Searched refs:VM (Results 1 – 25 of 169) sorted by relevance
1234567
/Linux-v6.6/Documentation/translations/zh_CN/mm/ |
D | page_migration.rst | 129 为了克服这个问题,VM支持非LRU页面迁移,它为非LRU可移动页面提供了通用函数,而在迁移 137 VM对驱动的isolate_page()函数的期望是,如果驱动成功隔离了该页,则返回*true*。 138 返回true后,VM会将该页标记为PG_isolated,这样多个CPU的并发隔离就会跳过该 141 一旦页面被成功隔离,VM就会使用page.lru字段,因此驱动程序不应期望保留这些字段的值。 150 时,VM会在短时间内重试页面迁移,因为VM将-EAGAIN理解为 "临时迁移失败"。在返回除 151 -EAGAIN以外的任何错误时,VM将放弃页面迁移而不重试。 157 如果在隔离页上迁移失败,VM应该将隔离页返回给驱动,因此VM用隔离页调用驱动的 170 它需要address_space的参数来注册将被VM调用的migration family函数。确切地说, 171 PG_movable不是struct page的一个真正的标志。相反,VM复用了page->mapping的低 180 对于非LRU可移动页面的测试,VM支持__PageMovable()函数。然而,它并不能保证识别 [all …]
|
D | active_mm.rst | 43 会对用户空间感兴趣,调度器不妨试着避免在切换VM状态上浪费时间。目前只有老 69 要是在启动时使用,当时还没有真正的VM被创建。因此,用来检查的代码
|
/Linux-v6.6/Documentation/virt/ |
D | ne_overview.rst | 14 For example, an application that processes sensitive data and runs in a VM, 15 can be separated from other applications running in the same VM. This 16 application then runs in a separate VM than the primary VM, namely an enclave. 17 It runs alongside the VM that spawned it. This setup matches low latency 24 carved out of the primary VM. Each enclave is mapped to a process running in the 25 primary VM, that communicates with the NE kernel driver via an ioctl interface. 30 VM guest that uses the provided ioctl interface of the NE driver to spawn an 31 enclave VM (that's 2 below). 33 There is a NE emulated PCI device exposed to the primary VM. The driver for this 39 hypervisor running on the host where the primary VM is running. The Nitro [all …]
|
/Linux-v6.6/Documentation/virt/acrn/ |
D | introduction.rst | 7 hardware. It has a privileged management VM, called Service VM, to manage User 10 ACRN userspace is an application running in the Service VM that emulates 11 devices for a User VM based on command line configurations. ACRN Hypervisor 12 Service Module (HSM) is a kernel module in the Service VM which provides 19 Service VM User VM 35 ACRN userspace allocates memory for the User VM, configures and initializes the 36 devices used by the User VM, loads the virtual bootloader, initializes the 37 virtual CPU state and handles I/O request accesses from the User VM. It uses
|
D | io-request.rst | 6 An I/O request of a User VM, which is constructed by the hypervisor, is 14 For each User VM, there is a shared 4-KByte memory region used for I/O requests 15 communication between the hypervisor and Service VM. An I/O request is a 18 VM. ACRN userspace in the Service VM first allocates a 4-KByte page and passes 26 An I/O client is responsible for handling User VM I/O requests whose accessed 28 User VM. There is a special client associated with each User VM, called the 31 VM. 39 | Service VM | 88 state when a trapped I/O access happens in a User VM. 90 the Service VM.
