Home
last modified time | relevance | path

Searched refs:jump (Results 1 – 15 of 15) sorted by relevance

/xen/xen/arch/x86/pv/
A Demul-gate-op.c174 int jump = -1, rc = X86EMUL_OKAY; in pv_emulate_gate_op() local
224 ++jump; in pv_emulate_gate_op()
227 ++jump; in pv_emulate_gate_op()
238 ++jump; in pv_emulate_gate_op()
241 ++jump; in pv_emulate_gate_op()
260 jump < 0 || in pv_emulate_gate_op()
271 (!jump || (ar & _SEGMENT_EC) ? in pv_emulate_gate_op()
289 if ( !jump ) in pv_emulate_gate_op()
/xen/xen/tools/kconfig/
A Dmenu.c706 struct jump_key *jump = NULL; in get_prompt_str() local
718 jump = xmalloc(sizeof(struct jump_key)); in get_prompt_str()
727 jump->target = prop->menu; in get_prompt_str()
729 jump->target = location; in get_prompt_str()
732 jump->index = 0; in get_prompt_str()
734 jump->index = list_entry(head->prev, struct jump_key, in get_prompt_str()
737 list_add_tail(&jump->entries, head); in get_prompt_str()
744 if (jump && menu == location) in get_prompt_str()
745 jump->offset = strlen(r->s); in get_prompt_str()
/xen/xen/arch/x86/
A Darch.mk46 CFLAGS-$(CONFIG_INDIRECT_THUNK) += -fno-jump-tables
A Dbzimage.c26 uint16_t jump; member
A DKconfig111 call/jump COP/JOP) attacks. Shadow Stacks are one CET feature
/xen/docs/misc/
A Dpvh.pandoc5 builder how to load and jump into the kernel entry point:
13 jump into the entry point defined at `XEN_ELFNOTE_PHYS32_ENTRY` with the
A Dlivepatch.pandoc22 * trampoline - a jump to a new instruction.
81 The second mechanism is by ti replace the call or jump to the
84 A third mechanism is to add a jump to the new function at the
154 existing function to be patched to jump directly to the new code. This
156 CPU branching logic (I-cache, but it is just one unconditional jump).
177 old `do_xen_version` function to directly jump to the new `do_xen_version`:
191 In summary this example patched the affected function to jump to the
197 * Optionally we can insert in the old function a trampoline jump to an function
200 The disadvantage of this are that the unconditional jump will consume a small
1021 as well. And switch-style jump tables.
/xen/tools/xcutils/
A Dreadnotes.c33 uint16_t jump; member
/xen/docs/hypervisor-guide/x86/
A Dhow-xen-boots.rst69 it at the 2M boundary and jump to ``start`` which is the identified entry
/xen/tools/libxc/
A Dxc_dom_bzimageloader.c610 uint16_t jump; member
/xen/tools/python/
A Dpylintrc36 # to jump to the line corresponding to a message.
/xen/xen/common/
A DKconfig104 following a conditional jump.
/xen/stubdom/
A Dnewlib.patch82 Define the basic ia64 jump buffer
/xen/tools/firmware/rombios/
A Drombios.c4125 ;; far jump to flush CPU queue after transition to protected mode
4152 ;; far jump to flush CPU queue after transition to real mode
8947 jz f0_missing ;; jump if no drive0
8956 jz f1_missing ;; jump if no drive1
10313 ;; far jump to flush CPU queue after transition to real mode
10796 ;; 0x05 = eoi + jmp via [0x40:0x67] jump
10800 ;; 0x0A = jmp via [0x40:0x67] jump
/xen/stubdom/grub.patches/
A D61btrfs.diff2764 + * jump to the next level

Completed in 28 milliseconds