Home
last modified time | relevance | path

Searched refs:hypercall (Results 1 – 25 of 37) sorted by relevance

12

/xen-4.10.0-shim-comet/tools/libs/call/
A Dminios.c41 int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in osdep_hypercall() argument
46 call.op = hypercall->op; in osdep_hypercall()
48 call.args[i] = hypercall->arg[i]; in osdep_hypercall()
A Dfreebsd.c65 int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in osdep_hypercall() argument
70 ret = ioctl(fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); in osdep_hypercall()
72 return (ret == 0) ? hypercall->retval : ret; in osdep_hypercall()
A Dnetbsd.c96 int do_xen_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in do_xen_hypercall() argument
99 int error = ioctl(fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); in do_xen_hypercall()
110 return hypercall->retval; in do_xen_hypercall()
A Dsolaris.c83 int do_xen_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in do_xen_hypercall() argument
86 return ioctl(fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); in do_xen_hypercall()
A Dlinux.c70 int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in osdep_hypercall() argument
72 return ioctl(xcall->fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); in osdep_hypercall()
A Dprivate.h51 int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall);
/xen-4.10.0-shim-comet/xen/xsm/flask/policy/
A Daccess_vectors45 # kexec hypercall
64 # mca hypercall
70 # tmem hypercall (any access)
163 hypercall
320 # source = domain making the hypercall
357 # source = domain making the hypercall
378 # source = domain making the hypercall
384 # source = domain making the hypercall
415 # source = domain making the hypercall
420 # source = domain making the hypercall
[all …]
/xen-4.10.0-shim-comet/docs/
A DINDEX1 hypercall Hypercall Interfaces
2 hypercall/arm/index ARM
3 hypercall/x86_32/index x86_32
4 hypercall/x86_64/index x86_64
A DMakefile42 $(patsubst %,html/hypercall/%/index.html,$(DOC_ARCHES))
217 $(foreach i,$(filter-out x86_32 x86_64,$(DOC_ARCHES)),html/hypercall/$(i)/index.html): EXTRA_EXCLUD…
219 html/hypercall/%/index.html: $(CURDIR)/xen-headers Makefile
229 -include $(wildcard html/hypercall/*/.deps)
A DChangeLog70 New feature flag available via the version hypercall indicates whether the
73 16724: CPUID feature flag for MMU_PT_UPDATE_PRESERVE_AD hypercall
82 A subcommand of the x86-only mmu_update() hypercall to allow batched
/xen-4.10.0-shim-comet/xen/arch/x86/pv/
A Dhypercall.c323 void __init pv_hypercall_table_replace(unsigned int hypercall, in pv_hypercall_table_replace() argument
328 ((unsigned long *)__va(__pa(&pv_hypercall_table[hypercall].f))) in pv_hypercall_table_replace()
334 hypercall_fn_t *pv_get_hypercall_handler(unsigned int hypercall, bool compat) in pv_get_hypercall_handler() argument
336 return compat ? pv_hypercall_table[hypercall].compat in pv_get_hypercall_handler()
337 : pv_hypercall_table[hypercall].native; in pv_get_hypercall_handler()
A DMakefile9 obj-y += hypercall.o
/xen-4.10.0-shim-comet/docs/designs/
A Ddmop.markdown11 The problem occurs when you a device model issues an hypercall that
18 having to have specific knowledge of the hypercall's semantics.
28 A DMOP hypercall consists of a domid (which is audited to verify that it
52 @domid is the domain the hypercall operates on.
69 1. Check hypercall is DMOP.
/xen-4.10.0-shim-comet/unmodified_drivers/linux-2.6/
A Dmkbuildtree56 ln -sf ${XL}/arch/x86/include/mach-xen/asm/hypercall*.h include/asm
63 ln -sf ${XL}/include/asm-x86/mach-xen/asm/hypercall*.h include/asm
76 ln -sf ${XL}/include/asm-$uname/mach-xen/asm/hypercall.h include/asm
84 ln -sf ${XL}/include/asm-ia64/hypercall.h include/asm
/xen-4.10.0-shim-comet/tools/debugger/gdbsx/xg/
