/openbmc/linux/Documentation/filesystems/ |
H A D | 9p.rst | 27 * KVMFS: control file system for KVM
|
/openbmc/qemu/docs/system/s390x/ |
H A D | cpu-topology.rst | 28 To use the CPU topology, you need to run with KVM on a s390x host that
|
/openbmc/linux/Documentation/userspace-api/media/v4l/ |
H A D | pixfmt-reserved.rst | 266 which is generally adapted for remote KVM.
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | iommufd.rst | 220 - Re-use of the KVM page table in the IOMMU
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | spectre.rst | 442 * - BHI: SW loop, KVM SW loop 446 * - BHI: Vulnerable, KVM: SW loop 447 - System is vulnerable; KVM is protected by software clearing sequence
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | tainted-kernels.rst | 31 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
|
H A D | kernel-parameters.rst | 129 KVM Kernel Virtual Machine support is enabled.
|
/openbmc/bmcweb/ |
H A D | meson.options | 5 description: '''Enable the KVM host video WebSocket. Path is /kvm/0.
|
/openbmc/linux/arch/arm64/ |
H A D | Kconfig | 431 The workaround forces KVM to explicitly set VTCR_EL2.HA to 0, 549 depends on KVM 770 KVM guests must also have the workaround implemented or they can 774 register reads and warning KVM users. The DMB barrier is sufficient 1127 1.2, and T83 Pass 1.0, KVM guest execution may disable 1143 trapping KVM guest TTBRx_EL1 writes to EL2 when SMT is enabled. The 1889 hardware it will not be advertised to userspace/KVM guest nor will it
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | pti.rst | 157 4. Launch a KVM virtual machine.
|
/openbmc/linux/Documentation/virt/hyperv/ |
H A D | overview.rst | 9 equivalent to KVM and QEMU, for example). Guest VMs run in child
|
/openbmc/linux/Documentation/powerpc/ |
H A D | papr_hcalls.rst | 19 - **Qemu/KVM**: Supports PPC64 linux guests running on a PPC64 linux host.
|
/openbmc/linux/Documentation/virt/kvm/x86/ |
H A D | amd-memory-encryption.rst | 81 KVM implements the following commands to support common lifecycle events of SEV
|
/openbmc/linux/Documentation/admin-guide/mm/ |
H A D | ksm.rst | 12 KSM was originally developed for use with KVM (where it was known as
|
/openbmc/linux/Documentation/process/ |
H A D | maintainer-tip.rst | 19 for the x86 KVM and XEN specific parts which are maintained in the 22 x86-specific KVM and XEN patches.
|
/openbmc/qemu/target/hexagon/ |
H A D | README | 12 We presented an overview of the project at the 2019 KVM Forum.
|
/openbmc/qemu/ |
H A D | MAINTAINERS | 444 Guest CPU Cores (KVM) 446 Overall KVM CPUs 457 ARM KVM CPUs 463 MIPS KVM CPUs 469 PPC KVM CPUs 476 S390 KVM CPUs 487 X86 KVM CPUs 498 Xen emulation on X86 KVM CPUs
|
H A D | meson_options.txt | 71 description: 'KVM acceleration support')
|
/openbmc/qemu/qapi/ |
H A D | migration.json | 531 # and can result in more stable read performance. Requires KVM 2195 # requires that KVM accelerator property "dirty-ring-size" is *not* 2201 # requires that KVM accelerator property "dirty-ring-size" is set. 2294 # Requires KVM with accelerator property "dirty-ring-size" set. A
|
H A D | machine-target.json | 134 # model of a certain configuration (e.g. the "host" model for KVM).
|
/openbmc/qemu/docs/devel/ |
H A D | multi-thread-tcg.rst | 229 Currently thanks to KVM work any access to IO memory is automatically
|
H A D | memory.rst | 85 handled by the host kernel when KVM is enabled. You initialize these
|
/openbmc/qemu/docs/interop/ |
H A D | qmp-spec.rst | 296 KVM information
|
/openbmc/linux/drivers/block/ |
H A D | Kconfig | 355 QEMU based VMMs (like KVM or Xen). Say Y or M.
|
/openbmc/linux/Documentation/arch/s390/ |
H A D | vfio-ccw.rst | 46 Typically, a guest virtualized via QEMU/KVM on s390 only sees
|