/xen/xen/include/acpi/ |
A D | acmacros.h | 57 #define ACPI_MIN(a,b) (((a)<(b))?(a):(b)) argument 58 #define ACPI_MAX(a,b) (((a)>(b))?(a):(b)) argument 355 (a) & 0xFF, ((a) >> 8) & 0xFF, ((a) >> 16) & 0xFF, ((a) >> 24) & 0xFF, \ 388 #define ACPI_DISASM_ONLY_MEMBERS(a) a; argument 401 #define ARGI_LIST1(a) (ARG_1(a)) argument 408 #define ARGP_LIST1(a) (ARG_1(a)) argument 521 #define ACPI_DO_WHILE0(a) a argument 597 #define ACPI_DEBUG_EXEC(a) a argument 600 #define ACPI_DEBUG_DEFINE(a) a; argument 601 #define ACPI_DEBUG_ONLY_MEMBERS(a) a; argument [all …]
|
/xen/xen/arch/x86/ |
A D | alternative.c | 190 struct alt_instr *a, *base; in _apply_alternatives() local 203 for ( a = base = start; a < end; a++ ) in _apply_alternatives() 208 unsigned int total_len = a->orig_len + a->pad_len; in _apply_alternatives() 226 base = a; in _apply_alternatives() 229 if ( a->priv ) in _apply_alternatives() 236 if ( !boot_cpu_has(a->cpuid) ) in _apply_alternatives() 242 a->priv = 1; in _apply_alternatives() 249 text_poke(orig + a->orig_len, buf, a->pad_len); in _apply_alternatives() 274 a->orig_len >= 6 && in _apply_alternatives() 306 a->priv = 1; in _apply_alternatives() [all …]
|
/xen/tools/ocaml/xenstored/ |
A D | trie.mli | 18 type ('a, 'b) t 20 Internally, a trie is represented as a labeled tree, where node contains values 26 val mem : ('a,'b) t -> 'a list -> bool 30 val find : ('a, 'b) t -> 'a list -> 'b 34 val set : ('a, 'b) t -> 'a list -> 'b -> ('a, 'b) t 37 val unset : ('a, 'b) t -> 'a list -> ('a, 'b) t 42 val iter : ('a -> 'b option -> unit) -> ('a, 'b) t -> unit 47 val iter_path : ('a -> 'b option -> unit) -> ('a, 'b) t -> 'a list -> unit 51 val fold : ('a -> 'b option -> 'c -> 'c) -> ('a, 'b) t -> 'c -> 'c 54 val map : ('b -> 'c option) -> ('a,'b) t -> ('a,'c) t [all …]
|
/xen/xen/common/ |
A D | list_sort.c | 35 while (a && b) { in merge() 37 if ((*cmp)(priv, a, b) <= 0) { in merge() 38 tail->next = a; in merge() 39 a = a->next; in merge() 46 tail->next = a?:b; in merge() 66 while (a && b) { in merge_and_restore_back_links() 68 if ((*cmp)(priv, a, b) <= 0) { in merge_and_restore_back_links() 69 tail->next = a; in merge_and_restore_back_links() 70 a->prev = tail; in merge_and_restore_back_links() 71 a = a->next; in merge_and_restore_back_links() [all …]
|
A D | memory.c | 116 !guest_handle_subrange_okay(a->extent_list, a->nr_done, in increase_reservation() 123 for ( i = a->nr_done; i < a->nr_extents; i++ ) in increase_reservation() 131 page = alloc_domheap_pages(d, a->extent_order, a->memflags); in increase_reservation() 136 a->extent_order, d->domain_id, a->memflags, in increase_reservation() 153 a->nr_done = i; in increase_reservation() 165 if ( !guest_handle_subrange_okay(a->extent_list, a->nr_done, in populate_physmap() 194 for ( i = a->nr_done; i < a->nr_extents; i++ ) in populate_physmap() 286 a->nr_done = i; in populate_physmap() 425 if ( !guest_handle_subrange_okay(a->extent_list, a->nr_done, in decrease_reservation() 430 for ( i = a->nr_done; i < a->nr_extents; i++ ) in decrease_reservation() [all …]
|
/xen/xen/include/efi/ |
A D | efidevp.h | 44 #define DP_IS_END_TYPE(a) argument 45 #define DP_IS_END_SUBTYPE(a) ( ((a)->SubType == END_ENTIRE_DEVICE_PATH_SUBTYPE ) argument 47 #define DevicePathType(a) ( ((a)->Type) & EFI_DP_TYPE_MASK ) argument 48 #define DevicePathSubType(a) ( (a)->SubType ) argument 49 #define DevicePathNodeLength(a) ( ((a)->Length[0]) | ((a)->Length[1] << 8) ) argument 50 #define NextDevicePathNode(a) ( (EFI_DEVICE_PATH *) ( ((UINT8 *) (a)) + DevicePathNodeLength(… argument 52 #define IsDevicePathEndType(a) ( DevicePathType(a) == END_DEVICE_PATH_TYPE ) argument 53 #define IsDevicePathEndSubType(a) ( (a)->SubType == END_ENTIRE_DEVICE_PATH_SUBTYPE ) argument 54 #define IsDevicePathEnd(a) ( IsDevicePathEndType(a) && IsDevicePathEndSubType(a) ) argument 55 #define IsDevicePathUnpacked(a) ( (a)->Type & EFI_DP_TYPE_UNPACKED ) argument [all …]
