Home
last modified time | relevance | path

Searched refs:hypercall (Results 1 – 9 of 9) sorted by relevance

/linux-2.6.39/drivers/xen/xenfs/
Dprivcmd.c41 struct privcmd_hypercall hypercall; in privcmd_ioctl_hypercall() local
44 if (copy_from_user(&hypercall, udata, sizeof(hypercall))) in privcmd_ioctl_hypercall()
47 ret = privcmd_call(hypercall.op, in privcmd_ioctl_hypercall()
48 hypercall.arg[0], hypercall.arg[1], in privcmd_ioctl_hypercall()
49 hypercall.arg[2], hypercall.arg[3], in privcmd_ioctl_hypercall()
50 hypercall.arg[4]); in privcmd_ioctl_hypercall()
/linux-2.6.39/Documentation/kvm/
Dppc-pv.txt32 'hypercall-instructions'. This property contains at most 4 opcodes that make
33 up the hypercall. To call a hypercall, just call these instructions.
48 r11 hypercall number 8th output value
51 Hypercall definitions are shared in generic code, so the same hypercall numbers
52 apply for x86 and powerpc alike with the exception that each KVM hypercall
68 map this shared page using the KVM hypercall KVM_HC_PPC_MAP_MAGIC_PAGE.
70 With this hypercall issued the guest always gets the magic page mapped at the
79 also define a new hypercall feature to indicate that the host can give you more
108 When mapping the magic page using the KVM hypercall KVM_HC_PPC_MAP_MAGIC_PAGE,
Dapi.txt605 Sets the MSR that the Xen HVM guest uses to initialize its hypercall
606 page, and provides the starting address and size of the hypercall
1083 of 4 instructions that make up a hypercall.
1390 } hypercall;
1392 Unused. This was once used for 'hypercall to userspace'. To implement
1440 MOL uses a special hypercall interface it calls 'OSI'. To enable it, we catch
1443 If exit_reason is KVM_EXIT_OSI, then the vcpu has triggered such a hypercall.
1444 Userspace can now handle the hypercall and when it's done modify the gprs as
/linux-2.6.39/arch/ia64/xen/
DMakefile5 obj-y := hypercall.o xenivt.o xensetup.o xen_pv_ops.o irq_xen.o \
/linux-2.6.39/include/linux/
Dkvm.h231 } hypercall; member
/linux-2.6.39/arch/x86/kvm/
Dvmx.c3219 vmx_patch_hypercall(struct kvm_vcpu *vcpu, unsigned char *hypercall) in vmx_patch_hypercall() argument
3224 hypercall[0] = 0x0f; in vmx_patch_hypercall()
3225 hypercall[1] = 0x01; in vmx_patch_hypercall()
3226 hypercall[2] = 0xc1; in vmx_patch_hypercall()
Dsvm.c3741 svm_patch_hypercall(struct kvm_vcpu *vcpu, unsigned char *hypercall)
3746 hypercall[0] = 0x0f;
3747 hypercall[1] = 0x01;
3748 hypercall[2] = 0xd9;
Dx86.c5444 kvm_run->hypercall.ret); in kvm_arch_vcpu_ioctl_run()
/linux-2.6.39/arch/x86/kernel/
Dentry_32.S1060 # normal Linux return path in this case because if we use the IRET hypercall