Home
last modified time | relevance | path

Searched full:secure (Results 1 – 25 of 189) sorted by relevance

12345678

/Documentation/devicetree/bindings/arm/
Dsecure.txt1 * ARM Secure world bindings
4 "Normal" and "Secure". Most devicetree consumers (including the Linux
6 world or the Secure world. However some devicetree consumers are
8 visible only in the Secure address space, only in the Normal address
10 virtual machine which boots Secure firmware and wants to tell the
13 The general principle of the naming scheme for Secure world bindings
14 is that any property that needs a different value in the Secure world
15 can be supported by prefixing the property name with "secure-". So for
16 instance "secure-foo" would override "foo". For property names with
17 a vendor prefix, the Secure variant of "vendor,foo" would be
[all …]
/Documentation/devicetree/bindings/arm/amlogic/
Damlogic,meson-gx-ao-secure.yaml5 $id: http://devicetree.org/schemas/arm/amlogic/amlogic,meson-gx-ao-secure.yaml#
15 secure firmware.
22 const: amlogic,meson-gx-ao-secure
30 - const: amlogic,meson-gx-ao-secure
34 - amlogic,a4-ao-secure
35 - amlogic,c3-ao-secure
36 - amlogic,s4-ao-secure
37 - amlogic,t7-ao-secure
38 - const: amlogic,meson-gx-ao-secure
58 ao-secure@140 {
[all …]
Damlogic,meson-mx-secbus2.yaml16 The registers can be accessed directly when not running in "secure mode".
17 When "secure mode" is enabled then these registers have to be accessed
18 through secure monitor calls.
/Documentation/devicetree/bindings/crypto/
Dinside-secure,safexcel.yaml4 $id: http://devicetree.org/schemas/crypto/inside-secure,safexcel.yaml#
7 title: Inside Secure SafeXcel cryptographic engine
15 - const: inside-secure,safexcel-eip197b
16 - const: inside-secure,safexcel-eip197d
17 - const: inside-secure,safexcel-eip97ies
18 - const: inside-secure,safexcel-eip197
19 description: Equivalent of inside-secure,safexcel-eip197b
21 - const: inside-secure,safexcel-eip97
22 description: Equivalent of inside-secure,safexcel-eip97ies
75 compatible = "inside-secure,safexcel-eip197b";
/Documentation/devicetree/bindings/mailbox/
Dti,secure-proxy.yaml4 $id: http://devicetree.org/schemas/mailbox/ti,secure-proxy.yaml#
7 title: Texas Instruments' Secure Proxy
13 The Texas Instruments' secure proxy is a mailbox controller that has
25 const: ti,am654-secure-proxy
30 Contains the secure proxy thread ID used for the specific transfer path.
48 secure proxy thread in the form 'rx_<PID>'.
54 Contains the interrupt information for the Rx interrupt path for secure
71 compatible = "ti,am654-secure-proxy";
Darm,mhu.yaml19 be a 'Secure' resource, hence can't be used by Linux running NS.
62 - description: low-priority non-secure
63 - description: high-priority non-secure
64 - description: Secure
101 <0 37 4>; /* Secure */
133 <0 37 4>; /* Secure */
/Documentation/devicetree/bindings/arm/samsung/
Dsamsung-secure-firmware.yaml4 $id: http://devicetree.org/schemas/arm/samsung/samsung-secure-firmware.yaml#
7 title: Samsung Exynos Secure Firmware
15 - const: samsung,secure-firmware
19 Address of non-secure SYSRAM used for communication with firmware.
31 compatible = "samsung,secure-firmware";
/Documentation/arch/powerpc/
Dultravisor.rst15 POWER 9 that enables Secure Virtual Machines (SVMs). DD2.3 chips
56 process is running in secure mode, MSR(S) bit 41. MSR(S)=1, process
57 is in secure mode, MSR(s)=0 process is in normal mode.
63 the VM it is returning to is secure.
73 **Secure Mode MSR Settings**
101 * Memory is partitioned into secure and normal memory. Only processes
102 that are running in secure mode can access secure memory.
104 * The hardware does not allow anything that is not running secure to
105 access secure memory. This means that the Hypervisor cannot access
110 * I/O systems are not allowed to directly address secure memory. This
[all …]
/Documentation/devicetree/bindings/nvmem/
Dst,stm32-romem.yaml40 st,non-secure-otp:
42 This property explicits a factory programmed area that both secure
43 and non-secure worlds can access. It is needed when, by default, the
44 related area can only be reached by the secure world.
69 st,non-secure-otp;
Damlogic,meson-gxbb-efuse.yaml27 secure-monitor:
28 description: phandle to the secure-monitor node
37 - secure-monitor
48 secure-monitor = <&sm>;
Dqcom,sec-qfprom.yaml7 title: Qualcomm Technologies Inc, Secure QFPROM Efuse
14 protected from non-secure access. In such situations, the OS have to use
15 secure calls to read the region.
