Home
last modified time | relevance | path

Searched full:guest (Results 1 – 25 of 372) sorted by relevance

12345678910>>...15

/freebsd/contrib/one-true-awk/testdir/
H A Dtd.15 rhm Jxoi/5WRkeSf2 5 1 m0130,m322 /usr/guest
6 ken X.68wd1.ijayM 6 1 m0130,m322 /usr/guest
7 dmr C4u3dJWbg7RCk 7 1 mh1092,m069 /usr/guest/dmr
8 doug Ki71crWGxw/yM 8 1 m1660,m025 /usr/guest
10 greg aP/aSvprvNzjs 10 1 m0130,m322 /usr/guest
13 scj y937pkRi0VkSQ 24 1 m5190,m292 /usr/guest
14 mel WdR3IjGmtatqE 26 1 m2019,m285,pounce,lesk /usr/guest
15 agf X3yQDkiqWmPJg 34 1 m1699,m245 /usr/guest
16 llc Z/l25S2gaFn7U 41 1 m1650,m324 /usr/guest
17 lem JuvkSQUElv7mE 43 1 m0220,m157,l /usr/guest
[all …]
/freebsd/usr.sbin/bhyve/
H A Dbhyve_config.5116 Include guest memory in core file.
118 Guest physical memory size in bytes.
122 Wire guest memory.
125 During initialization of the guest, the contents of this file are copied into
126 the guest's memory.
133 All variables will be persistent even on reboots of the guest.
139 For backward compatibility bhyve copies them into the guest memory as well.
140 This can cause problems if the guest uses the in-memory version, since certain
144 Destroy the VM on guest-initiated power-off.
153 before starting the guest.
[all …]
H A Dbhyve.830 .Nd "run a guest operating system inside a virtual machine"
94 is a hypervisor that runs guest operating systems inside a
98 Parameters such as the number of virtual CPUs, amount of guest memory, and
102 is typically used with a boot ROM that can load the guest operating system.
104 If not using a boot ROM, the guest operating system must be loaded with
111 package provides a UEFI firmware that can be used to boot the guest;
114 package provides a U-Boot image that can be used to boot the guest.
117 runs until the guest operating system reboots or an unhandled hypervisor
122 The guest's local APIC is configured in xAPIC mode.
127 Include guest memory in core files.
[all …]
H A Dlibslirp.h72 /* Callback for application to get data from the guest */
74 /* Callback for application to send data to the guest */
97 * Send an ethernet frame to the guest network. The opaque parameter is the
98 * one given to slirp_init(). If the guest is not ready to receive a frame,
104 /* Print a message for an error due to guest misbehavior. */
143 /* Whether to prevent the guest from accessing the Internet */
147 /* Virtual network for the guest */
149 /* Mask for the virtual network for the guest */
151 /* Virtual address for the host exposed to the guest */
155 /* Virtual IPv6 network for the guest */
[all …]
H A Dvirtio.h66 * within the guest's physical address space.
68 * The <N> 16-byte "desc" descriptors consist of a 64-bit guest
70 * <flags>, and a 16-bit <next> field (all in guest byte order).
74 * WRITE descriptor is for host to write into guest RAM
75 * (else host is to read from guest RAM)
76 * INDIRECT descriptor address field is (guest physical)
80 * be read/written from guest physical address <addr>. If
106 * values written from the virtual driver back to the guest OS.
111 * the head of a descriptor chain the guest made available
122 * their <flags> field, indicating that the guest doe
[all...]
H A Dnet_backends.h64 #define VIRTIO_NET_F_GUEST_CSUM (1 << 1) /* guest handles partial cksum */
68 #define VIRTIO_NET_F_GUEST_TSO4 (1 << 7) /* guest can rcv TSOv4 */
69 #define VIRTIO_NET_F_GUEST_TSO6 (1 << 8) /* guest can rcv TSOv6 */
70 #define VIRTIO_NET_F_GUEST_ECN (1 << 9) /* guest can rcv TSO with ECN */
71 #define VIRTIO_NET_F_GUEST_UFO (1 << 10) /* guest can rcv UFO */
82 (1 << 21) /* guest can send gratuitous pkts */
/freebsd/lib/libpam/modules/pam_guest/
H A Dpam_guest.838 .Nd Guest PAM module
46 The guest service module for PAM allows guest logins.
50 .Ev GUEST
54 to differentiate guest logins from normal logins.
61 Comma-separated list of guest account names.
63 .Dq Li guest .
70 guest accounts.
77 where guest users are encouraged to use their email address as
80 Requires the guest user to type in the guest account name as password.
/freebsd/usr.sbin/bhyveload/
H A Dbhyveload.833 guest inside a bhyve virtual machine
49 guest inside a
80 is the pathname of the guest's boot disk image.
94 is the directory at the top of the guest's boot filesystem.
106 is the amount of memory allocated to the guest.
