/linux-6.1.9/drivers/media/radio/ |
D | radio-trust.c | 51 struct trust { struct 58 struct trust *tr = kzalloc(sizeof(*tr), GFP_KERNEL); in trust_alloc() argument 73 static void write_i2c(struct trust *tr, int n, ...) in write_i2c() 121 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_mute_volume() 131 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_stereo() 149 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_frequency() 166 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_ctrl() 185 struct trust *tr = container_of(isa, struct trust, isa); in trust_initialize()
|
D | Makefile | 31 obj-$(CONFIG_RADIO_TRUST) += radio-trust.o
|
/linux-6.1.9/tools/testing/selftests/rcutorture/bin/ |
D | torture.sh | 350 …bin/kvm.sh --allcpus --duration "$duration_rcutorture" --configs "$configs_rcutorture" --trust-make 356 …ure lock --allcpus --duration "$duration_locktorture" --configs "$configs_locktorture" --trust-make 362 …onfigs "$configs_scftorture" --kconfig "CONFIG_NR_CPUS=$HALF_ALLOTED_CPUS" --memory 2G --trust-make 369 …s/rcutorture/bin/kvm.sh --allcpus --duration "$duration_rcutorture" --configs "TREE03" --trust-make 373 …s/rcutorture/bin/kvm.sh --allcpus --duration "$duration_rcutorture" --configs "TREE03" --trust-make 397 …us --duration 5 --kconfig "CONFIG_TASKS_TRACE_RCU=y CONFIG_NR_CPUS=$HALF_ALLOTED_CPUS" --trust-make 403 …cale --allcpus --duration 10 --kconfig "CONFIG_NR_CPUS=$HALF_ALLOTED_CPUS" --memory 2G --trust-make 409 …allcpus --duration 45s --configs TREE03 --kconfig "CONFIG_TEST_CLOCKSOURCE_WATCHDOG=y" --trust-make 412 …allcpus --duration 45s --configs TREE03 --kconfig "CONFIG_TEST_CLOCKSOURCE_WATCHDOG=y" --trust-make 418 …ools/testing/selftests/rcutorture/bin/kvm.sh --allcpus --duration 45s --configs TREE03 --trust-make
|
D | parse-build.sh | 24 if grep -q CC < $F || test -n "$TORTURE_TRUST_MAKE" || grep -qe --trust-make < `dirname $F`/../log
|
D | kvm-check-branches.sh | 76 …kvm.sh --allcpus --duration 3 --trust-make --datestamp "$ds/$idir" > $resdir/$ds/$idir/kvm.sh.out …
|
/linux-6.1.9/Documentation/admin-guide/hw-vuln/ |
D | core-scheduling.rst | 8 group of tasks don't trust another), or for performance usecases (some 96 mentioned in `Usage`_, tasks with the same cookie value are assumed to trust 121 The scheduler tries its best to find tasks that trust each other such that all 151 Core scheduling maintains trust relationships amongst groups of tasks by 153 When a system with core scheduling boots, all tasks are considered to trust 155 trust relationships until userspace uses the above mentioned interfaces, to 161 within such groups are considered to trust each other, but do not trust those 162 outside. Tasks outside the group also don't trust tasks within. 187 siblings run tasks which trust each other, when the kernel is executing 188 code on behalf of a task, it cannot trust the code running in the [all …]
|
/linux-6.1.9/Documentation/admin-guide/namespaces/ |
D | resource-control.rst | 8 enabled in a kernel for people who don't trust their users or their 14 memory user's they don't trust to play nice can use.
|
/linux-6.1.9/Documentation/security/keys/ |
D | trusted-encrypted.rst | 17 A trust source provides the source of security for Trusted Keys. This 18 section lists currently supported trust sources, along with their security 19 considerations. Whether or not a trust source is sufficiently safe depends 22 environment is, and there is no metric of trust, it is dependent on the 23 consumer of the Trusted Keys to determine if the trust source is sufficiently 26 * Root of trust for storage 31 provides crypto operation to establish root of trust for storage. 41 mode, trust is rooted to the OTPMK, a never-disclosed 256-bit key 99 The strength and appropriateness of a particular trust source for a given 112 trust source. The random number generator in use differs according to the [all …]
|
/linux-6.1.9/Documentation/x86/ |
D | intel_txt.rst | 13 - Provides dynamic root of trust for measurement (DRTM) 34 http://www.trust-conference.eu/downloads/Keynote-Speakers/ 67 To get trust in the initial kernel without using Intel TXT, a 68 static root of trust must be used. This bases trust in BIOS 81 By using the hardware-based root of trust that Intel TXT provides, 83 pre-launch components can be removed from the trust chain, DMA 91 almost all parts of the trust chain is available (excepting SMM and 101 processor instruction that initiates the dynamic root of trust.