A Dxg_main.c170 privcmd_hypercall_t hypercall; in _domctl_hcall() local
179 hypercall.op = __HYPERVISOR_domctl; in _domctl_hcall()
180 hypercall.arg[0] = (unsigned long)&domctl; in _domctl_hcall()
182 rc = ioctl(_dom0_fd, IOCTL_PRIVCMD_HYPERCALL, &hypercall); in _domctl_hcall()
198 privcmd_hypercall_t hypercall; in _check_hyp() local
218 hypercall.op = __HYPERVISOR_xen_version; in _check_hyp()
219 hypercall.arg[0] = (unsigned long)XENVER_capabilities; in _check_hyp()
220 hypercall.arg[1] = (unsigned long)&xen_caps; in _check_hyp()
222 rc = ioctl(_dom0_fd, IOCTL_PRIVCMD_HYPERCALL, &hypercall); in _check_hyp()
/xen-4.10.0-shim-comet/xen/include/asm-x86/
A Dhypercall.h31 void pv_hypercall_table_replace(unsigned int hypercall, hypercall_fn_t * native,
33 hypercall_fn_t *pv_get_hypercall_handler(unsigned int hypercall, bool compat);
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/
A DMakefile12 obj-y += hypercall.o
/xen-4.10.0-shim-comet/docs/misc/
A Dpvh.markdown44 The setup of the hypercall page is also performed in the same way
53 argument passed to the hypercall must be of the type vcpu\_hvm\_context.
55 this hypercall allows starting the vCPU in several modes (16/32/64bits),
A Dxenstore-paths.markdown613 [BLKIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,blkif.h.html
614 [FBIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,fbif.h.html
615 [HVMPARAMS]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,hvm,params.h.html
616 [KBDIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,kbdif.h.html
618 [NETIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,netif.h.html
619 [SCSIIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,vscsiif.h.html
620 [SI]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,xen.h.html#Struct_start_…
621 [USBIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,usbif.h.html
622 [VCPU]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,vcpu.h.html
623 [XSWIRE]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xs_wire.h.html
A Dlivepatch.markdown168 in `xen_version` hypercall. This function is not called **anywhere** in
234 As such the hypercall **MUST** support an XSM policy to limit what the guest
433 We will employ the sub operations of the system management hypercall (sysctl).
456 The hypercall is part of the `xen_sysctl`. The top level structure contains
549 The return value of the hypercall is zero on success and -XEN_EXX on failure.
602 in the hypercall being a probing one and return the number of payloads
615 If the hypercall returns an positive number, it is the number (upto `nr`
616 provided to the hypercall) of the payloads returned, along with `nr` updated
622 If the hypercall returns -XEN_E2BIG the `nr` is too big and should be
625 If the hypercall returns an zero value there are no more payloads.
[all …]
A Dnetif-staging-grants.pandoc146 11.1) Perform hypercall `EVTCHNOP_send` which might mean a __VMEXIT__
217 27.2) Once done, perform `GNTTABOP_unmap_grant_ref` hypercall. Underlying
218 this hypercall a TLB flush of all backend vCPUS is done.
227 27.4.1) If so, Perform hypercall `EVTCHNOP_send` which might mean a __VMEXIT__
346 12) Perform the `GNTTABOP_copy` hypercall.
385 27.1) If so, Perform hypercall `EVTCHNOP_send` which might mean a __VMEXIT__
/xen-4.10.0-shim-comet/tools/flask/policy/modules/
A Dguest_features.te1 # Allow all domains to use (unprivileged parts of) the tmem hypercall
A Ddom0.te37 setdebugging hypercall settime setaddrsize getaddrsize trigger
/xen-4.10.0-shim-comet/tools/flask/policy/policy/
A Dmls77 …troy setaffinity scheduler setdomainmaxmem setdomainhandle setdebugging hypercall settime set_targ…
/xen-4.10.0-shim-comet/docs/misc/arm/device-tree/
A Dguest.txt12 HYPERVISOR_memory_op hypercall. The memory region is large enough to map

Completed in 27 milliseconds

12