Home
last modified time | relevance | path

Searched +full:shared +full:- +full:memory (Results 1 – 25 of 1078) sorted by relevance

12345678910>>...44

/Linux-v6.1/include/linux/
Dtee_drv.h1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Copyright (c) 2015-2022 Linaro Limited
23 #define TEE_SHM_DYNAMIC BIT(0) /* Dynamic shared memory registered */
25 #define TEE_SHM_USER_MAPPED BIT(1) /* Memory mapped in user space */
26 #define TEE_SHM_POOL BIT(2) /* Memory allocated from pool */
27 #define TEE_SHM_PRIV BIT(3) /* Memory private to TEE driver */
35 * struct tee_context - driver specific context on file pointer data
37 * @list_shm: List of shared memory object owned by this context
42 * shared memory release.
44 * wait for tee-supplicant daemon to be started if not present
[all …]
/Linux-v6.1/Documentation/admin-guide/mm/
Dnuma_memory_policy.rst4 NUMA Memory Policy
7 What is NUMA Memory Policy?
10 In the Linux kernel, "memory policy" determines from which node the kernel will
11 allocate memory in a NUMA system or in an emulated NUMA system. Linux has
12 supported platforms with Non-Uniform Memory Access architectures since 2.4.?.
13 The current memory policy support was added to Linux 2.6 around May 2004. This
14 document attempts to describe the concepts and APIs of the 2.6 memory policy
17 Memory policies should not be confused with cpusets
18 (``Documentation/admin-guide/cgroup-v1/cpusets.rst``)
20 memory may be allocated by a set of processes. Memory policies are a
[all …]
Dnommu-mmap.rst2 No-MMU memory mapping support
5 The kernel has limited support for memory mapping under no-MMU conditions, such
6 as are used in uClinux environments. From the userspace point of view, memory
12 Memory mapping behaviour also involves the way fork(), vfork(), clone() and
16 The behaviour is similar between the MMU and no-MMU cases, but not identical;
21 In the MMU case: VM regions backed by arbitrary pages; copy-on-write
24 In the no-MMU case: VM regions backed by arbitrary contiguous runs of
30 shared across fork() or clone() without CLONE_VM in the MMU case. Since
31 the no-MMU case doesn't support these, behaviour is identical to
39 In the no-MMU case:
[all …]
/Linux-v6.1/drivers/tee/
Dtee_shm.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (c) 2015-2017, 2019-2021 Linaro Limited
36 return -ENOMEM; in shm_get_kernel_pages()
47 return -ENOMEM; in shm_get_kernel_pages()
63 if (shm->pages) { in release_registered_pages()
64 if (shm->flags & TEE_SHM_USER_MAPPED) in release_registered_pages()
65 unpin_user_pages(shm->pages, shm->num_pages); in release_registered_pages()
67 shm_put_kernel_pages(shm->pages, shm->num_pages); in release_registered_pages()
69 kfree(shm->pages); in release_registered_pages()
75 if (shm->flags & TEE_SHM_POOL) { in tee_shm_release()
[all …]
