Home
last modified time | relevance | path

Searched refs:from (Results 1 – 25 of 194) sorted by relevance

12345678

/xen-4.10.0-shim-comet/tools/debugger/gdbsx/gx/
A Dgx_utils.c60 gx_convert_int_to_ascii(char *from, char *to, int n) in gx_convert_int_to_ascii() argument
65 ch = *from++; in gx_convert_int_to_ascii()
76 gx_convert_ascii_to_int(char *from, char *to, int n) in gx_convert_ascii_to_int() argument
80 nib1 = gx_fromhex(*from++); in gx_convert_ascii_to_int()
81 nib2 = gx_fromhex(*from++); in gx_convert_ascii_to_int()
94 while ((ch=from[i++]) != ',') { in gx_decode_zZ_packet()
108 while ((ch=from[i++]) != ',') { in gx_decode_m_packet()
113 if ((ch=from[i++]) == 0) in gx_decode_m_packet()
133 while ((ch=from[i++]) != ',') { in gx_decode_M_packet()
137 while ((ch = from[i++]) != ':') { in gx_decode_M_packet()
[all …]
A Dgx.h27 void gx_convert_int_to_ascii (char *from, char *to, int n);
28 void gx_convert_ascii_to_int (char *from, char *to, int n);
/xen-4.10.0-shim-comet/xen/arch/x86/
A Dusercopy.c13 unsigned __copy_to_user_ll(void __user *to, const void *from, unsigned n) in __copy_to_user_ll() argument
43 : [cnt] "+c" (n), [to] "+D" (to), [from] "+S" (from), in __copy_to_user_ll()
52 unsigned __copy_from_user_ll(void *to, const void __user *from, unsigned n) in __copy_from_user_ll() argument
88 : [cnt] "+c" (n), [to] "+D" (to), [from] "+S" (from), in __copy_from_user_ll()
110 unsigned copy_to_user(void __user *to, const void *from, unsigned n) in copy_to_user() argument
113 n = __copy_to_user(to, from, n); in copy_to_user()
168 unsigned copy_from_user(void *to, const void __user *from, unsigned n) in copy_from_user() argument
170 if ( access_ok(from, n) ) in copy_from_user()
171 n = __copy_from_user(to, from, n); in copy_from_user()
/xen-4.10.0-shim-comet/xen/include/asm-x86/
A Duaccess.h13 unsigned copy_to_user(void *to, const void *from, unsigned len);
15 unsigned copy_from_user(void *to, const void *from, unsigned len);
17 unsigned __copy_to_user_ll(void __user*to, const void *from, unsigned n);
189 __copy_to_user(void __user *to, const void *from, unsigned long n) in __copy_to_user() argument
209 return __copy_to_user_ll(to, from, n); in __copy_to_user()
230 __copy_from_user(void *to, const void __user *from, unsigned long n) in __copy_from_user() argument
237 __get_user_size(*(u8 *)to, from, 1, ret, 1); in __copy_from_user()
240 __get_user_size(*(u16 *)to, from, 2, ret, 2); in __copy_from_user()
243 __get_user_size(*(u32 *)to, from, 4, ret, 4); in __copy_from_user()
246 __get_user_size(*(u64*)to, from, 8, ret, 8); in __copy_from_user()
[all …]
A Dasm_defns.h78 # define _ASM__EXTABLE(sfx, from, to) \ argument
81 .long _ASM_EX(from), _ASM_EX(to) ; \
84 # define _ASM__EXTABLE(sfx, from, to) \ argument
87 " .long " _ASM_EX(from) ", " _ASM_EX(to) "\n" \
91 #define _ASM_EXTABLE(from, to) _ASM__EXTABLE(, from, to) argument
92 #define _ASM_PRE_EXTABLE(from, to) _ASM__EXTABLE(.pre, from, to) argument
/xen-4.10.0-shim-comet/xen/arch/arm/
A Dguestcopy.c8 static unsigned long raw_copy_to_guest_helper(void *to, const void *from, in raw_copy_to_guest_helper() argument
26 memcpy(p, from, size); in raw_copy_to_guest_helper()
33 from += size; in raw_copy_to_guest_helper()
45 unsigned long raw_copy_to_guest(void *to, const void *from, unsigned len) in raw_copy_to_guest() argument
47 return raw_copy_to_guest_helper(to, from, len, 0); in raw_copy_to_guest()
50 unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, in raw_copy_to_guest_flush_dcache() argument
53 return raw_copy_to_guest_helper(to, from, len, 1); in raw_copy_to_guest_flush_dcache()
91 unsigned offset = (vaddr_t)from & ~PAGE_MASK; in raw_copy_from_guest()
99 page = get_page_from_gva(current, (vaddr_t) from, GV2M_READ); in raw_copy_from_guest()
104 p += ((vaddr_t)from & (~PAGE_MASK)); in raw_copy_from_guest()
[all …]
/xen-4.10.0-shim-comet/tools/blktap2/vhd/lib/
A Drelative-path.c110 count_common_nodes(char *to, char *from) in count_common_nodes() argument
115 if (!to || !from) in count_common_nodes()
