Home
last modified time | relevance | path

Searched refs:from (Results 1 – 25 of 213) sorted by relevance

123456789

/xen/tools/debugger/gdbsx/gx/
A Dgx_utils.c60 gx_convert_int_to_ascii(char *from, char *to, int n) in gx_convert_int_to_ascii() argument
65 ch = *from++; in gx_convert_int_to_ascii()
76 gx_convert_ascii_to_int(char *from, char *to, int n) in gx_convert_ascii_to_int() argument
80 nib1 = gx_fromhex(*from++); in gx_convert_ascii_to_int()
81 nib2 = gx_fromhex(*from++); in gx_convert_ascii_to_int()
94 while ((ch=from[i++]) != ',') { in gx_decode_zZ_packet()
108 while ((ch=from[i++]) != ',') { in gx_decode_m_packet()
113 if ((ch=from[i++]) == 0) in gx_decode_m_packet()
133 while ((ch=from[i++]) != ',') { in gx_decode_M_packet()
137 while ((ch = from[i++]) != ':') { in gx_decode_M_packet()
[all …]
A Dgx.h27 void gx_convert_int_to_ascii (char *from, char *to, int n);
28 void gx_convert_ascii_to_int (char *from, char *to, int n);
/xen/xen/arch/x86/
A Dusercopy.c13 unsigned __copy_to_user_ll(void __user *to, const void *from, unsigned n) in __copy_to_user_ll() argument
43 : [cnt] "+c" (n), [to] "+D" (to), [from] "+S" (from), in __copy_to_user_ll()
52 unsigned __copy_from_user_ll(void *to, const void __user *from, unsigned n) in __copy_from_user_ll() argument
88 : [cnt] "+c" (n), [to] "+D" (to), [from] "+S" (from), in __copy_from_user_ll()
110 unsigned copy_to_user(void __user *to, const void *from, unsigned n) in copy_to_user() argument
113 n = __copy_to_user(to, from, n); in copy_to_user()
168 unsigned copy_from_user(void *to, const void __user *from, unsigned n) in copy_from_user() argument
170 if ( access_ok(from, n) ) in copy_from_user()
171 n = __copy_from_user(to, from, n); in copy_from_user()
/xen/xen/include/asm-x86/
A Duaccess.h13 unsigned copy_to_user(void *to, const void *from, unsigned len);
15 unsigned copy_from_user(void *to, const void *from, unsigned len);
17 unsigned __copy_to_user_ll(void __user*to, const void *from, unsigned n);
189 __copy_to_user(void __user *to, const void *from, unsigned long n) in __copy_to_user() argument
209 return __copy_to_user_ll(to, from, n); in __copy_to_user()
230 __copy_from_user(void *to, const void __user *from, unsigned long n) in __copy_from_user() argument
237 __get_user_size(*(u8 *)to, from, 1, ret, 1); in __copy_from_user()
240 __get_user_size(*(u16 *)to, from, 2, ret, 2); in __copy_from_user()
243 __get_user_size(*(u32 *)to, from, 4, ret, 4); in __copy_from_user()
246 __get_user_size(*(u64*)to, from, 8, ret, 8); in __copy_from_user()
[all …]
A Dasm_defns.h66 # define _ASM__EXTABLE(sfx, from, to) \ argument
69 .long _ASM_EX(from), _ASM_EX(to) ; \
72 # define _ASM__EXTABLE(sfx, from, to) \ argument
75 " .long " _ASM_EX(from) ", " _ASM_EX(to) "\n" \
79 #define _ASM_EXTABLE(from, to) _ASM__EXTABLE(, from, to) argument
80 #define _ASM_PRE_EXTABLE(from, to) _ASM__EXTABLE(.pre, from, to) argument
/xen/xen/common/
A DREADME.source5 be complete: in particular for code that has been imported from
10 Originally from https://www.landley.net/code/bunzip-4.1.c
15 This file was originally imported from the Linux tree
21 This file was originally imported from the compcache project at
28 This directory was opriginally imported from the libelf
34 This directory was originally imported from the Device Tree
41 This file was originally imported from the LZ4 project
42 ( http://www.lz4.org). The source is available from
48 This directory was imported from the XZ Utils project
/xen/xen/tools/kconfig/tests/err_recursive_inc/
A Dexpected_stderr4 included from: Kconfig.inc3:2
5 included from: Kconfig.inc2:4
6 included from: Kconfig.inc1:5
/xen/xen/arch/arm/
