/linux-6.14.4/arch/x86/kvm/ |
D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 56 virtualization extensions. You will need a fairly recent 57 processor equipped with virtualization extensions. You will also 109 let guests receive a virtualization exception. Virtualization 115 virtualization. 120 bool "Software Guard eXtensions (SGX) Virtualization" 142 bool "AMD Secure Encrypted Virtualization (SEV) support" 152 Encrypted Virtualization (SEV), Secure Encrypted Virtualization with [all …]
|
/linux-6.14.4/arch/loongarch/kvm/ |
D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 38 hardware virtualization extensions. You will need 39 a processor equipped with virtualization extensions. 43 endif # VIRTUALIZATION
|
/linux-6.14.4/arch/riscv/kvm/ |
D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 41 endif # VIRTUALIZATION
|
/linux-6.14.4/arch/mips/kvm/ |
D | Kconfig | 7 menuconfig VIRTUALIZATION config 8 bool "Virtualization" 16 if VIRTUALIZATION 43 endif # VIRTUALIZATION
|
/linux-6.14.4/Documentation/ABI/testing/ |
D | sysfs-bus-vdpa | 3 Contact: virtualization@lists.linux.dev 15 Contact: virtualization@lists.linux.dev 25 Contact: virtualization@lists.linux.dev 33 Contact: virtualization@lists.linux.dev 41 Contact: virtualization@lists.linux.dev
|
/linux-6.14.4/arch/s390/kvm/ |
D | Kconfig | 7 menuconfig VIRTUALIZATION config 17 if VIRTUALIZATION 35 virtualization capability on the mainframe. This should work 55 endif # VIRTUALIZATION
|
/linux-6.14.4/arch/arm64/kvm/ |
D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 86 endif # VIRTUALIZATION
|
/linux-6.14.4/Documentation/virt/kvm/x86/ |
D | timekeeping.rst | 4 Timekeeping Virtualization for X86-Based Architectures 15 4) Virtualization Problems 21 the virtualization of this platform is the plethora of timing devices available 22 and the complexity of emulating those devices. In addition, virtualization of 32 information relevant to KVM and hardware-based virtualization. 281 these workarounds pose unique constraints for virtualization - requiring either 351 Both VMX and SVM provide extension fields in the virtualization hardware which 383 small, may be exposed to the OS and any virtualization environment. 445 3.7. TSC virtualization - VMX 449 instructions, which is enough for full virtualization of TSC in any manner. In [all …]
|
D | nested-vmx.rst | 22 "The Turtles Project: Design and Implementation of Nested Virtualization", 31 Single-level virtualization has two levels - the host (KVM) and the guests. 32 In nested virtualization, we have three levels: The host (KVM), which we call
|
D | running-nested-guests.rst | 26 | Hardware (with virtualization extensions) | 72 - Some OSes use virtualization internally for security (e.g. to let 127 (Virtual Machine Control Structure)", APIC Virtualization on your bare 223 *mention* that they're using nested virtualization.
|
/linux-6.14.4/drivers/net/ethernet/marvell/octeontx2/af/ |
D | rvu_npc_hash.c | 418 * @rvu: resource virtualization unit. 457 * @rvu: resource virtualization unit. 499 * @rvu: Resource virtualization unit. 515 * @rvu: Resource virtualization unit. 548 * @rvu: resource virtualization unit. 580 * @rvu: Resource virtualization unit. 610 * @rvu: Resource virtualization unit. 629 * @rvu: Resource virtualization unit. 664 * @rvu: Resource virtualization unit. 691 * @rvu: Resource virtualization unit. [all …]
|
/linux-6.14.4/drivers/virt/ |
D | Kconfig | 3 # Virtualization support drivers 7 bool "Virtualization drivers" 10 virtualization environments.
