Home
last modified time | relevance | path

Searched refs:hypercall (Results 1 – 15 of 15) sorted by relevance

/linux-4.4.14/arch/arm/xen/
Dhypercall.S57 #define HYPERCALL_SIMPLE(hypercall) \ argument
58 ENTRY(HYPERVISOR_##hypercall) \
59 mov r12, #__HYPERVISOR_##hypercall; \
62 ENDPROC(HYPERVISOR_##hypercall)
70 #define HYPERCALL5(hypercall) \ argument
71 ENTRY(HYPERVISOR_##hypercall) \
74 mov r12, #__HYPERVISOR_##hypercall; \
78 ENDPROC(HYPERVISOR_##hypercall)
DMakefile1 obj-y := enlighten.o hypercall.o grant-table.o p2m.o mm.o
/linux-4.4.14/Documentation/virtual/kvm/
Dhypercalls.txt9 The hypercall number should be placed in rax and the return value will be
11 by the particular hypercall.
14 R2-R7 are used for parameters 1-6. In addition, R1 is used for hypercall
17 S390 uses diagnose instruction as hypercall (0x500) along with hypercall
24 It uses R3-R10 and hypercall number in R11. R4-R11 are used as output registers.
27 KVM hypercalls uses 4 byte opcode, that are patched with 'hypercall-instructions'
33 The template for each hypercall is:
57 Purpose: Expose hypercall availability to the guest. On x86 platforms, cpuid
60 mechanism (which is this hypercall) can be used.
69 memory using this hypercall.
[all …]
Dppc-pv.txt32 'hypercall-instructions'. This property contains at most 4 opcodes that make
33 up the hypercall. To call a hypercall, just call these instructions.
48 r11 hypercall number 8th output value
51 Hypercall definitions are shared in generic code, so the same hypercall numbers
52 apply for x86 and powerpc alike with the exception that each KVM hypercall
68 map this shared page using the KVM hypercall KVM_HC_PPC_MAP_MAGIC_PAGE.
70 With this hypercall issued the guest always gets the magic page mapped at the
81 also define a new hypercall feature to indicate that the host can give you more
90 When mapping the magic page using the KVM hypercall KVM_HC_PPC_MAP_MAGIC_PAGE,
196 These are ePAPR compliant hypercall implementation (mentioned above). Even
[all …]
D00-INDEX24 - Diagnose hypercall description (for IBM S/390)
Ds390-diag.txt73 See also the virtio standard for a discussion of this hypercall.
Dapi.txt745 Sets the MSR that the Xen HVM guest uses to initialize its hypercall
746 page, and provides the starting address and size of the hypercall
1293 The hcall array defines 4 instructions that make up a hypercall.
3169 } hypercall;
3171 Unused. This was once used for 'hypercall to userspace'. To implement
3233 MOL uses a special hypercall interface it calls 'OSI'. To enable it, we catch
3236 If exit_reason is KVM_EXIT_OSI, then the vcpu has triggered such a hypercall.
3237 Userspace can now handle the hypercall and when it's done modify the gprs as
3250 guest does a hypercall using the 'sc 1' instruction. The 'nr' field
3251 contains the hypercall number (from the guest R3), and 'args' contains
[all …]
/linux-4.4.14/arch/arm64/xen/
Dhypercall.S57 #define HYPERCALL_SIMPLE(hypercall) \ argument
58 ENTRY(HYPERVISOR_##hypercall) \
59 mov x16, #__HYPERVISOR_##hypercall; \
62 ENDPROC(HYPERVISOR_##hypercall)
DMakefile2 obj-y := xen-arm.o hypercall.o
/linux-4.4.14/drivers/xen/
Dprivcmd.c53 struct privcmd_hypercall hypercall; in privcmd_ioctl_hypercall() local
56 if (copy_from_user(&hypercall, udata, sizeof(hypercall))) in privcmd_ioctl_hypercall()
60 ret = privcmd_call(hypercall.op, in privcmd_ioctl_hypercall()
61 hypercall.arg[0], hypercall.arg[1], in privcmd_ioctl_hypercall()
62 hypercall.arg[2], hypercall.arg[3], in privcmd_ioctl_hypercall()
63 hypercall.arg[4]); in privcmd_ioctl_hypercall()
/linux-4.4.14/Documentation/devicetree/bindings/arm/
Dxen.txt12 HYPERVISOR_memory_op hypercall. The memory region is large enough to map
/linux-4.4.14/arch/powerpc/kernel/
Dexceptions-64e.S541 EXCEPTION_STUB(0x300, hypercall)
899 START_EXCEPTION(hypercall);
/linux-4.4.14/include/uapi/linux/
Dkvm.h259 } hypercall; member
/linux-4.4.14/arch/x86/kvm/
Dsvm.c3968 svm_patch_hypercall(struct kvm_vcpu *vcpu, unsigned char *hypercall) in svm_patch_hypercall() argument
3973 hypercall[0] = 0x0f; in svm_patch_hypercall()
3974 hypercall[1] = 0x01; in svm_patch_hypercall()
3975 hypercall[2] = 0xd9; in svm_patch_hypercall()
Dvmx.c5367 vmx_patch_hypercall(struct kvm_vcpu *vcpu, unsigned char *hypercall) in vmx_patch_hypercall() argument
5372 hypercall[0] = 0x0f; in vmx_patch_hypercall()
5373 hypercall[1] = 0x01; in vmx_patch_hypercall()
5374 hypercall[2] = 0xc1; in vmx_patch_hypercall()