Home
last modified time | relevance | path

Searched refs:KVM (Results 1 – 25 of 110) sorted by relevance

12345

/OK3568_Linux_fs/kernel/arch/x86/kvm/
H A DKconfig3 # KVM configuration
21 config KVM config
22 tristate "Kernel-based Virtual Machine (KVM) support"
64 bool "Compile KVM with -Werror"
69 depends on KVM
73 Add -Werror to the build flags for KVM.
78 tristate "KVM for Intel (and compatible) processors support"
79 depends on KVM && IA32_FEAT_CTL
81 Provides support for KVM on processors equipped with Intel's VT
88 tristate "KVM for AMD processors support"
[all …]
H A DMakefile10 KVM := ../../../virt/kvm macro
12 kvm-y += $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o \
13 $(KVM)/eventfd.o $(KVM)/irqchip.o $(KVM)/vfio.o
14 kvm-$(CONFIG_KVM_ASYNC_PF) += $(KVM)/async_pf.o
/OK3568_Linux_fs/kernel/arch/s390/kvm/
H A DMakefile6 KVM := ../../../virt/kvm macro
7 common-objs = $(KVM)/kvm_main.o $(KVM)/eventfd.o $(KVM)/async_pf.o $(KVM)/irqchip.o $(KVM)/vfio.o
H A DKconfig3 # KVM configuration
9 prompt "KVM"
19 config KVM config
21 prompt "Kernel-based Virtual Machine (KVM) support"
51 depends on KVM
53 Allow CAP_SYS_ADMIN users to create KVM virtual machines that are
/OK3568_Linux_fs/kernel/Documentation/virt/kvm/
H A Drunning-nested-guests.rst2 Running nested guests with KVM
6 can be KVM-based or a different hypervisor). The straightforward
7 example is a KVM guest that in turn runs on a KVM guest (the rest of
18 | KVM (/dev/kvm) |
22 | KVM (/dev/kvm) |
29 - L0 – level-0; the bare metal host, running KVM
32 hypervisor", as it itself is capable of running KVM.
54 There are several scenarios where nested KVM can be useful, to name a
59 Provider, using nested KVM lets you rent a large enough "guest
77 From Linux kernel v4.19 onwards, the ``nested`` KVM parameter is enabled
[all …]
H A Ds390-diag.rst4 The s390 DIAGNOSE call on KVM
7 KVM on s390 supports the DIAGNOSE call for making hypercalls, both for
19 all supported DIAGNOSE calls need to be handled by either KVM or its
22 All DIAGNOSE calls supported by KVM use the RS-a format::
34 DIAGNOSE function codes not specific to KVM, please refer to the
38 DIAGNOSE function code 'X'500' - KVM virtio functions
45 virtio subfunctions depend on KVM's userspace. Generally, userspace
62 Handled by either userspace or KVM (ioeventfd case).
69 General register 4 contains a 64bit identifier for KVM usage (the
80 DIAGNOSE function code 'X'501 - KVM breakpoint
H A Ds390-pv.rst9 Protected virtual machines (PVM) are KVM VMs that do not allow KVM to
12 provides an API that can be used by PVMs and KVM to request management
16 transition into protected mode. On transition, KVM registers the guest
34 Interrupt injection is safeguarded by the Ultravisor. As KVM doesn't
47 been intercepted into KVM. The exceptions need to be a valid outcome
48 of an instruction emulation by KVM, e.g. we can never inject a
49 addressing exception as they are reported by SIE since KVM has no
55 KVM cannot intercept lctl(g) and lpsw(e) anymore in order to be
67 to interpret every instruction, but needs to hand some tasks to KVM;
103 emulation of the instruction with the data provided by KVM. That might
[all …]
H A Dppc-pv.rst4 The PPC KVM paravirtual interface
7 The basic execution principle by which KVM on PowerPC works is to run all kernel
24 To find out if we're running on KVM or not, we leverage the device tree. When
25 Linux is running on KVM, a node /hypervisor exists. That node contains a
28 Once you determined you're running under a PV capable KVM, you can now use
31 KVM hypercalls
57 apply for x86 and powerpc alike with the exception that each KVM hypercall
58 also needs to be ORed with the KVM vendor code which is (42 << 16).
75 map this shared page using the KVM hypercall KVM_HC_PPC_MAP_MAGIC_PAGE.
97 When mapping the magic page using the KVM hypercall KVM_HC_PPC_MAP_MAGIC_PAGE,
[all …]
H A Dhypercalls.rst4 Linux KVM Hypercall
8 KVM Hypercalls have a three-byte sequence of either the vmcall or the vmmcall
24 For further information on the S390 diagnose call as supported by KVM,
31 KVM hypercalls uses 4 byte opcode, that are patched with 'hypercall-instructions'
36 KVM hypercalls use the HYPCALL instruction with code 0 and the hypercall
40 KVM Hypercalls Documentation
73 OR KVM specific enumeration mechanism (which is this hypercall)
H A Dcpuid.rst4 KVM CPUID bits
11 mask-out some, or even all KVM-related cpuid features before launching
14 KVM cpuid functions are:
30 This function queries the presence of KVM cpuid leafs.
H A Ds390-pv-boot.rst17 KVM to decrypt the protected virtual machine.
19 Based on this data, KVM will make the protected virtual machine known
22 hashes, to ensure integrity. Afterwards KVM can run the PVM via the
23 SIE instruction which the UV will intercept and execute on KVM's
