Lines Matching refs:hypercall
8 # executing the hypercall, and the target is the xen initial sid (type xen_t).
45 # kexec hypercall
64 # mca hypercall
70 # tmem hypercall (any access)
110 # domain executing the hypercall, and the target is the domain being operated on
163 hypercall
195 # source = the domain making the hypercall
199 # source = the domain making the hypercall
208 # source = the domain making the hypercall
212 # source = the domain making the hypercall
273 # source = the domain making the hypercall
320 # source = domain making the hypercall
353 # source = domain making the hypercall (which might not own the page table)
357 # source = domain making the hypercall
378 # source = domain making the hypercall
381 # the mmuext_op hypercall acting on the target domain
384 # source = domain making the hypercall
415 # source = domain making the hypercall
420 # source = domain making the hypercall
424 # source = domain making the hypercall
461 # source = domain making the hypercall
481 # are accessed using the xsm_op hypercall. The source is the domain invoking
482 # the hypercall, and the target is security_t.
512 # Class version is used to describe the XENVER_ hypercall.