Home
last modified time | relevance | path

Searched refs:launched (Results 1 – 8 of 8) sorted by relevance

/linux/Documentation/arch/x86/
H A Dintel_txt.rst15 - Measurement and verification of launched environment
84 protection is provided to all launched components, a large number
97 - Tboot is an executable that is launched by the bootloader as
133 then any kernel will be launched.
155 launched with tboot and use this copy instead of the one in the
/linux/arch/x86/kvm/vmx/
H A Dvmcs.h65 bool launched; member
H A Dvmx.c790 if (loaded_vmcs->shadow_vmcs && loaded_vmcs->launched) in __loaded_vmcs_clear()
805 loaded_vmcs->launched = 0; in __loaded_vmcs_clear()
948 if (vmx->loaded_vmcs->launched) in __vmx_vcpu_run_flags()
2948 loaded_vmcs->launched = 0; in alloc_loaded_vmcs()
7485 vmx->loaded_vmcs->launched = 1; in vmx_vcpu_run()
/linux/Documentation/security/
H A Dsak.rst86 These commands cause **all** daemons which are launched by the
/linux/Documentation/mm/
H A Dpage_owner.rst18 program launched. And, launched program continually dump out the trace
/linux/Documentation/virt/kvm/x86/
H A Damd-memory-encryption.rst238 SEV_STATE_LAUNCHING, /* guest is currently being launched */
239 … SEV_STATE_SECRET, /* guest is being launched and ready to accept the ciphertext data */
240 SEV_STATE_RUNNING, /* guest is fully launched and running */
/linux/Documentation/admin-guide/hw-vuln/
H A Dspectre.rst243 Spectre variant 2 attacks can be launched from a rogue process by
309 Spectre variant 2 attacks can be launched from a rogue guest by
/linux/Documentation/admin-guide/cgroup-v1/
H A Dcgroups.rst140 depending on who launched it (prof/student).
150 a separate cgroup for every browser launched and associate it with