/xen/xen/include/asm-x86/guest/ |
A D | hyperv-hcall.h | 30 static inline uint64_t hv_do_hypercall(uint64_t control, paddr_t input_addr, in hv_do_hypercall() argument 38 : "=a" (status), "+c" (control), in hv_do_hypercall() 50 uint64_t control = code | HV_HYPERCALL_FAST_BIT; in hv_do_fast_hypercall() local 55 : "=a" (status), "+c" (control), in hv_do_fast_hypercall() 66 uint64_t control = code; in hv_do_rep_hypercall() local 70 control |= (uint64_t)varhead_size << HV_HYPERCALL_VARHEAD_OFFSET; in hv_do_rep_hypercall() 71 control |= (uint64_t)rep_count << HV_HYPERCALL_REP_COMP_OFFSET; in hv_do_rep_hypercall() 74 status = hv_do_hypercall(control, input, output); in hv_do_rep_hypercall() 80 control &= ~HV_HYPERCALL_REP_START_MASK; in hv_do_rep_hypercall() 81 control |= MASK_INSR(rep_comp, HV_HYPERCALL_REP_START_MASK); in hv_do_rep_hypercall()
|
/xen/xen/include/asm-x86/ |
A D | msi.h | 159 #define msi_disable(control) control &= ~PCI_MSI_FLAGS_ENABLE argument 160 #define multi_msi_capable(control) \ argument 161 (1 << ((control & PCI_MSI_FLAGS_QMASK) >> 1)) 162 #define multi_msi_enable(control, num) \ argument 164 #define is_64bit_address(control) (!!(control & PCI_MSI_FLAGS_64BIT)) argument 165 #define is_mask_bit_support(control) (!!(control & PCI_MSI_FLAGS_MASKBIT)) argument 166 #define msi_enable(control, num) multi_msi_enable(control, num); \ argument 167 control |= PCI_MSI_FLAGS_ENABLE 172 #define msix_enable(control) control |= PCI_MSIX_FLAGS_ENABLE argument 173 #define msix_disable(control) control &= ~PCI_MSIX_FLAGS_ENABLE argument [all …]
|
/xen/xen/arch/x86/ |
A D | msi.c | 274 control &= ~PCI_MSI_FLAGS_ENABLE; in __msi_set_enable() 276 control |= PCI_MSI_FLAGS_ENABLE; in __msi_set_enable() 297 u16 control, seg = dev->seg; in msix_set_enable() local 324 u16 seg, control; in msi_set_mask_bit() local 517 u16 control = ~0; in setup_msi_irq() local 614 u16 control, seg = dev->seg; in msi_capability_init() local 626 control &= ~PCI_MSI_FLAGS_QSIZE; in msi_capability_init() 627 multi_msi_enable(control, nvec); in msi_capability_init() 674 control |= PCI_MSI_FLAGS_ENABLE; in msi_capability_init() 774 u16 control; in msix_capability_init() local [all …]
|
/xen/xen/drivers/char/ |
A D | ehci-dbgp.c | 162 u32 control; member 493 writel(ctrl, &dbgp->ehci_debug->control); in dbgp_check_for_completion() 741 ctrl = readl(&dbgp->ehci_debug->control); in ehci_dbgp_startup() 744 writel(ctrl, &dbgp->ehci_debug->control); in ehci_dbgp_startup() 915 ctrl = readl(&dbgp->ehci_debug->control); in ehci_dbgp_external_startup() 917 writel(ctrl, &dbgp->ehci_debug->control); in ehci_dbgp_external_startup() 918 ctrl = readl(&dbgp->ehci_debug->control); in ehci_dbgp_external_startup() 1137 ctrl = readl(&dbgp->ehci_debug->control); in ehci_dbgp_setup() 1139 writel(ctrl, &dbgp->ehci_debug->control); in ehci_dbgp_setup() 1402 ctrl = readl(&ehci_debug->control); in ehci_dbgp_check_release() [all …]
|
/xen/tools/xenstore/ |
A D | Makefile | 41 xenstore xenstore-control: CFLAGS += -static 60 clients: xenstore $(CLIENTS) xenstore-control 93 xenstore-control: xenstore_control.o $(LIBXENSTORE) 141 rm -f xs_tdb_dump xenstore-control init-xenstore-domain 167 $(INSTALL_PROG) xenstore-control $(DESTDIR)$(bindir) 200 rm -f $(DESTDIR)$(bindir)/xenstore-control
|
/xen/xen/arch/x86/oprofile/ |
A D | op_model_ppro.c | 29 u64 control; member 153 if ( IS_ACTIVE(msrs_content[i].control) ) in ppro_check_ctrs() 156 if ( IS_ENABLE(msrs_content[i].control) ) in ppro_check_ctrs() 267 *msr_content = msrs[index].control; in ppro_load_msr() 282 msrs[index].control = msr_content; in ppro_save_msr()
|
/xen/docs/misc/ |
A D | xenstore-paths.pandoc | 422 #### ~/control/sysrq = (""|COMMAND) [w] 430 #### ~/control/shutdown = (""|COMMAND) [w] 440 #### ~/control/feature-reboot = (""|"0"|"1") [w] 446 to ~/control/shutdown. 448 a PV control command and respond accordingly: 451 control operation 463 ~/control/shutdown regardless. 465 #### ~/control/feature-s3 = (""|"0"|"1") [w,HVM] 466 #### ~/control/feature-s4 = (""|"0"|"1") [w,HVM] 492 string back to the control node. [all …]
|
A D | hvm-emulated-unplug.pandoc | 89 Novells VMDP. Depending on how VMDP was configured it would control all 90 devices, or either NIC or storage. To control all devices the value 0x1 93 was configured to control just NIC devices it would write the value 0x2 94 to offset 0x8. If VMDP was configured to control just storage devices it
|
/xen/xen/drivers/vpci/ |
