| /drivers/virt/coco/ |
| A D | Makefile | 6 obj-$(CONFIG_ARM_PKVM_GUEST) += pkvm-guest/ 7 obj-$(CONFIG_SEV_GUEST) += sev-guest/ 8 obj-$(CONFIG_INTEL_TDX_GUEST) += tdx-guest/ 9 obj-$(CONFIG_ARM_CCA_GUEST) += arm-cca-guest/ 10 obj-$(CONFIG_TSM_GUEST) += guest/
|
| A D | Kconfig | 8 source "drivers/virt/coco/pkvm-guest/Kconfig" 10 source "drivers/virt/coco/sev-guest/Kconfig" 12 source "drivers/virt/coco/tdx-guest/Kconfig" 14 source "drivers/virt/coco/arm-cca-guest/Kconfig" 16 source "drivers/virt/coco/guest/Kconfig"
|
| /drivers/virt/coco/tdx-guest/ |
| A D | Kconfig | 8 the TDX module to request the TDX guest details like attestation 12 be called tdx-guest.
|
| A D | Makefile | 2 obj-$(CONFIG_TDX_GUEST_DRIVER) += tdx-guest.o
|
| /drivers/gpu/drm/xen/ |
| A D | Kconfig | 6 tristate "Para-virtualized frontend driver for Xen guest OS" 15 frontend DRM/KMS driver for Xen guest OSes.
|
| /drivers/virt/coco/sev-guest/ |
| A D | Kconfig | 7 SEV-SNP firmware provides the guest a mechanism to communicate with 13 If you choose 'M' here, this module will be called sev-guest.
|
| A D | Makefile | 2 obj-$(CONFIG_SEV_GUEST) += sev-guest.o
|
| /drivers/media/pci/zoran/ |
| A D | zoran_device.h | 20 int post_office_write(struct zoran *zr, unsigned int guest, unsigned int reg, 22 int post_office_read(struct zoran *zr, unsigned int guest, unsigned int reg);
|
| A D | zoran_device.c | 123 int post_office_write(struct zoran *zr, unsigned int guest, in post_office_write() argument 129 ZR36057_POR_PO_DIR | ZR36057_POR_PO_TIME | ((guest & 7) << 20) | in post_office_write() 136 int post_office_read(struct zoran *zr, unsigned int guest, unsigned int reg) in post_office_read() argument 140 por = ZR36057_POR_PO_TIME | ((guest & 7) << 20) | ((reg & 7) << 16); in post_office_read()
|
| /drivers/misc/pvpanic/ |
| A D | Kconfig | 13 a virtual machine (guest) communicate panic events to the host. 27 forwards the panic events from the guest to the host.
|
| /drivers/xen/ |
| A D | Kconfig | 54 int "Hotplugged memory limit (in GiB) for a PV guest" 59 Maximum amount of memory (in GiB) that a PV guest can be 62 A PV guest can have more memory than this limit if is 220 devices to appear in the guest. You can choose the default (0) where 277 daemon can speed up interrupt delivery from / to a guest. 336 bool "Use unpopulated memory ranges for guest mappings" 340 Use unpopulated memory ranges in order to create mappings for guest 359 Enable virtio support for running as Xen guest. Depending on the 360 guest type this will require special support on the backend side 371 of the guest memory. This will need support on the backend side
|
| /drivers/hv/ |
| A D | Kconfig | 3 menu "Microsoft Hyper-V guest support" 24 enlightenments offered to host and guest partitions which enables 38 not run as a normal guest.
|
| /drivers/vhost/ |
| A D | Kconfig | 40 guest networking with virtio_net. Not to be confused with virtio_net 41 module itself which needs to be loaded in guest kernel. 78 guest virtio devices with the vDPA-based backends.
|
| /drivers/virt/coco/arm-cca-guest/ |
| A D | Makefile | 2 obj-$(CONFIG_ARM_CCA_GUEST) += arm-cca-guest.o
|
| A D | Kconfig | 10 arm-cca-guest.
|
| /drivers/virt/coco/pkvm-guest/ |
| A D | Makefile | 2 obj-$(CONFIG_ARM_PKVM_GUEST) += arm-pkvm-guest.o
|
| A D | Kconfig | 2 bool "Arm pKVM protected guest driver"
|
| /drivers/virt/coco/guest/ |
| A D | Kconfig | 3 # Confidential computing shared guest collateral
|
| /drivers/gpu/drm/vmwgfx/ |
| A D | vmwgfx_cursor_plane.c | 355 if (cmd->dma.guest.ptr.offset % PAGE_SIZE || in vmw_kms_cursor_snoop() 368 cmd->dma.guest.ptr.offset); in vmw_kms_cursor_snoop() 372 kmap_offset = cmd->dma.guest.ptr.offset >> PAGE_SHIFT; in vmw_kms_cursor_snoop() 387 if (box->w == VMW_CURSOR_SNOOP_WIDTH && cmd->dma.guest.pitch == image_pitch) { in vmw_kms_cursor_snoop() 394 virtual + i * cmd->dma.guest.pitch, in vmw_kms_cursor_snoop()
|
| /drivers/misc/vmw_vmci/ |
| A D | Kconfig | 11 high-speed communication between host and guest in a virtual
|
| /drivers/net/ethernet/sun/ |
| A D | Kconfig | 97 guest domain network interconnectivity or guest domain
|
| /drivers/perf/ |
| A D | apple_m1_cpu_pmu.c | 411 bool guest = config_base & M1_PMU_CFG_COUNT_GUEST; in m1_pmu_configure_counter() local 417 __m1_pmu_configure_event_filter(index, user && guest, kernel && guest, false); in m1_pmu_configure_counter()
|
| /drivers/gpu/drm/i915/gvt/ |
| A D | gtt.c | 488 bool guest) in _ppgtt_get_root_entry() argument 495 pte_ops->get_entry(guest ? mm->ppgtt_mm.guest_pdps : in _ppgtt_get_root_entry() 515 bool guest) in _ppgtt_set_root_entry() argument 519 pte_ops->set_entry(guest ? mm->ppgtt_mm.guest_pdps : in _ppgtt_set_root_entry() 589 bool guest) in ppgtt_spt_get_entry() argument 600 ret = ops->get_entry(page_table, e, index, guest, in ppgtt_spt_get_entry() 606 update_entry_type_for_real(ops, e, guest ? in ppgtt_spt_get_entry() 618 bool guest) in ppgtt_spt_set_entry() argument 629 return ops->set_entry(page_table, e, index, guest, in ppgtt_spt_set_entry() 1977 struct intel_gvt_gtt_entry *e, unsigned long index, bool guest) in ppgtt_get_next_level_entry() argument [all …]
|
| /drivers/dma/qcom/ |
| A D | Kconfig | 43 the guest OS would run QCOM_HIDMA channel driver and the
|
| /drivers/cpuidle/ |
| A D | Kconfig | 81 before halting in the guest (more efficient than polling in the
|