/xen-4.10.0-shim-comet/docs/misc/ |
A D | qemu-deprivilege.txt | 21 2) a user named "xen-qemuuser-shared" 23 all QEMU instances. The user is named xen-qemuuser-shared. This is 27 adduser --no-create-home --system xen-qemuuser-shared
|
A D | pvcalls.markdown | 183 Once frontend and backend are connected, they have a shared page, which 220 The shared ring is used by the frontend to forward POSIX function calls 224 reference for shared page for this ring is shared on xenstore (see 437 The connect operation creates a new shared ring, which we'll call **data 443 which contains shared indexes that point to the write and read locations 453 uses them as shared memory for the **data ring** 650 which contains shared indexes that point to the write and read locations 668 pvcalls_data_intf` and uses them as shared memory for the new data 859 Firstly, the **indexes page** is shared by a **connect** or **accept** 865 resulting shared memory, the first half is dedicated to the **in** array [all …]
|
A D | 9pfs.markdown | 178 Once frontend and backend are connected, they have a shared page per 215 The shared page has the following layout: 290 their shared ring for communication. This procotol does not, because it 372 - read *cons*, *prod* from shared memory 384 - read *prod*, *cons* from shared memory
|
A D | grant-tables.txt | 49 A set of pages are shared between Xen and a guest, holding the shared grant 52 reference used to activate an entry. Xen will write into a shared entry to 364 To release a batch back to the shared pool:
|
A D | crashdb.txt | 11 If you need to have a serial port shared between gdb and the console,
|
A D | xenstore-ring.txt | 2 shared between the xenstore server and the guest. The ring contains
|
A D | xenmon.txt | 7 displayed. The xenbake demon keeps a large amount of history in a shared memory
|
A D | xen-command-line.markdown | 103 Because responsibility for ACPI processing is shared between Xen and 381 cleared. This allows a single port to be shared by two subsystems 589 * `all`: just one runqueue shared by all the logical pCPUs of 1073 >> Control whether CPU and IOMMU page tables should be shared. 1308 Because responsibility for APIC setup is shared between Xen and the 1399 Monitoring ID(RMID) is used to bind the domain to corresponding shared 1404 bitmasks(CBM) is used to bind the domain to corresponding shared resource. 1673 Specify the physical address of the trusted boot shared page.
|
/xen-4.10.0-shim-comet/tools/blktap2/drivers/ |
A D | tapdisk-interface.c | 41 td_image_t *shared; in td_load() local 44 shared = tapdisk_server_get_shared_image(image); in td_load() 45 if (!shared) in td_load() 48 driver = shared->driver; in td_load()
|
/xen-4.10.0-shim-comet/tools/tests/regression/scripts/ |
A D | build_python.sh | 20 ./configure --enable-shared --enable-ipv6 --without-cxx \
|
/xen-4.10.0-shim-comet/xen/arch/x86/x86_64/ |
A D | Makefile | 10 obj-y += mmconfig-shared.o
|
/xen-4.10.0-shim-comet/config/ |
A D | SunOS.mk | 32 SHLIB_LDFLAGS = -R $(SunOS_LIBDIR) -shared
|
A D | StdGNU.mk | 36 SHLIB_LDFLAGS = -shared
|
/xen-4.10.0-shim-comet/xen/arch/arm/ |
A D | irq.c | 318 bool shared = irqflags & IRQF_SHARED; in __setup_irq() local 326 if ( desc->action != NULL && (!test_bit(_IRQF_SHARED, &desc->status) || !shared) ) in __setup_irq() 328 if ( shared && new->dev_id == NULL ) in __setup_irq() 331 if ( shared ) in __setup_irq()
