/xen-4.10.0-shim-comet/tools/libs/call/ |
A D | minios.c | 41 int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in osdep_hypercall() argument 46 call.op = hypercall->op; in osdep_hypercall() 48 call.args[i] = hypercall->arg[i]; in osdep_hypercall()
|
A D | freebsd.c | 65 int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in osdep_hypercall() argument 70 ret = ioctl(fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); in osdep_hypercall() 72 return (ret == 0) ? hypercall->retval : ret; in osdep_hypercall()
|
A D | netbsd.c | 96 int do_xen_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in do_xen_hypercall() argument 99 int error = ioctl(fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); in do_xen_hypercall() 110 return hypercall->retval; in do_xen_hypercall()
|
A D | solaris.c | 83 int do_xen_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in do_xen_hypercall() argument 86 return ioctl(fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); in do_xen_hypercall()
|
A D | linux.c | 70 int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) in osdep_hypercall() argument 72 return ioctl(xcall->fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); in osdep_hypercall()
|
A D | private.h | 51 int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall);
|
/xen-4.10.0-shim-comet/xen/xsm/flask/policy/ |
A D | access_vectors | 45 # kexec hypercall 64 # mca hypercall 70 # tmem hypercall (any access) 163 hypercall 320 # source = domain making the hypercall 357 # source = domain making the hypercall 378 # source = domain making the hypercall 384 # source = domain making the hypercall 415 # source = domain making the hypercall 420 # source = domain making the hypercall [all …]
|
/xen-4.10.0-shim-comet/docs/ |
A D | INDEX | 1 hypercall Hypercall Interfaces 2 hypercall/arm/index ARM 3 hypercall/x86_32/index x86_32 4 hypercall/x86_64/index x86_64
|
A D | Makefile | 42 $(patsubst %,html/hypercall/%/index.html,$(DOC_ARCHES)) 217 $(foreach i,$(filter-out x86_32 x86_64,$(DOC_ARCHES)),html/hypercall/$(i)/index.html): EXTRA_EXCLUD… 219 html/hypercall/%/index.html: $(CURDIR)/xen-headers Makefile 229 -include $(wildcard html/hypercall/*/.deps)
|
A D | ChangeLog | 70 New feature flag available via the version hypercall indicates whether the 73 16724: CPUID feature flag for MMU_PT_UPDATE_PRESERVE_AD hypercall 82 A subcommand of the x86-only mmu_update() hypercall to allow batched
|
/xen-4.10.0-shim-comet/xen/arch/x86/pv/ |
A D | hypercall.c | 323 void __init pv_hypercall_table_replace(unsigned int hypercall, in pv_hypercall_table_replace() argument 328 ((unsigned long *)__va(__pa(&pv_hypercall_table[hypercall].f))) in pv_hypercall_table_replace() 334 hypercall_fn_t *pv_get_hypercall_handler(unsigned int hypercall, bool compat) in pv_get_hypercall_handler() argument 336 return compat ? pv_hypercall_table[hypercall].compat in pv_get_hypercall_handler() 337 : pv_hypercall_table[hypercall].native; in pv_get_hypercall_handler()
|
A D | Makefile | 9 obj-y += hypercall.o
|
/xen-4.10.0-shim-comet/docs/designs/ |
A D | dmop.markdown | 11 The problem occurs when you a device model issues an hypercall that 18 having to have specific knowledge of the hypercall's semantics. 28 A DMOP hypercall consists of a domid (which is audited to verify that it 52 @domid is the domain the hypercall operates on. 69 1. Check hypercall is DMOP.