|
D | cpuid.rst | 7 A guest VM running on an ACRN hypervisor can check some of its features using 38 ACRN_FEATURE_PRIVILEGED_VM 0 guest VM is a privileged VM
|
/Linux-v6.6/net/iucv/ |
D | Kconfig | 5 prompt "IUCV support (S390 - z/VM only)" 8 under VM or VIF. If you run on z/VM, say "Y" to enable a fast 9 communication link between VM guests. 14 prompt "AF_IUCV Socket support (S390 - z/VM and HiperSockets transport)" 17 based on z/VM inter-user communication vehicle or based on
|
/Linux-v6.6/Documentation/virt/kvm/s390/ |
D | s390-pv-dump.rst | 10 Dumping a VM is an essential tool for debugging problems inside 11 it. This is especially true when a protected VM runs into trouble as 15 However when dumping a protected VM we need to maintain its 16 confidentiality until the dump is in the hands of the VM owner who 19 The confidentiality of the VM dump is ensured by the Ultravisor who 22 Communication Key which is the key that's used to encrypt VM data in a 34 and extracts dump keys with which the VM dump data will be encrypted. 38 Currently there are two types of data that can be gathered from a VM:
|
D | s390-pv-boot.rst | 35 related operations for virtual machines. The VM can set and retrieve 37 request VM memory and subsystem resets, as well as IPLs. 72 UV will clear all memory when a secure VM is removed, and therefore
|
/Linux-v6.6/drivers/s390/char/ |
D | Kconfig | 144 prompt "Support for the z/VM recording system services (VM only)" 148 by the z/VM recording system services, eg. from *LOGREC, *ACCOUNT or 154 prompt "Support for the z/VM CP interface" 159 program on z/VM 162 int "Memory in MiB reserved for z/VM CP interface" 166 Specify the default amount of memory in MiB reserved for the z/VM CP 173 prompt "API for reading z/VM monitor service records" 176 Character device driver for reading z/VM monitor service records 180 prompt "API for writing z/VM monitor service records" 183 Character device driver for writing z/VM monitor service records [all …]
|
/Linux-v6.6/drivers/s390/net/ |
D | Kconfig | 22 It also supports virtual CTCs when running under VM. 31 prompt "IUCV network device support (VM only)" 35 vehicle networking under VM or VIF. It enables a fast communication 36 link between VM guests. Using ifconfig a point-to-point connection 38 running on the other VM guest. To compile as a module, choose M. 43 prompt "IUCV special message support (VM only)" 47 from other VM guest systems. 51 prompt "Deliver IUCV special messages as uevents (VM only)" 66 HiperSockets interfaces and z/VM virtual NICs for Guest LAN and
|
/Linux-v6.6/Documentation/networking/ |
D | net_failover.rst | 24 datapath. It also enables hypervisor controlled live migration of a VM with 72 Booting a VM with the above configuration will result in the following 3 73 interfaces created in the VM: 92 device; and on the first boot, the VM might end up with both 'failover' device 94 This will result in lack of connectivity to the VM. So some tweaks might be 113 Live Migration of a VM with SR-IOV VF & virtio-net in STANDBY mode 121 the source hypervisor. Note: It is assumed that the VM is connected to a 123 device to the VM. This is not the VF that was passthrough'd to the VM (seen in 143 TAP_IF=vmtap01 # virtio-net interface in the VM. 152 # Remove the VF that was passthrough'd to the VM. [all …]
|
/Linux-v6.6/drivers/virt/acrn/ |
D | Kconfig | 10 a privileged management VM, called Service VM, to manage User 12 under ACRN as a User VM.
|
/Linux-v6.6/Documentation/gpu/rfc/ |
D | i915_vm_bind.rst | 9 specified address space (VM). These mappings (also referred to as persistent 18 User has to opt-in for VM_BIND mode of binding for an address space (VM) 19 during VM creation time via I915_VM_CREATE_FLAGS_USE_VM_BIND extension. 38 submissions on that VM and will not be in the working set for currently running 43 A VM in VM_BIND mode will not support older execbuf mode of binding. 56 works with execbuf3 ioctl for submission. All BOs mapped on that VM (through 82 dma-resv fence list of all shared BOs mapped on the VM. 85 is private to a specified VM via I915_GEM_CREATE_EXT_VM_PRIVATE flag during 86 BO creation. Unlike Shared BOs, these VM private BOs can only be mapped on 87 the VM they are private to and can't be dma-buf exported. [all …]
|
/Linux-v6.6/Documentation/devicetree/bindings/reserved-memory/ |
