/linux-6.14.4/Documentation/devicetree/bindings/crypto/ |
D | inside-secure,safexcel.yaml | 1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause 3 --- 4 $id: http://devicetree.org/schemas/crypto/inside-secure,safexcel.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Inside Secure SafeXcel cryptographic engine 10 - Antoine Tenart <[email protected]> 15 - const: inside-secure,safexcel-eip197b 16 - const: inside-secure,safexcel-eip197d 17 - const: inside-secure,safexcel-eip97ies 18 - const: inside-secure,safexcel-eip197 [all …]
|
/linux-6.14.4/Documentation/devicetree/bindings/rng/ |
D | inside-secure,safexcel-eip76.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/rng/inside-secure,safexcel-eip76.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Inside-Secure HWRNG Module 10 - Jayesh Choudhary <j-[email protected]> 15 - enum: 16 - ti,omap2-rng 17 - ti,omap4-rng 18 - inside-secure,safexcel-eip76 [all …]
|
/linux-6.14.4/drivers/nfc/microread/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 6 This module contains the main code for Inside Secure microread 11 tristate "Inside Secure Microread device support (I2C)" 16 Inside microread chipsets. Select this if your platform is using 23 tristate "Inside Secure Microread device support (MEI)" 28 Inside microread chipsets. Select this if your microread chipset
|
D | mei.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * HCI based Driver for Inside Secure microread NFC Chip 28 return -ENOMEM; in microread_mei_probe() 32 &phy->hdev); in microread_mei_probe() 46 microread_remove(phy->hdev); in microread_mei_remove()
|
/linux-6.14.4/drivers/s390/crypto/ |
D | zcrypt_ccamisc.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 18 #define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */ 42 /* inside view of a CCA secure key token (only type 0x01 version 0x04) */ 58 /* inside view of a variable length symmetric cipher AES key token */ 82 /* AES-128 512 640 */ 83 /* AES-192 576 640 */ 84 /* AES-256 640 640 */ 98 /* inside view of an CCA secure ECC private key */ 108 u8 htype; /* hash method, 0x02 for SHA-256 */ 134 * Simple check if the token is a valid CCA secure AES data key [all …]
|
D | zcrypt_ep11misc.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 29 /* inside view of an EP11 secure key blob */ 50 return (kb->version == EP11_STRUCT_MAGIC); in is_ep11_keyblob() 115 * Generate (random) EP11 AES secure key. 121 * Generate EP11 AES secure key with given clear key value. 129 * - apqn is online and is in fact an EP11 apqn 130 * - if cardnr is not FFFF only apqns with this cardnr 131 * - if domain is not FFFF only apqns with this domainnr 132 * - if minhwtype > 0 only apqns with hwtype >= minhwtype 133 * - if minapi > 0 only apqns with API_ord_nr >= minapi [all …]
|
D | zcrypt_ccamisc.c | 1 // SPDX-License-Identifier: GPL-2.0+ 44 * Simple check if the token is a valid CCA secure AES data key 55 if (t->type != TOKTYPE_CCA_INTERNAL) { in cca_check_secaeskeytoken() 58 __func__, (int)t->type, TOKTYPE_CCA_INTERNAL); in cca_check_secaeskeytoken() 59 return -EINVAL; in cca_check_secaeskeytoken() 61 if (t->version != TOKVER_CCA_AES) { in cca_check_secaeskeytoken() 64 __func__, (int)t->version, TOKVER_CCA_AES); in cca_check_secaeskeytoken() 65 return -EINVAL; in cca_check_secaeskeytoken() 67 if (keybitsize > 0 && t->bitsize != keybitsize) { in cca_check_secaeskeytoken() 70 __func__, (int)t->bitsize, keybitsize); in cca_check_secaeskeytoken() [all …]
|
/linux-6.14.4/Documentation/devicetree/bindings/arm/tegra/ |
D | nvidia,tegra194-cbb.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/arm/tegra/nvidia,tegra194-cbb.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Sumit Gupta <[email protected]> 15 multiple hierarchical sub-NOCs (Network-on-Chip) and connects various 19 by the NOCs inside the CBB. NOCs reporting errors are cluster NOCs 20 "AON-NOC, SCE-NOC, RCE-NOC, BPMP-NOC, CV-NOC" and "CBB Central NOC" 28 - For CCPLEX (CPU Complex) initiator, the driver sets ERD bit. So, the 31 - For other initiators, the ERD is disabled. So, the access issuing [all …]
|
/linux-6.14.4/arch/x86/kvm/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 13 operating systems inside virtual machines (guests). 52 tristate "Kernel-based Virtual Machine (KVM) support" 69 bool "Compile KVM with -Werror" 70 # Disallow KVM's -Werror if KASAN is enabled, e.g. to guard against 74 # Building KVM with -Werror and KASAN is still doable via enabling 75 # the kernel-wide WERROR=y. 78 Add -Werror to the build flags for KVM. 83 bool "Enable support for KVM software-protected VMs" 87 Enable support for KVM software-protected VMs. Currently, software- [all …]
|
/linux-6.14.4/drivers/crypto/inside-secure/ |
