Searched full:computing (Results 1 – 25 of 65) sorted by relevance
123
| /Documentation/security/ |
| D | snp-tdx-threat-model.rst | 2 Confidential Computing in Linux for x86 virtualization 12 Kernel developers working on confidential computing for virtualized 19 additional attack vectors that arise in the confidential computing space 25 Confidential Computing (CoCo) is a broad term covering a wide range of 34 to this subclass of CoCo as 'Confidential Computing (CoCo) for the 39 inside a CoCo VM. Namely, confidential computing allows its users to 41 Trusted Computing Base (TCB) given its ability to attest the state of these 125 Confidential Computing threat model and its security objectives 128 Confidential Computing adds a new type of attacker to the above list: a
|
| /Documentation/ABI/testing/ |
| D | securityfs-secrets-coco | 5 Exposes confidential computing (coco) EFI secrets to 8 EFI can declare memory area used by confidential computing
|
| D | ima_policy | 5 The Trusted Computing Group(TCG) runtime Integrity
|
| /Documentation/security/secrets/ |
| D | coco.rst | 4 Confidential Computing secrets 7 This document describes how Confidential Computing secret injection is handled 15 Confidential Computing (coco) hardware such as AMD SEV (Secure Encrypted
|
| /Documentation/devicetree/bindings/iommu/ |
| D | pkvm,pviommu.yaml | 13 hypervisors with a small TCB as in confidential computing to implement
|
| /Documentation/devicetree/bindings/tpm/ |
| D | tcg,tpm-tis-mmio.yaml | 13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
|
| D | microsoft,ftpm.yaml | 15 offer trusted computing features in their CPUs aimed at displacing dedicated
|
| D | tcg,tpm_tis-spi.yaml | 13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
|
| D | tcg,tpm-tis-i2c.yaml | 13 The Trusted Computing Group (TCG) has defined a multi-vendor standard
|
| /Documentation/arch/powerpc/ |
| D | associativity.rst | 61 used as an index while computing numa distance information via "ibm,numa-distance-table". 68 computing the distance of domain 8 from other domains present in the system. For the rest of
|
| /Documentation/networking/ |
| D | seg6-sysctl.rst | 29 Controls the behaviour of computing the flowlabel of outer
|
| /Documentation/arch/x86/ |
| D | zero-page.rst | 31 13C/004 ALL cc_blob_address Physical address of Confidential Computing blob
|
| D | intel_txt.rst | 5 Intel's technology for safer computing, Intel(R) Trusted Execution 35 3_David-Grawrock_The-Front-Door-of-Trusted-Computing.pdf
|
| /Documentation/userspace-api/media/v4l/ |
| D | selection-api-examples.rst | 82 /* computing scaling factors */
|
| /Documentation/scheduler/ |
| D | sched-pelt.c | 3 * computing sched averages.
|
| /Documentation/timers/ |
| D | no_hz.rst | 9 some types of computationally intensive high-performance computing (HPC) 313 load, maintaining sched average, computing CFS entity vruntime, 314 computing avenrun, and carrying out load balancing. They are
|
| /Documentation/admin-guide/acpi/ |
| D | cppc_sysfs.rst | 62 Computing Average Delivered Performance
|
| /Documentation/virt/kvm/arm/ |
| D | pkvm.rst | 11 system. This allows for the creation of a confidential computing environment
|
| /Documentation/arch/arm/nwfpe/ |
| D | todo.rst | 32 Coordinate Rotation Digital Computer, and is a method of computing
|
| /Documentation/core-api/ |
| D | union_find.rst | 29 computing the minimum spanning tree, which is crucial in scenarios like
|
| /Documentation/driver-api/mei/ |
| D | iamt.rst | 16 - Remote power off/on (useful for green computing or overnight IT
|
| D | mei.rst | 6 The Intel Management Engine (Intel ME) is an isolated and protected computing
|
| /Documentation/hwmon/ |
| D | adm1026.rst | 16 - Philip Pokorny <ppokorny@penguincomputing.com> for Penguin Computing
|
| /Documentation/translations/zh_CN/userspace-api/ |
| D | seccomp_filter.rst | 14 *Seccomp: SECure COMPuting*
|
| /Documentation/virt/gunyah/ |
| D | index.rst | 15 security and can support a much smaller trusted computing base than a Type-2
|
123