/Linux-v6.1/Documentation/x86/
Dtdx.rst1 .. SPDX-License-Identifier: GPL-2.0
9 encrypting the guest memory. In TDX, a special module running in a special
13 Since the host cannot directly access guest registers or memory, much
19 TDX includes new hypercall-like mechanisms for communicating from the
25 TDX guests behave differently from bare-metal and traditional VMX guests.
26 In TDX guests, otherwise normal instructions or memory accesses can cause
32 Instruction-based #VE
33 ---------------------
35 - Port I/O (INS, OUTS, IN, OUT)
36 - HLT
[all …]
/Linux-v6.1/include/uapi/linux/
Dtee.h2 * Copyright (c) 2015-2016, Linaro Limited
49 #define TEE_GEN_CAP_REG_MEM (1 << 2)/* Supports registering shared memory */
52 #define TEE_MEMREF_NULL (__u64)(-1) /* NULL MemRef Buffer */
61 * OP-TEE specific capabilities
66 * struct tee_ioctl_version_data - TEE version
82 * TEE_IOC_VERSION - query version of TEE
91 * struct tee_ioctl_shm_alloc_data - Shared memory allocate argument
92 * @size: [in/out] Size of shared memory to allocate
94 * @id: [out] Identifier of the shared memory
107 * TEE_IOC_SHM_ALLOC - allocate shared memory
[all …]
/Linux-v6.1/arch/arm64/boot/dts/ti/
Dk3-j721e-som-p0.dtsi1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2019-2020 Texas Instruments Incorporated - https://www.ti.com/
6 /dts-v1/;
8 #include "k3-j721e.dtsi"
11 memory@80000000 {
12 device_type = "memory";
18 reserved_memory: reserved-memory {
19 #address-cells = <2>;
20 #size-cells = <2>;
26 no-map;
[all …]
Dk3-j7200-som-p0.dtsi1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2020-2021 Texas Instruments Incorporated - https://www.ti.com/
6 /dts-v1/;
8 #include "k3-j7200.dtsi"
11 memory@80000000 {
12 device_type = "memory";
18 reserved_memory: reserved-memory {
19 #address-cells = <2>;
20 #size-cells = <2>;
26 no-map;
[all …]
/Linux-v6.1/drivers/soc/qcom/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
15 the low-power state for resources related to the remoteproc
24 Command DB queries shared memory by key string for shared system
25 resources. Platform drivers that require to set state of a shared
26 resource on a RPM-hardened platform must use this database to get
27 SoC specific identifier and information for the shared resources.
43 be called qcom-cpr
81 tristate "Qualcomm On Chip Memory (OCMEM) driver"
85 The On Chip Memory (OCMEM) allocator allows various clients to
86 allocate memory from OCMEM based on performance, latency and power
[all …]
/Linux-v6.1/drivers/tee/optee/
Doptee_smc.h1 /* SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) */
3 * Copyright (c) 2015-2021, Linaro Limited
8 #include <linux/arm-smccc.h>
28 * Normal cached memory (write-back), shareable for SMP systems and not
36 * 32-bit registers.
44 * 384fb3e0-e7f8-11e3-af63-0002a5d5c51b.
75 * Used by non-secure world to figure out which Trusted OS is installed.
78 * Returns UUID in a0-4 in the same way as OPTEE_SMC_CALLS_UID
88 * Used by non-secure world to figure out which version of the Trusted OS
92 * Returns revision in a0-1 in the same way as OPTEE_SMC_CALLS_REVISION
[all …]
Doptee_ffa.h1 /* SPDX-License-Identifier: BSD-2-Clause */
3 * Copyright (c) 2019-2021, Linaro Limited
7 * This file is exported by OP-TEE and is kept in sync between secure world
8 * and normal world drivers. We're using ARM FF-A 1.0 specification.
23 * defined in FF-A specification:
27 * w3-w7: Implementation defined, free to be used below
38 * Returns the API version implemented, currently follows the FF-A version.
41 * w4-w7: Not used (MBZ)
46 * w5-w7: Not used (MBZ)
51 * Returns the revision of OP-TEE.
[all …]
Doptee_msg.h1 /* SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) */
3 * Copyright (c) 2015-2021, Linaro Limited
12 * This file defines the OP-TEE message protocol (ABI) used to communicate
13 * with an instance of OP-TEE running in secure world.
21 * Part 1 - formatting of messages
49 * Pointer to a list of pages used to register user-defined SHM buffer.
52 * list of page addresses. OP-TEE core can reconstruct contiguous buffer from
64 * uint64_t pages_array[OPTEE_MSG_NONCONTIG_PAGE_SIZE/sizeof(uint64_t) - 1];
77 * Memory attributes for caching passed with temp memrefs. The actual value
80 * defined for the memory range should be used. If optee_smc.h is used as
[all …]
Dsmc_abi.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (c) 2015-2021, Linaro Limited
9 #include <linux/arm-smccc.h>
35 * OP-TEE OS via raw SMCs.
38 * 2. Low level support functions to register shared memory in secure world
39 * 3. Dynamic shared memory pool based on alloc_pages()
46 * A typical OP-TEE private shm allocation is 224 bytes (argument struct
49 * have a handful of these structs allocated at a time. Most memory will
69 p->attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT + in from_msg_param_tmp_mem()
70 attr - OPTEE_MSG_ATTR_TYPE_TMEM_INPUT; in from_msg_param_tmp_mem()
[all …]
Doptee_rpc_cmd.h1 /* SPDX-License-Identifier: BSD-2-Clause */
3 * Copyright (c) 2016-2021, Linaro Limited
14 * RPC communication with tee-supplicant is reversed compared to normal
23 * 1970-01-01 00:00:00 +0000 (UTC).