|
/xen/xen/arch/arm/ |
A D | hvm.c | 94 struct xen_hvm_param a; in do_hvm_op() local 97 if ( copy_from_guest(&a, arg, 1) ) in do_hvm_op() 100 d = rcu_lock_domain_by_any_id(a.domid); in do_hvm_op() 110 rc = hvm_allow_set_param(d, a.index); in do_hvm_op() 114 d->arch.hvm.params[a.index] = a.value; in do_hvm_op() 118 rc = hvm_allow_get_param(d, a.index); in do_hvm_op() 122 a.value = d->arch.hvm.params[a.index]; in do_hvm_op() 123 rc = copy_to_guest(arg, &a, 1) ? -EFAULT : 0; in do_hvm_op()
|
/xen/tools/xenstore/ |
A D | utils.h | 10 #define streq(a,b) (strcmp((a),(b)) == 0) argument 13 #define strstarts(a,b) (strncmp((a),(b),strlen(b)) == 0) argument 16 static inline bool strends(const char *a, const char *b) in strends() argument 18 if (strlen(a) < strlen(b)) in strends() 21 return streq(a + strlen(a) - strlen(b), b); in strends()
|
A D | COPYING | 68 effectively restrict the users of a free program by obtaining a 81 a shared library, the combination of the two is legally speaking a 105 programs enables a greater number of people to use a large body of 138 copyright law: that is to say, a work containing the Library or a 165 You may charge a fee for the physical act of transferring a copy, 174 a) The modified work must itself be a software library. 182 d) If a facility in the modified Library refers to a function or a 232 the Library into a program that is not a library. 249 linked with it, is called a "work that uses the Library". Such a 279 link a "work that uses the Library" with the Library to produce a [all …]
|
/xen/tools/ocaml/libs/xl/ |
A D | xenlight.mli.in | 41 ?async:'a -> unit -> domid = "stub_libxl_domain_create_restore" 70 user:'a -> 71 fd_register:('a -> Unix.file_descr -> event list -> for_libxl -> 'b) -> 72 fd_modify:('a -> Unix.file_descr -> 'b -> event list -> 'b) -> 73 fd_deregister:('a -> Unix.file_descr -> 'b -> unit) -> 74 timeout_register:('a -> int64 -> int64 -> for_libxl -> 'c) -> 75 timeout_fire_now:('a -> 'c -> 'c) -> 82 async_callback:(result:error option -> user:'a -> unit) -> 88 user:'a -> 89 event_occurs_callback:('a -> Event.t -> unit) -> [all …]
|
/xen/tools/include/xen-foreign/ |
A D | mkchecker.py | 24 for a in archs: 25 f.write('#include "%s.h"\n' % a); 31 for a in archs: 32 f.write('\tprintf("%%8s", "%s");\n' % a); 38 for a in archs: 39 s = struct + "_" + a; 40 if a in compat_arches: 41 compat = compat_arches[a] 45 f.write('#ifdef %s_has_no_%s\n' % (a, struct));
|
/xen/tools/libfsimage/zfs/ |
A D | zfs_fletcher.c | 67 uint64_t a, b, c, d; in fletcher_4_native() local 69 for (a = b = c = d = 0; ip < ipend; ip++) { in fletcher_4_native() 70 a += ip[0]; in fletcher_4_native() 71 b += a; in fletcher_4_native() 76 ZIO_SET_CHECKSUM(zcp, a, b, c, d); in fletcher_4_native() 84 uint64_t a, b, c, d; in fletcher_4_byteswap() local 86 for (a = b = c = d = 0; ip < ipend; ip++) { in fletcher_4_byteswap() 87 a += BSWAP_32(ip[0]); in fletcher_4_byteswap() 88 b += a; in fletcher_4_byteswap() 93 ZIO_SET_CHECKSUM(zcp, a, b, c, d); in fletcher_4_byteswap()
|
/xen/xen/include/acpi/platform/ |
A D | aclinux.h | 82 #define ACPI_ALLOCATE(a) acpi_os_alloc_memory(a) argument 83 #define ACPI_ALLOCATE_ZEROED(a) acpi_os_zalloc_memory(a) argument 84 #define ACPI_FREE(a) acpi_os_free_memory(a) argument
|
/xen/xen/include/asm-x86/ |
A D | desc.h | 112 uint32_t a, b; member 118 uint64_t a, b; member 143 gate->a = new->a; in _write_gate_lower() 148 (gate_addr)->a = 0; \ 153 (gate_addr)->a = \ 167 idte.a = in _set_gate_lower() 182 idte.a = gate->a; in _update_gate_addr_lower() 185 idte.a &= 0x0000FFFFFFFF0000ULL; in _update_gate_addr_lower() 186 idte.a |= (((unsigned long)(addr) & 0xFFFF0000UL) << 32) | in _update_gate_addr_lower() 196 (desc)[0].a = \ [all …]
|
/xen/docs/features/ |
