Home
last modified time | relevance | path

Searched refs:guest (Results 1 – 109 of 109) sorted by relevance

/linux-4.1.27/tools/perf/Documentation/
Dperf-kvm.txt6 perf-kvm - Tool to trace/measure kvm guest os
11 'perf kvm' [--host] [--guest] [--guestmount=<path>
14 'perf kvm' [--host] [--guest] [--guestkallsyms=<path> --guestmodules=<path>
23 a performance counter profile of guest os in realtime
28 default behavior of perf kvm as --guest, so if neither --host nor --guest
29 is input, the perf data file name is perf.data.guest. If --host is input,
31 perf.data.host, please input --host --no-guest. The behaviors are shown as
33 Default('') -> perf.data.guest
35 --guest -> perf.data.guest
36 --host --guest -> perf.data.kvm
[all …]
Dperf-list.txt30 G - guest counting (in KVM guests)
70 registers: event, umask, edge, inv, cmask. Esp. guest/host only and
Dperf-report.txt91 on guest machine
93 guest machine
/linux-4.1.27/Documentation/virtual/kvm/
Dmmu.txt5 for presenting a standard x86 mmu to the guest, while translating guest
10 - correctness: the guest should not be able to determine that it is running
14 - security: the guest must not be able to touch host memory not assigned
19 - integration: Linux memory management code must be in control of guest memory
22 - dirty tracking: report writes to guest memory to enable live migration
34 gfn guest frame number
35 gpa guest physical address
36 gva guest virtual address
37 ngpa nested guest physical address
38 ngva nested guest virtual address
[all …]
Dmsr.txt19 in guest RAM. This memory is expected to hold a copy of the following
33 version: guest has to check version before and after grabbing
53 guest RAM, plus an enable bit in bit 0. This memory is expected to hold
75 version: guest has to check version before and after grabbing
110 coordinated between the guest and the hypervisor. Availability
120 | | guest vcpu has been paused by
168 64 byte memory area which must be in guest RAM and must be
182 fault guest must reset the reason to 0 before it does
188 be used to notify a guest when missing page becomes
199 type 1 was, but guest should not rely on that.
[all …]
Dreview-checklist.txt29 10. User/kernel interfaces and guest/host interfaces must be 64-bit clean
33 11. New guest visible features must either be documented in a hardware manual
37 host/guest memory must be unshared to prevent the host from writing to
38 guest memory that the guest has not reserved for this purpose.
Dhypercalls.txt43 Purpose: Trigger guest exit so that the host can check for pending
57 Purpose: Expose hypercall availability to the guest. On x86 platforms, cpuid
66 Purpose: To enable communication between the hypervisor and guest there is a
68 The guest can map this shared page to access its supervisor register through
76 Usage example : A vcpu of a paravirtualized guest that is busywaiting in guest
81 same guest can wakeup the sleeping vcpu by issuing KVM_HC_KICK_CPU hypercall,
Dcpuid.txt5 A guest running on a kvm host, can check some of its features using
8 a guest.
53 KVM_FEATURE_PV_UNHALT || 7 || guest checks this feature bit
57 KVM_FEATURE_CLOCKSOURCE_STABLE_BIT || 24 || host will warn if no guest-side
Dnested-vmx.txt8 to easily and efficiently run guest operating systems. Normally, these guests
12 The "Nested VMX" feature adds this missing capability - of running guest
14 allowing a guest to use VMX instructions, and correctly and efficiently
30 L0, the guest hypervisor, which we call L1, and its nested guest, which we
38 Only 64-bit guest hypervisors are supported.
40 Additional patches for running Windows under guest KVM, and Linux under
41 guest VMware server, and support for nested EPT, are currently running in
64 implementation for the a guest hypervisor to use. As such, the official
Dppc-pv.txt66 To enable communication between the hypervisor and guest there is a new shared
67 page that contains parts of supervisor visible register state. The guest can
70 With this hypercall issued the guest always gets the magic page mapped at the
91 a second return value is passed to the guest. This second return value contains
106 feature we also have a channel for a guest to tell the guest whether it's capable
111 The following flags are currently available for a guest to expose:
120 when entering the guest or don't have any impact on the hypervisor's behavior.
