| /linux-6.15/Documentation/translations/zh_CN/mm/ |
| H A D | page_migration.rst | 129 为了克服这个问题,VM支持非LRU页面迁移,它为非LRU可移动页面提供了通用函数,而在迁移 137 VM对驱动的isolate_page()函数的期望是,如果驱动成功隔离了该页,则返回*true*。 138 返回true后,VM会将该页标记为PG_isolated,这样多个CPU的并发隔离就会跳过该 141 一旦页面被成功隔离,VM就会使用page.lru字段,因此驱动程序不应期望保留这些字段的值。 150 时,VM会在短时间内重试页面迁移,因为VM将-EAGAIN理解为 "临时迁移失败"。在返回除 151 -EAGAIN以外的任何错误时,VM将放弃页面迁移而不重试。 157 如果在隔离页上迁移失败,VM应该将隔离页返回给驱动,因此VM用隔离页调用驱动的 180 对于非LRU可移动页面的测试,VM支持__PageMovable()函数。然而,它并不能保证识别 197 为了防止几个CPU同时进行隔离,VM在lock_page()下将隔离的页面标记为PG_isolated。 199 操作这个标志,因为VM会自动设置/清除它。请记住,如果驱动程序看到PG_isolated页, [all …]
|
| /linux-6.15/Documentation/virt/ |
| H A D | ne_overview.rst | 14 For example, an application that processes sensitive data and runs in a VM, 15 can be separated from other applications running in the same VM. This 16 application then runs in a separate VM than the primary VM, namely an enclave. 17 It runs alongside the VM that spawned it. This setup matches low latency 31 enclave VM (that's 2 below). 39 hypervisor running on the host where the primary VM is running. The Nitro 42 2. The enclave itself - a VM running on the same host as the primary VM that 44 for the enclave VM. An enclave does not have persistent storage attached. 66 enclave VM. The enclave VM has its own kernel and follows the standard Linux 75 loaded in the enclave VM is the one that was intended to be run. [all …]
|
| /linux-6.15/Documentation/translations/zh_CN/security/ |
| H A D | snp-tdx-threat-model.rst | 36 (Trusted Execution Environment, TEE)中运行虚拟机(VM)。从现在起,本文档 40 为在CoCo虚拟机(VM)内运行的软件提供更强的安全保障。具体来说,机密计算允许 52 的接口、能够支持CoCo虚拟机(VM)的平台,以及一个在客户VM和底层平台之间充当安 55 源的访问等。然而,由于它通常不在CoCo VM的可信计算基(TCB)内,其访问权限受到 62 | CoCo guest VM |<---->| | 115 通常被置于CoCo VM TCB之外。需要注意的是,这并不意味着宿主机或VMM是故意恶意的, 116 而是强调拥有一个较小的CoCo VM TCB具有安全价值。这种新型的攻击者可以被视为一种 121 | CoCo guest VM | 145 这个 **Linux内核机密计算虚拟机(CoCo VM)的安全目标** 可以总结如下: 153 上述安全目标导致了两个主要的**Linux内核机密计算虚拟机(CoCo VM)资产**:
|
| /linux-6.15/Documentation/virt/acrn/ |
| H A D | introduction.rst | 7 hardware. It has a privileged management VM, called Service VM, to manage User 10 ACRN userspace is an application running in the Service VM that emulates 11 devices for a User VM based on command line configurations. ACRN Hypervisor 12 Service Module (HSM) is a kernel module in the Service VM which provides 19 Service VM User VM 35 ACRN userspace allocates memory for the User VM, configures and initializes the 36 devices used by the User VM, loads the virtual bootloader, initializes the 37 virtual CPU state and handles I/O request accesses from the User VM. It uses
|
| H A D | io-request.rst | 6 An I/O request of a User VM, which is constructed by the hypervisor, is 14 For each User VM, there is a shared 4-KByte memory region used for I/O requests 15 communication between the hypervisor and Service VM. An I/O request is a 18 VM. ACRN userspace in the Service VM first allocates a 4-KByte page and passes 26 An I/O client is responsible for handling User VM I/O requests whose accessed 28 User VM. There is a special client associated with each User VM, called the 31 VM. 39 | Service VM | 88 state when a trapped I/O access happens in a User VM. 90 the Service VM.