A Dguestcopy.c108 unsigned long raw_copy_to_guest(void *to, const void *from, unsigned len) in raw_copy_to_guest() argument
110 return copy_guest((void *)from, (vaddr_t)to, len, in raw_copy_to_guest()
114 unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, in raw_copy_to_guest_flush_dcache() argument
117 return copy_guest((void *)from, (vaddr_t)to, len, GVA_INFO(current), in raw_copy_to_guest_flush_dcache()
127 unsigned long raw_copy_from_guest(void *to, const void __user *from, unsigned len) in raw_copy_from_guest() argument
129 return copy_guest(to, (vaddr_t)from, len, GVA_INFO(current), in raw_copy_from_guest()
/xen/docs/admin-guide/
A Dmicrocode-loading.rst37 (XEN) microcode: CPU0 updated from revision 0x1a to 0x25, date = 2018-04-02
38 (XEN) microcode: CPU2 updated from revision 0x1a to 0x25, date = 2018-04-02
39 (XEN) microcode: CPU4 updated from revision 0x1a to 0x25, date = 2018-04-02
40 (XEN) microcode: CPU6 updated from revision 0x1a to 0x25, date = 2018-04-02
43 current microcode version can obtained from with dom0::
58 Loading microcode from a single file
83 indexing to count from the end.
90 Loading microcode from a Linux initrd
144 (XEN) microcode: CPU0 updated from revision 0x1a to 0x25, date = 2018-04-02
145 (XEN) microcode: CPU2 updated from revision 0x1a to 0x25, date = 2018-04-02
[all …]
/xen/m4/
A DREADME.source8 This file was fetched from
15 The pkg-config m4 macro library comes from the upstream pkg-config
25 The last synch was from commit:
31 glib: Fix Makefiles to suppress warnings from automake
34 += in the evaluation to avoid multiple definition warnings from
/xen/tools/firmware/etherboot/
A DREADME2 This directory builds gPXE option ROMs from the gPXE source
4 can be reconstructed from source, allowing easier debugging and
22 Previously, an image from Rom-o-matic.net was provided here, fetched
23 from the following URL:
28 from the downloaded image.
/xen/docs/misc/
A Dx86-xenpv-bootloader.pandoc10 In many cases the user wishes to manage this PV bootloader from within
11 the guest, and therefore wishes to chainload something from the guest
16 bootloader to load and the protocol/format expected from the
38 It is allowable for `/boot` to be a separate filesystem from `/` and
45 kernel of a different width from itself, and this extends to
46 chainloading from a stage one. Therefore it is permissible to have
A Dpvh.pandoc3 Since the Xen entry point into the kernel can be different from the
70 the position of the RSDP in memory (if present) can be fetched from the start
73 Description of paravirtualized devices will come from XenStore, just as it's
78 ### Interrupts from physical devices ###
80 Interrupts from physical devices are delivered using native methods, this is
84 the delivery of interrupts from those devices, using the same interfaces that
87 ### Interrupts from paravirtualized devices ###
89 Interrupts from paravirtualized devices are delivered using event channels, see
A Dhvm-emulated-unplug.pandoc13 The current protocol works like this (from the point of view of
17 is available by reading a two-byte magic number from IO port `0x10`.
21 2. The drivers read a one-byte protocol version from IO port `0x12`. If
30 5. The drivers check the magic number by reading two bytes from `0x10`
31 again. If it's changed from `0x49d2` to `0xd249`, the drivers are
43 The relevant emulated devices then disappear from the relevant
61 The blacklist is, from qemu's point of view, handled mostly through
64 readable, where `{build_number}` is the build number from step 4 as a
A Dprintk-formats.txt1 Xen custom %p format options. A subset, borrowed from Linux.
39 %pd Domain from a 'struct domain *'
46 %pv Domain and vCPU ID from a 'struct vcpu *'
