/linux/Documentation/ABI/stable/ |
H A D | sysfs-hypervisor-xen | 4 Contact: xen-devel@lists.xenproject.org 5 Description: If running under Xen: 6 Contains the build time stamp of the Xen hypervisor 13 Contact: xen-devel@lists.xenproject.org 14 Description: If running under Xen: 15 Contains information who built the Xen hypervisor 22 Contact: xen-devel@lists.xenproject.org 23 Description: If running under Xen: 24 Compiler which was used to build the Xen hypervisor 31 Contact: xen-devel@lists.xenproject.org [all …]
|
H A D | sysfs-bus-xen-backend | 1 What: /sys/bus/xen-backend/devices/*/devtype 9 What: /sys/bus/xen-backend/devices/*/nodename 17 What: /sys/bus/xen-backend/devices/vbd-*/physical_device 26 What: /sys/bus/xen-backend/devices/vbd-*/mode 34 What: /sys/bus/xen-backend/devices/vbd-*/statistics/f_req 41 What: /sys/bus/xen-backend/devices/vbd-*/statistics/oo_req 49 What: /sys/bus/xen-backend/devices/vbd-*/statistics/rd_req 56 What: /sys/bus/xen-backend/devices/vbd-*/statistics/rd_sect 63 What: /sys/bus/xen-backend/devices/vbd-*/statistics/wr_req 70 What: /sys/bus/xen-backend/devices/vbd-*/statistics/wr_sect [all …]
|
/linux/drivers/xen/ |
H A D | Kconfig | 2 menu "Xen driver support" 3 depends on XEN 6 bool "Xen memory balloon driver" 9 The balloon driver allows the Xen domain to request more memory from 14 bool "Memory hotplug support for Xen balloon driver" 18 Memory hotplug support for Xen balloon driver allows expanding memory 84 tristate "Xen /dev/xen/evtchn device" 100 tristate "Xen filesystem" 104 The xen filesystem provides a way for domains to share 111 bool "Create compatibility mount point /proc/xen" [all …]
|
H A D | Makefile | 13 dom0-$(CONFIG_XEN_ACPI) += acpi.o $(xen-pad-y) 14 xen-pad-$(CONFIG_X86) += xen-acpi-pad.o 18 obj-$(CONFIG_XEN_BALLOON) += xen-balloon.o 19 obj-$(CONFIG_XEN_DEV_EVTCHN) += xen-evtchn.o 20 obj-$(CONFIG_XEN_GNTDEV) += xen-gntdev.o 21 obj-$(CONFIG_XEN_GRANT_DEV_ALLOC) += xen-gntalloc.o 25 obj-$(CONFIG_SWIOTLB_XEN) += swiotlb-xen.o 27 obj-$(CONFIG_XEN_PCI_STUB) += xen-pciback/ 28 obj-$(CONFIG_XEN_PRIVCMD) += xen-privcmd.o 29 obj-$(CONFIG_XEN_ACPI_PROCESSOR) += xen-acpi-processor.o [all …]
|
H A D | features.c | 5 * Xen feature flags. 14 #include <asm/xen/hypercall.h> 16 #include <xen/xen.h> 17 #include <xen/interface/xen.h> 18 #include <xen/interface/version.h> 19 #include <xen/features.h> 22 * Linux kernel expects at least Xen 4.0. 29 panic("Xen: feature %s not available!\n", #f); \
|
/linux/arch/x86/xen/ |
H A D | xen-head.S | 2 /* Xen-specific pieces of head.S, intended to be included in the right 17 #include <xen/interface/elfnote.h> 18 #include <xen/interface/features.h> 19 #include <xen/interface/xen.h> 20 #include <xen/interface/xen-mca.h> 21 #include <asm/xen/interface.h> 32 * Xen will write the hypercall page, and sort out ENDBR. 40 #include <asm/xen-hypercalls.h> 90 ELFNOTE(Xen, XEN_ELFNOTE_GUEST_OS, .asciz "linux") 91 ELFNOTE(Xen, XEN_ELFNOTE_GUEST_VERSION, .asciz "2.6") [all …]
|
H A D | Kconfig | 3 # This Kconfig describes xen options 6 config XEN config 7 bool "Xen guest support" 15 This is the Linux Xen port. Enabling this will allow the 17 Xen hypervisor. 20 bool "Xen PV guest support" 22 depends on XEN 29 Support running as a Xen PV guest. 32 bool "Limit Xen pv-domain memory to 512GB" 38 The Xen tools and crash dump analysis tools might not support [all …]
|
H A D | irq.c | 6 #include <xen/interface/xen.h> 7 #include <xen/interface/sched.h> 8 #include <xen/interface/vcpu.h> 9 #include <xen/features.h> 10 #include <xen/events.h> 12 #include <asm/xen/hypercall.h> 13 #include <asm/xen/hypervisor.h> 15 #include "xen-ops.h" 18 * Force a proper event-channel callback from Xen after clearing the 20 * down into Xen. The pending flag will be checked by Xen on return.
|
H A D | efi.c | 11 #include <xen/xen.h> 12 #include <xen/xen-ops.h> 13 #include <xen/interface/platform.h> 17 #include <asm/xen/hypercall.h> 19 #include "xen-ops.h" 33 .con_in_handle = EFI_INVALID_TABLE_ADDR, /* Not used under Xen. */ 34 .con_in = NULL, /* Not used under Xen. */ 35 .con_out_handle = EFI_INVALID_TABLE_ADDR, /* Not used under Xen. */ 36 .con_out = NULL, /* Not used under Xen. */ 37 .stderr_handle = EFI_INVALID_TABLE_ADDR, /* Not used under Xen. */ [all …]
|
H A D | platform-pci-unplug.c | 6 * Xen platform PCI device driver 16 #include <xen/xen.h> 17 #include <xen/platform_pci.h> 18 #include "xen-ops.h" 35 pr_err("Xen Platform PCI: unrecognised magic value\n"); in check_platform_magic() 41 pr_debug("Xen Platform PCI: I/O protocol version %d\n", in check_platform_magic() 49 pr_err("Xen Platform: blacklisted by host\n"); in check_platform_magic() 54 pr_warn("Xen Platform PCI: unknown I/O protocol version\n"); in check_platform_magic() 146 /* check the version of the xen platform PCI device */ in xen_unplug_emulated_devices() 148 /* If the version matches enable the Xen platform PCI driver. in xen_unplug_emulated_devices() [all …]
|
H A D | smp_pv.c | 3 * Xen SMP support 5 * This file implements the Xen versions of smp_ops. SMP under Xen is 9 * IPIs are handled through the Xen event mechanism. 35 #include <xen/interface/xen.h> 36 #include <xen/interface/vcpu.h> 37 #include <xen/interface/xenpmu.h> 40 #include <asm/xen/interface.h> 41 #include <asm/xen/hypercall.h> 43 #include <xen/xen.h> 44 #include <xen/page.h> [all …]
|
H A D | time.c | 3 * Xen time implementation. 21 #include <asm/xen/hypervisor.h> 22 #include <asm/xen/hypercall.h> 23 #include <asm/xen/cpuid.h> 25 #include <xen/events.h> 26 #include <xen/features.h> 27 #include <xen/interface/xen.h> 28 #include <xen/interface/vcpu.h> 30 #include "xen-ops.h" 37 /* Get the TSC speed from Xen */ [all …]
|
H A D | suspend.c | 6 #include <xen/xen.h> 7 #include <xen/interface/xen.h> 8 #include <xen/grant_table.h> 9 #include <xen/events.h> 13 #include <asm/xen/hypercall.h> 14 #include <asm/xen/page.h> 17 #include "xen-ops.h"
|
H A D | enlighten_hvm.c | 9 #include <xen/features.h> 10 #include <xen/events.h> 11 #include <xen/hvm.h> 12 #include <xen/interface/hvm/hvm_op.h> 13 #include <xen/interface/memory.h> 26 #include <asm/xen/cpuid.h> 27 #include <asm/xen/hypervisor.h> 28 #include <asm/xen/page.h> 30 #include "xen-ops.h" 84 * old Xen versions (xen_have_vector_callback == 0). in xen_hvm_init_mem_mapping() [all …]
|
H A D | suspend_hvm.c | 4 #include <xen/xen.h> 5 #include <xen/hvm.h> 6 #include <xen/features.h> 7 #include <xen/interface/features.h> 8 #include <xen/events.h> 10 #include "xen-ops.h"
|
/linux/arch/x86/kvm/ |
