Home
last modified time | relevance | path

Searched refs:a (Results 1 – 25 of 488) sorted by relevance

12345678910>>...20

/xen-4.10.0-shim-comet/xen/include/acpi/
A Dacmacros.h57 #define ACPI_MIN(a,b) (((a)<(b))?(a):(b)) argument
58 #define ACPI_MAX(a,b) (((a)>(b))?(a):(b)) argument
347 (a) & 0xFF, ((a) >> 8) & 0xFF, ((a) >> 16) & 0xFF, ((a) >> 24) & 0xFF, \
380 #define ACPI_DISASM_ONLY_MEMBERS(a) a; argument
393 #define ARGI_LIST1(a) (ARG_1(a)) argument
400 #define ARGP_LIST1(a) (ARG_1(a)) argument
513 #define ACPI_DO_WHILE0(a) a argument
589 #define ACPI_DEBUG_EXEC(a) a argument
592 #define ACPI_DEBUG_DEFINE(a) a; argument
593 #define ACPI_DEBUG_ONLY_MEMBERS(a) a; argument
[all …]
/xen-4.10.0-shim-comet/tools/blktap2/drivers/
A Dmd5.c199 register uint32_t a, b, c, d; in MD5Transform() local
201 a = buf[0]; in MD5Transform()
206 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in MD5Transform()
210 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in MD5Transform()
214 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); in MD5Transform()
223 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in MD5Transform()
224 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in MD5Transform()
227 MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); in MD5Transform()
231 MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); in MD5Transform()
236 MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9); in MD5Transform()
[all …]
/xen-4.10.0-shim-comet/xen/arch/x86/
A Dalternative.c151 const struct alt_instr *a; in apply_alternatives() local
166 for ( a = start; a < end; a++ ) in apply_alternatives()
168 instr = (u8 *)&a->instr_offset + a->instr_offset; in apply_alternatives()
169 replacement = (u8 *)&a->repl_offset + a->repl_offset; in apply_alternatives()
170 BUG_ON(a->replacementlen > a->instrlen); in apply_alternatives()
171 BUG_ON(a->instrlen > sizeof(insnbuf)); in apply_alternatives()
172 BUG_ON(a->cpuid >= NCAPINTS * 32); in apply_alternatives()
173 if ( !boot_cpu_has(a->cpuid) ) in apply_alternatives()
182 add_nops(insnbuf + a->replacementlen, in apply_alternatives()
183 a->instrlen - a->replacementlen); in apply_alternatives()
[all …]
/xen-4.10.0-shim-comet/tools/ocaml/xenstored/
A Dtrie.mli18 type ('a, 'b) t
20 Internally, a trie is represented as a labeled tree, where node contains values
26 val mem : ('a,'b) t -> 'a list -> bool
30 val find : ('a, 'b) t -> 'a list -> 'b
34 val set : ('a, 'b) t -> 'a list -> 'b -> ('a, 'b) t
37 val unset : ('a, 'b) t -> 'a list -> ('a, 'b) t
42 val iter : ('a -> 'b option -> unit) -> ('a, 'b) t -> unit
47 val iter_path : ('a -> 'b option -> unit) -> ('a, 'b) t -> 'a list -> unit
51 val fold : ('a -> 'b option -> 'c -> 'c) -> ('a, 'b) t -> 'c -> 'c
54 val map : ('b -> 'c option) -> ('a,'b) t -> ('a,'c) t
[all …]
/xen-4.10.0-shim-comet/xen/include/efi/
A Defidevp.h44 #define DP_IS_END_TYPE(a) argument
45 #define DP_IS_END_SUBTYPE(a) ( ((a)->SubType == END_ENTIRE_DEVICE_PATH_SUBTYPE ) argument
47 #define DevicePathType(a) ( ((a)->Type) & EFI_DP_TYPE_MASK ) argument
48 #define DevicePathSubType(a) ( (a)->SubType ) argument
49 #define DevicePathNodeLength(a) ( ((a)->Length[0]) | ((a)->Length[1] << 8) ) argument
50 #define NextDevicePathNode(a) ( (EFI_DEVICE_PATH *) ( ((UINT8 *) (a)) + DevicePathNodeLength( argument
52 #define IsDevicePathEndType(a) ( DevicePathType(a) == END_DEVICE_PATH_TYPE ) argument
53 #define IsDevicePathEndSubType(a) ( (a)->SubType == END_ENTIRE_DEVICE_PATH_SUBTYPE ) argument
54 #define IsDevicePathEnd(a) ( IsDevicePathEndType(a) && IsDevicePathEndSubType(a) ) argument
55 #define IsDevicePathUnpacked(a) ( (a)->Type & EFI_DP_TYPE_UNPACKED ) argument
[all …]
/xen-4.10.0-shim-comet/xen/arch/arm/
A Dhvm.c43 struct xen_hvm_param a; in do_hvm_op() local
46 if ( copy_from_guest(&a, arg, 1) ) in do_hvm_op()
