/xen-4.10.0-shim-comet/tools/ocaml/libs/eventchn/ |
A D | xeneventchn.mli | 6 * This program is free software; you can redistribute it and/or modify 11 * This program is distributed in the hope that it will be useful, 30 (** Return an initialised event channel interface. On error it 35 the descriptor becomes readable, it is safe to call 'pending'. 36 On error it will throw a Failure exception. *) 39 (** Notify the given event channel. On error it will throw a 44 channel connected to domid:remote_port. On error it will 49 (domain exception VIRQ). On error it will throw a Failure 53 (** Unbinds the given event channel. On error it will throw a 57 (** Returns the next event channel to become pending. On error it [all …]
|
/xen-4.10.0-shim-comet/docs/features/ |
A D | livepatch.pandoc | 30 Based on the amount of testing and usage it has had, we are ready to 33 Live patching is slightly peculiar when it comes to support because it 35 depending on the content of the live patch. Because of this, it is 40 guests and it shall be treated as a security issue if this is not 45 If a correct live patch is loaded but it is not applied correctly 46 such that it might result in an insecure system (e.g. not all 47 functions are patched), it shall be treated as a security issue. 53 issue. A live patch should be checked to verify that it is valid 59 alternative) is loaded and it results in an insecure host or host 67 because the it can only be triggered by a privileged domain. [all …]
|
/xen-4.10.0-shim-comet/xen/arch/x86/boot/ |
A D | build32.lds | 4 * This program is free software; you can redistribute it and/or modify 5 * it under the terms of the GNU General Public License as published by 9 * This program is distributed in the hope that it will be useful, 36 * PIC/PIE executable contains .got.plt section even if it is not linked 37 * with dynamic libraries. In such case it is just placeholder for 44 * we remove .got.plt section here because it cannot find required symbol.
|
/xen-4.10.0-shim-comet/tools/console/testsuite/ |
A D | README | 15 from the client automatically. I use a custom initrd image and put it in the 19 console code. You can verify it at various levels by invoking it in different 27 If it freezes, it probably means that console-domU is expecting more data from
|
/xen-4.10.0-shim-comet/tools/libxl/ |
A D | libxl_numa.c | 57 static int comb_init(libxl__gc *gc, comb_iter_t *it, int n, int k) in comb_init() argument 70 *it = new_iter; in comb_init() 74 static int comb_next(comb_iter_t it, int n, int k) in comb_next() argument 96 for (i = k - 1; it[i] == n - k + i; i--) { in comb_next() 100 for (it[i]++, i++; i < k; i++) in comb_next() 101 it[i] = it[i - 1] + 1; in comb_next() 121 static void comb_get_nodemap(comb_iter_t it, libxl_bitmap *suitable_nodemap, in comb_get_nodemap() argument 131 if (m < k && n == it[m]) { in comb_get_nodemap()
|
/xen-4.10.0-shim-comet/tools/ocaml/xenstored/ |
A D | trie.mli | 5 * This program is free software; you can redistribute it and/or modify 6 * it under the terms of the GNU Lesser General Public License as published 10 * This program is distributed in the hope that it will be useful, 28 Otherwise, it returns false. *) 39 Moreover, it automatically clean the trie, ie. it removes recursively 49 If [p] is not a valid path of [t], it iterates on the longest valid prefix of [p]. *) 60 If [p] is not a valid path of [t], it returns an empty trie. *)
|
A D | systemd.ml | 4 * This program is free software; you can redistribute it and/or modify 5 * it under the terms of the GNU Lesser General Public License as published 9 * This program is distributed in the hope that it will be useful,
|
A D | systemd.mli | 4 * This program is free software; you can redistribute it and/or modify 5 * it under the terms of the GNU Lesser General Public License as published 9 * This program is distributed in the hope that it will be useful,
|
A D | syslog.mli | 4 * This program is free software; you can redistribute it and/or modify 5 * it under the terms of the GNU Lesser General Public License as published 9 * This program is distributed in the hope that it will be useful,
|
/xen-4.10.0-shim-comet/docs/man/ |
