/xen-4.10.0-shim-comet/xen/arch/x86/ |
A D | Rules.mk | 17 $(call as-insn-check,CFLAGS,CC,"vmcall",-DHAVE_GAS_VMX) 18 $(call as-insn-check,CFLAGS,CC,"crc32 %eax$$(comma)%eax",-DHAVE_GAS_SSE4_2) 19 $(call as-insn-check,CFLAGS,CC,"invept (%rax)$$(comma)%rax",-DHAVE_GAS_EPT) 20 $(call as-insn-check,CFLAGS,CC,"rdrand %eax",-DHAVE_GAS_RDRAND) 21 $(call as-insn-check,CFLAGS,CC,"rdfsbase %rax",-DHAVE_GAS_FSGSBASE) 22 $(call as-insn-check,CFLAGS,CC,"rdseed %eax",-DHAVE_GAS_RDSEED) 23 $(call as-insn-check,CFLAGS,CC,".equ \"x\"$$(comma)1", \
|
A D | Kconfig | 48 systems use it as a simple way to consistently map the current 76 deliberately used as a performance optimisation. 86 This requires enlarging struct page_info as well as shrinking 142 Build Xen with a mode which acts as a shim to allow PV guest to run
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | qemu-deprivilege.txt | 1 For security reasons, libxl tries to pass a non-root username to QEMU as 3 user ID and the group ID of the user passed as argument. 24 less secure but still better than running QEMU as root. Using this is as 25 simple as creating just one more user on your host: 31 As a last resort, libxl will start QEMU as root. 34 Please note that running QEMU as non-root causes several features like
|
A D | xenstore.txt | 5 (also known as `keys') to values. Clients may read and write values, 90 Except as otherwise noted, reserved values are believed to be sent as 96 Error replies are as follows: 120 Integer domid, represented as decimal number 0..65535. 123 represented as integers; unless otherwise specified it 129 reply payloads as applicable: 155 GET_PERMS <path>| <perm-as-string>|+ 156 SET_PERMS <path>|<perm-as-string>|+? 157 <perm-as-string> is one of the following 206 as described above. req_id and tx_id are both 0. [all …]
|
A D | efi.markdown | 2 recommended, as 4.5.x was probably never really tested for this purpose) and 10 normal Image format, so a single binary may be booted as an Image file or as an 11 EFI application. When booted as an EFI application, Xen requires a 12 configuration file as described below unless a bootloader, such as GRUB, has 20 `EFI_MOUNTPOINT` is overridden as needed, should the default of `/boot/efi` not 28 separators will be tried) to be present in the same directory as the binary. 44 thus look like this (`#` serving as comment character): 76 The options should in general be the same as is used when booting
|
A D | stubdom.txt | 39 - use pv-grub.gz as kernel: 43 - set the path to menu.lst, as seen from the domU, in extra: 47 or you can provide the content of a menu.lst stored in dom0 by passing it as a 74 will be seen by PV-GRUB as (hd0), not (hd0,6), since GRUB will not see any 92 and the relevant Makefile rules as basis to build your own stub domain kernel.
