Searched refs:VM (Results 1 – 25 of 138) sorted by relevance
123456
| /Linux-v5.15/Documentation/virt/ |
| D | ne_overview.rst | 14 For example, an application that processes sensitive data and runs in a VM, 15 can be separated from other applications running in the same VM. This 16 application then runs in a separate VM than the primary VM, namely an enclave. 18 An enclave runs alongside the VM that spawned it. This setup matches low latency 20 memory and CPUs, are carved out of the primary VM. Each enclave is mapped to a 21 process running in the primary VM, that communicates with the NE driver via an 27 VM guest that uses the provided ioctl interface of the NE driver to spawn an 28 enclave VM (that's 2 below). 30 There is a NE emulated PCI device exposed to the primary VM. The driver for this 36 hypervisor running on the host where the primary VM is running. The Nitro [all …]
|
| /Linux-v5.15/Documentation/virt/acrn/ |
| D | introduction.rst | 7 hardware. It has a privileged management VM, called Service VM, to manage User 10 ACRN userspace is an application running in the Service VM that emulates 11 devices for a User VM based on command line configurations. ACRN Hypervisor 12 Service Module (HSM) is a kernel module in the Service VM which provides 19 Service VM User VM 35 ACRN userspace allocates memory for the User VM, configures and initializes the 36 devices used by the User VM, loads the virtual bootloader, initializes the 37 virtual CPU state and handles I/O request accesses from the User VM. It uses
|
| D | io-request.rst | 6 An I/O request of a User VM, which is constructed by the hypervisor, is 14 For each User VM, there is a shared 4-KByte memory region used for I/O requests 15 communication between the hypervisor and Service VM. An I/O request is a 18 VM. ACRN userspace in the Service VM first allocates a 4-KByte page and passes 26 An I/O client is responsible for handling User VM I/O requests whose accessed 28 User VM. There is a special client associated with each User VM, called the 31 VM. 39 | Service VM | 88 state when a trapped I/O access happens in a User VM. 90 the Service VM.
|
| D | cpuid.rst | 7 A guest VM running on an ACRN hypervisor can check some of its features using 38 ACRN_FEATURE_PRIVILEGED_VM 0 guest VM is a privileged VM
|
| /Linux-v5.15/net/iucv/ |
| D | Kconfig | 5 prompt "IUCV support (S390 - z/VM only)" 8 under VM or VIF. If you run on z/VM, say "Y" to enable a fast 9 communication link between VM guests. 14 prompt "AF_IUCV Socket support (S390 - z/VM and HiperSockets transport)" 17 based on z/VM inter-user communication vehicle or based on
|
| /Linux-v5.15/drivers/s390/char/ |
| D | Kconfig | 140 prompt "Support for the z/VM recording system services (VM only)" 144 by the z/VM recording system services, eg. from *LOGREC, *ACCOUNT or 150 prompt "Support for the z/VM CP interface" 155 program on z/VM 158 int "Memory in MiB reserved for z/VM CP interface" 162 Specify the default amount of memory in MiB reserved for the z/VM CP 169 prompt "API for reading z/VM monitor service records" 172 Character device driver for reading z/VM monitor service records 176 prompt "API for writing z/VM monitor service records" 179 Character device driver for writing z/VM monitor service records [all …]
|
| /Linux-v5.15/drivers/s390/net/ |
| D | Kconfig | 23 It also supports virtual CTCs when running under VM. 32 prompt "IUCV network device support (VM only)" 36 vehicle networking under VM or VIF. It enables a fast communication 37 link between VM guests. Using ifconfig a point-to-point connection 39 running on the other VM guest. To compile as a module, choose M. 44 prompt "IUCV special message support (VM only)" 48 from other VM guest systems. 52 prompt "Deliver IUCV special messages as uevents (VM only)" 67 HiperSockets interfaces and z/VM virtual NICs for Guest LAN and
|
| /Linux-v5.15/Documentation/virt/kvm/devices/ |
| D | vfio.rst | 11 Only one VFIO instance may be created per VM. The created device 12 tracks VFIO groups in use by the VM and features of those groups 13 important to the correctness and acceleration of the VM. As groups 14 are enabled and disabled for use by the VM, KVM should be updated
|
| D | xive.rst | 10 This device acts as a VM interrupt controller. It provides the KVM 11 interface to configure the interrupt sources of a VM in the underlying 23 guest in VMAs populated with a custom VM fault handler. 59 number being mapped and then lets the VM fault handler repopulate. 83 migrating the VM. 228 Saving the state of a VM using the XIVE native exploitation mode 229 should follow a specific sequence. When the VM is stopped :
|
| /Linux-v5.15/drivers/virt/acrn/ |
| D | Kconfig | 10 a privileged management VM, called Service VM, to manage User 12 under ACRN as a User VM.
