Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Hypervisor
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Piece of software or hardware that creates and runs virtual machines}} {{Use mdy dates|date=May 2015}} A '''hypervisor''', also known as a '''virtual machine monitor''' ('''VMM''') or '''virtualizer''', is a type of computer [[software]], [[firmware]] or [[computer hardware|hardware]] that creates and runs [[virtual machine]]s. A computer on which a hypervisor runs one or more virtual machines is called a ''host machine'', and each virtual machine is called a ''guest machine''. The hypervisor presents the guest operating systems with a [[platform virtualization|virtual operating platform]] and manages the execution of the guest operating systems. Unlike an [[emulator]], the guest executes most instructions on the native hardware.<ref name="goldberg1973">{{cite tech report |url=https://apps.dtic.mil/sti/pdfs/AD0772809.pdf |first=Robert P. |last=Goldberg |title=Architectural Principles for Virtual Computer Systems |number=ESD-TR-73-105 |institution=Harvard University |year=1973}}</ref> Multiple instances of a variety of operating systems may share the virtualized hardware resources: for example, [[Linux]], [[Microsoft Windows|Windows]], and [[macOS]] instances can all run on a single physical [[x86]] machine. This contrasts with [[operating-system-level virtualization|operating-system–level virtualization]], where all instances (usually called ''containers'') must share a single kernel, though the guest operating systems can differ in [[user space]], such as different [[Linux distribution]]s with the same kernel. The term ''hypervisor'' is a variant of ''supervisor'', a traditional term for the [[kernel (operating system)|kernel]] of an [[operating system]]: the hypervisor is the supervisor of the supervisors,<ref>{{cite book |title=Virtualization For Dummies |author=Bernard Golden |year=2011 |page=[https://books.google.com/books?id=2ppZkdmpSlgC&pg=PA54 54]}}</ref> with ''[[Wikt:hyper-|hyper-]]'' used as a stronger variant of ''[[Wikt:super-|super-]]''.{{efn|''super-'' is from Latin, meaning "above", while ''hyper-'' is from the [[cognate]] term in [[Ancient Greek]] ([[Wikt:ὑπέρ|ὑπέρ-]]), also meaning ''above'' or ''over''.}} The term dates to circa 1970;<ref>{{cite web |url=http://programmers.stackexchange.com/questions/196405/how-did-the-term-hypervisor-come-into-use |title=How did the term "hypervisor" come into use?}}</ref> IBM coined it for software that ran [[OS/360]] and the 7090 emulator concurrently on the [[IBM System/360 Model 65|360/65]]<ref>{{cite conference | url = https://www.computer.org/csdl/proceedings/afips/1971/5077/00/50770163.pdf | title = System/370 integrated emulation under OS and DOS | author = Gary R. Allred | page = 164 | conference = 1971 [[Spring Joint Computer Conference]] | volume = 38 | doi = 10.1109/AFIPS.1971.58 | date = May 1971 | publisher = AFIPS Press | access-date = June 12, 2022 }}</ref> and later used it for the DIAG handler of CP-67. In the earlier [[CP/CMS]] (1967) system, the term ''Control Program'' was used instead. Some literature, especially in [[microkernel]] contexts, makes a distinction between ''hypervisor'' and ''virtual machine monitor'' (VMM). There, both components form the overall ''virtualization stack'' of a certain system. ''Hypervisor'' refers to [[User_space_and_kernel_space|kernel-space]] functionality and VMM to [[User_space_and_kernel_space|user-space]] functionality. Specifically in these contexts, a ''hypervisor'' is a microkernel implementing virtualization infrastructure that must run in kernel-space for technical reasons, such as [[X86_virtualization|Intel VMX]]. Microkernels implementing virtualization mechanisms are also referred to as ''microhypervisor''.<ref>{{cite conference | last = Steinberg | first = Udo | last2 = Kauer | first2 = Bernhard | title = NOVA: A Microhypervisor-Based Secure Virtualization Architecture | book-title = Proceedings of the 2010 ACM European Conference on Computer Systems (EuroSys 2010) | date = 2010 | location = Paris, France | url = https://hypervisor.org/eurosys2010.pdf | access-date = 2024-08-27 }}</ref><ref>{{cite web | url = https://github.com/cyberus-technology/hedron | title = Hedron Microkernel | website = GitHub | publisher = Cyberus Technology | access-date = 2024-08-27 }}</ref> Applying this terminology to [[Linux]], [[Kernel-based_Virtual_Machine|KVM]] is a ''hypervisor'' and [[QEMU]] or [[Cloud Hypervisor]] are VMMs utilizing KVM as hypervisor.