Home
last modified time | relevance | path

Searched +full:secure +full:- +full:regions (Results 1 – 25 of 117) sorted by relevance

12345

/kernel/linux/linux-6.6/Documentation/devicetree/bindings/mtd/
Dnand-chip.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/mtd/nand-chip.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Miquel Raynal <miquel.raynal@bootlin.com>
13 - $ref: mtd.yaml#
18 SPI-NAND devices are concerned by this description.
23 Contains the chip-select IDs.
25 nand-ecc-engine:
31 2/ The ECC engine is part of the NAND part (on-die), in this
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/mailbox/
Dti,secure-proxy.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/mailbox/ti,secure-proxy.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Texas Instruments' Secure Proxy
10 - Nishanth Menon <nm@ti.com>
13 The Texas Instruments' secure proxy is a mailbox controller that has
15 Message manager is broken up into different address regions that are
16 called "threads" or "proxies" - each instance is unidirectional and is
22 pattern: "^mailbox@[0-9a-f]+$"
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/mailbox/
Dti,secure-proxy.txt1 Texas Instruments' Secure Proxy
4 The Texas Instruments' secure proxy is a mailbox controller that has
6 Message manager is broken up into different address regions that are
7 called "threads" or "proxies" - each instance is unidirectional and is
14 --------------------
15 - compatible: Shall be "ti,am654-secure-proxy"
16 - reg-names target_data - Map the proxy data region
17 rt - Map the realtime status region
18 scfg - Map the configuration region
19 - reg: Contains the register map per reg-names.
[all …]
/kernel/linux/linux-6.6/Documentation/networking/devlink/
Diosm.rst1 .. SPDX-License-Identifier: GPL-2.0
13 The ``iosm`` driver implements the following driver-specific parameters.
15 .. list-table:: Driver-specific parameters implemented
18 * - Name
19 - Type
20 - Mode
21 - Description
22 * - ``erase_full_flash``
23 - u8
24 - runtime
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/sram/
Dsram.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Generic on-chip SRAM
10 - Rob Herring <robh@kernel.org>
13 Simple IO memory regions to be managed by the genalloc API.
19 Following the generic-names recommended practice, node names should
30 - mmio-sram
31 - atmel,sama5d2-securam
32 - rockchip,rk3288-pmu-sram
[all …]
/kernel/linux/linux-6.6/drivers/nvdimm/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
3 tristate "NVDIMM (Non-Volatile Memory Device) Support"
9 Generic support for non-volatile memory devices including
10 ACPI-6-NFIT defined resources. On platforms that define an
28 non-standard OEM-specific E820 memory type (type-12, see
31 Documentation/admin-guide/kernel-parameters.rst). This driver converts
33 capable of DAX (direct-access) file system mappings. See
34 Documentation/driver-api/nvdimm/nvdimm.rst for more details.
69 management sub-system. By default persistent memory does
85 sub-divide a namespace into character devices that can only be
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/sram/
Dsram.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: Generic on-chip SRAM
10 - Rob Herring <robh@kernel.org>
13 Simple IO memory regions to be managed by the genalloc API.
19 Following the generic-names recommended practice, node names should
30 - mmio-sram
31 - amlogic,meson-gxbb-sram
32 - arm,juno-sram-ns
[all …]
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dthunderbolt.rst1 .. SPDX-License-Identifier: GPL-2.0
25 -----------------------------------
27 should be a userspace tool that handles all the low-level details, keeps
31 found in ``Documentation/ABI/testing/sysfs-bus-thunderbolt``.
