/xen-4.10.0-shim-comet/xen/include/xen/ |
A D | rwlock.h | 229 #define PERCPU_RW_LOCK_UNLOCKED(owner) { RW_LOCK_UNLOCKED, 0, owner } argument 236 #define PERCPU_RW_LOCK_UNLOCKED(owner) { RW_LOCK_UNLOCKED, 0 } argument 240 #define DEFINE_PERCPU_RWLOCK_RESOURCE(l, owner) \ argument 241 percpu_rwlock_t l = PERCPU_RW_LOCK_UNLOCKED(&get_per_cpu_var(owner)) 242 #define percpu_rwlock_resource_init(l, owner) \ argument 243 (*(l) = (percpu_rwlock_t)PERCPU_RW_LOCK_UNLOCKED(&get_per_cpu_var(owner)))
|
/xen-4.10.0-shim-comet/tools/ocaml/xenstored/ |
A D | perms.ml | 48 owner: Xenctrl.domid; RecordField 53 let create owner other acl = 54 { owner = owner; other = other; acl = acl } 58 let get_owner perm = perm.owner 83 let l = ((permvec.owner, permvec.other) :: permvec.acl) in 129 (* check if owner of the current connection and of the current node are the same *)
|
A D | store.ml | 86 Logging.info "store|node" "Permission denied: Domain %d not owner" (get_owner node); 389 let owner = Node.get_owner node in 395 Quota.check store.quota owner (String.length value); 399 then Quota.add_entry store.quota owner 403 let owner = Node.get_owner node in 405 if not (existing || (Perms.Connection.is_dom0 perm)) then Quota.check store.quota owner 0; 407 Quota.add_entry store.quota owner
|
/xen-4.10.0-shim-comet/xen/include/asm-arm/ |
A D | smccc.h | 66 #define ARM_SMCCC_CALL_VAL(type, calling_convention, owner, func_num) \ argument 69 (((owner) & ARM_SMCCC_OWNER_MASK) << ARM_SMCCC_OWNER_SHIFT) | \
|
/xen-4.10.0-shim-comet/docs/man/ |
A D | xenstore-chmod.pod.1 | 38 The first permission entry is the domain owning the key (the owner) 40 subsequent entries. The key owner always has full access (read,
|
A D | xenstore-ls.pod.1 | 48 The first permission entry is the domain owning the key (the owner) 50 subsequent entries. The key owner always has full access (read,
|
A D | xen-vtpmmgr.pod.7 | 95 Set the owner and SRK authdata for the TPM. If not specified, the
|
/xen-4.10.0-shim-comet/ |
A D | install.sh | 30 (cd $tmp; tar -cf - *) | tar --no-same-owner -C "$dst" -xf -
|
/xen-4.10.0-shim-comet/xen/arch/x86/pv/ |
A D | ro-page-fault.c | 312 const struct domain *owner = page_get_owner_and_reference(page); in mmio_ro_do_page_fault() local 314 if ( owner ) in mmio_ro_do_page_fault() 316 if ( owner != dom_io ) in mmio_ro_do_page_fault()
|
/xen-4.10.0-shim-comet/xen/arch/x86/ |
A D | mm.c | 2225 struct domain *owner; in page_get_owner_and_reference() local 2239 owner = page_get_owner(page); in page_get_owner_and_reference() 2240 ASSERT(owner); in page_get_owner_and_reference() 2242 return owner; in page_get_owner_and_reference() 2250 if ( likely(owner == domain) ) in get_page() 2257 owner ? owner->domain_id : DOMID_INVALID, in get_page() 2260 if ( owner ) in get_page() 2295 if ( likely(owner != NULL) ) in alloc_page_type() 2369 if ( likely(owner != NULL) && unlikely(paging_mode_enabled(owner)) ) in free_page_type() 3829 owner ? owner->domain_id : DOMID_INVALID, in donate_page() [all …]
|
A D | domain.c | 626 struct domain *owner; in arch_domain_soft_reset() local 657 owner = page_get_owner_and_reference(page); in arch_domain_soft_reset() 658 ASSERT( owner == d ); in arch_domain_soft_reset()
|
/xen-4.10.0-shim-comet/tools/ocaml/libs/xs/ |
A D | xs.mli | 23 - owner domid. 24 - other perm: applied to domain that is not owner or in ACL.
