Home
last modified time | relevance | path

Searched refs:shared (Results 1 – 25 of 50) sorted by relevance

12

/xen-4.10.0-shim-comet/docs/misc/
A Dqemu-deprivilege.txt21 2) a user named "xen-qemuuser-shared"
23 all QEMU instances. The user is named xen-qemuuser-shared. This is
27 adduser --no-create-home --system xen-qemuuser-shared
A Dpvcalls.markdown183 Once frontend and backend are connected, they have a shared page, which
220 The shared ring is used by the frontend to forward POSIX function calls
224 reference for shared page for this ring is shared on xenstore (see
437 The connect operation creates a new shared ring, which we'll call **data
443 which contains shared indexes that point to the write and read locations
453 uses them as shared memory for the **data ring**
650 which contains shared indexes that point to the write and read locations
668 pvcalls_data_intf` and uses them as shared memory for the new data
859 Firstly, the **indexes page** is shared by a **connect** or **accept**
865 resulting shared memory, the first half is dedicated to the **in** array
[all …]
A D9pfs.markdown178 Once frontend and backend are connected, they have a shared page per
215 The shared page has the following layout:
290 their shared ring for communication. This procotol does not, because it
372 - read *cons*, *prod* from shared memory
384 - read *prod*, *cons* from shared memory
A Dgrant-tables.txt49 A set of pages are shared between Xen and a guest, holding the shared grant
52 reference used to activate an entry. Xen will write into a shared entry to
364 To release a batch back to the shared pool:
A Dcrashdb.txt11 If you need to have a serial port shared between gdb and the console,
A Dxenstore-ring.txt2 shared between the xenstore server and the guest. The ring contains
A Dxenmon.txt7 displayed. The xenbake demon keeps a large amount of history in a shared memory
A Dxen-command-line.markdown103 Because responsibility for ACPI processing is shared between Xen and
381 cleared. This allows a single port to be shared by two subsystems
589 * `all`: just one runqueue shared by all the logical pCPUs of
1073 >> Control whether CPU and IOMMU page tables should be shared.
1308 Because responsibility for APIC setup is shared between Xen and the
1399 Monitoring ID(RMID) is used to bind the domain to corresponding shared
1404 bitmasks(CBM) is used to bind the domain to corresponding shared resource.
1673 Specify the physical address of the trusted boot shared page.
/xen-4.10.0-shim-comet/tools/blktap2/drivers/
A Dtapdisk-interface.c41 td_image_t *shared; in td_load() local
44 shared = tapdisk_server_get_shared_image(image); in td_load()
45 if (!shared) in td_load()
48 driver = shared->driver; in td_load()
/xen-4.10.0-shim-comet/tools/tests/regression/scripts/
A Dbuild_python.sh20 ./configure --enable-shared --enable-ipv6 --without-cxx \
/xen-4.10.0-shim-comet/xen/arch/x86/x86_64/
A DMakefile10 obj-y += mmconfig-shared.o
/xen-4.10.0-shim-comet/config/
A DSunOS.mk32 SHLIB_LDFLAGS = -R $(SunOS_LIBDIR) -shared
A DStdGNU.mk36 SHLIB_LDFLAGS = -shared
/xen-4.10.0-shim-comet/xen/arch/arm/
A Dirq.c318 bool shared = irqflags & IRQF_SHARED; in __setup_irq() local
326 if ( desc->action != NULL && (!test_bit(_IRQF_SHARED, &desc->status) || !shared) ) in __setup_irq()
