/xen/tools/libxc/ |
A D | xc_sr_save.c | 135 set_bit(ctx->save.batch_pfns[i], ctx->save.deferred_pages); in write_batch() 199 set_bit(ctx->save.batch_pfns[i], ctx->save.deferred_pages); in write_batch() 319 ctx->save.batch_pfns[ctx->save.nr_batch_pfns++] = pfn; in add_to_batch() 334 int cb_rc = ctx->save.callbacks->suspend(ctx->save.callbacks->data); in suspend_domain() 561 &ctx->save.dirty_bitmap_hbuf, ctx->save.p2m_size, in send_memory_live() 676 bitmap_or(dirty_bitmap, ctx->save.deferred_pages, ctx->save.p2m_size); in suspend_and_send_dirty() 692 bitmap_clear(ctx->save.deferred_pages, ctx->save.p2m_size); in suspend_and_send_dirty() 721 &ctx->save.dirty_bitmap_hbuf, ctx->save.p2m_size, in verify_frames() 812 ctx->save.deferred_pages = calloc(1, bitmap_size(ctx->save.p2m_size)); in setup() 814 if ( !ctx->save.batch_pfns || !dirty_bitmap || !ctx->save.deferred_pages ) in setup() [all …]
|
A D | xc_sr_save_x86_hvm.c | 158 ctx->save.p2m_size = nr_pfns; in x86_hvm_setup() 160 if ( ctx->save.callbacks->switch_qemu_logdirty( in x86_hvm_setup() 161 ctx->domid, 1, ctx->save.callbacks->data) ) in x86_hvm_setup() 167 ctx->x86.hvm.save.qemu_enabled_logdirty = true; in x86_hvm_setup() 219 if ( ctx->x86.hvm.save.qemu_enabled_logdirty && in x86_hvm_cleanup() 220 ctx->save.callbacks->switch_qemu_logdirty( in x86_hvm_cleanup() 221 ctx->domid, 0, ctx->save.callbacks->data) ) in x86_hvm_cleanup()
|
A D | xc_sr_common.h | 250 } save; member 380 } save; member
|
A D | xc_sr_save_x86_pv.c | 93 ctx->save.p2m_size = ctx->x86.pv.max_pfn + 1; in map_p2m_leaves() 298 if ( !ctx->save.live ) in x86_pv_check_vm_state_p2m_list()
|
/xen/xen/arch/x86/hvm/ |
A D | save.c | 87 hvm_save_handler save; member 102 ASSERT(hvm_sr_handlers[typecode].save == NULL); in hvm_register_savevm() 104 hvm_sr_handlers[typecode].save = save_state; in hvm_register_savevm() 146 !hvm_sr_handlers[typecode].save ) in hvm_save_one() 165 if ( (rv = hvm_sr_handlers[typecode].save(v, &ctxt)) != 0 ) in hvm_save_one() 238 hvm_save_handler handler = hvm_sr_handlers[i].save; in hvm_save()
|
A D | Makefile | 24 obj-y += save.o
|
/xen/docs/features/ |
A D | migration.pandoc | 27 From the command line, `xl migrate/save/restore` are the top level 36 xl save my-vm /path/to/save/file 37 xl restore /path/to/save/file 90 save/restore` or `xl migrate $VM localhost`.