<ref>{{cite web | url = https://github.com/cloud-hypervisor/cloud-hypervisor | title = Cloud Hypervisor | website = GitHub | publisher = Cloud Hypervisor Project | access-date = 2024-08-27 }}</ref> == Classification == [[File:Hyperviseur.svg|thumb|right|upright=1.8|Type-1 and type-2 hypervisors]] In his 1973 thesis, "Architectural Principles for Virtual Computer Systems," [[Robert P. Goldberg]] classified two types of hypervisor:<ref name="goldberg1973" /> ; Type-1, native or bare-metal hypervisors : These hypervisors run directly on the host's hardware to control the hardware and to manage guest operating systems. For this reason, they are sometimes called [[Bare machine|bare-metal]] hypervisors. The first hypervisors, which IBM developed in the 1960s, were native hypervisors.<ref>{{cite web |first=Shannon |last=Meier |title=IBM Systems Virtualization: Servers, Storage, and Software |year=2008 |pages=2, 15, 20 |url=http://www.redbooks.ibm.com/redpapers/pdfs/redp4396.pdf |access-date=2015-12-22}}</ref> These included the test software [[SIMMON]] and the [[CP/CMS]] operating system, the predecessor of IBM's [[VM (operating system)|VM family]] of [[virtual machine]] [[operating systems]]. Examples of Type-1 hypervisor include [[Hyper-V]], [[Xen]] and [[VMware ESXi]]. ; Type-2 or hosted hypervisors : These hypervisors run on a conventional operating system (OS) just as other computer programs do. A virtual machine monitor runs as a [[Computer process|process]] on the host, such as [[VirtualBox]]. Type-2 hypervisors abstract guest operating systems from the host operating system, effectively creating an isolated system that can be interacted with by the host. Examples of Type-2 hypervisor include [[VirtualBox]] and [[VMware Workstation]]. The distinction between these two types is not always clear. For instance, [[Kernel-based_Virtual_Machine|KVM]] and [[bhyve]] are [[kernel module]]s<ref>{{cite web |last=Dexter |first=Michael |title= Hands-on bhyve |url=http://callfortesting.org/bhyve/ |website=CallForTesting.org |access-date=2013-09-24}}</ref> that effectively convert the host operating system to a type-1 hypervisor.<ref name=IowaState>{{cite thesis |last=Graziano |first=Charles |title=A performance analysis of Xen and KVM hypervisors for hosting the Xen Worlds Project |type=MS thesis |publisher=Iowa State University |date=2011 |url=https://dr.lib.iastate.edu/handle/20.500.12876/26405 |doi=10.31274/etd-180810-2322 |hdl=20.500.12876/26405 |access-date=2022-10-16|doi-access=free }}</ref> ==Mainframe origins== The first hypervisors providing [[full virtualization]] were the test tool [[SIMMON]] and the one-off [[IBM CP-40]] research system, which began production use in January 1967 and became the first version of the IBM [[CP/CMS]] operating system. CP-40 ran on a [[System/360|S/360-40]] modified at the [[Cambridge Scientific Center]] to support [[dynamic address translation]], a feature that enabled virtualization. Prior to this time, computer hardware had only been virtualized to the extent to allow multiple user applications to run concurrently, such as in [[Compatible Time-Sharing System|CTSS]] and [[IBM M44/44X]]. With CP-40, the hardware's ''supervisor state'' was virtualized as well, allowing multiple operating systems to run concurrently in separate [[virtual machine]] contexts. Programmers soon implemented CP-40 (as [[CP-67]]) for the [[IBM System/360-67]], the first production computer system capable of full virtualization. IBM shipped this machine in 1966; it included [[page translation table|page-translation-table]] hardware for virtual memory and other techniques that allowed a full virtualization of all kernel tasks, including I/O and interrupt handling. (The "official" operating system, the ill-fated [[TSS/360]], did not employ full virtualization.) Both CP-40 and CP-67 began production use in 1967. [[CP/CMS]] was available to IBM customers from 1968 to early 1970s, in source code form without support. [[CP/CMS]] formed part of IBM's attempt to build robust [[time-sharing]] systems