Home
last modified time | relevance | path

Searched full:hardened (Results 1 – 25 of 29) sorted by relevance

12

/linux-6.14.4/drivers/soc/qcom/
DKconfig26 resource on a RPM-hardened platform must use this database to get
164 tristate "Qualcomm RPM-Hardened (RPMH) Communication"
168 Support for communication with the hardened-RPM blocks in
/linux-6.14.4/Documentation/devicetree/bindings/crypto/
Dxlnx,zynqmp-aes.yaml14 The ZynqMP AES-GCM hardened cryptographic accelerator is used to
/linux-6.14.4/drivers/misc/lkdtm/
Dusercopy.c17 * normally be ignored by hardened usercopy, so force the compiler
19 * hardened usercopy checks by added "unconst" to all the const copies,
131 * This checks for whole-object size validation with hardened usercopy,
/linux-6.14.4/Documentation/devicetree/bindings/soc/qcom/
Dqcom,rpmh-rsc.yaml13 Resource Power Manager Hardened (RPMH) is the mechanism for communicating
14 with the hardened resource accelerators on Qualcomm SoCs. Requests to the
/linux-6.14.4/arch/um/kernel/skas/
DMakefile37 # GCC hardened also auto-enables -fpic, but we need %ebx so it can't work ->
/linux-6.14.4/Documentation/devicetree/bindings/clock/
Dqcom,rpmhcc.yaml13 Resource Power Manager Hardened (RPMh) manages shared resources on
/linux-6.14.4/tools/testing/selftests/bpf/
Dtest_kmod.sh31 echo "[ JIT enabled:$1 hardened:$2 ]"
/linux-6.14.4/Documentation/devicetree/bindings/interrupt-controller/
Dqcom,pdc.yaml13 Qualcomm Technologies Inc. SoCs based on the RPM Hardened architecture have a
/linux-6.14.4/arch/arm/include/asm/
Dprocessor.h42 * no hardened usercopy whitelist is needed.
/linux-6.14.4/Documentation/virt/hyperv/
Dcoco.rst205 Many drivers for VMBus devices have been "hardened" by adding code to fully
209 CoCo VM have not been hardened, and they are not allowed to load in a CoCo
/linux-6.14.4/Documentation/devicetree/bindings/firmware/xilinx/
Dxlnx,zynqmp-firmware.yaml103 description: The ZynqMP AES-GCM hardened cryptographic accelerator is
/linux-6.14.4/arch/riscv/include/asm/
Dprocessor.h119 /* Whitelist the fstate from the task_struct for hardened usercopy */
/linux-6.14.4/Documentation/userspace-api/
Dcheck_exec.rst24 (e.g. hardened Linux distributions or hermetic container images) could use
/linux-6.14.4/arch/x86/kernel/
Dtls.c45 * hardened this function to disallow 16-bit TLS segments. Fix in tls_desc_okay()
/linux-6.14.4/kernel/
Dpanic.c181 * unfortunately means it may not be hardened to work in a panic in crash_smp_send_stop()
267 * which unfortunately may not be hardened to work in a panic in panic_other_cpus_shutdown()
/linux-6.14.4/arch/arm64/include/asm/
Dprocessor.h151 * Whitelisted fields for hardened usercopy:
/linux-6.14.4/arch/arm64/boot/dts/qcom/
Dsdm660-xiaomi-lavender.dts227 * by the Core Power Reduction hardened (CPRh) and the
Dsdm670-google-sargo.dts189 * by the Core Power Reduction hardened (CPRh) and the
Dsdm630-sony-xperia-nile.dtsi431 * by the Core Power Reduction hardened (CPRh) and the
/linux-6.14.4/Documentation/security/tpm/
Dtpm-security.rst18 the moment, most hardened security environments require a discrete
/linux-6.14.4/drivers/misc/
DKconfig487 SDFEC(16nm) hardened block. To compile this as a module choose M.
/linux-6.14.4/tools/memory-model/Documentation/
Daccess-marking.txt220 compiler, though one could imagine hardened kernel builds treating the
/linux-6.14.4/arch/x86/kernel/fpu/
Dcore.c658 * Whitelist the FPU register state embedded into task_struct for hardened
/linux-6.14.4/drivers/scsi/
Dlibiscsi_tcp.c129 * triggers one of hardened usercopy checks. in iscsi_tcp_segment_map()
/linux-6.14.4/arch/
DKconfig330 An architecture should select this to provide hardened usercopy

12