|
D | tdx.rst | 175 will expose the register state to the host. TDX guests don't trust the host 218 https://www.intel.com/content/www/us/en/developer/articles/technical/intel-trust-domain-extensions.…
|
/linux-6.1.9/include/linux/qed/ |
D | qed_iov_if.h | 31 int (*set_trust) (struct qed_dev *cdev, int vfid, bool trust);
|
/linux-6.1.9/Documentation/devicetree/bindings/remoteproc/ |
D | st,stm32-rproc.yaml | 41 Reference to the system configuration which holds the RCC trust zone mode 46 - description: The offset of the trust zone setting register 47 - description: The field mask of the trust zone state
|
/linux-6.1.9/drivers/net/ethernet/broadcom/bnxt/ |
D | bnxt_sriov.h | 38 int bnxt_set_vf_trust(struct net_device *dev, int vf_id, bool trust);
|
/linux-6.1.9/security/keys/trusted-keys/ |
D | Kconfig | 37 comment "No trust source selected!"
|
/linux-6.1.9/drivers/net/ethernet/huawei/hinic/ |
D | hinic_sriov.c | 353 if (vf_info->pf_set_mac && !(vf_info->trust) && in hinic_set_vf_mac_msg_handler() 567 ivi->trusted = vfinfo->trust; in hinic_get_vf_config() 793 bool trust) in hinic_set_vf_trust() argument 803 vf_infos[vf_id].trust = trust; in hinic_set_vf_trust() 822 cur_trust = nic_io->vf_infos[vf].trust; in hinic_ndo_set_vf_trust() 1127 if (vf_infos->trust) in hinic_clear_vf_infos()
|
D | hinic_sriov.h | 46 bool trust; member
|
/linux-6.1.9/Documentation/admin-guide/media/ |
D | radio-cardlist.rst | 31 radio-trust Trust FM radio card
|
/linux-6.1.9/Documentation/process/ |
D | maintainer-pgp-guide.rst | 47 that trust must always be placed with developers and never with the code 52 want to make sure that by placing trust into developers we do not simply 178 - sign other people's keys for web of trust purposes 514 trust: ultimate validity: ultimate 890 delegated trust technologies, namely DNSSEC and TLS, to get you going if 922 PGP incorporates a trust delegation mechanism known as the "Web of 932 "the SSH-like approach to trust." With SSH, the first time you connect 936 trust the changed key or not. Similarly, the first time you import 942 We recommend that you use the combined TOFU+PGP trust model (which is 944 ``trust-model`` setting in ``~/.gnupg/gpg.conf``:: [all …]
|
D | management-style.rst | 95 deleting it, you may have irrevocably lost the trust of that 176 trust somebody who is so clearly hiding their true character. 236 It's part of what makes people trust you, and allow you the potential
|
/linux-6.1.9/Documentation/hwmon/ |
D | lm63.rst | 75 is left to the BIOS, and the driver will blindly trust it. Only the original
|
/linux-6.1.9/Documentation/usb/ |
D | authorization.rst | 94 can fake descriptors and device info. Don't trust that. You are
|
/linux-6.1.9/Documentation/ABI/testing/ |
D | sysfs-class-cxl | 251 0 don't trust, the image may be different (default) 252 1 trust that the image will not change.
|
/linux-6.1.9/drivers/firmware/efi/libstub/ |
D | efistub.h | 391 void *trust; member 412 u32 trust; member
|
/linux-6.1.9/Documentation/security/tpm/ |
D | xen-tpmfront.rst | 21 the chain of trust rooted in the hardware TPM to virtual machines in Xen. Each
|
/linux-6.1.9/security/keys/ |
D | Kconfig | 77 generated and sealed by a trust source selected at kernel boot-time.
|