128 from_node = next_node(&from, &err); in count_common_nodes()
136 ++from; in count_common_nodes()
191 node_offset(char *from, int offset) in node_offset() argument
195 if (!from || !offset) in node_offset()
198 for (path = from; *path != '\0'; path++) { in node_offset()
212 relative_path_to(char *from, char *to, int *err) in relative_path_to() argument
225 strnlen(from, MAX_NAME_LEN) == MAX_NAME_LEN) { in relative_path_to()
239 from_absolute = realpath(from, NULL); in relative_path_to()
[all …]
/xen-4.10.0-shim-comet/xen/common/
A DREADME.source5 be complete: in particular for code that has been imported from
10 Originally from https://www.landley.net/code/bunzip-4.1.c
15 This file was originally imported from the Linux tree
21 This file was originally imported from the compcache project at
28 This directory was opriginally imported from the libelf
34 This directory was originally imported from the Device Tree
41 This file was originally imported from the LZ4 project
42 ( http://www.lz4.org). The source is available from
48 This directory was imported from the XZ Utils project
/xen-4.10.0-shim-comet/m4/
A DREADME.source8 This file was fetched from
15 The pkg-config m4 macro library comes from the upstream pkg-config
25 The last synch was from commit:
31 glib: Fix Makefiles to suppress warnings from automake
34 += in the evaluation to avoid multiple definition warnings from
/xen-4.10.0-shim-comet/tools/firmware/etherboot/
A DREADME2 This directory builds gPXE option ROMs from the gPXE source
4 can be reconstructed from source, allowing easier debugging and
22 Previously, an image from Rom-o-matic.net was provided here, fetched
23 from the following URL:
28 from the downloaded image.
/xen-4.10.0-shim-comet/tools/libxc/
A Dxc_dom_x86.c83 xen_vaddr_t from; member
157 if ( from < map_cmp->area.to && to > map_cmp->area.from ) in count_pgtables()
166 map->area.from = from & domx86->params->vaddr_mask; in count_pgtables()
187 map->lvls[l].from = map->area.from & ~mask; in count_pgtables()
202 if ( map->lvls[l].from >= map_cmp->lvls[l].from && in count_pgtables()
209 assert(map->lvls[l].from >= map_cmp->lvls[l].from || in count_pgtables()
211 if ( map->lvls[l].from >= map_cmp->lvls[l].from && in count_pgtables()
406 from = map1->lvls[l].from; in setup_pgtables_x86()
417 if ( lvl->from >= to || lvl->to <= from ) in setup_pgtables_x86()
419 p_s = (max(from, lvl->from) - from) >> in setup_pgtables_x86()
[all …]
/xen-4.10.0-shim-comet/docs/misc/
A Dx86-xenpv-bootloader.markdown10 In many cases the user wishes to manage this PV bootloader from within
11 the guest, and therefore wishes to chainload something from the guest
16 bootloader to load and the protocol/format expected from the
38 It is allowable for `/boot` to be a separate filesystem from `/` and
45 kernel of a different width from itself, and this extends to
46 chainloading from a stage one. Therefore it is permissible to have
A Dpvh.markdown3 Since the Xen entry point into the kernel can be different from the
70 the position of the RSDP in memory (if present) can be fetched from the start
73 Description of paravirtualized devices will come from XenStore, just as it's
78 ### Interrupts from physical devices ###
80 Interrupts from physical devices are delivered using native methods, this is
84 the delivery of interrupts from those devices, using the same interfaces that
87 ### Interrupts from paravirtualized devices ###
89 Interrupts from paravirtualized devices are delivered using event channels, see
A Dcoverage.markdown3 Coverage support allows you to get coverage information from Xen execution.
31 Once you extracted data from Xen, it is time to create files which the coverage
37 from `/` on your build machine.
48 This example assumes you compiled Xen from `~/xen-unstable` and installed into
50 blob extracted from xencov!**
A Dhvm-emulated-unplug.markdown13 The current protocol works like this (from the point of view of
17 is available by reading a two-byte magic number from IO port `0x10`.
