/linux/arch/x86/kvm/ ! |
H A D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 57 virtualization extensions. You will need a fairly recent 58 processor equipped with virtualization extensions. You will also 112 let guests receive a virtualization exception. Virtualization 118 virtualization. 123 bool "Software Guard eXtensions (SGX) Virtualization" 155 bool "AMD Secure Encrypted Virtualization (SEV) support" 165 Encrypted Virtualization (SEV), Secure Encrypted Virtualization with [all …]
|
/linux/arch/loongarch/kvm/ ! |
H A D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 39 hardware virtualization extensions. You will need 40 a processor equipped with virtualization extensions. 44 endif # VIRTUALIZATION
|
/linux/arch/riscv/kvm/ ! |
H A D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 42 endif # VIRTUALIZATION
|
/linux/arch/mips/kvm/ ! |
H A D | Kconfig | 7 menuconfig VIRTUALIZATION config 8 bool "Virtualization" 16 if VIRTUALIZATION 43 endif # VIRTUALIZATION
|
/linux/Documentation/ABI/testing/ ! |
H A D | sysfs-bus-vdpa | 3 Contact: virtualization@lists.linux.dev 15 Contact: virtualization@lists.linux.dev 25 Contact: virtualization@lists.linux.dev 33 Contact: virtualization@lists.linux.dev 41 Contact: virtualization@lists.linux.dev
|
/linux/arch/arm64/kvm/ ! |
H A D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 85 endif # VIRTUALIZATION
|
/linux/Documentation/virt/kvm/x86/ ! |
H A D | timekeeping.rst | 4 Timekeeping Virtualization for X86-Based Architectures 15 4) Virtualization Problems 21 the virtualization of this platform is the plethora of timing devices available 22 and the complexity of emulating those devices. In addition, virtualization of 32 information relevant to KVM and hardware-based virtualization. 281 these workarounds pose unique constraints for virtualization - requiring either 351 Both VMX and SVM provide extension fields in the virtualization hardware which 383 small, may be exposed to the OS and any virtualization environment. 445 3.7. TSC virtualization - VMX 449 instructions, which is enough for full virtualization of TSC in any manner. In [all …]
|
H A D | nested-vmx.rst | 22 "The Turtles Project: Design and Implementation of Nested Virtualization", 31 Single-level virtualization has two levels - the host (KVM) and the guests. 32 In nested virtualization, we have three levels: The host (KVM), which we call
|
H A D | running-nested-guests.rst | 26 | Hardware (with virtualization extensions) | 72 - Some OSes use virtualization internally for security (e.g. to let 127 (Virtual Machine Control Structure)", APIC Virtualization on your bare 223 *mention* that they're using nested virtualization.
|
H A D | errata.rst | 4 Known limitations of CPU virtualization 48 Nested virtualization features
|
/linux/Documentation/arch/x86/ ! |
H A D | iommu.rst | 24 - IVRS - AMD I/O Virtualization Reporting Structure 25 - IVDB - AMD I/O Virtualization Definition Block 26 - IVHD - AMD I/O Virtualization Hardware Definition 42 Virtualization Reporting Structure (IVRS) that is used to convey information 43 related to I/O virtualization to system software. The IVRS describes the
|
H A D | sva.rst | 34 Unlike Single Root I/O Virtualization (SR-IOV), Scalable IOV (SIOV) permits 217 Single Root I/O Virtualization (SR-IOV) focuses on providing independent 224 Scalable I/O Virtualization builds on the PASID concept to create device 225 instances for virtualization. SIOV requires host software to assist in 244 * Does this support virtualization? 277 https://01.org/blogs/ashokraj/2018/recent-enhancements-intel-virtualization-technology-directed-i/o… 280 https://01.org/blogs/2019/assignable-interfaces-intel-scalable-i/o-virtualization-linux
|
/linux/Documentation/virt/ ! |
H A D | paravirt_ops.rst | 7 Linux provides support for different hypervisor virtualization technologies. 10 Linux pv_ops is a virtualization API which enables support for different
