Sponsored Content
Operating Systems AIX Need help understand Virtual Processors Post 302419883 by ross.mather on Monday 10th of May 2010 02:07:55 AM
Old 05-10-2010
Yes, your understanding is correct.
This User Gave Thanks to ross.mather For This Post:
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

AIX p5 virtual processors setting

Have a p570 LPAR capped/smt set to 4 physical processors. And currently have virtual processors set to 6 which gives 12 logical processors at AIX. This is for an Oracle9i database server running 4 instances. What should virtual processors be set to? at least initially? And how to determine when... (3 Replies)
Discussion started by: guttew
3 Replies

2. UNIX for Dummies Questions & Answers

Have to log out of a virtual terminal twice in order to exit virtual terminals

Not really a newbie, but I have a strange problem and I'm not sure how to further troubleshoot it. I have to log out of a virtual terminal by typing exit, then exit again as in: woodnt@toshiba-laptop ~ $ exit logout woodnt@toshiba-laptop ~ $ exit logout I DON'T have to do this when I'm... (1 Reply)
Discussion started by: Narnie
1 Replies

3. UNIX for Dummies Questions & Answers

How can i understand if a Java Virtual Machine is installed on Unix??

Hello, i would like to figute out, if there is any JVM installed on my unix account. How can i figure that out?? Thanks (1 Reply)
Discussion started by: g_p
1 Replies

4. AIX

Processsing Units and Virtual Processors.

Hi, on redhat linux 5.5 (IBM PPC) os, whenever I am running the command top, it is showing 8 cpu. Processing Units Property Current Pending Minimum 0.1 Assigned 0.8 Maximum 1 Virtual Processors Property Current Pending Minimum 1 Assigned 4 ... (1 Reply)
Discussion started by: manoj.solaris
1 Replies

5. Programming

Understand Virtual functions Internals

I am just trying to understand the virtual fns. concept. I know that if I have a virtual fn. in a base class and its overridden fn. in derived class then based upon the address of base/derived object stored in the base class pointer the fns. will be called. In the below code I had kept... (2 Replies)
Discussion started by: rupeshkp728
2 Replies

6. Solaris

Change hostID of Solaris 10 virtual/guest machine installed by Virtual Box 4.1.12 on Windows-XP host

Trying to set or modify the randomly set hostID of a Solaris 10 virtual/guest machine that I installed on a Windows-XP host machine (using Virtual Box 4.1.12). I was able to set/modify the hostname of the Solaris 10 virtual/guest machine during installation as well as via the Virtual Box... (4 Replies)
Discussion started by: Matt_VB
4 Replies

7. Solaris

How to count number of physical and virtual processors on Solaris machine.?

hi, I am using command psrinfo -p to check the number of physical processors present on any soalris machine.I want to check the number of virtual processors assigned for particular solaris machine. which command/set of command need to be used which can grep or show the total virtual processors... (8 Replies)
Discussion started by: omkar.jadhav
8 Replies

8. Red Hat

Number of physical and virtual processors

Hi, i am trying to find out hpw many virtual and physical processors does any linux machine has: output of /proc/cpuinfo is as below : # cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 26 model name : Intel(R) Xeon(R) CPU... (8 Replies)
Discussion started by: omkar.jadhav
8 Replies

9. UNIX for Beginners Questions & Answers

Providing virtual machine priority in kvm based virtual machines

Hi All, Is there any way I can prioritize my VMs when there is resource crunch in host machine so that some VMs will be allocated more vcpu, more memory than other VMs in kvm/qemu hypervisor based virtual machines? Lets say in my cloud environment my Ubuntu 16 compute hosts are running some... (0 Replies)
Discussion started by: SanjayK
0 Replies
gss_unwrap(3)						     Library Functions Manual						     gss_unwrap(3)

NAME
gss_unwrap - verify a message with attached message integrity code (MIC) and decrypt message content if necessary SYNOPSIS
DESCRIPTION
The routine converts a protected message to a usable form and verifies the embedded message integrity code (MIC). The conf_state parameter indicates whether the message was encrypted. The qop_state parameter indicates the quality of protection that was used to provide the con- fidentiality and integrity services. Input Parameters context_handle Specifies the context on which the message arrived. input_message_buffer Specifies the protected message. output_message_buffer Specifies the buffer to receive the unwrapped message. Output Parameters conf_state Returns the requested level of confidentiality and integrity services, as follows: Non-zero Both confidentiality and integrity services were used. zero Only integrity services was used. qop_state Returns the cryptographic algorithm, or quality of protection. minor_status Returns a status code from the security mechanism. STATUS CODES
The following status codes can be returned: The routine was completed successfully. The signature was incorrect. The context has already expired. The context is recognized but the associated credentials have expired. The token failed consistency checks. The token was valid and contained the correct signature but it had already been processed. The routine failed. The context specified in the context_handle parameter was not valid. The context identified in the context_handle parameter was not valid. The token was valid and contained the correct signature but it is too old. The token was valid, and contained a correct MIC for the message, but has been verified out of sequence; a later token has already been received. The token was valid, and contained a correct MIC for the message, but has been verified out of sequence; an earlier expected token has not yet been received. AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
gss_get_mic(3), gss_wrap(3). gss_unwrap(3)
All times are GMT -4. The time now is 10:54 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy