/Linux-v6.6/Documentation/hwmon/ |
D | isl68137.rst | 25 Publicly available (after August 2020 launch) at the Renesas website 35 Publicly available (after August 2020 launch) at the Renesas website 45 Publicly available (after August 2020 launch) at the Renesas website 55 Publicly available (after August 2020 launch) at the Renesas website 65 Publicly available (after August 2020 launch) at the Renesas website 75 Publicly available (after August 2020 launch) at the Renesas website 85 Publicly available (after August 2020 launch) at the Renesas website 95 Publicly available (after August 2020 launch) at the Renesas website 105 Publicly available (after August 2020 launch) at the Renesas website 115 Publicly available (after August 2020 launch) at the Renesas website [all …]
|
/Linux-v6.6/arch/mips/sgi-ip30/ |
D | ip30-smp.c | 37 void *launch; member 123 mpc->launch = smp_bootstrap; in ip30_smp_boot_secondary()
|
/Linux-v6.6/drivers/staging/media/atomisp/ |
D | TODO | 98 gst-launch-1.0 v4l2src ! videoconvert ! xvimagesink sync=false 102 gst-launch-1.0 v4l2src ! video/x-raw,format=YV12,width=640,height=480 ! \ 107 gst-launch-1.0 v4l2src ! video/x-raw,format=YV12,width=640,height=480 ! \
|
/Linux-v6.6/Documentation/security/secrets/ |
D | coco.rst | 18 secret injection is performed early in the VM launch process, before the 35 During the VM's launch, the virtual machine manager may inject a secret to that 68 to which an EFI secret area with 4 secrets was injected during launch::
|
/Linux-v6.6/Documentation/arch/x86/ |
D | intel_txt.rst | 47 uses Intel TXT to perform a measured and verified launch of an OS 83 pre-launch components can be removed from the trust chain, DMA 105 incorrect), it will directly launch the kernel with no changes 126 - Tboot then applies an (optional) user-defined launch policy to 140 - As part of its launch, tboot DMA protects all of RAM (using the 160 launch, TXT must first be exited. This is to prevent attacks that
|
D | sgx.rst | 170 SGX provides a launch control mechanism. After all enclave pages have been 181 kernel on launch control policy. Before calling EINIT function, the driver sets
|
/Linux-v6.6/Documentation/ABI/testing/ |
D | securityfs-secrets-coco | 10 the Guest Owner during VM's launch. The secrets are encrypted
|
D | sysfs-devices-platform-stratix10-rsu | 114 and the operating system launch was
|
/Linux-v6.6/Documentation/trace/coresight/ |
D | coresight-perf.rst | 94 minimum level of functionality is met. The scripts that launch these
|
/Linux-v6.6/Documentation/admin-guide/media/ |
D | imx7.rst | 178 …gst-launch-1.0 -v v4l2src device=/dev/video1 ! video/x-raw,format=UYVY,width=640,height=480 ! v4l2…
|
D | imx.rst | 632 gst-launch-1.0 v4l2src device=/dev/video0 ! kmssink 680 gst-launch-1.0 v4l2src device=/dev/video1 ! kmssink
|
/Linux-v6.6/Documentation/driver-api/ |
D | reset.rst | 41 In more complicated reset controls, a single trigger action can launch a
|
/Linux-v6.6/Documentation/networking/ |
D | 6pack.rst | 131 - Do a spattach as you would launch kissattach when starting a KISS port.
|
/Linux-v6.6/security/ |
D | Kconfig | 89 Intel(R) Trusted Execution Technology to perform a measured launch
|
/Linux-v6.6/drivers/firmware/efi/ |
D | Kconfig | 261 Guest Owner to securely inject secrets during guest VM launch.
|
/Linux-v6.6/arch/x86/kvm/vmx/ |
D | nested.c | 3550 static int nested_vmx_run(struct kvm_vcpu *vcpu, bool launch) in nested_vmx_run() argument 3561 evmptrld_status = nested_vmx_handle_enlightened_vmptrld(vcpu, launch); in nested_vmx_run() 3590 vmcs12->launch_state = !launch; in nested_vmx_run() 3608 if (CC(vmcs12->launch_state == launch)) in nested_vmx_run() 3610 launch ? VMXERR_VMLAUNCH_NONCLEAR_VMCS in nested_vmx_run()
|
/Linux-v6.6/Documentation/virt/kvm/x86/ |
D | amd-memory-encryption.rst | 177 After completion of the launch flow, the KVM_SEV_LAUNCH_FINISH command can be
|
/Linux-v6.6/Documentation/powerpc/ |
D | firmware-assisted-dump.rst | 70 *not* clear the RAM. It will then launch the bootloader, as
|
D | hvcs.rst | 237 used to launch the interactive I/O application. If one is using xterm and
|
/Linux-v6.6/Documentation/userspace-api/ |
D | landlock.rst | 415 life of a thread, especially for applications able to launch other applications
|
/Linux-v6.6/drivers/scsi/ |
D | ncr53c8xx.c | 1331 struct launch { struct 1513 struct launch start; 1521 struct launch restart;
|
/Linux-v6.6/Documentation/scsi/ |
D | ChangeLog.ncr53c8xx | 459 Use a simple CALL to a launch script in the CCB.
|
/Linux-v6.6/Documentation/admin-guide/mm/ |
D | hugetlbpage.rst | 330 other node at any time after launch and the resulting node will be
|
/Linux-v6.6/scripts/ |
D | spelling.txt | 922 lauch||launch
|
/Linux-v6.6/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 205 target buffer (BTB) before issuing syscall to launch an attack.
|