39 * which instead is sent via a non-secure interrupt.
61 * Allocate a piece of shared memory
63 * [in] value[0].a Type of memory one of
70 /* Memory that can be shared with a non-secure user space application */
72 /* Memory only shared with non-secure kernel */
76 * Free shared memory previously allocated with OPTEE_RPC_CMD_SHM_ALLOC
[all …]
/Linux-v6.1/Documentation/devicetree/bindings/reserved-memory/
Dxen,shared-memory.txt1 * Xen hypervisor reserved-memory binding
3 Expose one or more memory regions as reserved-memory to the guest
5 to be a shared memory area across multiple virtual machines for
8 For each of these pre-shared memory regions, a range is exposed under
9 the /reserved-memory node as a child node. Each range sub-node is named
10 xen-shmem@<address> and has the following properties:
12 - compatible:
13 compatible = "xen,shared-memory-v1"
15 - reg:
16 the base guest physical address and size of the shared memory region
[all …]
Dshared-dma-pool.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
3 ---
4 $id: http://devicetree.org/schemas/reserved-memory/shared-dma-pool.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
7 title: /reserved-memory DMA pool node bindings
10 - devicetree-spec@vger.kernel.org
13 - $ref: "reserved-memory.yaml"
18 - const: shared-dma-pool
20 This indicates a region of memory meant to be used as a shared
25 - const: restricted-dma-pool
[all …]
Dqcom,cmd-db.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
4 $id: "http://devicetree.org/schemas/reserved-memory/qcom,cmd-db.yaml#"
5 $schema: "http://devicetree.org/meta-schemas/core.yaml#"
12 is stored in a shared memory region and is loaded by the remote processor.
15 controlling shared resources. Depending on the board configuration the shared
17 remote processor and made available in the shared memory.
20 - Bjorn Andersson <bjorn.andersson@linaro.org>
23 - $ref: "reserved-memory.yaml"
27 const: qcom,cmd-db
[all …]
/Linux-v6.1/Documentation/virt/hyperv/
Doverview.rst1 .. SPDX-License-Identifier: GPL-2.0
6 enlightened guest on Microsoft's Hyper-V hypervisor. Hyper-V
7 consists primarily of a bare-metal hypervisor plus a virtual machine
10 partitions. In this documentation, references to Hyper-V usually
15 Hyper-V runs on x86/x64 and arm64 architectures, and Linux guests
16 are supported on both. The functionality and behavior of Hyper-V is
19 Linux Guest Communication with Hyper-V
20 --------------------------------------
21 Linux guests communicate with Hyper-V in four different ways:
24 some guest actions trap to Hyper-V. Hyper-V emulates the action and
[all …]
/Linux-v6.1/Documentation/devicetree/bindings/sound/
Dgoogle,cros-ec-codec.yaml1 # SPDX-License-Identifier: GPL-2.0-only
3 ---
4 $id: http://devicetree.org/schemas/sound/google,cros-ec-codec.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Cheng-Yi Chiang <cychiang@chromium.org>
11 - Tzung-Bi Shih <tzungbi@kernel.org>
15 Embedded Controller (EC) and is controlled via a host-command
17 subnode of a cros-ec node.
18 (see Documentation/devicetree/bindings/mfd/google,cros-ec.yaml).
22 const: google,cros-ec-codec
[all …]
/Linux-v6.1/Documentation/userspace-api/
Dunshare.rst10 ----------
14 --------
26 -----------
37 outside the confinement of all-or-nothing shared resources of legacy
44 shared at the time of their creation. unshare() was conceptualized by
45 Al Viro in the August of 2000, on the Linux-Kernel mailing list, as part
48 shared resources without creating a new process. unshare() is a natural
53 -----------
57 resources is not possible. Since namespaces are shared by default
59 even non-threaded applications if they have a need to disassociate
[all …]
/Linux-v6.1/drivers/net/ipa/
Dipa_qmi_msg.h1 /* SPDX-License-Identifier: GPL-2.0 */
4 * Copyright (C) 2018-2022 Linaro Ltd.
