Home
last modified time | relevance | path

Searched refs:VMM (Results 1 – 12 of 12) sorted by relevance

/linux/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/
A Dvmm.h286 #define VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL,BASE,SIZE,NEXT) do { \ argument
300 VMM_SPAM(VMM, "ITER %08x %08x PTE(s)", PTEI, (u32)_ptes); \
302 FILL(VMM, PT, PTEI, _ptes, MAP, _addr); \
309 #define VMM_MAP_ITER_MEM(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
310 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
314 #define VMM_MAP_ITER_DMA(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
315 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
317 #define VMM_MAP_ITER_SGL(VMM,PT,PTEI,PTEN,MAP,FILL) \ argument
318 VMM_MAP_ITER(VMM,PT,PTEI,PTEN,MAP,FILL, \
/linux/Documentation/x86/
A Dintel_txt.rst46 Trusted Boot (tboot) is an open source, pre-kernel/VMM module that
48 kernel/VMM.
54 Tboot currently supports launching Xen (open source VMM/hypervisor
A Dintel-iommu.rst115 - API for paravirt ops for abstracting functionality for VMM folks.
A Dsva.rst217 ENQCMD can be used from within a guest VM. In these cases, the VMM helps
/linux/Documentation/virt/kvm/devices/
A Dvcpu.rst191 From the source VMM process:
203 From the destination VMM process:
/linux/drivers/virtio/
A DKconfig45 drivers over PCI. This requires that your VMM has appropriate PCI
/linux/Documentation/networking/device_drivers/ethernet/intel/
A Dfm10k.rst125 KVM Hypervisor/VMM supports direct assignment of a PCIe device to a VM. This
A Dixgbe.rst540 Linux KVM Hypervisor/VMM supports direct assignment of a PCIe device to a VM.
/linux/Documentation/admin-guide/hw-vuln/
A Dmultihit.rst39 Privileged software, including OS and virtual machine managers (VMM), are in
/linux/security/
A DKconfig117 confidence that their hardware is running the VMM or kernel that
/linux/Documentation/virt/kvm/
A Damd-memory-encryption.rst363 After completion of SEND_START, but before SEND_FINISH, the source VMM can issue the
A Dapi.rst6468 instead of KVM_CREATE_IRQCHIP if the userspace VMM wishes to emulate the
6840 KVM_CAP_SGX_ATTRIBUTE enables a userspace VMM to grant a VM access to one or
6898 VMM before creating any VCPUs to allow the guest access. Note that MTE is only
6904 hibernation of the host; however the VMM needs to manually save/restore the
6911 When enabled the VMM may make use of the ``KVM_ARM_MTE_COPY_TAGS`` ioctl to
6926 upgrading the VMM process without interrupting the guest.
7455 supported in the host. A VMM can check whether the service is

Completed in 33 milliseconds