D | xen,shared-memory.txt | 4 virtual machine. Typically, a region is configured at VM creation time 20 memory region used for the mapping in the borrower VM. 24 the VM config file
|
/Linux-v6.6/Documentation/virt/kvm/devices/ |
D | vfio.rst | 11 Only one VFIO instance may be created per VM. The created device 12 tracks VFIO files (group or device) in use by the VM and features 14 of the VM. As groups/devices are enabled and disabled for use by the 15 VM, KVM should be updated about their presence. When registered with
|
D | xive.rst | 10 This device acts as a VM interrupt controller. It provides the KVM 11 interface to configure the interrupt sources of a VM in the underlying 23 guest in VMAs populated with a custom VM fault handler. 59 number being mapped and then lets the VM fault handler repopulate. 83 migrating the VM. 228 Saving the state of a VM using the XIVE native exploitation mode 229 should follow a specific sequence. When the VM is stopped :
|
/Linux-v6.6/Documentation/ABI/testing/ |
D | sysfs-kernel-mm | 3 Contact: Nishanth Aravamudan <nacc@us.ibm.com>, VM maintainers 5 /sys/kernel/mm/ should contain any and all VM
|
/Linux-v6.6/Documentation/arch/s390/ |
D | monreader.rst | 2 Linux API for read access to z/VM Monitor Records 15 usable from user space and allows read access to the z/VM Monitor Records 16 collected by the `*MONITOR` System Service of z/VM. 21 The z/VM guest on which you want to access this API needs to be configured in 25 This item will use the IUCV device driver to access the z/VM services, so you 26 need a kernel with IUCV support. You also need z/VM version 4.4 or 5.1. 78 Refer to the "z/VM Performance" book (SC24-6109-00) on how to create a monitor 79 DCSS if your z/VM doesn't have one already, you need Class E privileges to 147 See "Appendix A: `*MONITOR`" in the "z/VM Performance" document for a description 149 be found here (z/VM 5.1): https://www.vm.ibm.com/pubs/mon510/index.html [all …]
|
D | 3270.rst | 22 VM-ESA operating system, define a 3270 to your virtual machine by using 31 Your network connection from VM-ESA allows you to use x3270, tn3270, or 56 configuration file under /etc/modprobe.d/. If you are working on a VM 60 other, or neither. If you generate both, the console type under VM is 70 3. (If VM) define devices with DEF GRAF 74 To test that everything works, assuming VM and x3270, 155 The screen you should now see contains a VM logo with input 193 If so, you must issue the command "DEF GRAF 620" from your VM
|
/Linux-v6.6/Documentation/powerpc/ |
D | ultravisor.rst | 63 the VM it is returning to is secure. 152 * SVMs are created from normal VM using (open source) tooling supplied 158 * When the UV_ESM ultracall is made the Ultravisor copies the VM into 389 #. When a normal VM switches to secure mode, all its pages residing 497 #. If the value of the PATE for an existing partition (VM) changes, 502 the PATE entries for a normal VM and can change the PATE entry 665 * U_INVALID if VM is not secure. 703 * U_INVALID if the VM is not secure. 752 * U_INVALID if VM is not secure. 795 * U_INVAL if VM is not secure. [all …]
|
/Linux-v6.6/Documentation/translations/zh_CN/virt/acrn/ |
D | introduction.rst | 30 服务端VM 用户端VM
|
/Linux-v6.6/samples/vfio-mdev/ |
D | README.rst | 53 4. Boot the VM. 55 In the Linux guest VM, with no hardware on the host, the device appears 75 In the Linux guest VM, dmesg output for the device is as follows: 82 5. In the Linux guest VM, check the serial ports::
|
/Linux-v6.6/arch/s390/ |
D | Kconfig | 765 handling under VM. If running native or in LPAR, this option 766 has no effect. If your VM does not support PFAULT, PAGEEX 768 Note that VM 4.2 supports PFAULT but has a bug in its 770 Everybody who wants to run Linux under VM != VM4.2 should select 780 makes sense for a system running under VM where the unused pages 781 will be reused by VM for other guest systems. The interface 783 Everybody who wants to run Linux under VM should select this 796 prompt "Linux - VM Monitor Stream, base infrastructure" 799 This provides a kernel interface for creating and updating z/VM APPLDATA 815 This provides memory management related data to the Linux - VM Monitor [all …]
|
/Linux-v6.6/drivers/s390/block/ |
D | Kconfig | 53 Disks under VM. If you are not running under VM or unsure what it is,
|
1234567