|
| /Linux-v5.15/Documentation/devicetree/bindings/reserved-memory/ |
| D | xen,shared-memory.txt | 4 virtual machine. Typically, a region is configured at VM creation time 20 memory region used for the mapping in the borrower VM. 24 the VM config file
|
| /Linux-v5.15/Documentation/vm/ |
| D | page_migration.rst | 167 To overcome the problem, VM supports non-LRU page migration which provides 176 What VM expects from isolate_page() function of driver is to return *true* 177 if driver isolates the page successfully. On returning true, VM marks the page 181 Once page is successfully isolated, VM uses page.lru fields so driver 187 After isolation, VM calls migratepage() of driver with the isolated page. 191 indicate to the VM the oldpage is no longer movable via __ClearPageMovable() 194 can return -EAGAIN. On -EAGAIN, VM will retry page migration in a short time 195 because VM interprets -EAGAIN as "temporary migration failure". On returning 196 any error except -EAGAIN, VM will give up the page migration without 203 If migration fails on the isolated page, VM should return the isolated page [all …]
|
| /Linux-v5.15/Documentation/ABI/testing/ |
| D | sysfs-kernel-mm | 3 Contact: Nishanth Aravamudan <nacc@us.ibm.com>, VM maintainers 5 /sys/kernel/mm/ should contain any and all VM
|
| /Linux-v5.15/Documentation/s390/ |
| D | monreader.rst | 2 Linux API for read access to z/VM Monitor Records 15 usable from user space and allows read access to the z/VM Monitor Records 16 collected by the `*MONITOR` System Service of z/VM. 21 The z/VM guest on which you want to access this API needs to be configured in 25 This item will use the IUCV device driver to access the z/VM services, so you 26 need a kernel with IUCV support. You also need z/VM version 4.4 or 5.1. 78 Refer to the "z/VM Performance" book (SC24-6109-00) on how to create a monitor 79 DCSS if your z/VM doesn't have one already, you need Class E privileges to 147 See "Appendix A: `*MONITOR`" in the "z/VM Performance" document for a description 149 be found here (z/VM 5.1): https://www.vm.ibm.com/pubs/mon510/index.html [all …]
|
| D | 3270.rst | 22 VM-ESA operating system, define a 3270 to your virtual machine by using 31 Your network connection from VM-ESA allows you to use x3270, tn3270, or 56 configuration file under /etc/modprobe.d/. If you are working on a VM 60 other, or neither. If you generate both, the console type under VM is 70 3. (If VM) define devices with DEF GRAF 74 To test that everything works, assuming VM and x3270, 155 The screen you should now see contains a VM logo with input 193 If so, you must issue the command "DEF GRAF 620" from your VM
|
| /Linux-v5.15/Documentation/translations/zh_CN/virt/acrn/ |
| D | introduction.rst | 30 服务端VM 用户端VM
|
| /Linux-v5.15/Documentation/powerpc/ |
| D | ultravisor.rst | 63 the VM it is returning to is secure. 152 * SVMs are created from normal VM using (open source) tooling supplied 158 * When the UV_ESM ultracall is made the Ultravisor copies the VM into 389 #. When a normal VM switches to secure mode, all its pages residing 497 #. If the value of the PATE for an existing partition (VM) changes, 502 the PATE entries for a normal VM and can change the PATE entry 665 * U_INVALID if VM is not secure. 703 * U_INVALID if the VM is not secure. 752 * U_INVALID if VM is not secure. 795 * U_INVAL if VM is not secure. [all …]
|
| /Linux-v5.15/arch/s390/ |
| D | Kconfig | 819 handling under VM. If running native or in LPAR, this option 820 has no effect. If your VM does not support PFAULT, PAGEEX 822 Note that VM 4.2 supports PFAULT but has a bug in its 824 Everybody who wants to run Linux under VM != VM4.2 should select 834 makes sense for a system running under VM where the unused pages 835 will be reused by VM for other guest systems. The interface 837 Everybody who wants to run Linux under VM should select this 850 prompt "Linux - VM Monitor Stream, base infrastructure" 853 This provides a kernel interface for creating and updating z/VM APPLDATA 869 This provides memory management related data to the Linux - VM Monitor [all …]
|
| /Linux-v5.15/Documentation/networking/ |
| D | net_failover.rst | 24 datapath. It also enables hypervisor controlled live migration of a VM with 58 Booting a VM with the above configuration will result in the following 3 59 netdevs created in the VM. 76 Live Migration of a VM with SR-IOV VF & virtio-net in STANDBY mode
|
| /Linux-v5.15/Documentation/virt/kvm/ |
| D | s390-pv-boot.rst | 35 related operations for virtual machines. The VM can set and retrieve 37 request VM memory and subsystem resets, as well as IPLs. 72 UV will clear all memory when a secure VM is removed, and therefore
|
| /Linux-v5.15/drivers/tty/hvc/ |
| D | Kconfig | 45 bool "z/VM IUCV Hypervisor console support (VM only)" 52 a Linux (console) terminal via a z/VM IUCV communication path.
|
| /Linux-v5.15/drivers/s390/block/ |
| D | Kconfig | 53 Disks under VM. If you are not running under VM or unsure what it is,
|
| /Linux-v5.15/Documentation/features/vm/huge-vmap/ |
| D | arch-support.txt | 4 … description: arch supports the arch_vmap_pud_supported() and arch_vmap_pmd_supported() VM APIs
|
| /Linux-v5.15/Documentation/features/vm/pte_special/ |
| D | arch-support.txt | 4 # description: arch supports the pte_special()/pte_mkspecial() VM APIs
|
| /Linux-v5.15/arch/arc/ |
| D | Kconfig.debug | 10 on the VM subsystem for higher order allocations.
|
123456