/linux-4.1.27/tools/perf/Documentation/ |
D | perf-kvm.txt | 6 perf-kvm - Tool to trace/measure kvm guest os 11 'perf kvm' [--host] [--guest] [--guestmount=<path> 14 'perf kvm' [--host] [--guest] [--guestkallsyms=<path> --guestmodules=<path> 23 a performance counter profile of guest os in realtime 28 default behavior of perf kvm as --guest, so if neither --host nor --guest 29 is input, the perf data file name is perf.data.guest. If --host is input, 31 perf.data.host, please input --host --no-guest. The behaviors are shown as 33 Default('') -> perf.data.guest 35 --guest -> perf.data.guest 36 --host --guest -> perf.data.kvm [all …]
|
D | perf-list.txt | 30 G - guest counting (in KVM guests) 70 registers: event, umask, edge, inv, cmask. Esp. guest/host only and
|
D | perf-report.txt | 91 on guest machine 93 guest machine
|
/linux-4.1.27/Documentation/virtual/kvm/ |
D | mmu.txt | 5 for presenting a standard x86 mmu to the guest, while translating guest 10 - correctness: the guest should not be able to determine that it is running 14 - security: the guest must not be able to touch host memory not assigned 19 - integration: Linux memory management code must be in control of guest memory 22 - dirty tracking: report writes to guest memory to enable live migration 34 gfn guest frame number 35 gpa guest physical address 36 gva guest virtual address 37 ngpa nested guest physical address 38 ngva nested guest virtual address [all …]
|
D | msr.txt | 19 in guest RAM. This memory is expected to hold a copy of the following 33 version: guest has to check version before and after grabbing 53 guest RAM, plus an enable bit in bit 0. This memory is expected to hold 75 version: guest has to check version before and after grabbing 110 coordinated between the guest and the hypervisor. Availability 120 | | guest vcpu has been paused by 168 64 byte memory area which must be in guest RAM and must be 182 fault guest must reset the reason to 0 before it does 188 be used to notify a guest when missing page becomes 199 type 1 was, but guest should not rely on that. [all …]
|
D | review-checklist.txt | 29 10. User/kernel interfaces and guest/host interfaces must be 64-bit clean 33 11. New guest visible features must either be documented in a hardware manual 37 host/guest memory must be unshared to prevent the host from writing to 38 guest memory that the guest has not reserved for this purpose.
|
D | hypercalls.txt | 43 Purpose: Trigger guest exit so that the host can check for pending 57 Purpose: Expose hypercall availability to the guest. On x86 platforms, cpuid 66 Purpose: To enable communication between the hypervisor and guest there is a 68 The guest can map this shared page to access its supervisor register through 76 Usage example : A vcpu of a paravirtualized guest that is busywaiting in guest 81 same guest can wakeup the sleeping vcpu by issuing KVM_HC_KICK_CPU hypercall,
|
D | cpuid.txt | 5 A guest running on a kvm host, can check some of its features using 8 a guest. 53 KVM_FEATURE_PV_UNHALT || 7 || guest checks this feature bit 57 KVM_FEATURE_CLOCKSOURCE_STABLE_BIT || 24 || host will warn if no guest-side
|
D | nested-vmx.txt | 8 to easily and efficiently run guest operating systems. Normally, these guests 12 The "Nested VMX" feature adds this missing capability - of running guest 14 allowing a guest to use VMX instructions, and correctly and efficiently 30 L0, the guest hypervisor, which we call L1, and its nested guest, which we 38 Only 64-bit guest hypervisors are supported. 40 Additional patches for running Windows under guest KVM, and Linux under 41 guest VMware server, and support for nested EPT, are currently running in 64 implementation for the a guest hypervisor to use. As such, the official
|
D | ppc-pv.txt | 66 To enable communication between the hypervisor and guest there is a new shared 67 page that contains parts of supervisor visible register state. The guest can 70 With this hypercall issued the guest always gets the magic page mapped at the 91 a second return value is passed to the guest. This second return value contains 106 feature we also have a channel for a guest to tell the guest whether it's capable 111 The following flags are currently available for a guest to expose: 120 when entering the guest or don't have any impact on the hypervisor's behavior. 122 The following bits are safe to be set inside the guest: 137 guest. Implementing any of those mappings is optional, as the instruction traps
|
D | api.txt | 38 actually running guest code. 115 corresponds to guest physical address zero. Use of mmap() on a VM fd 141 This ioctl returns the guest msrs that are supported. The list varies 223 Userspace can control the threading (SMT) mode of the guest by its 225 single-threaded guest vcpus, it should make all vcpu ids be a multiple 279 This ioctl is used to run a guest virtual cpu. While there are no 421 This injects an edge type external interrupt into the guest once it's ready 432 This injects a level type external interrupt into the guest context. The 650 should not present interrupts to the guest as active-low unless this 734 Sets the MSR that the Xen HVM guest uses to initialize its hypercall [all …]
