/xen/tools/tests/x86_emulator/ |
A D | simd-sg.c | 216 vec_t x, y, full = (vec_t){} == 0; in sg_test() 228 x = gather(full, array, (idx_t){}, full, 1); in sg_test() 236 x = gather(full, array, idx, full, ELEM_SIZE); in sg_test() 244 x = gather(full, array, idx * ELEM_SIZE, full, 2); in sg_test() 252 x = gather(full, array, inv, full, ELEM_SIZE); in sg_test() 260 y = gather(full, array + ITEM_COUNT, -idx, full, ELEM_SIZE); in sg_test() 274 x = gather(full, array, inv * 2, full, ELEM_SIZE / 2); in sg_test() 310 scatter(out, (idx_t){}, x, full, 1); in sg_test() 317 scatter(out, idx, x, full, ELEM_SIZE); in sg_test() 322 scatter(out, inv, x, full, ELEM_SIZE); in sg_test()
|
/xen/xen/arch/x86/pv/ |
A D | ro-page-fault.c | 86 intpte_t full; in ptwr_emulated_update() local 89 offset = (addr & (sizeof(full) - 1)) * 8; in ptwr_emulated_update() 92 addr &= ~(sizeof(full) - 1); in ptwr_emulated_update() 93 if ( (rc = copy_from_user(&full, (void *)addr, sizeof(full))) != 0 ) in ptwr_emulated_update() 96 addr + sizeof(full) - rc, in ptwr_emulated_update() 101 full &= ~((((intpte_t)1 << (bytes * 8)) - 1) << offset); in ptwr_emulated_update() 105 val |= full; in ptwr_emulated_update() 109 old |= full; in ptwr_emulated_update()
|
/xen/tools/misc/ |
A D | xenperf.c | 79 unsigned int sum, reset = 0, full = 0, pretty = 0; in main() local 90 full = 1; in main() 93 full = 1; in main() 168 if ( full || (pcd[i].nr_vals <= 4) ) in main()
|
/xen/xen/arch/x86/cpu/ |
A D | intel_cacheinfo.c | 90 cpuid_count(4, index, &eax.full, &ebx.full, &ecx.full, &edx); in cpuid4_cache_lookup() 114 cache_eax.full = eax; in find_num_cache_leaves()
|
/xen/xen/include/asm-x86/ |
A D | cpufeature.h | 167 u32 full; member 176 u32 full; member 183 u32 full; member
|
/xen/docs/man/ |
A D | xenstore-ls.1.pod | 18 Show the full path for all keys. 50 subsequent entries. The key owner always has full access (read,
|
A D | xentop.1.pod | 48 =item B<-f>, B<--full-name> 50 output the full domain name (not truncated)
|
A D | xenstore-chmod.1.pod | 40 subsequent entries. The key owner always has full access (read,
|
/xen/xen/drivers/passthrough/amd/ |
A D | iommu_intr.c | 56 } full; member 215 .full = { in update_intremap_entry() 225 ASSERT(!entry.ptr128->full.remap_en); in update_intremap_entry() 263 return entry->full.dest_lo | ((unsigned int)entry->full.dest_hi << 24); in get_full_dest() 330 vector = entry.ptr128->full.vector; in update_intremap_entry_from_ioapic() 495 ? entry.ptr128->full.vector in amd_iommu_read_ioapic_from_ire() 692 msg->data |= MASK_INSR(entry.ptr128->full.vector, in amd_iommu_read_msi_from_ire()
|
/xen/xen/common/xz/ |
A D | dec_lzma2.c | 58 size_t full; member 296 dict->full = 0; in dict_reset() 327 return dict->full > 0 ? dict->buf[offset] : 0; in dict_get() 337 if (dict->full < dict->pos) in dict_put() 338 dict->full = dict->pos; in dict_put() 351 if (dist >= dict->full || dist >= dict->size) in dict_repeat() 367 if (dict->full < dict->pos) in dict_repeat() 368 dict->full = dict->pos; in dict_repeat() 393 if (dict->full < dict->pos) in dict_uncompressed() 394 dict->full = dict->pos; in dict_uncompressed()
|
/xen/xen/arch/x86/oprofile/ |
A D | op_model_ppro.c | 43 unsigned int full; member 84 eax.full = cpuid_eax(0xa); in ppro_setup_ctrs() 299 eax.full = cpuid_eax(0xa); in arch_perfmon_setup_counters()
|
/xen/tools/flask/policy/modules/ |
A D | vm_role.te | 6 # Define some users that must use this role (full type "user_1:vm_r:domU_t").
|
/xen/xen/include/public/hvm/ |
A D | ioreq.h | 94 uint64_t full; member
|
/xen/tools/ |
A D | config.h.in | 102 /* Define to the full name of this package. */ 105 /* Define to the full name and version of this package. */
|
/xen/docs/ |
A D | README.source | 21 See https://creativecommons.org/licenses/by/4.0/ for full details.
|
/xen/docs/hypervisor-guide/x86/ |
A D | how-xen-boots.rst | 34 runtime calls, or full EFI support is included. 63 executable with full debugging symbols. ``xen.gz`` is formed by stripping
|
/xen/xen/tools/kconfig/ |
A D | lexer.l | 5 %option nostdinit noyywrap never-interactive full ecs
|
/xen/docs/admin-guide/ |
A D | introduction.rst | 14 machine which, by default, is granted full permissions [1]_. A typical setup
|
/xen/tools/xenstore/ |
A D | talloc_guide.txt | 380 full tree printout. 399 --leak-report-full command line option. 405 full tree printout. 407 Here is a typical full report: 409 full talloc report on 'root' (total 18 bytes in 8 blocks)
|
/xen/xen/include/acpi/ |
A D | actypes.h | 293 u64 full; member
|
/xen/docs/features/ |
A D | feature-levelling.pandoc | 75 on all `CPUID` instructions, allowing Xen full control over all information. 110 full control over all information, exactly like HVM guests.
|
/xen/docs/misc/ |
A D | dump-core-format.txt | 109 physmap mode. Currently x86 full virtualized domain and 179 XC_CORE_MAGIC_HVM = 0xF00FEBEE for full virtualized domain
|
/xen/ |
A D | CODING_STYLE | 109 letter. Comments containing a single sentence may end with a full 110 stop; comments containing several sentences must have a full stop
|
/xen/tools/ocaml/xenstored/ |
A D | disk.ml | 112 (* don't let the permission get on our way, full perm ! *)
|
/xen/docs/hypervisor-guide/ |
A D | code-coverage.rst | 69 * Use ``xencov_split`` to extract the ``*.gcda`` files. Note that full build
|