/xen-4.10.0-shim-comet/tools/debugger/gdbsx/gx/ |
A D | gx_utils.c | 60 gx_convert_int_to_ascii(char *from, char *to, int n) in gx_convert_int_to_ascii() argument 65 ch = *from++; in gx_convert_int_to_ascii() 76 gx_convert_ascii_to_int(char *from, char *to, int n) in gx_convert_ascii_to_int() argument 80 nib1 = gx_fromhex(*from++); in gx_convert_ascii_to_int() 81 nib2 = gx_fromhex(*from++); in gx_convert_ascii_to_int() 94 while ((ch=from[i++]) != ',') { in gx_decode_zZ_packet() 108 while ((ch=from[i++]) != ',') { in gx_decode_m_packet() 113 if ((ch=from[i++]) == 0) in gx_decode_m_packet() 133 while ((ch=from[i++]) != ',') { in gx_decode_M_packet() 137 while ((ch = from[i++]) != ':') { in gx_decode_M_packet() [all …]
|
A D | gx.h | 27 void gx_convert_int_to_ascii (char *from, char *to, int n); 28 void gx_convert_ascii_to_int (char *from, char *to, int n);
|
/xen-4.10.0-shim-comet/xen/arch/x86/ |
A D | usercopy.c | 13 unsigned __copy_to_user_ll(void __user *to, const void *from, unsigned n) in __copy_to_user_ll() argument 43 : [cnt] "+c" (n), [to] "+D" (to), [from] "+S" (from), in __copy_to_user_ll() 52 unsigned __copy_from_user_ll(void *to, const void __user *from, unsigned n) in __copy_from_user_ll() argument 88 : [cnt] "+c" (n), [to] "+D" (to), [from] "+S" (from), in __copy_from_user_ll() 110 unsigned copy_to_user(void __user *to, const void *from, unsigned n) in copy_to_user() argument 113 n = __copy_to_user(to, from, n); in copy_to_user() 168 unsigned copy_from_user(void *to, const void __user *from, unsigned n) in copy_from_user() argument 170 if ( access_ok(from, n) ) in copy_from_user() 171 n = __copy_from_user(to, from, n); in copy_from_user()
|
/xen-4.10.0-shim-comet/xen/include/asm-x86/ |
A D | uaccess.h | 13 unsigned copy_to_user(void *to, const void *from, unsigned len); 15 unsigned copy_from_user(void *to, const void *from, unsigned len); 17 unsigned __copy_to_user_ll(void __user*to, const void *from, unsigned n); 189 __copy_to_user(void __user *to, const void *from, unsigned long n) in __copy_to_user() argument 209 return __copy_to_user_ll(to, from, n); in __copy_to_user() 230 __copy_from_user(void *to, const void __user *from, unsigned long n) in __copy_from_user() argument 237 __get_user_size(*(u8 *)to, from, 1, ret, 1); in __copy_from_user() 240 __get_user_size(*(u16 *)to, from, 2, ret, 2); in __copy_from_user() 243 __get_user_size(*(u32 *)to, from, 4, ret, 4); in __copy_from_user() 246 __get_user_size(*(u64*)to, from, 8, ret, 8); in __copy_from_user() [all …]
|
A D | asm_defns.h | 78 # define _ASM__EXTABLE(sfx, from, to) \ argument 81 .long _ASM_EX(from), _ASM_EX(to) ; \ 84 # define _ASM__EXTABLE(sfx, from, to) \ argument 87 " .long " _ASM_EX(from) ", " _ASM_EX(to) "\n" \ 91 #define _ASM_EXTABLE(from, to) _ASM__EXTABLE(, from, to) argument 92 #define _ASM_PRE_EXTABLE(from, to) _ASM__EXTABLE(.pre, from, to) argument
|
/xen-4.10.0-shim-comet/xen/arch/arm/ |
A D | guestcopy.c | 8 static unsigned long raw_copy_to_guest_helper(void *to, const void *from, in raw_copy_to_guest_helper() argument 26 memcpy(p, from, size); in raw_copy_to_guest_helper() 33 from += size; in raw_copy_to_guest_helper() 45 unsigned long raw_copy_to_guest(void *to, const void *from, unsigned len) in raw_copy_to_guest() argument 47 return raw_copy_to_guest_helper(to, from, len, 0); in raw_copy_to_guest() 50 unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, in raw_copy_to_guest_flush_dcache() argument 53 return raw_copy_to_guest_helper(to, from, len, 1); in raw_copy_to_guest_flush_dcache() 91 unsigned offset = (vaddr_t)from & ~PAGE_MASK; in raw_copy_from_guest() 99 page = get_page_from_gva(current, (vaddr_t) from, GV2M_READ); in raw_copy_from_guest() 104 p += ((vaddr_t)from & (~PAGE_MASK)); in raw_copy_from_guest() [all …]
|
/xen-4.10.0-shim-comet/tools/blktap2/vhd/lib/ |