|
A D | xsraw.ml | 59 let owner, other, acl = perms in 64 String.concat "\000" (List.map string_of_perm ((owner,other) :: acl))
|
/xen-4.10.0-shim-comet/xen/arch/x86/mm/shadow/ |
A D | private.h | 497 struct domain *owner; in sh_mfn_is_a_page_table() local 503 owner = page_get_owner(page); in sh_mfn_is_a_page_table() 504 if ( owner && shadow_mode_refcounts(owner) in sh_mfn_is_a_page_table()
|
A D | multi.c | 860 struct domain *owner; in shadow_get_page_from_l1e() local 875 (owner = page_get_owner(mfn_to_page(mfn))) && in shadow_get_page_from_l1e() 876 (d != owner) ) in shadow_get_page_from_l1e() 878 res = xsm_priv_mapping(XSM_TARGET, d, owner); in shadow_get_page_from_l1e() 880 res = get_page_from_l1e(sl1e, d, owner); in shadow_get_page_from_l1e() 883 d->domain_id, mfn_x(mfn), owner->domain_id, in shadow_get_page_from_l1e()
|
A D | common.c | 1516 struct domain *owner = page_get_owner(pg); in shadow_free_p2m_page() local 1519 if ( owner || (pg->count_info & PGC_count_mask) ) in shadow_free_p2m_page() 1523 owner ? owner->domain_id : DOMID_INVALID, in shadow_free_p2m_page()
|
/xen-4.10.0-shim-comet/xen/arch/x86/mm/hap/ |
A D | hap.c | 304 struct domain *owner = page_get_owner(pg); in hap_free_p2m_page() local 311 if ( owner || (pg->count_info & PGC_count_mask) ) in hap_free_p2m_page() 315 owner ? owner->domain_id : DOMID_INVALID, in hap_free_p2m_page()
|
/xen-4.10.0-shim-comet/xen/common/ |
A D | grant_table.c | 871 struct domain *ld, *rd, *owner = NULL; in map_grant_ref() local 1007 owner = page_get_owner(pg); in map_grant_ref() 1009 if ( owner ) in map_grant_ref() 1012 if ( !pg || (owner == dom_io) ) in map_grant_ref() 1047 else if ( owner == rd || owner == dom_cow ) in map_grant_ref() 1051 if ( (owner == dom_cow) || in map_grant_ref() 1073 if ( (owner == dom_cow) || in map_grant_ref() 3205 struct domain *d, *owner; in cache_flush() local 3236 if ( !owner || !owner->grant_table ) in cache_flush() 3242 if ( d != owner ) in cache_flush() [all …]
|
A D | page_alloc.c | 1525 struct domain *owner; in offline_page() local 1561 if ( (pg->count_info & PGC_broken) && (owner = page_get_owner(pg)) ) in offline_page() 1564 domain_shutdown(owner, SHUTDOWN_crash); in offline_page() 1585 if ( (owner = page_get_owner_and_reference(pg)) ) in offline_page() 1596 (owner->domain_id << PG_OFFLINE_OWNER_SHIFT); in offline_page()
|
/xen-4.10.0-shim-comet/xen/arch/arm/ |
A D | mm.c | 1342 struct domain *owner; in page_get_owner_and_reference() local 1355 owner = page_get_owner(page); in page_get_owner_and_reference() 1356 ASSERT(owner); in page_get_owner_and_reference() 1358 return owner; in page_get_owner_and_reference() 1380 struct domain *owner = page_get_owner_and_reference(page); in get_page() local 1382 if ( likely(owner == domain) ) in get_page() 1385 if ( owner != NULL ) in get_page()
|
/xen-4.10.0-shim-comet/stubdom/grub.patches/ |
A D | 61btrfs.diff | 247 + __le64 owner; /* objectid of the root referincing this chunk */ 277 + __le64 owner; 448 + * owner of the block and the number of references 461 +/* dev extents record free space on individual devices. The owner 463 + * the extent. The chunk tree uuid field is a way to double check the owner 850 +BTRFS_SETGET_FUNCS(chunk_owner, struct btrfs_chunk, owner, 64); 867 +BTRFS_SETGET_STACK_FUNCS(stack_chunk_owner, struct btrfs_chunk, owner, 64); 1204 +BTRFS_SETGET_HEADER_FUNCS(header_owner, struct btrfs_header, owner, 64);
|
/xen-4.10.0-shim-comet/tools/libxl/ |
A D | libxl.c | 42 ctx->nogc_gc.owner = ctx; in libxl_ctx_alloc()
|
A D | libxl_internal.h | 436 libxl_ctx *owner; member 600 (gc).owner = (ctx); \ 606 return gc->owner; in libxl__gc_owner()
|
A D | libxl_disk.c | 245 libxl_ctx *ctx = gc->owner; in device_disk_add()
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | grant-tables.txt | 77 map->domid : owner of the mapped frame
|