/xen/docs/features/ |
A D | template.pandoc | 1 % Template for feature documents 6 This is a suggested template for formatting of a Xen feature document in 10 for the feature (indicating its security status), as well as brief user 29 A short description the feature, similar to an abstract for a 34 Information for a user attempting to use the feature. Should include 35 how to enable the feature (is it enabled by default? If not, how to turn 36 it on?), and how to interact with the feature (typically via `xl`). 50 Information concerning how to properly test changes affecting this feature. 55 feature itself, or improve interaction with other features. 65 Relevant external references for this feature.
|
A D | feature-levelling.pandoc | 45 `xl` currently has no facilities to help the user collect appropriate feature 46 information from relevant hosts and compute appropriate feature specifications 101 instructions requesting specific feature bitmap sets. The exact MSRs, and 102 which feature bitmap sets they affect are hardware specific. These MSRs allow 115 disabling a certain feature, we disable all features which depend on it. This 117 the single appropriate feature, rather than the entire feature dependency 120 To speed up runtime calculation of feature dependencies, the dependency chain 124 disable all dependent features of a specific disabled feature in constant 161 A guest which ignores the provided feature information and manually probes for 179 The feature querying and levelling functions should exposed in a [all …]
|
A D | intel_psr_cat_cdp.pandoc | 311 Every feature has its own properties, e.g. some data and actions. A 312 feature property pointer array is declared to save every feature's 317 `cos_num` is the number of COS registers the feature uses, e.g. 323 feature. It is used with cos_num together to get/write a feature's 329 the feature does some special operations. 337 `write_msr` is used to write out feature MSR register. 347 When a PSR enforcement feature is enabled, it will be added into a 348 feature array. 364 registers of the feature. The array is indexed by COS ID. 387 according to feature position defined in `enum psr_feat_type`. [all …]
|
A D | intel_psr_mba.pandoc | 32 The Memory Bandwidth Allocation (MBA) feature provides indirect and approximate 33 control over memory bandwidth available per-core. This feature provides OS/ 41 Add "psr=mba" to boot line parameter to enable MBA feature. 152 1. Boot line param: "psr=mba" to enable the feature.
|
A D | livepatch.pandoc | 23 Xen Live Patching has been available as tech preview feature since Xen 31 declare live patching as a 'Supported' feature on x86.
|
/xen/xen/include/asm-arm/ |
A D | alternative.h | 34 #define ALTINSTR_ENTRY(feature, cb) \ argument 41 " .hword " __stringify(feature) "\n" /* feature bit */ \ 61 #define __ALTERNATIVE_CFG(oldinstr, newinstr, feature, cfg_enabled, cb) \ argument 67 ALTINSTR_ENTRY(feature,cb) \ 83 #define _ALTERNATIVE_CFG(oldinstr, newinstr, feature, cfg, ...) \ argument 84 __ALTERNATIVE_CFG(oldinstr, newinstr, feature, IS_ENABLED(cfg), 0) 93 .macro altinstruction_entry orig_offset alt_offset feature orig_len alt_len 96 .hword \feature
|
A D | cpuerrata.h | 10 #define CHECK_WORKAROUND_HELPER(erratum, feature, arch) \ argument 21 feature) \
|
/xen/docs/misc/ |
A D | xenstore-ring.txt | 23 2064 4 Server feature bitmap 57 "Server feature bitmap". The server can start advertising features 60 the server feature bitmap. The server features are offered to the guest; 62 any unknown feature bits. 68 1 Ring reconnection (see the ring reconnection feature below) 72 advertised the ring reconnection feature. If the feature has been advertised 79 reconnection feature" described below) 81 The ring reconnection feature 84 The ring reconnection feature allows the guest to ask the server to 90 feature bit has been set by the server in the "Server feature bitmap". [all …]
|
A D | xenstore-paths.pandoc | 439 #### ~/control/feature-poweroff = (""|"0"|"1") [w] 440 #### ~/control/feature-reboot = (""|"0"|"1") [w] 441 #### ~/control/feature-suspend = (""|"0"|"1") [w] 465 #### ~/control/feature-s3 = (""|"0"|"1") [w,HVM] 466 #### ~/control/feature-s4 = (""|"0"|"1") [w,HVM] 468 These purpose of these feature flags is identical to feature-poweroff, 469 feature-reboot and feature-suspend above but concern triggering the 472 the corresponding acpi_ feature flag is set in ~/platform. 477 suspend feature. 512 #### ~/feature/hotplug/vif = ("0"|"1") [w] [all …]
|
/xen/stubdom/grub.patches/ |
