Home
last modified time | relevance | path

Searched refs:guests (Results 1 – 25 of 76) sorted by relevance

1234

/linux/Documentation/virt/kvm/arm/
H A Dhypercalls.rst4 KVM/arm64-specific hypercalls exposed to guests
54 | Presence: | Optional; pKVM protected guests only. |
78 | Presence: | Optional; pKVM protected guests only. |
103 | Presence: | Optional; pKVM protected guests only. |
129 | Presence: | Optional; pKVM protected guests only. |
H A Dpvtime.rst7 support for AArch64 guests:
21 paravirtualized time is not available to 32 bit Arm guests. The existence of
H A Dptp_kvm.rst6 PTP_KVM is used for high precision time sync between host and guests.
/linux/drivers/vhost/
H A DKconfig53 for use with virtio-scsi guests
63 sockets for communicating with guests. The guests must have the
86 This option allows vhost to support guests with a different byte
/linux/fs/vboxsf/
H A DKconfig6 VirtualBox hosts can share folders with guests, this driver
10 If you want to use shared folders in VirtualBox guests, answer Y or M.
/linux/drivers/xen/
H A DKconfig106 For example, by reading and writing the "xenbus" file, guests
195 device backend driver without para-virtualized support for guests.
198 other guests.
215 PCI devices to other guests. If you select this to be a module, you
217 you want to make visible to other guests.
257 to other guests via a high-performance shared-memory interface.
259 if guests need generic access to SCSI devices.
315 Support for auto-translated physmap guests.
369 Require virtio for Xen guests to use grant mappings.
/linux/Documentation/ABI/testing/
H A Dsysfs-hypervisor-xen26 and all other guests. Only available to
27 privileged guests.
/linux/tools/testing/selftests/arm64/fp/
H A DREADME68 should be run in parallel in two KVM guests, while simultaneously
71 1) Start 2 guests, using the following command for each:
83 allows multiple guests to be run in parallel while running other
/linux/Documentation/filesystems/
H A Dvirtiofs.rst18 Use cases include making files available to new guests during installation,
20 stateless or ephemeral guests, and sharing a directory between guests.
/linux/Documentation/virt/kvm/x86/
H A Dnested-vmx.rst11 to easily and efficiently run guest operating systems. Normally, these guests
12 *cannot* themselves be hypervisors running their own guests, because in VMX,
13 guests cannot use VMX instructions.
16 hypervisors (which use VMX) with their own nested guests. It does so by
31 Single-level virtualization has two levels - the host (KVM) and the guests.
H A Drunning-nested-guests.rst4 Running nested guests with KVM
63 multiple nested guests (level-2 guests), running different OSes, on
66 - Live migration of "guest hypervisors" and their nested guests, for
199 actually running L2 guests, is expected to function normally even on AMD
200 systems but may fail once guests are started.
H A Dindex.rst17 running-nested-guests
/linux/Documentation/admin-guide/hw-vuln/
H A Dl1tf.rst219 guests affine to one or more physical cores. The proper mechanism for
223 If only a single guest or related guests run on sibling SMT threads on
235 **Note**, that assigning guests to a fixed set of physical cores affects
241 For further information about confining guests to a single or to a group
258 which run untrusted guests, reduces the attack vector space.
261 guests, provide interesting data for an attacker depends on the system
282 of other mitigation solutions like confining guests to dedicated cores.
352 with SMT enabled, because the effective page tables for guests are
459 2. Virtualization with trusted guests
472 3. Virtualization with untrusted guests
[all …]
H A Dgather_data_sampling.rst35 Guest can infer guest from other guests
39 lower-privilege contexts like guests and when running outside SGX enclaves.
42 that guests are not allowed to disable the GDS mitigation. If a host erred and
H A Dtsx_async_abort.rst73 applications running on hosts or guests.
243 1. Trusted userspace and guests
248 disabled. The same applies to virtualized environments with trusted guests.
251 2. Untrusted userspace and guests
254 If there are untrusted applications or guests on the system, enabling TSX
H A Dmultihit.rst63 guests in a virtualized system.
156 2. Virtualization with trusted guests
163 3. Virtualization with untrusted guests
/linux/Documentation/arch/powerpc/
H A Ddawr-power9.rst38 guest on a POWER9 host. Current Linux guests ignore this error, so
56 The same will also be true for any guests started on a POWER9
89 inconsistent view of what's available. Similarly for guests.
/linux/fs/fuse/
H A DKconfig36 The Virtio Filesystem allows guests to mount file systems from the
39 If you want to share files between guests or with the host, answer Y
/linux/arch/powerpc/kvm/
H A DKconfig12 other operating systems inside virtual machines (guests).
114 guests that use hash MMU mode.
164 Old nested HV capable Linux guests have a bug where they don't
168 L2 guests.
/linux/drivers/virt/coco/pkvm-guest/
H A DKconfig5 Protected guests running under the pKVM hypervisor on arm64
/linux/Documentation/devicetree/bindings/misc/
H A Dpvpanic-mmio.txt9 QEMU exposes the data register to guests as memory mapped registers.
/linux/drivers/virt/coco/efi_secret/
H A DKconfig11 guests). The driver exposes the secrets as files in
/linux/net/iucv/
H A DKconfig9 communication link between VM guests.
/linux/Documentation/arch/x86/
H A Dtdx.rst179 guests and the TDX module get destroyed permanently.
210 TDX guests behave differently from bare-metal and traditional VMX guests.
211 In TDX guests, otherwise normal instructions or memory accesses can cause
248 In general, the #GP MSRs should not be used in guests. Their use likely
320 TDX guests ensure that all guest memory has been "accepted" before memory
359 emulates the access. That is not possible in TDX guests because VMEXIT
360 will expose the register state to the host. TDX guests don't trust the host
/linux/arch/mips/kvm/
H A DKconfig11 other operating systems inside virtual machines (guests).

1234