35 ``/etc/udev/rules.d/99-local.rules``::
63 secure
65 addition to UUID the device (if it supports secure connect) is sent
85 If the security level reads as ``user`` or ``secure`` the connected
94 Authorizing devices when security level is ``user`` or ``secure``
95 -----------------------------------------------------------------
[all …]
Dperf-security.rst7 --------
50 -------------------------------
66 independently enabled and disabled on per-thread basis for processes and
74 observability operations in the kernel and provides a secure approach to
79 processes but CAP_SYS_ADMIN usage for secure monitoring and observability
84 is recommended as the preferred secure approach to resolve double access
100 ---------------------------------
102 Mechanisms of capabilities, privileged capability-dumb files [6]_ and
115 # ls -alhF
116 -rwxr-xr-x 2 root root 11M Oct 19 15:12 perf
[all …]
/kernel/linux/linux-6.6/drivers/soc/qcom/
Docmem.c1 // SPDX-License-Identifier: GPL-2.0-only
63 struct ocmem_region *regions; member
103 writel(data, ocmem->mmio + reg); in ocmem_write()
108 return readl(ocmem->mmio + reg); in ocmem_read()
117 for (i = 0; i < ocmem->config->num_regions; i++) { in update_ocmem()
118 struct ocmem_region *region = &ocmem->regions[i]; in update_ocmem()
120 if (region->mode == THIN_MODE) in update_ocmem()
124 dev_dbg(ocmem->dev, "ocmem_region_mode_control %x\n", in update_ocmem()
129 for (i = 0; i < ocmem->config->num_regions; i++) { in update_ocmem()
130 struct ocmem_region *region = &ocmem->regions[i]; in update_ocmem()
[all …]
/kernel/linux/linux-5.10/drivers/soc/qcom/
Docmem.c1 // SPDX-License-Identifier: GPL-2.0-only
60 struct ocmem_region *regions; member
110 writel(data, ocmem->mmio + reg); in ocmem_write()
115 return readl(ocmem->mmio + reg); in ocmem_read()
124 for (i = 0; i < ocmem->config->num_regions; i++) { in update_ocmem()
125 struct ocmem_region *region = &ocmem->regions[i]; in update_ocmem()
127 if (region->mode == THIN_MODE) in update_ocmem()
131 dev_dbg(ocmem->dev, "ocmem_region_mode_control %x\n", in update_ocmem()
136 for (i = 0; i < ocmem->config->num_regions; i++) { in update_ocmem()
137 struct ocmem_region *region = &ocmem->regions[i]; in update_ocmem()
[all …]
/kernel/linux/linux-6.6/drivers/irqchip/
Dirq-gic-v3.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2013-2017 ARM Limited, All Rights Reserved.
24 #include <linux/irqchip/arm-gic-common.h>
25 #include <linux/irqchip/arm-gic-v3.h>
26 #include <linux/irqchip/irq-partition-percpu.h>
29 #include <linux/arm-smccc.h>
36 #include "irq-gic-common.h"
83 * SCR_EL3.FIQ, and the behaviour of non-secure priority registers of the
87 * When security is enabled, non-secure priority values from the (re)distributor
91 * If SCR_EL3.FIQ == 1, the values written to/read from PMR and RPR at non-secure
[all …]
/kernel/linux/linux-5.10/Documentation/arm64/
Dbooting.rst13 (EL0 - EL3), with EL0 and EL1 having a secure and a non-secure
14 counterpart. EL2 is the hypervisor level and exists only in non-secure
15 mode. EL3 is the highest priority level and exists only in secure mode.
19 is passed to the Linux kernel. This may include secure monitor and
33 ---------------------------
46 -------------------------
50 The device tree blob (dtb) must be placed on an 8-byte boundary and must
59 ------------------------------
71 ------------------------
75 The decompressed kernel image contains a 64-byte header as follows::
[all …]
/kernel/linux/linux-6.6/Documentation/admin-guide/
Dthunderbolt.rst1 .. SPDX-License-Identifier: GPL-2.0
25 -----------------------------------
27 should be a userspace tool that handles all the low-level details, keeps
31 found in ``Documentation/ABI/testing/sysfs-bus-thunderbolt``.
35 ``/etc/udev/rules.d/99-local.rules``::
66 secure
68 addition to UUID the device (if it supports secure connect) is sent
92 If the security level reads as ``user`` or ``secure`` the connected
101 Authorizing devices when security level is ``user`` or ``secure``
102 -----------------------------------------------------------------
[all …]
Dperf-security.rst7 --------
50 -------------------------------
66 independently enabled and disabled on per-thread basis for processes and
74 observability operations in the kernel and provides a secure approach to
79 processes but CAP_SYS_ADMIN usage for secure monitoring and observability
84 is recommended as the preferred secure approach to resolve double access
103 ---------------------------------
105 Mechanisms of capabilities, privileged capability-dumb files [6]_,
118 # ls -alhF
119 -rwxr-xr-x 2 root root 11M Oct 19 15:12 perf
[all …]
/kernel/linux/linux-5.10/arch/x86/platform/efi/
Dquirks.c1 // SPDX-License-Identifier: GPL-2.0-only
45 * yyyy=4 digit year, mm=1-12, dd=1-31.