for its [[Mainframe computer|mainframe]] computers. By running multiple operating systems concurrently, the hypervisor increased system robustness and stability: Even if one operating system crashed, the others would continue working without interruption. Indeed, this even allowed [[Development stage#Beta|beta]] or experimental versions of operating systems{{mdashb}}or even of new hardware<ref>See [[History of CP/CMS]] for virtual-hardware simulation in the development of the [[System/370]]</ref>{{mdashb}}to be deployed and debugged, without jeopardizing the stable main production system, and without requiring costly additional development systems. IBM announced its [[System/370]] series in 1970 without the [[virtual memory]] feature needed for virtualization, but added it in the August 1972 Advanced Function announcement. Virtualization has been featured in all successor systems, such that all modern-day IBM mainframes, including the [[zSeries]] line, retain backward compatibility with the 1960s-era IBM S/360 line. The 1972 announcement also included [[VM (operating system)|VM/370]], a reimplementation of [[CP/CMS]] for the S/370. Unlike [[CP/CMS]], IBM provided support for this version (though it was still distributed in source code form for several releases). ''VM'' stands for ''[[Virtual Machine]]'', emphasizing that all, not just some, of the hardware interfaces are virtualized. Both VM and CP/CMS enjoyed early acceptance and rapid development by universities, corporate users, and [[time-sharing]] vendors, as well as within IBM. Users played an active role in ongoing development, anticipating trends seen in modern [[Open-source model|open source]] projects. However, in a series of disputed and bitter battles{{Citation needed|date=June 2021}}, time-sharing lost out to [[batch processing]] through IBM political infighting, and VM remained IBM's "other" mainframe operating system for decades, losing to [[MVS]]. It enjoyed a resurgence of popularity and support from 2000 as the [[z/VM]] product, for example as the platform for [[Linux on IBM Z]]. As mentioned above, the VM control program includes a ''hypervisor-call'' handler that intercepts DIAG ("Diagnose", opcode x'83') instructions used within a virtual machine. This provides fast-path non-virtualized execution of file-system access and other operations (DIAG is a model-dependent privileged instruction, not used in normal programming, and thus is not virtualized. It is therefore available for use as a signal to the "host" operating system). When first implemented in [[CP/CMS]] release 3.1, this use of DIAG provided an operating system interface that was analogous to the [[System/360]] [[Supervisor Call instruction]] (SVC), but that did not require altering or extending the system's virtualization of SVC. In 1985 IBM introduced the [[PR/SM]] hypervisor to manage [[Logical partition (virtual computing platform)|logical partitions]] (LPAR). ==Operating system support== {{sources needed|section|date=September 2021}} Several factors led to a resurgence around 2005 in the use of [[Platform virtualization|virtualization]] technology among [[Unix]], [[Linux]], and other [[Unix-like]] operating systems:<ref>{{cite web|last=Loftus|first=Jack|title=Xen virtualization quickly becoming open source 'killer app'|work=TechTarget|date=19 December 2005|access-date=26 October 2015|url=http://searchdatacenter.techtarget.com/news/1153127/Xen-virtualization-quickly-becoming-open-source-killer-app}}</ref> * Expanding hardware capabilities, allowing each single machine to do more simultaneous work * Efforts to control costs and to simplify management through consolidation of servers * The need to control large [[multiprocessor]] and [[computer cluster|cluster]] installations, for example in [[server farm]]s and [[render farm]]s * The improved security, reliability, and device independence possible from hypervisor architectures * The ability to run complex, OS-dependent applications in different hardware or OS environments * The ability to overprovision resources, fitting more applications onto a host Major Unix vendors, including [[Hewlett-Packard|HP]], [[IBM]], [[Silicon Graphics|SGI]], and [[Sun Microsystems]], have been selling virtualized hardware since before 2000. These have generally