|
| H A D | cpuid.rst | 7 A guest VM running on an ACRN hypervisor can check some of its features using 38 ACRN_FEATURE_PRIVILEGED_VM 0 guest VM is a privileged VM
|
| /linux-6.15/Documentation/virt/hyperv/ |
| H A D | hibernation.rst | 29 Considerations for Guest VM Hibernation 54 Different VM" section below. 69 Enabling Guest VM Hibernation 93 Initiating Guest VM Hibernation 99 tell a Linux VM to hibernate using a command outside the VM. The 133 is likely to cause errors in the resumed VM. 238 into the VM's physical address space so the VM can interact directly 277 Resuming on a Different VM 280 customer VM only exists as saved configuration and disks -- the VM no 300 VM, and in the general case instance GUIDs vary from VM to VM. [all …]
|
| H A D | coco.rst | 7 the confidentiality and integrity of data in the VM's memory, even in the 9 CoCo VMs on Hyper-V share the generic CoCo VM threat model and security 21 * The VM runs a version of Linux that supports being a CoCo VM 27 VM on Hyper-V. 31 To create a CoCo VM, the "Isolated VM" attribute must be specified to Hyper-V 32 when the VM is created. A VM cannot be changed from a CoCo VM to a normal VM, 38 created and cannot be changed during the life of the VM. 90 L1 VM, and the guest OS runs in a nested L2 VM. 101 CoCo VM functionality: 111 CoCo VM to route #VC and #VE exceptions to VMPL 0 and the L1 VM, [all …]
|
| H A D | vpci.rst | 5 In a Hyper-V guest VM, PCI pass-thru devices (also called 7 that are mapped directly into the VM's physical address space. 56 may be added to a VM or removed from a VM at any time during 57 the life of the VM, and not just during initial boot. 69 the VM while the VM is running. The ongoing operation of the 118 guest VM at any time during the life of the VM. The removal 122 A guest VM is notified of the removal by an unsolicited 228 By default, Hyper-V pins all guest VM memory in the host 230 allow the VM to have DMA access to all its memory. Hence 231 it is safe to assign PCI devices to the VM, and allow the [all …]
|
| /linux-6.15/net/iucv/ |
| H A D | Kconfig | 5 prompt "IUCV support (S390 - z/VM only)" 8 under VM or VIF. If you run on z/VM, say "Y" to enable a fast 9 communication link between VM guests. 14 prompt "AF_IUCV Socket support (S390 - z/VM and HiperSockets transport)" 17 based on z/VM inter-user communication vehicle or based on
|
| /linux-6.15/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-dump.rst | 10 Dumping a VM is an essential tool for debugging problems inside 11 it. This is especially true when a protected VM runs into trouble as 15 However when dumping a protected VM we need to maintain its 16 confidentiality until the dump is in the hands of the VM owner who 19 The confidentiality of the VM dump is ensured by the Ultravisor who 22 Communication Key which is the key that's used to encrypt VM data in a 34 and extracts dump keys with which the VM dump data will be encrypted. 38 Currently there are two types of data that can be gathered from a VM:
|
| /linux-6.15/drivers/s390/char/ |
| H A D | Kconfig | 144 prompt "Support for the z/VM recording system services (VM only)" 148 by the z/VM recording system services, eg. from *LOGREC, *ACCOUNT or 154 prompt "Support for the z/VM CP interface" 159 program on z/VM 162 int "Memory in MiB reserved for z/VM CP interface" 173 prompt "API for reading z/VM monitor service records" 176 Character device driver for reading z/VM monitor service records 180 prompt "API for writing z/VM monitor service records" 183 Character device driver for writing z/VM monitor service records 187 prompt "z/VM unit record device driver" [all …]
|
| /linux-6.15/drivers/s390/net/ |
| H A D | Kconfig | 13 It also supports virtual CTCs when running under VM. 22 prompt "IUCV network device support (VM only)" 26 vehicle networking under VM or VIF. It enables a fast communication 27 link between VM guests. Using ifconfig a point-to-point connection 29 running on the other VM guest. To compile as a module, choose M. 34 prompt "IUCV special message support (VM only)" 38 from other VM guest systems. 42 prompt "Deliver IUCV special messages as uevents (VM only)" 57 HiperSockets interfaces and z/VM virtual NICs for Guest LAN and
|
| /linux-6.15/Documentation/networking/ |
| H A D | net_failover.rst | 24 datapath. It also enables hypervisor controlled live migration of a VM with 72 Booting a VM with the above configuration will result in the following 3 73 interfaces created in the VM: 94 This will result in lack of connectivity to the VM. So some tweaks might be 113 Live Migration of a VM with SR-IOV VF & virtio-net in STANDBY mode 121 the source hypervisor. Note: It is assumed that the VM is connected to a 123 device to the VM. This is not the VF that was passthrough'd to the VM (seen in 143 TAP_IF=vmtap01 # virtio-net interface in the VM. 152 # Remove the VF that was passthrough'd to the VM. 157 # Add FDB entry for traffic to continue going to the VM via [all …]
|
| /linux-6.15/Documentation/devicetree/bindings/hwmon/ |
| H A D | moortec,mr75203.yaml | 20 *) Voltage Monitor (VM) - used to monitor voltage levels (e.g. mr74138). 26 be presented for VM for measurement within its range (e.g. mr76006 - 29 TS, VM & PD also include a digital interface, which consists of configuration 58 PVT controller has 5 VM (voltage monitor) sensors. 59 vm-map defines CPU core to VM instance mapping. A 60 value of 0xff means that VM sensor is unused. 75 Defines the number of channels per VM that are actually used and are 79 Minimum value of each item - 0 (which means entire VM sensor is not used). 86 The pre-scaler is used for input sources that exceed the VM input range.