54 * @rsvd_next_header: 32-bit pointer to the next Secure Boot Module in the
60 …rom https://downloadcenter.intel.com/download/23197/Intel-Quark-SoC-X1000-Board-Support-Package-BSP
138 if (remaining_size - size < EFI_MIN_RESERVE) in query_variable_store_nonblocking()
173 if ((remaining_size - size < EFI_MIN_RESERVE) && in efi_query_variable_store()
217 if (remaining_size - size < EFI_MIN_RESERVE) in efi_query_variable_store()
235 * However, some boot services regions contain data that is required
237 * freed. This is done by tagging those regions with the
242 * into efi.memmap (splitting existing regions if necessary) and tag
[all …]
/kernel/linux/linux-5.10/drivers/irqchip/
Dirq-gic-v3.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2013-2017 ARM Limited, All Rights Reserved.
23 #include <linux/irqchip/arm-gic-common.h>
24 #include <linux/irqchip/arm-gic-v3.h>
25 #include <linux/irqchip/irq-partition-percpu.h>
32 #include "irq-gic-common.h"
71 * SCR_EL3.FIQ, and the behaviour of non-secure priority registers of the
75 * When security is enabled, non-secure priority values from the (re)distributor
79 * If SCR_EL3.FIQ == 1, the values writen to/read from PMR and RPR at non-secure
85 * - section 4.8.1 Non-secure accesses to register fields for Secure interrupt
[all …]
/kernel/linux/linux-6.6/arch/x86/platform/efi/
Dquirks.c1 // SPDX-License-Identifier: GPL-2.0-only
45 * yyyy=4 digit year, mm=1-12, dd=1-31.
54 * @rsvd_next_header: 32-bit pointer to the next Secure Boot Module in the
60 …rom https://downloadcenter.intel.com/download/23197/Intel-Quark-SoC-X1000-Board-Support-Package-BSP
146 if (remaining_size - size < EFI_MIN_RESERVE) in query_variable_store_nonblocking()
181 if ((remaining_size - size < EFI_MIN_RESERVE) && in efi_query_variable_store()
225 if (remaining_size - size < EFI_MIN_RESERVE) in efi_query_variable_store()
243 * However, some boot services regions contain data that is required
245 * freed. This is done by tagging those regions with the
250 * into efi.memmap (splitting existing regions if necessary) and tag
[all …]
/kernel/linux/linux-6.6/drivers/nvmem/
Dstm32-romem.c1 // SPDX-License-Identifier: GPL-2.0
3 * STM32 Factory-programmed memory read access driver
5 * Copyright (C) 2017, STMicroelectronics - All Rights Reserved
9 #include <linux/arm-smccc.h>
12 #include <linux/nvmem-provider.h>
16 #include "stm32-bsec-optee-ta.h"
18 /* BSEC secure service access from non-secure */
49 *buf8++ = readb_relaxed(priv->base + i); in stm32_romem_read()
61 return -EIO; in stm32_bsec_smc()
68 return -ENXIO; in stm32_bsec_smc()
[all …]
/kernel/linux/linux-5.10/drivers/xen/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
32 2) control domain: xl mem-max <target-domain> <maxmem>
35 3) control domain: xl mem-set <target-domain> <memory>
51 …SUBSYSTEM=="memory", ACTION=="add", RUN+="/bin/sh -c '[ -f /sys$devpath/state ] && echo online > /…
76 secure, but slightly less efficient. This can be controlled with
145 bool "Add support for dma-buf grant access device driver extension"
150 dma-buf implementation. With this extension grant references to
151 the pages of an imported dma-buf can be exported for other domain
153 converted into a local dma-buf for local export.
