Lines Matching refs:hypercalls
991 automatically; hypercalls will be intercepted and passed to userspace
5773 hypercalls and exit with this exit struct that contains all the guest gprs.
5795 The possible hypercalls are defined in the Power Architecture Platform
6127 This capability enables interception of OSI hypercalls that otherwise would
6128 be treated as normal system calls to be injected into the guest. OSI hypercalls
6143 This capability enables interception of PAPR hypercalls. PAPR hypercalls are
6382 This capability controls whether individual sPAPR hypercalls (hcalls)
7175 hypercalls:
7200 hypercalls:
7210 hypercalls are handled by Level 0 hypervisor (Hyper-V) bypassing KVM.
7214 flush hypercalls by Hyper-V) so userspace should disable KVM identification
7216 thinks it's running on Hyper-V and only use Hyper-V hypercalls.
7411 and also enable interception of guest hypercalls with KVM_EXIT_XEN.
7430 This capability means the kernel is capable of handling hypercalls
7433 User space should expect that its handlers for these hypercalls
7442 The hypercalls mentioned above may or may not be processed successfully
7477 with KVM_EXIT_HYPERCALL exit reason to process some hypercalls.
7480 of hypercalls that can be configured to exit to userspace.
7485 the hypercalls whose corresponding bit is in the argument, and return