Home
last modified time | relevance | path

Searched +full:guest +full:- +full:side (Results 1 – 25 of 63) sorted by relevance

123

/freebsd/sys/net/
H A Dparavirt.h31 Support for virtio-like communication between host (H) and guest (G) NICs.
35 The guest allocates the shared Communication Status Block (csb) and
37 csb->csb_on enables the mode. If disabled, the device acts a regular one.
50 if ( cond(C) ) { // C is written by the other side
83 TDT writes on the transmit side when the host is too slow.
109 RDT writes on the receive side when the guest is too slow and
116 * [GH][RW][+-0] guest/host reads/writes frequently/rarely/almost never
118 /* these are (mostly) written by the guest */
120 uint32_t guest_need_txkick; /* GW- HR+ G ran out of tx bufs, request kick */
121 uint32_t guest_need_rxkick; /* GW- HR+ G ran out of rx pkts, request kick */
[all …]
/freebsd/sys/dev/vmware/vmci/
H A Dvmci_defs.h1 /*-
4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0)
15 #pragma GCC diagnostic ignored "-Wcast-qual"
58 * Maximum MSI/MSI-X interrupt vectors in the device.
186 * Well-known context id, a logical context that contains a set of
187 * well-known services. This context ID is now obsolete.
207 *------------------------------------------------------------------------------
211 *------------------------------------------------------------------------------
220 #define VMCI_ERROR_INVALID_RESOURCE (-1)
221 #define VMCI_ERROR_INVALID_ARGS (-2)
[all …]
H A Dvmci_queue_pair.c1 /*-
4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0)
76 *------------------------------------------------------------------------------
78 * vmci_queue_pair_alloc --
81 * real work is done in the host or guest specific function.
86 * Side effects:
89 *------------------------------------------------------------------------------
107 *------------------------------------------------------------------------------
109 * vmci_queue_pair_detach --
112 * Real work is done in the host or guest specific function.
[all …]
H A Dvmci_queue.h1 /*-
4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0)
22 * vmci_queue_kernel_if is a per-OS defined queue structure. It contains
39 *------------------------------------------------------------------------------
46 * there's an unused last parameter for the hosted side. In ESX, that parameter
49 *------------------------------------------------------------------------------
59 *------------------------------------------------------------------------------
63 * Note that these routines are NOT SAFE to call on a host end-point until the
64 * guest end of the queue pair has attached -AND- SetPageStore(). The VMX
65 * crosstalk device will issue the SetPageStore() on behalf of the guest when
[all …]
H A Dvmci_doorbell.c1 /*-
4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0)
59 * The last_notify_idx_reserved is used to track the last index handed out - in
73 *------------------------------------------------------------------------------
75 * vmci_doorbell_init --
82 * Side effects:
85 *------------------------------------------------------------------------------
102 *------------------------------------------------------------------------------
104 * vmci_doorbell_exit --
111 * Side effects:
[all …]
H A Dvmci_datagram.c1 /*-
4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0)
45 /*------------------------------ Helper functions ----------------------------*/
48 *------------------------------------------------------------------------------
50 * datagram_free_cb --
58 * Side effects:
61 *------------------------------------------------------------------------------
71 vmci_signal_event(&entry->destroy_event); in datagram_free_cb()
80 *------------------------------------------------------------------------------
82 * datagram_release_cb --
[all …]
H A Dvmci_utils.h1 /*-
4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0)
13 *------------------------------------------------------------------------------
15 * vmci_hash_id --
21 * Returns guest call size.