122 The following bits are safe to be set inside the guest:
137 guest. Implementing any of those mappings is optional, as the instruction traps
Dapi.txt38 actually running guest code.
115 corresponds to guest physical address zero. Use of mmap() on a VM fd
141 This ioctl returns the guest msrs that are supported. The list varies
223 Userspace can control the threading (SMT) mode of the guest by its
225 single-threaded guest vcpus, it should make all vcpu ids be a multiple
279 This ioctl is used to run a guest virtual cpu. While there are no
421 This injects an edge type external interrupt into the guest once it's ready
432 This injects a level type external interrupt into the guest context. The
650 should not present interrupts to the guest as active-low unless this
734 Sets the MSR that the Xen HVM guest uses to initialize its hypercall
[all …]
Dlocking.txt14 Fast page fault is the fast path which fixes the guest page fault out of
23 the gfn is writable on guest mmu and it is not write-protected by shadow
52 gfn2 by the guest:
Dtimekeeping.txt20 division of time beyond the control of the guest CPU.
339 allows the guest visible TSC to be offset by a constant. Newer implementations
482 be able to deliver the proper number of interrupts per second, and so guest
491 additional interrupts into the guest in order to increase the effective
493 where host load or guest lag is too much to compensate for, and thus another
494 solution to the problem has risen: the guest may need to become aware of lost
555 delivered, and after which, the guest time may need to be caught up. NTP may
563 faster clock cannot be made visible to a guest without the potential of time
566 simply storing multipliers and offsets against the TSC for the guest to convert
574 distributed, but in contrived as well as real scenarios (guest device access,
[all …]
Ds390-diag.txt15 DIAGNOSE calls by the guest cause a mandatory intercept. This implies
/linux-4.1.27/drivers/staging/unisys/Documentation/
Doverview.txt9 allow guest partitions on the same server to share devices that would
13 partition, which communicates with each guest partition sharing that
55 guest.
61 guest and the service partition that owns the shared SCSI adapter,
62 using a channel between the guest and the service partition. The disks
64 and enforced by the service partition, while the guest driver handles
66 whole to a guest. Sharing the bus adapter in this way provides
74 guest by proxying buffer information between the guest and the service
76 between the guest and the service partition. The connectivity of this
77 interface with the shared interface and possibly other guest
[all …]
Dproc-entries.txt19 guest can be considered running and is shown as running in the s-Par
74 read/write, however, the guest can only reset them to 0, or report an
91 /proc/visorchipset/partition: This directory contains the guest
/linux-4.1.27/drivers/staging/unisys/Documentation/ABI/
Dsysfs-platform-visorchipset27 the previous guest boot) has no effect.
35 this guest. Setting the flag will cause the guest to boot from
46 action to perform on the next guest boot-up. The meaning of the
48 commission the guest.
51 What: guest/chipsetready
55 Description: This entry is used by Unisys application software on the guest
58 guest to operate correctly. The interface accepts one of two
70 guest, and triggered by a udev event. The support script is
72 PF device is being recovered in another guest.
89 guest, and triggered by a udev event. The support script is
[all …]
/linux-4.1.27/tools/virtio/virtio-trace/
DREADME4 Trace agent is a user tool for sending trace data of a guest to a Host in low
48 For example, if a guest use three CPUs, the names are
83 example, if a guest use three CPUs, chardev names should be trace-path-cpu0,
86 3) Boot the guest
87 You can find some chardev in /dev/virtio-ports/ in the guest.
93 0) Build trace agent in a guest
96 1) Enable ftrace in the guest
100 2) Run trace agent in the guest
104 option, trace data are output via stdout in the guest.