A D | livepatch.pandoc | 31 declare live patching as a 'Supported' feature on x86. 40 guests and it shall be treated as a security issue if this is not 47 functions are patched), it shall be treated as a security issue. 67 because the it can only be triggered by a privileged domain. 69 6) Bugs which allow a guest to prevent the application of a livepatch: 70 A guest should not be able to prevent the application of a live 72 of a live patch despite pausing it (xl pause ...), it shall be 73 treated as a security issue. 85 There is a caveat -- an incorrect live patch can introduce a guest->host 98 There is a caveat -- an incorrect live patch can introduce an [all …]
|
/xen/tools/ocaml/ |
A D | LICENSE | 4 As a special exception to the GNU Lesser General Public License, you 5 may link, statically or dynamically, a "work that uses the Library" 6 with a publicly distributed version of the Library to produce an 11 we mean either the unmodified Library as distributed, or a 48 …a constant threat to the existence of any free program. We wish to make sure that a company cannot… 78 You may charge a fee for the physical act of transferring a copy, and you may at your option offer … 83 a) The modified work must itself be a software library. 99 … useful when you wish to copy part of the code of the Library into a program that is not a library. 122 …the work with a written offer, valid for at least three years, to give the same user the materials… 124 … Verify that the user has already received a copy of these materials or that you have already sent… [all …]
|
/xen/docs/specs/ |
A D | libxl-migration-stream.pandoc | 35 This design addresses the above points, allowing for a completely 44 included in a future draft. 98 A record has a record header, type specific data and a trailing footer. If 284 a. Suspend primary vm 288 a. Read *CHECKPOINT_SVM_READY* from secondary 291 4. Wait a new checkpoint 292 a. Send *CHECKPOINT_NEW* to secondary 297 a. Send *CHECKPOINT_SVM_READY* to primary 300 2. Wait a new checkpoint 301 a. Read *CHECKPOINT_NEW* from primary [all …]
|
/xen/docs/man/ |
A D | xen-vtpm.7.pod | 18 The goal of this work is to provide a TPM functionality to a virtual guest 19 operating system (a DomU). This allows programs to interact with a TPM in a 93 A mini-os stub domain that implements a vTPM. There is a 103 implement a mini-os domain that wishes to use a vTPM of 156 a later time. If a vTPM gets an error when loading its key, it will currently 157 generate a fresh vTPM image (with a new EK, SRK, and blank NVRAM). 181 virtual machine and requires a config file. The manager requires a disk image 234 While attaching a vTPM after a guest is booted (using xl vtpm-attach) is 238 configuration. Attaching a vTPM to a running domain should only be used for 286 log). Guests wishing to use a custom kernel in such a secure environment are [all …]
|
A D | xen-tscmode.7.pod | 131 sometimes used as a random number or a unique sequence identifier, 140 apps were ported from a uniprocessor to an SMP environment; as a result, 175 synchronize TSC across a data center or even a pool of machines. As 176 a result, when run in a virtualized environment, rare and obscure 179 example, a 3GHz 192 To provide a "safe" TSC, i.e. to ensure both TSC monotonicity and a 240 can be used as a system "clocksource". 246 across all the machines in a pool or data center, a migration may "break" 261 ("pvcpuid") and also trap to Xen. But apps in a PV guest that use a 262 cpuid instruction execute it directly, without a trap to Xen. As a result, [all …]
|
/xen/tools/xenstat/libxenstat/ |
A D | COPYING | 63 effectively restrict the users of a free program by obtaining a 76 a shared library, the combination of the two is legally speaking a 100 programs enables a greater number of people to use a large body of 133 copyright law: that is to say, a work containing the Library or a 160 You may charge a fee for the physical act of transferring a copy, 169 a) The modified work must itself be a software library. 177 d) If a facility in the modified Library refers to a function or a 227 the Library into a program that is not a library. 244 linked with it, is called a "work that uses the Library". Such a 274 link a "work that uses the Library" with the Library to produce a [all …]