A Dnetif-staging-grants.pandoc155 14) Backend consume a request from the ring
182 region (linear part of the skb) *only* from the first slot.
210 on the first produced request from frontend.
309 from backend to frontend network stack:
323 from it.
325 4) Create grant copy op from packet page to `gref`.
333 6) Gets a response from the ring for this data slot.
339 9) Gets a request from the ring for the first extra info [optional]
359 17) Consumes a response from the ring (first response for a packet)
583 2017-09-13 3 Xen 4.10 Addressed changes from Paul Durrant
[all …]
/xen/tools/libxc/
A Dxc_dom_x86.c91 xen_vaddr_t from; member
168 if ( from < map_cmp->area.to && to > map_cmp->area.from ) in count_pgtables()
177 map->area.from = from & domx86->params->vaddr_mask; in count_pgtables()
198 map->lvls[l].from = map->area.from & ~mask; in count_pgtables()
213 if ( map->lvls[l].from >= map_cmp->lvls[l].from && in count_pgtables()
220 assert(map->lvls[l].from >= map_cmp->lvls[l].from || in count_pgtables()
222 if ( map->lvls[l].from >= map_cmp->lvls[l].from && in count_pgtables()
420 from = map1->lvls[l].from; in setup_pgtables_pv()
431 if ( lvl->from >= to || lvl->to <= from ) in setup_pgtables_pv()
433 p_s = (max(from, lvl->from) - from) >> in setup_pgtables_pv()
[all …]
/xen/xen/include/asm-x86/hvm/
A Dguest_access.h4 unsigned int copy_to_user_hvm(void *to, const void *from, unsigned int len);
6 unsigned int copy_from_user_hvm(void *to, const void *from, unsigned int len);
/xen/xen/include/asm-x86/hvm/svm/
A Dsvmdebug.h26 void svm_vmcb_dump(const char *from, const struct vmcb_struct *vmcb);
27 bool svm_vmcb_isvalid(const char *from, const struct vmcb_struct *vmcb,
/xen/tools/xenstore/
A DREADME1 The following files are imported from the Samba project. We use the versions
2 from Samba 3, the current stable branch.
/xen/docs/
A DREADME.colo3 (SVM) run in parallel. They receive the same request from client, and generate
4 response in parallel too. If the response packets from PVM and SVM are
/xen/xen/arch/x86/boot/
A Dedd.S38 # number, interface support map and version results from fn41. The next four
39 # bytes are used to store the legacy cylinders, heads, and sectors from fn08.
40 # The following 74 bytes are used to store the results from fn48.
153 movl %ecx, 4(%bx) # store signature from MBR
/xen/xen/arch/x86/hvm/svm/
A Dsvmdebug.c30 void svm_vmcb_dump(const char *from, const struct vmcb_struct *vmcb) in svm_vmcb_dump() argument
41 printk("Dumping guest's current state at %s...\n", from); in svm_vmcb_dump()
102 bool svm_vmcb_isvalid(const char *from, const struct vmcb_struct *vmcb, in svm_vmcb_isvalid() argument
114 printk(XENLOG_GUEST "%pv[%s]: " fmt, v, from, ## args); \ in svm_vmcb_isvalid()
/xen/tools/include/xen-external/
A DREADME5 copying new versions from the source location, as documented below:
11 Obtained from the FreeBSD SVN using the following commands:
/xen/docs/features/
A Dfeature-levelling.pandoc42 a host reboot. Xen recalculates all information from scratch each boot, and
46 information from relevant hosts and compute appropriate feature specifications
57 fault, complicating the task of hiding hardware features from guests.
94 AMD CPUs from the `K8` onwards support _Feature Override_ MSRs, which allow
108 Intel CPUs from `IvyBridge` onwards have _CPUID Faulting_, which allows Xen to
122 `xen/include/asm-x86/cpuid-autogen.h` from
135 values are picked from the *host_featureset*.
163 preventing a guest from using 1GB superpages if the hardware supports it.
165 Some information simply cannot be hidden from guests. There is no way to
191 The CPUID policy is currently regenerated from scratch by the receiving side,

Completed in 44 milliseconds

123456789