/xen/tools/debugger/gdbsx/gx/ |
A D | gx_utils.c | 60 gx_convert_int_to_ascii(char *from, char *to, int n) in gx_convert_int_to_ascii() argument 65 ch = *from++; in gx_convert_int_to_ascii() 76 gx_convert_ascii_to_int(char *from, char *to, int n) in gx_convert_ascii_to_int() argument 80 nib1 = gx_fromhex(*from++); in gx_convert_ascii_to_int() 81 nib2 = gx_fromhex(*from++); in gx_convert_ascii_to_int() 94 while ((ch=from[i++]) != ',') { in gx_decode_zZ_packet() 108 while ((ch=from[i++]) != ',') { in gx_decode_m_packet() 113 if ((ch=from[i++]) == 0) in gx_decode_m_packet() 133 while ((ch=from[i++]) != ',') { in gx_decode_M_packet() 137 while ((ch = from[i++]) != ':') { in gx_decode_M_packet() [all …]
|
A D | gx.h | 27 void gx_convert_int_to_ascii (char *from, char *to, int n); 28 void gx_convert_ascii_to_int (char *from, char *to, int n);
|
/xen/xen/arch/x86/ |
A D | usercopy.c | 13 unsigned __copy_to_user_ll(void __user *to, const void *from, unsigned n) in __copy_to_user_ll() argument 43 : [cnt] "+c" (n), [to] "+D" (to), [from] "+S" (from), in __copy_to_user_ll() 52 unsigned __copy_from_user_ll(void *to, const void __user *from, unsigned n) in __copy_from_user_ll() argument 88 : [cnt] "+c" (n), [to] "+D" (to), [from] "+S" (from), in __copy_from_user_ll() 110 unsigned copy_to_user(void __user *to, const void *from, unsigned n) in copy_to_user() argument 113 n = __copy_to_user(to, from, n); in copy_to_user() 168 unsigned copy_from_user(void *to, const void __user *from, unsigned n) in copy_from_user() argument 170 if ( access_ok(from, n) ) in copy_from_user() 171 n = __copy_from_user(to, from, n); in copy_from_user()
|
/xen/xen/include/asm-x86/ |
A D | uaccess.h | 13 unsigned copy_to_user(void *to, const void *from, unsigned len); 15 unsigned copy_from_user(void *to, const void *from, unsigned len); 17 unsigned __copy_to_user_ll(void __user*to, const void *from, unsigned n); 189 __copy_to_user(void __user *to, const void *from, unsigned long n) in __copy_to_user() argument 209 return __copy_to_user_ll(to, from, n); in __copy_to_user() 230 __copy_from_user(void *to, const void __user *from, unsigned long n) in __copy_from_user() argument 237 __get_user_size(*(u8 *)to, from, 1, ret, 1); in __copy_from_user() 240 __get_user_size(*(u16 *)to, from, 2, ret, 2); in __copy_from_user() 243 __get_user_size(*(u32 *)to, from, 4, ret, 4); in __copy_from_user() 246 __get_user_size(*(u64*)to, from, 8, ret, 8); in __copy_from_user() [all …]
|
A D | asm_defns.h | 66 # define _ASM__EXTABLE(sfx, from, to) \ argument 69 .long _ASM_EX(from), _ASM_EX(to) ; \ 72 # define _ASM__EXTABLE(sfx, from, to) \ argument 75 " .long " _ASM_EX(from) ", " _ASM_EX(to) "\n" \ 79 #define _ASM_EXTABLE(from, to) _ASM__EXTABLE(, from, to) argument 80 #define _ASM_PRE_EXTABLE(from, to) _ASM__EXTABLE(.pre, from, to) argument
|
/xen/xen/common/ |
A D | README.source | 5 be complete: in particular for code that has been imported from 10 Originally from https://www.landley.net/code/bunzip-4.1.c 15 This file was originally imported from the Linux tree 21 This file was originally imported from the compcache project at 28 This directory was opriginally imported from the libelf 34 This directory was originally imported from the Device Tree 41 This file was originally imported from the LZ4 project 42 ( http://www.lz4.org). The source is available from 48 This directory was imported from the XZ Utils project
|
/xen/xen/tools/kconfig/tests/err_recursive_inc/ |
A D | expected_stderr | 4 included from: Kconfig.inc3:2 5 included from: Kconfig.inc2:4 6 included from: Kconfig.inc1:5
|
/xen/xen/arch/arm/ |
