Searched +full:guest +full:- +full:index +full:- +full:bits (Results 1 – 24 of 24) sorted by relevance
| /Documentation/devicetree/bindings/interrupt-controller/ |
| D | riscv,imsics.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/interrupt-controller/riscv,imsics.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: RISC-V Incoming MSI Controller (IMSIC) 10 - Anup Patel <anup@brainfault.org> 13 The RISC-V advanced interrupt architecture (AIA) defines a per-CPU incoming 14 MSI controller (IMSIC) for handling MSIs in a RISC-V platform. The RISC-V 15 AIA specification can be found at https://github.com/riscv/riscv-aia. 17 The IMSIC is a per-CPU (or per-HART) device with separate interrupt file [all …]
|
| /Documentation/virt/kvm/devices/ |
| D | arm-vgic-v3.rst | 1 .. SPDX-License-Identifier: GPL-2.0 9 - KVM_DEV_TYPE_ARM_VGIC_V3 ARM Generic Interrupt Controller v3.0 12 will act as the VM interrupt controller, requiring emulated user-space devices 16 Creating a guest GICv3 device requires a host GICv3 as well. 23 KVM_VGIC_V3_ADDR_TYPE_DIST (rw, 64-bit) 24 Base address in the guest physical address space of the GICv3 distributor 28 KVM_VGIC_V3_ADDR_TYPE_REDIST (rw, 64-bit) 29 Base address in the guest physical address space of the GICv3 35 KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION (rw, 64-bit) 38 bits: | 63 .... 52 | 51 .... 16 | 15 - 12 |11 - 0 [all …]
|
| D | xive.rst | 1 .. SPDX-License-Identifier: GPL-2.0 8 - KVM_DEV_TYPE_XIVE POWER9 XIVE Interrupt Controller generation 1 14 Only one XIVE instance may be instantiated. A guest XIVE device 15 requires a POWER9 host and the guest OS should have support for the 23 guest in VMAs populated with a custom VM fault handler. 32 - Interrupt Pending Buffer (IPB) 33 - Current Processor Priority (CPPR) 34 - Notification Source Register (NSR) 40 guest. 49 3. Device pass-through [all …]
|
| D | arm-vgic.rst | 1 .. SPDX-License-Identifier: GPL-2.0 9 - KVM_DEV_TYPE_ARM_VGIC_V2 ARM Generic Interrupt Controller v2.0 13 controller, requiring emulated user-space devices to inject interrupts to the 17 guest GICv2 through this interface. For information on creating a guest GICv3 18 device and guest ITS devices, see arm-vgic-v3.txt. It is not possible to 26 KVM_VGIC_V2_ADDR_TYPE_DIST (rw, 64-bit) 27 Base address in the guest physical address space of the GIC distributor 31 KVM_VGIC_V2_ADDR_TYPE_CPU (rw, 64-bit) 32 Base address in the guest physical address space of the GIC virtual cpu 39 -E2BIG Address outside of addressable IPA range [all …]
|
| /Documentation/arch/sparc/oradax/ |
| D | dax-hv-api.txt | 3 Publication date 2017-09-25 08:21 5 Extracted via "pdftotext -f 547 -l 572 -layout sun4v_20170925.pdf" 16 live-migration and other system management activities. 20 …high speed processoring of database-centric operations. The coprocessors may support one or more of 28 …e Completion Area and, unless execution order is specifically restricted through the use of serial- 32 …Guest software may implement a software timeout on CCB operations, and if the timeout is exceeded,… 33 …tion may be cancelled or killed via the ccb_kill API function. It is recommended for guest software 38 …There is no fixed limit on the number of outstanding CCBs guest software may have queued in the vi… 45 …device node in the guest MD (Section 8.24.17, “Database Analytics Accelerators (DAX) virtual-device 51 36.1.1.1. "ORCL,sun4v-dax" Device Compatibility [all …]
|
| D | oracle-dax.rst | 25 the accompanying document, dax-hv-api.txt, which is a plain text 27 Specification" version 3.0.20+15, dated 2017-09-25. 86 made accessible via mmap(), and are read-only for the application. 109 equal to the number of bytes given in the call. Otherwise -1 is 113 ----------- 122 -------- 129 -------- 138 --------------------------------------------- 141 submit operation. The file offset is treated as the index of the 143 pwrite() system call. If -1 is returned then errno is set to indicate [all …]
