Home
last modified time | relevance | path

Searched refs:secure (Results 1 – 25 of 296) sorted by relevance

12345678910>>...12

/Linux-v6.6/Documentation/devicetree/bindings/arm/
Dsecure.txt15 can be supported by prefixing the property name with "secure-". So for
16 instance "secure-foo" would override "foo". For property names with
18 "vendor,secure-foo". If there is no "secure-" property then the Secure
21 validly have "secure-" versions; this list will be enlarged on a
26 still be processed unmodified by existing Non-secure software (and in
32 secure- bindings only need to be used where both the Secure and Normal
38 - secure-status : specifies whether the device is present and usable
39 in the secure world. The combination of this with "status" allows
41 specified. If "secure-status" is not specified it defaults to the
47 secure-status = "okay"; /* visible in both */
[all …]
/Linux-v6.6/Documentation/devicetree/bindings/crypto/
Dinside-secure-safexcel.txt4 - compatible: Should be "inside-secure,safexcel-eip197b",
5 "inside-secure,safexcel-eip197d" or
6 "inside-secure,safexcel-eip97ies".
21 - "inside-secure,safexcel-eip197" is equivalent to
22 "inside-secure,safexcel-eip197b".
23 - "inside-secure,safexcel-eip97" is equivalent to
24 "inside-secure,safexcel-eip97ies".
29 compatible = "inside-secure,safexcel-eip197b";
/Linux-v6.6/Documentation/powerpc/
Dultravisor.rst56 process is running in secure mode, MSR(S) bit 41. MSR(S)=1, process
57 is in secure mode, MSR(s)=0 process is in normal mode.
63 the VM it is returning to is secure.
101 * Memory is partitioned into secure and normal memory. Only processes
102 that are running in secure mode can access secure memory.
104 * The hardware does not allow anything that is not running secure to
105 access secure memory. This means that the Hypervisor cannot access
110 * I/O systems are not allowed to directly address secure memory. This
117 * When a process is running in secure mode all hypercalls
120 * When a process is in secure mode all interrupts go to the
[all …]
/Linux-v6.6/drivers/gpu/drm/amd/amdgpu/
Damdgpu_ib.c139 bool secure, init_shadow; in amdgpu_ib_schedule() local
246 secure = false; in amdgpu_ib_schedule()
248 secure = ib->flags & AMDGPU_IB_FLAGS_SECURE; in amdgpu_ib_schedule()
249 amdgpu_ring_emit_frame_cntl(ring, true, secure); in amdgpu_ib_schedule()
256 if (secure != !!(ib->flags & AMDGPU_IB_FLAGS_SECURE)) { in amdgpu_ib_schedule()
257 amdgpu_ring_emit_frame_cntl(ring, false, secure); in amdgpu_ib_schedule()
258 secure = !secure; in amdgpu_ib_schedule()
259 amdgpu_ring_emit_frame_cntl(ring, true, secure); in amdgpu_ib_schedule()
268 amdgpu_ring_emit_frame_cntl(ring, false, secure); in amdgpu_ib_schedule()
/Linux-v6.6/arch/arm/mach-omap2/
DMakefile16 secure-common = omap-smc.o omap-secure.o
19 obj-$(CONFIG_ARCH_OMAP3) += $(omap-2-3-common) $(hwmod-common) $(secure-common)
20 obj-$(CONFIG_ARCH_OMAP4) += $(secure-common)
21 obj-$(CONFIG_SOC_AM33XX) += $(secure-common)
22 obj-$(CONFIG_SOC_OMAP5) += $(secure-common)
23 obj-$(CONFIG_SOC_AM43XX) += $(secure-common)
24 obj-$(CONFIG_SOC_DRA7XX) += $(secure-common)
/Linux-v6.6/fs/
Danon_inodes.c82 bool secure) in __anon_inode_getfile() argument
90 if (secure) { in __anon_inode_getfile()
184 bool secure) in __anon_inode_getfd() argument
195 secure); in __anon_inode_getfd()
