/qemu/tests/ |
H A D | test-qht-par.c | 48 g_test_add_func("/qht/parallel/2threads-0%updates-1s", test_2th0u1s); in main() 49 g_test_add_func("/qht/parallel/2threads-20%updates-1s", test_2th20u1s); in main() 51 g_test_add_func("/qht/parallel/2threads-0%updates-5s", test_2th0u5s); in main() 52 g_test_add_func("/qht/parallel/2threads-20%updates-5s", test_2th20u5s); in main()
|
/qemu/tests/qemu-iotests/ |
H A D | 082.out | 69 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 95 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 121 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 147 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 173 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 199 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 225 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 251 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 291 lazy_refcounts=<bool (on/off)> - Postpone refcount updates 379 lazy_refcounts=<bool (on/off)> - Postpone refcount updates [all …]
|
H A D | 107 | 4 # Tests updates of the qcow2 L1 table 47 echo '=== Updates should not write random data ==='
|
H A D | 107.out | 3 === Updates should not write random data ===
|
H A D | 130 | 6 # header updates.
|
/qemu/include/ui/ |
H A D | clipboard.h | 14 * and get notifications for clipboard updates. 64 * @notifier: notifier for clipboard updates. 149 * (set+grab clipboard) and passive (watch clipboard for updates) 247 * clipboard data updates in response to qemu_clipboard_request()
|
H A D | sdl2.h | 42 int updates; member
|
H A D | spice-display.h | 106 QTAILQ_HEAD(, SimpleSpiceUpdate) updates;
|
/qemu/tests/functional/ |
H A D | test_aarch64_xlnx_versal.py | 12 ('http://ports.ubuntu.com/ubuntu-ports/dists/bionic-updates/main/' 18 ('http://ports.ubuntu.com/ubuntu-ports/dists/bionic-updates/main/'
|
/qemu/qapi/ |
H A D | uefi.json | 36 # of updates for authenticated variables. UEFI has two kinds of 41 # updates must be signed with the same certificate.
|
/qemu/ui/ |
H A D | sdl2-gl.c | 76 scon->updates++; in sdl2_gl_update() 118 if (scon->updates && scon->real_window) { in sdl2_gl_refresh() 119 scon->updates = 0; in sdl2_gl_refresh()
|
H A D | spice-display.c | 187 QTAILQ_INSERT_TAIL(&ssd->updates, update, next); in qemu_spice_create_one_update() 362 QTAILQ_INIT(&ssd->updates); in qemu_spice_display_init_common() 432 while ((update = QTAILQ_FIRST(&ssd->updates)) != NULL) { in qemu_spice_display_switch() 433 QTAILQ_REMOVE(&ssd->updates, update, next); in qemu_spice_display_switch() 493 if (QTAILQ_EMPTY(&ssd->updates) && ssd->ds) { in qemu_spice_display_refresh() 545 update = QTAILQ_FIRST(&ssd->updates); in interface_get_command() 547 QTAILQ_REMOVE(&ssd->updates, update, next); in interface_get_command()
|
H A D | vnc.h | 110 /* time of last 10 updates, to find update frequency */ 312 * us to process further forced updates. */ 314 /* We allow multiple incremental updates or audio capture
|
/qemu/docs/devel/ |
H A D | rcu.rst | 11 serialize multiple updates, but other approaches are possible (e.g., 12 restricting updates to a single task). In QEMU, when a lock is used, 14 lock" (BQL). Also, restricting updates to a single task is done in 31 How is this possible? The basic idea is to split updates in two phases,
|
H A D | maintainers.rst | 82 The process is simple - simply send a patch to the list that updates
|
H A D | multi-thread-tcg.rst | 214 TLB flag updates are all done atomically and are also protected by the 247 Updates to interrupt state are also protected by the BQL as they can
|
/qemu/docs/ |
H A D | xbzrle.txt | 12 compressed version of the updates, thus reducing the amount of data sent during 44 On the sender side XBZRLE is used as a compact delta encoding of page updates,
|
/qemu/hw/net/ |
H A D | net_tx_pkt.h | 69 * updates vlan tag, and adds vlan header with custom ethernet type 81 * updates vlan tag, and adds vlan header in case it is missing
|
/qemu/tests/unit/ |
H A D | rcutorture.c | 20 * The first line lists the total number of RCU reads and updates executed 86 * Updates are protected by a mutex. 240 /* Updates protected by counts_mutex */
|
/qemu/include/hw/xen/interface/ |
H A D | xen.h | 211 * Updates an entry in a page table belonging to PFD. If updating an L1 table, 222 * This prevents uncontrolled guest updates to the pagetable. Xen strictly 255 * Updates an entry in the machine->pseudo-physical mapping table. 541 * vcpu_runstate_info during updates of the runstate information. 568 * DOMID_IO is used to restrict page-table updates to mapping I/O memory. 645 * Updates to the following values are preceded and followed by an 646 * increment of 'version'. The guest can therefore detect updates by
|
/qemu/hw/uefi/ |
H A D | var-service-auth.c | 278 /* reject SecureBootEnable updates if force_secure_boot is set */ in uefi_vars_check_secure_boot() 287 /* reject CustomMode updates if disable_custom_mode is set */ in uefi_vars_check_secure_boot()
|
/qemu/include/crypto/ |
H A D | hash.h | 161 * Updates the given hash object with all the memory regions 177 * Updates the given hash object with the data from
|
/qemu/migration/ |
H A D | multifd-zero-page.c | 43 * Sorts normal pages before zero pages in p->pages->offset and updates
|
/qemu/target/mips/system/ |
H A D | cp0.c | 26 /* Called for updates to CP0_Status. */
|
/qemu/include/hw/arm/ |
H A D | virt.h | 25 * the kernel updates its device tree bindings and requires further
|