H A D | xen.c | 6 * KVM Xen emulation 11 #include "xen.h" 20 #include <xen/interface/xen.h> 21 #include <xen/interface/vcpu.h> 22 #include <xen/interface/version.h> 23 #include <xen/interface/event_channel.h> 24 #include <xen/interface/sched.h> 26 #include <asm/xen/cpuid.h> 40 struct gfn_to_pfn_cache *gpc = &kvm->arch.xen.shinfo_cache; in kvm_xen_shared_info_init() 75 if (IS_ENABLED(CONFIG_64BIT) && kvm->arch.xen.long_mode) { in kvm_xen_shared_info_init() [all …]
|
/linux/Documentation/devicetree/bindings/arm/ |
H A D | xen.txt | 1 * Xen hypervisor device tree bindings 3 Xen ARM virtual platforms shall have a top-level "hypervisor" node with 7 compatible = "xen,xen-<version>", "xen,xen"; 8 where <version> is the version of the Xen ABI of the platform. 19 - interrupts: the interrupt used by Xen to inject event notifications. 22 To support UEFI on Xen ARM virtual platforms, Xen populates the FDT "uefi" node 28 xen,uefi-system-table | 64-bit | Guest physical address of the UEFI System 31 xen,uefi-mmap-start | 64-bit | Guest physical address of the UEFI memory 34 xen,uefi-mmap-size | 32-bit | Size in bytes of the UEFI memory map 37 xen,uefi-mmap-desc-size | 32-bit | Size in bytes of each entry in the UEFI [all …]
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-devices-xenbus | 3 Contact: Xen Developers mailing list <xen-devel@lists.xenproject.org> 5 Number of Xen event channels associated with a kernel based 10 Contact: Xen Developers mailing list <xen-devel@lists.xenproject.org> 12 Total number of Xen events received for a Xen pv device 17 Contact: Xen Developers mailing list <xen-devel@lists.xenproject.org> 19 Summed up time in jiffies the EOI of an interrupt for a Xen 26 Contact: Xen Developers mailing list <xen-devel@lists.xenproject.org> 28 Number of events received for a Xen pv device which did not 34 Contact: Xen Developers mailing list <xen-devel@lists.xenproject.org> 37 before delayed EOI processing is triggered for a Xen pv
|
H A D | sysfs-hypervisor-xen | 4 Contact: xen-devel@lists.xenproject.org 5 Description: If running under Xen: 7 "Xen": standard guest type on arm 16 Description: If running under Xen: 17 Describes mode that Xen's performance-monitoring unit (PMU) 34 Description: If running under Xen: 35 Describes Xen PMU features (as an integer). A set bit indicates 37 include/xen/interface/xenpmu.h for available features 42 Contact: xen-devel@lists.xenproject.org 43 Description: If running under Xen:
|
/linux/arch/arm/xen/ |
H A D | enlighten.c | 2 #include <xen/xen.h> 3 #include <xen/events.h> 4 #include <xen/grant_table.h> 5 #include <xen/hvm.h> 6 #include <xen/interface/vcpu.h> 7 #include <xen/interface/xen.h> 8 #include <xen/interface/memory.h> 9 #include <xen/interface/hvm/params.h> 10 #include <xen/features.h> 11 #include <xen/platform_pci.h> [all …]
|
