Home
last modified time | relevance | path

Searched refs:KVM (Results 76 – 100 of 231) sorted by relevance

12345678910

/openbmc/qemu/docs/system/s390x/
H A Dprotvirt.rst19 Running PVMs requires using the KVM hypervisor.
22 will indicate that KVM can support PVMs on that LPAR.
H A Dvfio-ap.rst15 describes how those cards may be made available to KVM guests using the
75 A KVM guest is started by executing the Start Interpretive Execution (SIE)
77 state information for a KVM guest and is supplied as input to the SIE
80 the adapters, usage domains and control domains assigned to the KVM guest:
85 use by the KVM guest.
88 assigned to the KVM guest. Each bit in the mask, from left to right,
90 corresponding queue is valid for use by the KVM guest.
360 KVM guest::
652 Let's now provide an example to illustrate how KVM guests may be given
695 * KVM
[all …]
/openbmc/linux/Documentation/virt/kvm/arm/
H A Dptp_kvm.rst8 host to the guest using a KVM-specific hypercall.
/openbmc/qemu/docs/system/
H A Dtarget-i386.rst36 On x86_64 hosts, the default set of CPU features enabled by the KVM
H A Dtarget-s390x.rst11 When using KVM as accelerator, QEMU can emulate CPUs up to the generation
/openbmc/bmcweb/
H A DREADME.md16 - KVM: A websocket based implementation of the RFB (VNC) frame buffer protocol
17 intended to mate to webui-vue to provide a complete KVM implementation.
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dqemu.rst228 QEMU CPU Compatibility Under KVM
239 be a problem when QEMU is running with KVM enabled. Specifically,
241 under KVM that does not support that feature. To work around this
327 kvm - enable KVM when running x86/x86_64 (VT-capable CPU required)
328 kvm-vhost - enable KVM with vhost when running x86/x86_64 (VT-capable CPU required)
447 - ``kvm``: Enables KVM when running "qemux86" or "qemux86-64" QEMU
448 architectures. For KVM to work, all the following conditions must be
453 - Your build host has to have the KVM modules installed, which are
459 - ``kvm-vhost``: Enables KVM with VHOST support when running "qemux86"
460 or "qemux86-64" QEMU architectures. For KVM with VHOST to work, the
/openbmc/docs/architecture/
H A Dinterface-overview.md124 - Active KVM-IP sessions.
186 | | { KVM-IP, USB-IP, |
206 - KVM-IP (Keyboard, Video, Mouse over IP)
433 The webserver also sets up Secure Websockets for services such as KVM-IP,
447 ### KVM-IP
451 (KVM) remotely. See https://github.com/openbmc/obmc-ikvm/blob/master/README.md
452 Also known as IPKvm. Do not confuse with Kernel Virtual Machine (the other KVM).
/openbmc/linux/drivers/gpu/drm/i915/
H A DKconfig125 tristate "Enable KVM host support Intel GVT-g graphics virtualization"
129 depends on KVM
139 device shared by multiple VMs under KVM.
/openbmc/linux/tools/testing/selftests/arm64/fp/
H A DREADME64 KVM stress testing
68 should be run in parallel in two KVM guests, while simultaneously
/openbmc/linux/Documentation/virt/kvm/
H A Dlocking.rst4 KVM Lock Overview
74 its KVM memslot.
211 when the KVM MMU notifier is called to track accesses to a page (via
233 :Comment: KVM also disables CPU hotplug via cpus_read_lock() during
299 taken outside of kvm_lock, e.g. in KVM's CPU online/offline callbacks, and
H A Dhalt-polling.rst4 The KVM halt polling system
7 The KVM halt polling system provides a feature within KVM whereby the latency
/openbmc/linux/Documentation/dev-tools/
H A Dgdb-kernel-debugging.rst11 them. It focuses on QEMU/KVM virtual machines as target, but the examples can
25 - Create a virtual Linux machine for QEMU/KVM (see www.linux-kvm.org and
46 - Enable the gdb stub of QEMU/KVM, either
/openbmc/linux/Documentation/virt/kvm/devices/
H A Dvm.rst69 __u64 fac_mask[256]; # set of cpu facilities enabled by KVM
92 KVM does not enforce or limit the cpu model data in any form. Take the information
95 are not handled by KVM need to by implemented in the VM driver code.
366 The default configuration of KVM is such that all implemented SMCCC
391 The ``pad`` field is reserved for future use and must be zero. KVM may
394 KVM reserves the 'Arm Architecture Calls' range of function IDs and
/openbmc/qemu/docs/about/
H A Dindex.rst11 hypervisor such as KVM, Xen or Hypervisor.Framework to allow the
/openbmc/qemu/docs/system/i386/
H A Dsgx.rst20 reporting the same CPUID guest is able to use full capacity of SGX, and KVM
23 The guest's EPC base and size are determined by QEMU, and KVM needs QEMU to
56 aligned. KVM SGX's virtual EPC is purely a software construct and only
65 QEMU/KVM doesn't prevent live migrating SGX VMs, although from hardware's
H A Dmicrovm.rst25 - kvmclock (if using KVM)
87 ``KVM``, you can disable the ``RTC``, making the Guest rely on
/openbmc/linux/Documentation/virt/kvm/x86/
H A Dmsr.rst4 KVM-specific MSRs
9 KVM makes use of some custom MSRs to service some requests.
154 This MSR falls outside the reserved KVM range and may be removed in the
166 This MSR falls outside the reserved KVM range and may be removed in the
241 writing to the MSR forces KVM to re-scan its queue and deliver the next
351 KVM guests can request the host not to poll on HLT, for example if
/openbmc/linux/Documentation/translations/zh_CN/arch/arm64/
H A Dmemory.txt109 当使用 KVM 时, 管理程序(hypervisor)在 EL2 中通过相对内核虚拟地址的
/openbmc/linux/Documentation/arch/arm64/
H A Dperf.rst57 These attributes exclude the KVM host and guest, respectively.
59 The KVM host may run at EL0 (userspace), EL1 (non-VHE kernel) and EL2 (VHE
62 The KVM guest may run at EL0 (userspace) and EL1 (kernel).
/openbmc/linux/Documentation/translations/zh_CN/virt/
H A Dne_overview.rst43 行主虚拟机的主机上运行的Nitro管理程序。Nitro管理程序是基于KVM核心技术的。
/openbmc/qemu/tests/migration/i386/
H A Da-b-bootblock.S33 # set up DS for the whole of RAM (needed on KVM)
/openbmc/linux/Documentation/translations/zh_TW/arch/arm64/
H A Dmemory.txt113 當使用 KVM 時, 管理程序(hypervisor)在 EL2 中通過相對內核虛擬地址的
/openbmc/linux/drivers/gpu/drm/ci/
H A Dx86_64.config87 #options for KVM guests
/openbmc/linux/Documentation/networking/device_drivers/ethernet/intel/
H A Dfm10k.rst123 Enabling SR-IOV in a 64-bit Microsoft Windows Server 2012/R2 guest OS under Linux KVM
125 KVM Hypervisor/VMM supports direct assignment of a PCIe device to a VM. This

12345678910