/drivers/misc/cxl/ |
D | of.c | 88 afu->guest->handle = addr; in read_phys_addr() 91 afu->guest->p2n_phys += addr; in read_phys_addr() 92 afu->guest->p2n_size = size; in read_phys_addr() 133 if (read_handle(afu_np, &afu->guest->handle)) in cxl_of_read_afu_handle() 135 pr_devel("AFU handle: 0x%.16llx\n", afu->guest->handle); in cxl_of_read_afu_handle() 190 read_prop_dword(np, "ibm,max-ints-per-process", &afu->guest->max_ints); in cxl_of_read_afu_properties() 191 afu->irqs_max = afu->guest->max_ints; in cxl_of_read_afu_properties() 269 pr_devel("AFU handle: %#llx\n", afu->guest->handle); in cxl_of_read_afu_properties() 271 afu->guest->p2n_phys, afu->guest->p2n_size); in cxl_of_read_afu_properties() 301 adapter->guest->irq_avail = kcalloc(nranges, sizeof(struct irq_avail), in read_adapter_irq_config() [all …]
|
D | guest.c | 111 rc = cxl_h_collect_vpd_adapter(adapter->guest->handle, in guest_collect_vpd() 114 rc = cxl_h_collect_vpd(afu->guest->handle, 0, in guest_collect_vpd() 152 return cxl_h_collect_int_info(ctx->afu->guest->handle, ctx->process_token, info); in guest_get_irq_info() 180 rc = cxl_h_read_error_state(afu->guest->handle, &state); in afu_read_error_state() 197 rc = cxl_h_get_fn_error_interrupt(afu->guest->handle, &serr); in guest_slice_irq_err() 208 rc = cxl_h_ack_fn_error_interrupt(afu->guest->handle, serr); in guest_slice_irq_err() 222 for (i = 0; i < adapter->guest->irq_nranges; i++) { in irq_alloc_range() 223 cur = &adapter->guest->irq_avail[i]; in irq_alloc_range() 246 for (i = 0; i < adapter->guest->irq_nranges; i++) { in irq_free_range() 247 cur = &adapter->guest->irq_avail[i]; in irq_free_range() [all …]
|
D | flash.c | 190 unwa->unit_address = cpu_to_be64(adapter->guest->handle); in update_devicetree() 244 header->vendor = cpu_to_be16(adapter->guest->vendor); in handle_image() 245 header->device = cpu_to_be16(adapter->guest->device); in handle_image() 246 header->subsystem_vendor = cpu_to_be16(adapter->guest->subsystem_vendor); in handle_image() 247 header->subsystem = cpu_to_be16(adapter->guest->subsystem); in handle_image() 311 rc = fct(adapter->guest->handle, virt_to_phys(le), entries, in handle_image() 334 cxl_h_reset_adapter(adapter->guest->handle); in transfer_image() 343 cxl_h_reset_adapter(adapter->guest->handle); in transfer_image() 352 cxl_h_reset_adapter(adapter->guest->handle); in transfer_image() 500 cxl_h_reset_adapter(adapter->guest->handle); in device_close() [all …]
|
D | Makefile | 8 cxl-$(CONFIG_PPC_PSERIES) += flash.o guest.o of.o hcalls.o
|
/drivers/staging/unisys/Documentation/ |
D | overview.txt | 10 allow guest partitions on the same server to share devices that would 20 driver set are commonly referred to as "guest drivers" or "client drivers". 22 Linux guest environment (e.g., block, network, or input), and are collectively 27 with each guest partition sharing that device through an area of shared memory 32 Each virtual device requires exactly 1 dedicated channel, which the guest 40 because this requires no specific support in the guest partitions, it will 45 guest, the already-existing efifb Linux driver is used to provide guest 47 provide a guest graphics console are for keyboard and mouse (via visorinput). 86 special control channel called the "controlvm channel" (each guest partition 197 clientpartition handle identifying the guest (client) side [all …]
|
/drivers/staging/unisys/Documentation/ABI/ |
D | sysfs-platform-visorchipset | 29 the previous guest boot) has no effect. 37 this guest. Setting the flag will cause the guest to boot from 48 action to perform on the next guest boot-up. The meaning of the 50 commission the guest. 58 guest, and triggered by a udev event. The support script is 60 PF device is being recovered in another guest. 77 guest, and triggered by a udev event. The support script is 79 PF device is being recovered in another guest.
|
/drivers/gpu/drm/xen/ |
D | Kconfig | 6 tristate "Para-virtualized frontend driver for Xen guest OS" 15 frontend DRM/KMS driver for Xen guest OSes.
|
/drivers/visorbus/ |
D | Kconfig | 14 discover devices on an s-Par guest, and must be present for any other 15 s-Par guest driver to function correctly.
