Home
last modified time | relevance | path

Searched refs:launch (Results 1 – 25 of 27) sorted by relevance

12

/Linux-v6.6/Documentation/hwmon/
Disl68137.rst25 Publicly available (after August 2020 launch) at the Renesas website
35 Publicly available (after August 2020 launch) at the Renesas website
45 Publicly available (after August 2020 launch) at the Renesas website
55 Publicly available (after August 2020 launch) at the Renesas website
65 Publicly available (after August 2020 launch) at the Renesas website
75 Publicly available (after August 2020 launch) at the Renesas website
85 Publicly available (after August 2020 launch) at the Renesas website
95 Publicly available (after August 2020 launch) at the Renesas website
105 Publicly available (after August 2020 launch) at the Renesas website
115 Publicly available (after August 2020 launch) at the Renesas website
[all …]
/Linux-v6.6/arch/mips/sgi-ip30/
Dip30-smp.c37 void *launch; member
123 mpc->launch = smp_bootstrap; in ip30_smp_boot_secondary()
/Linux-v6.6/drivers/staging/media/atomisp/
DTODO98 gst-launch-1.0 v4l2src ! videoconvert ! xvimagesink sync=false
102 gst-launch-1.0 v4l2src ! video/x-raw,format=YV12,width=640,height=480 ! \
107 gst-launch-1.0 v4l2src ! video/x-raw,format=YV12,width=640,height=480 ! \
/Linux-v6.6/Documentation/security/secrets/
Dcoco.rst18 secret injection is performed early in the VM launch process, before the
35 During the VM's launch, the virtual machine manager may inject a secret to that
68 to which an EFI secret area with 4 secrets was injected during launch::
/Linux-v6.6/Documentation/arch/x86/
Dintel_txt.rst47 uses Intel TXT to perform a measured and verified launch of an OS
83 pre-launch components can be removed from the trust chain, DMA
105 incorrect), it will directly launch the kernel with no changes
126 - Tboot then applies an (optional) user-defined launch policy to
140 - As part of its launch, tboot DMA protects all of RAM (using the
160 launch, TXT must first be exited. This is to prevent attacks that
Dsgx.rst170 SGX provides a launch control mechanism. After all enclave pages have been
181 kernel on launch control policy. Before calling EINIT function, the driver sets
/Linux-v6.6/Documentation/ABI/testing/
Dsecurityfs-secrets-coco10 the Guest Owner during VM's launch. The secrets are encrypted
Dsysfs-devices-platform-stratix10-rsu114 and the operating system launch was
/Linux-v6.6/Documentation/trace/coresight/
Dcoresight-perf.rst94 minimum level of functionality is met. The scripts that launch these
/Linux-v6.6/Documentation/admin-guide/media/
Dimx7.rst178 …gst-launch-1.0 -v v4l2src device=/dev/video1 ! video/x-raw,format=UYVY,width=640,height=480 ! v4l2…
Dimx.rst632 gst-launch-1.0 v4l2src device=/dev/video0 ! kmssink
680 gst-launch-1.0 v4l2src device=/dev/video1 ! kmssink
/Linux-v6.6/Documentation/driver-api/
Dreset.rst41 In more complicated reset controls, a single trigger action can launch a
/Linux-v6.6/Documentation/networking/
D6pack.rst131 - Do a spattach as you would launch kissattach when starting a KISS port.
/Linux-v6.6/security/
DKconfig89 Intel(R) Trusted Execution Technology to perform a measured launch
/Linux-v6.6/drivers/firmware/efi/
DKconfig261 Guest Owner to securely inject secrets during guest VM launch.
/Linux-v6.6/arch/x86/kvm/vmx/
Dnested.c3550 static int nested_vmx_run(struct kvm_vcpu *vcpu, bool launch) in nested_vmx_run() argument
3561 evmptrld_status = nested_vmx_handle_enlightened_vmptrld(vcpu, launch); in nested_vmx_run()
3590 vmcs12->launch_state = !launch; in nested_vmx_run()
3608 if (CC(vmcs12->launch_state == launch)) in nested_vmx_run()
3610 launch ? VMXERR_VMLAUNCH_NONCLEAR_VMCS in nested_vmx_run()
/Linux-v6.6/Documentation/virt/kvm/x86/
Damd-memory-encryption.rst177 After completion of the launch flow, the KVM_SEV_LAUNCH_FINISH command can be
/Linux-v6.6/Documentation/powerpc/
Dfirmware-assisted-dump.rst70 *not* clear the RAM. It will then launch the bootloader, as
Dhvcs.rst237 used to launch the interactive I/O application. If one is using xterm and
/Linux-v6.6/Documentation/userspace-api/
Dlandlock.rst415 life of a thread, especially for applications able to launch other applications
/Linux-v6.6/drivers/scsi/
Dncr53c8xx.c1331 struct launch { struct
1513 struct launch start;
1521 struct launch restart;
/Linux-v6.6/Documentation/scsi/
DChangeLog.ncr53c8xx459 Use a simple CALL to a launch script in the CCB.
/Linux-v6.6/Documentation/admin-guide/mm/
Dhugetlbpage.rst330 other node at any time after launch and the resulting node will be
/Linux-v6.6/scripts/
Dspelling.txt922 lauch||launch
/Linux-v6.6/Documentation/admin-guide/hw-vuln/
Dspectre.rst205 target buffer (BTB) before issuing syscall to launch an attack.

12