Searched refs:guests (Results 1 – 25 of 81) sorted by relevance
1234
/Linux-v6.1/fs/vboxsf/ |
D | Kconfig | 6 VirtualBox hosts can share folders with guests, this driver 10 If you want to use shared folders in VirtualBox guests, answer Y or M.
|
/Linux-v6.1/drivers/vhost/ |
D | Kconfig | 48 for use with virtio-scsi guests 58 sockets for communicating with guests. The guests must have the 81 This option allows vhost to support guests with a different byte
|
/Linux-v6.1/arch/x86/kvm/ |
D | Kconfig | 14 operating systems inside virtual machines (guests). 95 Enables KVM guests to create SGX enclaves. 98 guests via a device node, e.g. /dev/sgx_vepc. 125 Provides KVM support for the hosting Xen HVM guests and
|
/Linux-v6.1/drivers/xen/ |
D | Kconfig | 106 For example, by reading and writing the "xenbus" file, guests 195 device backend driver without para-virtualized support for guests. 198 other guests. 215 PCI devices to other guests. If you select this to be a module, you 217 you want to make visible to other guests. 257 to other guests via a high-performance shared-memory interface. 259 if guests need generic access to SCSI devices. 308 Support for auto-translated physmap guests. 362 Require virtio for Xen guests to use grant mappings.
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | sysfs-hypervisor-xen | 26 and all other guests. Only available to 27 privileged guests.
|
/Linux-v6.1/Documentation/x86/ |
D | tdx.rst | 25 TDX guests behave differently from bare-metal and traditional VMX guests. 26 In TDX guests, otherwise normal instructions or memory accesses can cause 63 In general, the #GP MSRs should not be used in guests. Their use likely 135 TDX guests ensure that all guest memory has been "accepted" before memory 174 emulates the access. That is not possible in TDX guests because VMEXIT 175 will expose the register state to the host. TDX guests don't trust the host
|
/Linux-v6.1/tools/testing/selftests/arm64/fp/ |
D | README | 68 should be run in parallel in two KVM guests, while simultaneously 71 1) Start 2 guests, using the following command for each: 83 allows multiple guests to be run in parallel while running other
|
/Linux-v6.1/Documentation/filesystems/ |
D | virtiofs.rst | 18 Use cases include making files available to new guests during installation, 20 stateless or ephemeral guests, and sharing a directory between guests.
|
/Linux-v6.1/Documentation/virt/kvm/x86/ |
D | nested-vmx.rst | 11 to easily and efficiently run guest operating systems. Normally, these guests 12 *cannot* themselves be hypervisors running their own guests, because in VMX, 13 guests cannot use VMX instructions. 16 hypervisors (which use VMX) with their own nested guests. It does so by 31 Single-level virtualization has two levels - the host (KVM) and the guests.
|
D | index.rst | 17 running-nested-guests
|
D | running-nested-guests.rst | 4 Running nested guests with KVM 63 multiple nested guests (level-2 guests), running different OSes, on 66 - Live migration of "guest hypervisors" and their nested guests, for 199 actually running L2 guests, is expected to function normally even on AMD 200 systems but may fail once guests are started.
|
/Linux-v6.1/fs/fuse/ |
D | Kconfig | 36 The Virtio Filesystem allows guests to mount file systems from the 39 If you want to share files between guests or with the host, answer Y
|
/Linux-v6.1/Documentation/powerpc/ |
D | dawr-power9.rst | 38 guest on a POWER9 host. Current Linux guests ignore this error, so 56 The same will also be true for any guests started on a POWER9 89 inconsistent view of what's available. Similarly for guests.
|
/Linux-v6.1/Documentation/admin-guide/hw-vuln/ |
D | l1tf.rst | 219 guests affine to one or more physical cores. The proper mechanism for 223 If only a single guest or related guests run on sibling SMT threads on 235 **Note**, that assigning guests to a fixed set of physical cores affects 241 For further information about confining guests to a single or to a group 258 which run untrusted guests, reduces the attack vector space. 261 guests, provide interesting data for an attacker depends on the system 282 of other mitigation solutions like confining guests to dedicated cores. 352 with SMT enabled, because the effective page tables for guests are 459 2. Virtualization with trusted guests 472 3. Virtualization with untrusted guests [all …]
|
D | tsx_async_abort.rst | 73 applications running on hosts or guests. 250 1. Trusted userspace and guests 255 disabled. The same applies to virtualized environments with trusted guests. 258 2. Untrusted userspace and guests 261 If there are untrusted applications or guests on the system, enabling TSX
|
D | multihit.rst | 63 guests in a virtualized system. 156 2. Virtualization with trusted guests 163 3. Virtualization with untrusted guests
|
/Linux-v6.1/Documentation/virt/hyperv/ |
D | overview.rst | 15 Hyper-V runs on x86/x64 and arm64 architectures, and Linux guests 21 Linux guests communicate with Hyper-V in four different ways: 89 On arm64, Hyper-V supports guests with 4/16/64 Kbyte pages as 127 earlier versions may provide guests with ACPI tables that indicate 143 On x86/x64, Hyper-V supports 32-bit and 64-bit guests, and Linux 148 On arm64, Hyper-V supports only 64-bit guests.
|
/Linux-v6.1/Documentation/virt/kvm/arm/ |
D | pvtime.rst | 7 support for AArch64 guests: 21 paravirtualized time is not available to 32 bit Arm guests. The existence of
|
D | ptp_kvm.rst | 6 PTP_KVM is used for high precision time sync between host and guests.
|
/Linux-v6.1/arch/powerpc/kvm/ |
D | Kconfig | 12 other operating systems inside virtual machines (guests). 118 guests that use hash MMU mode. 168 Old nested HV capable Linux guests have a bug where they don't 172 L2 guests.
|
/Linux-v6.1/Documentation/devicetree/bindings/misc/ |
D | pvpanic-mmio.txt | 9 QEMU exposes the data register to guests as memory mapped registers.
|
/Linux-v6.1/net/iucv/ |
D | Kconfig | 9 communication link between VM guests.
|
/Linux-v6.1/drivers/virt/coco/efi_secret/ |
D | Kconfig | 11 guests). The driver exposes the secrets as files in
|
/Linux-v6.1/arch/riscv/kvm/ |
D | Kconfig | 12 other operating systems inside virtual machines (guests).
|
/Linux-v6.1/Documentation/admin-guide/mm/damon/ |
D | reclaim.rst | 22 memory to host, and the host reallocates the reported memory to other guests. 24 guests could be not so memory-frugal, mainly because some kernel subsystems and 26 guests could report only small amount of memory as free to host, results in 28 guests could mitigate this problem.
|
1234