30 - description: The secure qfprom corrected region.
/Documentation/devicetree/bindings/power/
Damlogic,meson-sec-pwrc.yaml9 title: Amlogic Meson Secure Power Domains
15 Secure Power Domains used in Meson A1/C1/S4 & C3/T7 SoCs, and should be the child node
16 of secure-monitor.
39 secure-monitor {
/Documentation/devicetree/bindings/thermal/
Damlogic,thermal.yaml38 amlogic,ao-secure:
39 description: phandle to the ao-secure syscon
50 - amlogic,ao-secure
63 amlogic,ao-secure = <&sec_AO>;
/Documentation/devicetree/bindings/firmware/
Dintel,stratix10-svc.txt4 processor system (HPS) and Secure Device Manager (SDM). When the FPGA is
10 communication with SDM, only the secure world of software (EL3, Exception
18 driver also manages secure monitor call (SMC) to communicate with secure monitor
28 smc - Secure Monitor Call
Dbrcm,kona-smc.yaml7 title: Broadcom Kona family Secure Monitor bounce buffer
10 A bounce buffer used for non-secure to secure communications.
Damlogic,meson-gxbb-sm.yaml7 title: Amlogic Secure Monitor (SM)
10 In the Amlogic SoCs the Secure Monitor code is used to provide access to the
36 secure-monitor {
/Documentation/devicetree/bindings/rng/
Domap_rng.yaml7 title: OMAP SoC and Inside-Secure HWRNG Module
17 - inside-secure,safexcel-eip76
50 - inside-secure,safexcel-eip76
75 compatible = "inside-secure,safexcel-eip76";
Dti,omap-rom-rng.yaml14 Secure SoCs may provide RNG via secure ROM calls like Nokia N900 does.
15 The implementation can depend on the SoC secure ROM used.
/Documentation/tee/
Damd-tee.rst8 TEE environment is provided by AMD Secure Processor.
10 The AMD Secure Processor (formerly called Platform Security Processor or PSP)
21 User space (Kernel space) | AMD Secure Processor (PSP)
44 At the lowest level (in x86), the AMD Secure Processor (ASP) driver uses the
47 the secure processor and return results to AMD-TEE driver. The interface
48 between AMD-TEE driver and AMD Secure Processor driver can be found in [1].
64 AMD-TEE Trusted OS is the firmware running on AMD Secure Processor.
79 talk to AMD's TEE. AMD's TEE provides a secure environment for loading, opening
Dop-tee.rst23 separate secure co-processor.
36 User space Kernel Secure world
56 RPC (Remote Procedure Call) are requests from secure world to kernel driver
74 There are two kinds of notifications that secure world can use to make
79 2. Asynchronous notifications delivered with a combination of a non-secure
80 edge-triggered interrupt and a fast call from the non-secure interrupt
84 this is only usable when secure world is entered with a yielding call via
85 ``OPTEE_SMC_CALL_WITH_ARG``. This excludes such notifications from secure
88 An asynchronous notification is delivered via a non-secure edge-triggered
98 building block for OP-TEE OS in secure world to implement the top half and
/Documentation/devicetree/bindings/arm/aspeed/
Daspeed,sbc.yaml8 title: ASPEED Secure Boot Controller
15 The ASPEED SoCs have a register bank for interacting with the secure boot
34 sbc: secure-boot-controller@1e6f2000 {
/Documentation/devicetree/bindings/iommu/
Dqcom,iommu.yaml16 to non-secure vs secure interrupt line.
50 qcom,iommu-secure-id:
53 The SCM secure ID of the IOMMU instance.
114 qcom,iommu-secure-id = <17>;
/Documentation/devicetree/bindings/arm/tegra/
Dnvidia,tegra194-cbb.yaml59 CCPLEX receives secure or nonsecure interrupt depending on error type.
60 A secure interrupt is received for SEC(firewall) & SLV errors and a
61 non-secure interrupt is received for TMO & DEC errors.
63 - description: non-secure interrupt
64 - description: secure interrupt
/Documentation/virt/kvm/s390/
Ds390-pv.rst20 The Ultravisor will secure and decrypt the guest's boot memory
70 The control structures associated with SIE provide the Secure
72 Secure Interception General Register Save Area. Guest GRs and most of
75 GRs are put into / retrieved from the Secure Interception General
88 The Secure Instruction Data Area contains instruction storage
99 There are two types of SIE secure instruction intercepts: the normal
100 and the notification type. Normal secure instruction intercepts will
/Documentation/ABI/testing/
Dsysfs-secvar5 secureboot, thereby secure variables. It exposes interface
6 for reading/writing the secure variables
11 Description: This directory lists all the secure variables that are supported
32 Description: Each secure variable is represented as a directory named as
60 defined by the secure variable implementation. All data is in

12345678