Home
last modified time | relevance | path

Searched refs:launched (Results 1 – 9 of 9) sorted by relevance

/Linux-v5.10/Documentation/x86/
Dintel_txt.rst15 - Measurement and verification of launched environment
84 protection is provided to all launched components, a large number
97 - Tboot is an executable that is launched by the bootloader as
133 then any kernel will be launched.
155 launched with tboot and use this copy instead of the one in the
/Linux-v5.10/Documentation/vm/
Dpage_owner.rst20 program launched. And, launched program continually dump out the trace
/Linux-v5.10/arch/x86/kvm/vmx/
Dvmcs.h62 bool launched; member
Dvmx.c732 if (loaded_vmcs->shadow_vmcs && loaded_vmcs->launched) in __loaded_vmcs_clear()
747 loaded_vmcs->launched = 0; in __loaded_vmcs_clear()
2625 loaded_vmcs->launched = 0; in alloc_loaded_vmcs()
6596 bool __vmx_vcpu_run(struct vcpu_vmx *vmx, unsigned long *regs, bool launched);
6631 vmx->loaded_vmcs->launched); in vmx_vcpu_enter_exit()
6798 vmx->loaded_vmcs->launched = 1; in vmx_vcpu_run()
Dnested.c3083 [launched]"i"(offsetof(struct loaded_vmcs, launched)), in nested_vmx_check_vmentry_hw()
/Linux-v5.10/Documentation/virt/kvm/
Damd-memory-encryption.rst196 SEV_STATE_LAUNCHING, /* guest is currently being launched */
197 … SEV_STATE_SECRET, /* guest is being launched and ready to accept the ciphertext data */
198 SEV_STATE_RUNNING, /* guest is fully launched and running */
/Linux-v5.10/Documentation/security/
Dsak.rst86 These commands cause **all** daemons which are launched by the
/Linux-v5.10/Documentation/admin-guide/hw-vuln/
Dspectre.rst231 Spectre variant 2 attacks can be launched from a rogue process by
297 Spectre variant 2 attacks can be launched from a rogue guest by
/Linux-v5.10/Documentation/admin-guide/cgroup-v1/
Dcgroups.rst138 depending on who launched it (prof/student).
148 a separate cgroup for every browser launched and associate it with