Home
last modified time | relevance | path

Searched refs:direct (Results 1 – 15 of 15) sorted by relevance

/xen-4.10.0-shim-comet/tools/libfsimage/ufs/
A Dfsys_ufs.c233 struct direct *dp; in dlook()
257 dp = (struct direct *)(DIRENT + off); in dlook()
A Dufs.h199 struct direct { struct
/xen-4.10.0-shim-comet/tools/libxl/
A Dlibxlu_disk_l.l187 direct-io-safe,? { DPC->disk->direct_io_safe = 1; }
/xen-4.10.0-shim-comet/docs/features/
A Dfeature-levelling.pandoc80 not trap, leaving Xen no direct ability to control the information returned.
95 direct control of the values returned for certain `CPUID` leaves. These MSRs
/xen-4.10.0-shim-comet/xen/arch/x86/
A DKconfig87 the always accessible direct mapped memory range.
/xen-4.10.0-shim-comet/tools/
A DRules.mk210 CFLAGS-$(CONFIG_X86_32) += $(call cc-option,$(CC),-mno-tls-direct-seg-refs)
/xen-4.10.0-shim-comet/docs/misc/
A Dpvh.markdown1 # x86/HVM direct boot ABI #
A Dblock-scripts.txt97 major/minor numbers, and can give direct access to a file without
/xen-4.10.0-shim-comet/docs/man/
A Dxen-vtpmmgr.pod.7174 A domain with direct access to the hardware TPM will be able to decrypt the TPM
188 There is no direct upgrade supported from previous versions of the vtpmmgr
A Dxl-disk-configuration.pod.5265 =item B<direct-io-safe>
A Dxen-vtpm.pod.7136 Because the TPM manager uses direct access to the physical TPM, it may interfere
A Dxl.cfg.pod.5.in416 command line arguments to be passed directly. PV guest direct kernel boot is
417 supported. HVM guest direct kernel boot is supported with some limitations
450 =head3 Non direct Kernel Boot
452 Non direct kernel boot allows booting guests with a firmware. This can be
/xen-4.10.0-shim-comet/tools/xenstore/
A Dtalloc_guide.txt148 with this pointer, or must be a direct parent of ptr.
/xen-4.10.0-shim-comet/tools/firmware/vgabios/
A Dclext.c945 stosb ;; direct screen mode info
/xen-4.10.0-shim-comet/
A DSUPPORT.md111 Format which the toolstack accepts for direct-boot kernels

Completed in 22 milliseconds