23 * Side effects:
26 *------------------------------------------------------------------------------
38 return (hash & (size - 1)); in vmci_hash_id()
H A Dvmci_qpair.c1 /*-
4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0)
12 * as a whole. This is simpler and less error-prone, and allows for future
43 *------------------------------------------------------------------------------
45 * vmci_queue_add_producer_tail --
53 * Side effects:
56 *------------------------------------------------------------------------------
64 vmci_queue_header_add_producer_tail(queue->q_header, add, queue_size); in vmci_queue_add_producer_tail()
69 *------------------------------------------------------------------------------
71 * vmci_queue_add_consumer_head --
[all …]
/freebsd/sys/contrib/device-tree/Bindings/arm/
H A Dfw-cfg.txt3 QEMU's arm-softmmu and aarch64-softmmu emulation / virtualization targets
7 - A write-only, 16-bit wide selector (or control) register,
8 - a read-write, 64-bit wide data register.
11 registers; their location is communicated to the guest's UEFI firmware in the
12 DTB that QEMU places at the bottom of the guest's DRAM.
14 The authoritative guest-side hardware interface documentation to the fw_cfg
20 - compatible: "qemu,fw-cfg-mmio".
22 - reg: the MMIO region used by the device.
31 #size-cells = <0x2>;
32 #address-cells = <0x2>;
[all …]
/freebsd/sys/contrib/device-tree/Bindings/firmware/
H A Dqemu,fw-cfg-mmio.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
4 $id: http://devicetree.org/schemas/firmware/qemu,fw-cfg-mmio.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Rob Herring <robh@kernel.org>
16 - A write-only, 16-bit wide selector (or control) register,
17 - a read-write, 64-bit wide data register.
20 registers; their location is communicated to the guest's UEFI firmware in the
21 DTB that QEMU places at the bottom of the guest's DRAM.
23 The authoritative guest-side hardware interface documentation to the fw_cfg
[all …]
/freebsd/sys/dev/hyperv/utilities/
H A Dhv_kvp.h1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
37 * Maximum value size - used for both key names and value data, and includes
48 * Note: This value is used in defining the KVP exchange message - this value
59 * Maximum key size - the registry limit for the length of an entry name
69 * implementing the host/guest protocol. 2) A user level daemon that is
72 * Host/Guest Protocol: The host iterates over an index and expects the guest
75 * given point in time. The host side iteration stops when the guest returns
93 * Guest Kernel/KVP Daemon Protocol: As noted earlier, we implement all of the
96 * kernel and user-level daemon communicate using a connector channel.
[all …]
/freebsd/sys/dev/hyperv/hvsock/
H A Dhv_sock.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
76 /* The MTU is 16KB per host side's design */
78 #define HVSOCK_SEND_BUF_SZ (PAGE_SIZE - sizeof(struct vmpipe_proto_header))
122 /* 00000000-facb-11e6-bd58-64006a7986d3 */
150 "0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x\n", in hvsock_print_guid()
160 return !memcmp(&id->hv_guid[4], in is_valid_srv_id()
161 &srv_id_template.hv_guid[4], sizeof(struct hyperv_guid) - 4); in is_valid_srv_id()
227 if (!so || !so->so_pcb) { in hvs_remove_socket_from_list()
241 if (!so || !so->so_pcb) { in hvs_insert_socket_on_list()
[all …]
/freebsd/sys/amd64/vmm/io/
H A Dvrtc.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
71 uint8_t nvram2[128 - 51];
86 #define VRTC_LOCK(vrtc) mtx_lock(&((vrtc)->mtx))
87 #define VRTC_UNLOCK(vrtc) mtx_unlock(&((vrtc)->mtx))
88 #define VRTC_LOCKED(vrtc) mtx_owned(&((vrtc)->mtx))
92 * - RTC updates are halted by the guest
93 * - RTC date/time fields have invalid values
