Lines Matching full:guest
4 * Guest OS interface to Xen.
41 /* Guest handles for primitive C types. */
173 * Virtual interrupts that a guest OS may receive from Xen.
177 * The latter can be allocated only once per guest: they must initially be
182 #define VIRQ_DEBUG 1 /* V. Request guest to dump debug info. */
238 * pages that make up a pagetable must be mapped read-only in the guest.
239 * This prevents uncontrolled guest updates to the pagetable. Xen strictly
257 * via the HYPERVISOR_mmuext_op(MMUEXT_PIN_L4_TABLE, guest physical frame
259 * MMUEXT_NEW_BASEPTR, guest physical frame number of the PGD (L4)) can be
291 * - 12 available for guest
292 * - 11 available for guest
293 * - 10 available for guest
294 * - 9 available for guest
334 * that if a guest that follows Linux's PAT setup and would like to set Write
506 * @buffer: Pointer in the guest memory
540 * NB2. Guest must continue to remove all writable mappings of PTEs.
551 * - guest kernels assumed to be level 0 for the purpose of iopl checks.
557 * Enable setting the XEN_RUNSTATE_UPDATE flag in guest memory mapped
564 * This allows the guest to control respective hypervisor behavior:
663 * increment of 'version'. The guest can therefore detect updates by
665 * the version number is set then an update is in progress and the guest
699 * by the guest OS /before/ checking for pending work, thus avoiding
702 * pending and mask flags can be updated by the guest without special
716 * The mask is read before making an event upcall to the guest: a
765 * to be processed. This bit is cleared by the guest.
768 * updated by the guest. It is read-only within Xen. If a channel
770 * (i.e., when the channel is unmasked, the guest must manually handle
787 * by XEN_DOMCTL_settimeoffset, or adjusted via a guest write to the
828 * 6. All bootstrap elements are mapped read-writable for the guest OS. The
836 * to the start of the guest page tables (it was offset by two pages).
906 * file, and let the PV guest easily rebase the addresses to virtual addresses