Home
last modified time | relevance | path

Searched refs:VMM (Results 1 – 13 of 13) sorted by relevance

/linux-6.1.9/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/
Dvmm.h286 #define VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL,BASE,SIZE,NEXT) do { \ argument
300 VMM_SPAM(VMM, "ITER %08x %08x PTE(s)", PTEI, (u32)_ptes); \
302 FILL(VMM, PT, PTEI, _ptes, MAP, _addr); \
309 #define VMM_MAP_ITER_MEM(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
310 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
314 #define VMM_MAP_ITER_DMA(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
315 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
317 #define VMM_MAP_ITER_SGL(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
318 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
/linux-6.1.9/Documentation/x86/
Dintel_txt.rst46 Trusted Boot (tboot) is an open source, pre-kernel/VMM module that
48 kernel/VMM.
54 Tboot currently supports launching Xen (open source VMM/hypervisor
Dsva.rst246 ENQCMD can be used from within a guest VM. In these cases, the VMM helps
/linux-6.1.9/Documentation/virt/kvm/devices/
Dvcpu.rst223 From the source VMM process:
235 From the destination VMM process:
/linux-6.1.9/drivers/virtio/
DKconfig57 drivers over PCI. This requires that your VMM has appropriate PCI
/linux-6.1.9/Documentation/networking/device_drivers/ethernet/intel/
Dfm10k.rst125 KVM Hypervisor/VMM supports direct assignment of a PCIe device to a VM. This
Dixgbe.rst540 Linux KVM Hypervisor/VMM supports direct assignment of a PCIe device to a VM.
/linux-6.1.9/Documentation/admin-guide/hw-vuln/
Dmultihit.rst39 Privileged software, including OS and virtual machine managers (VMM), are in
/linux-6.1.9/security/
DKconfig106 confidence that their hardware is running the VMM or kernel that
/linux-6.1.9/Documentation/virt/hyperv/
Doverview.rst11 encompass both the hypervisor and the VMM service without making a
/linux-6.1.9/Documentation/virt/kvm/x86/
Damd-memory-encryption.rst370 After completion of SEND_START, but before SEND_FINISH, the source VMM can issue the
/linux-6.1.9/Documentation/virt/kvm/
Dapi.rst6948 instead of KVM_CREATE_IRQCHIP if the userspace VMM wishes to emulate the
7319 KVM_CAP_SGX_ATTRIBUTE enables a userspace VMM to grant a VM access to one or
7377 VMM before creating any VCPUs to allow the guest access. Note that MTE is only
7383 hibernation of the host; however the VMM needs to manually save/restore the
7390 When enabled the VMM may make use of the ``KVM_ARM_MTE_COPY_TAGS`` ioctl to
7405 upgrading the VMM process without interrupting the guest.
7531 When userspace sets KVM_X86_NOTIFY_VMEXIT_ENABLED bit in args[0], VMM will
8097 supported in the host. A VMM can check whether the service is
/linux-6.1.9/arch/x86/
DKconfig895 some attacks from the VMM.