95 #define VRTC_BROKEN_TIME ((time_t)-1)
100 #define rtc_halted(vrtc) ((vrtc->rtcdev.reg_b & RTCSB_HALT) != 0)
[all …]
/freebsd/usr.sbin/bhyve/amd64/
H A Dpci_gvt-d.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
21 #include "pci_gvt-d-opregion.h"
86 struct passthru_softc *sc = pi->pi_arg; in set_bdsm_gen3()
94 bdsm_gpa | (bdsm & (PCIM_BDSM_GSM_ALIGNMENT - 1))); in set_bdsm_gen3()
108 struct passthru_softc *sc = pi->pi_arg; in set_bdsm_gen11()
116 bdsm_gpa | (bdsm & (PCIM_BDSM_GSM_ALIGNMENT - 1))); in set_bdsm_gen11()
195 struct passthru_softc *sc = pi->pi_arg; in get_igd_ops()
217 sc = pi->pi_arg; in gvt_d_probe()
254 * it's only GPU accessible. As the CPU can't access the area, the guest
[all …]
/freebsd/share/man/man4/
H A Diavf.41 .\"-
2 .\" SPDX-License-Identifier: BSD-3-Clause
4 .\" Copyright (c) 2013-2018, Intel Corporation
44 .Bd -ragged -offset indent
51 .Bd -literal -offset indent
62 .Bl -bullet -compact
64 Intel\(rg Ethernet Controller E810\-C
66 Intel\(rg Ethernet Controller E810\-XXV
68 Intel\(rg Ethernet Connection E822\-C
70 Intel\(rg Ethernet Connection E822\-L
[all …]
/freebsd/sys/contrib/ncsw/inc/Peripherals/
H A Dfm_ext.h1 /* Copyright (c) 2008-2012 Freescale Semiconductor, Inc
65 run-time control routines. This module must be initialized always
67 NOTE - We assume that the FM library will be initialized only by core No. 0!
115 volatile uint16_t cksum; /**< Running-sum */
116 …volatile uint16_t flags_frag_off; /**< Flags & fragment-offset field of the last IP-header …
120 volatile uint8_t ip_pid_off; /**< IP PID (last IP-proto) offset */
154 #define FM_FD_ERR_UNSUPPORTED_FORMAT 0x04000000 /**< Not for Rx-Port! Unsupported Format */
155 #define FM_FD_ERR_LENGTH 0x02000000 /**< Not for Rx-Port! Length Error */
160 #define FM_FD_ERR_IPR_NCSP (0x00100000 | FM_FD_IPR) /**< IPR non-consistent-sp */
211 #define FM_FD_RX_STATUS_ERR_NON_FM 0x00400000 /**< non Frame-Manager error */
[all …]
/freebsd/sys/contrib/xen/
H A Dvm_event.h53 * Emulate the fault-causing instruction (if set in the event response flags).
54 * This will allow the guest to continue execution without lifting the page
60 * potentially having side effects (like memory mapped or port I/O) disabled.
79 * Currently only useful for MSR and control-register write events.
95 * At the moment x86-only, applies to EAX-EDX, ESP, EBP, ESI, EDI, R8-R15,
109 * Have a one-shot VM_EVENT_REASON_INTERRUPT event sent for the first
149 /* Single-step (e.g. MTF) */
160 * As this behavior is CPU-specific, users are advised to not rely on it.
177 /* The limit field is right-shifted by 12 bits if .ar.g is set. */
222 * VM. npt_base is the guest physical address of the L1 hypervisors
[all …]
H A Dxen.h4 * Guest OS interface to Xen.
30 #include "xen-compat.h"
33 #include "arch-x86/xen.h"
35 #include "arch-arm.h"
41 /* Guest handles for primitive C types. */
135 /* Architecture-specific hypercall definitions. */
157 /* New event-channel and physdev hypercalls introduced in 0x00030202. */
173 * Virtual interrupts that a guest OS may receive from Xen.
175 * In the side comments, 'V.' denotes a per-VCPU VIRQ while 'G.' denotes a
176 * global VIRQ. The former can be bound once per VCPU and cannot be re-bound.
[all …]
/freebsd/sys/dev/vmware/vmxnet3/
H A Dif_vmxreg.h1 /*-
55 #define UPT1_F_RSS 0x0002 /* Receive side scaling */
228 uint32_t guest; /* Guest OS */ member
/freebsd/share/doc/papers/devfs/
H A Dpaper.me1 .\" format with ditroff -me
19 .ip \0\s-2\(bu\s+2
29 .i "Poul-Henning Kamp"
43 Starting from a high-level view of devices and the semantics that
45 grand tour of the redesigned FreeBSD device-I/O system,
99 disk-pack with a filesystem: selling pre-initialised and ``quality
100 tested'' disk-packs was quite a profitable business.