/OK3568_Linux_fs/kernel/arch/powerpc/kvm/
H A DKconfig3 # KVM configuration
20 config KVM config
52 tristate "KVM support for PowerPC book3s_32 processors"
54 select KVM
67 tristate "KVM support for PowerPC book3s_64 processors"
70 select KVM
83 tristate "KVM for POWER7 and later using hypervisor mode in host"
93 If you say Y here, KVM will use the hardware virtualization
97 that KVM is not usable under PowerVM (pHyp), is only usable
104 tristate "KVM support without using hypervisor mode in host"
[all …]
H A DMakefile7 KVM := ../../../virt/kvm macro
9 common-objs-y = $(KVM)/kvm_main.o $(KVM)/eventfd.o
10 common-objs-$(CONFIG_KVM_VFIO) += $(KVM)/vfio.o
11 common-objs-$(CONFIG_KVM_MMIO) += $(KVM)/coalesced_mmio.o
126 kvm-objs-$(CONFIG_HAVE_KVM_IRQ_ROUTING) += $(KVM)/irqchip.o
/OK3568_Linux_fs/kernel/Documentation/virt/kvm/arm/
H A Dpsci.rst7 KVM implements the PSCI (Power State Coordination Interface)
12 and KVM implements these updates if they make sense from a virtualization
15 This means that a guest booted on two different versions of KVM can
21 In order to remedy this situation, KVM exposes a set of "firmware
33 highest PSCI version implemented by KVM and compatible with v0.2)
34 - Allows any PSCI version implemented by KVM and compatible with
40 offered by KVM to the guest via a HVC call. The workaround is described
46 KVM does not offer
58 offered by KVM to the guest via a HVC call. The workaround is described
65 available. KVM does not offer firmware support for the workaround.
[all …]
H A Dhyp-abi.rst9 KVM). It doesn't cover the interaction of the kernel with the
10 hypervisor when running as a guest (under Xen, KVM or any other
14 Note: KVM/arm has been removed from the kernel. The API described
16 booted at HYP. It can also be used by a hypervisor other than KVM
/OK3568_Linux_fs/kernel/arch/arm64/kvm/
H A DMakefile8 KVM=../../../virt/kvm macro
13 kvm-y := $(KVM)/kvm_main.o $(KVM)/coalesced_mmio.o $(KVM)/eventfd.o \
14 $(KVM)/vfio.o $(KVM)/irqchip.o \
H A DKconfig3 # KVM configuration
20 menuconfig KVM config
21 bool "Kernel-based Virtual Machine (KVM) support"
48 if KVM
52 endif # KVM
/OK3568_Linux_fs/kernel/tools/testing/selftests/rcutorture/bin/
H A Dkvm.sh25 KVM="`pwd`/tools/testing/selftests/rcutorture"; export KVM
26 PATH=${KVM}/bin:$PATH; export PATH
32 TORTURE_INITRD="$KVM/initrd"; export TORTURE_INITRD
231 CONFIGFRAG=${KVM}/configs/${TORTURE_SUITE}; export CONFIGFRAG
241 resdir=$KVM/res
341 KVM="$KVM"; export KVM
385 -v KVM="$KVM" \
H A Dkvm-check-branches.sh52 KVM="`pwd`/tools/testing/selftests/rcutorture"; export KVM
53 PATH=${KVM}/bin:$PATH; export PATH
/OK3568_Linux_fs/kernel/Documentation/virt/kvm/devices/
H A Dvfio.rst14 are enabled and disabled for use by the VM, KVM should be updated
15 about their presence. When registered with KVM, a reference to the
16 VFIO-group is held by KVM.
22 KVM_DEV_VFIO_GROUP_ADD: Add a VFIO group to VFIO-KVM device tracking
25 KVM_DEV_VFIO_GROUP_DEL: Remove a VFIO group from VFIO-KVM device tracking
29 allocated by sPAPR KVM.
/OK3568_Linux_fs/kernel/arch/mips/kvm/
H A DKconfig3 # KVM configuration
18 config KVM config
19 tristate "Kernel-based Virtual Machine (KVM) support"
35 depends on KVM
58 bool "KVM/MIPS: Dynamic binary translation to reduce traps"
69 depends on KVM
/OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/
H A Dmultihit.rst81 * - KVM: Mitigation: Split huge pages
83 * - KVM: Mitigation: VMX unsupported
84 - KVM is not vulnerable because Virtual Machine Extensions (VMX) is not supported.
85 * - KVM: Mitigation: VMX disabled
86 - KVM is not vulnerable because Virtual Machine Extensions (VMX) is disabled.
87 * - KVM: Vulnerable
111 In order to mitigate the vulnerability, KVM initially marks all huge pages
115 If EPT is disabled or not available on the host, KVM is in control of TLB
119 (non-nested) page tables. For simplicity, KVM will make large pages
122 Mitigation control on the kernel command line and KVM - module parameter
[all …]
/OK3568_Linux_fs/buildroot/package/kvm-unit-tests/
H A DConfig.in20 kvm-unit-tests is a project as old as KVM. As its name
21 suggests, it's purpose is to provide unit tests for KVM. The
24 order to obtain its PASS/FAIL result. Unit tests provide KVM
32 strongly encouraged that patches implementing new KVM
35 http://www.linux-kvm.org/page/KVM-unit-tests
/OK3568_Linux_fs/kernel/tools/kvm/kvm_stat/
H A Dkvm_stat.txt6 kvm_stat - Report KVM kernel module event counters
15 kvm_stat prints counts of KVM kernel module trace events. These events signify
25 The set of KVM kernel module trace events may be specific to the kernel version
26 or architecture. It is best to check the KVM kernel module source code for the
/OK3568_Linux_fs/kernel/virt/kvm/
H A DKconfig2 # KVM common configuration items and defaults
50 depends on KVM && COMPAT && !(S390 || ARM64)

12345