/xen/xen/arch/x86/hvm/ |
A D | emulate.c | 579 void *err, *mapping; in hvmemul_map_linear_addr() local 720 vunmap(mapping); in hvmemul_unmap_linear_addr() 1355 void *mapping = NULL; in hvmemul_write() local 1374 if ( !mapping ) in hvmemul_write() 1404 void *mapping = NULL; in hvmemul_rmw() local 1423 if ( mapping ) in hvmemul_rmw() 1458 void *mapping = NULL; in hvmemul_blk() local 1476 if ( !mapping ) in hvmemul_blk() 1604 void *mapping = NULL; in hvmemul_cmpxchg() local 1623 if ( !mapping ) in hvmemul_cmpxchg() [all …]
|
/xen/xen/arch/x86/x86_64/compat/ |
A D | mm.c | 100 struct compat_machphys_mapping mapping = { in compat_arch_memory_op() local 106 if ( copy_to_guest(arg, &mapping, 1) ) in compat_arch_memory_op()
|
/xen/tools/libxc/ |
A D | xc_sr_restore.c | 212 void *mapping = NULL, *guest_page = NULL; in process_page_data() local 261 mapping = guest_page = xenforeignmemory_map( in process_page_data() 264 if ( !mapping ) in process_page_data() 322 if ( mapping ) in process_page_data() 323 xenforeignmemory_unmap(xch->fmem, mapping, nr_pages); in process_page_data()
|
/xen/xen/arch/arm/ |
A D | mm.c | 228 lpae_t pte, *mapping; in dump_pt_walk() local 255 mapping = map_domain_page(mfn_add(root_mfn, root_table)); in dump_pt_walk() 262 pte = mapping[offsets[level]]; in dump_pt_walk() 271 unmap_domain_page(mapping); in dump_pt_walk() 272 mapping = map_domain_page(lpae_get_mfn(pte)); in dump_pt_walk() 275 unmap_domain_page(mapping); in dump_pt_walk()
|
A D | domain.c | 1025 PROGRESS(mapping): in domain_relinquish_resources()
|
/xen/xen/common/ |
A D | domain.c | 1235 void *mapping; in map_vcpu_info() local 1269 mapping = __map_domain_page_global(page); in map_vcpu_info() 1270 if ( mapping == NULL ) in map_vcpu_info() 1276 new_info = (vcpu_info_t *)(mapping + offset); in map_vcpu_info()
|
/xen/docs/man/ |
A D | xen-pci-device-reservations.7.pod | 78 used by drivers for mapping grant tables, etc.
|
A D | xen-vtpmmgr.7.pod | 349 one to one mapping between running vtpm-stubdom instances and 373 to the hardware TPM 2.0. Communication is facilitated by mapping
|
A D | xen-vtpm.7.pod | 94 one to one mapping between running vtpm-stubdom instances and 118 the hardware TPM. Communication is facilitated by mapping
|
A D | xl.cfg.5.pod.in | 176 To ask for specific vCPU mapping. That means (in this example), vCPU 0 1307 frame number where the mapping will start in the guest's address space. If 1308 B<GFN> is not specified, the mapping will be performed using B<IOMEM_START> 1309 as a start in the guest's address space, therefore performing a 1:1 mapping
|
A D | xl.1.pod.in | 1749 - Prevent a privileged domain from arbitrarily mapping pages from other
|
/xen/xen/ |
A D | Rules.mk | 93 COV_FLAGS := -fprofile-instr-generate -fcoverage-mapping
|
/xen/docs/misc/ |
A D | netif-staging-grants.pandoc | 412 cannot make assumptions on the mapping transmit or receive grants, hence we 413 need frontend to take initiative into managing its own mapping of grants. 432 data representing amount of free entries in the mapping table. 476 mapping. On the successfull cases, steps 20) 21) and 27) of Guest Transmit are
|
A D | grant-tables.txt | 72 the mapping domain. The index of this entry is returned from the map call, 215 gnttab_query_foreign_access( gref ) will indicate the state of any mapping.
|
A D | xsm-flask.txt | 15 - Prevent a privileged domain from arbitrarily mapping pages from other domains 145 Xen defines a number of operations such as memory mapping that are necessary for
|
A D | pvcalls.pandoc | 656 - backend creates an internal mapping from **id_new** to the new socket
|
A D | xen-command-line.pandoc | 801 subset of the correction by only mapping reserved memory regions rather 1849 belong to and use them for 1:1 mapping. End addresses can be omitted and one
|
/xen/xen/xsm/flask/policy/ |
A D | access_vectors | 341 # restrict the mapping to IO memory will result in the target being domio_t, and 429 # but it is not capable of interrupt mapping:
|
/xen/docs/designs/ |
A D | non-cooperative-migration.md | 83 references (mapping the shared pages) and event channel ports (opening its 155 and optional otherwise. This mapping is not currently transferred in the
|
/xen/tools/libxl/ |
A D | libxl_types.idl | 288 # guest frame number used as a start for the mapping
|
/xen/xen/arch/x86/ |
A D | mm.c | 4900 struct xen_machphys_mapping mapping = { in arch_memory_op() local 4907 mapping.max_mfn = max_page - 1; in arch_memory_op() 4908 if ( copy_to_guest(arg, &mapping, 1) ) in arch_memory_op()
|
/xen/stubdom/grub.patches/ |
A D | 61btrfs.diff | 451 + * field points back to the chunk allocation mapping tree that allocated
|
/xen/tools/firmware/rombios/ |
A D | rombios.c | 9095 ;; no logical CHS mapping used, just physical CHS 9241 ;; no logical CHS mapping used, just physical CHS
|