been large, expensive systems (in the multimillion-dollar range at the high end), although virtualization has also been available on some low- and mid-range systems, such as IBM [[System p|pSeries]] servers, [[HP Superdome]] series machines, and [[Sun Microsystems|Sun]]/[[Oracle Corporation|Oracle]] T-series CoolThreads servers. Although [[Solaris (operating system)|Solaris]] has always been the only guest domain OS officially supported by Sun/Oracle on their [[Logical Domains]] hypervisor, {{as of | 2006 | alt = as of late 2006}}, [[Linux]] (Ubuntu and Gentoo), and [[FreeBSD]] have been ported to run on top of the hypervisor (and can all run simultaneously on the same processor, as fully virtualized independent guest OSes). Wind River "Carrier Grade Linux" also runs on Sun's Hypervisor.<ref>{{cite press release|url=http://www.windriver.com/news/press/pr.html?ID=3881|title=Wind River To Support Sun's Breakthrough UltraSPARC T1 Multithreaded Next-Generation Processor|work=Wind River Newsroom|location=Alameda, California|date=1 November 2006|access-date=26 October 2015|archive-date=November 10, 2006|archive-url=https://web.archive.org/web/20061110175456/http://www.windriver.com/news/press/pr.html?ID=3881|url-status=dead}}</ref> Full virtualization on [[SPARC]] processors proved straightforward: since its inception in the mid-1980s Sun deliberately kept the SPARC architecture clean of artifacts that would have impeded virtualization. (Compare with virtualization on x86 processors below.)<ref>{{cite report|url=https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/TC_ErgA/TC-ErgA_Part1.pdf?__blob=publicationFile|title=Complementary and Alternative Technologies to Trusted Computing (TC-Erg./-A.), Part 1, A study on behalf of the German Federal Office for Information Security (BSI)|first1=Lothar|last1=Fritsch|first2=Rani|last2=Husseiki|first3=Ammar|last3=Alkassar|format=PDF|access-date=February 28, 2011|archive-date=June 7, 2020|archive-url=https://web.archive.org/web/20200607211407/https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/TC_ErgA/TC-ErgA_Part1.pdf?__blob=publicationFile|url-status=dead}}</ref> HPE provides [[HP Integrity Virtual Machines]] (Integrity VM) to host multiple operating systems on their [[Itanium]] powered Integrity systems. Itanium can run [[HP-UX]], Linux, Windows and [[OpenVMS]], and these environments are also supported as virtual servers on HP's Integrity VM platform. The HP-UX operating system hosts the Integrity VM hypervisor layer that allows for multiple features of HP-UX to be taken advantage of and provides major differentiation between this platform and other commodity platforms - such as processor hotswap, memory hotswap, and dynamic kernel updates without system reboot. While it heavily leverages HP-UX, the Integrity VM hypervisor is really a hybrid that runs on bare-metal while guests are executing. Running normal HP-UX applications on an Integrity VM host is heavily discouraged,{{By whom|date=April 2010}} because Integrity VM implements its own memory management, scheduling and I/O policies that are tuned for virtual machines and are not as effective for normal applications. HPE also provides more rigid partitioning of their Integrity and HP9000 systems by way of VPAR and [[HP nPar (Hard Partitioning)|nPar]] technology, the former offering shared resource partitioning and the latter offering complete I/O and processing isolation. The flexibility of virtual server environment (VSE) has given way to its use more frequently in newer deployments.{{Citation needed|date=November 2008}} IBM provides virtualization partition technology known as [[LPAR|logical partitioning]] (LPAR) on [[System/390]], [[zSeries]], [[pSeries]] and [[IBM AS/400]] systems. For IBM's Power Systems, the POWER Hypervisor (PHYP) is a native (bare-metal) hypervisor in firmware and provides isolation between LPARs. Processor capacity is provided to LPARs in either a dedicated fashion or on an entitlement basis where unused capacity is harvested and can be re-allocated to busy workloads. Groups of LPARs can have their processor capacity managed as if they were in a "pool" - IBM refers to this capability as Multiple Shared-Processor Pools (MSPPs) and implements it in servers with the [[POWER6]] processor. LPAR and MSPP