21 2. The drivers read a one-byte protocol version from IO port `0x12`. If
30 5. The drivers check the magic number by reading two bytes from `0x10`
31 again. If it's changed from `0x49d2` to `0xd249`, the drivers are
43 The relevant emulated devices then disappear from the relevant
61 The blacklist is, from qemu's point of view, handled mostly through
64 readable, where `{build_number}` is the build number from step 4 as a
A Dnetif-staging-grants.pandoc155 14) Backend consume a request from the ring
182 region (linear part of the skb) *only* from the first slot.
210 on the first produced request from frontend.
309 from backend to frontend network stack:
323 from it.
325 4) Create grant copy op from packet page to `gref`.
333 6) Gets a response from the ring for this data slot.
339 9) Gets a request from the ring for the first extra info [optional]
359 17) Consumes a response from the ring (first response for a packet)
583 2017-09-13 3 Xen 4.10 Addressed changes from Paul Durrant
[all …]
A Dpvcalls.markdown375 - **req_id**: echoed back from request
376 - **cmd**: echoed back from request
416 - **id**: echoed back from request
484 - **id**: echoed back from request
539 - **id**: echoed back from request
582 - **id**: echoed back from request
620 - **id**: echoed back from request
691 - **id**: id of the listening socket, echoed back from request
731 - **id**: echoed back from request
942 increased by the backend, after reading data from **out**.
[all …]
/xen-4.10.0-shim-comet/xen/include/asm-x86/hvm/
A Dguest_access.h4 unsigned long copy_to_user_hvm(void *to, const void *from, unsigned len);
6 unsigned long copy_from_user_hvm(void *to, const void *from, unsigned len);
/xen-4.10.0-shim-comet/xen/include/asm-x86/hvm/svm/
A Dsvmdebug.h25 void svm_vmcb_dump(const char *from, const struct vmcb_struct *vmcb);
26 bool svm_vmcb_isvalid(const char *from, const struct vmcb_struct *vmcb,
/xen-4.10.0-shim-comet/tools/xenstore/
A DREADME1 The following files are imported from the Samba project. We use the versions
2 from Samba 3, the current stable branch.
/xen-4.10.0-shim-comet/docs/
A DREADME.colo3 (SVM) run in parallel. They receive the same request from client, and generate
4 response in parallel too. If the response packets from PVM and SVM are
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/svm/
A Dsvmdebug.c30 void svm_vmcb_dump(const char *from, const struct vmcb_struct *vmcb) in svm_vmcb_dump() argument
32 printk("Dumping guest's current state at %s...\n", from); in svm_vmcb_dump()
91 bool svm_vmcb_isvalid(const char *from, const struct vmcb_struct *vmcb, in svm_vmcb_isvalid() argument
103 printk(XENLOG_GUEST "%pv[%s]: " fmt, v, from, ## args); \ in svm_vmcb_isvalid()
/xen-4.10.0-shim-comet/xen/arch/x86/boot/
A Dedd.S38 # number, interface support map and version results from fn41. The next four
39 # bytes are used to store the legacy cylinders, heads, and sectors from fn08.
40 # The following 74 bytes are used to store the results from fn48.
153 movl %ecx, 4(%bx) # store signature from MBR
/xen-4.10.0-shim-comet/tools/include/xen-external/
A DREADME5 copying new versions from the source location, as documented below:
11 Obtained from the FreeBSD SVN using the following commands:
/xen-4.10.0-shim-comet/docs/features/
A Dfeature-levelling.pandoc42 a host reboot. Xen recalculates all information from scratch each boot, and
46 information from relevant hosts and compute appropriate feature specifications
57 fault, complicating the task of hiding hardware features from guests.
94 AMD CPUs from the `K8` onwards support _Feature Override_ MSRs, which allow
108 Intel CPUs from `IvyBridge` onwards have _CPUID Faulting_, which allows Xen to
122 `xen/include/asm-x86/cpuid-autogen.h` from
135 values are picked from the _host\_featureset_.
163 preventing a guest from using 1GB superpages if the hardware supports it.
165 Some information simply cannot be hidden from guests. There is no way to
191 The CPUID policy is currently regenerated from scratch by the receiving side,

Completed in 25 milliseconds

12345678