Lines Matching refs:hypercalls
974 automatically; hypercalls will be intercepted and passed to userspace
5587 hypercalls and exit with this exit struct that contains all the guest gprs.
5609 The possible hypercalls are defined in the Power Architecture Platform
5922 This capability enables interception of OSI hypercalls that otherwise would
5923 be treated as normal system calls to be injected into the guest. OSI hypercalls
5938 This capability enables interception of PAPR hypercalls. PAPR hypercalls are
6177 This capability controls whether individual sPAPR hypercalls (hcalls)
6956 hypercalls:
6981 hypercalls:
6991 hypercalls are handled by Level 0 hypervisor (Hyper-V) bypassing KVM.
6995 flush hypercalls by Hyper-V) so userspace should disable KVM identification
6997 thinks it's running on Hyper-V and only use Hyper-V hypercalls.
7192 and also enable interception of guest hypercalls with KVM_EXIT_XEN.
7211 This capability means the kernel is capable of handling hypercalls
7214 User space should expect that its handlers for these hypercalls
7223 The hypercalls mentioned above may or may not be processed successfully
7258 with KVM_EXIT_HYPERCALL exit reason to process some hypercalls.
7261 of hypercalls that can be configured to exit to userspace.
7266 the hypercalls whose corresponding bit is in the argument, and return