|
| /Documentation/arch/powerpc/ |
| D | papr_hcalls.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 Hypercall Op-codes (hcalls) 10 Virtualization on 64-bit Power Book3S Platforms is based on the PAPR 11 specification [1]_ which describes the run-time environment for a guest 15 - **IBM PowerVM (PHYP)**: IBM's proprietary hypervisor that supports AIX, 16 IBM-i and Linux as supported guests (termed as Logical Partitions 19 - **Qemu/KVM**: Supports PPC64 linux guests running on a PPC64 linux host. 22 On PPC64 arch a guest kernel running on top of a PAPR hypervisor is called 23 a *pSeries guest*. A pseries guest runs in a supervisor mode (HV=0) and must 28 Hence a Hypercall (hcall) is essentially a request by the pseries guest [all …]
|
| D | kvm-nested.rst | 1 .. SPDX-License-Identifier: GPL-2.0 10 This document explains how a guest operating system can act as a 15 guest virtual machine that is directly run under L0 and is initiated 16 and controlled by L0. L2 is a guest virtual machine that is initiated 36 KVM: PPC: Book3S HV: Nested guest entry via hypercall 44 vCPU (except in the short sequence in the L0 on L1 -> L2 entry and L2 45 -> L1 exit). 74 - L1 and L0 negotiate capabilities with H_GUEST_{G,S}ET_CAPABILITIES() 77 - L1 requests the L0 create an L2 with H_GUEST_CREATE() and receives a token 79 - L1 requests the L0 create an L2 vCPU with H_GUEST_CREATE_VCPU() [all …]
|
| /Documentation/arch/arm64/ |
| D | perf.rst | 1 .. SPDX-License-Identifier: GPL-2.0 13 :Date: 2019-03-06 16 ------------ 24 -------------- 28 The kernel runs at EL2 with VHE and EL1 without. Guest kernels always run 34 For the guest this attribute will exclude EL1. Please note that EL2 is 35 never counted within a guest. 39 ---------- 46 For a non-VHE host this attribute will exclude EL2 as we consider the 48 guest/host transitions. [all …]
|
| /Documentation/virt/kvm/ |
| D | api.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 The Definitive KVM (Kernel-based Virtual Machine) API Documentation 13 - System ioctls: These query and set global attributes which affect the 17 - VM ioctls: These query and set attributes that affect an entire virtual 24 - vcpu ioctls: These query and set attributes that control the operation 32 - device ioctls: These query and set attributes that control the operation 49 task of actually running guest code. 80 facility that allows backward-compatible extensions to the API to be 104 the ioctl returns -ENOTTY. 122 ----------------------- [all …]
|
| D | locking.rst | 1 .. SPDX-License-Identifier: GPL-2.0 8 --------------------- 12 - cpus_read_lock() is taken outside kvm_lock 14 - kvm_usage_lock is taken outside cpus_read_lock() 16 - kvm->lock is taken outside vcpu->mutex 18 - kvm->lock is taken outside kvm->slots_lock and kvm->irq_lock 20 - kvm->slots_lock is taken outside kvm->irq_lock, though acquiring 23 - kvm->mn_active_invalidate_count ensures that pairs of 25 use the same memslots array. kvm->slots_lock and kvm->slots_arch_lock 27 must not take either kvm->slots_lock or kvm->slots_arch_lock. [all …]
|
| /Documentation/arch/s390/ |
| D | vfio-ap.rst | 13 The AP adapter cards are exposed via the AP bus. The motivation for vfio-ap 45 sub-directory:: 75 /sys/bus/ap/ap_control_domain_mask. The bits in the mask, from most to least 76 significant bit, correspond to domains 0-255. 82 comprised of an AP adapter ID (APID) and an AP queue index (APQI). The 111 * NQAP: to enqueue an AP command-request message to a queue 112 * DQAP: to dequeue an AP command-reply message from a queue 122 Let's now take a look at how AP instructions executed on a guest are interpreted 128 control domains assigned to the KVM guest: 131 to the KVM guest. Each bit in the mask, from left to right, corresponds to [all …]