/Linux-v6.6/arch/s390/crypto/
DKconfig22 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
33 SHA-1 secure hash algorithm (FIPS 180)
44 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
55 SHA3-224 and SHA3-256 secure hash algorithms (FIPS 202)
66 SHA3-384 and SHA3-512 secure hash algorithms (FIPS 202)
/Linux-v6.6/arch/arm64/boot/dts/tesla/
Dfsd.dtsi366 interrupts = <GIC_SPI 438 IRQ_TYPE_LEVEL_HIGH>, /* Global secure fault */
367 <GIC_SPI 439 IRQ_TYPE_LEVEL_HIGH>, /* Global non-secure fault */
368 <GIC_SPI 451 IRQ_TYPE_LEVEL_HIGH>, /* Combined secure interrupt */
369 <GIC_SPI 450 IRQ_TYPE_LEVEL_HIGH>, /* Combined non-secure interrupt */
374 /* Per context non-secure context interrupts, 0-3 interrupts */
386 interrupts = <GIC_SPI 321 IRQ_TYPE_LEVEL_HIGH>, /* Global secure fault */
387 <GIC_SPI 322 IRQ_TYPE_LEVEL_HIGH>, /* Global non-secure fault */
388 <GIC_SPI 346 IRQ_TYPE_LEVEL_HIGH>, /* Combined secure interrupt */
389 <GIC_SPI 345 IRQ_TYPE_LEVEL_HIGH>, /* Combined non-secure interrupt */
398 /* Per context non-secure context interrupts, 0-7 interrupts */
[all …]
/Linux-v6.6/Documentation/devicetree/bindings/iommu/
Dmsm,iommu-v0.txt12 support secure mode two interrupts must be specified, for non-secure and
13 secure mode, in that order. For instances that don't support secure mode a
/Linux-v6.6/arch/arm64/boot/dts/arm/
Dcorstone1000.dtsi145 secure-status = "okay"; /* secure-world-only */
157 secure-status = "okay"; /* secure-world-only */
/Linux-v6.6/Documentation/driver-api/firmware/
Dother_interfaces.rst25 higher than the kernel is granted. Such secure features include
31 drivers to request access to the secure features. The requests are queued
33 of the requests on to a secure monitor (EL3).
/Linux-v6.6/arch/mips/crypto/
DKconfig39 SHA-1 secure hash algorithm (FIPS 180)
49 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
59 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
/Linux-v6.6/Documentation/staging/
Dtee.rst8 secure environment, for example, TrustZone on ARM CPUs, or a separate
9 secure co-processor etc. A TEE driver handles the details needed to
139 separate secure co-processor.
172 RPC (Remote Procedure Call) are requests from secure world to kernel driver
190 There are two kinds of notifications that secure world can use to make
195 2. Asynchronous notifications delivered with a combination of a non-secure
196 edge-triggered interrupt and a fast call from the non-secure interrupt
200 this is only usable when secure world is entered with a yielding call via
201 ``OPTEE_SMC_CALL_WITH_ARG``. This excludes such notifications from secure
204 An asynchronous notification is delivered via a non-secure edge-triggered
[all …]
/Linux-v6.6/Documentation/devicetree/bindings/firmware/
Dintel,stratix10-svc.txt10 communication with SDM, only the secure world of software (EL3, Exception
18 driver also manages secure monitor call (SMC) to communicate with secure monitor
/Linux-v6.6/drivers/of/
Dkobj.c68 bool secure = strncmp(pp->name, "security-", 9) == 0; in __of_add_property_sysfs() local
78 pp->attr.attr.mode = secure ? 0400 : 0444; in __of_add_property_sysfs()
79 pp->attr.size = secure ? 0 : pp->length; in __of_add_property_sysfs()
/Linux-v6.6/drivers/vfio/
DKconfig11 VFIO provides a framework for secure userspace device drivers.