A D | msi.c | 191 uint16_t control; in init_msi() local 212 control = pci_conf_read16(pdev->sbdf, msi_control_reg(pos)); in init_msi() 226 pdev->vpci->msi->address64 = is_64bit_address(control); in init_msi() 227 pdev->vpci->msi->masking = is_mask_bit_support(control); in init_msi()
|
A D | msix.c | 452 uint16_t control; in init_msix() local 460 control = pci_conf_read16(pdev->sbdf, msix_control_reg(msix_offset)); in init_msix() 462 max_entries = msix_table_size(control); in init_msix()
|
/xen/xen/include/asm-x86/hvm/vmx/ |
A D | vmx.h | 122 return test_and_set_bit(POSTED_INTR_ON, &pi_desc->control); in pi_test_and_set_on() 127 set_bit(POSTED_INTR_ON, &pi_desc->control); in pi_set_on() 132 return test_and_clear_bit(POSTED_INTR_ON, &pi_desc->control); in pi_test_and_clear_on() 152 set_bit(POSTED_INTR_SN, &pi_desc->control); in pi_set_sn() 157 clear_bit(POSTED_INTR_SN, &pi_desc->control); in pi_clear_sn()
|
/xen/docs/features/ |
A D | dom0less.pandoc | 5 system without an control domain (often referred to as "dom0"). Each 19 Currently, a control domain ("dom0") is still required, but in the 21 directly from Xen. Instead of waiting for the control domain to be fully 113 done from the control domain, using `xl vcpu-pin` as usual. It is not 114 currently possible to configure vCPU pinning without a control domain.
|
A D | feature-levelling.pandoc | 70 ## Ability to control CPUID 75 on all `CPUID` instructions, allowing Xen full control over all information. 80 not trap, leaving Xen no direct ability to control the information returned. 95 direct control of the values returned for certain `CPUID` leaves. These MSRs 110 full control over all information, exactly like HVM guests. 141 In addition, Xen will calculate how much control it has over non-cooperative 166 control certain behaviour such as the hardware MXCSR_MASK or x87 FPU exception
|
/xen/tools/xenstat/libxenstat/bindings/swig/perl/ |
A D | .empty | 1 This directory is empty; this file is included to prevent version control systems from removing the…
|
/xen/tools/xenstat/libxenstat/bindings/swig/python/ |
A D | .empty | 1 This directory is empty; this file is included to prevent version control systems from removing the…
|
/xen/xen/arch/x86/cpu/ |
A D | vpmu_intel.c | 336 wrmsrl(MSR_P6_EVNTSEL(i), xen_pmu_cntr_pair[i].control); in __core2_vpmu_load() 385 uint64_t control = xen_pmu_cntr_pair[i].control; in core2_vpmu_verify() local 387 if ( control & ARCH_CTRL_MASK ) in core2_vpmu_verify() 389 if ( control & ARCH_CNTR_ENABLED ) in core2_vpmu_verify() 673 xen_pmu_cntr_pair[tmp].control = msr_content; in core2_vpmu_do_wrmsr() 765 i, cntr_pair[i].counter, cntr_pair[i].control); in core2_vpmu_dump()
|
/xen/tools/flask/policy/policy/ |
A D | security_classes | 4 # daemons that need to make access control decisions using the hypervisor's
|
/xen/docs/ |
A D | glossary.rst | 10 control domain 38 (e.g. the control and/or hardware domains), are not considered guests in
|
/xen/tools/firmware/vgabios/ |
A D | TODO | 13 - video refresh control ah=12 bl=36
|
/xen/xen/include/public/arch-x86/ |
A D | pmu.h | 46 uint64_t control; member
|
/xen/stubdom/grub/ |
A D | mini-os.c | 611 static int shift, control, alt, caps_lock; in console_getkey() local 632 control = ev.key.pressed; in console_getkey() 649 if (control) in console_getkey()
|
/xen/tools/misc/ |
A D | mkdeb | 41 cat >deb/DEBIAN/control <<EOF
|
/xen/tools/libxl/ |
A D | libxl_utils.c | 1069 char control[CMSG_SPACE(spaceneeded)]; in libxl__sendmsg_fds() local 1080 msg.msg_control = control; in libxl__sendmsg_fds() 1081 msg.msg_controllen = sizeof(control); in libxl__sendmsg_fds() 1121 char control[CMSG_SPACE(spaceneeded)]; in libxl__recvmsg_fds() local 1130 msg.msg_control = control; in libxl__recvmsg_fds() 1131 msg.msg_controllen = sizeof(control); in libxl__recvmsg_fds()
|
/xen/xen/arch/x86/acpi/cpufreq/ |
A D | powernow.c | 148 int index = px->control & 0x00000007; in amd_fixup_frequency() 301 data->freq_table[valid_states].index = perf->states[i].control & HW_PSTATE_MASK; in powernow_cpufreq_cpu_init()
|
/xen/xen/common/ |
A D | Kconfig | 180 allows administrators fine-grained control over a Xen domain and 192 Enables FLASK (FLux Advanced Security Kernel) as the access control 194 control framework by which security enforcement, isolation, and 195 auditing can be achieved with fine granular control via a security 232 Enables SILO as the access control mechanism used by the XSM framework.
|