Home
last modified time | relevance | path

Searched full:virtualized (Results 1 – 25 of 28) sorted by relevance

12

/Documentation/virt/hyperv/
Dclocks.rst9 and timer. Guest VMs use this virtualized hardware as the Linux
26 also provides access to the virtualized TSC via the RDTSC and
32 calibration and sets tsc_reliable. Hyper-V provides virtualized
34 APIC timer, and RTC. Hyper-V does not provide a virtualized HPET in
78 virtualized PIT and local APIC timer also work, but Hyper-V stimer0
Dvpci.rst11 latency, compared with devices that are virtualized by the
/Documentation/gpu/
Dxen-front.rst2 drm/xen-front Xen para-virtualized frontend driver
5 This frontend driver implements Xen para-virtualized display
/Documentation/ABI/testing/
Dsysfs-hypervisor-xen8 "HVM": fully virtualized guest (x86)
10 "PVH": fully virtualized guest without legacy emulation (x86)
/Documentation/devicetree/bindings/iommu/
Dxen,grant-dma.yaml7 title: Xen specific IOMMU for virtualized devices (e.g. virtio)
/Documentation/devicetree/bindings/cpufreq/
Dqemu,virtual-cpufreq.yaml14 Virtual CPUFreq is a virtualized driver in guest kernels that sends performance
/Documentation/devicetree/bindings/powerpc/fsl/
Dmsi-pic.txt37 This property may be used in virtualized environments where the hypervisor
87 In a virtualized environment, the hypervisor may need to create an IOMMU
/Documentation/admin-guide/hw-vuln/
Dmultihit.rst8 or cache type. A malicious guest running on a virtualized system can
63 guests in a virtualized system.
Dtsx_async_abort.rst248 disabled. The same applies to virtualized environments with trusted guests.
259 are prevented in a virtualized environment as well, even if the VMs do not
Dspectre.rst271 3. A virtualized guest attacking the host
297 4. A virtualized guest attacking other guest
/Documentation/security/
Dsnp-tdx-threat-model.rst12 Kernel developers working on confidential computing for virtualized
32 that are targeting virtualized environments and allow running Virtual
35 virtualized environments (VE)'.
/Documentation/virt/kvm/x86/
Dtimekeeping.rst321 timer device would require additional support to be virtualized properly and is
547 Since CPUID may actually be virtualized by a trap and emulate mechanism, this
624 Precise timing and delays may not be possible in a virtualized system. This
627 in general for a virtualized system; hardware control software can't be
628 adequately virtualized without a full real-time operating system, which would
639 guest about the host in anything but a perfect implementation of virtualized
/Documentation/virt/kvm/loongarch/
Dhypercalls.rst24 On a KVM-virtualized Linux system, a read operation on cpucfg() at index
/Documentation/ABI/stable/
Dsysfs-hypervisor-xen39 "hvm" -- x86 only: fully virtualized
/Documentation/networking/device_drivers/ethernet/intel/
Didpf.rst130 Virtualized Environments
Di40e.rst491 network, which may be useful in a virtualized or cloud environment. Some
594 Virtualized Environments
610 Non-virtualized Environments
Dice.rst65 In a virtualized environment, on Intel(R) Ethernet Network Adapters that
1145 Virtualized Environments
/Documentation/accel/qaic/
Dqaic.rst44 MultiMSI is not well supported on all systems; virtualized ones even less so
/Documentation/misc-devices/
Dibmvmc.rst44 POWER8 or newer processor-based server that is virtualized by PowerVM.
/Documentation/arch/arm64/
Dacpi_object_usage.rst442 Optional, but only necessary in virtualized environments in order to
647 that provides overrides to hide devices in virtualized
/Documentation/timers/
Dno_hz.rst79 both to battery-powered devices and to highly virtualized mainframes.
/Documentation/arch/s390/
Dvfio-ccw.rst46 Typically, a guest virtualized via QEMU/KVM on s390 only sees
/Documentation/arch/x86/
Dtdx.rst263 For some CPUID leaves and sub-leaves, the virtualized bit fields of CPUID
/Documentation/admin-guide/mm/
Dmemory-hotplug.rst482 virtualized environments. This policy ignores
/Documentation/driver-api/usb/
Dusb.rst740 virtualized as root hubs)

12