/xen/tools/firmware/hvmloader/ |
A D | xenbus.c | 76 evtchn_send_t send; in xenbus_shutdown() local 82 send.port = event; in xenbus_shutdown() 83 hypercall_event_channel_op(EVTCHNOP_send, &send); in xenbus_shutdown() 184 evtchn_send_t send; in xenbus_send() local 214 send.port = event; in xenbus_send() 215 hypercall_event_channel_op(EVTCHNOP_send, &send); in xenbus_send()
|
/xen/tools/flask/policy/modules/ |
A D | guest_features.te | 8 # and send messages to rings. 10 allow domain_type domain_type:argo { send register_single_source };
|
A D | xen.te | 75 neverallow * ~event_type:event { create send status };
|
A D | xen.if | 114 allow $1 $3:event { create send status };
|
/xen/xen/include/asm-x86/guest/ |
A D | xen-hcall.h | 146 struct evtchn_send send = { .port = port }; in xen_hypercall_evtchn_send() local 148 return xen_hypercall_event_channel_op(EVTCHNOP_send, &send); in xen_hypercall_evtchn_send()
|
/xen/docs/man/ |
A D | xenstore-read.1.pod | 32 https://wiki.xenproject.org/wiki/Reporting_Bugs_against_Xen_Project on how to send bug reports.
|
A D | xenstore-write.1.pod | 29 https://wiki.xenproject.org/wiki/Reporting_Bugs_against_Xen_Project on how to send bug reports.
|
A D | xenstore.1.pod | 52 https://wiki.xenproject.org/wiki/Reporting_Bugs_against_Xen_Project on how to send bug reports.
|
A D | xenstore-chmod.1.pod | 62 https://wiki.xenproject.org/wiki/Reporting_Bugs_against_Xen_Project on how to send bug reports.
|
A D | xenstore-ls.1.pod | 62 https://wiki.xenproject.org/wiki/Reporting_Bugs_against_Xen_Project on how to send bug reports.
|
/xen/tools/misc/ |
A D | xencons | 52 sock.send(data)
|
/xen/docs/designs/ |
A D | argo.pandoc | 68 2. Avoidance of DoS of rings by domains that are not authorized to send to them 74 ring-registering domain has authorized to send data via the ring. The complete 200 send to, are destroyed. 244 * Any domain that is allowed to send to the ring -- so that's the partner 251 Protects: the per-domain send hash table of `argo_send_info` structs. 257 * The domain that has been allowed to send, as part of teardown when the domain 271 its wildcard rings - this can be done by attempting a send operation when there 418 The 'send hashtable' data structure is needed in order to perform the teardown
|
A D | qemu-deprivilege.md | 148 - "Every process except me to which I am allowed to send a signal" (-1) 185 > For a process to have permission to send a signal to a process 231 QEMU, which a compromised QEMU could simply not send (thus preventing
|
/xen/m4/ |
A D | README.source | 20 Do not modify this file yourself, if you want to evolve it send
|
/xen/xen/include/public/ |
A D | event_channel.h | 333 struct evtchn_send send; member
|
/xen/tools/libxl/ |
A D | libxl_colo_proxy.c | 91 ret = send(cps->sock_fd, (uint8_t *)&len, sizeof(len), 0); in colo_userspace_proxy_send() 96 ret = send(cps->sock_fd, (uint8_t *)buff, size, 0); in colo_userspace_proxy_send()
|
/xen/xen/arch/x86/pv/ |
A D | shim.c | 622 struct evtchn_send send; in pv_shim_event_channel_op() local 624 if ( copy_from_guest(&send, arg, 1) != 0 ) in pv_shim_event_channel_op() 627 if ( pv_console && send.port == pv_console_evtchn() ) in pv_shim_event_channel_op() 633 rc = xen_hypercall_event_channel_op(EVTCHNOP_send, &send); in pv_shim_event_channel_op()
|
/xen/tools/examples/ |
A D | README | 9 send it (preferably with a little summary to go in this file) to
|
/xen/docs/misc/ |
A D | pv-drivers-lifecycle.pandoc | 12 design document and send it to xen-devel. It should cover the xenstore
|
A D | crashdb.txt | 36 * Disconnect from minicom without allowing minicom to send any
|
A D | 9pfs.pandoc | 48 the client to send commands to the server. The PV backend is used by the 49 9pfs server to receive commands from clients and send back responses. 180 which are used to send notifications.
|
/xen/tools/ocaml/libs/xs/ |
A D | xsraw.ml | 86 (* send one packet - can sleep *) 137 (* send one packet in the queue, and wait for reply *)
|
/xen/stubdom/ |
A D | lwip.patch-cvs | 126 /* Trigger select() in socket layer. This send should something else so the 799 + * @param p the (IP) packet to 'send' 800 + * @param ipaddr the ip address to send the packet to (not used) 1178 - /* The send MSS is updated when an MSS option is received. */ 1179 + /* As initial send MSS, we use TCP_MSS but limit it to 536. 1180 + The send MSS is updated when an MSS option is received. */ 1188 - /* The send MSS is updated when an MSS option is received. */ 1189 + /* As initial send MSS, we use TCP_MSS but limit it to 536. 1190 + The send MSS is updated when an MSS option is received. */ 2285 - * @param p the (IP) packet to 'send' [all …]
|
/xen/xen/common/ |
A D | event_channel.c | 1231 struct evtchn_send send; in do_event_channel_op() local 1232 if ( copy_from_guest(&send, arg, 1) != 0 ) in do_event_channel_op() 1234 rc = evtchn_send(current->domain, send.port); in do_event_channel_op()
|
/xen/tools/ocaml/libs/xb/ |
A D | xb.ml | 115 (* send data from s, and save the unsent data to partial_out *)
|