Lines Matching +full:ext +full:- +full:gen
1 /* SPDX-License-Identifier: GPL-2.0 */
34 * These seem to be used for allocating ->chip in the routing table, which we
36 * need to look at ->chip later on, we'll need to revisit this.
42 /* s390-specific vcpu->requests bit members */
115 * check from host when host is in the machine check's high-level handling.
132 ((sie_block)->sidad & PAGE_MASK)
134 ((((sie_block)->sidad & SIDAD_SIZE_MASK) + 1) * PAGE_SIZE)
557 * Repressible (non-floating) machine check interrupts
610 struct kvm_s390_ext_info ext; member
622 struct kvm_s390_ext_info ext; member
688 * Only the upper 16 bits of kvm_guest_debug->control are arch specific.
695 (vcpu->guest_debug & KVM_GUESTDBG_ENABLE)
697 (vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP)
699 (vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP)
701 (vcpu->guest_debug & KVM_GUESTDBG_EXIT_PENDING))
740 * this way we can have non-blocking reads with consistent values.
741 * Only the owning VCPU thread (vcpu->cpu) is allowed to change these
833 __u8 reserved20[0x0048 - 0x0020]; /* 0x0020 */
895 u8 reserved928[0x1000 - 0x928]; /* 0x0928 */
965 #define KVM_HVA_ERR_BAD (-1UL)
966 #define KVM_HVA_ERR_RO_BAD (-2UL)
1006 static inline void kvm_arch_memslots_updated(struct kvm *kvm, u64 gen) {} in kvm_arch_memslots_updated() argument