capacity allocations can be dynamically changed. Memory is allocated to each LPAR (at LPAR initiation or dynamically) and is address-controlled by the POWER Hypervisor. For real-mode addressing by operating systems ([[AIX]], [[Linux]], [[IBM i]]), the [[IBM Power microprocessors|Power]] processors ([[POWER4]] onwards) have designed virtualization capabilities where a hardware address-offset is evaluated with the OS address-offset to arrive at the physical memory address. Input/Output (I/O) adapters can be exclusively "owned" by LPARs or shared by LPARs through an appliance partition known as the Virtual I/O Server (VIOS). The Power Hypervisor provides for high levels of reliability, availability and serviceability (RAS) by facilitating hot add/replace of multiple parts (model dependent: processors, memory, I/O adapters, blowers, power units, disks, system controllers, etc.) Similar trends have occurred with x86/x86-64 server platforms, where [[open-source model|open-source]] projects such as [[Xen]] have led virtualization efforts. These include hypervisors built on Linux and Solaris kernels as well as custom kernels. Since these technologies span from large systems down to desktops, they are described in the next section. ==x86 systems== {{main|x86 virtualization}}{{More citations needed|section|date=April 2023}} [[X86 virtualization]] was introduced in the 1990s, with its emulation being included in [[Bochs]].<ref>{{Cite web |title=Introduction to Bochs |url=https://bochs.sourceforge.io/doc/docbook/user/introduction.html |access-date=2023-04-17 |website=bochs.sourceforge.io}}</ref> Intel and AMD released their first x86 processors with hardware virtualisation in 2005 with [[Intel VT-x]] (code-named Vanderpool) and [[AMD-V]] (code-named Pacifica). An alternative approach requires modifying the guest operating system to make a [[system call]] to the underlying hypervisor, rather than executing machine I/O instructions that the hypervisor simulates. This is called [[paravirtualization]] in [[Xen]], a "hypercall" in [[Parallels Workstation]], and a "DIAGNOSE code" in IBM [[VM (operating system)|VM]]. Some microkernels, such as [[Mach microkernel|Mach]] and [[L4 microkernel family|L4]], are flexible enough to allow paravirtualization of guest operating systems. ==Embedded systems== [[Embedded hypervisor]]s, targeting [[embedded system]]s and certain [[real-time operating system]] (RTOS) environments, are designed with different requirements when compared to desktop and enterprise systems, including robustness, security and [[real-time computing|real-time]] capabilities. The resource-constrained nature of multiple embedded systems, especially battery-powered mobile systems, imposes a further requirement for small memory-size and low overhead. Finally, in contrast to the ubiquity of the x86 architecture in the PC world, the embedded world uses a wider variety of architectures and less standardized environments. Support for virtualization requires [[memory protection]] (in the form of a [[memory management unit]] or at least a memory protection unit) and a distinction between [[user mode]] and [[privileged mode]], which rules out most [[microcontroller]]s. This still leaves [[x86]], [[MIPS architecture|MIPS]], [[ARM architecture|ARM]] and [[PowerPC]] as widely deployed architectures on medium- to high-end embedded systems.<ref> {{cite book | last = Strobl | first = Marius | title = Virtualization for Reliable Embedded Systems | url = http://www.grin.com/e-book/233001/ | year = 2013 | publisher = GRIN Publishing GmbH | location = Munich | isbn = 978-3-656-49071-5 | pages = 5–6 | access-date = 2015-03-07}} </ref> As manufacturers of embedded systems usually have the source code to their operating systems, they have less need for full virtualization in this space. Instead, the performance advantages of [[paravirtualization]] make this usually the virtualization technology of choice. Nevertheless, ARM and MIPS have recently added full virtualization support as an IP option and has included it in their latest high-end processors and architecture versions, such as [[ARM Cortex-A15 MPCore]] and ARMv8 EL2. Other differences between virtualization in server/desktop and embedded environments include requirements for efficient sharing of resources across virtual machines, high-bandwidth, low-latency inter-VM communication, a global view of scheduling and power management, and fine-grained control of information flows.