Home
last modified time | relevance | path

Searched full:computing (Results 1 – 25 of 65) sorted by relevance

123

/Documentation/security/
Dsnp-tdx-threat-model.rst2 Confidential Computing in Linux for x86 virtualization
12 Kernel developers working on confidential computing for virtualized
19 additional attack vectors that arise in the confidential computing space
25 Confidential Computing (CoCo) is a broad term covering a wide range of
34 to this subclass of CoCo as 'Confidential Computing (CoCo) for the
39 inside a CoCo VM. Namely, confidential computing allows its users to
41 Trusted Computing Base (TCB) given its ability to attest the state of these
125 Confidential Computing threat model and its security objectives
128 Confidential Computing adds a new type of attacker to the above list: a
/Documentation/ABI/testing/
Dsecurityfs-secrets-coco5 Exposes confidential computing (coco) EFI secrets to
8 EFI can declare memory area used by confidential computing
Dima_policy5 The Trusted Computing Group(TCG) runtime Integrity
/Documentation/security/secrets/
Dcoco.rst4 Confidential Computing secrets
7 This document describes how Confidential Computing secret injection is handled
15 Confidential Computing (coco) hardware such as AMD SEV (Secure Encrypted
/Documentation/devicetree/bindings/iommu/
Dpkvm,pviommu.yaml13 hypervisors with a small TCB as in confidential computing to implement
/Documentation/devicetree/bindings/tpm/
Dtcg,tpm-tis-mmio.yaml13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
Dmicrosoft,ftpm.yaml15 offer trusted computing features in their CPUs aimed at displacing dedicated
Dtcg,tpm_tis-spi.yaml13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
Dtcg,tpm-tis-i2c.yaml13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
/Documentation/arch/powerpc/
Dassociativity.rst61 used as an index while computing numa distance information via "ibm,numa-distance-table".
68 computing the distance of domain 8 from other domains present in the system. For the rest of
/Documentation/networking/
Dseg6-sysctl.rst29 Controls the behaviour of computing the flowlabel of outer
/Documentation/arch/x86/
Dzero-page.rst31 13C/004 ALL cc_blob_address Physical address of Confidential Computing blob
Dintel_txt.rst5 Intel's technology for safer computing, Intel(R) Trusted Execution
35 3_David-Grawrock_The-Front-Door-of-Trusted-Computing.pdf
/Documentation/userspace-api/media/v4l/
Dselection-api-examples.rst82 /* computing scaling factors */
/Documentation/scheduler/
Dsched-pelt.c3 * computing sched averages.
/Documentation/timers/
Dno_hz.rst9 some types of computationally intensive high-performance computing (HPC)
313 load, maintaining sched average, computing CFS entity vruntime,
314 computing avenrun, and carrying out load balancing. They are
/Documentation/admin-guide/acpi/
Dcppc_sysfs.rst62 Computing Average Delivered Performance
/Documentation/virt/kvm/arm/
Dpkvm.rst11 system. This allows for the creation of a confidential computing environment
/Documentation/arch/arm/nwfpe/
Dtodo.rst32 Coordinate Rotation Digital Computer, and is a method of computing
/Documentation/core-api/
Dunion_find.rst29 computing the minimum spanning tree, which is crucial in scenarios like
/Documentation/driver-api/mei/
Diamt.rst16 - Remote power off/on (useful for green computing or overnight IT
Dmei.rst6 The Intel Management Engine (Intel ME) is an isolated and protected computing
/Documentation/hwmon/
Dadm1026.rst16 - Philip Pokorny <ppokorny@penguincomputing.com> for Penguin Computing
/Documentation/translations/zh_CN/userspace-api/
Dseccomp_filter.rst14 *Seccomp: SECure COMPuting*
/Documentation/virt/gunyah/
Dindex.rst15 security and can support a much smaller trusted computing base than a Type-2

123