/openbmc/openbmc/meta-phosphor/classes/ |
H A D | obmc-phosphor-image.bbclass | 21 # - obmc-ikvm - OpenBMC KVM over IP
|
/openbmc/docs/designs/ |
H A D | sol-sysrq.md | 12 low-level commands. BMC usually provides SysRq support in KVM and SOL functions,
|
/openbmc/docs/ |
H A D | features.md | 12 - [Remote KVM][]
|
/openbmc/openbmc/poky/meta/recipes-core/ovmf/ |
H A D | ovmf_git.bb | 1 SUMMARY = "OVMF - UEFI firmware for Qemu and KVM" 3 Virtual Machines. OVMF contains sample UEFI firmware for QEMU and KVM"
|
/openbmc/linux/Documentation/powerpc/ |
H A D | transactional_memory.rst | 214 KVM: PPC: Book3S HV: Work around transactional memory bugs in POWER9 231 On POWER9N DD2.2 and above, KVM and POWERVM emulate TM for guests (as
|
/openbmc/docs/security/ |
H A D | network-security-considerations.md | 159 - Host KVM. 219 media, and host KVM.
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | l1tf.rst | 135 If KVM/VMX is enabled and the processor is vulnerable then the following 418 Mitigation control for KVM - module parameter 421 The KVM hypervisor mitigation mechanism, flushing the L1D cache when 559 guest will always be processed by the bare metal hypervisor. If KVM is the
|
/openbmc/qemu/docs/config/ |
H A D | q35-virtio-graphical.cfg | 49 # We use the q35 machine type and enable KVM acceleration
|
H A D | mach-virt-serial.cfg | 51 # We use the virt machine type and enable KVM acceleration
|
H A D | mach-virt-graphical.cfg | 45 # We use the virt machine type and enable KVM acceleration
|
H A D | q35-emulated.cfg | 51 # We use the q35 machine type and enable KVM acceleration
|
/openbmc/linux/tools/perf/Documentation/ |
H A D | perf-kvm.txt | 54 of KVM events. Currently, vmexit, mmio (x86 only) and ioport (x86 only)
|
H A D | perf-list.txt | 62 G - guest counting (in KVM guests) 63 H - host counting (not in KVM guests)
|
/openbmc/openbmc/poky/meta/recipes-extended/ltp/ |
H A D | ltp_20240129.bb | 38 # Version 20220527 added KVM test infrastructure which currently fails to build with gold due to
|
/openbmc/qemu/docs/system/i386/ |
H A D | amd-memory-encryption.rst | 7 virtual machines (VMs) under the control of KVM. Encrypted VMs have their pages 260 KVM Forum slides:
|
/openbmc/linux/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/ |
H A D | kconfig.rst | 90 …dia.com/s/article/HowTo-Configure-SR-IOV-for-ConnectX-4-ConnectX-5-ConnectX-6-with-KVM-Ethernet>`_.
|
/openbmc/linux/drivers/s390/char/ |
H A D | Kconfig | 99 depends on S390 && (KVM || PROTECTED_VIRTUALIZATION_GUEST)
|
/openbmc/linux/Documentation/virt/ |
H A D | ne_overview.rst | 40 hypervisor is based on core KVM technology.
|
/openbmc/qemu/hw/vfio/ |
H A D | trace-events | 6 vfio_intx_enable_kvm(const char *name) " (%s) KVM INTx accel enabled" 7 vfio_intx_disable_kvm(const char *name) " (%s) KVM INTx accel disabled"
|
/openbmc/qemu/docs/devel/ |
H A D | kconfig.rst | 206 or KVM. 316 example some devices depend on the availability of KVM or on the presence
|
/openbmc/qemu/ |
H A D | README.rst | 11 and KVM hypervisors to provide emulated hardware while allowing the
|
H A D | hmp-commands-info.hx | 303 .help = "show KVM information", 309 Show KVM information.
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | sgx.rst | 260 because KVM doesn't track how a guest uses EPC pages. 263 pages allocated to KVM guests through the virtual EPC driver. If the
|
/openbmc/linux/Documentation/virt/kvm/x86/ |
H A D | timekeeping.rst | 28 specific recommendations for certain classes of KVM guests. 32 information relevant to KVM and hardware-based virtualization. 38 KVM clock are special enough to warrant a full exposition and are described in 594 always be caught up to the original rate. KVM clock avoids these problems by
|
/openbmc/linux/Documentation/translations/zh_TW/process/ |
H A D | submitting-patches.rst | 158 …Fixes: 54a4f0239f2e ("KVM: MMU: make kvm_mmu_zap_page() return the number of pages it actually fre…
|