| /linux/Documentation/networking/ |
| H A D | xsk-tx-metadata.rst | 54 packet for transmission at a pre-determined time called launch time. The 55 value of launch time is indicated by ``launch_time`` field of 75 The value of the requested launch time should be based on the device's PTP 81 packet reordering, a packet with a launch time request will block other 86 In scenarios where the launch time offload feature is disabled, the device 87 driver is expected to disregard the launch time request. For correct 88 interpretation and meaningful operation, the launch time should never be 91 launch time offload feature. 96 For stmmac, TSO and launch time (TBS) features are mutually exclusive for 98 support TSO and the rest of the Tx Queues to support TBS. The launch time [all …]
|
| /linux/tools/testing/selftests/landlock/ |
| H A D | .gitignore | 3 /sandbox-and-launch
|
| H A D | Makefile | 16 sandbox-and-launch \
|
| /linux/Documentation/security/secrets/ |
| H A D | coco.rst | 18 secret injection is performed early in the VM launch process, before the 35 During the VM's launch, the virtual machine manager may inject a secret to that 68 to which an EFI secret area with 4 secrets was injected during launch::
|
| /linux/Documentation/arch/x86/ |
| H A D | intel_txt.rst | 47 uses Intel TXT to perform a measured and verified launch of an OS 83 pre-launch components can be removed from the trust chain, DMA 105 incorrect), it will directly launch the kernel with no changes 126 - Tboot then applies an (optional) user-defined launch policy to 140 - As part of its launch, tboot DMA protects all of RAM (using the 160 launch, TXT must first be exited. This is to prevent attacks that
|
| H A D | sgx.rst | 170 SGX provides a launch control mechanism. After all enclave pages have been 181 kernel on launch control policy. Before calling EINIT function, the driver sets
|
| /linux/tools/testing/selftests/net/rds/ |
| H A D | README.txt | 37 # launch the tests in a VM
|
| /linux/Documentation/ABI/testing/ |
| H A D | securityfs-secrets-coco | 10 the Guest Owner during VM's launch. The secrets are encrypted
|
| H A D | sysfs-devices-platform-stratix10-rsu | 114 and the operating system launch was
|
| /linux/Documentation/trace/coresight/ |
| H A D | coresight-perf.rst | 96 launch in a paused state. 125 minimum level of functionality is met. The scripts that launch these
|
| /linux/Documentation/admin-guide/laptops/ |
| H A D | alienware-wmi.rst | 12 Before the launch of M-Series laptops (~2018), the "WMAX" device controlled
|
| /linux/Documentation/admin-guide/media/ |
| H A D | imx7.rst | 178 …gst-launch-1.0 -v v4l2src device=/dev/video1 ! video/x-raw,format=UYVY,width=640,height=480 ! v4l2…
|
| /linux/Documentation/driver-api/ |
| H A D | reset.rst | 41 In more complicated reset controls, a single trigger action can launch a
|
| /linux/security/ |
| H A D | Kconfig | 147 Intel(R) Trusted Execution Technology to perform a measured launch
|
| /linux/drivers/firmware/efi/ |
| H A D | Kconfig | 255 Guest Owner to securely inject secrets during guest VM launch.
|
| /linux/arch/x86/kvm/vmx/ |
| H A D | nested.c | 3769 static int nested_vmx_run(struct kvm_vcpu *vcpu, bool launch) in nested_vmx_run() argument 3780 evmptrld_status = nested_vmx_handle_enlightened_vmptrld(vcpu, launch); in nested_vmx_run() 3811 vmcs12->launch_state = !launch; in nested_vmx_run() 3829 if (CC(vmcs12->launch_state == launch)) in nested_vmx_run() 3831 launch ? VMXERR_VMLAUNCH_NONCLEAR_VMCS in nested_vmx_run()
|
| /linux/Documentation/scsi/ |
| H A D | ChangeLog.ncr53c8xx | 459 Use a simple CALL to a launch script in the CCB.
|
| /linux/Documentation/arch/powerpc/ |
| H A D | hvcs.rst | 237 used to launch the interactive I/O application. If one is using xterm and
|
| /linux/scripts/ |
| H A D | spelling.txt | 970 lauch||launch
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | spectre.rst | 204 target buffer (BTB) before issuing syscall to launch an attack.
|
| /linux/mm/ |
| H A D | Kconfig | 1273 to make ioctl calls that can launch kernel-based unit tests for
|
| /linux/tools/arch/x86/kcpuid/ |
| H A D | cpuid.csv | 244 0x7, 0, ecx, 30, sgx_lc , Intel SGX launch configuration
|