123 Include guest memory in the core file when
127 the guest memory.
129 Wire guest memory.
142 with 256MB of memory allocated, the guest root filesystem under the host
173 as a guest.
[all …]
/freebsd/sys/dev/hyperv/vmbus/
H A Dvmbus_reg.h136 * is set by the host on the host->guest buffer ring, and by the
137 * guest on the guest->host buffer ring.
140 * semantics that apply to both buffer rings. If the guest sets
141 * the feature bit in the guest->host buffer ring, the guest is
143 * 1) It will set the br_pending_snd_sz field in the guest->host buffer
145 * 2) It will read the pending_send_sz field in the host->guest
148 * Similarly, if the host sets the feature bit in the host->guest
149 * ring buffer, the host is telling the guest that:
150 * 1) It will set the pending_send_sz field in the host->guest ring
152 * 2) It will read the pending_send_sz field in the guest->host
[all …]
/freebsd/sys/contrib/xen/
H A Dfeatures.h33 * The list of all the features the guest supports. They are set by
41 * XENFEAT_dom0 MUST be set if the guest is to be booted as dom0,
45 * If set, the guest does not need to write-protect its pagetables, and can
51 * If set, the guest does not need to write-protect its segment descriptor
57 * If set, translation between the guest's 'pseudo-physical' address space
59 * mode the guest does not need to perform phys-to/from-machine translations
64 /* If set, the guest is running in supervisor mode (e.g., x86 ring 0). */
68 * If set, the guest does not need to allocate x86 PAE page directories
80 * If set, GNTTABOP_map_grant_ref honors flags to be placed into guest kernel
102 /* Guest can use XENMEMF_vnode to specify virtual node for memory op. */
H A Ddomctl.h53 /* Is this an HVM guest (as opposed to a PV guest)? */
73 /* Should we expose the vPMU to the guest? */
91 * (global mapping space, xenheap, etc) a guest may consume. For
120 /* Domain is an HVM guest (as opposed to a PV guest). */
123 /* The guest OS has shut down. */
144 /* XEN_DOMINF_shutdown guest-supplied code. */
161 uint8_t gpaddr_bits; /* Guest physical address space size. */
231 * Shadow pagetables are refcounted: guest does not use explicit mmu
245 * Xen does not steal virtual address space from the guest.
308 /* Get/set the NUMA node(s) with which the guest has affinity with. */
[all …]
H A Dxen.h4 * Guest OS interface to Xen.
41 /* Guest handles for primitive C types. */
173 * Virtual interrupts that a guest OS may receive from Xen.
177 * The latter can be allocated only once per guest: they must initially be
182 #define VIRQ_DEBUG 1 /* V. Request guest to dump debug info. */
238 * pages that make up a pagetable must be mapped read-only in the guest.
239 * This prevents uncontrolled guest updates to the pagetable. Xen strictly
257 * via the HYPERVISOR_mmuext_op(MMUEXT_PIN_L4_TABLE, guest physical frame
259 * MMUEXT_NEW_BASEPTR, guest physical frame number of the PGD (L4)) can be
291 * - 12 available for guest
[all …]
H A Dcallback.h4 * Register guest OS callbacks with Xen.
42 /* x86: Failsafe callback when guest state cannot be restored by Xen. */
45 /* x86/64 hypervisor: Syscall by 64-bit guest app ('64-on-64-on-64'). */
60 * - 64-bit hypervisor: 32-bit guest applications on Intel CPUs
62 * [nb. also 64-bit guest applications on Intel CPUs
68 * x86/64 hypervisor: Syscall by 32-bit guest app on AMD CPUs
/freebsd/stand/userboot/
H A Duserboot.h43 * Version 5 added a callback for indicating that the guest
139 * Guest virtual machine i/o
143 * Copy to the guest address space
149 * Copy from the guest address space
155 * Set a guest register value
160 * Set a guest MSR value
165 * Set a guest CR value
170 * Set the guest GDT address
175 * Transfer control to the guest at the given address
194 * Return guest physical memory map details
/freebsd/share/man/man4/
H A Dhv_utils.444 guest partitions running on Hyper-V.
48 driver is one of the core drivers required to be present in guest
51 functionalities to guest partitions:
53 (a) Time Keeping: The clock inside the guest partition will remain accurate by
57 (b) Integrated shutdown: Guest partitions running
65 the guest partition is running and responsive.
H A Dhv_kvp.444 guest partitions running on Hyper-V.
48 guest partition.
61 guest.
66 guest is assigned a static IP address and is failed over from one
71 guest's IP address to its original static value.
73 On the other hand, the get IP functionality is used to update the guest IP
/freebsd/contrib/hyperv/tools/
H A Dhv_kvp_daemon.841 guest partitions running on Hyper-V.
46 guest partition.
60 guest.
65 guest is assigned a static IP address and is failed
71 guest's IP address to its original static value.