109 the guest will stop by specification of chardev in QEMU. This blocking mode may
[all …]
/linux-4.1.27/arch/powerpc/kvm/
DKconfig53 Support running unmodified book3s_32 guest kernels
68 Support running unmodified book3s_64 and book3s_32 guest kernels
83 Support running unmodified book3s_64 guest kernels in
89 guest operating systems will run at full hardware speed
102 Support running guest kernels in virtual machines on processors
104 guest in user mode (problem state) and emulating all
117 Calculate time taken for each vcpu in the real-mode guest entry,
118 exit, and interrupt handling code, plus time spent in the guest
120 in the guest. The total, minimum and maximum times in nanoseconds
148 Support running unmodified E500 guest kernels in virtual machines on
[all …]
/linux-4.1.27/tools/lguest/
Dlguest.txt27 - The easiest way to run lguest is to use same kernel as guest and host.
33 "Paravirtualized guest support" = Y
34 "Lguest guest support" = Y
86 inside the guest.
94 eth0 inside the guest at 192.168.19.2.
97 using --tunnet=bridge:<bridgename>, and perhaps run dhcp on the guest
109 Then use --tunnet=bridge:lg0 when launching the guest.
118 /dev/hwrng in the guest that will read from the host's /dev/random.
120 to provide entropy to the guest kernel's /dev/random.
/linux-4.1.27/fs/proc/
Dstat.c85 u64 guest, guest_nice; in show_stat() local
93 guest = guest_nice = 0; in show_stat()
106 guest += kcpustat_cpu(i).cpustat[CPUTIME_GUEST]; in show_stat()
129 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(guest)); in show_stat()
143 guest = kcpustat_cpu(i).cpustat[CPUTIME_GUEST]; in show_stat()
154 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(guest)); in show_stat()
/linux-4.1.27/Documentation/devicetree/bindings/arm/
Dfw-cfg.txt11 registers; their location is communicated to the guest's UEFI firmware in the
12 DTB that QEMU places at the bottom of the guest's DRAM.
14 The guest writes a selector value (a key) to the selector register, and then
16 the selected entry is writable, the guest can rewrite it through the data
27 The interface allows guest firmware to download various parameters and blobs
28 that affect how the firmware works and what tables it installs for the guest
48 The guest kernel is not expected to use these registers (although it is
/linux-4.1.27/Documentation/virtual/kvm/devices/
Dvm.txt25 Clear the CMMA status for all guest pages, so any pages the guest marked
29 Parameters: in attr->addr the address for the new limit of guest memory
32 -E2BIG if the given guest memory is to big for that machine
34 -ENOMEM if not enough memory is available for a new shadow guest mapping
38 the maximum guest memory size. The limit will be rounded up to
Ds390_flic.txt14 - enable/disable for the guest transparent async page faults
41 interrupts. No interrupts are injected into the guest.
44 Enables async page faults for the guest. So in case of a major page fault
45 the host is allowed to handle this async and continues the guest.
48 Disables async page faults for the guest and waits until already pending
88 perform a gmap translation for the guest address provided in addr,
Darm-vgic.txt13 Creating a guest GICv3 device requires a host GICv3 as well.
14 GICv3 implementations with hardware compatibility support allow a guest GICv2
21 Base address in the guest physical address space of the GIC distributor
26 Base address in the guest physical address space of the GIC virtual cpu
31 Base address in the guest physical address space of the GICv3 distributor
36 Base address in the guest physical address space of the GICv3
79 guest. This interface always exposes four register APR[0-3] describing the
Dmpic.txt21 Access an MPIC register, as if the access were made from the guest.
/linux-4.1.27/arch/arm/kvm/
Dinterrupts.S115 @ Store hardware CP15 state and load guest state
122 @ Set FPEXC_EN so the guest doesn't trap floating point instructions
151 @ We're all done, just restore the GPRs and go to the guest
202 @ Store guest CP15 state and restore host state
466 4: pop {r0, r1} @ Failed translation, return to guest
486 @ Switch VFP/NEON hardware state to the guest's
DMakefile21 obj-y += arm.o handle_exit.o guest.o mmu.o emulate.o reset.o
DKconfig36 Support hosting virtualized guest machines.