|
D | locking.txt | 14 Fast page fault is the fast path which fixes the guest page fault out of 23 the gfn is writable on guest mmu and it is not write-protected by shadow 52 gfn2 by the guest:
|
D | timekeeping.txt | 20 division of time beyond the control of the guest CPU. 339 allows the guest visible TSC to be offset by a constant. Newer implementations 482 be able to deliver the proper number of interrupts per second, and so guest 491 additional interrupts into the guest in order to increase the effective 493 where host load or guest lag is too much to compensate for, and thus another 494 solution to the problem has risen: the guest may need to become aware of lost 555 delivered, and after which, the guest time may need to be caught up. NTP may 563 faster clock cannot be made visible to a guest without the potential of time 566 simply storing multipliers and offsets against the TSC for the guest to convert 574 distributed, but in contrived as well as real scenarios (guest device access, [all …]
|
D | s390-diag.txt | 15 DIAGNOSE calls by the guest cause a mandatory intercept. This implies
|
/linux-4.1.27/drivers/staging/unisys/Documentation/ |
D | overview.txt | 9 allow guest partitions on the same server to share devices that would 13 partition, which communicates with each guest partition sharing that 55 guest. 61 guest and the service partition that owns the shared SCSI adapter, 62 using a channel between the guest and the service partition. The disks 64 and enforced by the service partition, while the guest driver handles 66 whole to a guest. Sharing the bus adapter in this way provides 74 guest by proxying buffer information between the guest and the service 76 between the guest and the service partition. The connectivity of this 77 interface with the shared interface and possibly other guest [all …]
|
D | proc-entries.txt | 19 guest can be considered running and is shown as running in the s-Par 74 read/write, however, the guest can only reset them to 0, or report an 91 /proc/visorchipset/partition: This directory contains the guest
|
/linux-4.1.27/drivers/staging/unisys/Documentation/ABI/ |
D | sysfs-platform-visorchipset | 27 the previous guest boot) has no effect. 35 this guest. Setting the flag will cause the guest to boot from 46 action to perform on the next guest boot-up. The meaning of the 48 commission the guest. 51 What: guest/chipsetready 55 Description: This entry is used by Unisys application software on the guest 58 guest to operate correctly. The interface accepts one of two 70 guest, and triggered by a udev event. The support script is 72 PF device is being recovered in another guest. 89 guest, and triggered by a udev event. The support script is [all …]
|
/linux-4.1.27/tools/virtio/virtio-trace/ |
D | README | 4 Trace agent is a user tool for sending trace data of a guest to a Host in low 48 For example, if a guest use three CPUs, the names are 83 example, if a guest use three CPUs, chardev names should be trace-path-cpu0, 86 3) Boot the guest 87 You can find some chardev in /dev/virtio-ports/ in the guest. 93 0) Build trace agent in a guest 96 1) Enable ftrace in the guest 100 2) Run trace agent in the guest 104 option, trace data are output via stdout in the guest. 109 the guest will stop by specification of chardev in QEMU. This blocking mode may [all …]
|
/linux-4.1.27/arch/powerpc/kvm/ |
D | Kconfig | 53 Support running unmodified book3s_32 guest kernels 68 Support running unmodified book3s_64 and book3s_32 guest kernels 83 Support running unmodified book3s_64 guest kernels in 89 guest operating systems will run at full hardware speed 102 Support running guest kernels in virtual machines on processors 104 guest in user mode (problem state) and emulating all 117 Calculate time taken for each vcpu in the real-mode guest entry, 118 exit, and interrupt handling code, plus time spent in the guest 120 in the guest. The total, minimum and maximum times in nanoseconds 148 Support running unmodified E500 guest kernels in virtual machines on [all …]
|
/linux-4.1.27/tools/lguest/ |
D | lguest.txt | 27 - The easiest way to run lguest is to use same kernel as guest and host. 33 "Paravirtualized guest support" = Y 34 "Lguest guest support" = Y 86 inside the guest. 94 eth0 inside the guest at 192.168.19.2. 97 using --tunnet=bridge:<bridgename>, and perhaps run dhcp on the guest 109 Then use --tunnet=bridge:lg0 when launching the guest. 118 /dev/hwrng in the guest that will read from the host's /dev/random. 120 to provide entropy to the guest kernel's /dev/random.