|
| /linux-6.15/drivers/virt/acrn/ |
| H A D | Kconfig | 10 a privileged management VM, called Service VM, to manage User 12 under ACRN as a User VM.
|
| /linux-6.15/Documentation/gpu/rfc/ |
| H A D | i915_vm_bind.rst | 9 specified address space (VM). These mappings (also referred to as persistent 18 User has to opt-in for VM_BIND mode of binding for an address space (VM) 19 during VM creation time via I915_VM_CREATE_FLAGS_USE_VM_BIND extension. 43 A VM in VM_BIND mode will not support older execbuf mode of binding. 56 works with execbuf3 ioctl for submission. All BOs mapped on that VM (through 82 dma-resv fence list of all shared BOs mapped on the VM. 86 BO creation. Unlike Shared BOs, these VM private BOs can only be mapped on 87 the VM they are private to and can't be dma-buf exported. 91 w.r.t the number of VM private BOs. 121 3) Lock-C: Spinlock/s to protect some of the VM's lists like the list of [all …]
|
| /linux-6.15/Documentation/devicetree/bindings/reserved-memory/ |
| H A D | xen,shared-memory.txt | 4 virtual machine. Typically, a region is configured at VM creation time 20 memory region used for the mapping in the borrower VM. 24 the VM config file
|
| /linux-6.15/Documentation/virt/kvm/arm/ |
| H A D | vcpu-features.rst | 27 system. The ID register values may be VM-scoped in KVM, meaning that the 28 values could be shared for all vCPUs in a VM. 32 registers are mutable until the VM has started, i.e. userspace has called 33 ``KVM_RUN`` on at least one vCPU in the VM. Userspace can discover what fields
|
| /linux-6.15/Documentation/virt/kvm/devices/ |
| H A D | vfio.rst | 11 Only one VFIO instance may be created per VM. The created device 12 tracks VFIO files (group or device) in use by the VM and features 14 of the VM. As groups/devices are enabled and disabled for use by the 15 VM, KVM should be updated about their presence. When registered with
|
| /linux-6.15/Documentation/ABI/testing/ |
| H A D | sysfs-kernel-mm | 3 Contact: Nishanth Aravamudan <[email protected]>, VM maintainers 5 /sys/kernel/mm/ should contain any and all VM
|
| /linux-6.15/Documentation/security/ |
| H A D | snp-tdx-threat-model.rst | 33 Machines (VM) inside TEE. From now on in this document will be referring 39 inside a CoCo VM. Namely, confidential computing allows its users to 46 integrity for the VM's guest memory and execution state (vCPU registers), 55 a trusted intermediary between the guest VM and the underlying platform 59 VM, manage its access to system resources, etc. However, since it 60 typically stays out of CoCo VM TCB, its access is limited to preserve the 68 | CoCo guest VM |<---->| | 131 CoCo VM TCB due to its large SW attack surface. It is important to note 134 VM TCB. This new type of adversary may be viewed as a more powerful type 140 | CoCo guest VM | [all …]
|
| /linux-6.15/Documentation/arch/s390/ |
| H A D | monreader.rst | 2 Linux API for read access to z/VM Monitor Records 15 usable from user space and allows read access to the z/VM Monitor Records 16 collected by the `*MONITOR` System Service of z/VM. 21 The z/VM guest on which you want to access this API needs to be configured in 25 This item will use the IUCV device driver to access the z/VM services, so you 26 need a kernel with IUCV support. You also need z/VM version 4.4 or 5.1. 78 Refer to the "z/VM Performance" book (SC24-6109-00) on how to create a monitor 79 DCSS if your z/VM doesn't have one already, you need Class E privileges to 147 See "Appendix A: `*MONITOR`" in the "z/VM Performance" document for a description 149 be found here (z/VM 5.1): https://www.vm.ibm.com/pubs/mon510/index.html [all …]
|
| /linux-6.15/Documentation/translations/zh_CN/virt/acrn/ |
| H A D | introduction.rst | 30 服务端VM 用户端VM
|
| /linux-6.15/Documentation/arch/powerpc/ |
| H A D | ultravisor.rst | 63 the VM it is returning to is secure. 665 * U_INVALID if VM is not secure. 703 * U_INVALID if the VM is not secure. 752 * U_INVALID if VM is not secure. 795 * U_INVAL if VM is not secure. 834 * U_INVALID if VM is not secure. 938 transition the VM to Secure VM. 980 normal VM). 993 the MSR value with which to return to the VM. 1012 this virtual machine and return to the VM. [all …]
|