Home
last modified time | relevance | path

Searched full:computing (Results 1 – 25 of 331) sorted by relevance

12345678910>>...14

/linux/Documentation/security/
H A Dsnp-tdx-threat-model.rst2 Confidential Computing in Linux for x86 virtualization
12 Kernel developers working on confidential computing for virtualized
19 additional attack vectors that arise in the confidential computing space
25 Confidential Computing (CoCo) is a broad term covering a wide range of
34 to this subclass of CoCo as 'Confidential Computing (CoCo) for the
39 inside a CoCo VM. Namely, confidential computing allows its users to
41 Trusted Computing Base (TCB) given its ability to attest the state of these
125 Confidential Computing threat model and its security objectives
128 Confidential Computing adds a new type of attacker to the above list: a
/linux/drivers/iio/dac/
H A Dcio-dac.c3 * IIO driver for the Measurement Computing CIO-DAC
6 * This driver supports the following Measurement Computing devices: CIO-DAC16,
35 MODULE_PARM_DESC(base, "Measurement Computing CIO-DAC base addresses");
160 MODULE_DESCRIPTION("Measurement Computing CIO-DAC IIO driver");
/linux/tools/perf/util/
H A Dexpr.y75 /* During computing ids, does val represent a constant (non-BOTTOM) value? */
126 * If we're not computing ids or $1 and $3 are constants, compute the new
127 * constant value using OP. Its invariant that there are no ids. If computing
307 /* LHS and/or RHS need computing from event IDs so union. */
322 /* LHS and/or RHS need computing from event IDs so union. */
343 /* LHS and/or RHS need computing from event IDs so union. */
/linux/Documentation/security/secrets/
H A Dcoco.rst4 Confidential Computing secrets
7 This document describes how Confidential Computing secret injection is handled
15 Confidential Computing (coco) hardware such as AMD SEV (Secure Encrypted
/linux/drivers/comedi/drivers/
H A Dcb_pcimdda.c12 * Description: Measurement Computing PCIM-DDA06-16
13 * Devices: [Measurement Computing] PCIM-DDA06-16 (cb_pcimdda)
28 * (well, at least according to the rather thin spec. from Measurement Computing
/linux/Documentation/ABI/testing/
H A Dsecurityfs-secrets-coco5 Exposes confidential computing (coco) EFI secrets to
8 EFI can declare memory area used by confidential computing
/linux/fs/smb/server/
H A Dxattr.h50 * Enumeration is used for computing posix acl hash.
74 * xattr_smb_acl structure is used for computing posix acl hash.
/linux/arch/x86/crypto/
H A Dpolyval-clmulni_asm.S18 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where
81 * This step is done when computing the polynomial reduction for efficiency
161 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0
163 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
/linux/drivers/misc/
H A Dsmpro-misc.c3 * Ampere Computing SoC's SMpro Misc Driver
5 * Copyright (c) 2022, Ampere Computing LLC
/linux/drivers/platform/mellanox/
H A DKconfig39 Computing (HPC) and embedded environments.
73 Computing (HPC) and embedded environments.
/linux/arch/x86/boot/compressed/
H A Dsev.c276 /* Search for Confidential Computing blob in the EFI config table. */
294 * Confidential Computing blob, which can be passed to the boot kernel
337 * If a SNP-specific Confidential Computing blob is present, then in early_snp_init()
509 * The Confidential Computing blob is used very early in uncompressed in sev_prep_identity_maps()
/linux/Documentation/arch/powerpc/
H A Dassociativity.rst61 used as an index while computing numa distance information via "ibm,numa-distance-table".
68 computing the distance of domain 8 from other domains present in the system. For the rest of
/linux/arch/arm64/crypto/
H A Dpolyval-ce-core.S20 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where
86 * This step is done when computing the polynomial reduction for efficiency
188 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0
190 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
/linux/drivers/virt/coco/guest/
H A DKconfig3 # Confidential computing shared guest collateral
/linux/fs/orangefs/
H A DKconfig7 computing (HEC) systems.
/linux/Documentation/driver-api/coco/
H A Dindex.rst4 Confidential Computing
/linux/include/uapi/linux/
H A Dipmi_ssif_bmc.h3 * Copyright (c) 2022, Ampere Computing LLC.
/linux/drivers/virt/coco/
H A DKconfig3 # Confidential computing related collateral
H A DMakefile3 # Confidential computing related collateral
/linux/drivers/virt/coco/efi_secret/
H A DKconfig10 confidential computing secret injection (for example for AMD SEV
/linux/arch/powerpc/platforms/pseries/
H A Dcc_platform.c3 * Confidential Computing Platform Capability checks
/linux/arch/mips/loongson64/
H A Dsetup.c3 * Copyright (C) 2007 Lemote Inc. & Institute of Computing Technology
/linux/arch/mips/include/asm/mach-loongson64/
H A Dmmzone.h4 * Institute of Computing Technology
/linux/include/scsi/
H A Dscsicam.h6 * Visionary Computing
/linux/security/integrity/ima/
H A DMakefile3 # Makefile for building Trusted Computing Group's(TCG) runtime Integrity

12345678910>>...14