|
/linux-4.1.27/fs/proc/ |
D | stat.c | 85 u64 guest, guest_nice; in show_stat() local 93 guest = guest_nice = 0; in show_stat() 106 guest += kcpustat_cpu(i).cpustat[CPUTIME_GUEST]; in show_stat() 129 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(guest)); in show_stat() 143 guest = kcpustat_cpu(i).cpustat[CPUTIME_GUEST]; in show_stat() 154 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(guest)); in show_stat()
|
/linux-4.1.27/Documentation/devicetree/bindings/arm/ |
D | fw-cfg.txt | 11 registers; their location is communicated to the guest's UEFI firmware in the 12 DTB that QEMU places at the bottom of the guest's DRAM. 14 The guest writes a selector value (a key) to the selector register, and then 16 the selected entry is writable, the guest can rewrite it through the data 27 The interface allows guest firmware to download various parameters and blobs 28 that affect how the firmware works and what tables it installs for the guest 48 The guest kernel is not expected to use these registers (although it is
|
/linux-4.1.27/Documentation/virtual/kvm/devices/ |
D | vm.txt | 25 Clear the CMMA status for all guest pages, so any pages the guest marked 29 Parameters: in attr->addr the address for the new limit of guest memory 32 -E2BIG if the given guest memory is to big for that machine 34 -ENOMEM if not enough memory is available for a new shadow guest mapping 38 the maximum guest memory size. The limit will be rounded up to
|
D | s390_flic.txt | 14 - enable/disable for the guest transparent async page faults 41 interrupts. No interrupts are injected into the guest. 44 Enables async page faults for the guest. So in case of a major page fault 45 the host is allowed to handle this async and continues the guest. 48 Disables async page faults for the guest and waits until already pending 88 perform a gmap translation for the guest address provided in addr,
|
D | arm-vgic.txt | 13 Creating a guest GICv3 device requires a host GICv3 as well. 14 GICv3 implementations with hardware compatibility support allow a guest GICv2 21 Base address in the guest physical address space of the GIC distributor 26 Base address in the guest physical address space of the GIC virtual cpu 31 Base address in the guest physical address space of the GICv3 distributor 36 Base address in the guest physical address space of the GICv3 79 guest. This interface always exposes four register APR[0-3] describing the
|
D | mpic.txt | 21 Access an MPIC register, as if the access were made from the guest.
|
/linux-4.1.27/arch/arm/kvm/ |
D | interrupts.S | 115 @ Store hardware CP15 state and load guest state 122 @ Set FPEXC_EN so the guest doesn't trap floating point instructions 151 @ We're all done, just restore the GPRs and go to the guest 202 @ Store guest CP15 state and restore host state 466 4: pop {r0, r1} @ Failed translation, return to guest 486 @ Switch VFP/NEON hardware state to the guest's
|
D | Makefile | 21 obj-y += arm.o handle_exit.o guest.o mmu.o emulate.o reset.o
|
D | Kconfig | 36 Support hosting virtualized guest machines.
|
D | interrupts_head.S | 235 @ Store other guest registers 551 @ Disallow physical timer access for the guest
|
/linux-4.1.27/arch/mips/kvm/ |
D | 00README.txt | 24 …Linux-3.7-rc2 based SMP guest hangs due to the following code sequence in the generated TLB handle… 26 when we ERET back to the guest. This causes the guest to hang in an infinite loop.
