Home
last modified time | relevance | path

Searched refs:a (Results 1 – 25 of 506) sorted by relevance

12345678910>>...21

/xen/xen/include/acpi/
A Dacmacros.h57 #define ACPI_MIN(a,b) (((a)<(b))?(a):(b)) argument
58 #define ACPI_MAX(a,b) (((a)>(b))?(a):(b)) argument
355 (a) & 0xFF, ((a) >> 8) & 0xFF, ((a) >> 16) & 0xFF, ((a) >> 24) & 0xFF, \
388 #define ACPI_DISASM_ONLY_MEMBERS(a) a; argument
401 #define ARGI_LIST1(a) (ARG_1(a)) argument
408 #define ARGP_LIST1(a) (ARG_1(a)) argument
521 #define ACPI_DO_WHILE0(a) a argument
597 #define ACPI_DEBUG_EXEC(a) a argument
600 #define ACPI_DEBUG_DEFINE(a) a; argument
601 #define ACPI_DEBUG_ONLY_MEMBERS(a) a; argument
[all …]
/xen/xen/arch/x86/
A Dalternative.c190 struct alt_instr *a, *base; in _apply_alternatives() local
203 for ( a = base = start; a < end; a++ ) in _apply_alternatives()
208 unsigned int total_len = a->orig_len + a->pad_len; in _apply_alternatives()
226 base = a; in _apply_alternatives()
229 if ( a->priv ) in _apply_alternatives()
236 if ( !boot_cpu_has(a->cpuid) ) in _apply_alternatives()
242 a->priv = 1; in _apply_alternatives()
249 text_poke(orig + a->orig_len, buf, a->pad_len); in _apply_alternatives()
274 a->orig_len >= 6 && in _apply_alternatives()
306 a->priv = 1; in _apply_alternatives()
[all …]
/xen/tools/ocaml/xenstored/
A Dtrie.mli18 type ('a, 'b) t
20 Internally, a trie is represented as a labeled tree, where node contains values
26 val mem : ('a,'b) t -> 'a list -> bool
30 val find : ('a, 'b) t -> 'a list -> 'b
34 val set : ('a, 'b) t -> 'a list -> 'b -> ('a, 'b) t
37 val unset : ('a, 'b) t -> 'a list -> ('a, 'b) t
42 val iter : ('a -> 'b option -> unit) -> ('a, 'b) t -> unit
47 val iter_path : ('a -> 'b option -> unit) -> ('a, 'b) t -> 'a list -> unit
51 val fold : ('a -> 'b option -> 'c -> 'c) -> ('a, 'b) t -> 'c -> 'c
54 val map : ('b -> 'c option) -> ('a,'b) t -> ('a,'c) t
[all …]
/xen/xen/common/
A Dlist_sort.c35 while (a && b) { in merge()
37 if ((*cmp)(priv, a, b) <= 0) { in merge()
38 tail->next = a; in merge()
39 a = a->next; in merge()
46 tail->next = a?:b; in merge()
66 while (a && b) { in merge_and_restore_back_links()
68 if ((*cmp)(priv, a, b) <= 0) { in merge_and_restore_back_links()
69 tail->next = a; in merge_and_restore_back_links()
70 a->prev = tail; in merge_and_restore_back_links()
71 a = a->next; in merge_and_restore_back_links()
[all …]
A Dmemory.c116 !guest_handle_subrange_okay(a->extent_list, a->nr_done, in increase_reservation()
123 for ( i = a->nr_done; i < a->nr_extents; i++ ) in increase_reservation()
131 page = alloc_domheap_pages(d, a->extent_order, a->memflags); in increase_reservation()
136 a->extent_order, d->domain_id, a->memflags, in increase_reservation()
153 a->nr_done = i; in increase_reservation()
165 if ( !guest_handle_subrange_okay(a->extent_list, a->nr_done, in populate_physmap()
194 for ( i = a->nr_done; i < a->nr_extents; i++ ) in populate_physmap()
286 a->nr_done = i; in populate_physmap()
425 if ( !guest_handle_subrange_okay(a->extent_list, a->nr_done, in decrease_reservation()
430 for ( i = a->nr_done; i < a->nr_extents; i++ ) in decrease_reservation()
[all …]
/xen/xen/include/efi/
A Defidevp.h44 #define DP_IS_END_TYPE(a) argument
45 #define DP_IS_END_SUBTYPE(a) ( ((a)->SubType == END_ENTIRE_DEVICE_PATH_SUBTYPE ) argument
47 #define DevicePathType(a) ( ((a)->Type) & EFI_DP_TYPE_MASK ) argument