|
/linux-6.14.4/Documentation/arch/x86/ |
D | iommu.rst | 24 - IVRS - AMD I/O Virtualization Reporting Structure 25 - IVDB - AMD I/O Virtualization Definition Block 26 - IVHD - AMD I/O Virtualization Hardware Definition 42 Virtualization Reporting Structure (IVRS) that is used to convey information 43 related to I/O virtualization to system software. The IVRS describes the
|
D | sva.rst | 34 Unlike Single Root I/O Virtualization (SR-IOV), Scalable IOV (SIOV) permits 217 Single Root I/O Virtualization (SR-IOV) focuses on providing independent 224 Scalable I/O Virtualization builds on the PASID concept to create device 225 instances for virtualization. SIOV requires host software to assist in 244 * Does this support virtualization? 277 https://01.org/blogs/ashokraj/2018/recent-enhancements-intel-virtualization-technology-directed-i/o… 280 https://01.org/blogs/2019/assignable-interfaces-intel-scalable-i/o-virtualization-linux
|
/linux-6.14.4/arch/powerpc/kvm/ |
D | Kconfig | 8 menuconfig VIRTUALIZATION config 9 bool "Virtualization" 18 if VIRTUALIZATION 92 If you say Y here, KVM will use the hardware virtualization 248 endif # VIRTUALIZATION
|
/linux-6.14.4/Documentation/virt/ |
D | paravirt_ops.rst | 7 Linux provides support for different hypervisor virtualization technologies. 10 Linux pv_ops is a virtualization API which enables support for different
|
/linux-6.14.4/Documentation/devicetree/bindings/net/ |
D | fsl,enetc.yaml | 11 supports virtualization/isolation based on PCIe Single Root IO Virtualization
|
/linux-6.14.4/arch/x86/kernel/ |
D | reboot.c | 534 /* RCU-protected callback to disable virtualization prior to reboot. */ 557 * Disable virtualization, i.e. VMX or SVM, to ensure INIT is recognized during 566 * IRQs must be disabled as KVM enables virtualization in hardware via in cpu_emergency_disable_virtualization() 568 * virtualization stays disabled. in cpu_emergency_disable_virtualization() 584 * Disable virtualization on all CPUs before rebooting to avoid hanging in emergency_reboot_disable_virtualization() 590 * Do the NMI shootdown even if virtualization is off on _this_ CPU, as in emergency_reboot_disable_virtualization() 591 * other CPUs may have virtualization enabled. in emergency_reboot_disable_virtualization() 878 * callback can safely use virtualization instructions, e.g. VMCLEAR. in crash_nmi_callback() 902 * NULL, first and then disables virtualization to ensure that
|
/linux-6.14.4/Documentation/admin-guide/hw-vuln/ |
D | multihit.rst | 117 EPT paging mechanism used by nested virtualization is vulnerable, because 150 1. No virtualization in use 156 2. Virtualization with trusted guests 163 3. Virtualization with untrusted guests
|
D | mds.rst | 113 This is done to address virtualization scenarios where the host has the 160 Virtualization mitigation 175 For details on L1TF and virtualization see: 277 2. Virtualization with trusted guests 282 3. Virtualization with untrusted guests
|
/linux-6.14.4/Documentation/userspace-api/ |
D | iommufd.rst | 67 passed to or shared with a VM. It may be some HW-accelerated virtualization 73 * Virtualization of various platforms IDs, e.g. RIDs and others 79 to support some HW-accelerated virtualization features. So, a vIOMMU object 93 virtualization features from physical IOMMUs, it is suggested to build the 228 also configure its HW virtualization feature for that vIOMMU (and thus for 239 op to init its HW for virtualization feature related to a vDEVICE. Successful
|
/linux-6.14.4/drivers/net/ethernet/qlogic/ |
D | Kconfig | 43 Virtualization support for QLE83XX Converged Ethernet devices. 95 Virtualization support for QED devices.
|
/linux-6.14.4/arch/x86/kernel/cpu/ |
D | feat_ctl.c | 198 * in which case SGX virtualization cannot be supported either. in init_ia32_feat_ctl() 201 pr_err_once("SGX virtualization disabled due to lack of VMX.\n"); in init_ia32_feat_ctl() 210 pr_err_once("SGX Launch Control is locked. Support SGX virtualization only.\n"); in init_ia32_feat_ctl()
|
/linux-6.14.4/Documentation/virt/kvm/s390/ |
D | s390-pv-boot.rst | 44 Subcode 10: Move into Protected Virtualization mode 67 When running in protected virtualization mode, some subcodes will result in
|
/linux-6.14.4/drivers/net/ethernet/freescale/enetc/ |
D | Kconfig | 47 as the NIC functionality in NETC, it supports virtualization/isolation 48 based on PCIe Single Root IO Virtualization (SR-IOV) and a full range
|