The Linux Kernel
next-20241014
Quick search
Contents
Development process
Submitting patches
Code of conduct
Maintainer handbook
All development-process docs
Core API
Driver APIs
Subsystems
Core subsystems
Human interfaces
Networking interfaces
Storage interfaces
Other subsystems
Accounting
CPUFreq - CPU frequency and voltage scaling code in the Linux(TM) kernel
FPGA
I2C/SMBus Subsystem
Industrial I/O
PCMCIA
Serial Peripheral Interface (SPI)
1-Wire Subsystem
Watchdog Support
Virtualization Support
Hardware Monitoring
Compute Accelerators
Security Documentation
Crypto API
BPF Documentation
USB support
PCI Bus Subsystem
Assorted Miscellaneous Devices Documentation
PECI Subsystem
WMI Subsystem
TEE Subsystem
Locking
Licensing rules
Writing documentation
Development tools
Testing guide
Hacking guide
Tracing
Fault injection
Livepatching
Rust
Administration
Build system
Reporting issues
Userspace tools
Userspace API
Firmware
Firmware and Devicetree
CPU architectures
Unsorted documentation
Translations
This Page
Show Source
KVM for x86 systems
¶
Secure Encrypted Virtualization (SEV)
Overview
The KVM_MEMORY_ENCRYPT_OP ioctl
Device attribute API
Firmware Management
References
KVM CPUID bits
Known limitations of CPU virtualization
x86
Linux KVM Hypercall
KVM Hypercalls Documentation
The x86 kvm shadow mmu
Acronyms
Virtual and real hardware supported
Translation
Memory
Events
Shadow pages
Reverse map
Synchronized and unsynchronized pages
Reaction to events
Emulating cr0.wp
Large pages
Fast invalidation of MMIO sptes
Further reading
KVM-specific MSRs
Custom MSR list
Nested VMX
Overview
Terminology
Running nested VMX
ABIs
Authors
Running nested guests with KVM
Use Cases
Enabling “nested” (x86)
Additional nested-related kernel parameters (x86)
Starting a nested guest (x86)
Enabling “nested” (s390x)
Live migration with nested KVM
Reporting bugs from nested setups
Timekeeping Virtualization for X86-Based Architectures
1. Overview
2. Timing Devices
3. TSC Hardware
4. Virtualization Problems