|
/xen/tools/firmware/vgabios/ |
A D | COPYING | 61 effectively restrict the users of a free program by obtaining a 74 a shared library, the combination of the two is legally speaking a 98 programs enables a greater number of people to use a large body of 131 copyright law: that is to say, a work containing the Library or a 158 You may charge a fee for the physical act of transferring a copy, 167 a) The modified work must itself be a software library. 175 d) If a facility in the modified Library refers to a function or a 225 the Library into a program that is not a library. 242 linked with it, is called a "work that uses the Library". Such a 272 link a "work that uses the Library" with the Library to produce a [all …]
|
/xen/tools/golang/xenlight/ |
A D | LICENSE | 61 effectively restrict the users of a free program by obtaining a 74 a shared library, the combination of the two is legally speaking a 98 programs enables a greater number of people to use a large body of 131 copyright law: that is to say, a work containing the Library or a 158 You may charge a fee for the physical act of transferring a copy, 167 a) The modified work must itself be a software library. 175 d) If a facility in the modified Library refers to a function or a 225 the Library into a program that is not a library. 242 linked with it, is called a "work that uses the Library". Such a 272 link a "work that uses the Library" with the Library to produce a [all …]
|
/xen/tools/libxc/ |
A D | COPYING | 70 effectively restrict the users of a free program by obtaining a 83 a shared library, the combination of the two is legally speaking a 107 programs enables a greater number of people to use a large body of 140 copyright law: that is to say, a work containing the Library or a 167 You may charge a fee for the physical act of transferring a copy, 176 a) The modified work must itself be a software library. 184 d) If a facility in the modified Library refers to a function or a 234 the Library into a program that is not a library. 251 linked with it, is called a "work that uses the Library". Such a 281 link a "work that uses the Library" with the Library to produce a [all …]
|
/xen/tools/libacpi/ |
A D | COPYING | 71 effectively restrict the users of a free program by obtaining a 84 a shared library, the combination of the two is legally speaking a 108 programs enables a greater number of people to use a large body of 141 copyright law: that is to say, a work containing the Library or a 168 You may charge a fee for the physical act of transferring a copy, 177 a) The modified work must itself be a software library. 185 d) If a facility in the modified Library refers to a function or a 235 the Library into a program that is not a library. 252 linked with it, is called a "work that uses the Library". Such a 282 link a "work that uses the Library" with the Library to produce a [all …]
|
/xen/xen/common/libelf/ |
A D | COPYING | 70 effectively restrict the users of a free program by obtaining a 83 a shared library, the combination of the two is legally speaking a 107 programs enables a greater number of people to use a large body of 140 copyright law: that is to say, a work containing the Library or a 167 You may charge a fee for the physical act of transferring a copy, 176 a) The modified work must itself be a software library. 184 d) If a facility in the modified Library refers to a function or a 234 the Library into a program that is not a library. 251 linked with it, is called a "work that uses the Library". Such a 281 link a "work that uses the Library" with the Library to produce a [all …]
|