H A D | mm.c | 15 #include <xen/xen.h> 16 #include <xen/interface/grant_table.h> 17 #include <xen/interface/memory.h> 18 #include <xen/page.h> 19 #include <xen/xen-ops.h> 20 #include <xen/swiotlb-xen.h> 23 #include <asm/xen/hypercall.h> 24 #include <asm/xen/interface.h> 71 * Dom0 is mapped 1:1, and while the Linux page can span across multiple Xen 72 * pages, it is not possible for it to contain a mix of local and foreign Xen [all …]
|
/linux/tools/testing/selftests/kvm/x86_64/ |
H A D | xen_vmcall_test.c | 47 /* Fill in the Xen hypercall page */ in guest_code() 62 /* Invoke a Xen hypercall */ in guest_code() 112 TEST_ASSERT_EQ(run->xen.type, KVM_EXIT_XEN_HCALL); in main() 113 TEST_ASSERT_EQ(run->xen.u.hcall.cpl, 0); in main() 114 TEST_ASSERT_EQ(run->xen.u.hcall.longmode, 1); in main() 115 TEST_ASSERT_EQ(run->xen.u.hcall.input, INPUTVALUE); in main() 116 TEST_ASSERT_EQ(run->xen.u.hcall.params[0], ARGVALUE(1)); in main() 117 TEST_ASSERT_EQ(run->xen.u.hcall.params[1], ARGVALUE(2)); in main() 118 TEST_ASSERT_EQ(run->xen.u.hcall.params[2], ARGVALUE(3)); in main() 119 TEST_ASSERT_EQ(run->xen.u.hcall.params[3], ARGVALUE(4)); in main() [all …]
|
/linux/Documentation/devicetree/bindings/iommu/ |
H A D | xen,grant-dma.yaml | 4 $id: http://devicetree.org/schemas/iommu/xen,grant-dma.yaml# 7 title: Xen specific IOMMU for virtualized devices (e.g. virtio) 13 The Xen IOMMU represents the Xen grant table interface. Grant mappings 14 are to be used with devices connected to the Xen IOMMU using the "iommus" 16 The binding is required to restrict memory access using Xen grant mappings. 20 const: xen,grant-dma 37 compatible = "xen,grant-dma";
|
/linux/arch/x86/platform/pvh/ |
H A D | enlighten.c | 4 #include <xen/hvc-console.h> 12 #include <asm/xen/interface.h> 14 #include <xen/xen.h> 15 #include <xen/interface/hvm/start_info.h> 34 * Xen guests are able to obtain the memory map from the hypervisor via the 36 * If we are trying to boot a Xen PVH guest, it is expected that the kernel 63 /* Non-xen guests are not supported by version 0 */ in init_pvh_bootparams() 92 * Version 2.12 supports Xen entry point but we will use default x86/PC in init_pvh_bootparams() 102 * If we are trying to boot a Xen PVH guest, it is expected that the kernel 107 xen_raw_printk("Error: Missing xen PVH initialization\n"); in xen_pvh_init()
|
/linux/Documentation/security/tpm/ |
H A D | xen-tpmfront.rst | 2 Virtual TPM interface for Xen 8 Xen. The reader is assumed to have familiarity with building and installing Xen, 15 operating system (in Xen terms, a DomU). This allows programs to interact with 21 the chain of trust rooted in the hardware TPM to virtual machines in Xen. Each 39 | xen-tpmfront | 73 * xen-tpmfront.ko: 112 Integration With Xen 115 Support for the vTPM driver was added in Xen using the libxl toolstack in Xen 116 4.3. See the Xen documentation (docs/misc/vtpm.txt) for details on setting up 122 the initrd, the xen-tpmfront driver must be compiled in to the kernel. If not
|