Dinterrupts_head.S235 @ Store other guest registers
551 @ Disallow physical timer access for the guest
/linux-4.1.27/arch/mips/kvm/
D00README.txt24 …Linux-3.7-rc2 based SMP guest hangs due to the following code sequence in the generated TLB handle…
26 when we ERET back to the guest. This causes the guest to hang in an infinite loop.
Dlocore.S241 mtc0 k0, CP0_ERROREPC #01: Save guest k0
/linux-4.1.27/Documentation/ABI/testing/
Dsysfs-driver-pciback7 the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest
12 will allow the guest to read and write to the configuration
/linux-4.1.27/drivers/media/pci/zoran/
Dzoran_device.h41 unsigned guest,
45 unsigned guest,
Dzoran_device.c131 unsigned int guest, in post_office_write() argument
138 ZR36057_POR_PODir | ZR36057_POR_POTime | ((guest & 7) << 20) | in post_office_write()
147 unsigned int guest, in post_office_read() argument
152 por = ZR36057_POR_POTime | ((guest & 7) << 20) | ((reg & 7) << 16); in post_office_read()
169 int i, guest[8]; in dump_guests() local
172 guest[i] = post_office_read(zr, i, 0); in dump_guests()
178 printk(" 0x%02x", guest[i]); in dump_guests()
196 int timeout, i, j, res, guest[8], guest0[8], change[8][3]; in detect_guest_activity() local
203 guest0[i] = guest[i] = post_office_read(zr, i, 0); in detect_guest_activity()
214 if (res != guest[i]) { in detect_guest_activity()
[all …]
/linux-4.1.27/drivers/vhost/
DKconfig8 guest networking with virtio_net. Not to be confused with virtio_net
9 module itself which needs to be loaded in guest kernel.
/linux-4.1.27/arch/x86/xen/
DKconfig6 bool "Xen guest support"
50 bool "Support for running as a PVH guest"
/linux-4.1.27/Documentation/s390/
Dkvm.txt4 prepared that we keep breaking your userspace application and guest
6 your guest kernel, your host kernel, and your userspace launcher are in a
48 at guest absolute address zero and at a user address that is aligned on any
53 doing the guest memory setup.
55 log. This ioctl call is only needed for guest migration, and we intend to
103 This ioctl stores the state of the cpu at the guest real address given as
Dmonreader.txt19 The z/VM guest on which you want to access this API needs to be configured in
38 guest virtual storage around the address range of the DCSS.
49 Your guest virtual storage has to end below the starting address of the DCSS
55 This defines 140MB storage size for your guest, the parameter "mem=160M" is
D3270.txt90 with emulated 3270s, as soon as you dial into your vm guest using the
95 3. Define graphic devices to your vm guest machine, if you
148 dial my-vm-guest-name
152 see instead the line "DIALED TO my-vm-guest-name 0620".
175 "HCPDIA047E my-vm-guest-name 0620 does not exist"?
DDebugging390.txt1081 On a SMP guest issue a command to all CPUs try prefixing the command with cpu
1084 If you are running on a guest with several cpus & you have a IO related problem
1479 If you have a guest with certain privileges you may be able to see devices
1494 of another VM guest so he can ftp the logfile back to his own machine. I'll do
1498 SP PRT TO (another vm guest ) or * for the local vm guest
1527 you can alternatively spool it to another readers guest.
1538 ATT <devno range> <guest>
1539 attach a device to guest * for your own guest
1554 2 need to be defined on each guest for the CTC driver to use.
/linux-4.1.27/Documentation/tpm/
Dxen-tpmfront.txt11 The goal of this work is to provide a TPM functionality to a virtual guest
14 system. Each guest gets its own unique, emulated, software TPM. However, each
17 these domains (manager, vTPM, and guest) is trusted, the vTPM subsystem extends
66 * Linux DomU: The Linux based guest that wants to use a vTPM. There may be
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/fsl/
Dmsi-pic.txt96 The ATMU is programmed with the guest physical address, and the PAMU
102 be used to cover all of the guest's memory space.
