Home
last modified time | relevance | path

Searched refs:hypervisor (Results 1 – 25 of 245) sorted by relevance

12345678910

/openbmc/linux/Documentation/ABI/stable/
H A Dsysfs-hypervisor-xen1 What: /sys/hypervisor/compilation/compile_date
6 Contains the build time stamp of the Xen hypervisor
8 in the hypervisor.
10 What: /sys/hypervisor/compilation/compiled_by
15 Contains information who built the Xen hypervisor
17 in the hypervisor.
19 What: /sys/hypervisor/compilation/compiler
24 Compiler which was used to build the Xen hypervisor
26 in the hypervisor.
28 What: /sys/hypervisor/properties/capabilities
[all …]
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-hypervisor-xen1 What: /sys/hypervisor/guest_type
12 What: /sys/hypervisor/pmu/pmu_mode
24 privileged (e.g. dom0), the hypervisor
25 "all" The guest can profile itself, the hypervisor
30 What: /sys/hypervisor/pmu/pmu_features
39 What: /sys/hypervisor/properties/buildid
44 Build id of the hypervisor, needed for hypervisor live patching.
46 in the hypervisor.
/openbmc/linux/Documentation/virt/kvm/arm/
H A Dhyp-abi.rst8 hypervisor layer when running Linux as a hypervisor (for example
10 hypervisor when running as a guest (under Xen, KVM or any other
11 hypervisor), or any hypervisor-specific interaction when the kernel is
16 booted at HYP. It can also be used by a hypervisor other than KVM
19 On arm and arm64 (without VHE), the kernel doesn't run in hypervisor
21 hypervisor to be either installed or torn down.
28 Unless specified otherwise, any built-in hypervisor must implement
36 Set HVBAR/VBAR_EL2 to 'vectors' to enable a hypervisor. 'vectors'
47 hypervisor.
71 Any other value of r0/x0 triggers a hypervisor-specific handling,
H A Dpvtime.rst12 some hypervisor service calls to support a paravirtualized guest obtaining a
32 PV-time feature is supported by the hypervisor.
47 meaningfully filled by the hypervisor (see structure below).
72 The structure will be updated by the hypervisor prior to scheduling a VCPU. It
/openbmc/linux/Documentation/misc-devices/
H A Dibmvmc.rst24 interface between the hypervisor and a management partition. This interface
47 application using a combination of HMC to hypervisor interfaces and
50 The set of HMC to hypervisor messages supported by the management
51 application component are passed to the hypervisor over a VMC interface,
68 for communicating between the management application and the hypervisor. It
75 defined that must take place to establish that both the hypervisor and
80 when the hypervisor detects one of the peer partitions has abnormally
86 the hypervisor. As most HMC messages far exceed the size of a CRQ buffer,
102 from the hypervisor to partition are also reported in this queue.
119 resources available in both the management partition and the hypervisor.
[all …]
/openbmc/linux/arch/arm/boot/dts/xen/
H A Dxenvm-4.2.dts20 /* this field is going to be adjusted by the hypervisor */
50 /* this field is going to be adjusted by the hypervisor */
71 hypervisor {
73 /* this field is going to be adjusted by the hypervisor */
75 /* this field is going to be adjusted by the hypervisor */
/openbmc/linux/Documentation/arch/x86/
H A Dtdx.rst14 normal functionality of a hypervisor must be moved into the guest. This is
17 require the hypervisor to be consulted.
20 guest to the hypervisor or the TDX module.
67 The #VE MSRs are typically able to be handled by the hypervisor. Guests
68 can make a hypercall to the hypervisor to handle the #VE.
80 hypervisor. For such cases, the Intel TDX module architecture defines two
83 - Bit fields for which the hypervisor controls the value seen by the guest
86 - Bit fields for which the hypervisor configures the value such that the
88 fields, the hypervisor can mask off the native values, but it can not
92 not know how to handle. The guest kernel may ask the hypervisor for the
[all …]
/openbmc/linux/Documentation/virt/acrn/
H A Dintroduction.rst6 The ACRN Hypervisor is a Type 1 hypervisor, running directly on bare-metal
13 hypervisor services to the ACRN userspace.
38 ioctls to communicate with the HSM. HSM implements hypervisor services by
42 The ACRN hypervisor is open for contribution from anyone. The source repo is
43 available at https://github.com/projectacrn/acrn-hypervisor.