156 tristate "User-space grant reference allocator driver"
[all …]
/kernel/linux/linux-6.6/Documentation/arch/arm64/
Dbooting.rst13 (EL0 - EL3), with EL0, EL1 and EL2 having a secure and a non-secure
15 level and exists only in secure mode. Both are architecturally optional.
19 is passed to the Linux kernel. This may include secure monitor and
33 ---------------------------
46 -------------------------
50 The device tree blob (dtb) must be placed on an 8-byte boundary and must
59 ------------------------------
71 ------------------------
75 The decompressed kernel image contains a 64-byte header as follows::
91 - As of v3.17, all fields are little endian unless stated otherwise.
[all …]
/kernel/linux/linux-6.6/drivers/firmware/efi/libstub/
Dfdt.c1 // SPDX-License-Identifier: GPL-2.0
24 /* Set the #address-cells and #size-cells values for an empty tree */ in fdt_update_cell_size()
26 fdt_setprop_u32(fdt, offset, "#address-cells", EFI_DT_ADDR_CELLS_DEFAULT); in fdt_update_cell_size()
27 fdt_setprop_u32(fdt, offset, "#size-cells", EFI_DT_SIZE_CELLS_DEFAULT); in fdt_update_cell_size()
61 * non-critical: in update_fdt()
72 * kernel will use the UEFI memory map to find reserved regions. in update_fdt()
75 while (num_rsv-- > 0) in update_fdt()
99 status = fdt_setprop_var(fdt, node, "linux,uefi-system-table", fdt_val64); in update_fdt()
105 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-start", fdt_val64); in update_fdt()
111 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-size", fdt_val32); in update_fdt()
[all …]
/kernel/linux/linux-5.10/drivers/firmware/efi/libstub/
Dfdt.c1 // SPDX-License-Identifier: GPL-2.0
24 /* Set the #address-cells and #size-cells values for an empty tree */ in fdt_update_cell_size()
26 fdt_setprop_u32(fdt, offset, "#address-cells", EFI_DT_ADDR_CELLS_DEFAULT); in fdt_update_cell_size()
27 fdt_setprop_u32(fdt, offset, "#size-cells", EFI_DT_SIZE_CELLS_DEFAULT); in fdt_update_cell_size()
61 * non-critical: in update_fdt()
72 * kernel will use the UEFI memory map to find reserved regions. in update_fdt()
75 while (num_rsv-- > 0) in update_fdt()
99 status = fdt_setprop_var(fdt, node, "linux,uefi-system-table", fdt_val64); in update_fdt()
105 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-start", fdt_val64); in update_fdt()
111 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-size", fdt_val32); in update_fdt()
[all …]
/kernel/linux/linux-5.10/drivers/mailbox/
Dti-msgmgr.c1 // SPDX-License-Identifier: GPL-2.0
5 * Copyright (C) 2015-2017 Texas Instruments Incorporated - https://www.ti.com/
21 #include <linux/soc/ti/ti-msgmgr.h>
40 * struct ti_msgmgr_valid_queue_desc - SoC valid queues meant for this processor
52 * struct ti_msgmgr_desc - Description of message manager integration
67 * @is_sproxy: Is this an Secure Proxy instance?
91 * struct ti_queue_inst - Description of a queue instance
119 * struct ti_msgmgr_inst - Description of a Message Manager Instance
123 * @queue_state_debug_region: Queue status register regions
124 * @queue_ctrl_region: Queue Control register regions
[all …]
/kernel/linux/linux-6.6/drivers/xen/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
32 2) control domain: xl mem-max <target-domain> <maxmem>
35 3) control domain: xl mem-set <target-domain> <memory>
51 …SUBSYSTEM=="memory", ACTION=="add", RUN+="/bin/sh -c '[ -f /sys$devpath/state ] && echo online > /…
76 secure, but slightly less efficient. This can be controlled with
145 bool "Add support for dma-buf grant access device driver extension"
150 dma-buf implementation. With this extension grant references to
151 the pages of an imported dma-buf can be exported for other domain
153 converted into a local dma-buf for local export.
156 tristate "User-space grant reference allocator driver"
[all …]

12345