Home
last modified time | relevance | path

Searched refs:guests (Results 1 – 25 of 159) sorted by relevance

1234567

/openbmc/qemu/docs/system/ppc/
H A Dpseries.rst7 is also known as sPAPR, System p guests, or simply Power Linux guests (although
119 hypervisor and non-Linux guests in mind, you should use the virtio counterparts
121 since they will most probably give you better performance with Linux guests in a
175 KVM-PR uses the so-called **PR**\ oblem state of the PPC CPUs to run the guests,
183 Because all privileged instructions are trapped, guests that use a lot of
186 able to emulate a lot of guests CPUs. This module can even be used to run other
187 PowerPC guests like an emulated PowerMac.
196 In order to run KVM-PR guests with POWER9 processors, someone will need to start
208 to start pSeries guests. As the pSeries guest doesn't have access to the
211 pSeries guests as well, making nested virtualization possible with KVM-HV.
[all …]
/openbmc/qemu/docs/system/i386/
H A Dhyperv.rst14 KVM on x86 implements Hyper-V Enlightenments for Windows guests. These features
15 make Windows and Hyper-V guests think they're running on top of a Hyper-V
127 to the specification, guests shouldn't use this information and it is unknown
143 The enlightenment is nested specific, it targets Hyper-V on KVM guests. When
150 (Reference TSC page) to its own guests.
160 The enlightenment is nested specific, it targets Hyper-V on KVM guests. When
190 is required by Windows and Hyper-V guests to properly mitigate SMT related CPU
198 of host setup. To keep guests secure, this can only be used in conjunction with
229 The enlightenment is nested specific, it targets Hyper-V on KVM guests. When
249 The enlightenment is nested specific, it targets Hyper-V on KVM guests. When
[all …]
H A Dxen.rst8 KVM has support for hosting Xen guests, intercepting Xen hypercalls and event
9 channel (Xen PV interrupt) delivery. This allows guests which expect to be
54 to be in the upper 64 bits of the MSI message. For guests with large numbers
64 through simultaneous grants. For guests with large numbers of PV devices and
86 model for emulated Xen guests, meaning that just the default NIC provided
105 VirtIO devices can also be used; Linux guests may need to be dissuaded from
108 Booting Xen PV guests
/openbmc/linux/fs/vboxsf/
H A DKconfig6 VirtualBox hosts can share folders with guests, this driver
10 If you want to use shared folders in VirtualBox guests, answer Y or M.
/openbmc/linux/drivers/vhost/
H A DKconfig53 for use with virtio-scsi guests
63 sockets for communicating with guests. The guests must have the
86 This option allows vhost to support guests with a different byte
/openbmc/qemu/docs/system/
H A Dconfidential-guest-support.rst6 can compromise any of its guests. A number of platforms have added
7 mechanisms in hardware and/or firmware which give guests at least some
15 attacks from other guests, or from network sources).
H A Dsecurity.rst69 could allow malicious guests to gain code execution in QEMU. At this point the
73 Guests often interact with other guests and share resources with them. A
74 malicious guest must not gain control of other guests or access their data.
75 Disk image files and network traffic must be protected from other guests unless
96 necessary for QEMU but are not exposed to guests. A guest that escapes into
/openbmc/qemu/docs/specs/
H A Dpci-serial.rst9 guests work out-of-the box with all cards. There is a Windows inf file
10 (``docs/qemupciserial.inf``) to set up the cards in Windows guests.
H A Dacpi_erst.rst31 hosts/guests with root filesystems on NFS/iSCSI where networking
37 guests. With QEMU supporting ACPI ERST, it becomes a viable pstore
42 capture kernel panic information in a wide range of guests: from
43 resource-constrained microvms to very large guests, and in particular,
/openbmc/linux/arch/x86/kvm/
H A DKconfig14 operating systems inside virtual machines (guests).
95 Enables KVM guests to create SGX enclaves.
98 guests via a device node, e.g. /dev/sgx_vepc.
136 Provides KVM support for the hosting Xen HVM guests and
/openbmc/linux/drivers/xen/
H A DKconfig106 For example, by reading and writing the "xenbus" file, guests
195 device backend driver without para-virtualized support for guests.
198 other guests.
215 PCI devices to other guests. If you select this to be a module, you
