Home
last modified time | relevance | path

Searched refs:as (Results 1 – 25 of 229) sorted by relevance

12345678910

/xen-4.10.0-shim-comet/xen/arch/x86/
A DRules.mk17 $(call as-insn-check,CFLAGS,CC,"vmcall",-DHAVE_GAS_VMX)
18 $(call as-insn-check,CFLAGS,CC,"crc32 %eax$$(comma)%eax",-DHAVE_GAS_SSE4_2)
19 $(call as-insn-check,CFLAGS,CC,"invept (%rax)$$(comma)%rax",-DHAVE_GAS_EPT)
20 $(call as-insn-check,CFLAGS,CC,"rdrand %eax",-DHAVE_GAS_RDRAND)
21 $(call as-insn-check,CFLAGS,CC,"rdfsbase %rax",-DHAVE_GAS_FSGSBASE)
22 $(call as-insn-check,CFLAGS,CC,"rdseed %eax",-DHAVE_GAS_RDSEED)
23 $(call as-insn-check,CFLAGS,CC,".equ \"x\"$$(comma)1", \
A DKconfig48 systems use it as a simple way to consistently map the current
76 deliberately used as a performance optimisation.
86 This requires enlarging struct page_info as well as shrinking
142 Build Xen with a mode which acts as a shim to allow PV guest to run
/xen-4.10.0-shim-comet/docs/misc/
A Dqemu-deprivilege.txt1 For security reasons, libxl tries to pass a non-root username to QEMU as
3 user ID and the group ID of the user passed as argument.
24 less secure but still better than running QEMU as root. Using this is as
25 simple as creating just one more user on your host:
31 As a last resort, libxl will start QEMU as root.
34 Please note that running QEMU as non-root causes several features like
A Dxenstore.txt5 (also known as `keys') to values. Clients may read and write values,
90 Except as otherwise noted, reserved values are believed to be sent as
96 Error replies are as follows:
120 Integer domid, represented as decimal number 0..65535.
123 represented as integers; unless otherwise specified it
129 reply payloads as applicable:
155 GET_PERMS <path>| <perm-as-string>|+
156 SET_PERMS <path>|<perm-as-string>|+?
157 <perm-as-string> is one of the following
206 as described above. req_id and tx_id are both 0.
[all …]
A Defi.markdown2 recommended, as 4.5.x was probably never really tested for this purpose) and
10 normal Image format, so a single binary may be booted as an Image file or as an
11 EFI application. When booted as an EFI application, Xen requires a
12 configuration file as described below unless a bootloader, such as GRUB, has
20 `EFI_MOUNTPOINT` is overridden as needed, should the default of `/boot/efi` not
28 separators will be tried) to be present in the same directory as the binary.
44 thus look like this (`#` serving as comment character):
76 The options should in general be the same as is used when booting
A Dstubdom.txt39 - use pv-grub.gz as kernel:
43 - set the path to menu.lst, as seen from the domU, in extra:
47 or you can provide the content of a menu.lst stored in dom0 by passing it as a
74 will be seen by PV-GRUB as (hd0), not (hd0,6), since GRUB will not see any
92 and the relevant Makefile rules as basis to build your own stub domain kernel.
A Dnetif-staging-grants.pandoc29 region. In some (physical) NICs this is known as header/data split.
38 when one wants to resort to a copy-based as opposed to grant copy/map.
113 network stack goes as following:
190 remaining slots as frags for the rest of the data ]
271 on backend, as opposed to a grant copy.
318 aggregating as much copies as possible.]
328 choose to merge as much as data from different pages into this single gref,
372 processed in the responses are then added as frags.
399 would need to aggregate as much as grant ops as possible (step 1) and could
401 as previously proposed
[all …]
/xen-4.10.0-shim-comet/docs/man/
A Dxen-vbd-interface.markdown.75 provided as Xen VBDs; for HVM guests they may also be provided as
14 available _both_ via emulated IDE resp. SCSI controller, _and_ as a
17 underlying devices as the corresponding Xen VBD (ie, multipath).
21 For PV guests every device is made available to the guest only as a
42 treat each vbd as it would a partition or slice or LVM volume (for
72 The information above is encoded in the concrete interface as an
74 encodes the information above as follows:
101 Notes on Linux as a guest
108 as
119 supply as few hd* devices as possible, and for the rest of the disks,
[all …]
A Dxen-tscmode.pod.740 This last is the US$64,000 question as it may be very difficult
43 that uses rdtsc must be assumed to be TSC-sensitive and, as we
70 This is the same as prior to Xen 4.0 and is the best choice if it
126 so it is often used as a foundation for performance monitoring.
155 invariant as "TSC-safe" and any hardware on which TSC is not (or
156 may not remain) synchronized as "TSC-unsafe".
164 machine as "TSC-sensitive"; apps that don't use TSC, or do use
166 are unimportant as "TSC-resilient".
251 as will be seen in the next section.
262 can be used as a system "clocksource".
[all …]
A Dxl-numa-placement.pod.718 defined as a set of processor cores (typically a physical CPU package) and
21 NUMA awareness becomes very important as soon as many domains start
49 created, as the most of its memory is allocated at that time and can
60 such a I<cpupool> with the "pool=" config option (as documented in our
84 as the vCPU can potentially run everywhere, it just prefers some pCPUs
144 affects NUMA placement and memory accesses as, in this case, the
196 spot for the domain with at least as much free memory as it has configured
197 to have, and as much pCPUs as it has vCPUs. After that, the actual
226 performance for the guest, as it avoid spreading its memory among
248 bits set, as it is by default), or domain creation will fail with
[all …]
A Dxl.pod.1.in55 =item run xl as B<root>
114 Create will return B<as soon> as the domain is started. This B<does
151 Attach console to the domain as soon as it has started. This is
179 soon as it is run.
391 by domains is thus very unreliable, as a high IO workload may show as
548 not work as intended.
584 command run from the console. The command returns as soon as it has
1001 A domain with a weight of 512 will get twice as much CPU as a domain
1096 A domain with a weight of 512 will get twice as much CPU as a domain
1280 nodes can be specified as single CPU/node IDs or as ranges.
[all …]
/xen-4.10.0-shim-comet/xen/arch/arm/
A DKconfig57 Allows a guest to use SBSA Generic UART as a console. The
75 to occur at the same time as another transaction to the same address
82 as it depends on the alternative framework, which will only patch
97 write instruction at the same time as a processor in another
100 incorrectly marked as dirty.
105 workaround, as it depends on the alternative framework, which will
120 the same time as a processor in another cluster is executing a cache
127 as it depends on the alternative framework, which will only patch
146 as it depends on the alternative framework, which will only patch
160 fault as the result of a Stage 1 fault for load crossing a
[all …]
/xen-4.10.0-shim-comet/docs/features/
A Dsched_credit2.pandoc18 Credit2 was designed as a general purpose scheduler, with particular
25 Credit2 is not in use by default. In order to use it as the Xen
35 Once the system is live, for creating a cpupool with Credit2 as
36 its scheduler, either compile a cpupool configuration file, as
37 described in `docs/man/xlcpupool.cfg.pod.5` (and as exemplified
58 Global scheduling parameters, such as context switching rate
75 where Credit2 is used as the scheduler of a cpupool, and by also doing the
A Dsched_rtds.pandoc24 RTDS is not in use by default. In order to use it as the Xen scheduler
29 Once the system is live, for creating a cpupool with RTDS as its
30 scheduler, either compile a cpupool configuration file, as described
31 in `docs/man/xlcpupool.cfg.pod.5` (and as exemplified in
37 as follows:
64 deterministic and statically analyzable behavior (as per the
77 * create a cpupool with RTDS as its scheduler,
91 * set the scheduling parameters such as it has a 50% reservation, with
A Dlivepatch.pandoc23 Xen Live Patching has been available as tech preview feature since Xen
31 declare live patching as a 'Supported' feature on x86.