|
/xen-4.10.0-shim-comet/xen/include/xen/ |
A D | tmem_xen.h | 307 #define is_shared(_p) (_p->shared) 310 bool shared; member
|
/xen-4.10.0-shim-comet/xen/common/ |
A D | tmem.c | 1446 int shared = flags & TMEM_POOL_SHARED; in do_tmem_new_pool() local 1460 shared ? "shared" : "private", tmem_cli_id_str, cli_id); in do_tmem_new_pool() 1466 if ( shared && persistent ) in do_tmem_new_pool() 1517 pool->shared = shared; in do_tmem_new_pool() 1526 if ( shared ) in do_tmem_new_pool() 1531 pool->shared = 0; in do_tmem_new_pool() 1543 pool->shared = 0; in do_tmem_new_pool()
|
A D | grant_table.c | 3149 grant_entry_v1_t shared; in swap_grant_ref() local 3151 shared = shared_entry_v1(gt, ref_a); in swap_grant_ref() 3153 shared_entry_v1(gt, ref_b) = shared; in swap_grant_ref() 3157 grant_entry_v2_t shared; in swap_grant_ref() local 3160 shared = shared_entry_v2(gt, ref_a); in swap_grant_ref() 3166 shared_entry_v2(gt, ref_b) = shared; in swap_grant_ref()
|
A D | tmem_control.c | 381 (pool->shared ? TMEM_POOL_SHARED : 0) | in tmemc_get_pool()
|
/xen-4.10.0-shim-comet/stubdom/grub.patches/ |
A D | 99minios | 327 #include <shared.h> 597 Index: grub/stage2/shared.h 599 --- grub.orig/stage2/shared.h 2008-06-16 15:18:14.537009000 +0100 600 +++ grub/stage2/shared.h 2008-06-17 14:25:08.443906000 +0100 775 #include "shared.h" 1032 #include <shared.h>
|
A D | 10graphics.diff | 893 /* XXX: These should be defined in shared.h, but I leave these here, 1196 +#include <shared.h> 1805 nbi.h pc_slice.h serial.h shared.h smp-imps.h term.h \ 1846 diff -Naur grub-0.97.orig/stage2/shared.h grub-0.97/stage2/shared.h 1847 --- grub-0.97.orig/stage2/shared.h 2004-06-19 13:40:09.000000000 -0300 1848 +++ grub-0.97/stage2/shared.h 2005-06-12 20:56:49.000000000 -0300 1873 #include <shared.h>
|
A D | 00cvs | 36 + * stage2/shared.h (rawread, devread, rawwrite, devwrite): Likewise. 104 + * stage2/shared.h (vbe_mode): Back ported aligment fix from GRUB 2 742 #include <shared.h> 1232 diff -uprN grub-0.97/stage2/shared.h grub/stage2/shared.h 1233 --- grub-0.97/stage2/shared.h 2004-06-19 17:40:09.000000000 +0100 1234 +++ grub/stage2/shared.h 2008-03-28 13:22:28.000000000 +0000
|
/xen-4.10.0-shim-comet/xen/xsm/flask/policy/ |
A D | access_vectors | 274 # target = domain whose memory is being shared 279 # source = domain whose memory is being shared 325 # Class grant describes pages shared by grant mappings. Pages use the security
|
/xen-4.10.0-shim-comet/xen/include/public/ |
A D | sysctl.h | 783 shared:1, /* See TMEM_POOL_SHARED. */ member
|
/xen-4.10.0-shim-comet/stubdom/ |
A D | Makefile | 181 …AGS)" CFLAGS="$(TARGET_CFLAGS)" CC=$(CC) $(GMPEXT) ./configure --disable-shared --enable-static --… 268 -no-pthread -no-shared-libs -no-tk -no-curses \
|
/xen-4.10.0-shim-comet/docs/man/ |
A D | xl.pod.1.in | 668 Display the number of shared pages for a specified domain. If no domain is 1661 =item B<tmem-shared-auth> I<domain-id> [I<OPTIONS>] 1663 De/authenticate shared tmem pool. 1722 Intel Haswell and later server platforms offer shared resource monitoring 1754 logical processor to measure specific platform shared resource metric, for 1774 attach: Attach the platform shared resource monitoring service to a domain. 1778 detach: Detach the platform shared resource monitoring service from a domain.
|