| /xen/xen/arch/x86/cpu/microcode/ |
| A D | amd.c | 88 uint32_t sig; member 98 csig->sig = cpuid_eax(1); in collect_cpu_info() 177 if ( equiv.sig != sig->sig || in microcode_fits() 181 if ( patch->patch_id <= sig->rev ) in microcode_fits() 217 uint32_t rev, old_rev = sig->rev; in apply_microcode() 226 cpu, sig->rev); in apply_microcode() 234 sig->rev = rev; in apply_microcode() 265 if ( et->eq[i].installed_cpu != sig->sig ) in scan_equiv_cpu_table() 270 equiv.sig = sig->sig; in scan_equiv_cpu_table() 275 if ( equiv.sig != sig->sig || equiv.id != et->eq[i].equiv_cpu ) in scan_equiv_cpu_table() [all …]
|
| A D | intel.c | 40 unsigned int sig; member 64 unsigned int sig; member 113 if ( cpu_sig->sig != ucode_sig ) in signature_matches() 131 csig->sig = cpuid_eax(1); in collect_cpu_info() 137 csig->sig, csig->pf, csig->rev); in collect_cpu_info() 211 sum = patch->sig + patch->pf + patch->cksum; in microcode_sanity_check() 213 if ( sum != (ext->sigs[i].sig + ext->sigs[i].pf + ext->sigs[i].cksum) ) in microcode_sanity_check() 233 if ( signature_matches(cpu_sig, mc->sig, mc->pf) ) in microcode_update_match() 265 struct cpu_signature *sig = &this_cpu(cpu_sig); in apply_microcode() local 266 uint32_t rev, old_rev = sig->rev; in apply_microcode() [all …]
|
| /xen/xen/arch/x86/pv/ |
| A D | emul-inv-op.c | 28 char sig[5], instr[2]; in emulate_forced_invalid_op() local 36 if ( (rc = copy_from_user(sig, (char *)eip, sizeof(sig))) != 0 ) in emulate_forced_invalid_op() 38 pv_inject_page_fault(0, eip + sizeof(sig) - rc); in emulate_forced_invalid_op() 41 if ( memcmp(sig, "\xf\xbxen", sizeof(sig)) ) in emulate_forced_invalid_op() 43 eip += sizeof(sig); in emulate_forced_invalid_op()
|
| /xen/stubdom/ |
| A D | vtpm-deepquote-anyloc.patch | 10 - BYTE *sig; 28 - res = TPM_DeepQuote(&nonce, &myPCR, &ptPCR, &req->auth1, &sigSize, &sig); 35 - if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) { 40 - tpm_free(sig); 55 * @sig: [out] The resulting digital signature and PCR values 63 BYTE **sig 78 TPM_AUTH *auth1, UINT32 *sigSize, BYTE **sig) 92 - res = VTPM_GetParentQuote(&hres, sel, sigSize, sig); 93 + res = VTPM_GetParentQuote((TPM_NONCE*)&hres, sel, extraInfoFlags, sigSize, sig); 101 - UINT32 *sigSize, BYTE **sig) [all …]
|
| A D | vtpm-deepquote.patch | 14 + BYTE *sig; 29 + res = TPM_DeepQuote(&nonce, &myPCR, &ptPCR, &req->auth1, &sigSize, &sig); 33 + if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) { 37 + tpm_free(sig); 62 BYTE **sig 72 + * @sig: [out] The resulting digital signature and PCR values 81 + BYTE **sig 102 + UINT32 *sigSize, BYTE **sig) 137 + res = VTPM_GetParentQuote(&hres, ptPCR, sigSize, sig); 167 + * BYTE[] sig Signature provided by physical TPM
|
| A D | vtpm-parent-sign-ek.patch | 14 + BYTE *sig; 27 + res = TPM_ParentSignEK(&nonce, &targetPCR, &req->auth1, &sigSize, &sig); 31 + if (ptr == NULL || tpm_marshal_BLOB(&ptr, &len, sig, sigSize)) { 35 + tpm_free(sig); 69 + * @sig: [out] The resulting digital signature and PCR values 77 + BYTE **sig 94 …_RESULT VTPM_GetParentQuote(TPM_DIGEST* data, TPM_PCR_SELECTION *sel, UINT32 *sigSize, BYTE **sig); 97 + TPM_AUTH *auth1, UINT32 *sigSize, BYTE **sig) 117 + res = VTPM_GetParentQuote(&hres, sel, sigSize, sig); 171 + * BYTE[] sig Signature provided by physical TPM
|
| /xen/tools/debugger/gdbsx/gx/ |
| A D | gx_main.c | 373 prepare_stop_reply(enum target_signal sig, char *buf, vcpuid_t vcpu) in prepare_stop_reply() argument 379 nib = ((sig & 0xf0) >> 4); in prepare_stop_reply() 381 nib = sig & 0x0f; in prepare_stop_reply() 407 enum target_signal sig; in process_c_request() local 411 sig = TARGET_SIGNAL_INT; in process_c_request() 413 sig = TARGET_SIGNAL_TRAP; in process_c_request() 415 prepare_stop_reply(sig, remote_buf, current_vcpu); in process_c_request()
|
| /xen/tools/misc/ |
| A D | xenwatchdogd.c | 39 void catch_exit(int sig) in catch_exit() argument 46 void catch_usr1(int sig) in catch_usr1() argument
|
| A D | xen-detect.c | 106 void sigill_handler(int sig) in sigill_handler() argument
|
| /xen/tools/libxl/ |
