/freebsd-src/sys/net/ |
H A D | paravirt.h | 31 Support for virtio-like communication between host (H) and guest (G) NICs. 35 The guest allocates the shared Communication Status Block (csb) and 37 csb->csb_on enables the mode. If disabled, the device acts a regular one. 50 if ( cond(C) ) { // C is written by the other side 83 TDT writes on the transmit side when the host is too slow. 109 RDT writes on the receive side when the guest is too slow and 116 * [GH][RW][+-0] guest/host reads/writes frequently/rarely/almost never 118 /* these are (mostly) written by the guest */ 120 uint32_t guest_need_txkick; /* GW- HR+ G ran out of tx bufs, request kick */ 121 uint32_t guest_need_rxkick; /* GW- HR+ G ran out of rx pkts, request kick */ [all …]
|
/freebsd-src/sys/dev/vmware/vmci/ |
H A D | vmci_defs.h | 1 /*- 4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0) 15 #pragma GCC diagnostic ignored "-Wcast-qual" 58 * Maximum MSI/MSI-X interrupt vectors in the device. 186 * Well-known context id, a logical context that contains a set of 187 * well-known services. This context ID is now obsolete. 207 *------------------------------------------------------------------------------ 211 *------------------------------------------------------------------------------ 220 #define VMCI_ERROR_INVALID_RESOURCE (-1) 221 #define VMCI_ERROR_INVALID_ARGS (-2) [all …]
|
H A D | vmci_queue_pair.c | 1 /*- 4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0) 76 *------------------------------------------------------------------------------ 78 * vmci_queue_pair_alloc -- 81 * real work is done in the host or guest specific function. 86 * Side effects: 89 *------------------------------------------------------------------------------ 107 *------------------------------------------------------------------------------ 109 * vmci_queue_pair_detach -- 112 * Real work is done in the host or guest specific function. [all …]
|
H A D | vmci_queue.h | 1 /*- 4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0) 22 * vmci_queue_kernel_if is a per-OS defined queue structure. It contains 39 *------------------------------------------------------------------------------ 46 * there's an unused last parameter for the hosted side. In ESX, that parameter 49 *------------------------------------------------------------------------------ 59 *------------------------------------------------------------------------------ 63 * Note that these routines are NOT SAFE to call on a host end-point until the 64 * guest end of the queue pair has attached -AND- SetPageStore(). The VMX 65 * crosstalk device will issue the SetPageStore() on behalf of the guest when [all …]
|
H A D | vmci_doorbell.c | 1 /*- 4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0) 59 * The last_notify_idx_reserved is used to track the last index handed out - in 73 *------------------------------------------------------------------------------ 75 * vmci_doorbell_init -- 82 * Side effects: 85 *------------------------------------------------------------------------------ 102 *------------------------------------------------------------------------------ 104 * vmci_doorbell_exit -- 111 * Side effects: [all …]
|
H A D | vmci_datagram.c | 1 /*- 4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0) 45 /*------------------------------ Helper functions ----------------------------*/ 48 *------------------------------------------------------------------------------ 50 * datagram_free_cb -- 58 * Side effects: 61 *------------------------------------------------------------------------------ 71 vmci_signal_event(&entry->destroy_event); in datagram_free_cb() 80 *------------------------------------------------------------------------------ 82 * datagram_release_cb -- [all …]
|
H A D | vmci_utils.h | 1 /*- 4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0) 13 *------------------------------------------------------------------------------ 15 * vmci_hash_id -- 21 * Returns guest call size. 23 * Side effects: 26 *------------------------------------------------------------------------------ 38 return (hash & (size - 1)); in vmci_hash_id()
|
H A D | vmci_qpair.c | 1 /*- 4 * SPDX-License-Identifier: (BSD-2-Clause OR GPL-2.0) 12 * as a whole. This is simpler and less error-prone, and allows for future 43 *------------------------------------------------------------------------------ 45 * vmci_queue_add_producer_tail -- 53 * Side effects: 56 *------------------------------------------------------------------------------ 64 vmci_queue_header_add_producer_tail(queue->q_header, add, queue_size); in vmci_queue_add_producer_tail() 69 *------------------------------------------------------------------------------ 71 * vmci_queue_add_consumer_head -- [all …]