H A Dio-request.rst6 An I/O request of a User VM, which is constructed by the hypervisor, is
15 communication between the hypervisor and Service VM. An I/O request is a
17 an I/O handler of the hypervisor when a trapped I/O access happens in a User
19 the GPA (Guest Physical Address) of the buffer to the hypervisor. The buffer is
81 An I/O request in COMPLETE or FREE state is owned by the hypervisor. HSM and
87 a. The I/O handler of the hypervisor will fill an I/O request with PENDING
89 b. The hypervisor makes an upcall, which is a notification interrupt, to
96 f. The HSM updates I/O requests states to COMPLETE and notifies the hypervisor
/openbmc/linux/Documentation/powerpc/
H A Dpapr_hcalls.rst12 operating system and how it should interact with the hypervisor for
15 - **IBM PowerVM (PHYP)**: IBM's proprietary hypervisor that supports AIX,
22 On PPC64 arch a guest kernel running on top of a PAPR hypervisor is called
24 issue hypercalls to the hypervisor whenever it needs to perform an action
25 that is hypervisor privileged [3]_ or for other services managed by the
26 hypervisor.
29 asking hypervisor to perform a privileged operation on behalf of the guest. The
30 guest issues a with necessary input operands. The hypervisor after performing
36 The ABI specification for a hcall between a pseries guest and PAPR hypervisor
43 Once control returns back to the guest after hypervisor has serviced the
[all …]
/openbmc/openbmc-test-automation/lib/external_intf/
H A Dvmi_utils.robot51 ${resp}= Redfish.Patch /redfish/v1/Systems/hypervisor/EthernetInterfaces/${interface}
94 ... /redfish/v1/Systems/hypervisor/EthernetInterfaces/${interface}
117 ... /redfish/v1/Systems/hypervisor/EthernetInterfaces/${interface}
123 ... /redfish/v1/Systems/hypervisor/EthernetInterfaces/${interface}
138 ... /redfish/v1/Systems/hypervisor/EthernetInterfaces/${interface}
171 ${resp}= Redfish.Get /redfish/v1/Systems/hypervisor/EthernetInterfaces
193 ${resp}= Redfish.Get /redfish/v1/Systems/hypervisor/EthernetInterfaces
202 ... /redfish/v1/Systems/hypervisor/EthernetInterfaces/eth${i}
238 ... /redfish/v1/Systems/hypervisor/EthernetInterfaces/${interface}
244 ... /redfish/v1/Systems/hypervisor/EthernetInterfaces/${interface}
[all …]
/openbmc/docs/designs/
H A Dpower-systems-memory-preserving-reboot.md9 On POWER based servers, a hypervisor firmware manages and allocates resources to
10 the logical partitions running on the server. If this hypervisor encounters an
19 from the hypervisor memory.
41 - **Hypervisor**: A hypervisor (or virtual machine monitor, VMM) is a computer
46 faults in hypervisor.
51 - **Terminate Immediate (TI)**: A condition when the hypervisor encountered a
81 memory preserved reboot. Once the system finished booting, the hypervisor
96 - The hypervisor should send a special attention to BMC to notify about a severe
99 - BMC should receive special TI attention from hypervisor
110 - Once the dump is generated, the hypervisor should notify BMC.
[all …]
/openbmc/linux/Documentation/devicetree/bindings/arm/
H A Dxen.txt1 * Xen hypervisor device tree bindings
3 Xen ARM virtual platforms shall have a top-level "hypervisor" node with
23 under /hypervisor with following parameters:
45 hypervisor {
60 they differ because they are provided by the Xen hypervisor, together with a set
/openbmc/qemu/docs/specs/
H A Dppc-spapr-hcalls.rst2 sPAPR hypervisor calls
6 a set of hypervisor calls (a.k.a. hcalls) defined in the Linux on Power
9 which is what PowerVM, the IBM proprietary hypervisor, adheres to.
13 In addition to those calls, we have added our own private hypervisor
31 calls our private H_RTAS hypervisor call to pass the RTAS calls to QEMU.
53 PAPR and LoPAR provides a set of hypervisor calls to perform cacheable or
/openbmc/linux/drivers/virt/
H A DKconfig21 Say Y here to use the hypervisor-provided Virtual Machine Generation ID
28 tristate "Freescale hypervisor management driver"
32 The Freescale hypervisor management driver provides several services
33 to drivers and applications related to the Freescale hypervisor:
/openbmc/linux/arch/arm64/kvm/
H A DKconfig56 Failure reports will BUG() in the hypervisor. This is intended for
57 local EL2 hypervisor development.
62 bool "Protected KVM hypervisor stacktraces"
66 Say Y here to enable pKVM hypervisor stacktraces on hyp_panic()
/openbmc/openbmc/meta-ibm/recipes-phosphor/certificate/
H A Dphosphor-certificate-manager_%.bbappend1 PACKAGECONFIG:append:p10bmc = " ibm-hypervisor-cert"
2 PACKAGECONFIG:append:witherspoon-tacoma = " ibm-hypervisor-cert"
/openbmc/linux/Documentation/virt/kvm/x86/
H A Drunning-nested-guests.rst8 can be KVM-based or a different hypervisor). The straightforward
34 hypervisor", as it itself is capable of running KVM.
