Searched refs:hypercall (Results 1 – 6 of 6) sorted by relevance
1 Demonstrations of kvm_hypercall.py, showing eBPF/bcc based hypercall analysis8 hypercall itself.10 To test this, while the python script is run, induce a hypercall from a32 This output shows a sequence of exit -> hypercall -> entry where the
347 } hypercall; member
765 a pending interrupt number through an hypercall. The PVM injects776 the interrupt number through an hypercall.
80 …call.py): Conditional static kernel tracepoints for KVM entry, exit and hypercall [Examples](examp…
2629 pub hypercall: kvm_run__bindgen_ty_1__bindgen_ty_7,3863 unsafe { &(*(::std::ptr::null::<kvm_run__bindgen_ty_1>())).hypercall as *const _ as usize }, in bindgen_test_layout_kvm_run__bindgen_ty_1()3869 stringify!(hypercall) in bindgen_test_layout_kvm_run__bindgen_ty_1()
5066 pub hypercall: kvm_run__bindgen_ty_1__bindgen_ty_7,6300 unsafe { &(*(::std::ptr::null::<kvm_run__bindgen_ty_1>())).hypercall as *const _ as usize }, in bindgen_test_layout_kvm_run__bindgen_ty_1()6306 stringify!(hypercall) in bindgen_test_layout_kvm_run__bindgen_ty_1()