328 if ( shared && new->dev_id == NULL ) in __setup_irq()
331 if ( shared ) in __setup_irq()
/xen-4.10.0-shim-comet/xen/include/xen/
A Dtmem_xen.h307 #define is_shared(_p) (_p->shared)
310 bool shared; member
/xen-4.10.0-shim-comet/xen/common/
A Dtmem.c1446 int shared = flags & TMEM_POOL_SHARED; in do_tmem_new_pool() local
1460 shared ? "shared" : "private", tmem_cli_id_str, cli_id); in do_tmem_new_pool()
1466 if ( shared && persistent ) in do_tmem_new_pool()
1517 pool->shared = shared; in do_tmem_new_pool()
1526 if ( shared ) in do_tmem_new_pool()
1531 pool->shared = 0; in do_tmem_new_pool()
1543 pool->shared = 0; in do_tmem_new_pool()
A Dgrant_table.c3149 grant_entry_v1_t shared; in swap_grant_ref() local
3151 shared = shared_entry_v1(gt, ref_a); in swap_grant_ref()
3153 shared_entry_v1(gt, ref_b) = shared; in swap_grant_ref()
3157 grant_entry_v2_t shared; in swap_grant_ref() local
3160 shared = shared_entry_v2(gt, ref_a); in swap_grant_ref()
3166 shared_entry_v2(gt, ref_b) = shared; in swap_grant_ref()
A Dtmem_control.c381 (pool->shared ? TMEM_POOL_SHARED : 0) | in tmemc_get_pool()
/xen-4.10.0-shim-comet/stubdom/grub.patches/
A D99minios327 #include <shared.h>
597 Index: grub/stage2/shared.h
599 --- grub.orig/stage2/shared.h 2008-06-16 15:18:14.537009000 +0100
600 +++ grub/stage2/shared.h 2008-06-17 14:25:08.443906000 +0100
775 #include "shared.h"
1032 #include <shared.h>
A D10graphics.diff893 /* XXX: These should be defined in shared.h, but I leave these here,
1196 +#include <shared.h>
1805 nbi.h pc_slice.h serial.h shared.h smp-imps.h term.h \
1846 diff -Naur grub-0.97.orig/stage2/shared.h grub-0.97/stage2/shared.h
1847 --- grub-0.97.orig/stage2/shared.h 2004-06-19 13:40:09.000000000 -0300
1848 +++ grub-0.97/stage2/shared.h 2005-06-12 20:56:49.000000000 -0300
1873 #include <shared.h>
A D00cvs36 + * stage2/shared.h (rawread, devread, rawwrite, devwrite): Likewise.
104 + * stage2/shared.h (vbe_mode): Back ported aligment fix from GRUB 2
742 #include <shared.h>
1232 diff -uprN grub-0.97/stage2/shared.h grub/stage2/shared.h
1233 --- grub-0.97/stage2/shared.h 2004-06-19 17:40:09.000000000 +0100
1234 +++ grub/stage2/shared.h 2008-03-28 13:22:28.000000000 +0000
/xen-4.10.0-shim-comet/xen/xsm/flask/policy/
A Daccess_vectors274 # target = domain whose memory is being shared
279 # source = domain whose memory is being shared
325 # Class grant describes pages shared by grant mappings. Pages use the security
/xen-4.10.0-shim-comet/xen/include/public/
A Dsysctl.h783 shared:1, /* See TMEM_POOL_SHARED. */ member
/xen-4.10.0-shim-comet/stubdom/
A DMakefile181 …AGS)" CFLAGS="$(TARGET_CFLAGS)" CC=$(CC) $(GMPEXT) ./configure --disable-shared --enable-static --…
268 -no-pthread -no-shared-libs -no-tk -no-curses \
/xen-4.10.0-shim-comet/docs/man/
A Dxl.pod.1.in668 Display the number of shared pages for a specified domain. If no domain is
1661 =item B<tmem-shared-auth> I<domain-id> [I<OPTIONS>]
1663 De/authenticate shared tmem pool.
1722 Intel Haswell and later server platforms offer shared resource monitoring
1754 logical processor to measure specific platform shared resource metric, for
1774 attach: Attach the platform shared resource monitoring service to a domain.
1778 detach: Detach the platform shared resource monitoring service from a domain.

Completed in 39 milliseconds

12