Home
last modified time | relevance | path

Searched full:virtualization (Results 1 – 25 of 51) sorted by relevance

123

/Documentation/virt/kvm/
Dtimekeeping.txt2 Timekeeping Virtualization for X86-Based Architectures
10 4) Virtualization Problems
17 the virtualization of this platform is the plethora of timing devices available
18 and the complexity of emulating those devices. In addition, virtualization of
28 information relevant to KVM and hardware-based virtualization.
269 these workarounds pose unique constraints for virtualization - requiring either
338 Both VMX and SVM provide extension fields in the virtualization hardware which
368 small, may be exposed to the OS and any virtualization environment.
426 3.7) TSC virtualization - VMX
429 instructions, which is enough for full virtualization of TSC in any manner. In
[all …]
Dnested-vmx.txt19 "The Turtles Project: Design and Implementation of Nested Virtualization",
28 Single-level virtualization has two levels - the host (KVM) and the guests.
29 In nested virtualization, we have three levels: The host (KVM), which we call
Damd-memory-encryption.rst2 Secure Encrypted Virtualization (SEV)
8 Secure Encrypted Virtualization (SEV) is a feature found on AMD processors.
/Documentation/virt/
Dparavirt_ops.rst7 Linux provides support for different hypervisor virtualization technologies.
10 Linux pv_ops is a virtualization API which enables support for different
Dindex.rst4 Linux Virtualization Support
/Documentation/devicetree/bindings/misc/
Dpvpanic-mmio.txt3 QEMU's emulation / virtualization targets provide the following PVPANIC
/Documentation/devicetree/bindings/arm/firmware/
Dlinaro,optee-tz.txt5 also by virtualization or a separate chip.
/Documentation/networking/device_drivers/neterion/
Dvxge.txt36 iii) PCI-SIG's I/O Virtualization
91 virtualization environment.
/Documentation/admin-guide/hw-vuln/
Dmultihit.rst113 EPT paging mechanism used by nested virtualization is vulnerable, because
146 1. No virtualization in use
152 2. Virtualization with trusted guests
159 3. Virtualization with untrusted guests
Dmds.rst132 This is done to address virtualization scenarios where the host has the
168 Virtualization mitigation
183 For details on L1TF and virtualization see:
285 2. Virtualization with trusted guests
290 3. Virtualization with untrusted guests
Dl1tf.rst40 CVE-2018-3646 L1 Terminal Fault Virtualization related aspects
94 A special aspect of L1TF in the context of virtualization is symmetric
453 1. No virtualization in use
459 2. Virtualization with trusted guests
472 3. Virtualization with untrusted guests
556 When nested virtualization is in use, three operating systems are involved:
/Documentation/devicetree/bindings/arm/
Dfw-cfg.txt3 QEMU's arm-softmmu and aarch64-softmmu emulation / virtualization targets
/Documentation/arm/
Dbooting.rst201 For CPUs which do not include the ARM virtualization extensions, the
204 CPUs which include support for the virtualization extensions can be
228 virtualization extensions can boot correctly without extra help.
/Documentation/x86/
Dmds.rst80 For virtualization there are two ways to achieve CPU buffer
101 As a special quirk to address virtualization scenarios where the host has
123 advertised in CPUID. That is mainly for virtualization
Damd-memory-encryption.rst7 Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV) are
/Documentation/PCI/
Dpci-iov-howto.rst5 PCI Express I/O Virtualization Howto
18 Single Root I/O Virtualization (SR-IOV) is a PCI Express Extended
/Documentation/accounting/
Dtaskstats-struct.rst132 * from the kernel in involuntary waits due to virtualization.
140 * for kernel's involuntary waits due to virtualization.
/Documentation/virt/kvm/arm/
Dpsci.txt6 and KVM implements these updates if they make sense from a virtualization
/Documentation/admin-guide/mm/
Dtranshuge.rst38 1) the TLB miss will run faster (especially with virtualization using
40 virtualization)
44 virtualization and nested pagetables the TLB can be mapped of
/Documentation/arm64/
Dmemory.rst98 When using KVM without the Virtualization Host Extensions, the
105 When using KVM with the Virtualization Host Extensions, no additional
Dpointer-authentication.rst89 Virtualization chapter
/Documentation/misc-devices/
Dibmvmc.rst16 Note: Knowledge of virtualization technology is required to understand
69 basically creates the pipes that enable virtualization management
/Documentation/admin-guide/cifs/
Dtodo.rst50 feature (may be especially useful for virtualization).
/Documentation/fpga/
Ddfl.rst231 FPGA virtualization - PCIe SRIOV
233 This section describes the virtualization support on DFL based FPGA device to
268 The driver organization in virtualization case is illustrated below:
/Documentation/filesystems/
D9p.txt28 * VirtFS: A Virtualization Aware File System pass-through

123