Searched refs:controls (Results 1 – 18 of 18) sorted by relevance
/xen-4.10.0-shim-comet/xen/arch/x86/oprofile/ |
A D | nmi_int.c | 105 struct op_msr *controls = msrs->controls; in nmi_cpu_save_registers() local 113 rdmsrl(controls[i].addr, controls[i].value); in nmi_cpu_save_registers() 133 xfree(cpu_msrs[i].controls); in free_msrs() 134 cpu_msrs[i].controls = NULL; in free_msrs() 152 cpu_msrs[i].controls = xmalloc_bytes(controls_size); in allocate_msrs() 153 if (!cpu_msrs[i].controls) { in allocate_msrs() 219 struct op_msr * controls = msrs->controls; in nmi_restore_registers() local 223 wrmsrl(controls[i].addr, controls[i].value); in nmi_restore_registers()
|
A D | op_model_athlon.c | 40 #define CTRL_READ(msr_content,msrs,c) do {rdmsrl(msrs->controls[(c)].addr, (msr_content));} while (… 174 msrs->controls[0].addr = MSR_K7_EVNTSEL0; in athlon_fill_in_addresses() 175 msrs->controls[1].addr = MSR_K7_EVNTSEL1; in athlon_fill_in_addresses() 176 msrs->controls[2].addr = MSR_K7_EVNTSEL2; in athlon_fill_in_addresses() 177 msrs->controls[3].addr = MSR_K7_EVNTSEL3; in athlon_fill_in_addresses() 189 msrs->controls[0].addr = MSR_AMD_FAM15H_EVNTSEL0; in fam15h_fill_in_addresses() 190 msrs->controls[1].addr = MSR_AMD_FAM15H_EVNTSEL1; in fam15h_fill_in_addresses() 191 msrs->controls[2].addr = MSR_AMD_FAM15H_EVNTSEL2; in fam15h_fill_in_addresses() 192 msrs->controls[3].addr = MSR_AMD_FAM15H_EVNTSEL3; in fam15h_fill_in_addresses() 193 msrs->controls[4].addr = MSR_AMD_FAM15H_EVNTSEL4; in fam15h_fill_in_addresses() [all …]
|
A D | op_model_p4.c | 412 msrs->controls[i].addr = addr; in p4_fill_in_addresses() 418 msrs->controls[i].addr = addr; in p4_fill_in_addresses() 426 msrs->controls[i].addr = addr; in p4_fill_in_addresses() 431 msrs->controls[i].addr = addr; in p4_fill_in_addresses() 437 msrs->controls[i].addr = addr; in p4_fill_in_addresses() 442 msrs->controls[i].addr = addr; in p4_fill_in_addresses() 447 msrs->controls[i].addr = addr; in p4_fill_in_addresses() 454 msrs->controls[i++].addr = MSR_P4_CRU_ESCR5; in p4_fill_in_addresses() 455 msrs->controls[i++].addr = MSR_P4_CRU_ESCR4; in p4_fill_in_addresses() 460 msrs->controls[i++].addr = MSR_P4_CRU_ESCR4; in p4_fill_in_addresses() [all …]
|
A D | op_model_ppro.c | 51 #define CTRL_READ(msr_content,msrs,c) do {rdmsrl((msrs->controls[(c)].addr), (msr_content));} while… 52 #define CTRL_WRITE(msr_content,msrs,c) do {wrmsrl((msrs->controls[(c)].addr), (msr_content));} whil… 73 msrs->controls[i].addr = MSR_P6_EVNTSEL(i); in ppro_fill_in_addresses()
|
A D | op_x86_model.h | 21 struct op_msr * controls; member
|
/xen-4.10.0-shim-comet/tools/flask/policy/modules/ |
A D | prot_domU.te | 1 # This is an alternative to nomigrate_t: a policy boolean controls the ability
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | xenmon.txt | 83 limited by setting the trace mask (with a dom0 Op), which controls which
|
A D | vtd.txt | 117 There are some devices the BIOS controls, for e.g. USB devices to perform 269 controls the physical resources allocation) to enable the Virtual Function.
|
A D | vtd-pi.txt | 136 9. New boot command line for Xen, which controls VT-d PI feature by user. 309 - New boot command line for Xen, which controls VT-d PI feature by user.
|
A D | xsm-flask.txt | 8 controls over Xen domains, allowing the policy writer to define what
|
A D | xen-command-line.markdown | 819 controls until a policy is loaded by a domain using "xl loadpolicy". Once a 1388 paging controls access to usermode addresses.
|
/xen-4.10.0-shim-comet/xen/include/acpi/ |
A D | actbl2.h | 187 u8 controls; member
|
/xen-4.10.0-shim-comet/scripts/ |
A D | get_maintainer.pl | 2123 my $controls = '\\000-\\037\\177'; 2132 my $atom = "[^$specials $controls]+(?:$rfc822_lwsp+|\\Z|(?=[\\[\"$specials]))";
|
/xen-4.10.0-shim-comet/docs/man/ |
A D | xl-disk-configuration.pod.5 | 247 This does not affect the guest's view of the device. It controls
|
A D | xen-vtpmmgr.pod.7 | 77 initial group controls the ability to boot the system as a whole, and cannot be
|
A D | xl.pod.1.in | 1688 providing fine-grained controls over Xen domains, allowing the policy writer 1708 Enable or disable enforcing of the FLASK access controls. The default is
|
A D | xl.cfg.pod.5.in | 571 This value controls how many pages the domain is able to grant access to for 578 to have. This value controls how many pages of foreign domains can be accessed
|
/xen-4.10.0-shim-comet/tools/ocaml/xenstored/ |
A D | process.ml | 29 (* This controls the do_debug fn in this module, not the debug logging-function. *)
|
Completed in 25 milliseconds