle()
34 sf_i->force_restat = 1; in vboxsf_create_sf_handle()
37 sf_handle->handle = handle; in vboxsf_create_sf_handle()
38 sf_handle->root = VBOXSF_SBI(inode->i_sb)->root; in vboxsf_create_sf_handle()
39 sf_handle->access_flags = access_flags; in vboxsf_create_sf_handle()
40 kref_init(&sf_handle->refcount); in vboxsf_create_sf_handle()
[all …]
/kernel/linux/linux-6.6/tools/virtio/ringtest/
Dring.c1 // SPDX-License-Identifier: GPL-2.0-only
6 * Simple descriptor-based ring. virtio 0.9 compatible event index is used for
15 /* Next - Where next entry will be written.
16 * Prev - "Next" value when event triggered previously.
17 * Event - Peer requested event after writing this entry.
23 return (unsigned short)(next - event - 1) < (unsigned short)(next - prev); in need_event()
27 * Guest adds descriptors with unique index values and DESC_HW in flags.
46 unsigned char reserved0[HOST_GUEST_PADDING - 2];
48 unsigned char reserved1[HOST_GUEST_PADDING - 2];
59 struct guest { struct
[all …]
Dvirtio_ring_0_9.c1 // SPDX-License-Identifier: GPL-2.0-only
29 /* enabling the below activates experimental in-order code
41 struct guest { struct
51 unsigned char reserved[HOST_GUEST_PADDING - 10];
52 } guest; argument
60 unsigned char reserved[HOST_GUEST_PADDING - 4];
78 guest.avail_idx = 0; in alloc_ring()
79 guest.kicked_avail_idx = -1; in alloc_ring()
80 guest.last_used_idx = 0; in alloc_ring()
83 guest.free_head = 0; in alloc_ring()
[all …]
/kernel/linux/linux-5.10/tools/virtio/ringtest/
Dring.c1 // SPDX-License-Identifier: GPL-2.0-only
6 * Simple descriptor-based ring. virtio 0.9 compatible event index is used for
15 /* Next - Where next entry will be written.
16 * Prev - "Next" value when event triggered previously.
17 * Event - Peer requested event after writing this entry.
23 return (unsigned short)(next - event - 1) < (unsigned short)(next - prev); in need_event()
27 * Guest adds descriptors with unique index values and DESC_HW in flags.
46 unsigned char reserved0[HOST_GUEST_PADDING - 2];
48 unsigned char reserved1[HOST_GUEST_PADDING - 2];
59 struct guest { struct
[all …]
Dvirtio_ring_0_9.c1 // SPDX-License-Identifier: GPL-2.0-only
29 /* enabling the below activates experimental in-order code
41 struct guest { struct
51 unsigned char reserved[HOST_GUEST_PADDING - 10];
52 } guest; argument
60 unsigned char reserved[HOST_GUEST_PADDING - 4];
78 guest.avail_idx = 0; in alloc_ring()
79 guest.kicked_avail_idx = -1; in alloc_ring()
80 guest.last_used_idx = 0; in alloc_ring()
83 guest.free_head = 0; in alloc_ring()
[all …]
/kernel/linux/linux-6.6/Documentation/virt/hyperv/
Dvmbus.rst1 .. SPDX-License-Identifier: GPL-2.0
5 VMbus is a software construct provided by Hyper-V to guest VMs. It
7 devices that Hyper-V presents to guest VMs. The control path is
8 used to offer synthetic devices to the guest VM and, in some cases,
10 channels for communicating between the device driver in the guest VM
11 and the synthetic device implementation that is part of Hyper-V, and
12 signaling primitives to allow Hyper-V and the guest to interrupt
16 entry in a running Linux guest. The VMbus driver (drivers/hv/vmbus_drv.c)
17 establishes the VMbus control path with the Hyper-V host, then
21 Most synthetic devices offered by Hyper-V have a corresponding Linux
[all …]
/kernel/linux/linux-6.6/arch/arm64/kvm/hyp/
Dentry.S1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Copyright (C) 2015 - ARM Ltd
26 // x1-x17: clobbered by macros
27 // x29: guest context
39 // defer the guest entry. The DSB isn't necessary before v8.2 as any
64 // ptrauth_switch_to_guest(guest cxt, tmp1, tmp2, tmp3)
65 // The below macro to restore guest keys is not implemented in C code
70 // Restore the guest's sp_el0
73 // Restore guest regs x0-x17
84 // Restore guest regs x18-x29, lr
[all …]
/kernel/linux/linux-6.6/Documentation/virt/
Dguest-halt-polling.rst2 Guest halt polling
6 the guest vcpus to poll for a specified amount of time before
9 This provides the following benefits to host side polling:
15 2) The VM-exit cost can be avoided.
17 The downside of guest side polling is that polling is performed
25 ("per-cpu guest_halt_poll_ns"), which is adjusted by the algorithm
42 Division factor used to shrink per-cpu guest_halt_poll_ns when
49 Multiplication factor used to grow per-cpu guest_halt_poll_ns
50 when event occurs after per-cpu guest_halt_poll_ns
57 The per-cpu guest_halt_poll_ns eventually reaches zero
[all …]
/kernel/linux/linux-5.10/Documentation/virt/
Dguest-halt-polling.rst2 Guest halt polling
6 the guest vcpus to poll for a specified amount of time before
9 This provides the following benefits to host side polling:
15 2) The VM-exit cost can be avoided.
