Lines Matching full:eoi
370 * which doesn't have EOI register; Some buggy OSes (e.g. Windows with in kvm_apic_set_version()
371 * Hyper-V role) disable EOI broadcast in lapic not checking for IOAPIC in kvm_apic_set_version()
673 printk(KERN_WARNING "Can't read EOI MSR value: 0x%llx\n", in pv_eoi_get_pending()
683 printk(KERN_WARNING "Can't set EOI MSR value: 0x%llx\n", in pv_eoi_set_pending()
693 printk(KERN_WARNING "Can't clear EOI MSR value: 0x%llx\n", in pv_eoi_clr_pending()
1213 /* Eoi the ioapic only if the ioapic doesn't own the vector. */ in kvm_ioapic_send_eoi()
1239 * Not every write EOI will has corresponding ISR, in apic_set_eoi()
2517 * For auto-EOI interrupts, there might be another pending in kvm_get_apic_interrupt()
2635 * Detect whether guest triggered PV EOI since the
2636 * last entry. If yes, set EOI on guests's behalf.
2637 * Clear PV EOI in guest memory in any case.
2645 * PV EOI state is derived from KVM_APIC_PV_EOI_PENDING in host in apic_sync_pv_eoi_from_guest()
2649 * -> host disabled PV EOI. in apic_sync_pv_eoi_from_guest()
2651 * -> host enabled PV EOI, guest did not execute EOI yet. in apic_sync_pv_eoi_from_guest()
2653 * -> host enabled PV EOI, guest executed EOI. in apic_sync_pv_eoi_from_guest()
2660 * this makes sure pv eoi is only enabled when we know it's safe. in apic_sync_pv_eoi_from_guest()
2689 * Detect whether it's safe to enable PV EOI and
2700 /* Need EOI to update ioapic. */ in apic_sync_pv_eoi_to_guest()
2703 * PV EOI was disabled by apic_sync_pv_eoi_from_guest in apic_sync_pv_eoi_to_guest()