|
| /Documentation/virt/kvm/x86/ |
| D | timekeeping.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 Timekeeping Virtualization for X86-Based Architectures 24 division of time beyond the control of the guest CPU. 32 information relevant to KVM and hardware-based virtualization. 41 2.1. i8254 - PIT 42 ---------------- 46 channels which can be programmed to deliver periodic or one-shot interrupts. 53 The PIT uses I/O ports 0x40 - 0x43. Access to the 16-bit counters is done 59 -------------- ---------------- 61 | 1.1932 MHz|---------->| CLOCK OUT | ---------> IRQ 0 [all …]
|
| /Documentation/core-api/ |
| D | swiotlb.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 These APIs use the device DMA attributes and kernel-wide settings to determine 30 --------------- 33 only provide 32-bit DMA addresses. By allocating bounce buffer memory below 37 More recently, Confidential Computing (CoCo) VMs have the guest VM's memory 39 and VMM. For the host to do I/O on behalf of the guest, the I/O must be 40 directed to guest memory that is unencrypted. CoCo VMs set a kernel-wide option 54 IOMMU access control is per-granule, the untrusted device can gain access to 60 ------------------ 85 ------------------------------ [all …]
|
| /Documentation/ABI/testing/ |
| D | sysfs-devices-system-cpu | 2 Date: pre-git history 3 Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org> 18 Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org> 22 kernel_max: the maximum cpu index allowed by the kernel 37 See Documentation/admin-guide/cputopology.rst for more information. 43 Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org> 58 Contact: Linux memory management mailing list <linux-mm@kvack.org> 67 /sys/devices/system/cpu/cpu42/node2 -> ../../node/node2 77 Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org> 89 core_siblings_list: human-readable list of the logical CPU [all …]
|
| /Documentation/driver-api/ |
| D | vfio.rst | 2 VFIO - "Virtual Function I/O" [1]_ 7 allotted. This includes x86 hardware with AMD-Vi and Intel VT-d, 12 safe [2]_, non-privileged, userspace drivers. 19 bare-metal device drivers [3]_. 22 field, also benefit from low-overhead, direct device access from 23 userspace. Examples include network adapters (often non-TCP/IP based) 36 --------------------------- 42 as allowing a device read-write access to system memory imposes the 55 For instance, an individual device may be part of a larger multi- 59 could be anything from a multi-function PCI device with backdoors [all …]
|
| /Documentation/ABI/stable/ |
| D | sysfs-class-infiniband | 2 ------------------------------------------------- 9 Contact: linux-rdma@vger.kernel.org 24 Contact: linux-rdma@vger.kernel.org 34 Contact: linux-rdma@vger.kernel.org 39 What: /sys/class/infiniband/<device>/ports/<port-num>/lid 40 What: /sys/class/infiniband/<device>/ports/<port-num>/rate 41 What: /sys/class/infiniband/<device>/ports/<port-num>/lid_mask_count 42 What: /sys/class/infiniband/<device>/ports/<port-num>/sm_sl 43 What: /sys/class/infiniband/<device>/ports/<port-num>/sm_lid 44 What: /sys/class/infiniband/<device>/ports/<port-num>/state [all …]
|
| /Documentation/gpu/ |
| D | drm-uapi.rst | 9 addition, drivers export device-specific interfaces for use by userspace 10 drivers & device-aware applications through ioctls and sysfs files. 16 Cover generic ioctls and sysfs layout here. We only need high-level 22 .. kernel-doc:: drivers/gpu/drm/drm_ioctl.c 31 .. kernel-doc:: drivers/gpu/drm/drm_auth.c 34 .. kernel-doc:: drivers/gpu/drm/drm_auth.c 37 .. kernel-doc:: include/drm/drm_auth.h 46 .. kernel-doc:: drivers/gpu/drm/drm_lease.c 49 Open-Source Userspace Requirements 57 open-sourced userspace patches, and those patches must be reviewed and ready for [all …]