105 subwindow can have its own address mapping ("guest physical" to "true
113 lives). The first subwindow after the end of guest memory is used for
/linux-4.1.27/arch/mips/paravirt/
DPlatform2 # Generic para-virtualized guest.
/linux-4.1.27/drivers/misc/vmw_vmci/
DKconfig10 high-speed communication between host and guest in a virtual
/linux-4.1.27/arch/x86/lguest/
DKconfig2 bool "Lguest guest support"
/linux-4.1.27/drivers/hv/
DKconfig1 menu "Microsoft Hyper-V guest support"
/linux-4.1.27/net/9p/
DKconfig23 guest partitions and a host partition.
/linux-4.1.27/arch/tile/kvm/
DKconfig26 Support hosting paravirtualized guest machines.
/linux-4.1.27/arch/arm64/kvm/
DMakefile20 kvm-$(CONFIG_KVM_ARM_HOST) += guest.o reset.o sys_regs.o sys_regs_generic_v8.o
DKconfig34 Support hosting virtualized guest machines.
/linux-4.1.27/drivers/s390/net/
DKconfig38 running on the other VM guest. To compile as a module, choose M.
47 from other VM guest systems.
/linux-4.1.27/Documentation/networking/
Di40evf.txt20 The guest OS loading the i40evf driver must support MSI-X interrupts.
Dixgbevf.txt23 The guest OS loading the ixgbevf driver must support MSI-X interrupts.
Dvxge.txt90 Enable learning the mac address of the guest OS interface in
Digbvf.txt25 The guest OS loading the igbvf driver must support MSI-X interrupts.
Dixgbe.txt329 with KVM and a Microsoft Windows Server 2008 guest try the following
331 when using qemu to create the KVM guest:
/linux-4.1.27/Documentation/w1/masters/
Dds249057 with a OHCI controller, ds2490 running in the guest would operate
65 reattaching would clear the problem. usbmon output in the guest and
/linux-4.1.27/drivers/xen/
DKconfig59 int "Hotplugged memory limit (in GiB) for a PV guest"
66 Maxmium amount of memory (in GiB) that a PV guest can be
69 A PV guest can have more memory than this limit if is
181 devices to appear in the guest. You can choose the default (0) where
/linux-4.1.27/tools/
DMakefile44 cgroup firewire hv guest usb virtio vm net: FORCE target
/linux-4.1.27/arch/s390/kvm/
DKconfig33 Support hosting paravirtualized guest machines using the SIE
/linux-4.1.27/arch/x86/include/asm/
Dperf_event.h266 u64 host, guest; member
/linux-4.1.27/tools/testing/ktest/examples/
DREADME19 kvm.conf - A example of a config that is used to test a virtual guest running
/linux-4.1.27/tools/testing/selftests/rcutorture/doc/
Drcu-test-image.txt2 that contains the filesystem used by the guest-OS kernel. There are
/linux-4.1.27/Documentation/
Dgdb-kernel-debugging.txt32 o Install that kernel on the guest.
56 o Attach to the booted guest:
Dintel_txt.txt110 guest for the APs. When they run in this guest, they will
D00-INDEX455 - info on Virtual Function I/O used in guest/hypervisor instances.
Dkernel-parameters.txt1690 kvm.ignore_msrs=[KVM] Ignore guest accesses to unhandled MSRs.
1709 [KVM,Intel] Enable emulation of invalid guest states
1721 [KVM,Intel] Disable unrestricted guest feature
4050 Disables the PV optimizations forcing the HVM guest to
4051 run as generic HVM guest with no PV drivers.
/linux-4.1.27/Documentation/ia64/
Dxen.txt51 Making a disk image for guest OS
86 FYI, virt-manager can also make a disk image for guest OS.
/linux-4.1.27/arch/mips/pci/
DMakefile25 obj-$(CONFIG_MIPS_PCI_VIRTIO) += pci-virtio-guest.o
/linux-4.1.27/drivers/virtio/
DKconfig47 of memory within a KVM guest.