|
A D | intel_psr_cat_cdp.pandoc | 312 feature property pointer array is declared to save every feature's 322 `type` is an array to save all 'enum cbm_type' values of the 386 `features` is a pointer array to save all enabled features pointers
|
/xen/xen/arch/arm/arm32/lib/ |
A D | lib1funcs.S | 53 @ to save one loop in most cases. 257 eor ip, r0, r1 @ save the sign of the result. 323 UNWIND(.save {r0, r1, ip, lr} ) 337 UNWIND(.save {r0, r1, ip, lr} ) 350 UNWIND(.save {lr} ) 364 UNWIND(.save {lr} ) 380 UNWIND(.save {lr})
|
A D | div64.S | 196 UNWIND(.save {lr})
|
/xen/tools/hotplug/Linux/init.d/ |
A D | sysconfig.xendomains.in | 48 ## Default: @XEN_LIB_DIR@/save 50 # Directory to save running domains to when the system (dom0) is 56 XENDOMAINS_SAVE=@XEN_LIB_DIR@/save 119 # On xendomains stop, a number of xm commands (xm migrate, save, shutdown, 128 # The setting should be large enough to make sure that migrate/save/shutdown
|
/xen/docs/specs/ |
A D | libxc-migration-stream.pandoc | 14 The _domain save image_ is the context of a running domain used for 18 There are a number of problems with the format of the domain save 33 ARM does not yet have have a domain save image format specified and 78 Padding and reserved fields are set to zero on save and must be 96 The image header identifies an image as a Xen domain save image. It 100 Tools supporting version _V_ of the specification shall always save 550 toolstack (e.g., libxl) during save and restore. 693 A typical save record for an x86 PV guest image would look like: 724 A typical save record for an x86 HVM guest image would look like: 760 It shall not be possible to save in the legacy format.
|
/xen/docs/misc/ |
A D | stubdom.txt | 48 - stubdomain's console 1 is connected to qemu save file (for saving state) 49 - stubdomain's console 2 is connected to qemu save file (for restoring state) 72 - "save" - save domain state to console 1, results: 102 - stubdomain's console 1 is connected to qemu save file (for saving state) 103 - stubdomain's console 2 is connected to qemu save file (for restoring state)
|
/xen/docs/designs/ |
A D | non-cooperative-migration.md | 144 HVM context information which contained in the `HVM_CONTEXT` save record) 156 migration state so this will either need to be added into an existing save 157 record, or an additional type of save record will be needed. 169 migration. One or more new save records will therefore be required to 195 new save records will be required to transfer event channel state in order 231 explicit action by the guest, one or more new save records will be required 251 * Within the migration stream extra save records will be defined as 259 if there are none present, but also enabling the extra save records. Note
|
A D | xenstore-migration.md | 6 save records are required in the migrations stream to allow a guest running PV 7 drivers to be migrated without its co-operation. Moreover the save records must
|
/xen/tools/hotplug/Linux/ |
A D | xendomains.in | 435 watchdog_xencmd save & 438 XMR=`$CMD save $id $XENDOMAINS_SAVE/$name 2>&1 1>/dev/null`
|
/xen/ |
A D | CHANGELOG.md | 22 - Option to preserve domain-id across migrate or save+restore.
|
/xen/tools/libxl/ |
A D | libxl_save_callout.c | 87 libxl__srm_callout_enumcallbacks_save(&shs->callbacks.save.a); in libxl__xc_domain_save() 378 return &shs->callbacks.save.a; in libxl__srm_callout_get_callbacks_save()
|
A D | check-xl-vcpupin-parse | 33 -o ofile save the test data in ofile (default: $outfile)
|
A D | libxl_remus.c | 81 &dss->sws.shs.callbacks.save.a; in libxl__remus_setup()
|
/xen/xen/arch/x86/x86_64/compat/ |
A D | entry.S | 93 movzbl VCPU_async_exception_mask(%rbx),%edx # save mask for the 109 movzbl VCPU_async_exception_mask(%rbx),%edx # save mask for the
|
/xen/tools/tests/vhpet/ |
A D | main.c | 84 hvm_save_handler save; member 171 hvm_sr_handlers[typecode].save = save_state; in hvm_register_savevm() 180 return hvm_sr_handlers[typecode].save(d, h); in do_save()
|
/xen/xen/include/ |
A D | Makefile | 103 PUBLIC_ANSI_HEADERS := $(filter-out public/%ctl.h public/xsm/% public/%hvm/save.h $(PUBLIC_C99_HEAD…
|
/xen/xen/arch/x86/x86_64/ |
A D | entry.S | 105 movzbl VCPU_async_exception_mask(%rbx), %edx # save mask for the 121 movzbl VCPU_async_exception_mask(%rbx), %edx # save mask for the 540 # Get out of the guest-save area of the stack.
|
/xen/tools/ocaml/libs/xb/ |
A D | xb.ml | 115 (* send data from s, and save the unsent data to partial_out *)
|