A D | xl-numa-placement.pod.7 | 15 on which it can operate very fast. On the other hand, getting and storing 44 user, via the proper libxl calls or xl config item, it will be computed 48 it is very important to "place" the domain correctly when it is fist 105 it is pinned, without any specific peference among them. 120 onto which it is pinned, with, among them, a preference for the ones 146 vCPU pinning when it is created. 197 to have, and as much pCPUs as it has vCPUs. After that, the actual 226 performance for the guest, as it avoid spreading its memory among 248 bits set, as it is by default), or domain creation will fail with 291 it won't scale well to systems with arbitrary number of nodes. [all …]
|
A D | xen-tscmode.pod.7 | 30 and apps that are high-TSC-frequency are usually aware of it.) 40 This last is the US$64,000 question as it may be very difficult 65 TSC-sensitive apps are running and it is necessary to understand 122 every processor cycle, but on recent processors, it increases 126 so it is often used as a foundation for performance monitoring. 199 where it is certain that all apps are TSC-resilient (e.g. 204 hardware on which the virtual machine is launched. If it is 246 it does not ensure that it continues to tick at the same rate during 323 determining if it is currently running on Xen, next whether 324 the tsc_mode setting of the domain in which it is running, [all …]
|
/xen-4.10.0-shim-comet/tools/xenmon/ |
A D | COPYING | 7 of this license document, but changing it is not allowed. 12 freedom to share and change it. By contrast, the GNU General Public 18 the GNU Library General Public License instead.) You can apply it to 25 if you want it, that you can change the software or use pieces of it 31 distribute copies of the software, or if you modify it. 67 that is to say, a work containing the Program or a portion of it, 80 source code as you receive it, in any medium, provided that you 91 of it, thus forming a work based on the Program, and copy and 104 when run, you must cause it, when started running for such 187 the Program or works based on it. [all …]
|
/xen-4.10.0-shim-comet/xen/ |
A D | COPYING | 8 Foundation, but the instance of code that it refers to (the Xen 10 wrote it. 34 of this license document, but changing it is not allowed. 52 if you want it, that you can change the software or use pieces of it 58 distribute copies of the software, or if you modify it. 94 that is to say, a work containing the Program or a portion of it, 107 source code as you receive it, in any medium, provided that you 118 of it, thus forming a work based on the Program, and copy and 131 when run, you must cause it, when started running for such 214 the Program or works based on it. [all …]
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | crashdb.txt | 5 you've crashed it, you get to poke around and find out why. There's 6 also a special key handler for making it crash, which is handy. 9 to enable it on the Xen command line, eg by gdb=com1. 13 it sends, and only respond to bytes with the high bit set. Similarly 17 The next step depends on your individual setup. This is how to do it 45 There is code which was once intended to make it possible to resume 46 after entering the debugger. However this does not presently work; it
|
/xen-4.10.0-shim-comet/tools/ocaml/libs/xs/ |
A D | xs.mli | 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU Lesser General Public License as published 11 * This program is distributed in the hope that it will be useful, 66 (** get_fd return the fd of the connection to be able to select on it. 67 NOTE: it works only for socket-based connection *) 72 NOTE: it works only when use with a socket-based connection *)
|
/xen-4.10.0-shim-comet/tools/xenstore/ |
A D | talloc_guide.txt | 15 get used to it. 27 then it is all destroyed, whereas if you do talloc_free(X) then just X 45 talloc() versus malloc() performance, and it seems that talloc() is 55 The following is a complete guide to the talloc API. Read it all at 66 The returned pointer is itself a talloc context, so you can use it as 81 convenient type to pass to talloc(). Unlike talloc(), it is not type 94 condition is if the pointer had a destructor attached to it and the 124 which case it will return NULL (each additional reference consumes 129 After creating a reference you can free it in one of the following 134 cause this pointer to be freed if it runs out of parents. [all …]
|