25 to set up secure DMA context for device access. This interface does
69 considered secure. VFIO No-IOMMU mode enables IOMMU groups for
71 infrastructure in a non-secure mode. Use of this mode will result
/Linux-v6.6/arch/arm64/crypto/
DKconfig45 SHA-1 secure hash algorithm (FIPS 180)
54 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
64 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
73 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
83 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
94 SHA-3 secure hash algorithms (FIPS 202)
105 SM3 (ShangMi 3) secure hash function (OSCCA GM/T 0004-2012)
116 SM3 (ShangMi 3) secure hash function (OSCCA GM/T 0004-2012)
/Linux-v6.6/Documentation/security/
Dsiphash.rst7 SipHash is a cryptographically secure PRF -- a keyed hash function -- that
15 indistinguishable from random. You may then use that integer as part of secure
16 sequence numbers, secure cookies, or mask it off for use in a hash table.
21 Keys should always be generated from a cryptographically secure source of
137 same as the siphash ones, or that they are secure; the hsiphash functions still
138 use a less secure reduced-round algorithm and truncate their outputs to 32
144 Keys should always be generated from a cryptographically secure source of
/Linux-v6.6/arch/sparc/crypto/
DKconfig45 SHA-1 secure hash algorithm (FIPS 180)
55 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
65 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
/Linux-v6.6/arch/powerpc/crypto/
DKconfig51 SHA-1 secure hash algorithm (FIPS 180)
59 SHA-1 secure hash algorithm (FIPS 180)
70 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
93 timining attacks. Nevertheless it might be not as secure as other
/Linux-v6.6/arch/arm/crypto/
DKconfig91 SHA-1 secure hash algorithm (FIPS 180)
102 SHA-1 secure hash algorithm (FIPS 180)
113 SHA-1 secure hash algorithm (FIPS 180)
123 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
133 SHA-224 and SHA-256 secure hash algorithms (FIPS 180)
143 SHA-384 and SHA-512 secure hash algorithms (FIPS 180)
/Linux-v6.6/drivers/gpu/drm/nouveau/nvkm/falcon/
Dv1.c30 u32 size, u16 tag, u8 port, bool secure) in nvkm_falcon_v1_load_imem() argument
38 reg = start | BIT(24) | (secure ? BIT(28) : 0); in nvkm_falcon_v1_load_imem()
/Linux-v6.6/Documentation/ABI/testing/
Dsysfs-secvar5 secureboot, thereby secure variables. It exposes interface
6 for reading/writing the secure variables
11 Description: This directory lists all the secure variables that are supported
32 Description: Each secure variable is represented as a directory named as
60 defined by the secure variable implementation. All data is in
/Linux-v6.6/drivers/gpio/
Dgpio-tegra186.c112 void __iomem *secure; member
162 return gpio->secure + offset + pin * TEGRA186_GPIO_SCR_PIN_SIZE; in tegra186_gpio_get_secure_base()
167 void __iomem *secure; in tegra186_gpio_is_accessible() local
170 secure = tegra186_gpio_get_secure_base(gpio, pin); in tegra186_gpio_is_accessible()
173 value = readl(secure + TEGRA186_GPIO_VM); in tegra186_gpio_is_accessible()
178 value = __raw_readl(secure + TEGRA186_GPIO_SCR); in tegra186_gpio_is_accessible()
757 base = gpio->secure + port->bank * 0x1000 + 0x800; in tegra186_gpio_init_route_mapping()
842 gpio->secure = devm_platform_ioremap_resource_byname(pdev, "security"); in tegra186_gpio_probe()
843 if (IS_ERR(gpio->secure)) { in tegra186_gpio_probe()
844 gpio->secure = devm_platform_ioremap_resource(pdev, 0); in tegra186_gpio_probe()
[all …]
/Linux-v6.6/drivers/firmware/
DKconfig183 and manages secure monitor call to communicate with secure monitor
184 software at secure monitor exception level.
277 bool "Trusted Foundations secure monitor support"
281 the market) are booted with the Trusted Foundations secure monitor
282 active, requiring some core operations to be performed by the secure
285 This option allows the kernel to invoke the secure monitor whenever
293 tristate "Turris Mox rWTM secure firmware driver"
300 This driver communicates with the firmware on the Cortex-M3 secure

12345678910>>...12