|
D | locore.S | 241 mtc0 k0, CP0_ERROREPC #01: Save guest k0
|
/linux-4.1.27/Documentation/ABI/testing/ |
D | sysfs-driver-pciback | 7 the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest 12 will allow the guest to read and write to the configuration
|
/linux-4.1.27/drivers/media/pci/zoran/ |
D | zoran_device.h | 41 unsigned guest, 45 unsigned guest,
|
D | zoran_device.c | 131 unsigned int guest, in post_office_write() argument 138 ZR36057_POR_PODir | ZR36057_POR_POTime | ((guest & 7) << 20) | in post_office_write() 147 unsigned int guest, in post_office_read() argument 152 por = ZR36057_POR_POTime | ((guest & 7) << 20) | ((reg & 7) << 16); in post_office_read() 169 int i, guest[8]; in dump_guests() local 172 guest[i] = post_office_read(zr, i, 0); in dump_guests() 178 printk(" 0x%02x", guest[i]); in dump_guests() 196 int timeout, i, j, res, guest[8], guest0[8], change[8][3]; in detect_guest_activity() local 203 guest0[i] = guest[i] = post_office_read(zr, i, 0); in detect_guest_activity() 214 if (res != guest[i]) { in detect_guest_activity() [all …]
|
/linux-4.1.27/drivers/vhost/ |
D | Kconfig | 8 guest networking with virtio_net. Not to be confused with virtio_net 9 module itself which needs to be loaded in guest kernel.
|
/linux-4.1.27/arch/x86/xen/ |
D | Kconfig | 6 bool "Xen guest support" 50 bool "Support for running as a PVH guest"
|
/linux-4.1.27/Documentation/s390/ |
D | kvm.txt | 4 prepared that we keep breaking your userspace application and guest 6 your guest kernel, your host kernel, and your userspace launcher are in a 48 at guest absolute address zero and at a user address that is aligned on any 53 doing the guest memory setup. 55 log. This ioctl call is only needed for guest migration, and we intend to 103 This ioctl stores the state of the cpu at the guest real address given as
|
D | monreader.txt | 19 The z/VM guest on which you want to access this API needs to be configured in 38 guest virtual storage around the address range of the DCSS. 49 Your guest virtual storage has to end below the starting address of the DCSS 55 This defines 140MB storage size for your guest, the parameter "mem=160M" is
|
D | 3270.txt | 90 with emulated 3270s, as soon as you dial into your vm guest using the 95 3. Define graphic devices to your vm guest machine, if you 148 dial my-vm-guest-name 152 see instead the line "DIALED TO my-vm-guest-name 0620". 175 "HCPDIA047E my-vm-guest-name 0620 does not exist"?
|
D | Debugging390.txt | 1081 On a SMP guest issue a command to all CPUs try prefixing the command with cpu 1084 If you are running on a guest with several cpus & you have a IO related problem 1479 If you have a guest with certain privileges you may be able to see devices 1494 of another VM guest so he can ftp the logfile back to his own machine. I'll do 1498 SP PRT TO (another vm guest ) or * for the local vm guest 1527 you can alternatively spool it to another readers guest. 1538 ATT <devno range> <guest> 1539 attach a device to guest * for your own guest 1554 2 need to be defined on each guest for the CTC driver to use.
|
/linux-4.1.27/Documentation/tpm/ |
D | xen-tpmfront.txt | 11 The goal of this work is to provide a TPM functionality to a virtual guest 14 system. Each guest gets its own unique, emulated, software TPM. However, each 17 these domains (manager, vTPM, and guest) is trusted, the vTPM subsystem extends 66 * Linux DomU: The Linux based guest that wants to use a vTPM. There may be
|
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/fsl/ |
D | msi-pic.txt | 96 The ATMU is programmed with the guest physical address, and the PAMU 102 be used to cover all of the guest's memory space. 105 subwindow can have its own address mapping ("guest physical" to "true 113 lives). The first subwindow after the end of guest memory is used for
|
/linux-4.1.27/arch/mips/paravirt/ |
D | Platform | 2 # Generic para-virtualized guest.