A D | COPYING | 13 of this license document, but changing it is not allowed. 22 freedom to share and change it. By contrast, the GNU General Public 38 it if you want it; that you can change the software and use pieces of 39 it in new free programs; and that you are informed that you can do 45 you if you distribute copies of the library or if you modify it. 53 it. And you must show them these terms so they know their rights. 59 To protect each distributor, we want to make it very clear that 170 of it, thus forming a work based on the Library, and copy and 206 it. 371 the Library or works based on it. [all …]
|
/xen-4.10.0-shim-comet/tools/libacpi/ |
A D | ssdt_s3.asl | 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU Lesser General Public License as published 11 * This program is distributed in the hope that it will be useful,
|
A D | ssdt_s4.asl | 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU Lesser General Public License as published 11 * This program is distributed in the hope that it will be useful,
|
A D | ssdt_tpm.asl | 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU Lesser General Public License as published 11 * This program is distributed in the hope that it will be useful,
|
/xen-4.10.0-shim-comet/ |
A D | COPYING | 82 of this license document, but changing it is not allowed. 87 freedom to share and change it. By contrast, the GNU General Public 100 if you want it, that you can change the software or use pieces of it 106 distribute copies of the software, or if you modify it. 142 that is to say, a work containing the Program or a portion of it, 155 source code as you receive it, in any medium, provided that you 166 of it, thus forming a work based on the Program, and copy and 179 when run, you must cause it, when started running for such 217 b) Accompany it with a written offer, valid for at least three 262 the Program or works based on it. [all …]
|
/xen-4.10.0-shim-comet/docs/ |
A D | README.xen-bugtool | 6 build of Xen that you are using, plus, if you allow it, various logs. 10 it can be saved as a .tar.bz2 for sending or archiving. 16 xen-bugtool is wholly interactive, so simply run it, and answer the questions.
|
/xen-4.10.0-shim-comet/tools/ocaml/ |
A D | LICENSE | 27 of this license document, but changing it is not allowed. 36 …f the Free Software Foundation and other authors who decide to use it. You can use it too, but we … 38 …that you receive source code or can get it if you want it; that you can change the software and us… 72 … work for making modifications to it. For a library, complete source code means all the source cod… 101 …erivative of it, under Section 2) in object code or executable form under the terms of Sections 1 … 165 …ou develop a new library, and you want it to be of the greatest possible use to the public, we rec… 170 one line to give the library's name and an idea of what it does. 173 This library is free software; you can redistribute it and/or 174 modify it under the terms of the GNU Lesser General Public 178 This library is distributed in the hope that it will be useful, [all …]
|
/xen-4.10.0-shim-comet/tools/firmware/vgabios/ |
A D | COPYING | 7 of this license document, but changing it is not allowed. 16 freedom to share and change it. By contrast, the GNU General Public 31 it if you want it; that you can change the software and use pieces of 32 it in new free programs; and that you are informed that you can do 38 you if you distribute copies of the library or if you modify it. 46 it. And you must show them these terms so they know their rights. 52 To protect each distributor, we want to make it very clear that 163 of it, thus forming a work based on the Library, and copy and 199 it. 364 the Library or works based on it. [all …]
|
/xen-4.10.0-shim-comet/tools/xenstat/libxenstat/ |
A D | COPYING | 8 of this license document, but changing it is not allowed. 17 freedom to share and change it. By contrast, the GNU General Public 33 it if you want it; that you can change the software and use pieces of 34 it in new free programs; and that you are informed that you can do 40 you if you distribute copies of the library or if you modify it. 48 it. And you must show them these terms so they know their rights. 54 To protect each distributor, we want to make it very clear that 165 of it, thus forming a work based on the Library, and copy and 201 it. 366 the Library or works based on it. [all …]
|