49 if ( a.index >= HVM_NR_PARAMS ) in do_hvm_op()
52 d = rcu_lock_domain_by_any_id(a.domid); in do_hvm_op()
62 d->arch.hvm_domain.params[a.index] = a.value; in do_hvm_op()
66 a.value = d->arch.hvm_domain.params[a.index]; in do_hvm_op()
67 rc = copy_to_guest(arg, &a, 1) ? -EFAULT : 0; in do_hvm_op()
/xen-4.10.0-shim-comet/tools/xenstore/
A Dutils.h8 #define streq(a,b) (strcmp((a),(b)) == 0) argument
11 #define strstarts(a,b) (strncmp((a),(b),strlen(b)) == 0) argument
14 static inline bool strends(const char *a, const char *b) in strends() argument
16 if (strlen(a) < strlen(b)) in strends()
19 return streq(a + strlen(a) - strlen(b), b); in strends()
A DCOPYING68 effectively restrict the users of a free program by obtaining a
81 a shared library, the combination of the two is legally speaking a
105 programs enables a greater number of people to use a large body of
138 copyright law: that is to say, a work containing the Library or a
165 You may charge a fee for the physical act of transferring a copy,
174 a) The modified work must itself be a software library.
182 d) If a facility in the modified Library refers to a function or a
232 the Library into a program that is not a library.
249 linked with it, is called a "work that uses the Library". Such a
279 link a "work that uses the Library" with the Library to produce a
[all …]
A Dtalloc_guide.txt11 as talloc has changed a lot.
18 between a "talloc context" and a "talloc pointer". Any pointer
63 memory context and a type, and returns a pointer to a new area of
202 name on a pointer in as a way of "marking" pointers in your code.
259 This function creates a zero length named talloc context as a top
268 This is a utility macro that creates a new memory context hanging
308 memory for a longer time.
407 Here is a typical full report:
515 instead of a type.
531 This is a handy utility function that returns a talloc context
[all …]
/xen-4.10.0-shim-comet/xen/common/
A Dmemory.c106 !guest_handle_subrange_okay(a->extent_list, a->nr_done, in increase_reservation()
113 for ( i = a->nr_done; i < a->nr_extents; i++ ) in increase_reservation()
121 page = alloc_domheap_pages(d, a->extent_order, a->memflags); in increase_reservation()
126 a->extent_order, d->domain_id, a->memflags, in increase_reservation()
142 a->nr_done = i; in increase_reservation()
154 if ( !guest_handle_subrange_okay(a->extent_list, a->nr_done, in populate_physmap()
183 for ( i = a->nr_done; i < a->nr_extents; i++ ) in populate_physmap()
277 a->nr_done = i; in populate_physmap()
392 if ( !guest_handle_subrange_okay(a->extent_list, a->nr_done, in decrease_reservation()
397 for ( i = a->nr_done; i < a->nr_extents; i++ ) in decrease_reservation()
[all …]
/xen-4.10.0-shim-comet/tools/include/xen-foreign/
A Dmkchecker.py24 for a in archs:
25 f.write('#include "%s.h"\n' % a);
31 for a in archs:
32 f.write('\tprintf("%%8s", "%s");\n' % a);
38 for a in archs:
39 s = struct + "_" + a;
40 if compat_arches.has_key(a):
41 compat = compat_arches[a]
45 f.write('#ifdef %s_has_no_%s\n' % (a, struct));
/xen-4.10.0-shim-comet/xen/include/asm-x86/
A Ddesc.h106 u32 a, b; member
110 u64 a, b; member
125 gate->a = new->a; in _write_gate_lower()
130 (gate_addr)->a = 0; \
135 (gate_addr)->a = \
149 idte.a = in _set_gate_lower()
164 idte.a = gate->a; in _update_gate_addr_lower()
167 idte.a &= 0x0000FFFFFFFF0000ULL; in _update_gate_addr_lower()
168 idte.a |= (((unsigned long)(addr) & 0xFFFF0000UL) << 32) | in _update_gate_addr_lower()
178 (desc)[0].a = \
[all …]
/xen-4.10.0-shim-comet/tools/libfsimage/zfs/
A Dzfs_fletcher.c67 uint64_t a, b, c, d; in fletcher_4_native() local
69 for (a = b = c = d = 0; ip < ipend; ip++) { in fletcher_4_native()
70 a += ip[0]; in fletcher_4_native()
71 b += a; in fletcher_4_native()
76 ZIO_SET_CHECKSUM(zcp, a, b, c, d); in fletcher_4_native()
