/linux/arch/x86/kernel/cpu/ |
H A D | hypervisor.c | 29 static const __initconst struct hypervisor_x86 * const hypervisors[] = variable 67 for (p = hypervisors; p < hypervisors + ARRAY_SIZE(hypervisors); p++) { in detect_hypervisor_vendor()
|
/linux/Documentation/virt/ |
H A D | paravirt_ops.rst | 9 different hypervisors; this restriction was removed with pv_ops. 11 hypervisors. It allows each hypervisor to override critical operations and 13 including native machine -- without any hypervisors.
|
/linux/Documentation/virt/kvm/x86/ |
H A D | nested-vmx.rst | 12 *cannot* themselves be hypervisors running their own guests, because in VMX, 16 hypervisors (which use VMX) with their own nested guests. It does so by 63 which are used in practice by popular hypervisors (KVM and others).
|
/linux/tools/testing/selftests/net/ |
H A D | test_vxlan_under_vrf.sh | 6 # It simulates two hypervisors running a VM each using four network namespaces: 8 # A small VXLAN tunnel is made between the two hypervisors to have the two vms 68 # Setup "Hypervisors" simulated with netns
|
/linux/arch/powerpc/include/asm/ |
H A D | lppaca.h | 12 * These definitions relate to hypervisors that only exist when using 36 * Pre-v4.14 KVM hypervisors reject the VPA if its size field is smaller than
|
/linux/drivers/input/mouse/ |
H A D | vmmouse.h | 3 * Driver for Virtual PS/2 Mouse on VMware and QEMU hypervisors.
|
H A D | vmmouse.c | 3 * Driver for Virtual PS/2 Mouse on VMware and QEMU hypervisors. 282 * Array of supported hypervisors.
|
/linux/arch/loongarch/include/asm/ |
H A D | qspinlock.h | 21 * On hypervisors without PARAVIRT_SPINLOCKS support we fall in virt_spin_lock()
|
/linux/Documentation/devicetree/bindings/rng/ |
H A D | microsoft,vmgenid.yaml | 13 Firmwares or hypervisors can use this devicetree to describe an
|
/linux/Documentation/admin-guide/hw-vuln/ |
H A D | l1tf.rst | 373 the hypervisors, i.e. unconditional L1D flushing 376 is still possible after boot. Hypervisors will issue a 389 is still possible after boot. Hypervisors will issue a 398 is still possible after boot. Hypervisors will issue a 403 flush,nowarn Same as 'flush', but hypervisors will not warn when a VM is
|
/linux/include/xen/interface/ |
H A D | elfnote.h | 180 * kernel to specify support for features that older hypervisors don't 181 * know about. The set of features 4.2 and newer hypervisors will
|
/linux/arch/x86/mm/ |
H A D | pgtable_32.c | 89 * a hypervisor can load into later. Needed for dynamically loaded hypervisors,
|
/linux/drivers/char/hw_random/ |
H A D | arm_smccc_trng.c | 10 * implemenations and allow easier use in hypervisors.
|
/linux/arch/x86/include/asm/ |
H A D | qspinlock.h | 96 * On hypervisors without PARAVIRT_SPINLOCKS support we fall in virt_spin_lock()
|
/linux/Documentation/virt/kvm/arm/ |
H A D | hyp-abi.rst | 39 Linux hypervisors.
|
/linux/drivers/tty/hvc/ |
H A D | Kconfig | 7 hypervisors (pSeries, iSeries, Xen).
|
/linux/drivers/gpu/drm/i915/ |
H A D | i915_memcpy.c | 166 * Some hypervisors (e.g. KVM) don't support VEX-prefix instructions in i915_memcpy_init_early()
|
H A D | i915_scatterlist.h | 155 * reasons, like confidential computing hypervisors or PCIe root ports in i915_sg_segment_size()
|
/linux/Documentation/devicetree/bindings/arm/ |
H A D | psci.yaml | 173 * enabling firmware and hypervisors to support existing and new kernels.
|
/linux/arch/x86/kvm/vmx/ |
H A D | nested.h | 241 * For most existing hypervisors, this will always return true.
|
/linux/Documentation/virt/kvm/devices/ |
H A D | arm-vgic-its.rst | 149 interrupts for nested hypervisors.
|
/linux/Documentation/accel/qaic/ |
H A D | qaic.rst | 45 (circa 2023). Between hypervisors masking the PCIe MSI capability structure to
|
/linux/arch/s390/kernel/ |
H A D | early.c | 112 /* Detect known hypervisors */ in detect_machine_type()
|
/linux/drivers/gpu/drm/ |
H A D | drm_cache.c | 335 * Some hypervisors (e.g. KVM) don't support VEX-prefix instructions in drm_memcpy_init_early()
|
/linux/Documentation/misc-devices/ |
H A D | ibmvmc.rst | 89 operations; hypervisors never directly cause the movement of message data.
|