73 On the other hand, the get IP functionality is used to update the guest IP
/freebsd/sys/contrib/xen/arch-x86/
H A Dpmu.h92 #define PMU_SAMPLE_PV (1<<3) /* Sample from a PV guest */
97 * Fields of this structure marked as RW for guest should only be written by
98 * the guest when PMU_CACHED bit in pmu_flags is set (which is done by the
114 /* WO for hypervisor, RO for guest */
119 * RW for both hypervisor and guest.
130 * RW for both hypervisor and guest (see exceptions above).
131 * Guest's updates to this field are verified and then loaded by the
/freebsd/sys/amd64/vmm/amd/
H A Dsvm_support.S43 * %rsi: pointer to guest context
68 push %rsi /* push guest context pointer on the stack */
71 * Restore guest state.
92 pop %rax /* pop guest context pointer from the stack */
95 * Save guest state.
115 * exiting a guest.
144 * Clobber the remaining registers with guest contents so they
/freebsd/sys/dev/vmware/vmci/
H A Dvmci_queue.h64 * guest end of the queue pair has attached -AND- SetPageStore(). The VMX
65 * crosstalk device will issue the SetPageStore() on behalf of the guest when
66 * the guest creates a QueuePair or attaches to one created by the host. So, if
67 * the guest notifies the host that it's attached then the queue is safe to use.
68 * Also, if the host registers notification of the connection of the guest, then
69 * it will only receive that notification when the guest has issued the
70 * SetPageStore() call and not before (when the guest had attached).
/freebsd/sys/amd64/vmm/
H A Dx86.c117 * Pass these through to the guest in x86_emulate_cpuid()
164 * Hide SVM from guest. in x86_emulate_cpuid()
170 * to the guest. in x86_emulate_cpuid()
187 /* Hide mwaitx/monitorx capability from the guest */ in x86_emulate_cpuid()
204 * them to a guest doesn't make a lot of sense. in x86_emulate_cpuid()
216 * "Invariant TSC" can be advertised to the guest if: in x86_emulate_cpuid()
223 * it should discourage the guest from using the in x86_emulate_cpuid()
237 * topology for the guest with L3 shared by the in x86_emulate_cpuid()
312 * Advertise x2APIC capability and Hypervisor guest. in x86_emulate_cpuid()
325 * Only advertise CPUID2_XSAVE in the guest if in x86_emulate_cpuid()
[all …]
/freebsd/sys/x86/iommu/
H A Damd_reg.h157 #define AMDIOMMU_CTRL_GT_EN 0x0000000000010000ull /* Guest En */
158 #define AMDIOMMU_CTRL_GA_EN 0x0000000000020000ull /* Guest vAPIC En */
162 #define AMDIOMMU_CTRL_GAM_EN_MASK 0x000000000e000000ull /* Guest vAPIC Mode En */
165 #define AMDIOMMU_CTRL_GALOG_EN 0x0000000010000000ull /* Guest vAPIC GA Log En */
166 #define AMDIOMMU_CTRL_GAINT_EN 0x0000000020000000ull /* Guest vAPIC GA Intr En */
191 #define AMDIOMMU_CTRL_GDUP_DIS 0x0001000000000000ull /* Dis Dirty in guest PT */
196 #define AMDIOMMU_CTRL_GAUP_DIS 0x0040000000000000ull /* Dis Access in guest PT */
197 #define AMDIOMMU_CTRL_GAPPI_EN 0x0080000000000000ull /* Guest APIC phys proc intr En */
270 u_int gprp:1; /* Guest PPR Resp with PASID */
271 u_int giov:1; /* Guest IO Prot Valid */
[all …]
/freebsd/sys/arm64/vmm/
H A Dvmm_handlers.c50 /* Enter the guest */
80 * Switch to a guest vttbr and clean the TLB for a range of guest
99 * Switch to a guest vttbr and clean the TLB for all the guest
/freebsd/sys/net/
H A Dparavirt.h31 Support for virtio-like communication between host (H) and guest (G) NICs.
35 The guest allocates the shared Communication Status Block (csb) and
109 RDT writes on the receive side when the guest is too slow and
116 * [GH][RW][+-0] guest/host reads/writes frequently/rarely/almost never
118 /* these are (mostly) written by the guest */
125 uint32_t guest_use_msix; /* GW0 HR0 guest uses MSI-X interrupts. */
132 * set by the guest */
/freebsd/sys/amd64/vmm/intel/
H A Dvmx_support.S46 * Save the guest context.
71 * On "return" all registers are updated to reflect guest state. The two
73 * by hardware from the guest area of the vmcs.
99 * Clobber the remaining registers with guest contents so they can't
199 * Non-error VM-exit from the guest. Make this a label so it can
207 * Save guest state that is not automatically saved in the vmcs.
218 * exiting a guest.
243 * Save guest state that is not automatically saved in the vmcs.

12345678910>>...15