84 uint64_t a, b, c, d; in fletcher_4_byteswap() local
86 for (a = b = c = d = 0; ip < ipend; ip++) { in fletcher_4_byteswap()
87 a += BSWAP_32(ip[0]); in fletcher_4_byteswap()
88 b += a; in fletcher_4_byteswap()
93 ZIO_SET_CHECKSUM(zcp, a, b, c, d); in fletcher_4_byteswap()
/xen-4.10.0-shim-comet/xen/include/acpi/platform/
A Daclinux.h82 #define ACPI_ALLOCATE(a) acpi_os_alloc_memory(a) argument
83 #define ACPI_ALLOCATE_ZEROED(a) acpi_os_zalloc_memory(a) argument
84 #define ACPI_FREE(a) acpi_os_free_memory(a) argument
/xen-4.10.0-shim-comet/docs/man/
A Dxen-tscmode.pod.7129 sometimes used as a random number or a unique sequence identifier,
138 apps were ported from a uniprocessor to an SMP environment; as a result,
173 synchronize TSC across a data center or even a pool of machines. As
174 a result, when run in a virtualized environment, rare and obscure
177 example, a 3GHz
190 To provide a "safe" TSC, i.e. to ensure both TSC monotonicity and a
227 running on a TSC-unsafe processor or a processor that doesn't support
268 across all the machines in a pool or data center, a migration may "break"
283 ("pvcpuid") and also trap to Xen. But apps in a PV guest that use a
302 As a result, as of 4.0, Xen provides capabilities for a userland app
[all …]
A Dxen-vtpm.pod.712 The goal of this work is to provide a TPM functionality to a virtual guest
13 operating system (a DomU). This allows programs to interact with a TPM in a
87 A mini-os stub domain that implements a vTPM. There is a
97 implement a mini-os domain that wishes to use a vTPM of
150 a later time. If a vTPM gets an error when loading its key, it will currently
151 generate a fresh vTPM image (with a new EK, SRK, and blank NVRAM).
175 virtual machine and requires a config file. The manager requires a disk image
228 While attaching a vTPM after a guest is booted (using xl vtpm-attach) is
232 configuration. Attaching a vTPM to a running domain should only be used for
280 log). Guests wishing to use a custom kernel in such a secure environment are
[all …]
/xen-4.10.0-shim-comet/docs/features/
A Dlivepatch.pandoc31 declare live patching as a 'Supported' feature on x86.
40 guests and it shall be treated as a security issue if this is not
47 functions are patched), it shall be treated as a security issue.
67 because the it can only be triggered by a privileged domain.
69 6) Bugs which allow a guest to prevent the application of a livepatch:
70 A guest should not be able to prevent the application of a live
72 of a live patch despite pausing it (xl pause ...), it shall be
73 treated as a security issue.
85 There is a caveat -- an incorrect live patch can introduce a guest->host
98 There is a caveat -- an incorrect live patch can introduce an
[all …]
/xen-4.10.0-shim-comet/tools/ocaml/
A DLICENSE4 As a special exception to the GNU Lesser General Public License, you
5 may link, statically or dynamically, a "work that uses the Library"
6 with a publicly distributed version of the Library to produce an
11 we mean either the unmodified Library as distributed, or a
48a constant threat to the existence of any free program. We wish to make sure that a company cannot…
78 You may charge a fee for the physical act of transferring a copy, and you may at your option offer …
83 a) The modified work must itself be a software library.
99 …useful when you wish to copy part of the code of the Library into a program that is not a library.
122 …the work with a written offer, valid for at least three years, to give the same user the materials…
124 … Verify that the user has already received a copy of these materials or that you have already sent…
[all …]
/xen-4.10.0-shim-comet/docs/specs/
A Dlibxl-migration-stream.pandoc35 This design addresses the above points, allowing for a completely
44 included in a future draft.