217 you want to make visible to other guests.
257 to other guests via a high-performance shared-memory interface.
259 if guests need generic access to SCSI devices.
315 Support for auto-translated physmap guests.
369 Require virtio for Xen guests to use grant mappings.
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-hypervisor-xen26 and all other guests. Only available to
27 privileged guests.
/openbmc/linux/tools/testing/selftests/arm64/fp/
H A DREADME68 should be run in parallel in two KVM guests, while simultaneously
71 1) Start 2 guests, using the following command for each:
83 allows multiple guests to be run in parallel while running other
/openbmc/linux/Documentation/filesystems/
H A Dvirtiofs.rst18 Use cases include making files available to new guests during installation,
20 stateless or ephemeral guests, and sharing a directory between guests.
/openbmc/linux/Documentation/virt/kvm/x86/
H A Dnested-vmx.rst11 to easily and efficiently run guest operating systems. Normally, these guests
12 *cannot* themselves be hypervisors running their own guests, because in VMX,
13 guests cannot use VMX instructions.
16 hypervisors (which use VMX) with their own nested guests. It does so by
31 Single-level virtualization has two levels - the host (KVM) and the guests.
H A Drunning-nested-guests.rst4 Running nested guests with KVM
63 multiple nested guests (level-2 guests), running different OSes, on
66 - Live migration of "guest hypervisors" and their nested guests, for
199 actually running L2 guests, is expected to function normally even on AMD
200 systems but may fail once guests are started.
H A Dindex.rst17 running-nested-guests
/openbmc/linux/fs/fuse/
H A DKconfig36 The Virtio Filesystem allows guests to mount file systems from the
39 If you want to share files between guests or with the host, answer Y
/openbmc/linux/Documentation/admin-guide/hw-vuln/
H A Dl1tf.rst219 guests affine to one or more physical cores. The proper mechanism for
223 If only a single guest or related guests run on sibling SMT threads on
235 **Note**, that assigning guests to a fixed set of physical cores affects
241 For further information about confining guests to a single or to a group
258 which run untrusted guests, reduces the attack vector space.
261 guests, provide interesting data for an attacker depends on the system
282 of other mitigation solutions like confining guests to dedicated cores.
352 with SMT enabled, because the effective page tables for guests are
459 2. Virtualization with trusted guests
472 3. Virtualization with untrusted guests
[all …]
H A Dgather_data_sampling.rst35 Guest can infer guest from other guests
39 lower-privilege contexts like guests and when running outside SGX enclaves.
42 that guests are not allowed to disable the GDS mitigation. If a host erred and
/openbmc/linux/Documentation/powerpc/
H A Ddawr-power9.rst38 guest on a POWER9 host. Current Linux guests ignore this error, so
56 The same will also be true for any guests started on a POWER9
89 inconsistent view of what's available. Similarly for guests.
/openbmc/linux/Documentation/arch/x86/
H A Dtdx.rst25 TDX guests behave differently from bare-metal and traditional VMX guests.
26 In TDX guests, otherwise normal instructions or memory accesses can cause
63 In general, the #GP MSRs should not be used in guests. Their use likely
135 TDX guests ensure that all guest memory has been "accepted" before memory
174 emulates the access. That is not possible in TDX guests because VMEXIT
175 will expose the register state to the host. TDX guests don't trust the host
/openbmc/linux/Documentation/virt/hyperv/
H A Doverview.rst15 Hyper-V runs on x86/x64 and arm64 architectures, and Linux guests
21 Linux guests communicate with Hyper-V in four different ways:
89 On arm64, Hyper-V supports guests with 4/16/64 Kbyte pages as
127 earlier versions may provide guests with ACPI tables that indicate
143 On x86/x64, Hyper-V supports 32-bit and 64-bit guests, and Linux
148 On arm64, Hyper-V supports only 64-bit guests.
/openbmc/qemu/tests/keys/
H A DREADME3 Some guests require the key to exist prior to provisioning the guest; also,
/openbmc/linux/arch/powerpc/kvm/
H A DKconfig12 other operating systems inside virtual machines (guests).
117 guests that use hash MMU mode.
167 Old nested HV capable Linux guests have a bug where they don't
171 L2 guests.

1234567