|
| /Documentation/admin-guide/cifs/ |
| D | usage.rst | 18 MS-SMB2 (for detailed SMB2/SMB3/SMB3.1.1 protocol specification) 27 See the project page at: https://wiki.samba.org/index.php/LinuxCIFS_utils 36 (e.g. /usr/src/linux-2.5.73) 48 the modules directory e.g. /lib/modules/6.3.0-060300-generic/kernel/fs/smb/client/cifs.ko). 57 required, mount.cifs is recommended. Most distros include a ``cifs-utils`` 63 found at cifs-utils.git on git.samba.org 122 mounts, unless umount is invoked with -i (which will avoid invoking a umount 166 disabled on a per-mount basis by specifying ``nouser_xattr`` on mount. 184 (the few optional settings are passed in on mount via -o parameters instead). 191 ln -s /mnt/foo bar [all …]
|
| /Documentation/admin-guide/ |
| D | kernel-parameters.txt | 16 force -- enable ACPI if default was off 17 on -- enable ACPI but allow fallback to DT [arm64,riscv64] 18 off -- disable ACPI if default was on 19 noirq -- do not use ACPI for IRQ routing 20 strict -- Be less tolerant of platforms that are not 22 rsdt -- prefer RSDT over (default) XSDT 23 copy_dsdt -- copy DSDT to memory 24 nospcr -- disable console in ACPI SPCR table as 41 If set to vendor, prefer vendor-specific driver 66 debug output. Bits in debug_layer correspond to a [all …]
|
| /Documentation/sound/ |
| D | alsa-configuration.rst | 2 Advanced Linux Sound Architecture - Driver Configuration guide 38 ---------- 47 limiting card index for auto-loading (1-8); 49 For auto-loading more than one card, specify this option 50 together with snd-card-X aliases. 52 Reserve the slot index for the given driver; 63 Module snd-pcm-oss 64 ------------------ 86 regarding opening the device. When this option is non-zero, 90 Module snd-rawmidi [all …]
|
| /Documentation/filesystems/ |
| D | proc.rst | 1 .. SPDX-License-Identifier: GPL-2.0 24 1.1 Process-Specific Subdirectories 36 3 Per-Process Parameters 37 3.1 /proc/<pid>/oom_adj & /proc/<pid>/oom_score_adj - Adjust the oom-killer 39 3.2 /proc/<pid>/oom_score - Display current oom-killer score 40 3.3 /proc/<pid>/io - Display the IO accounting fields 41 3.4 /proc/<pid>/coredump_filter - Core dump filtering settings 42 3.5 /proc/<pid>/mountinfo - Information about mounts 44 3.7 /proc/<pid>/task/<tid>/children - Information about task children 45 3.8 /proc/<pid>/fdinfo/<fd> - Information about opened file [all …]
|
| /Documentation/admin-guide/sysctl/ |
| D | kernel.rst | 5 .. See scripts/check-sysctl-docs to keep this up to date 13 Documentation/admin-guide/sysctl/index.rst. 15 ------------------------------------------------------------------------------ 39 If BSD-style process accounting is enabled these values control 71 The machine hardware name, the same output as ``uname -m`` 90 shifted left by 4, and OR'd with the low four bits of the bootloader 129 Ctrl-Alt-Delete). Writing a value to this file which doesn't 130 correspond to a running process will result in ``-ESRCH``. 132 See also `ctrl-alt-del`_. 236 ctrl-alt-del [all …]
|
| /Documentation/trace/ |
| D | ftrace.rst | 2 ftrace - Function Tracer 13 - Written for: 2.6.28-rc2 14 - Updated for: 3.10 15 - Updated for: 4.13 - Copyright 2017 VMware Inc. Steven Rostedt 16 - Converted to rst format - Changbin Du <changbin.du@intel.com> 19 ------------ 24 performance issues that take place outside of user-space. 41 ---------------------- 43 See Documentation/trace/ftrace-design.rst for details for arch porters and such. 47 --------------- [all …]
|