|
/linux-4.1.27/drivers/misc/vmw_vmci/ |
D | Kconfig | 10 high-speed communication between host and guest in a virtual
|
/linux-4.1.27/arch/x86/lguest/ |
D | Kconfig | 2 bool "Lguest guest support"
|
/linux-4.1.27/drivers/hv/ |
D | Kconfig | 1 menu "Microsoft Hyper-V guest support"
|
/linux-4.1.27/net/9p/ |
D | Kconfig | 23 guest partitions and a host partition.
|
/linux-4.1.27/arch/tile/kvm/ |
D | Kconfig | 26 Support hosting paravirtualized guest machines.
|
/linux-4.1.27/arch/arm64/kvm/ |
D | Makefile | 20 kvm-$(CONFIG_KVM_ARM_HOST) += guest.o reset.o sys_regs.o sys_regs_generic_v8.o
|
D | Kconfig | 34 Support hosting virtualized guest machines.
|
/linux-4.1.27/drivers/s390/net/ |
D | Kconfig | 38 running on the other VM guest. To compile as a module, choose M. 47 from other VM guest systems.
|
/linux-4.1.27/Documentation/networking/ |
D | i40evf.txt | 20 The guest OS loading the i40evf driver must support MSI-X interrupts.
|
D | ixgbevf.txt | 23 The guest OS loading the ixgbevf driver must support MSI-X interrupts.
|
D | vxge.txt | 90 Enable learning the mac address of the guest OS interface in
|
D | igbvf.txt | 25 The guest OS loading the igbvf driver must support MSI-X interrupts.
|
D | ixgbe.txt | 329 with KVM and a Microsoft Windows Server 2008 guest try the following 331 when using qemu to create the KVM guest:
|
/linux-4.1.27/Documentation/w1/masters/ |
D | ds2490 | 57 with a OHCI controller, ds2490 running in the guest would operate 65 reattaching would clear the problem. usbmon output in the guest and
|
/linux-4.1.27/drivers/xen/ |
D | Kconfig | 59 int "Hotplugged memory limit (in GiB) for a PV guest" 66 Maxmium amount of memory (in GiB) that a PV guest can be 69 A PV guest can have more memory than this limit if is 181 devices to appear in the guest. You can choose the default (0) where
|
/linux-4.1.27/tools/ |
D | Makefile | 44 cgroup firewire hv guest usb virtio vm net: FORCE target
|
/linux-4.1.27/arch/s390/kvm/ |
D | Kconfig | 33 Support hosting paravirtualized guest machines using the SIE
|
/linux-4.1.27/arch/x86/include/asm/ |
D | perf_event.h | 266 u64 host, guest; member
|
/linux-4.1.27/tools/testing/ktest/examples/ |
D | README | 19 kvm.conf - A example of a config that is used to test a virtual guest running
|
/linux-4.1.27/tools/testing/selftests/rcutorture/doc/ |
D | rcu-test-image.txt | 2 that contains the filesystem used by the guest-OS kernel. There are
|
/linux-4.1.27/Documentation/ |
D | gdb-kernel-debugging.txt | 32 o Install that kernel on the guest. 56 o Attach to the booted guest:
|
D | intel_txt.txt | 110 guest for the APs. When they run in this guest, they will
|
D | 00-INDEX | 455 - info on Virtual Function I/O used in guest/hypervisor instances.
|
D | kernel-parameters.txt | 1690 kvm.ignore_msrs=[KVM] Ignore guest accesses to unhandled MSRs. 1709 [KVM,Intel] Enable emulation of invalid guest states 1721 [KVM,Intel] Disable unrestricted guest feature 4050 Disables the PV optimizations forcing the HVM guest to 4051 run as generic HVM guest with no PV drivers.
|
/linux-4.1.27/Documentation/ia64/ |
D | xen.txt | 51 Making a disk image for guest OS 86 FYI, virt-manager can also make a disk image for guest OS.
|
/linux-4.1.27/arch/mips/pci/ |
D | Makefile | 25 obj-$(CONFIG_MIPS_PCI_VIRTIO) += pci-virtio-guest.o
|
/linux-4.1.27/drivers/virtio/ |
D | Kconfig | 47 of memory within a KVM guest.
