Searched full:vtpm (Results 1 – 17 of 17) sorted by relevance
/linux-6.15/Documentation/security/tpm/ |
D | xen-tpmfront.rst | 7 This document describes the virtual Trusted Platform Module (vTPM) subsystem for 9 Linux, and a basic understanding of the TPM and vTPM concepts. 18 of the vTPM's secrets (Keys, NVRAM, etc) are managed by a vTPM Manager domain, 20 these domains (manager, vTPM, and guest) is trusted, the vTPM subsystem extends 22 major component of vTPM is implemented as a separate domain, providing secure 23 separation guaranteed by the hypervisor. The vTPM domains are implemented in 26 This mini-os vTPM subsystem was built on top of the previous vTPM work done by 33 The architecture of vTPM is described below:: 47 | vtpm-stubdom | ... 70 The Linux based guest that wants to use a vTPM. There may be [all …]
|
D | tpm_vtpm_proxy.rst | 8 This document describes the virtual Trusted Platform Module (vTPM)
|
/linux-6.15/Documentation/devicetree/bindings/tpm/ |
D | ibm,vtpm.yaml | 4 $id: http://devicetree.org/schemas/tpm/ibm,vtpm.yaml# 7 title: IBM Virtual Trusted Platform Module (vTPM) 15 or higher. With vTPM support, each lpar is able to have its own vTPM 17 communicating with the vTPM adjunct partition through Hypervisor calls 23 - IBM,vtpm 30 - IBM,vtpm 92 compatible = "IBM,vtpm"; 93 device_type = "IBM,vtpm";
|
/linux-6.15/Documentation/translations/zh_CN/security/tpm/ |
D | xen-tpmfront.rst | 15 本文档描述了用于Xen的虚拟可信平台模块(vTPM)子系统。假定读者熟悉 29 这个mini-os vTPM 子系统是建立在IBM和Intel公司之前的vTPM工作基础上的。 49 | vtpm-stubdom | ... 83 * vtpm-stubdom: 89 Mini-os TPM前端驱动程序。vTPM mini-os域vtpm-stubdom使用该驱动程序 109 管理器存根域的详细信息,请参见Xen文档(docs/misc/vtpm.txt)。一旦存根域
|
D | tpm_vtpm_proxy.rst | 16 本文档描述了用于Linux容器的虚拟可信平台模块(vTPM)代理设备驱动。
|
/linux-6.15/drivers/char/tpm/ |
D | tpm_ibmvtpm.c | 31 { "IBM,vtpm", "IBM,vtpm"}, 32 { "IBM,vtpm", "IBM,vtpm20"}, 134 * @ibmvtpm: vtpm device struct 275 * @ibmvtpm: vtpm device struct 295 * ibmvtpm_crq_get_version - Send a CRQ request to get vtpm version 296 * - Note that this is vtpm version and not tpm version 298 * @ibmvtpm: vtpm device struct 319 * @ibmvtpm: vtpm device struct 338 * tpm_ibmvtpm_remove - ibm vtpm remove entry point 423 * @ibmvtpm: ibm vtpm struct [all …]
|
D | Kconfig | 185 tristate "IBM VTPM Interface" 188 If you have IBM virtual TPM (VTPM) support say Yes and it 199 the manpages for xl, xl.conf, and docs/misc/vtpm.txt in 223 tristate "VTPM Proxy Interface" 226 This driver proxies for an emulated TPM (vTPM) running in userspace. 228 /dev/vtpmX and a server-side file descriptor on which the vTPM
|
D | tpm_ibmvtpm.h | 16 /* vTPM Message Format 1 */ 56 /* vTPM CRQ response is the message type | 0x80 */ 60 /* vTPM CRQ message types */
|
D | xen-tpmfront.c | 3 * Implementation of the Xen vTPM device frontend 374 /* A suspend/resume/migrate will interrupt a vTPM anyway */ in tpmfront_resume() 391 "vTPM protocol 2 required"); in backend_changed() 408 { "vtpm" }, 411 MODULE_ALIAS("xen:vtpm"); 440 MODULE_DESCRIPTION("Xen vTPM Driver");
|
D | tpm_vtpm_proxy.c | 10 * Device driver for vTPM (vTPM proxy driver) 194 * vtpm_proxy_fops_open - Open vTPM device on 'server side' 689 workqueue = create_workqueue("tpm-vtpm"); in vtpm_module_init() 714 MODULE_DESCRIPTION("vTPM Driver");
|
/linux-6.15/include/xen/interface/io/ |
D | tpmif.h | 32 VTPM_STATE_IDLE, /* no contents / vTPM idle / cancel complete */ 33 VTPM_STATE_SUBMIT, /* request ready / vTPM working */ 34 VTPM_STATE_FINISH, /* response ready / vTPM idle */ 35 VTPM_STATE_CANCEL, /* cancel requested / vTPM working */
|
/linux-6.15/drivers/char/tpm/eventlog/ |
D | of.c | 77 * For both vtpm/tpm, firmware has log addr and log size in big in tpm_read_log_of() 78 * endian format. But in case of vtpm, there is a method called in tpm_read_log_of() 82 * endian format. For this reason, vtpm doesn't need conversion in tpm_read_log_of() 85 if (of_property_match_string(np, "compatible", "IBM,vtpm") < 0 && in tpm_read_log_of()
|
/linux-6.15/include/uapi/linux/ |
D | vtpm_proxy.h | 3 * Definitions for the VTPM proxy driver
|
/linux-6.15/Documentation/arch/x86/ |
D | amd-memory-encryption.rst | 261 They can provide services to the guest, like a vTPM, for example.
|
/linux-6.15/arch/powerpc/kernel/ |
D | prom_init.c | 1914 ibmvtpm_node = call_prom("finddevice", 1, 1, ADDR("/vdevice/vtpm")); in prom_instantiate_sml() 1919 ibmvtpm_inst = call_prom("open", 1, 1, ADDR("/vdevice/vtpm")); in prom_instantiate_sml() 1921 prom_printf("opening vtpm package failed (%x)\n", ibmvtpm_inst); in prom_instantiate_sml() 1967 prom_setprop(ibmvtpm_node, "/vdevice/vtpm", "linux,sml-base", in prom_instantiate_sml() 1969 prom_setprop(ibmvtpm_node, "/vdevice/vtpm", "linux,sml-size", in prom_instantiate_sml()
|
/linux-6.15/arch/x86/hyperv/ |
D | ivm.c | 617 /* Same with a vTPM */ in hv_is_private_mmio()
|
/linux-6.15/ |
D | CREDITS | 2331 D: IBM VTPM driver
|