Searched full:computing (Results 1 – 25 of 425) sorted by relevance
12345678910>>...17
/linux-6.14.4/include/linux/ |
D | cc_platform.h | 3 * Confidential Computing Platform Capability checks 17 * enum cc_attr - Confidential computing attributes 19 * These attributes represent confidential computing features that are 105 * @attr: Confidential computing attribute to check 108 * specified Confidential Computing attribute is currently active. 112 * * TRUE - Specified Confidential Computing attribute is active 113 * * FALSE - Specified Confidential Computing attribute is not active
|
/linux-6.14.4/include/linux/iio/common/ |
D | inv_sensors_timestamp.h | 32 * struct inv_sensors_timestamp_acc - accumulator for computing an estimation 35 * @values: table of all measured values, use for computing the mean 49 * @timestamp: store last timestamp for computing next data timestamp 53 * @chip_period: accumulator for computing internal chip period
|
/linux-6.14.4/drivers/staging/gpib/ |
D | Kconfig | 90 tristate "Measurement Computing compatible boards" 98 Enable support for Measurement Computing (Computer Boards): 117 Measurement Computing (Computer Boards) 210 measurement computing boards and Ines boards. 235 Measurement Computing ISA-GPIB-PCA2
|
/linux-6.14.4/Documentation/security/ |
D | snp-tdx-threat-model.rst | 2 Confidential Computing in Linux for x86 virtualization 12 Kernel developers working on confidential computing for virtualized 19 additional attack vectors that arise in the confidential computing space 25 Confidential Computing (CoCo) is a broad term covering a wide range of 34 to this subclass of CoCo as 'Confidential Computing (CoCo) for the 39 inside a CoCo VM. Namely, confidential computing allows its users to 41 Trusted Computing Base (TCB) given its ability to attest the state of these 125 Confidential Computing threat model and its security objectives 128 Confidential Computing adds a new type of attacker to the above list: a
|
/linux-6.14.4/drivers/iio/dac/ |
D | cio-dac.c | 3 * IIO driver for the Measurement Computing CIO-DAC 6 * This driver supports the following Measurement Computing devices: CIO-DAC16, 35 MODULE_PARM_DESC(base, "Measurement Computing CIO-DAC base addresses"); 160 MODULE_DESCRIPTION("Measurement Computing CIO-DAC IIO driver");
|
/linux-6.14.4/tools/perf/util/ |
D | expr.y | 75 /* During computing ids, does val represent a constant (non-BOTTOM) value? */ 126 * If we're not computing ids or $1 and $3 are constants, compute the new 127 * constant value using OP. Its invariant that there are no ids. If computing 307 /* LHS and/or RHS need computing from event IDs so union. */ 322 /* LHS and/or RHS need computing from event IDs so union. */ 343 /* LHS and/or RHS need computing from event IDs so union. */
|
/linux-6.14.4/Documentation/security/secrets/ |
D | coco.rst | 4 Confidential Computing secrets 7 This document describes how Confidential Computing secret injection is handled 15 Confidential Computing (coco) hardware such as AMD SEV (Secure Encrypted
|
/linux-6.14.4/Documentation/ABI/testing/ |
D | securityfs-secrets-coco | 5 Exposes confidential computing (coco) EFI secrets to 8 EFI can declare memory area used by confidential computing
|
/linux-6.14.4/drivers/comedi/drivers/ |
D | cb_pcimdda.c | 12 * Description: Measurement Computing PCIM-DDA06-16 13 * Devices: [Measurement Computing] PCIM-DDA06-16 (cb_pcimdda) 28 * (well, at least according to the rather thin spec. from Measurement Computing
|
/linux-6.14.4/fs/smb/server/ |
D | xattr.h | 50 * Enumeration is used for computing posix acl hash. 74 * xattr_smb_acl structure is used for computing posix acl hash.
|
/linux-6.14.4/arch/x86/crypto/ |
D | polyval-clmulni_asm.S | 18 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where 81 * This step is done when computing the polynomial reduction for efficiency 161 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0 163 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
|
/linux-6.14.4/drivers/misc/ |
D | smpro-misc.c | 3 * Ampere Computing SoC's SMpro Misc Driver 5 * Copyright (c) 2022, Ampere Computing LLC
|
/linux-6.14.4/lib/ |
D | crc64.c | 47 * or the previous crc64 value if computing incrementally. 69 * previous crc64 value if computing incrementally.
|
/linux-6.14.4/Documentation/arch/powerpc/ |
D | associativity.rst | 61 used as an index while computing numa distance information via "ibm,numa-distance-table". 68 computing the distance of domain 8 from other domains present in the system. For the rest of
|
/linux-6.14.4/fs/orangefs/ |
D | Kconfig | 7 computing (HEC) systems.
|
/linux-6.14.4/drivers/infiniband/sw/rxe/ |
D | rxe_icrc.c | 13 * rxe_icrc_init() - Initialize crypto function for computing crc32 91 /* This seed is the result of computing a CRC with a seed of in rxe_icrc_hdr()
|
/linux-6.14.4/arch/arm64/crypto/ |
D | polyval-ce-core.S | 20 * This two step process is equivalent to computing h^8m_0 + ... + h^1m_7 where 86 * This step is done when computing the polynomial reduction for efficiency 188 * The implementation below saves a XOR instruction by computing P_1 + T_0 : P_0 190 * T_1 into dest. This allows us to reuse P_1 + T_0 when computing V.
|
/linux-6.14.4/drivers/virt/coco/ |
D | Kconfig | 3 # Confidential computing related collateral
|
D | Makefile | 3 # Confidential computing related collateral
|
/linux-6.14.4/include/uapi/linux/ |
D | ipmi_ssif_bmc.h | 3 * Copyright (c) 2022, Ampere Computing LLC.
|
/linux-6.14.4/arch/powerpc/platforms/pseries/ |
D | cc_platform.c | 3 * Confidential Computing Platform Capability checks
|
/linux-6.14.4/drivers/virt/coco/efi_secret/ |
D | Kconfig | 10 confidential computing secret injection (for example for AMD SEV
|
/linux-6.14.4/arch/mips/loongson64/ |
D | setup.c | 3 * Copyright (C) 2007 Lemote Inc. & Institute of Computing Technology
|
/linux-6.14.4/arch/mips/include/asm/mach-loongson64/ |
D | mmzone.h | 4 * Institute of Computing Technology
|
/linux-6.14.4/arch/x86/boot/compressed/ |
D | sev.c | 398 /* Search for Confidential Computing blob in the EFI config table. */ 416 * Confidential Computing blob, which can be passed to the boot kernel 459 * If a SNP-specific Confidential Computing blob is present, then in early_snp_init() 631 * The Confidential Computing blob is used very early in uncompressed in sev_prep_identity_maps()
|
12345678910>>...17