17 #define IPA_QMI_INDICATION_REGISTER 0x20 /* modem -> AP request */
18 #define IPA_QMI_INIT_DRIVER 0x21 /* AP -> modem request */
19 #define IPA_QMI_INIT_COMPLETE 0x22 /* AP -> modem indication */
20 #define IPA_QMI_DRIVER_INIT_COMPLETE 0x35 /* modem -> AP request */
27 #define IPA_QMI_INDICATION_REGISTER_REQ_SZ 20 /* -> server handle */
28 #define IPA_QMI_INDICATION_REGISTER_RSP_SZ 7 /* <- server handle */
29 #define IPA_QMI_INIT_DRIVER_REQ_SZ 162 /* client handle -> */
30 #define IPA_QMI_INIT_DRIVER_RSP_SZ 25 /* client handle <- */
[all …]
/Linux-v6.1/tools/testing/selftests/arm64/mte/
Dcheck_mmap_options.c1 // SPDX-License-Identifier: GPL-2.0
29 1, 537, 989, 1269, MT_GRANULE_SIZE - 1, MT_GRANULE_SIZE,
30 /* page size - 1*/ 0, /* page_size */ 0, /* page size + 1 */ 0
41 mte_initialize_current_context(mode, (uintptr_t)ptr, -UNDERFLOW); in check_mte_memory()
42 memset(ptr - UNDERFLOW, '2', UNDERFLOW); in check_mte_memory()
76 /* Only mte enabled memory will allow tag insertion */ in check_anonymous_memory_mapping()
79 ksft_print_msg("FAIL: Insert tags on anonymous mmap memory\n"); in check_anonymous_memory_mapping()
102 if (fd == -1) in check_file_memory_mapping()
113 /* Only mte enabled memory will allow tag insertion */ in check_file_memory_mapping()
116 ksft_print_msg("FAIL: Insert tags on file based memory\n"); in check_file_memory_mapping()
[all …]
Dcheck_child_memory.c1 // SPDX-License-Identifier: GPL-2.0
25 1, 537, 989, 1269, MT_GRANULE_SIZE - 1, MT_GRANULE_SIZE,
26 /* page size - 1*/ 0, /* page_size */ 0, /* page size + 1 */ 0
38 if (child == -1) { in check_child_tag_inheritance()
58 mte_initialize_current_context(mode, (uintptr_t)ptr, -UNDERFLOW); in check_child_tag_inheritance()
59 memset(ptr - UNDERFLOW, '2', UNDERFLOW); in check_child_tag_inheritance()
115 if (fd == -1) in check_child_file_mapping()
126 /* Only mte enabled memory will allow tag insertion */ in check_child_file_mapping()
129 ksft_print_msg("FAIL: Insert tags on file based memory\n"); in check_child_file_mapping()
154 sizes[item - 3] = page_size - 1; in main()
[all …]
/Linux-v6.1/include/linux/soc/apple/
Drtkit.h1 /* SPDX-License-Identifier: GPL-2.0-only OR MIT */
6 * Apple's SoCs come with various co-processors running their RTKit operating
18 * Struct to represent implementation-specific RTKit operations.
20 * @buffer: Shared memory buffer allocated inside normal RAM.
21 * @iomem: Shared memory buffer controlled by the co-processors.
22 * @size: Size of the shared memory buffer.
23 * @iova: Device VA of shared memory buffer.
24 * @is_mapped: Shared memory buffer is managed by the co-processor.
36 * Struct to represent implementation-specific RTKit operations.
38 * @crashed: Called when the co-processor has crashed. Runs in process
[all …]
/Linux-v6.1/tools/testing/selftests/vm/
Dhugepage-shm.c1 // SPDX-License-Identifier: GPL-2.0
3 * hugepage-shm:
5 * Example of using huge page memory in a user application using Sys V shared
6 * memory system calls. In this example the app is requesting 256MB of
7 * memory that is backed by huge pages. The application uses the flag
18 * Note: The default shared memory limit is quite low on many kernels,
23 * This will increase the maximum size per shared memory segment to 256MB.
25 * total amount of shared memory in pages. To set it to 16GB on a system
69 if (shmaddr == (char *)-1) { in main()
70 perror("Shared memory attach failure"); in main()

12345678910>>...44