|
/linux-4.1.27/drivers/gpu/drm/vmwgfx/ |
D | vmwgfx_surface.c | 269 body->guest.ptr = *ptr; in vmw_surface_dma_encode() 270 body->guest.ptr.offset += cur_offset->bo_offset; in vmw_surface_dma_encode() 271 body->guest.pitch = svga3dsurface_calculate_pitch(desc, in vmw_surface_dma_encode() 291 body->guest.pitch); in vmw_surface_dma_encode()
|
D | vmwgfx_kms.c | 327 if (cmd->dma.guest.ptr.offset % PAGE_SIZE || in vmw_kms_cursor_snoop() 339 cmd->dma.guest.ptr.offset); in vmw_kms_cursor_snoop() 343 kmap_offset = cmd->dma.guest.ptr.offset >> PAGE_SHIFT; in vmw_kms_cursor_snoop() 358 if (box->w == 64 && cmd->dma.guest.pitch == 64*4) { in vmw_kms_cursor_snoop() 364 virtual + i * cmd->dma.guest.pitch, in vmw_kms_cursor_snoop()
|
D | vmwgfx_execbuf.c | 1249 &cmd->dma.guest.ptr, in vmw_cmd_dma() 1256 if (unlikely(cmd->dma.guest.ptr.offset > bo_size)) { in vmw_cmd_dma() 1261 bo_size -= cmd->dma.guest.ptr.offset; in vmw_cmd_dma()
|
D | svga3d_reg.h | 1539 SVGA3dGuestImage guest; member
|
/linux-4.1.27/arch/x86/kvm/ |
D | Kconfig | 46 Support hosting fully virtualized guest machines using hardware
|
D | vmx.c | 498 struct vmx_msr_entry guest[NR_AUTOLOAD_MSRS]; member 1625 if (m->guest[i].index == msr) in clear_atomic_switch_msr() 1631 m->guest[i] = m->guest[m->nr]; in clear_atomic_switch_msr() 1687 if (m->guest[i].index == msr) in add_atomic_switch_msr() 1700 m->guest[i].index = msr; in add_atomic_switch_msr() 1701 m->guest[i].value = guest_val; in add_atomic_switch_msr() 4686 vmcs_write64(VM_ENTRY_MSR_LOAD_ADDR, __pa(vmx->msr_autoload.guest)); in vmx_vcpu_setup() 8159 if (msrs[i].host == msrs[i].guest) in atomic_switch_perf_msrs() 8162 add_atomic_switch_msr(vmx, msrs[i].msr, msrs[i].guest, in atomic_switch_perf_msrs()
|
/linux-4.1.27/Documentation/hwmon/ |
D | amc6821 | 11 Tomaz Mertelj <tomaz.mertelj@guest.arnes.si>
|
/linux-4.1.27/arch/s390/kernel/ |
D | entry.S | 998 stg %r3,__SF_EMPTY+8(%r15) # save guest register save area 1000 lmg %r0,%r13,0(%r3) # load guest gprs 0-13 1010 LPP __SF_EMPTY(%r15) # set guest id 1025 lg %r14,__SF_EMPTY+8(%r15) # load guest register save area 1026 stmg %r0,%r13,0(%r14) # save guest gprs 0-13
|
/linux-4.1.27/drivers/pci/ |
D | Kconfig | 57 when it is going to be assigned to a guest operating system.
|
/linux-4.1.27/Documentation/vm/ |
D | zswap.txt | 21 impact to the guest workload and guests sharing the I/O subsystem
|
D | frontswap.txt | 109 optimize RAM utilization. And when guest OS's are induced to surrender 223 Similarly, a KVM guest-side implementation could do in-guest compression
|
D | hwpoison.txt | 44 KVM can inject the machine check into the guest with the proper
|
D | transhuge.txt | 31 TLB can be mapped of larger size only if both KVM and the Linux guest 49 immediately in the buddy or through the VM), guest physical memory
|
D | cleancache.txt | 129 optimize RAM utilization. And when guest OS's are induced to surrender
|
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/fsl/cpm_qe/ |
D | qe.txt | 76 the hypervisor to the guest.