48 #define DevicePathSubType(a) ( (a)->SubType ) argument
49 #define DevicePathNodeLength(a) ( ((a)->Length[0]) | ((a)->Length[1] << 8) ) argument
50 #define NextDevicePathNode(a) ( (EFI_DEVICE_PATH *) ( ((UINT8 *) (a)) + DevicePathNodeLength( argument
52 #define IsDevicePathEndType(a) ( DevicePathType(a) == END_DEVICE_PATH_TYPE ) argument
53 #define IsDevicePathEndSubType(a) ( (a)->SubType == END_ENTIRE_DEVICE_PATH_SUBTYPE ) argument
54 #define IsDevicePathEnd(a) ( IsDevicePathEndType(a) && IsDevicePathEndSubType(a) ) argument
55 #define IsDevicePathUnpacked(a) ( (a)->Type & EFI_DP_TYPE_UNPACKED ) argument
[all …]
/xen/xen/arch/arm/
A Dhvm.c94 struct xen_hvm_param a; in do_hvm_op() local
97 if ( copy_from_guest(&a, arg, 1) ) in do_hvm_op()
100 d = rcu_lock_domain_by_any_id(a.domid); in do_hvm_op()
110 rc = hvm_allow_set_param(d, a.index); in do_hvm_op()
114 d->arch.hvm.params[a.index] = a.value; in do_hvm_op()
118 rc = hvm_allow_get_param(d, a.index); in do_hvm_op()
122 a.value = d->arch.hvm.params[a.index]; in do_hvm_op()
123 rc = copy_to_guest(arg, &a, 1) ? -EFAULT : 0; in do_hvm_op()
/xen/tools/xenstore/
A Dutils.h10 #define streq(a,b) (strcmp((a),(b)) == 0) argument
13 #define strstarts(a,b) (strncmp((a),(b),strlen(b)) == 0) argument
16 static inline bool strends(const char *a, const char *b) in strends() argument
18 if (strlen(a) < strlen(b)) in strends()
21 return streq(a + strlen(a) - strlen(b), b); in strends()
A DCOPYING68 effectively restrict the users of a free program by obtaining a
81 a shared library, the combination of the two is legally speaking a
105 programs enables a greater number of people to use a large body of
138 copyright law: that is to say, a work containing the Library or a
165 You may charge a fee for the physical act of transferring a copy,
174 a) The modified work must itself be a software library.
182 d) If a facility in the modified Library refers to a function or a
232 the Library into a program that is not a library.
249 linked with it, is called a "work that uses the Library". Such a
279 link a "work that uses the Library" with the Library to produce a
[all …]
/xen/tools/ocaml/libs/xl/
A Dxenlight.mli.in41 ?async:'a -> unit -> domid = "stub_libxl_domain_create_restore"
70 user:'a ->
71 fd_register:('a -> Unix.file_descr -> event list -> for_libxl -> 'b) ->
72 fd_modify:('a -> Unix.file_descr -> 'b -> event list -> 'b) ->
73 fd_deregister:('a -> Unix.file_descr -> 'b -> unit) ->
74 timeout_register:('a -> int64 -> int64 -> for_libxl -> 'c) ->
75 timeout_fire_now:('a -> 'c -> 'c) ->
82 async_callback:(result:error option -> user:'a -> unit) ->
88 user:'a ->
89 event_occurs_callback:('a -> Event.t -> unit) ->
[all …]
/xen/tools/include/xen-foreign/
A Dmkchecker.py24 for a in archs:
25 f.write('#include "%s.h"\n' % a);
31 for a in archs:
32 f.write('\tprintf("%%8s", "%s");\n' % a);
38 for a in archs:
39 s = struct + "_" + a;
40 if a in compat_arches:
41 compat = compat_arches[a]
45 f.write('#ifdef %s_has_no_%s\n' % (a, struct));
/xen/tools/libfsimage/zfs/
A Dzfs_fletcher.c67 uint64_t a, b, c, d; in fletcher_4_native() local
69 for (a = b = c = d = 0; ip < ipend; ip++) { in fletcher_4_native()
70 a += ip[0]; in fletcher_4_native()
71 b += a; in fletcher_4_native()
76 ZIO_SET_CHECKSUM(zcp, a, b, c, d); in fletcher_4_native()
84 uint64_t a, b, c, d; in fletcher_4_byteswap() local
86 for (a = b = c = d = 0; ip < ipend; ip++) { in fletcher_4_byteswap()