A D | guestcopy.c | 108 unsigned long raw_copy_to_guest(void *to, const void *from, unsigned len) in raw_copy_to_guest() argument 110 return copy_guest((void *)from, (vaddr_t)to, len, in raw_copy_to_guest() 114 unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, in raw_copy_to_guest_flush_dcache() argument 117 return copy_guest((void *)from, (vaddr_t)to, len, GVA_INFO(current), in raw_copy_to_guest_flush_dcache() 127 unsigned long raw_copy_from_guest(void *to, const void __user *from, unsigned len) in raw_copy_from_guest() argument 129 return copy_guest(to, (vaddr_t)from, len, GVA_INFO(current), in raw_copy_from_guest()
|
/xen/docs/admin-guide/ |
A D | microcode-loading.rst | 37 (XEN) microcode: CPU0 updated from revision 0x1a to 0x25, date = 2018-04-02 38 (XEN) microcode: CPU2 updated from revision 0x1a to 0x25, date = 2018-04-02 39 (XEN) microcode: CPU4 updated from revision 0x1a to 0x25, date = 2018-04-02 40 (XEN) microcode: CPU6 updated from revision 0x1a to 0x25, date = 2018-04-02 43 current microcode version can obtained from with dom0:: 58 Loading microcode from a single file 83 indexing to count from the end. 90 Loading microcode from a Linux initrd 144 (XEN) microcode: CPU0 updated from revision 0x1a to 0x25, date = 2018-04-02 145 (XEN) microcode: CPU2 updated from revision 0x1a to 0x25, date = 2018-04-02 [all …]
|
/xen/m4/ |
A D | README.source | 8 This file was fetched from 15 The pkg-config m4 macro library comes from the upstream pkg-config 25 The last synch was from commit: 31 glib: Fix Makefiles to suppress warnings from automake 34 += in the evaluation to avoid multiple definition warnings from
|
/xen/tools/firmware/etherboot/ |
A D | README | 2 This directory builds gPXE option ROMs from the gPXE source 4 can be reconstructed from source, allowing easier debugging and 22 Previously, an image from Rom-o-matic.net was provided here, fetched 23 from the following URL: 28 from the downloaded image.
|
/xen/docs/misc/ |
A D | x86-xenpv-bootloader.pandoc | 10 In many cases the user wishes to manage this PV bootloader from within 11 the guest, and therefore wishes to chainload something from the guest 16 bootloader to load and the protocol/format expected from the 38 It is allowable for `/boot` to be a separate filesystem from `/` and 45 kernel of a different width from itself, and this extends to 46 chainloading from a stage one. Therefore it is permissible to have
|
A D | pvh.pandoc | 3 Since the Xen entry point into the kernel can be different from the 70 the position of the RSDP in memory (if present) can be fetched from the start 73 Description of paravirtualized devices will come from XenStore, just as it's 78 ### Interrupts from physical devices ### 80 Interrupts from physical devices are delivered using native methods, this is 84 the delivery of interrupts from those devices, using the same interfaces that 87 ### Interrupts from paravirtualized devices ### 89 Interrupts from paravirtualized devices are delivered using event channels, see
|
A D | hvm-emulated-unplug.pandoc | 13 The current protocol works like this (from the point of view of 17 is available by reading a two-byte magic number from IO port `0x10`. 21 2. The drivers read a one-byte protocol version from IO port `0x12`. If 30 5. The drivers check the magic number by reading two bytes from `0x10` 31 again. If it's changed from `0x49d2` to `0xd249`, the drivers are 43 The relevant emulated devices then disappear from the relevant 61 The blacklist is, from qemu's point of view, handled mostly through 64 readable, where `{build_number}` is the build number from step 4 as a
|
A D | printk-formats.txt | 1 Xen custom %p format options. A subset, borrowed from Linux. 39 %pd Domain from a 'struct domain *' 46 %pv Domain and vCPU ID from a 'struct vcpu *'
|