17 The downside of guest side polling is that polling is performed
25 ("per-cpu guest_halt_poll_ns"), which is adjusted by the algorithm
42 Division factor used to shrink per-cpu guest_halt_poll_ns when
49 Multiplication factor used to grow per-cpu guest_halt_poll_ns
50 when event occurs after per-cpu guest_halt_poll_ns
57 The per-cpu guest_halt_poll_ns eventually reaches zero
[all …]
/kernel/linux/linux-6.6/arch/x86/boot/compressed/
Dsev.c1 // SPDX-License-Identifier: GPL-2.0
10 * headers in the pre-decompression code in a way that does not break
19 #include <asm/msr-index.h>
32 * Copy a version of this function here - insn-eval.c can't be used in
33 * pre-decompression code.
51 * Only a dummy for insn_get_seg_base() - Early boot-code is 64bit only and
81 memcpy(buffer, (unsigned char *)ctxt->regs->ip, MAX_INSN_SIZE); in vc_decode_insn()
83 ret = insn_decode(&ctxt->insn, buffer, MAX_INSN_SIZE, INSN_MODE_64); in vc_decode_insn()
129 #include "../../kernel/sev-shared.c"
144 * If private -> shared then invalidate the page before requesting the in __page_state_change()
[all …]
/kernel/linux/linux-6.6/drivers/gpu/drm/vmwgfx/device_include/
Dvm_basic_types.h1 /* SPDX-License-Identifier: GPL-2.0 OR MIT */
3 * Copyright 2015-2021 VMware, Inc.
62 * MKS Guest Stats types
116 * communicate guest stats back to the host code. The guest must
124 * beginning of these sections allowing the host side code to correctly
127 * Because the host side code never acknowledges anything back to the
128 * guest there is no strict requirement to maintain compatability
130 * able to log stats, but the guest will continue to run normally.
/kernel/linux/linux-5.10/kernel/
Dcontext_tracking.c1 // SPDX-License-Identifier: GPL-2.0-only
13 * Many thanks to Gilad Ben-Yossef, Paul McKenney, Ingo Molnar, Andrew Morton,
54 * context_tracking_enter - Inform the context tracking that the CPU is going
55 * enter user or guest space mode.
58 * to user or guest space, when it's guaranteed the remaining kernel
59 * instructions to execute won't use any RCU read side critical section
65 WARN_ON_ONCE(!current->mm); in __context_tracking_enter()
75 * any RCU read-side critical section until the next call to in __context_tracking_enter()
135 * context_tracking_exit - Inform the context tracking that the CPU is
136 * exiting user or guest mode and entering the kernel.
[all …]
/kernel/linux/linux-6.6/kernel/
Dcontext_tracking.c1 // SPDX-License-Identifier: GPL-2.0-only
4 * userspace, guest or idle.
7 * runs in idle, userspace or guest mode.
9 * User/guest tracking started by Frederic Weisbecker:
13 * Many thanks to Gilad Ben-Yossef, Paul McKenney, Ingo Molnar, Andrew Morton,
41 /* Record the current task on dyntick-idle entry. */
45 WRITE_ONCE(current->rcu_tasks_idle_cpu, smp_processor_id()); in rcu_dynticks_task_enter()
49 /* Record no current task on dyntick-idle exit. */
53 WRITE_ONCE(current->rcu_tasks_idle_cpu, -1); in rcu_dynticks_task_exit()
62 current->trc_reader_special.b.need_mb = true; in rcu_dynticks_task_trace_enter()
[all …]
/kernel/linux/linux-5.10/Documentation/networking/device_drivers/ethernet/microsoft/
Dnetvsc.rst1 .. SPDX-License-Identifier: GPL-2.0
4 Hyper-V network driver
17 ----------------
19 Hyper-V host version does. Windows Server 2016 and Azure
23 Receive Side Scaling
24 --------------------
25 Hyper-V supports receive side scaling. For TCP & UDP, packets can
41 ethtool -N eth0 rx-flow-hash udp4 sdfn
45 ethtool -N eth0 rx-flow-hash udp4 sd
49 ethtool -n eth0 rx-flow-hash udp4
[all …]
/kernel/linux/linux-5.10/drivers/gpu/drm/i915/gvt/
Dmpt.h2 * Copyright(c) 2011-2016 Intel Corporation. All rights reserved.
37 * DOC: Hypervisor Service APIs for GVT-g Core Logic
39 * This is the glue layer between specific hypervisor MPT modules and GVT-g core
42 * GVT-g core logic will call these APIs to request specific services from
47 * intel_gvt_hypervisor_host_init - init GVT-g host side
55 if (!intel_gvt_host.mpt->host_init) in intel_gvt_hypervisor_host_init()
56 return -ENODEV; in intel_gvt_hypervisor_host_init()
58 return intel_gvt_host.mpt->host_init(dev, gvt, ops); in intel_gvt_hypervisor_host_init()
62 * intel_gvt_hypervisor_host_exit - exit GVT-g host side
67 if (!intel_gvt_host.mpt->host_exit) in intel_gvt_hypervisor_host_exit()
[all …]

12345678910>>...13