|
/drivers/staging/media/zoran/ |
D | zoran_device.h | 20 extern int post_office_write(struct zoran *zr, unsigned int guest, unsigned int reg, unsigned int v… 21 extern int post_office_read(struct zoran *zr, unsigned int guest, unsigned int reg);
|
D | zoran_device.c | 125 int post_office_write(struct zoran *zr, unsigned int guest, in post_office_write() argument 131 ZR36057_POR_PO_DIR | ZR36057_POR_PO_TIME | ((guest & 7) << 20) | in post_office_write() 138 int post_office_read(struct zoran *zr, unsigned int guest, unsigned int reg) in post_office_read() argument 142 por = ZR36057_POR_PO_TIME | ((guest & 7) << 20) | ((reg & 7) << 16); in post_office_read()
|
/drivers/misc/pvpanic/ |
D | Kconfig | 13 a virtual machine (guest) communicate panic events to the host. 27 forwards the panic events from the guest to the host.
|
/drivers/vhost/ |
D | Kconfig | 35 guest networking with virtio_net. Not to be confused with virtio_net 36 module itself which needs to be loaded in guest kernel. 72 guest virtio devices with the vDPA-based backends.
|
/drivers/xen/ |
D | Kconfig | 54 int "Hotplugged memory limit (in GiB) for a PV guest" 59 Maxmium amount of memory (in GiB) that a PV guest can be 62 A PV guest can have more memory than this limit if is 196 devices to appear in the guest. You can choose the default (0) where 299 bool "Use unpopulated memory ranges for guest mappings" 303 Use unpopulated memory ranges in order to create mappings for guest
|
/drivers/misc/vmw_vmci/ |
D | Kconfig | 11 high-speed communication between host and guest in a virtual
|
/drivers/staging/unisys/visorinput/ |
D | Kconfig | 13 GOP protocol, so If this driver is not present, the Linux guest should
|
/drivers/net/ethernet/sun/ |
D | Kconfig | 97 guest domain network interconnectivity or guest domain
|
/drivers/hv/ |
D | Kconfig | 3 menu "Microsoft Hyper-V guest support"
|
/drivers/s390/net/ |
D | Kconfig | 39 running on the other VM guest. To compile as a module, choose M. 48 from other VM guest systems.
|
/drivers/gpu/drm/i915/gvt/ |
D | gtt.c | 554 bool guest) in _ppgtt_get_root_entry() argument 561 pte_ops->get_entry(guest ? mm->ppgtt_mm.guest_pdps : in _ppgtt_get_root_entry() 581 bool guest) in _ppgtt_set_root_entry() argument 585 pte_ops->set_entry(guest ? mm->ppgtt_mm.guest_pdps : in _ppgtt_set_root_entry() 655 bool guest) in ppgtt_spt_get_entry() argument 666 ret = ops->get_entry(page_table, e, index, guest, in ppgtt_spt_get_entry() 672 update_entry_type_for_real(ops, e, guest ? in ppgtt_spt_get_entry() 684 bool guest) in ppgtt_spt_set_entry() argument 695 return ops->set_entry(page_table, e, index, guest, in ppgtt_spt_set_entry() 2076 struct intel_gvt_gtt_entry *e, unsigned long index, bool guest) in ppgtt_get_next_level_entry() argument [all …]
|
/drivers/dma/qcom/ |
D | Kconfig | 43 the guest OS would run QCOM_HIDMA channel driver and the
|
/drivers/cpuidle/ |
D | Kconfig | 71 before halting in the guest (more efficient than polling in the
|
/drivers/dma-buf/ |
D | Kconfig | 40 Qemu can use this to create host dmabufs for guest framebuffers.
|
/drivers/misc/ |
D | Kconfig | 373 by reserving them in the guest and invalidating them in the 376 to allow the guest to use more physical memory. 497 When this driver is bound inside a KVM guest, it will 504 If you do not intend to run this kernel as a guest, say N.
|
/drivers/input/rmi4/ |
D | Kconfig | 52 Function 03 provides PS2 guest support for RMI4 devices. This
|
/drivers/gpu/drm/vmwgfx/ |
D | vmwgfx_stdu.c | 512 vmw_bo_get_guest_ptr(&ddirty->buf->base, &cmd->body.guest.ptr); in vmw_stdu_bo_fifo_commit() 513 cmd->body.guest.pitch = ddirty->pitch; in vmw_stdu_bo_fifo_commit() 1206 vmw_bo_get_guest_ptr(&vfbbo->buffer->base, &cmd_dma->body.guest.ptr); in vmw_stdu_bo_populate_dma() 1207 cmd_dma->body.guest.pitch = update->vfb->base.pitches[0]; in vmw_stdu_bo_populate_dma()
|