/freebsd/sys/contrib/xen/ |
H A D | pmu.h | 74 * - XENPMU_MODE_SELF: Guests can profile themselves 75 * - XENPMU_MODE_HV: Guests can profile themselves, dom0 profiles 78 * everyone: itself, the hypervisor and the guests. 116 * guests set to vcpu_id; 121 * Domain that was interrupted. On non-privileged guests set to DOMID_SELF. 122 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
|
H A D | arch-arm.h | 36 * registers, the first argument in x0/r0 (for arm64/arm32 guests 63 * (including the hypervisor and other guests) must reside in memory 138 * - struct start_info is not exported to ARM guests. 140 * - struct shared_info is mapped by ARM guests using the 144 * - All the per-cpu struct vcpu_info are mapped by ARM guests using the 209 * Maximum number of virtual CPUs in legacy multi-processor guests. 281 /* AArch32 guests only */ 284 /* AArch64 guests only */ 395 * hypervisor. Guests must not rely on these hardcoded values but
|
H A D | sched.h | 55 * This legacy version is available to new guests as: 80 * x86 PV guests must also set RDX (EDX for 32-bit guests) to the MFN
|
H A D | xen.h | 261 * For 32-bit guests, the L4 is not used (as there is less pagetables), so 531 /* x86/32 guests: simulate full 4GB segment limits. */ 534 /* x86/32 guests: trap (vector 15) whenever above vmassist is used. */ 538 * x86 guests: support writes to bottom-level PTEs. 544 /* x86/PAE guests: support PDPTs above 4GB. */ 548 * x86 guests: Sane behaviour for virtual iopl 556 * All guests: activate update indicator in vcpu_runstate_info 563 * x86/64 guests: strictly hide M2P from user mode. 741 * compatible Xen versions; guests should not rely on the size 783 * Guests should base their gettimeofday() syscall on this
|
H A D | memory.h | 106 * Note that only PV guests can use this operation. 241 * physical address space (translated guests only). 308 * physical address space (translated guests only). 710 * memory ranges and vcpu mapping provided for guests. 713 * After filling guests structures, nr_vnodes, nr_vmemranges and nr_vcpus
|
H A D | event_channel.h | 43 * guests must check the value of the bit after re-enabling event 272 * ABI was used. Guests should not bind events during EVTCHNOP_reset call 285 * will be lost. Guests should call this before binding any event to
|
H A D | argo.h | 76 /* Guests should use atomic operations to access rx_ptr */ 78 /* Guests should use atomic operations to access tx_ptr */
|
H A D | vcpu.h | 44 * @extra_arg == For PV or ARM guests this is a pointer to a vcpu_guest_context 46 * HVM based guests this is a pointer to a vcpu_hvm_context
|
H A D | xen-compat.h | 36 /* Guests which do not specify a version get the legacy interface. */
|
/freebsd/lib/libpam/modules/pam_guest/ |
H A D | pam_guest.c | 72 const char *authtok, *guests, *user; in pam_sm_authenticate() local 80 if ((guests = openpam_get_option(pamh, "guests")) == NULL) in pam_sm_authenticate() 81 guests = DEFAULT_GUESTS; in pam_sm_authenticate() 84 is_guest = lookup(user, guests); in pam_sm_authenticate()
|
H A D | pam_guest.8 | 60 .It Cm guests Ns = Ns Ar list
|
/freebsd/sys/contrib/xen/hvm/ |
H A D | hvm_info_table.h | 38 * In some cases SMP HVM guests may require knowledge of Xen's idea of vCPU ids 40 * hypercalls take vcpu id as a parameter. It is valid for HVM guests to assume 42 * is always present for SMP guests.
|
/freebsd/sys/contrib/xen/arch-x86/ |
H A D | pmu.h | 32 * For PV(H) guests these fields are RO. 55 * For PV(H) guests these fields are RO. 106 * WO for hypervisor, RO for guests.
|
H A D | cpufeatureset.h | 86 * Applicability to guests: 'A', 'S' or 'H' 87 * 'A' = All guests. 88 * 'S' = All HVM guests (not PV guests). 89 * 'H' = HVM HAP guests (not PV or HVM Shadow guests).
|
H A D | xen.h | 116 /* Maximum number of virtual CPUs in legacy multi-processor guests. */ 172 * Also note that when calling DOMCTL_setvcpucontext for HVM guests, not all 176 * Note: VCPUOP_initialise for HVM guests is non-symetric with
|
/freebsd/sys/contrib/xen/arch-x86/hvm/ |
H A D | start_info.h | 27 * Start of day structure passed to PVH guests and to HVM guests in %ebx. 99 * memory map is optional and so guests that understand version 1
|
/freebsd/usr.sbin/bhyve/amd64/ |
H A D | xmsr.c | 126 * Windows guests check this MSR. in emulate_rdmsr() 199 * OpenBSD guests test bit 0 of this MSR to detect if the in emulate_rdmsr()
|
/freebsd/sys/contrib/device-tree/Bindings/misc/ |
H A D | pvpanic-mmio.txt | 9 QEMU exposes the data register to guests as memory mapped registers.
|
/freebsd/usr.sbin/bhyve/ |
H A D | bhyve.8 | 96 It can run guests on amd64 and arm64 platforms with suitable hardware support. 858 option should be used for guests that attempt to issue BIOS calls which result 864 to boot traditional BIOS guests that require the legacy VGA I/O and 869 option should be used for the UEFI guests that assume that 880 for configuration notes of particular guests.
|
/freebsd/sys/contrib/device-tree/Bindings/arm/ |
H A D | fw-cfg.txt | 10 QEMU exposes the control and data register to ARM guests as memory mapped
|
/freebsd/sys/contrib/device-tree/Bindings/firmware/ |
H A D | qemu,fw-cfg-mmio.yaml | 19 QEMU exposes the control and data register to guests as memory mapped
|
/freebsd/share/man/man4/ |
H A D | virtio_balloon.4 | 52 be made available to other guests.
|
H A D | kvmclock.4 | 31 .Nd Para-virtualized clock driver for x86 KVM guests
|
/freebsd/sys/dev/mlx4/mlx4_core/ |
H A D | mlx4_fw.c | 1298 /* Not exposing RSS IP fragments to guests */ in mlx4_QUERY_DEV_CAP_wrapper() 1307 /* For guests, disable timestamp */ in mlx4_QUERY_DEV_CAP_wrapper() 1312 /* For guests, disable vxlan tunneling and QoS support */ in mlx4_QUERY_DEV_CAP_wrapper() 1317 /* For guests, disable port BEACON */ in mlx4_QUERY_DEV_CAP_wrapper() 1322 /* For guests, report Blueflame disabled */ in mlx4_QUERY_DEV_CAP_wrapper() 1327 /* For guests, disable mw type 2 and port remap*/ in mlx4_QUERY_DEV_CAP_wrapper() 1342 /* turn off ipoib managed steering for guests */ in mlx4_QUERY_DEV_CAP_wrapper() 1347 /* turn off host side virt features (VST, FSM, etc) for guests */ in mlx4_QUERY_DEV_CAP_wrapper() 1353 /* turn off QCN for guests */ in mlx4_QUERY_DEV_CAP_wrapper() 1358 /* turn off QP max-rate limiting for guests */ in mlx4_QUERY_DEV_CAP_wrapper() [all …]
|
/freebsd/sys/contrib/device-tree/src/arm/xen/ |
H A D | xenvm-4.2.dts | 3 * Xen Virtual Machine for unprivileged guests
|