A D | relative-path.c | 110 count_common_nodes(char *to, char *from) in count_common_nodes() argument 115 if (!to || !from) in count_common_nodes() 128 from_node = next_node(&from, &err); in count_common_nodes() 136 ++from; in count_common_nodes() 191 node_offset(char *from, int offset) in node_offset() argument 195 if (!from || !offset) in node_offset() 198 for (path = from; *path != '\0'; path++) { in node_offset() 212 relative_path_to(char *from, char *to, int *err) in relative_path_to() argument 225 strnlen(from, MAX_NAME_LEN) == MAX_NAME_LEN) { in relative_path_to() 239 from_absolute = realpath(from, NULL); in relative_path_to() [all …]
|
/xen-4.10.0-shim-comet/xen/common/ |
A D | README.source | 5 be complete: in particular for code that has been imported from 10 Originally from https://www.landley.net/code/bunzip-4.1.c 15 This file was originally imported from the Linux tree 21 This file was originally imported from the compcache project at 28 This directory was opriginally imported from the libelf 34 This directory was originally imported from the Device Tree 41 This file was originally imported from the LZ4 project 42 ( http://www.lz4.org). The source is available from 48 This directory was imported from the XZ Utils project
|
/xen-4.10.0-shim-comet/m4/ |
A D | README.source | 8 This file was fetched from 15 The pkg-config m4 macro library comes from the upstream pkg-config 25 The last synch was from commit: 31 glib: Fix Makefiles to suppress warnings from automake 34 += in the evaluation to avoid multiple definition warnings from
|
/xen-4.10.0-shim-comet/tools/firmware/etherboot/ |
A D | README | 2 This directory builds gPXE option ROMs from the gPXE source 4 can be reconstructed from source, allowing easier debugging and 22 Previously, an image from Rom-o-matic.net was provided here, fetched 23 from the following URL: 28 from the downloaded image.
|
/xen-4.10.0-shim-comet/tools/libxc/ |
A D | xc_dom_x86.c | 83 xen_vaddr_t from; member 157 if ( from < map_cmp->area.to && to > map_cmp->area.from ) in count_pgtables() 166 map->area.from = from & domx86->params->vaddr_mask; in count_pgtables() 187 map->lvls[l].from = map->area.from & ~mask; in count_pgtables() 202 if ( map->lvls[l].from >= map_cmp->lvls[l].from && in count_pgtables() 209 assert(map->lvls[l].from >= map_cmp->lvls[l].from || in count_pgtables() 211 if ( map->lvls[l].from >= map_cmp->lvls[l].from && in count_pgtables() 406 from = map1->lvls[l].from; in setup_pgtables_x86() 417 if ( lvl->from >= to || lvl->to <= from ) in setup_pgtables_x86() 419 p_s = (max(from, lvl->from) - from) >> in setup_pgtables_x86() [all …]
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | x86-xenpv-bootloader.markdown | 10 In many cases the user wishes to manage this PV bootloader from within 11 the guest, and therefore wishes to chainload something from the guest 16 bootloader to load and the protocol/format expected from the 38 It is allowable for `/boot` to be a separate filesystem from `/` and 45 kernel of a different width from itself, and this extends to 46 chainloading from a stage one. Therefore it is permissible to have
|
A D | pvh.markdown | 3 Since the Xen entry point into the kernel can be different from the 70 the position of the RSDP in memory (if present) can be fetched from the start 73 Description of paravirtualized devices will come from XenStore, just as it's 78 ### Interrupts from physical devices ### 80 Interrupts from physical devices are delivered using native methods, this is 84 the delivery of interrupts from those devices, using the same interfaces that 87 ### Interrupts from paravirtualized devices ### 89 Interrupts from paravirtualized devices are delivered using event channels, see
|
A D | coverage.markdown | 3 Coverage support allows you to get coverage information from Xen execution. 31 Once you extracted data from Xen, it is time to create files which the coverage 37 from `/` on your build machine. 48 This example assumes you compiled Xen from `~/xen-unstable` and installed into 50 blob extracted from xencov!**
|