87 a += BSWAP_32(ip[0]); in fletcher_4_byteswap()
88 b += a; in fletcher_4_byteswap()
93 ZIO_SET_CHECKSUM(zcp, a, b, c, d); in fletcher_4_byteswap()
/xen/xen/include/acpi/platform/
A Daclinux.h82 #define ACPI_ALLOCATE(a) acpi_os_alloc_memory(a) argument
83 #define ACPI_ALLOCATE_ZEROED(a) acpi_os_zalloc_memory(a) argument
84 #define ACPI_FREE(a) acpi_os_free_memory(a) argument
/xen/xen/include/asm-x86/
A Ddesc.h112 uint32_t a, b; member
118 uint64_t a, b; member
143 gate->a = new->a; in _write_gate_lower()
148 (gate_addr)->a = 0; \
153 (gate_addr)->a = \
167 idte.a = in _set_gate_lower()
182 idte.a = gate->a; in _update_gate_addr_lower()
185 idte.a &= 0x0000FFFFFFFF0000ULL; in _update_gate_addr_lower()
186 idte.a |= (((unsigned long)(addr) & 0xFFFF0000UL) << 32) | in _update_gate_addr_lower()
196 (desc)[0].a = \
[all …]
/xen/docs/features/
A Dlivepatch.pandoc31 declare live patching as a 'Supported' feature on x86.
40 guests and it shall be treated as a security issue if this is not
47 functions are patched), it shall be treated as a security issue.
67 because the it can only be triggered by a privileged domain.
69 6) Bugs which allow a guest to prevent the application of a livepatch:
70 A guest should not be able to prevent the application of a live
72 of a live patch despite pausing it (xl pause ...), it shall be
73 treated as a security issue.
85 There is a caveat -- an incorrect live patch can introduce a guest->host
98 There is a caveat -- an incorrect live patch can introduce an
[all …]
/xen/tools/ocaml/
A DLICENSE4 As a special exception to the GNU Lesser General Public License, you
5 may link, statically or dynamically, a "work that uses the Library"
6 with a publicly distributed version of the Library to produce an
11 we mean either the unmodified Library as distributed, or a
48a constant threat to the existence of any free program. We wish to make sure that a company cannot…
78 You may charge a fee for the physical act of transferring a copy, and you may at your option offer …
83 a) The modified work must itself be a software library.
99 … useful when you wish to copy part of the code of the Library into a program that is not a library.
122 …the work with a written offer, valid for at least three years, to give the same user the materials…
124 … Verify that the user has already received a copy of these materials or that you have already sent…
[all …]
/xen/docs/specs/
A Dlibxl-migration-stream.pandoc35 This design addresses the above points, allowing for a completely
44 included in a future draft.
98 A record has a record header, type specific data and a trailing footer. If
284 a. Suspend primary vm
288 a. Read *CHECKPOINT_SVM_READY* from secondary
291 4. Wait a new checkpoint
292 a. Send *CHECKPOINT_NEW* to secondary
297 a. Send *CHECKPOINT_SVM_READY* to primary
300 2. Wait a new checkpoint
301 a. Read *CHECKPOINT_NEW* from primary
[all …]
/xen/docs/man/
A Dxen-vtpm.7.pod18 The goal of this work is to provide a TPM functionality to a virtual guest
19 operating system (a DomU). This allows programs to interact with a TPM in a
93 A mini-os stub domain that implements a vTPM. There is a
103 implement a mini-os domain that wishes to use a vTPM of
156 a later time. If a vTPM gets an error when loading its key, it will currently
157 generate a fresh vTPM image (with a new EK, SRK, and blank NVRAM).