|
/freebsd-src/sys/contrib/device-tree/Bindings/arm/ |
H A D | fw-cfg.txt | 3 QEMU's arm-softmmu and aarch64-softmmu emulation / virtualization targets 7 - A write-only, 16-bit wide selector (or control) register, 8 - a read-write, 64-bit wide data register. 11 registers; their location is communicated to the guest's UEFI firmware in the 12 DTB that QEMU places at the bottom of the guest's DRAM. 14 The authoritative guest-side hardware interface documentation to the fw_cfg 20 - compatible: "qemu,fw-cfg-mmio". 22 - reg: the MMIO region used by the device. 31 #size-cells = <0x2>; 32 #address-cells = <0x2>; [all …]
|
/freebsd-src/sys/contrib/device-tree/Bindings/firmware/ |
H A D | qemu,fw-cfg-mmio.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 4 $id: http://devicetree.org/schemas/firmware/qemu,fw-cfg-mmio.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Rob Herring <robh@kernel.org> 16 - A write-only, 16-bit wide selector (or control) register, 17 - a read-write, 64-bit wide data register. 20 registers; their location is communicated to the guest's UEFI firmware in the 21 DTB that QEMU places at the bottom of the guest's DRAM. 23 The authoritative guest-side hardware interface documentation to the fw_cfg [all …]
|
/freebsd-src/sys/dev/hyperv/utilities/ |
H A D | hv_kvp.h | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 37 * Maximum value size - used for both key names and value data, and includes 48 * Note: This value is used in defining the KVP exchange message - this value 59 * Maximum key size - the registry limit for the length of an entry name 69 * implementing the host/guest protocol. 2) A user level daemon that is 72 * Host/Guest Protocol: The host iterates over an index and expects the guest 75 * given point in time. The host side iteration stops when the guest returns 93 * Guest Kernel/KVP Daemon Protocol: As noted earlier, we implement all of the 96 * kernel and user-level daemon communicate using a connector channel. [all …]
|
/freebsd-src/sys/dev/hyperv/hvsock/ |
H A D | hv_sock.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 76 /* The MTU is 16KB per host side's design */ 78 #define HVSOCK_SEND_BUF_SZ (PAGE_SIZE - sizeof(struct vmpipe_proto_header)) 122 /* 00000000-facb-11e6-bd58-64006a7986d3 */ 150 "0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x-0x%x\n", in hvsock_print_guid() 160 return !memcmp(&id->hv_guid[4], in is_valid_srv_id() 161 &srv_id_template.hv_guid[4], sizeof(struct hyperv_guid) - 4); in is_valid_srv_id() 227 if (!so || !so->so_pcb) { in hvs_remove_socket_from_list() 241 if (!so || !so->so_pcb) { in hvs_insert_socket_on_list() [all …]
|
/freebsd-src/sys/amd64/vmm/io/ |
H A D | vrtc.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 71 uint8_t nvram2[128 - 51]; 86 #define VRTC_LOCK(vrtc) mtx_lock(&((vrtc)->mtx)) 87 #define VRTC_UNLOCK(vrtc) mtx_unlock(&((vrtc)->mtx)) 88 #define VRTC_LOCKED(vrtc) mtx_owned(&((vrtc)->mtx)) 92 * - RT [all...] |
/freebsd-src/usr.sbin/bhyve/amd64/ |
H A D | pci_gvt-d.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 21 #include "pci_gvt-d-opregion.h" 50 sc = pi->pi_arg; in gvt_d_probe() 87 * it's only GPU accessible. As the CPU can't access the area, the guest 91 * Intel itself maps it into the guest by EPT [1]. At the moment, we're not 96 * the graphics stolen memory [2]. As the GVT-d code doesn't support Tiger Lake 101 …/github.com/projectacrn/acrn-hypervisor/blob/e28d6fbfdfd556ff1bc3ff330e41d4ddbaa0f897/devicemodel/… 103 …/github.com/projectacrn/acrn-hypervisor/blob/e28d6fbfdfd556ff1bc3ff330e41d4ddbaa0f897/devicemodel/… 114 sc = pi->pi_arg; in gvt_d_setup_gsm() [all …]
|
/freebsd-src/share/man/man4/ |
H A D | iavf.4 | 1 .\"- 2 .\" SPDX-License-Identifier: BSD-3-Clause 4 .\" Copyright (c) 2013-2018, Intel Corporation 44 .Bd -ragged -offset indent 51 .Bd -literal -offset indent 62 .Bl -bullet -compact 64 Intel\(rg Ethernet Controller E810\-C 66 Intel\(rg Ethernet Controller E810\-XXV 68 Intel\(rg Ethernet Connection E822\-C 70 Intel\(rg Ethernet Connection E822\-L [all …]
|
/freebsd-src/sys/contrib/ncsw/inc/Peripherals/ |