A D | hvm-emulated-unplug.markdown | 13 The current protocol works like this (from the point of view of 17 is available by reading a two-byte magic number from IO port `0x10`. 21 2. The drivers read a one-byte protocol version from IO port `0x12`. If 30 5. The drivers check the magic number by reading two bytes from `0x10` 31 again. If it's changed from `0x49d2` to `0xd249`, the drivers are 43 The relevant emulated devices then disappear from the relevant 61 The blacklist is, from qemu's point of view, handled mostly through 64 readable, where `{build_number}` is the build number from step 4 as a
|
A D | netif-staging-grants.pandoc | 155 14) Backend consume a request from the ring 182 region (linear part of the skb) *only* from the first slot. 210 on the first produced request from frontend. 309 from backend to frontend network stack: 323 from it. 325 4) Create grant copy op from packet page to `gref`. 333 6) Gets a response from the ring for this data slot. 339 9) Gets a request from the ring for the first extra info [optional] 359 17) Consumes a response from the ring (first response for a packet) 583 2017-09-13 3 Xen 4.10 Addressed changes from Paul Durrant [all …]
|
A D | pvcalls.markdown | 375 - **req_id**: echoed back from request 376 - **cmd**: echoed back from request 416 - **id**: echoed back from request 484 - **id**: echoed back from request 539 - **id**: echoed back from request 582 - **id**: echoed back from request 620 - **id**: echoed back from request 691 - **id**: id of the listening socket, echoed back from request 731 - **id**: echoed back from request 942 increased by the backend, after reading data from **out**. [all …]
|
/xen-4.10.0-shim-comet/xen/include/asm-x86/hvm/ |
A D | guest_access.h | 4 unsigned long copy_to_user_hvm(void *to, const void *from, unsigned len); 6 unsigned long copy_from_user_hvm(void *to, const void *from, unsigned len);
|
/xen-4.10.0-shim-comet/xen/include/asm-x86/hvm/svm/ |
A D | svmdebug.h | 25 void svm_vmcb_dump(const char *from, const struct vmcb_struct *vmcb); 26 bool svm_vmcb_isvalid(const char *from, const struct vmcb_struct *vmcb,
|
/xen-4.10.0-shim-comet/tools/xenstore/ |
A D | README | 1 The following files are imported from the Samba project. We use the versions 2 from Samba 3, the current stable branch.
|
/xen-4.10.0-shim-comet/docs/ |
A D | README.colo | 3 (SVM) run in parallel. They receive the same request from client, and generate 4 response in parallel too. If the response packets from PVM and SVM are
|
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/svm/ |
A D | svmdebug.c | 30 void svm_vmcb_dump(const char *from, const struct vmcb_struct *vmcb) in svm_vmcb_dump() argument 32 printk("Dumping guest's current state at %s...\n", from); in svm_vmcb_dump() 91 bool svm_vmcb_isvalid(const char *from, const struct vmcb_struct *vmcb, in svm_vmcb_isvalid() argument 103 printk(XENLOG_GUEST "%pv[%s]: " fmt, v, from, ## args); \ in svm_vmcb_isvalid()
|
/xen-4.10.0-shim-comet/xen/arch/x86/boot/ |
A D | edd.S | 38 # number, interface support map and version results from fn41. The next four 39 # bytes are used to store the legacy cylinders, heads, and sectors from fn08. 40 # The following 74 bytes are used to store the results from fn48. 153 movl %ecx, 4(%bx) # store signature from MBR
|
/xen-4.10.0-shim-comet/tools/include/xen-external/ |
A D | README | 5 copying new versions from the source location, as documented below: 11 Obtained from the FreeBSD SVN using the following commands:
|
/xen-4.10.0-shim-comet/docs/features/ |
A D | feature-levelling.pandoc | 42 a host reboot. Xen recalculates all information from scratch each boot, and 46 information from relevant hosts and compute appropriate feature specifications 57 fault, complicating the task of hiding hardware features from guests. 94 AMD CPUs from the `K8` onwards support _Feature Override_ MSRs, which allow 108 Intel CPUs from `IvyBridge` onwards have _CPUID Faulting_, which allows Xen to 122 `xen/include/asm-x86/cpuid-autogen.h` from 135 values are picked from the _host\_featureset_. 163 preventing a guest from using 1GB superpages if the hardware supports it. 165 Some information simply cannot be hidden from guests. There is no way to 191 The CPUID policy is currently regenerated from scratch by the receiving side,
|