/xen/xen/arch/x86/x86_64/ |
A D | domain.c | 25 struct compat_vcpu_register_runstate_memory_area area; in arch_compat_vcpu_op() local 28 area.addr.p = 0; in arch_compat_vcpu_op() 31 if ( copy_from_guest(&area.addr.h, arg, 1) ) in arch_compat_vcpu_op() 34 if ( area.addr.h.c != area.addr.p || in arch_compat_vcpu_op() 35 !compat_handle_okay(area.addr.h, 1) ) in arch_compat_vcpu_op() 39 guest_from_compat_handle(v->runstate_guest.compat, area.addr.h); in arch_compat_vcpu_op()
|
A D | entry.S | 443 adc %ecx,%ecx # Above Xen private area? Then okay. 540 # Get out of the guest-save area of the stack.
|
/xen/tools/libs/gnttab/ |
A D | freebsd.c | 238 void *area = NULL; in osdep_gntshr_share_pages() local 257 area = mmap(NULL, count * PAGE_SIZE, PROT_READ | PROT_WRITE, MAP_SHARED, in osdep_gntshr_share_pages() 260 if ( area == MAP_FAILED ) in osdep_gntshr_share_pages() 262 area = NULL; in osdep_gntshr_share_pages() 284 munmap(area, count * PAGE_SIZE); in osdep_gntshr_share_pages() 285 area = NULL; in osdep_gntshr_share_pages() 301 return area; in osdep_gntshr_share_pages()
|
A D | linux.c | 455 void *area = NULL; in osdep_gntshr_share_pages() local 469 area = mmap(NULL, count * PAGE_SIZE, PROT_READ | PROT_WRITE, in osdep_gntshr_share_pages() 472 if (area == MAP_FAILED) { in osdep_gntshr_share_pages() 473 area = NULL; in osdep_gntshr_share_pages() 492 munmap(area, count * PAGE_SIZE); in osdep_gntshr_share_pages() 493 area = NULL; in osdep_gntshr_share_pages() 507 return area; in osdep_gntshr_share_pages()
|
/xen/docs/designs/ |
A D | non-cooperative-migration.md | 38 vif has index Z then the frontend area will reside under the parent node: 46 and the normal backend area for vif Z would be: 55 * `backend`: the fully qualified xenstore path of the backend area 58 and similarly two nodes in the backend area to locate the frontend area: 60 * `frontend`: the fully qualified xenstore path of the frontend area 64 The guest domain only has write permission to the frontend area and 73 protocol specific information into the xenstore backend area (to be read 81 and set the state node in the frontend area to 4 (XenbusStateConnected). 84 end of them) and set the state node in the backend area to 4. Protocol 111 because the guest can sample its own domid from the frontend area and use [all …]
|
/xen/tools/libxc/ |
A D | xc_dom_x86.c | 98 struct xc_dom_x86_mapping_lvl area; member 168 if ( from < map_cmp->area.to && to > map_cmp->area.from ) in count_pgtables() 178 map->area.to = to & domx86->params->vaddr_mask; in count_pgtables() 191 map->area.pgtables++; in count_pgtables() 198 map->lvls[l].from = map->area.from & ~mask; in count_pgtables() 199 map->lvls[l].to = map->area.to | mask; in count_pgtables() 235 map->area.pgtables += map->lvls[l].pgtables; in count_pgtables() 259 pages = map->area.pgtables + extra_pages; in alloc_pgtables_pv() 263 map->area.pfn = 0; in alloc_pgtables_pv() 397 pfn_e = map->area.pgtables + pfn_s; in get_pg_prot() [all …]
|
/xen/stubdom/ |
A D | vtpm-locality.patch | 11 /* set the capability area with the specified data, on failure
|
/xen/docs/misc/ |
A D | kexec_and_kdump.txt | 113 In order to use kdump an area of memory has to be reserved at boot time. 114 This is the area of memory that the crash kernel will use, thus allowing it 115 to run without disrupting the memory used by the first kernel. This area is
|
A D | xenmon.txt | 8 area that may be accessed by tools such as xenmon.
|
A D | xen-command-line.pandoc | 591 area. The `<ramsize-range>:<size>` pairs indicate how much memory to 596 A trailing `@<offset>` specifies the exact address this area should be 598 the address range the area should fall into.
|
A D | livepatch.pandoc | 118 area would be allocated dynamically).
|
/xen/xen/common/ |
A D | domain.c | 1504 struct vcpu_register_runstate_memory_area area; in do_vcpu_op() local 1508 if ( copy_from_guest(&area, arg, 1) ) in do_vcpu_op() 1511 if ( !guest_handle_okay(area.addr.h, 1) ) in do_vcpu_op() 1515 runstate_guest(v) = area.addr.h; in do_vcpu_op()
|
/xen/docs/man/ |
A D | xen-pci-device-reservations.7.pod | 77 size of the single MMIO BAR that the device exposes. This area may be
|
/xen/xen/arch/x86/ |
A D | domain.c | 1280 struct vcpu_register_time_memory_area area; in arch_do_vcpu_op() local 1283 if ( copy_from_guest(&area, arg, 1) ) in arch_do_vcpu_op() 1286 if ( !guest_handle_okay(area.addr.h, 1) ) in arch_do_vcpu_op() 1290 v->arch.time_info_guest = area.addr.h; in arch_do_vcpu_op()
|
A D | Kconfig | 61 The 32bit PV ABI uses Ring1, an area of the x86 architecture which
|
/xen/tools/firmware/vgabios/ |
A D | README | 148 . "noclear" flag stored in BIOS area
|
/xen/docs/features/ |
A D | feature-levelling.pandoc | 172 Feature levelling is a very wide area, and used all over the hypervisor.
|
/xen/tools/xl/ |
A D | CODING_STYLE | 20 the area being touched.
|
/xen/stubdom/grub.patches/ |
A D | 99minios | 96 " is a drive, or in the \"bootloader\" area if DEVICE is a FFS partition." 1075 /* define the default viewable area */
|
A D | 61btrfs.diff | 1352 +/* helper function to cast into the data area of the leaf. */ 1544 /* defines for the block filesystem info area */
|
A D | 10graphics.diff | 1213 +/* define the default viewable area */
|
/xen/tools/libxl/ |
A D | CODING_STYLE | 20 the area being touched.
|
/xen/tools/xenstore/ |
A D | talloc_guide.txt | 63 memory context and a type, and returns a pointer to a new area of
|
/xen/ |
A D | MAINTAINERS | 69 L: Mailing list that is relevant to this area
|
/xen/tools/firmware/rombios/ |
A D | rombios.c | 8989 ; relocated here because the primary POST area isnt big enough. 9307 ; relocated here because the primary POST area isnt big enough. 9322 ; relocated here because the primary POST area isnt big enough. 10747 ;; the following area can be used to write dynamically generated tables 10846 ;; zero out BIOS data area (40:00..40:ff) 11142 ; b2: 1=extended BIOS data area used
|