/linux-4.1.27/drivers/gpu/drm/vmwgfx/
Dvmwgfx_surface.c269 body->guest.ptr = *ptr; in vmw_surface_dma_encode()
270 body->guest.ptr.offset += cur_offset->bo_offset; in vmw_surface_dma_encode()
271 body->guest.pitch = svga3dsurface_calculate_pitch(desc, in vmw_surface_dma_encode()
291 body->guest.pitch); in vmw_surface_dma_encode()
Dvmwgfx_kms.c327 if (cmd->dma.guest.ptr.offset % PAGE_SIZE || in vmw_kms_cursor_snoop()
339 cmd->dma.guest.ptr.offset); in vmw_kms_cursor_snoop()
343 kmap_offset = cmd->dma.guest.ptr.offset >> PAGE_SHIFT; in vmw_kms_cursor_snoop()
358 if (box->w == 64 && cmd->dma.guest.pitch == 64*4) { in vmw_kms_cursor_snoop()
364 virtual + i * cmd->dma.guest.pitch, in vmw_kms_cursor_snoop()
Dvmwgfx_execbuf.c1249 &cmd->dma.guest.ptr, in vmw_cmd_dma()
1256 if (unlikely(cmd->dma.guest.ptr.offset > bo_size)) { in vmw_cmd_dma()
1261 bo_size -= cmd->dma.guest.ptr.offset; in vmw_cmd_dma()
Dsvga3d_reg.h1539 SVGA3dGuestImage guest; member
/linux-4.1.27/arch/x86/kvm/
DKconfig46 Support hosting fully virtualized guest machines using hardware
Dvmx.c498 struct vmx_msr_entry guest[NR_AUTOLOAD_MSRS]; member
1625 if (m->guest[i].index == msr) in clear_atomic_switch_msr()
1631 m->guest[i] = m->guest[m->nr]; in clear_atomic_switch_msr()
1687 if (m->guest[i].index == msr) in add_atomic_switch_msr()
1700 m->guest[i].index = msr; in add_atomic_switch_msr()
1701 m->guest[i].value = guest_val; in add_atomic_switch_msr()
4686 vmcs_write64(VM_ENTRY_MSR_LOAD_ADDR, __pa(vmx->msr_autoload.guest)); in vmx_vcpu_setup()
8159 if (msrs[i].host == msrs[i].guest) in atomic_switch_perf_msrs()
8162 add_atomic_switch_msr(vmx, msrs[i].msr, msrs[i].guest, in atomic_switch_perf_msrs()
/linux-4.1.27/Documentation/hwmon/
Damc682111 Tomaz Mertelj <tomaz.mertelj@guest.arnes.si>
/linux-4.1.27/arch/s390/kernel/
Dentry.S998 stg %r3,__SF_EMPTY+8(%r15) # save guest register save area
1000 lmg %r0,%r13,0(%r3) # load guest gprs 0-13
1010 LPP __SF_EMPTY(%r15) # set guest id
1025 lg %r14,__SF_EMPTY+8(%r15) # load guest register save area
1026 stmg %r0,%r13,0(%r14) # save guest gprs 0-13
/linux-4.1.27/drivers/pci/
DKconfig57 when it is going to be assigned to a guest operating system.
/linux-4.1.27/Documentation/vm/
Dzswap.txt21 impact to the guest workload and guests sharing the I/O subsystem
Dfrontswap.txt109 optimize RAM utilization. And when guest OS's are induced to surrender
223 Similarly, a KVM guest-side implementation could do in-guest compression
Dhwpoison.txt44 KVM can inject the machine check into the guest with the proper
Dtranshuge.txt31 TLB can be mapped of larger size only if both KVM and the Linux guest
49 immediately in the buddy or through the VM), guest physical memory
Dcleancache.txt129 optimize RAM utilization. And when guest OS's are induced to surrender
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/fsl/cpm_qe/
Dqe.txt76 the hypervisor to the guest.
