/xen/tools/libs/gnttab/ |
A D | gntshr_core.c | 74 int count, uint32_t *refs, int writable) in xengntshr_share_pages() argument 76 return osdep_gntshr_share_pages(xcg, domid, count, refs, writable, -1, -1); in xengntshr_share_pages() 80 uint32_t *ref, int writable, in xengntshr_share_page_notify() argument 84 return osdep_gntshr_share_pages(xcg, domid, 1, ref, writable, in xengntshr_share_page_notify()
|
A D | gntshr_unimp.c | 36 int count, uint32_t *refs, int writable) in xengntshr_share_pages() argument 42 uint32_t *ref, int writable, in xengntshr_share_page_notify() argument
|
A D | private.h | 56 uint32_t *refs, int writable,
|
A D | freebsd.c | 232 uint32_t *refs, int writable, in osdep_gntshr_share_pages() argument 247 gref_info.flags = writable ? GNTDEV_ALLOC_FLAG_WRITABLE : 0; in osdep_gntshr_share_pages()
|
A D | linux.c | 446 uint32_t *refs, int writable, in osdep_gntshr_share_pages() argument 460 gref_info->flags = writable ? GNTALLOC_FLAG_WRITABLE : 0; in osdep_gntshr_share_pages()
|
/xen/tools/libxc/ |
A D | xc_gnttab_compat.c | 84 int count, uint32_t *refs, int writable) in xc_gntshr_share_pages() argument 86 return xengntshr_share_pages(xcg, domid, count, refs, writable); in xc_gntshr_share_pages() 90 uint32_t *ref, int writable, in xc_gntshr_share_page_notify() argument 94 return xengntshr_share_page_notify(xcg, domid, ref, writable, in xc_gntshr_share_page_notify()
|
/xen/tools/libs/gnttab/include/ |
A D | xengnttab.h | 432 int count, uint32_t *refs, int writable); 447 uint32_t *ref, int writable,
|
/xen/tools/libxc/include/ |
A D | xenctrl_compat.h | 114 int count, uint32_t *refs, int writable); 116 uint32_t *ref, int writable,
|
/xen/docs/misc/ |
A D | hypfs-paths.pandoc | 26 either set by the hypervisor or, if the file is writable, can be set 52 * w -- Path is writable by the user. This capability is usually 67 The entry would be writable and it would exist on X86 only and only if the
|
A D | xenstore-paths.pandoc | 91 * w -- Path is writable by the containing domain, that is the domain 127 domain it would not usually be writable by the domain. The tools will 128 create writable subdirectories as necessary. 186 the path does not exist then the ~/device path will be writable by the 278 read-only to the guest. However it may writable if the 505 A domain writable path. Available for arbitrary domain use. 553 A domain writable path used by some PV drivers to pass error messages
|
A D | livepatch.pandoc | 1042 In place patching writable data is not suitable as it is unclear what should be done 1235 In place patching writable data is not suitable as it is unclear what should be done
|
/xen/docs/features/ |
A D | hypervisorfs.pandoc | 37 a writable entry can be modified. With:
|
/xen/xen/arch/x86/hvm/ |
A D | hvm.c | 2646 bool_t *writable) in _hvm_map_guest_frame() argument 2656 if ( writable ) in _hvm_map_guest_frame() 2660 *writable = 0; in _hvm_map_guest_frame() 2668 if ( writable && *writable ) in _hvm_map_guest_frame() 2691 bool_t *writable) in hvm_map_guest_frame_rw() argument 2693 *writable = 1; in hvm_map_guest_frame_rw() 2694 return _hvm_map_guest_frame(gfn, permanent, writable); in hvm_map_guest_frame_rw() 2746 static void *hvm_map_entry(unsigned long va, bool_t *writable) in hvm_map_entry() argument 2769 v = hvm_map_guest_frame_rw(gfn, 0, writable); in hvm_map_entry() 2791 bool_t writable; in task_switch_load_seg() local [all …]
|
/xen/tools/ocaml/xenstored/ |
A D | oxenstored.conf.in | 33 # involve a set of nodes that is writable by at most one other domain,
|
/xen/xen/arch/x86/hvm/vmx/ |
A D | vvmx.c | 1798 bool_t writable; in nvmx_handle_vmptrld() local 1799 void *vvmcx = hvm_map_guest_frame_rw(paddr_to_pfn(gpa), 1, &writable); in nvmx_handle_vmptrld() 1803 if ( writable ) in nvmx_handle_vmptrld() 1907 bool_t writable; in nvmx_handle_vmclear() local 1909 vvmcs = hvm_map_guest_frame_rw(paddr_to_pfn(gpa), 0, &writable); in nvmx_handle_vmclear() 1917 if ( writable ) in nvmx_handle_vmclear()
|
/xen/xen/arch/x86/hvm/svm/ |
A D | nestedsvm.c | 79 bool_t writable; in nestedsvm_vmcb_map() local 81 &writable); in nestedsvm_vmcb_map() 85 if ( !writable ) in nestedsvm_vmcb_map()
|
/xen/xen/include/asm-x86/hvm/ |
A D | hvm.h | 319 bool_t *writable);
|
/xen/docs/man/ |
A D | xl.cfg.5.pod.in | 640 For a PV domain, all writable pages assigned to the domain are identity 675 making the whole xenstore B<device> sub-tree writable by the domain will
|