|
A D | netif-staging-grants.pandoc | 29 region. In some (physical) NICs this is known as header/data split. 38 when one wants to resort to a copy-based as opposed to grant copy/map. 113 network stack goes as following: 190 remaining slots as frags for the rest of the data ] 271 on backend, as opposed to a grant copy. 318 aggregating as much copies as possible.] 328 choose to merge as much as data from different pages into this single gref, 372 processed in the responses are then added as frags. 399 would need to aggregate as much as grant ops as possible (step 1) and could 401 as previously proposed [all …]
|
/xen-4.10.0-shim-comet/docs/man/ |
A D | xen-vbd-interface.markdown.7 | 5 provided as Xen VBDs; for HVM guests they may also be provided as 14 available _both_ via emulated IDE resp. SCSI controller, _and_ as a 17 underlying devices as the corresponding Xen VBD (ie, multipath). 21 For PV guests every device is made available to the guest only as a 42 treat each vbd as it would a partition or slice or LVM volume (for 72 The information above is encoded in the concrete interface as an 74 encodes the information above as follows: 101 Notes on Linux as a guest 108 as 119 supply as few hd* devices as possible, and for the rest of the disks, [all …]
|
A D | xen-tscmode.pod.7 | 40 This last is the US$64,000 question as it may be very difficult 43 that uses rdtsc must be assumed to be TSC-sensitive and, as we 70 This is the same as prior to Xen 4.0 and is the best choice if it 126 so it is often used as a foundation for performance monitoring. 155 invariant as "TSC-safe" and any hardware on which TSC is not (or 156 may not remain) synchronized as "TSC-unsafe". 164 machine as "TSC-sensitive"; apps that don't use TSC, or do use 166 are unimportant as "TSC-resilient". 251 as will be seen in the next section. 262 can be used as a system "clocksource". [all …]
|
A D | xl-numa-placement.pod.7 | 18 defined as a set of processor cores (typically a physical CPU package) and 21 NUMA awareness becomes very important as soon as many domains start 49 created, as the most of its memory is allocated at that time and can 60 such a I<cpupool> with the "pool=" config option (as documented in our 84 as the vCPU can potentially run everywhere, it just prefers some pCPUs 144 affects NUMA placement and memory accesses as, in this case, the 196 spot for the domain with at least as much free memory as it has configured 197 to have, and as much pCPUs as it has vCPUs. After that, the actual 226 performance for the guest, as it avoid spreading its memory among 248 bits set, as it is by default), or domain creation will fail with [all …]
|
A D | xl.pod.1.in | 55 =item run xl as B<root> 114 Create will return B<as soon> as the domain is started. This B<does 151 Attach console to the domain as soon as it has started. This is 179 soon as it is run. 391 by domains is thus very unreliable, as a high IO workload may show as 548 not work as intended. 584 command run from the console. The command returns as soon as it has 1001 A domain with a weight of 512 will get twice as much CPU as a domain 1096 A domain with a weight of 512 will get twice as much CPU as a domain 1280 nodes can be specified as single CPU/node IDs or as ranges. [all …]
|
/xen-4.10.0-shim-comet/xen/arch/arm/ |
A D | Kconfig | 57 Allows a guest to use SBSA Generic UART as a console. The 75 to occur at the same time as another transaction to the same address 82 as it depends on the alternative framework, which will only patch 97 write instruction at the same time as a processor in another 100 incorrectly marked as dirty. 105 workaround, as it depends on the alternative framework, which will 120 the same time as a processor in another cluster is executing a cache 127 as it depends on the alternative framework, which will only patch 146 as it depends on the alternative framework, which will only patch 160 fault as the result of a Stage 1 fault for load crossing a [all …]
|
/xen-4.10.0-shim-comet/docs/features/ |
A D | sched_credit2.pandoc | 18 Credit2 was designed as a general purpose scheduler, with particular 25 Credit2 is not in use by default. In order to use it as the Xen 35 Once the system is live, for creating a cpupool with Credit2 as 36 its scheduler, either compile a cpupool configuration file, as 37 described in `docs/man/xlcpupool.cfg.pod.5` (and as exemplified 58 Global scheduling parameters, such as context switching rate 75 where Credit2 is used as the scheduler of a cpupool, and by also doing the
|
A D | sched_rtds.pandoc | 24 RTDS is not in use by default. In order to use it as the Xen scheduler 29 Once the system is live, for creating a cpupool with RTDS as its 30 scheduler, either compile a cpupool configuration file, as described 31 in `docs/man/xlcpupool.cfg.pod.5` (and as exemplified in 37 as follows: 64 deterministic and statically analyzable behavior (as per the 77 * create a cpupool with RTDS as its scheduler, 91 * set the scheduling parameters such as it has a 50% reservation, with
|
A D | livepatch.pandoc | 23 Xen Live Patching has been available as tech preview feature since Xen 31 declare live patching as a 'Supported' feature on x86. 40 guests and it shall be treated as a security issue if this is not 47 functions are patched), it shall be treated as a security issue. 61 issue being inappropriate to live patch, this is not considered as a 65 Bugs in the live patch parsing code such as out-of-bounds reads 73 treated as a security issue.