| A D | libxl_exec.c | 123 int sig = WTERMSIG(status); in libxl_report_child_exitstatus() local 124 const char *str = strsignal(sig); in libxl_report_child_exitstatus() 133 sig, coredump); in libxl_report_child_exitstatus() 439 int sig = status - 128; in spawn_middle_death() local 440 const char *str = strsignal(sig); in spawn_middle_death() 446 " signal number %d", ss->what, (unsigned long)pid, sig); in spawn_middle_death()
|
| A D | libxl_fork.c | 688 int sig) in libxl__ev_child_kill_deregister() argument 706 int r = kill(pid, sig); in libxl__ev_child_kill_deregister() 710 (unsigned long)pid, sig); in libxl__ev_child_kill_deregister()
|
| A D | libxl_aoutils.c | 622 void libxl__kill(libxl__gc *gc, pid_t pid, int sig, const char *what) in libxl__kill() argument 624 int r = kill(pid, sig); in libxl__kill() 626 what, (unsigned long)pid, sig); in libxl__kill()
|
| /xen/tools/ocaml/libs/xl/ |
| A D | xenlight.mli.in | 38 module Domain : sig 53 module Host : sig 64 module Async : sig
|
| /xen/xen/include/asm-x86/ |
| A D | microcode.h | 11 unsigned int sig; member
|
| /xen/xen/arch/x86/hvm/ |
| A D | dom0_build.c | 891 static bool __init pvh_acpi_table_allowed(const char *sig, in pvh_acpi_table_allowed() argument 904 if ( strncmp(sig, allowed_tables[i], ACPI_NAME_SIZE) ) in pvh_acpi_table_allowed() 912 sig); in pvh_acpi_table_allowed() 920 static bool __init pvh_acpi_xsdt_table_allowed(const char *sig, in pvh_acpi_xsdt_table_allowed() argument 928 return (pvh_acpi_table_allowed(sig, address, size) && in pvh_acpi_xsdt_table_allowed() 929 strncmp(sig, ACPI_SIG_DSDT, ACPI_NAME_SIZE) && in pvh_acpi_xsdt_table_allowed() 930 strncmp(sig, ACPI_SIG_FACS, ACPI_NAME_SIZE)); in pvh_acpi_xsdt_table_allowed() 1057 const char *sig = acpi_gbl_root_table_list.tables[i].signature.ascii; in pvh_setup_acpi() local 1066 if ( strncmp(sig, ACPI_SIG_MADT, ACPI_NAME_SIZE) in pvh_setup_acpi() 1067 ? pvh_acpi_table_allowed(sig, addr, size) in pvh_setup_acpi()
|
| /xen/stubdom/vtpmmgr/ |
| A D | mgmt_authority.c | 330 BYTE* sig; in vtpm_do_quote() local 370 rc = TPM_Quote(handle, data_to_quote, sel, (void*)&group->aik_authdata, &oiap, &pcrs, &sig, &size); in vtpm_do_quote() 389 memcpy(sig_out, sig, size); in vtpm_do_quote() 393 free(sig); in vtpm_do_quote()
|
| A D | vtpm_cmd_handler.c | 533 void *dhkx1, *dhkx2, *gk, *sig; in vtpmmgr_GroupRegister() local 538 UNPACK_IN(VPTR, &sig, 256, UNPACK_ALIAS); in vtpmmgr_GroupRegister() 553 if (tpmrsa_sigcheck(&saa_rsa, sig, digest.bits)) in vtpmmgr_GroupRegister() 591 void *sig, *seal_bits, *kern_bits; in vtpmmgr_GroupUpdate() local 594 UNPACK_IN(VPTR, &sig, 256, UNPACK_ALIAS); in vtpmmgr_GroupUpdate() 644 rc = tpmrsa_sigcheck(&saa_rsa, sig, digest); in vtpmmgr_GroupUpdate()
|
| A D | tpm.h | 175 BYTE** sig, // out
|
| /xen/tools/ocaml/libs/xb/ |
| A D | xb.mli | 2 sig 35 sig
|
| /xen/tools/console/daemon/ |
| A D | utils.c | 41 static void child_exit(int sig) in child_exit() argument
|
| A D | main.c | 45 static void handle_hup(int sig) in handle_hup() argument
|
| /xen/tools/python/scripts/ |
| A D | convert-legacy-stream | 540 sig, = unpack("21s", rawsig) 541 info("Qemu signature: %s" % (sig, )) 543 if sig == b"DeviceModelRecord0002": 556 raise RuntimeError("Unrecognised Qemu sig '%s'" % (sig, ))
|
| /xen/xen/arch/x86/ |
| A D | platform_hypercall.c | 360 const struct mbr_signature *sig; in do_platform_op() local 366 sig = bootsym(boot_mbr_signature) + op->u.firmware_info.index; in do_platform_op() 368 op->u.firmware_info.u.disk_mbr_signature.device = sig->device; in do_platform_op() 370 sig->signature; in do_platform_op()
|
| /xen/xen/arch/x86/efi/ |
| A D | efi-boot.h | 463 struct mbr_signature *sig = boot_mbr_signature + in efi_arch_edd() local 466 sig->device = 0x80 + boot_edd_info_nr; /* fake */ in efi_arch_edd() 467 memcpy(&sig->signature, devp.HardDrive->Signature, in efi_arch_edd() 468 sizeof(sig->signature)); in efi_arch_edd()
|
| /xen/docs/process/ |
| A D | release-technician-checklist.txt | 137 cvs add -kb xen-$v.tar.gz.sig 147 # U oss-xen/release/4.8.0-rc2/xen-4.8.0-rc2.tar.gz.sig
|