181 virtual machine and requires a config file. The manager requires a disk image
234 While attaching a vTPM after a guest is booted (using xl vtpm-attach) is
238 configuration. Attaching a vTPM to a running domain should only be used for
286 log). Guests wishing to use a custom kernel in such a secure environment are
[all …]
A Dxen-tscmode.7.pod131 sometimes used as a random number or a unique sequence identifier,
140 apps were ported from a uniprocessor to an SMP environment; as a result,
175 synchronize TSC across a data center or even a pool of machines. As
176 a result, when run in a virtualized environment, rare and obscure
179 example, a 3GHz
192 To provide a "safe" TSC, i.e. to ensure both TSC monotonicity and a
240 can be used as a system "clocksource".
246 across all the machines in a pool or data center, a migration may "break"
261 ("pvcpuid") and also trap to Xen. But apps in a PV guest that use a
262 cpuid instruction execute it directly, without a trap to Xen. As a result,
[all …]
/xen/tools/xenstat/libxenstat/
A DCOPYING63 effectively restrict the users of a free program by obtaining a
76 a shared library, the combination of the two is legally speaking a
100 programs enables a greater number of people to use a large body of
133 copyright law: that is to say, a work containing the Library or a
160 You may charge a fee for the physical act of transferring a copy,
169 a) The modified work must itself be a software library.
177 d) If a facility in the modified Library refers to a function or a
227 the Library into a program that is not a library.
244 linked with it, is called a "work that uses the Library". Such a
274 link a "work that uses the Library" with the Library to produce a
[all …]
/xen/tools/firmware/vgabios/
A DCOPYING61 effectively restrict the users of a free program by obtaining a
74 a shared library, the combination of the two is legally speaking a
98 programs enables a greater number of people to use a large body of
131 copyright law: that is to say, a work containing the Library or a
158 You may charge a fee for the physical act of transferring a copy,
167 a) The modified work must itself be a software library.
175 d) If a facility in the modified Library refers to a function or a
225 the Library into a program that is not a library.
242 linked with it, is called a "work that uses the Library". Such a
272 link a "work that uses the Library" with the Library to produce a
[all …]
/xen/tools/golang/xenlight/
A DLICENSE61 effectively restrict the users of a free program by obtaining a
74 a shared library, the combination of the two is legally speaking a
98 programs enables a greater number of people to use a large body of
131 copyright law: that is to say, a work containing the Library or a
158 You may charge a fee for the physical act of transferring a copy,
167 a) The modified work must itself be a software library.
175 d) If a facility in the modified Library refers to a function or a
225 the Library into a program that is not a library.
242 linked with it, is called a "work that uses the Library". Such a
272 link a "work that uses the Library" with the Library to produce a
[all …]
/xen/tools/libxc/
A DCOPYING70 effectively restrict the users of a free program by obtaining a
83 a shared library, the combination of the two is legally speaking a
107 programs enables a greater number of people to use a large body of
140 copyright law: that is to say, a work containing the Library or a
167 You may charge a fee for the physical act of transferring a copy,
176 a) The modified work must itself be a software library.
184 d) If a facility in the modified Library refers to a function or a
234 the Library into a program that is not a library.
251 linked with it, is called a "work that uses the Library". Such a
281 link a "work that uses the Library" with the Library to produce a
[all …]
/xen/tools/libacpi/
A DCOPYING71 effectively restrict the users of a free program by obtaining a
84 a shared library, the combination of the two is legally speaking a
108 programs enables a greater number of people to use a large body of
141 copyright law: that is to say, a work containing the Library or a
168 You may charge a fee for the physical act of transferring a copy,
177 a) The modified work must itself be a software library.
185 d) If a facility in the modified Library refers to a function or a
235 the Library into a program that is not a library.
252 linked with it, is called a "work that uses the Library". Such a
282 link a "work that uses the Library" with the Library to produce a
[all …]
/xen/xen/common/libelf/
A DCOPYING70 effectively restrict the users of a free program by obtaining a
83 a shared library, the combination of the two is legally speaking a
107 programs enables a greater number of people to use a large body of
140 copyright law: that is to say, a work containing the Library or a
167 You may charge a fee for the physical act of transferring a copy,
176 a) The modified work must itself be a software library.
184 d) If a facility in the modified Library refers to a function or a
234 the Library into a program that is not a library.
251 linked with it, is called a "work that uses the Library". Such a
281 link a "work that uses the Library" with the Library to produce a
[all …]

Completed in 151 milliseconds

12345678910>>...21