A D | 40ext3_256byte_inode.diff | 16 + * Note: the difference between the compatible feature set and 17 + * the incompatible feature set is that if there is a bit set 18 + * in the incompatible feature set that the kernel doesn't 22 + * about a feature in either the compatible or incompatible 23 + * feature set, it must abort and not try to meddle with 29 + __u32 s_feature_compat; /* compatible feature set */ 30 + __u32 s_feature_incompat; /* incompatible feature set */ 31 + __u32 s_feature_ro_compat; /* readonly-compatible feature set */
|
/xen/xen/include/asm-x86/ |
A D | alternative.h | 61 #define ALTINSTR_ENTRY(feature, num) \ argument 64 " .word " __stringify(feature) "\n" /* feature bit */ \ 77 #define ALTERNATIVE(oldinstr, newinstr, feature) \ argument 80 ALTINSTR_ENTRY(feature, 1) \ 114 #define alternative(oldinstr, newinstr, feature) \ argument 115 asm volatile (ALTERNATIVE(oldinstr, newinstr, feature) : : : "memory") 132 #define alternative_input(oldinstr, newinstr, feature, input...) \ argument 133 asm volatile (ALTERNATIVE(oldinstr, newinstr, feature) \ 137 #define alternative_io(oldinstr, newinstr, feature, output, input...) \ argument 138 asm volatile (ALTERNATIVE(oldinstr, newinstr, feature) \
|
A D | alternative-asm.h | 14 .macro altinstruction_entry orig repl feature orig_len repl_len pad_len 17 .word \feature 54 .macro ALTERNATIVE oldinstr, newinstr, feature 58 altinstruction_entry .L\@_orig_s, .L\@_repl_s1, \feature, \
|
A D | asm_defns.h | 160 #define CPUINFO_FEATURE_OFFSET(feature) \ argument 161 (CPUINFO_features + (cpufeat_word(feature) * 4))
|
/xen/xen/common/libelf/ |
A D | libelf-dominfo.c | 39 unsigned char feature[64]; in elf_xen_parse_features() local 47 elf_memset_unchecked(feature, 0, sizeof(feature)); in elf_xen_parse_features() 50 if ( len >= sizeof(feature)-1 ) in elf_xen_parse_features() 59 feature[len] = features[pos + len]; in elf_xen_parse_features() 66 if ( feature[0] == '!' ) in elf_xen_parse_features() 69 if ( !strcmp(feature + 1, elf_xen_feature_names[i]) ) in elf_xen_parse_features() 80 if ( !strcmp(feature, elf_xen_feature_names[i]) ) in elf_xen_parse_features() 87 if ( i == elf_xen_features && required && feature[0] == '!' ) in elf_xen_parse_features()
|
/xen/xen/lib/x86/ |
A D | cpuid.c | 239 const uint32_t *x86_cpuid_lookup_deep_deps(uint32_t feature) in x86_cpuid_lookup_deep_deps() argument 243 uint32_t feature; in x86_cpuid_lookup_deep_deps() member 251 if ( !test_bit(feature, deep_features) ) in x86_cpuid_lookup_deep_deps() 259 if ( deep_deps[mid].feature > feature ) in x86_cpuid_lookup_deep_deps() 261 else if ( deep_deps[mid].feature < feature ) in x86_cpuid_lookup_deep_deps()
|
/xen/tools/ocaml/libs/xb/ |
A D | xs_ring.ml | 37 (* NB only one feature currently defined above *) 44 (* NB only one feature currently defined above *)
|
/xen/tools/xenstat/xentop/ |
A D | TODO | 9 Like Top, f feature, field select of domain columns, toggle the display of 15 Like Top, ordering of domain columns, o feature Capital letter shifts left,
|
/xen/tools/flask/policy/modules/ |
A D | all_system_role.te | 2 # user/role separation feature will work properly.
|
/xen/ |
A D | SUPPORT.md | 346 This feature is independent 347 of the ARM "page granularity" feature (see below). 580 hole that would not be present without the feature disabled. 584 since without this feature the user ID wouldn't be changed. But a 674 it is generally not safe to use this feature 827 This gives the overall status of the feature, 877 Does it behave like a fully functional feature? 931 anyone who finds a security-related bug in the feature 953 This feature is security supported 960 or support is given only for certain aspects of the feature, [all …]
|
/xen/xen/arch/x86/ |
A D | xstate.c | 207 u64 feature = valid & -valid; in expand_xsave_states() local 208 unsigned int index = fls(feature) - 1; in expand_xsave_states() 220 valid &= ~feature; in expand_xsave_states() 273 u64 feature = valid & -valid; in compress_xsave_states() local 274 unsigned int index = fls(feature) - 1; in compress_xsave_states() 286 valid &= ~feature; in compress_xsave_states()
|
A D | Kconfig | 87 which use this feature, turning it off can reduce the attack 111 call/jump COP/JOP) attacks. Shadow Stacks are one CET feature 154 Compiles in a feature that allows HVM guest to arbitrarily 157 This feature can only be enabled during boot time with 160 this feature.
|
/xen/xen/include/xen/ |
A D | efi.h | 34 bool efi_enabled(unsigned int feature);
|
/xen/xen/arch/x86/efi/ |
A D | stub.c | 48 bool efi_enabled(unsigned int feature) in efi_enabled() argument
|
/xen/tools/firmware/hvmloader/ |
A D | mp_tables.c | 82 uint8_t feature[5]; member 253 mpfps->feature[i] = 0; in fill_mpfps()
|
/xen/docs/ |
A D | index.rst | 34 intended for OS developers trying to use a Xen feature, and for Xen developers
|