/linux/drivers/gpu/drm/gma500/ |
H A D | gem.c | 42 if (pobj->in_gart || pobj->stolen) in psb_gem_pin() 90 if (pobj->in_gart || pobj->stolen) in psb_gem_unpin() 121 WARN_ON(pobj->in_gart && !pobj->stolen); in psb_gem_free_object() 139 psb_gem_create(struct drm_device *dev, u64 size, const char *name, bool stolen, u32 align) in psb_gem_create() argument 155 ret = psb_gtt_allocate_resource(dev_priv, &pobj->resource, name, size, align, stolen, in psb_gem_create() 160 if (stolen) { in psb_gem_create() 161 pobj->stolen = true; in psb_gem_create() 169 if (stolen) { in psb_gem_create() 293 if (pobj->stolen) in psb_gem_fault()
|
H A D | gem.h | 27 bool stolen; /* Backed from stolen RAM */ member 38 psb_gem_create(struct drm_device *dev, u64 size, const char *name, bool stolen, u32 align);
|
H A D | gtt.h | 34 bool stolen, u32 *offset);
|
H A D | gtt.c | 20 bool stolen, u32 *offset) in psb_gtt_allocate_resource() argument 26 if (stolen) { in psb_gtt_allocate_resource()
|
/linux/arch/powerpc/mm/nohash/ |
H A D | mmu_context.c | 265 goto stolen; in switch_mmu_context() 271 goto stolen; in switch_mmu_context() 281 stolen: in switch_mmu_context()
|
/linux/Documentation/virt/kvm/arm/ |
H A D | pvtime.rst | 11 KVM/arm64 implements the stolen time part of this specification by providing 13 view of the amount of time stolen from its execution. 39 Return value: (int64) IPA of the stolen time data structure for this
|
/linux/drivers/gpu/drm/xe/display/ |
H A D | xe_plane_initial.c | 103 struct ttm_resource_manager *stolen = ttm_manager_type(&xe->ttm, XE_PL_STOLEN); in initial_plane_bo() local 105 if (!stolen) in initial_plane_bo() 119 plane_config->size * 2 >> PAGE_SHIFT >= stolen->size) in initial_plane_bo()
|
/linux/drivers/gpu/drm/i915/gt/ |
H A D | intel_rc6.c | 303 paddr = i915->dsm.stolen.end + 1 - pctx_size; in chv_rc6_init() 327 pcbr_offset = (pcbr & ~4095) - i915->dsm.stolen.start; in vlv_rc6_init() 356 i915->dsm.stolen.start, in vlv_rc6_init() 357 pctx->stolen->start, in vlv_rc6_init() 359 pctx_paddr = i915->dsm.stolen.start + pctx->stolen->start; in vlv_rc6_init()
|
H A D | selftest_reset.c | 23 const struct resource *dsm = >->i915->dsm.stolen; in __igt_reset_stolen() 98 if (!__drm_mm_interval_first(>->i915->mm.stolen, in __igt_reset_stolen() 147 !__drm_mm_interval_first(>->i915->mm.stolen, in __igt_reset_stolen()
|
/linux/drivers/gpu/drm/nouveau/nvkm/subdev/fb/ |
H A D | r535.c | 45 ram->stolen = false; in r535_fb_ram_new()
|
H A D | rammcp77.c | 79 ram->base.stolen = base; in mcp77_ram_new()
|
/linux/net/ipv4/ |
H A D | inet_fragment.c | 580 bool stolen; in inet_frag_reasm_finish() local 589 if (try_coalesce && skb_try_coalesce(head, fp, &stolen, in inet_frag_reasm_finish() 591 kfree_skb_partial(fp, stolen); in inet_frag_reasm_finish()
|
/linux/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/ |
H A D | vmmnv50.c | 262 if (ram->stolen) { in nv50_vmm_valid() 263 map->type |= ram->stolen; in nv50_vmm_valid()
|
/linux/drivers/gpu/drm/i915/gem/ |
H A D | i915_gem_object_types.h | 724 struct drm_mm_node *stolen; member
|
/linux/drivers/gpu/drm/nouveau/include/nvkm/subdev/ |
H A D | fb.h | 144 u64 stolen; member
|
/linux/Documentation/virt/kvm/devices/ |
H A D | vcpu.rst | 194 Specifies the base address of the stolen time structure for this VCPU. The 197 including the layout of the stolen time structure.
|
/linux/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/ |
H A D | switchdev.rst | 74 queues are neither shared nor stolen from the parent PCI function. 77 resources neither shared nor stolen from the parent PCI function.
|
/linux/drivers/gpu/drm/i915/ |
H A D | i915_drv.h | 83 struct resource stolen; member 128 struct drm_mm stolen; member
|
H A D | i915_debugfs.c | 265 seq_printf(m, " (stolen: %08llx)", obj->stolen->start); in i915_debugfs_describe_obj()
|
/linux/Documentation/power/ |
H A D | swsusp.rst | 335 encrypted and protected are retrieved and stolen from the swap device. 342 inaccessible so they can't be stolen later on. The only thing that 350 suspend image to prevent sensitive data from being stolen after
|
/linux/Documentation/accounting/ |
H A D | taskstats-struct.rst | 131 * On some architectures, value will adjust for cpu time stolen
|
/linux/Documentation/process/ |
H A D | maintainer-pgp-guide.rst | 184 disk. This way, even if your ``.gnupg`` directory is leaked or stolen in 286 think. They can be leaked or stolen via many different means: 367 Even though the Certify key is now safe from being leaked or stolen, the 372 can be stolen from there by sufficiently advanced malware (think
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-net | 25 2 stolen from another device
|
/linux/Documentation/security/tpm/ |
H A D | tpm-security.rst | 213 .. _Windows Bitlocker TPM: https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-com…
|
/linux/Documentation/scheduler/ |
H A D | sched-energy.rst | 311 there is some idle time in the system, the CPU capacity 'stolen' by higher
|