40 guests and it shall be treated as a security issue if this is not
47 functions are patched), it shall be treated as a security issue.
61 issue being inappropriate to live patch, this is not considered as a
65 Bugs in the live patch parsing code such as out-of-bounds reads
73 treated as a security issue.
/xen-4.10.0-shim-comet/tools/ocaml/xenstored/
A Dsymbol.mli7 * it under the terms of the GNU Lesser General Public License as published
21 compared in constant time (as opposite to strings) and should help the ocaml GC. *)
35 - mark all the knowns symbols as unused (with [mark_all_as_unused]);
36 - mark all the symbols really usefull as used (with [mark_as_used]); and
/xen-4.10.0-shim-comet/tools/examples/
A Dxlexample.pvhlinux14 # 128-bit UUID for the domain as a hexadecimal number.
35 # A list of 'vifspec' entries as described in
40 # A list of `diskspec' entries as described in
A Dxlexample.pvlinux11 # 128-bit UUID for the domain as a hexadecimal number.
37 # A list of 'vifspec' entries as described in
42 # A list of `diskspec' entries as described in
A Dxlexample.hvm14 # 128-bit UUID for the domain as a hexadecimal number.
36 # A list of 'vifspec' entries as described in
41 # A list of `diskspec' entries as described in
/xen-4.10.0-shim-comet/
A DConfig.mk161 as-insn = $(if $(shell echo 'void _(void) { asm volatile ( $(2) ); }' \
168 as-insn-check = $(eval $(call as-insn-check-closure,$(1),$(2),$(3),$(4)))
169 define as-insn-check-closure
170 ifeq ($$(call as-insn,$$($(2)),$(3),y,n),y)
A DCOPYING7 of this notice. Note that the only valid version of the GPL as far as
16 When these code sections are compiled as part of a
17 GPLv2-licensed program, such as Xen, the result is licensed under
23 A number of files will also specify GPL exceptions, such as
51 Xen tree, retaining the original license, such as
145 the term "modification".) Each licensee is addressed as "you".
155 source code as you receive it, in any medium, provided that you
189 These requirements apply to the modified work as a whole. If
243 access to copy the source code from the same place counts as
248 except as expressly provided under this License. Any attempt
[all …]
/xen-4.10.0-shim-comet/docs/designs/
A Ddmop.markdown13 itself, such as with Track dirty VRAM (as used in VGA emulation).
15 to ensure it is not within restricted address ranges, such as kernel
26 DMOP hypercalls will continue to function as they can be audited.
82 doing this would be written as below. Note that care is taken to prevent
116 This leaves do_dm_op easy to implement as below:
/xen-4.10.0-shim-comet/tools/xenstore/
A Dtalloc_guide.txt11 as talloc has changed a lot.
48 makes this worthwhile, especially as the total overhead of
138 pointer as a child of its current parent.
182 be ignored. This would be a pointless operation anyway, as the
202 name on a pointer in as a way of "marking" pointers in your code.
208 The talloc_set_name() function allocates memory as a child of the
222 used by the "auto naming" macros, such as talloc_p().
259 This function creates a zero length named talloc context as a top
315 as to your sanity or the safety of your data if you do this.
377 talloc function as it establishes a "null context" that acts as the
[all …]
/xen-4.10.0-shim-comet/xen/arch/x86/boot/
A Dbuild32.lds5 * it under the terms of the GNU General Public License as published by
41 * pretty good chance that we can safely drop .got.plt as a whole here.
42 * Sadly this is not true. _GLOBAL_OFFSET_TABLE_ is used as a reference
/xen-4.10.0-shim-comet/m4/
A Dax_compare_version.m419 # The six basic comparisons are available, as well as checking equality
43 # as well.
67 # empty string is the same as version 0. OP is evaluated by autoconf, not
81 # and this notice are preserved. This file is offered as-is, without any
112 dnl # In the case of le, ge, lt, and gt, the strings are sorted as necessary
159 # Check for equality or inequality as necessary.

Completed in 18 milliseconds

12345678910