43 hypervisor running on bare metal, adding another layer and
45 metal, running the LPAR hypervisor), L1 (host hypervisor), L2
46 (guest hypervisor), L3 (nested guest).
62 hypervisor" (level-1 guest). This in turn allows you to create
158 then the guest hypervisor will subsequently be capable of running a
165 1. On the host hypervisor (L0), enable the ``nested`` parameter on
175 2. The guest hypervisor (L1) must be provided with the ``sie`` CPU
179 3. Now the KVM module can be loaded in the L1 (guest hypervisor)::
[all …]
H A Dmsr.rst34 whose data will be filled in by the hypervisor. The hypervisor is only
78 whose data will be filled in by the hypervisor periodically. Only one
81 The hypervisor may update this structure at any time it sees fit until
127 coordinated between the guest and the hypervisor. Availability
224 to by the hypervisor at the time of injection. Only first bit of 'flags'
236 hypervisor at the time of APF 'page ready' event injection. The content
277 whose data will be filled in by the hypervisor periodically. Only one
280 The hypervisor may update this structure at any time it sees fit until
305 the hypervisor doesn't support this field.
318 written to by the hypervisor, typically at the time of interrupt
[all …]
H A Damd-memory-encryption.rst13 virtual machines (VMs) under the control of a hypervisor. When enabled,
17 The hypervisor can determine the SEV support through the CPUID
54 key management interface to perform common hypervisor activities such as
87 The KVM_SEV_INIT command is used by the hypervisor to initialize the SEV platform
216 The KVM_SEV_DEBUG_DECRYPT command can be used by the hypervisor to request the
236 The KVM_SEV_DEBUG_ENCRYPT command can be used by the hypervisor to request the
256 The KVM_SEV_LAUNCH_SECRET command can be used by the hypervisor to inject secret
272 __u64 trans_uaddr; /* the hypervisor memory region which contains the secret */
279 The KVM_SEV_GET_ATTESTATION_REPORT command can be used by the hypervisor to query the attestation
303 The KVM_SEV_SEND_START command can be used by the hypervisor to create an
[all …]
/openbmc/linux/Documentation/devicetree/bindings/powerpc/fsl/
H A Dmsi-pic.txt37 This property may be used in virtualized environments where the hypervisor
81 The Freescale hypervisor and msi-address-64
87 In a virtualized environment, the hypervisor may need to create an IOMMU
88 mapping for MSIIR. The Freescale ePAPR hypervisor has this requirement
90 (PAMU), which is currently the only IOMMU that the hypervisor supports.
106 Therefore, the hypervisor has to create a subwindow inside the same
110 address of MSIIR. The hypervisor configures the PAMU to map that address to
/openbmc/phosphor-state-manager/service_files/
H A Dxyz.openbmc_project.State.Hypervisor.service3 Before=mapper-wait@-xyz-openbmc_project-state-hypervisor.service
6 ExecStart=/usr/bin/phosphor-hypervisor-state-manager
/openbmc/openpower-hw-diags/attn/pel/
H A Dpel_common.hpp26 hypervisor = 'H', enumerator
32 hypervisor = 0x82, enumerator
/openbmc/linux/Documentation/admin-guide/hw-vuln/
H A Dl1tf.rst104 only possible, when the hypervisor does not sanitize the content of the
174 the hypervisor flushes the L1D before entering the guest.
195 address space layout of the hypervisor.
228 host OS (hypervisor) context and the other in guest context. The amount
353 managed and sanitized by the hypervisor. Though disabling EPT has a
357 EPT can be disabled in the hypervisor via the 'kvm-intel.ept' parameter.
385 flush Leaves SMT enabled and enables the default hypervisor
394 flush,nosmt Disables SMT and enables the default hypervisor mitigation,
406 off Disables hypervisor mitigations and doesn't emit any
409 on both hypervisor and bare metal.
[all …]
/openbmc/linux/arch/sparc/mm/
H A Dtsb.c129 if (tlb_type == cheetah_plus || tlb_type == hypervisor) in flush_tsb_user()
143 if (tlb_type == cheetah_plus || tlb_type == hypervisor) in flush_tsb_user()
162 if (tlb_type == cheetah_plus || tlb_type == hypervisor) in flush_tsb_user_page()
177 if (tlb_type == cheetah_plus || tlb_type == hypervisor) in flush_tsb_user_page()
273 if (tlb_type == cheetah_plus || tlb_type == hypervisor) { in setup_tsb_params()
291 if (tlb_type == hypervisor) { in setup_tsb_params()
505 if (tlb_type == cheetah_plus || tlb_type == hypervisor) { in tsb_grow()

12345678910