|
/xen-4.10.0-shim-comet/unmodified_drivers/linux-2.6/ |
A D | mkbuildtree | 56 ln -sf ${XL}/arch/x86/include/mach-xen/asm/hypercall*.h include/asm 63 ln -sf ${XL}/include/asm-x86/mach-xen/asm/hypercall*.h include/asm 76 ln -sf ${XL}/include/asm-$uname/mach-xen/asm/hypercall.h include/asm 84 ln -sf ${XL}/include/asm-ia64/hypercall.h include/asm
|
/xen-4.10.0-shim-comet/tools/debugger/gdbsx/xg/ |
A D | xg_main.c | 170 privcmd_hypercall_t hypercall; in _domctl_hcall() local 179 hypercall.op = __HYPERVISOR_domctl; in _domctl_hcall() 180 hypercall.arg[0] = (unsigned long)&domctl; in _domctl_hcall() 182 rc = ioctl(_dom0_fd, IOCTL_PRIVCMD_HYPERCALL, &hypercall); in _domctl_hcall() 198 privcmd_hypercall_t hypercall; in _check_hyp() local 218 hypercall.op = __HYPERVISOR_xen_version; in _check_hyp() 219 hypercall.arg[0] = (unsigned long)XENVER_capabilities; in _check_hyp() 220 hypercall.arg[1] = (unsigned long)&xen_caps; in _check_hyp() 222 rc = ioctl(_dom0_fd, IOCTL_PRIVCMD_HYPERCALL, &hypercall); in _check_hyp()
|
/xen-4.10.0-shim-comet/xen/include/asm-x86/ |
A D | hypercall.h | 31 void pv_hypercall_table_replace(unsigned int hypercall, hypercall_fn_t * native, 33 hypercall_fn_t *pv_get_hypercall_handler(unsigned int hypercall, bool compat);
|
/xen-4.10.0-shim-comet/xen/arch/x86/hvm/ |
A D | Makefile | 12 obj-y += hypercall.o
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | pvh.markdown | 44 The setup of the hypercall page is also performed in the same way 53 argument passed to the hypercall must be of the type vcpu\_hvm\_context. 55 this hypercall allows starting the vCPU in several modes (16/32/64bits),
|
A D | xenstore-paths.markdown | 613 [BLKIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,blkif.h.html 614 [FBIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,fbif.h.html 615 [HVMPARAMS]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,hvm,params.h.html 616 [KBDIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,kbdif.h.html 618 [NETIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,netif.h.html 619 [SCSIIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,vscsiif.h.html 620 [SI]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,xen.h.html#Struct_start_… 621 [USBIF]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,usbif.h.html 622 [VCPU]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,vcpu.h.html 623 [XSWIRE]: http://xenbits.xen.org/docs/unstable/hypercall/x86_64/include,public,io,xs_wire.h.html
|
A D | livepatch.markdown | 168 in `xen_version` hypercall. This function is not called **anywhere** in 234 As such the hypercall **MUST** support an XSM policy to limit what the guest 433 We will employ the sub operations of the system management hypercall (sysctl). 456 The hypercall is part of the `xen_sysctl`. The top level structure contains 549 The return value of the hypercall is zero on success and -XEN_EXX on failure. 602 in the hypercall being a probing one and return the number of payloads 615 If the hypercall returns an positive number, it is the number (upto `nr` 616 provided to the hypercall) of the payloads returned, along with `nr` updated 622 If the hypercall returns -XEN_E2BIG the `nr` is too big and should be 625 If the hypercall returns an zero value there are no more payloads. [all …]
|
A D | netif-staging-grants.pandoc | 146 11.1) Perform hypercall `EVTCHNOP_send` which might mean a __VMEXIT__ 217 27.2) Once done, perform `GNTTABOP_unmap_grant_ref` hypercall. Underlying 218 this hypercall a TLB flush of all backend vCPUS is done. 227 27.4.1) If so, Perform hypercall `EVTCHNOP_send` which might mean a __VMEXIT__ 346 12) Perform the `GNTTABOP_copy` hypercall. 385 27.1) If so, Perform hypercall `EVTCHNOP_send` which might mean a __VMEXIT__
|
/xen-4.10.0-shim-comet/tools/flask/policy/modules/ |
A D | guest_features.te | 1 # Allow all domains to use (unprivileged parts of) the tmem hypercall
|
A D | dom0.te | 37 setdebugging hypercall settime setaddrsize getaddrsize trigger
|
/xen-4.10.0-shim-comet/tools/flask/policy/policy/ |
A D | mls | 77 …troy setaffinity scheduler setdomainmaxmem setdomainhandle setdebugging hypercall settime set_targ…
|
/xen-4.10.0-shim-comet/docs/misc/arm/device-tree/ |
A D | guest.txt | 12 HYPERVISOR_memory_op hypercall. The memory region is large enough to map
|