|
/linux/Documentation/userspace-api/ ! |
H A D | iommufd.rst | 74 passed to or shared with a VM. It may be some HW-accelerated virtualization 80 * Virtualization of various platforms IDs, e.g. RIDs and others 86 to support some HW-accelerated virtualization features. So, a vIOMMU object 100 virtualization features from physical IOMMUs, it is suggested to build the 128 of IOMMU's virtualization features, for the IOMMU HW to directly read or write 254 also configure its HW virtualization feature for that vIOMMU (and thus for 265 op to init its HW for virtualization feature related to a vDEVICE. Successful
|
/linux/Documentation/devicetree/bindings/net/ ! |
H A D | fsl,enetc.yaml | 11 supports virtualization/isolation based on PCIe Single Root IO Virtualization
|
/linux/arch/x86/kernel/ ! |
H A D | reboot.c | 534 /* RCU-protected callback to disable virtualization prior to reboot. */ 557 * Disable virtualization, i.e. VMX or SVM, to ensure INIT is recognized during 566 * IRQs must be disabled as KVM enables virtualization in hardware via in cpu_emergency_disable_virtualization() 568 * virtualization stays disabled. in cpu_emergency_disable_virtualization() 584 * Disable virtualization on all CPUs before rebooting to avoid hanging in emergency_reboot_disable_virtualization() 590 * Do the NMI shootdown even if virtualization is off on _this_ CPU, as in emergency_reboot_disable_virtualization() 591 * other CPUs may have virtualization enabled. in emergency_reboot_disable_virtualization() 878 * callback can safely use virtualization instructions, e.g. VMCLEAR. in crash_nmi_callback() 902 * NULL, first and then disables virtualization to ensure that
|
/linux/Documentation/admin-guide/hw-vuln/ ! |
H A D | multihit.rst | 117 EPT paging mechanism used by nested virtualization is vulnerable, because 150 1. No virtualization in use 156 2. Virtualization with trusted guests 163 3. Virtualization with untrusted guests
|
H A D | mds.rst | 113 This is done to address virtualization scenarios where the host has the 160 Virtualization mitigation 175 For details on L1TF and virtualization see: 277 2. Virtualization with trusted guests 282 3. Virtualization with untrusted guests
|
/linux/drivers/net/ethernet/qlogic/ ! |
H A D | Kconfig | 43 Virtualization support for QLE83XX Converged Ethernet devices. 95 Virtualization support for QED devices.
|
/linux/arch/x86/kernel/cpu/ ! |
H A D | feat_ctl.c | 199 * in which case SGX virtualization cannot be supported either. in init_ia32_feat_ctl() 202 pr_err_once("SGX virtualization disabled due to lack of VMX.\n"); in init_ia32_feat_ctl() 211 pr_err_once("SGX Launch Control is locked. Support SGX virtualization only.\n"); in init_ia32_feat_ctl()
|
/linux/Documentation/virt/kvm/s390/ ! |
H A D | s390-pv-boot.rst | 44 Subcode 10: Move into Protected Virtualization mode 67 When running in protected virtualization mode, some subcodes will result in
|
/linux/drivers/net/ethernet/freescale/enetc/ ! |
H A D | Kconfig | 57 as the NIC functionality in NETC, it supports virtualization/isolation 58 based on PCIe Single Root IO Virtualization (SR-IOV) and a full range
|
/linux/arch/x86/include/asm/ ! |
H A D | vmxfeatures.h | 19 #define VMX_FEATURE_VIRTUAL_NMIS ( 0*32+ 5) /* "vnmi" NMI virtualization */ 50 #define VMX_FEATURE_VIRTUAL_TPR ( 1*32+ 21) /* "vtpr" TPR virtualization, a.k.a. TPR shadow */ 92 #define VMX_FEATURE_IPI_VIRT ( 3*32+ 4) /* "ipi_virt" Enable IPI virtualization */
|
/linux/drivers/gpu/drm/i915/gvt/ ! |
H A D | edid.h | 62 * GMBUS0-3 could be related to the EDID virtualization. Another two GMBUS 65 * cared by the EDID virtualization
|
/linux/drivers/iommu/arm/ ! |
H A D | Kconfig | 126 Support for NVIDIA CMDQ-Virtualization extension for ARM SMMUv3. The 128 support, except with virtualization capabilities.
|