Home
last modified time | relevance | path

Searched refs:Protected (Results 1 – 25 of 37) sorted by relevance

12

/openbmc/u-boot/board/keymile/km83xx/
H A DREADME.kmeter167 Un-Protected 5 sectors
73 Protected 5 sectors
77 Un-Protected 1 sectors
79 Un-Protected 1 sectors
85 Protected 1 sectors
87 Protected 1 sectors
/openbmc/qemu/docs/system/s390x/
H A Dprotvirt.rst1 Protected Virtualization on s390x
4 The memory and most of the registers of Protected Virtual Machines
14 To run PVMs, a machine with the Protected Virtualization feature, as
25 Running a Protected Virtual Machine
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/
H A D0006-Platform-CS1000-Increase-buffers-for-EFI-vars.patch6 The UEFI variables are stored in the Protected Storage. The size of
31 +/* The maximum asset size to be stored in the Protected Storage */
H A D0004-Platform-CS1000-Increase-ITS-max-asset-size.patch32 /* The maximum number of assets to be stored in the Protected Storage area. */
/openbmc/qemu/docs/system/
H A Dconfidential-guest-support.rst41 * POWER Protected Execution Facility (PEF) (see :ref:`power-papr-protected-execution-facility-pef`)
42 * s390x Protected Virtualization (PV) (see :doc:`s390x/protvirt`)
/openbmc/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst4 s390 (IBM Z) Boot/IPL of Protected VMs
9 The memory of Protected Virtual Machines (PVMs) is not accessible to
44 Subcode 10: Move into Protected Virtualization mode
H A Ds390-pv.rst4 s390 (IBM Z) Ultravisor and Protected VMs
9 Protected virtual machines (PVM) are KVM VMs that do not allow KVM to
H A Ds390-pv-dump.rst4 s390 (IBM Z) Protected Virtualization dumps
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/
H A Dts-psa-ps-api-test_git.bb1 DESCRIPTION = "Protected Storage PSA certification tests (psa-arch-test) for Trusted Services"
/openbmc/bmcweb/redfish-core/include/generated/enums/
H A Dvolume.hpp96 Protected, enumerator
240 {WriteCacheStateType::Protected, "Protected"},
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-driver-ccp50 whether Replay Protected Monotonic Counter support has been enabled.
61 whether an Replay Protected Monotonic Counter supported SPI is installed
/openbmc/linux/arch/x86/boot/
H A Dpmjump.S38 orb $X86_CR0_PE, %dl # Protected mode
/openbmc/linux/arch/arm64/kvm/
H A DKconfig62 bool "Protected KVM hypervisor stacktraces"
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0013-Fix-error-handling-of-variable-index-loading.patch6 If loading of the variable index from Protected Storage fails, SmmGW
/openbmc/qemu/tests/migration/i386/
H A Da-b-bootblock.S40 mov %eax,%cr0 # Protected mode enable
/openbmc/qemu/.gitlab-ci.d/cirrus/
H A DREADME.rst43 Neither of these variables should be marked as *Protected*, because in
/openbmc/openbmc/meta-arm/documentation/
H A Dtrusted-services.md23 | Protected Storage | ts-storage |
/openbmc/qemu/docs/specs/
H A Dppc-spapr-uv-hcalls.rst5 On PPC64 systems supporting Protected Execution Facility (PEF), system memory
/openbmc/openbmc/poky/meta/recipes-connectivity/wpa-supplicant/
H A Dwpa-supplicant_2.11.bb1 SUMMARY = "Client for Wi-Fi Protected Access (WPA)"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/hostapd/hostapd/
H A Ddefconfig110 # Wi-Fi Protected Setup (WPS)
/openbmc/qemu/docs/system/ppc/
H A Dpseries.rst267 POWER (PAPR) Protected Execution Facility (PEF)
270 Protected Execution Facility (PEF), also known as Secure Guest support
/openbmc/u-boot/arch/arm/cpu/armv8/fsl-layerscape/
H A DKconfig272 The FSL Primary Protected Application (PPA) is a software component
284 The FSL Primary Protected Application (PPA) is a software component
/openbmc/linux/arch/powerpc/platforms/pseries/
H A DKconfig182 the Protected Execution Facility, with the help of an Ultravisor
/openbmc/linux/drivers/gpu/drm/i915/
H A DKconfig153 PXP (Protected Xe Path) is an i915 component, available on graphics
/openbmc/linux/Documentation/powerpc/
H A Dultravisor.rst5 Protected Execution Facility
14 Protected Execution Facility (PEF) is an architectural change for
21 firmware called the Protected Execution Ultravisor (or Ultravisor
1117 - `Supporting Protected Computing on IBM Power Architecture <https://developer.ibm.com/articles/l-s…

12