Home
last modified time | relevance | path

Searched refs:trust (Results 1 – 31 of 31) sorted by relevance

/linux-4.4.14/drivers/media/radio/
Dradio-trust.c51 struct trust { struct
58 struct trust *tr = kzalloc(sizeof(*tr), GFP_KERNEL); in trust_alloc() argument
73 static void write_i2c(struct trust *tr, int n, ...) in write_i2c()
121 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_mute_volume()
131 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_stereo()
149 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_frequency()
166 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_ctrl()
185 struct trust *tr = container_of(isa, struct trust, isa); in trust_initialize()
DMakefile19 obj-$(CONFIG_RADIO_TRUST) += radio-trust.o
DKconfig433 module will be called radio-trust.
/linux-4.4.14/Documentation/namespaces/
Dresource-control.txt4 enabled in a kernel for people who don't trust their users or their
10 memory user's they don't trust to play nice can use.
/linux-4.4.14/Documentation/
Dintel_txt.txt11 o Provides dynamic root of trust for measurement (DRTM)
30 http://www.trust-conference.eu/downloads/Keynote-Speakers/
60 To get trust in the initial kernel without using Intel TXT, a
61 static root of trust must be used. This bases trust in BIOS
74 By using the hardware-based root of trust that Intel TXT provides,
76 pre-launch components can be removed from the trust chain, DMA
84 almost all parts of the trust chain is available (excepting SMM and
94 processor instruction that initiates the dynamic root of trust.
DManagementStyle89 deleting it, you may have irrevocably lost the trust of that
167 trust somebody who is so clearly hiding his true character.
224 It's part of what makes people trust you, and allow you the potential
DSubmittingPatches741 requires a higher degree of trust than taking patches from a mailing list.
Dkernel-parameters.txt579 trust validation.
1805 lapic_timer_c2_ok [X86,APIC] trust the local apic timer
/linux-4.4.14/Documentation/sound/oss/
DVIBRA1622 be okay, trust us.
/linux-4.4.14/Documentation/ABI/testing/
Dsysfs-class-cxl233 0 = don't trust, the image may be different (default)
234 1 = trust that the image will not change.
/linux-4.4.14/Documentation/hwmon/
Dlm6357 is left to the BIOS, and the driver will blindly trust it. Only the original
/linux-4.4.14/Documentation/usb/
Dauthorization.txt90 can fake descriptors and device info. Don't trust that. You are
/linux-4.4.14/Documentation/tpm/
Dxen-tpmfront.txt18 the chain of trust rooted in the hardware TPM to virtual machines in Xen. Each
/linux-4.4.14/drivers/char/tpm/
DKconfig94 can be found at http://www.trust.rub.de/projects/linux-device-driver-infineon-tpm/
/linux-4.4.14/Documentation/i2c/
Dfunctionality5 I2C specifications, a client can not trust that everything it needs
/linux-4.4.14/security/
DKconfig88 correctly. This level of protection requires a root of trust outside
/linux-4.4.14/Documentation/device-mapper/
Dverity.txt136 be passed via the kernel command-line in a rooted chain of trust where
/linux-4.4.14/Documentation/input/
Diforce-protocol.txt4 from Immerse. That's why you should not trust what is written in this
/linux-4.4.14/Documentation/dvb/
DREADME.dvb-usb205 Gunnar Wittich and Joachim von Caron for their trust for providing
/linux-4.4.14/Documentation/ia64/
Dmca.txt44 Because the MCA/INIT handlers cannot trust the kernel stack, they
/linux-4.4.14/Documentation/x86/
Dmtrr.txt90 move the framebuffer base address, so the only value you can trust is
/linux-4.4.14/Documentation/development-process/
D7.AdvancedTopics119 to trust things *without* then having to go and check every
D2.Process207 a lieutenant system built around a chain of trust.
238 trust."
/linux-4.4.14/Documentation/filesystems/
Dxfs-self-describing-metadata.txt76 integrity checking. We cannot trust the metadata if we cannot verify that it has
/linux-4.4.14/Documentation/filesystems/configfs/
Dconfigfs.txt335 a subsystem to trust ci_parent and cg_children while they hold the
/linux-4.4.14/Documentation/filesystems/cifs/
DREADME208 you do not trust the server to which are mounted, or if you do not have
367 If you do not trust the servers in your network (your mount
/linux-4.4.14/Documentation/virtual/kvm/
Dtimekeeping.txt385 It is recommended not to trust the TSCs to remain synchronized on NUMA or
/linux-4.4.14/Documentation/networking/
Dip-sysctl.txt47 By default we don't trust protocol path MTUs while forwarding
Dbonding.txt2025 instructs bonding to trust the driver to maintain carrier state.
/linux-4.4.14/arch/x86/
DKconfig1513 trust the BIOS to get all its memory reservations and usages
/linux-4.4.14/arch/m68k/ifpsp060/src/
Dfpsp.S10066 # as a result. trust me...