H A D | fm_ext.h | 1 /* Copyright (c) 2008-2012 Freescale Semiconductor, Inc 65 run-time control routines. This module must be initialized always 67 NOTE - We assume that the FM library will be initialized only by core No. 0! 115 volatile uint16_t cksum; /**< Running-sum */ 116 …volatile uint16_t flags_frag_off; /**< Flags & fragment-offset field of the last IP-header … 120 volatile uint8_t ip_pid_off; /**< IP PID (last IP-proto) offset */ 154 #define FM_FD_ERR_UNSUPPORTED_FORMAT 0x04000000 /**< Not for Rx-Port! Unsupported Format */ 155 #define FM_FD_ERR_LENGTH 0x02000000 /**< Not for Rx-Port! Length Error */ 160 #define FM_FD_ERR_IPR_NCSP (0x00100000 | FM_FD_IPR) /**< IPR non-consistent-sp */ 211 #define FM_FD_RX_STATUS_ERR_NON_FM 0x00400000 /**< non Frame-Manager error */ [all …]
|
/freebsd-src/sys/contrib/xen/ |
H A D | vm_event.h | 53 * Emulate the fault-causing instruction (if set in the event response flags). 54 * This will allow the guest to continue execution without lifting the page 60 * potentially having side effects (like memory mapped or port I/O) disabled. 79 * Currently only useful for MSR and control-register write events. 95 * At the moment x86-only, applies to EAX-EDX, ESP, EBP, ESI, EDI, R8-R15, 109 * Have a one-shot VM_EVENT_REASON_INTERRUPT event sent for the first 149 /* Single-step (e.g. MTF) */ 160 * As this behavior is CPU-specific, users are advised to not rely on it. 177 /* The limit field is right-shifted by 12 bits if .ar.g is set. */ 222 * VM. npt_base is the guest physical address of the L1 hypervisors [all …]
|
H A D | xen.h | 4 * Guest OS interface to Xen. 30 #include "xen-compat.h" 33 #include "arch-x86/xen.h" 35 #include "arch-arm.h" 41 /* Guest handles for primitive C types. */ 135 /* Architecture-specific hypercall definitions. */ 157 /* New event-channel and physdev hypercalls introduced in 0x00030202. */ 173 * Virtual interrupts that a guest OS may receive from Xen. 175 * In the side comments, 'V.' denotes a per-VCPU VIRQ while 'G.' denotes a 176 * global VIRQ. The former can be bound once per VCPU and cannot be re-bound. [all …]
|
/freebsd-src/sys/dev/vmware/vmxnet3/ |
H A D | if_vmxreg.h | 1 /*- 55 #define UPT1_F_RSS 0x0002 /* Receive side scaling */ 228 uint32_t guest; /* Guest OS */ member
|
/freebsd-src/share/doc/papers/devfs/ |
H A D | paper.me | 1 .\" format with ditroff -me 19 .ip \0\s-2\(bu\s+2 29 .i "Poul-Henning Kamp" 43 Starting from a high-level view of devices and the semantics that 45 grand tour of the redesigned FreeBSD device-I/O system, 99 disk-pack with a filesystem: selling pre-initialised and ``quality 100 tested'' disk-packs was quite a profitable business. 112 device would be inode number 5, the paper-tape-punch number 6 and so on, 122 in most UNIX-like systems even to this day. 150 In order to support remote login a ``pseudo-tty'' device driver was implemented, [all …]
|
/freebsd-src/contrib/llvm-project/llvm/lib/Target/AArch64/ |
H A D | AArch64Arm64ECCallLowering.cpp | 1 //===-- AArch64Arm64ECCallLowering.cpp - Lower Arm64EC calls ----*- C++ -*- [all...] |
/freebsd-src/sys/contrib/xen/io/ |
H A D | usbif.h | 4 * USB I/O interface for Xen guest OSes. 38 * the guest and a backend driver in a driver domain (normally dom0) having 39 * access to the physical USB device(s) being passed to the guest. 49 * under "backend/<guest-dom-id>/qusb". 58 * "conn-ring". 61 * responses). This is the "urb-ring". 74 * driver side whose XenBus tree contains them. 80 *------------------ Backend Device Identification (PRIVATE) ------------------ 82 * num-ports 87 * usb-ver [all …]
|
H A D | vscsiif.h | 45 * driver side whose XenBus tree contains them. 51 *------------------ Backend Device Identification (PRIVATE) ------------------ 53 * p-devname 58 * p-dev 61 * A string specifying the backend device: either a 4-tuple "h:c:t:l" 65 * v-dev 68 * A string specifying the frontend device in form of a 4-tuple "h:c:t:l" 71 *--------------------------------- Features --------------------------------- 73 * feature-sg-grant 85 *----------------------- Request Transport Parameters ----------------------- [all …]
|
/freebsd-src/sys/amd64/vmm/amd/ |
H A D | svm.c | 1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 108 static MALLOC_DEFINE(M_SVM_VLAPIC, "svm-vlapic", "svm-vlapic"); 267 asid[cpu].num = nasid - 1; in svm_modinit() 299 ctrl->tsc_offset = offset; in svm_set_tsc_offset() 304 vm_set_tsc_offset(vcpu->vcp [all...] |
/freebsd-src/ |
H A D | RELNOTES | 3 This file describes new user-visible features, changes and updates relevant to 22 Add a new -a command line option to mountd(8). 24 a line in exports(5) has the -alldirs export option, 53 host key generation can be re-enabled by setting sshd_rsa_enable="YES" 58 be spliced together, enabling proxy-like functionality without the 70 of edk2-bhyve. To restore the old behavior, add 73 Note in particular that the uefi-edk2-bhyve package has been renamed 74 to edk2-bhyve. 78 deprecated. Use the top-leve [all...] |