|
/xen-4.10.0-shim-comet/tools/ocaml/xenstored/ |
A D | symbol.mli | 7 * it under the terms of the GNU Lesser General Public License as published 21 compared in constant time (as opposite to strings) and should help the ocaml GC. *) 35 - mark all the knowns symbols as unused (with [mark_all_as_unused]); 36 - mark all the symbols really usefull as used (with [mark_as_used]); and
|
/xen-4.10.0-shim-comet/tools/examples/ |
A D | xlexample.pvhlinux | 14 # 128-bit UUID for the domain as a hexadecimal number. 35 # A list of 'vifspec' entries as described in 40 # A list of `diskspec' entries as described in
|
A D | xlexample.pvlinux | 11 # 128-bit UUID for the domain as a hexadecimal number. 37 # A list of 'vifspec' entries as described in 42 # A list of `diskspec' entries as described in
|
A D | xlexample.hvm | 14 # 128-bit UUID for the domain as a hexadecimal number. 36 # A list of 'vifspec' entries as described in 41 # A list of `diskspec' entries as described in
|
/xen-4.10.0-shim-comet/ |
A D | Config.mk | 161 as-insn = $(if $(shell echo 'void _(void) { asm volatile ( $(2) ); }' \ 168 as-insn-check = $(eval $(call as-insn-check-closure,$(1),$(2),$(3),$(4))) 169 define as-insn-check-closure 170 ifeq ($$(call as-insn,$$($(2)),$(3),y,n),y)
|
A D | COPYING | 7 of this notice. Note that the only valid version of the GPL as far as 16 When these code sections are compiled as part of a 17 GPLv2-licensed program, such as Xen, the result is licensed under 23 A number of files will also specify GPL exceptions, such as 51 Xen tree, retaining the original license, such as 145 the term "modification".) Each licensee is addressed as "you". 155 source code as you receive it, in any medium, provided that you 189 These requirements apply to the modified work as a whole. If 243 access to copy the source code from the same place counts as 248 except as expressly provided under this License. Any attempt [all …]
|
/xen-4.10.0-shim-comet/docs/designs/ |
A D | dmop.markdown | 13 itself, such as with Track dirty VRAM (as used in VGA emulation). 15 to ensure it is not within restricted address ranges, such as kernel 26 DMOP hypercalls will continue to function as they can be audited. 82 doing this would be written as below. Note that care is taken to prevent 116 This leaves do_dm_op easy to implement as below:
|
/xen-4.10.0-shim-comet/tools/xenstore/ |
A D | talloc_guide.txt | 11 as talloc has changed a lot. 48 makes this worthwhile, especially as the total overhead of 138 pointer as a child of its current parent. 182 be ignored. This would be a pointless operation anyway, as the 202 name on a pointer in as a way of "marking" pointers in your code. 208 The talloc_set_name() function allocates memory as a child of the 222 used by the "auto naming" macros, such as talloc_p(). 259 This function creates a zero length named talloc context as a top 315 as to your sanity or the safety of your data if you do this. 377 talloc function as it establishes a "null context" that acts as the [all …]
|
/xen-4.10.0-shim-comet/xen/arch/x86/boot/ |
A D | build32.lds | 5 * it under the terms of the GNU General Public License as published by 41 * pretty good chance that we can safely drop .got.plt as a whole here. 42 * Sadly this is not true. _GLOBAL_OFFSET_TABLE_ is used as a reference
|
/xen-4.10.0-shim-comet/m4/ |
A D | ax_compare_version.m4 | 19 # The six basic comparisons are available, as well as checking equality 43 # as well. 67 # empty string is the same as version 0. OP is evaluated by autoconf, not 81 # and this notice are preserved. This file is offered as-is, without any 112 dnl # In the case of le, ge, lt, and gt, the strings are sorted as necessary 159 # Check for equality or inequality as necessary.
|