Lines Matching full:dump
16 confidentiality until the dump is in the hands of the VM owner who
19 The confidentiality of the VM dump is ensured by the Ultravisor who
26 Dump process
29 A dump is done in 3 steps:
33 This step initializes the dump process, generates cryptographic seeds
34 and extracts dump keys with which the VM dump data will be encrypted.
42 point, vector, control and tod/timers of a vcpu. The vcpu dump can
45 in the dump data. For the same reason it is very important to not only
54 read from the swap and written to the dump target without need for any
63 decrypt the vcpu and memory data and end the dump process. When this
64 step completes successfully a new dump initiation can be started.