/linux/Documentation/security/ |
H A D | snp-tdx-threat-model.rst | 2 Confidential Computing in Linux for x86 virtualization 12 Kernel developers working on confidential computing for virtualized 19 additional attack vectors that arise in the confidential computing space 25 Confidential Computing (CoCo) is a broad term covering a wide range of 34 to this subclass of CoCo as 'Confidential Computing (CoCo) for the 39 inside a CoCo VM. Namely, confidential computing allows its users to 41 Trusted Computing Base (TCB) given its ability to attest the state of these 125 Confidential Computing threat model and its security objectives 128 Confidential Computing adds a new type of attacker to the above list: a
|
/linux/drivers/iio/dac/ |
H A D | cio-dac.c | 3 * IIO driver for the Measurement Computing CIO-DAC 6 * This driver supports the following Measurement Computing devices: CIO-DAC16, 35 MODULE_PARM_DESC(base, "Measurement Computing CIO-DAC base addresses"); 160 MODULE_DESCRIPTION("Measurement Computing CIO-DAC IIO driver");
|
/linux/tools/perf/util/ |
H A D | expr.y | 75 /* During computing ids, does val represent a constant (non-BOTTOM) value? */ 126 * If we're not computing ids or $1 and $3 are constants, compute the new 127 * constant value using OP. Its invariant that there are no ids. If computing 307 /* LHS and/or RHS need computing from event IDs so union. */ 322 /* LHS and/or RHS need computing from event IDs so union. */ 343 /* LHS and/or RHS need computing from event IDs so union. */
|
/linux/Documentation/security/secrets/ |
H A D | coco.rst | 4 Confidential Computing secrets 7 This document describes how Confidential Computing secret injection is handled 15 Confidential Computing (coco) hardware such as AMD SEV (Secure Encrypted
|
/linux/drivers/comedi/drivers/ |
H A D | cb_pcimdda.c | 12 * Description: Measurement Computing PCIM-DDA06-16 13 * Devices: [Measurement Computing] PCIM-DDA06-16 (cb_pcimdda) 28 * (well, at least according to the rather thin spec. from Measurement Computing
|
/linux/Documentation/ABI/testing/ |
H A D | securityfs-secrets-coco | 5 Exposes confidential computing (coco) EFI secrets to 8 EFI can declare memory area used by confidential computing
|
/linux/fs/smb/server/ |
H A D | xattr.h | 50 * Enumeration is used for computing posix acl hash. 74 * xattr_smb_acl structure is used for computing posix acl hash.
|
/linux/arch/x86/crypto/ |
H A D | polyval-clmulni_asm.S | 18 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where 81 * This step is done when computing the polynomial reduction for efficiency 161 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0 163 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
|
/linux/drivers/misc/ |
H A D | smpro-misc.c | 3 * Ampere Computing SoC's SMpro Misc Driver 5 * Copyright (c) 2022, Ampere Computing LLC
|
/linux/drivers/platform/mellanox/ |
H A D | Kconfig | 39 Computing (HPC) and embedded environments. 73 Computing (HPC) and embedded environments.
|
/linux/arch/x86/boot/compressed/ |
H A D | sev.c | 276 /* Search for Confidential Computing blob in the EFI config table. */ 294 * Confidential Computing blob, which can be passed to the boot kernel 337 * If a SNP-specific Confidential Computing blob is present, then in early_snp_init() 509 * The Confidential Computing blob is used very early in uncompressed in sev_prep_identity_maps()
|
/linux/Documentation/arch/powerpc/ |
H A D | associativity.rst | 61 used as an index while computing numa distance information via "ibm,numa-distance-table". 68 computing the distance of domain 8 from other domains present in the system. For the rest of
|
/linux/arch/arm64/crypto/ |
H A D | polyval-ce-core.S | 20 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where 86 * This step is done when computing the polynomial reduction for efficiency 188 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0 190 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
|
/linux/drivers/virt/coco/guest/ |
H A D | Kconfig | 3 # Confidential computing shared guest collateral
|
/linux/fs/orangefs/ |
H A D | Kconfig | 7 computing (HEC) systems.
|
/linux/Documentation/driver-api/coco/ |
H A D | index.rst | 4 Confidential Computing
|
/linux/include/uapi/linux/ |
H A D | ipmi_ssif_bmc.h | 3 * Copyright (c) 2022, Ampere Computing LLC.
|
/linux/drivers/virt/coco/ |
H A D | Kconfig | 3 # Confidential computing related collateral
|
H A D | Makefile | 3 # Confidential computing related collateral
|
/linux/drivers/virt/coco/efi_secret/ |
H A D | Kconfig | 10 confidential computing secret injection (for example for AMD SEV
|
/linux/arch/powerpc/platforms/pseries/ |
H A D | cc_platform.c | 3 * Confidential Computing Platform Capability checks
|
/linux/arch/mips/loongson64/ |
H A D | setup.c | 3 * Copyright (C) 2007 Lemote Inc. & Institute of Computing Technology
|
/linux/arch/mips/include/asm/mach-loongson64/ |
H A D | mmzone.h | 4 * Institute of Computing Technology
|
/linux/include/scsi/ |
H A D | scsicam.h | 6 * Visionary Computing
|
/linux/security/integrity/ima/ |
H A D | Makefile | 3 # Makefile for building Trusted Computing Group's(TCG) runtime Integrity
|