/linux-4.1.27/arch/x86/kernel/cpu/
Dperf_event_intel.c2353 arr[0].guest = x86_pmu.intel_ctrl & ~cpuc->intel_ctrl_host_mask; in intel_guest_get_msrs()
2361 arr[1].guest = 0; in intel_guest_get_msrs()
2377 arr[idx].host = arr[idx].guest = 0; in core_guest_get_msrs()
2382 arr[idx].host = arr[idx].guest = in core_guest_get_msrs()
2388 arr[idx].guest &= ~ARCH_PERFMON_EVENTSEL_ENABLE; in core_guest_get_msrs()
/linux-4.1.27/arch/powerpc/platforms/85xx/
DKconfig256 This option enables support for running as a QEMU guest using
/linux-4.1.27/arch/s390/
DKconfig697 will be reused by VM for other guest systems. The interface
795 Select this option if you want to run the kernel as a guest under
/linux-4.1.27/drivers/misc/
DKconfig411 by reserving them in the guest and invalidating them in the
414 to allow the guest to use more physical memory.
/linux-4.1.27/arch/mips/
DKconfig907 bool "Para-Virtualized guest system"
923 This option supports guest running under ????
1973 Select this option if building a guest kernel for KVM (Trap & Emulate) mode
1980 Set this to non-zero if building a guest kernel for KVM to skip RTC
1981 emulation when determining guest CPU Frequency. Instead, the guest's
/linux-4.1.27/mm/
DKconfig247 used within a guest, thus imposing performance penalties associated
249 by the guest workload. Allowing the compaction & migration for memory
/linux-4.1.27/arch/tile/
DKconfig391 or as a KVM guest, you must run at PL1. (The current
/linux-4.1.27/Documentation/filesystems/
Dproc.txt321 gtime guest time of the task in jiffies
322 cgtime guest time of the task children in jiffies
1288 - guest: running a normal guest
1289 - guest_nice: running a niced guest
/linux-4.1.27/drivers/net/
DKconfig348 If you are compiling a kernel for use as Xen guest, you
/linux-4.1.27/Documentation/sysctl/
Dkernel.txt433 The NMI watchdog is disabled by default if the kernel is running as a guest
438 to the guest kernel command line (see Documentation/kernel-parameters.txt).
/linux-4.1.27/arch/ia64/
DKconfig141 bool "Paravirtualized guest support"
/linux-4.1.27/arch/arm64/
DKconfig601 bool "Xen guest support on ARM64"
/linux-4.1.27/arch/x86/
DKconfig640 bool "Linux guest support"
647 disabled, and Linux guest support won't be built in.
691 underlying device model, the host provides the guest with
699 This option enables collection of various statistics for KVM guest.
/linux-4.1.27/Documentation/filesystems/cifs/
DREADME382 guest Although ignored by the kernel component, the mount.cifs
384 if guest is specified on the mount options. If no
DCHANGES60 are authenticated as guest, as reconnections, invalidating the earlier
/linux-4.1.27/tools/perf/util/
Devsel.c305 MOD_PRINT(guest, 'G'); in perf_evsel__add_modifiers()
/linux-4.1.27/drivers/char/
DKconfig165 transfer between the guest and host. Character devices at
/linux-4.1.27/drivers/platform/x86/
DKconfig886 (guest) communicate panic events to the host.
/linux-4.1.27/drivers/scsi/
DKconfig595 within another guest OS (usually Dom0).
596 Only needed if the kernel is running in a XEN guest and generic
/linux-4.1.27/drivers/watchdog/
DKconfig1374 provide a virtual watchdog timer to their guest that cause a
/linux-4.1.27/arch/arm/
DKconfig1759 bool "Xen guest support on ARM"
/linux-4.1.27/Documentation/sound/alsa/
DALSA-Configuration.txt1808 my guest. Remember, the idea is to get a number that causes us
/linux-4.1.27/Documentation/RCU/
DRTFP.txt2443 Use of RCU permits KVM to increase the size of guest OSes from