A D | netif-staging-grants.pandoc | 155 14) Backend consume a request from the ring 182 region (linear part of the skb) *only* from the first slot. 210 on the first produced request from frontend. 309 from backend to frontend network stack: 323 from it. 325 4) Create grant copy op from packet page to `gref`. 333 6) Gets a response from the ring for this data slot. 339 9) Gets a request from the ring for the first extra info [optional] 359 17) Consumes a response from the ring (first response for a packet) 583 2017-09-13 3 Xen 4.10 Addressed changes from Paul Durrant [all …]
|
/xen/tools/libxc/ |
A D | xc_dom_x86.c | 91 xen_vaddr_t from; member 168 if ( from < map_cmp->area.to && to > map_cmp->area.from ) in count_pgtables() 177 map->area.from = from & domx86->params->vaddr_mask; in count_pgtables() 198 map->lvls[l].from = map->area.from & ~mask; in count_pgtables() 213 if ( map->lvls[l].from >= map_cmp->lvls[l].from && in count_pgtables() 220 assert(map->lvls[l].from >= map_cmp->lvls[l].from || in count_pgtables() 222 if ( map->lvls[l].from >= map_cmp->lvls[l].from && in count_pgtables() 420 from = map1->lvls[l].from; in setup_pgtables_pv() 431 if ( lvl->from >= to || lvl->to <= from ) in setup_pgtables_pv() 433 p_s = (max(from, lvl->from) - from) >> in setup_pgtables_pv() [all …]
|
/xen/xen/include/asm-x86/hvm/ |
A D | guest_access.h | 4 unsigned int copy_to_user_hvm(void *to, const void *from, unsigned int len); 6 unsigned int copy_from_user_hvm(void *to, const void *from, unsigned int len);
|
/xen/xen/include/asm-x86/hvm/svm/ |
A D | svmdebug.h | 26 void svm_vmcb_dump(const char *from, const struct vmcb_struct *vmcb); 27 bool svm_vmcb_isvalid(const char *from, const struct vmcb_struct *vmcb,
|
/xen/tools/xenstore/ |
A D | README | 1 The following files are imported from the Samba project. We use the versions 2 from Samba 3, the current stable branch.
|
/xen/docs/ |
A D | README.colo | 3 (SVM) run in parallel. They receive the same request from client, and generate 4 response in parallel too. If the response packets from PVM and SVM are
|
/xen/xen/arch/x86/boot/ |
A D | edd.S | 38 # number, interface support map and version results from fn41. The next four 39 # bytes are used to store the legacy cylinders, heads, and sectors from fn08. 40 # The following 74 bytes are used to store the results from fn48. 153 movl %ecx, 4(%bx) # store signature from MBR
|
/xen/xen/arch/x86/hvm/svm/ |
A D | svmdebug.c | 30 void svm_vmcb_dump(const char *from, const struct vmcb_struct *vmcb) in svm_vmcb_dump() argument 41 printk("Dumping guest's current state at %s...\n", from); in svm_vmcb_dump() 102 bool svm_vmcb_isvalid(const char *from, const struct vmcb_struct *vmcb, in svm_vmcb_isvalid() argument 114 printk(XENLOG_GUEST "%pv[%s]: " fmt, v, from, ## args); \ in svm_vmcb_isvalid()
|
/xen/tools/include/xen-external/ |
A D | README | 5 copying new versions from the source location, as documented below: 11 Obtained from the FreeBSD SVN using the following commands:
|
/xen/docs/features/ |
A D | feature-levelling.pandoc | 42 a host reboot. Xen recalculates all information from scratch each boot, and 46 information from relevant hosts and compute appropriate feature specifications 57 fault, complicating the task of hiding hardware features from guests. 94 AMD CPUs from the `K8` onwards support _Feature Override_ MSRs, which allow 108 Intel CPUs from `IvyBridge` onwards have _CPUID Faulting_, which allows Xen to 122 `xen/include/asm-x86/cpuid-autogen.h` from 135 values are picked from the *host_featureset*. 163 preventing a guest from using 1GB superpages if the hardware supports it. 165 Some information simply cannot be hidden from guests. There is no way to 191 The CPUID policy is currently regenerated from scratch by the receiving side,
|