112 device would be inode number 5, the paper-tape-punch number 6 and so on,
122 in most UNIX-like systems even to this day.
150 In order to support remote login a ``pseudo-tty'' device driver was implemented,
[all …]
/freebsd/sys/contrib/xen/io/
H A Dusbif.h4 * USB I/O interface for Xen guest OSes.
38 * the guest and a backend driver in a driver domain (normally dom0) having
39 * access to the physical USB device(s) being passed to the guest.
49 * under "backend/<guest-dom-id>/qusb".
58 * "conn-ring".
61 * responses). This is the "urb-ring".
74 * driver side whose XenBus tree contains them.
80 *------------------ Backend Device Identification (PRIVATE) ------------------
82 * num-ports
87 * usb-ver
[all …]
H A Dvscsiif.h45 * driver side whose XenBus tree contains them.
51 *------------------ Backend Device Identification (PRIVATE) ------------------
53 * p-devname
58 * p-dev
61 * A string specifying the backend device: either a 4-tuple "h:c:t:l"
65 * v-dev
68 * A string specifying the frontend device in form of a 4-tuple "h:c:t:l"
71 *--------------------------------- Features ---------------------------------
73 * feature-sg-grant
85 *----------------------- Request Transport Parameters -----------------------
[all …]
/freebsd/contrib/llvm-project/llvm/lib/Target/AArch64/
H A DAArch64Arm64ECCallLowering.cpp1 //===-- AArch64Arm64ECCallLowering.cpp - Lower Arm64EC calls ----*- C++ -*-===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
16 //===----------------------------------------------------------------------===//
44 static cl::opt<bool> LowerDirectToIndirect("arm64ec-lower-direct-to-indirect",
46 static cl::opt<bool> GenerateThunks("arm64ec-generate-thunks", cl::Hidden,
132 // for entry/guest exit thunks, we just call the Arm64 function directly. in getThunkType()
156 if (FT->isVarArg()) { in getThunkArgTypes()
158 // with the following type on the ARM side: in getThunkArgTypes()
164 // x0-x3 is the arguments be stored in registers. in getThunkArgTypes()
[all …]
/freebsd/sys/amd64/vmm/amd/
H A Dsvm.c1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
110 static MALLOC_DEFINE(M_SVM_VLAPIC, "svm-vlapic", "svm-vlapic");
269 asid[cpu].num = nasid - 1; in svm_modinit()
301 ctrl->tsc_offset = offset; in svm_set_tsc_offset()
306 vm_set_tsc_offset(vcpu->vcpu, offset); in svm_set_tsc_offset()
330 switch (paging->cpu_mode) { in svm_get_cs_info()
356 *index = -1; in svm_msr_index()
365 base += (MSR_PENTIUM_END - MSR_PENTIUM_START + 1); in svm_msr_index()
367 off = (msr - MSR_AMD6TH_START); in svm_msr_index()
[all …]
/freebsd/sys/dev/bnxt/bnxt_en/
H A Dhsi_struct_def.h1 /*-
34 * Copyright(c) 2001-2025, Broadcom. All rights reserved. The
71 * * 0x0-0xFFF8 - The function ID
72 * * 0xFFF8-0xFFFC, 0xFFFE - Reserved for internal processors
73 * * 0xFFFD - Reserved for user-space HWRM interface
74 * * 0xFFFF - HWRM
80 * physical address (HPA) or a guest physical address (GPA) and must
122 /* Engine CKV - The Alias key EC curve and ECC public key information. */
124 /* Engine CKV - Initialization vector. */
126 /* Engine CKV - Authentication tag. */
[all …]

123