98 A record has a record header, type specific data and a trailing footer. If
284 a. Suspend primary vm
288 a. Read _CHECKPOINT\_SVM\_READY_ from secondary
291 4. Wait a new checkpoint
292 a. Send _CHECKPOINT\_NEW_ to secondary
297 a. Send _CHECKPOINT\_SVM\_READY_ to primary
300 2. Wait a new checkpoint
301 a. Read _CHECKPOINT\_NEW_ from primary
[all …]
/xen-4.10.0-shim-comet/tools/firmware/vgabios/
A DCOPYING61 effectively restrict the users of a free program by obtaining a
74 a shared library, the combination of the two is legally speaking a
98 programs enables a greater number of people to use a large body of
131 copyright law: that is to say, a work containing the Library or a
158 You may charge a fee for the physical act of transferring a copy,
167 a) The modified work must itself be a software library.
175 d) If a facility in the modified Library refers to a function or a
225 the Library into a program that is not a library.
242 linked with it, is called a "work that uses the Library". Such a
272 link a "work that uses the Library" with the Library to produce a
[all …]
/xen-4.10.0-shim-comet/tools/xenstat/libxenstat/
A DCOPYING63 effectively restrict the users of a free program by obtaining a
76 a shared library, the combination of the two is legally speaking a
100 programs enables a greater number of people to use a large body of
133 copyright law: that is to say, a work containing the Library or a
160 You may charge a fee for the physical act of transferring a copy,
169 a) The modified work must itself be a software library.
177 d) If a facility in the modified Library refers to a function or a
227 the Library into a program that is not a library.
244 linked with it, is called a "work that uses the Library". Such a
274 link a "work that uses the Library" with the Library to produce a
[all …]
/xen-4.10.0-shim-comet/tools/python/
A Dpylintrc16 # Add <file or directory> to the black list. It should be a base name, not a
36 # to jump to the line corresponding to a message.
102 # not require a docstring
110 module-rgx=(([a-z_][a-z0-9_]*)|([A-Z][a-zA-Z0-9]+))$
113 class-rgx=[A-Z_][a-zA-Z0-9]+$
116 function-rgx=[a-z_][A-Za-z0-9_]*$
119 method-rgx=[a-z_][A-Za-z0-9_]*$
122 argument-rgx=[a-z_][A-Za-z0-9_]*$
125 variable-rgx=[a-z_][A-Za-z0-9_]*$
251 # Maximum number of lines in a module
[all …]
/xen-4.10.0-shim-comet/tools/libacpi/
A DCOPYING71 effectively restrict the users of a free program by obtaining a
84 a shared library, the combination of the two is legally speaking a
108 programs enables a greater number of people to use a large body of
141 copyright law: that is to say, a work containing the Library or a
168 You may charge a fee for the physical act of transferring a copy,
177 a) The modified work must itself be a software library.
185 d) If a facility in the modified Library refers to a function or a
235 the Library into a program that is not a library.
252 linked with it, is called a "work that uses the Library". Such a
282 link a "work that uses the Library" with the Library to produce a
[all …]
/xen-4.10.0-shim-comet/tools/libxc/
A DCOPYING70 effectively restrict the users of a free program by obtaining a
83 a shared library, the combination of the two is legally speaking a
107 programs enables a greater number of people to use a large body of
140 copyright law: that is to say, a work containing the Library or a
167 You may charge a fee for the physical act of transferring a copy,
176 a) The modified work must itself be a software library.
184 d) If a facility in the modified Library refers to a function or a
234 the Library into a program that is not a library.
251 linked with it, is called a "work that uses the Library". Such a
281 link a "work that uses the Library" with the Library to produce a
[all …]
/xen-4.10.0-shim-comet/xen/common/libelf/
A DCOPYING70 effectively restrict the users of a free program by obtaining a
83 a shared library, the combination of the two is legally speaking a
107 programs enables a greater number of people to use a large body of
140 copyright law: that is to say, a work containing the Library or a
167 You may charge a fee for the physical act of transferring a copy,
176 a) The modified work must itself be a software library.
184 d) If a facility in the modified Library refers to a function or a
234 the Library into a program that is not a library.
251 linked with it, is called a "work that uses the Library". Such a
281 link a "work that uses the Library" with the Library to produce a
[all …]

Completed in 53 milliseconds

12345678910>>...20