|
/linux-4.1.27/arch/x86/kernel/cpu/ |
D | perf_event_intel.c | 2353 arr[0].guest = x86_pmu.intel_ctrl & ~cpuc->intel_ctrl_host_mask; in intel_guest_get_msrs() 2361 arr[1].guest = 0; in intel_guest_get_msrs() 2377 arr[idx].host = arr[idx].guest = 0; in core_guest_get_msrs() 2382 arr[idx].host = arr[idx].guest = in core_guest_get_msrs() 2388 arr[idx].guest &= ~ARCH_PERFMON_EVENTSEL_ENABLE; in core_guest_get_msrs()
|
/linux-4.1.27/arch/powerpc/platforms/85xx/ |
D | Kconfig | 256 This option enables support for running as a QEMU guest using
|
/linux-4.1.27/arch/s390/ |
D | Kconfig | 697 will be reused by VM for other guest systems. The interface 795 Select this option if you want to run the kernel as a guest under
|
/linux-4.1.27/drivers/misc/ |
D | Kconfig | 411 by reserving them in the guest and invalidating them in the 414 to allow the guest to use more physical memory.
|
/linux-4.1.27/arch/mips/ |
D | Kconfig | 907 bool "Para-Virtualized guest system" 923 This option supports guest running under ???? 1973 Select this option if building a guest kernel for KVM (Trap & Emulate) mode 1980 Set this to non-zero if building a guest kernel for KVM to skip RTC 1981 emulation when determining guest CPU Frequency. Instead, the guest's
|
/linux-4.1.27/mm/ |
D | Kconfig | 247 used within a guest, thus imposing performance penalties associated 249 by the guest workload. Allowing the compaction & migration for memory
|
/linux-4.1.27/arch/tile/ |
D | Kconfig | 391 or as a KVM guest, you must run at PL1. (The current
|
/linux-4.1.27/Documentation/filesystems/ |
D | proc.txt | 321 gtime guest time of the task in jiffies 322 cgtime guest time of the task children in jiffies 1288 - guest: running a normal guest 1289 - guest_nice: running a niced guest
|
/linux-4.1.27/drivers/net/ |
D | Kconfig | 348 If you are compiling a kernel for use as Xen guest, you
|
/linux-4.1.27/Documentation/sysctl/ |
D | kernel.txt | 433 The NMI watchdog is disabled by default if the kernel is running as a guest 438 to the guest kernel command line (see Documentation/kernel-parameters.txt).
|
/linux-4.1.27/arch/ia64/ |
D | Kconfig | 141 bool "Paravirtualized guest support"
|
/linux-4.1.27/arch/arm64/ |
D | Kconfig | 601 bool "Xen guest support on ARM64"
|
/linux-4.1.27/arch/x86/ |
D | Kconfig | 640 bool "Linux guest support" 647 disabled, and Linux guest support won't be built in. 691 underlying device model, the host provides the guest with 699 This option enables collection of various statistics for KVM guest.
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | README | 382 guest Although ignored by the kernel component, the mount.cifs 384 if guest is specified on the mount options. If no
|
D | CHANGES | 60 are authenticated as guest, as reconnections, invalidating the earlier
|
/linux-4.1.27/tools/perf/util/ |
D | evsel.c | 305 MOD_PRINT(guest, 'G'); in perf_evsel__add_modifiers()
|
/linux-4.1.27/drivers/char/ |
D | Kconfig | 165 transfer between the guest and host. Character devices at
|
/linux-4.1.27/drivers/platform/x86/ |
D | Kconfig | 886 (guest) communicate panic events to the host.
|
/linux-4.1.27/drivers/scsi/ |
D | Kconfig | 595 within another guest OS (usually Dom0). 596 Only needed if the kernel is running in a XEN guest and generic
|
/linux-4.1.27/drivers/watchdog/ |
D | Kconfig | 1374 provide a virtual watchdog timer to their guest that cause a
|
/linux-4.1.27/arch/arm/ |
D | Kconfig | 1759 bool "Xen guest support on ARM"
|
/linux-4.1.27/Documentation/sound/alsa/ |
D | ALSA-Configuration.txt | 1808 my guest. Remember, the idea is to get a number that causes us
|
/linux-4.1.27/Documentation/RCU/ |
D | RTFP.txt | 2443 Use of RCU permits KVM to increase the size of guest OSes from
|