<ref name=Hei08>{{cite conference | author=Gernot Heiser | author-link=Gernot Heiser | title=The role of virtualization in embedded systems | book-title=Proc. 1st Workshop on Isolation and Integration in Embedded Systems (IIES'08) | pages=11–16 | date=April 2008 | url=http://ertos.nicta.com.au/publications/papers/Heiser_08.abstract | access-date=April 8, 2009 | archive-url=https://web.archive.org/web/20120321212358/https://ertos.nicta.com.au/publications/papers/Heiser_08.abstract | archive-date=March 21, 2012 | url-status=dead }}</ref> ==Security implications== {{main|Hyperjacking}} The use of hypervisor technology by [[malware]] and [[rootkit]]s installing themselves as a hypervisor below the operating system, known as ''[[hyperjacking]]'', can make them more difficult to detect because the malware could intercept any operations of the operating system (such as someone entering a password) without the anti-malware software necessarily detecting it (since the malware runs below the entire operating system). Implementation of the concept has allegedly occurred in the [[SubVirt]] laboratory rootkit (developed jointly by [[Microsoft]] and [[University of Michigan]] researchers<ref>{{cite web |url=http://web.eecs.umich.edu/~pmchen/papers/king06.pdf |access-date=2008-09-15 |title=SubVirt: Implementing malware with virtual machines |date=2006-04-03 |publisher=[[University of Michigan]], [[Microsoft]]}}</ref>) as well as in the [[Blue Pill (software)|Blue Pill malware]] package. However, such assertions have been disputed by others who claim that it would be possible to detect the presence of a hypervisor-based rootkit.<ref>{{cite web |url=http://www.virtualization.info/2006/08/debunking-blue-pill-myth.html |title=Debunking Blue Pill myth |publisher=Virtualization.info |access-date=2010-12-10 |date=2006-08-11 |archive-date=February 14, 2010 |archive-url=https://web.archive.org/web/20100214173337/http://www.virtualization.info/2006/08/debunking-blue-pill-myth.html |url-status=dead }}</ref> In 2009, researchers from Microsoft and [[North Carolina State University]] demonstrated a hypervisor-layer anti-rootkit called [[Hooksafe]] that can provide generic protection against kernel-mode [[rootkit]]s.<ref>{{cite book |url=http://research.microsoft.com/en-us/um/people/wdcui/papers/hooksafe-ccs09.pdf |series=CCS '09 |isbn=978-1-60558-894-0 |location=Chicago, Illinois, USA |date=11 August 2009 |publisher=[[Association for Computing Machinery|ACM]] |access-date=2009-11-11 |first1=Zhi |last1=Wang |first2=Xuxian |last2=Jiang |first3=Weidong |last3=Cui |first4=Peng |last4=Ning |title=Proceedings of the 16th ACM conference on Computer and communications security |chapter=Countering kernel rootkits with lightweight hook protection |pages=545–554 |doi=10.1145/1653662.1653728|citeseerx=10.1.1.147.9928 |s2cid=3006492 }}</ref> ==Notes== {{notelist}} ==See also== * [[Virtual memory]] * [[Comparison of platform virtualization software]] ==References== {{Reflist|30em}} == External links == {{Commons category|Hypervisor}} * [https://www.usenix.org/system/files/login/articles/105498-Revelle.pdf Hypervisors and Virtual Machines: Implementation Insights on the x86 Architecture] * [https://web.archive.org/web/20180219081010/http://www.cc.iitd.ernet.in/misc/cloud/hypervisor_performance.pdf A Performance Comparison of Hypervisors], VMware {{Virtualization software}} [[Category:Servers (computing)]] [[Category:Virtualization software]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:As of
(
edit
)
Template:By whom
(
edit
)
Template:Citation needed
(
edit
)
Template:Cite book
(
edit
)
Template:Cite conference
(
edit
)
Template:Cite press release
(
edit
)
Template:Cite report
(
edit
)
Template:Cite tech report
(
edit
)
Template:Cite thesis
(
edit
)
Template:Cite web
(
edit
)
Template:Commons category
(
edit
)
Template:Efn
(
edit
)
Template:Main
(
edit
)
Template:Mdashb
(
edit
)
Template:More citations needed
(
edit
)
Template:Notelist
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Template:Sources needed
(
edit
)
Template:Use mdy dates
(
edit
)
Template:Virtualization software
(
edit
)