D | safexcel.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Antoine Tenart <antoine.tenart@free-electrons.com> 10 #include <linux/dma-mapping.h> 45 writel(0, priv->base + EIP197_FLUE_IFC_LUT(i)); in eip197_trc_cache_setupvirt() 51 for (i = 0; i < priv->config.rings; i++) { in eip197_trc_cache_setupvirt() 52 writel(0, priv->base + EIP197_FLUE_CACHEBASE_LO(i)); in eip197_trc_cache_setupvirt() 53 writel(0, priv->base + EIP197_FLUE_CACHEBASE_HI(i)); in eip197_trc_cache_setupvirt() 55 priv->base + EIP197_FLUE_CONFIG(i)); in eip197_trc_cache_setupvirt() 57 writel(0, priv->base + EIP197_FLUE_OFFSETS); in eip197_trc_cache_setupvirt() 58 writel(0, priv->base + EIP197_FLUE_ARC4_OFFSET); in eip197_trc_cache_setupvirt() [all …]
|
/linux-6.14.4/drivers/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 39 called padlock-aes. 53 called padlock-sha. 61 Say 'Y' here to use the AMD Geode LX processor on-board AES 65 will be called geode-aes. 87 - A pkey base and API kernel module (pkey.ko) which offers the 89 and the sysfs API and the in-kernel API to the crypto cipher 91 - A pkey pckmo kernel module (pkey-pckmo.ko) which is automatically 94 - A pkey CCA kernel module (pkey-cca.ko) which is automatically 96 - A pkey EP11 kernel module (pkey-ep11.ko) which is automatically [all …]
|
D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 2 obj-$(CONFIG_CRYPTO_DEV_ALLWINNER) += allwinner/ 3 obj-$(CONFIG_CRYPTO_DEV_ASPEED) += aspeed/ 4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o 5 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA) += atmel-sha.o 6 obj-$(CONFIG_CRYPTO_DEV_ATMEL_TDES) += atmel-tdes.o 7 # __init ordering requires atmel-i2c being before atmel-ecc and atmel-sha204a. 8 obj-$(CONFIG_CRYPTO_DEV_ATMEL_I2C) += atmel-i2c.o 9 obj-$(CONFIG_CRYPTO_DEV_ATMEL_ECC) += atmel-ecc.o 10 obj-$(CONFIG_CRYPTO_DEV_ATMEL_SHA204A) += atmel-sha204a.o [all …]
|
/linux-6.14.4/Documentation/arch/arm/ |
D | tcm.rst | 2 ARM TCM (Tightly-Coupled Memory) handling in Linux 7 Some ARM SoCs have a so-called TCM (Tightly-Coupled Memory). 8 This is usually just a few (4-64) KiB of RAM inside the ARM 11 Due to being embedded inside the CPU, the TCM has a 12 Harvard-architecture, so there is an ITCM (instruction TCM) 24 determine if ITCM (bits 1-0) and/or DTCM (bit 17-16) is present 47 be able to lock and hide one of the banks for use by the secure 52 - FIQ and other interrupt handlers that need deterministic 55 - Idle loops where all external RAM is set to self-refresh 56 retention mode, so only on-chip RAM is accessible by [all …]
|
/linux-6.14.4/arch/powerpc/platforms/pseries/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 4 bool "IBM pSeries & new (POWER5-based) iSeries" 39 bool "Support for shared-processor logical partitions" 46 on logically-partitioned pSeries systems which use shared 79 to return information about hardware error and non-error events 109 bool "Support for shared-memory logical partitions" 152 the total time spent inside the KVM guest. This config enables code 178 # This option is selected by in-kernel consumers that require 184 # This option is selected by in-kernel consumers that require 194 bool "Secure virtual machine (SVM) support for POWER" [all …]
|
/linux-6.14.4/Documentation/devicetree/bindings/mfd/ |
D | nxp,bbnsm.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: NXP Battery-Backed Non-Secure Module 10 - Jacky Bai <[email protected]> 13 NXP BBNSM serves as non-volatile logic and storage for the system. 17 significant 32 bits of the real-time counter match the value in the 19 The ON/OFF logic inside the BBNSM allows for connecting directly to 26 - enum: 27 - nxp,imx93-bbnsm [all …]
|
/linux-6.14.4/arch/s390/include/uapi/asm/ |
D | pkey.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */ 89 /* Struct to hold a CCA AES secure key blob */ 91 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */ 121 * Generate CCA AES secure key. 127 struct pkey_seckey seckey; /* out: the secure key blob */ 133 * Construct CCA AES secure key from clear key value 140 struct pkey_seckey seckey; /* out: the secure key blob */ 146 * Fabricate AES protected key from a CCA AES secure key 151 struct pkey_seckey seckey; /* in: the secure key blob */ [all …]
|
/linux-6.14.4/Documentation/arch/x86/ |
D | amd-memory-encryption.rst | 1 .. SPDX-License-Identifier: GPL-2.0 7 Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV) are 19 memory. Private memory is encrypted with the guest-specific key, while shared 37 as private. All the DMA operations inside the guest must be performed on shared 39 is operating in 64-bit or 32-bit PAE mode, in all other modes the SEV hardware 78 - Supported: 81 - Enabled: 84 - Active: 87 kernel is non-zero). 99 Secure Nested Paging (SNP) [all …]
|
/linux-6.14.4/arch/nios2/include/asm/ |
D | thread_info.h | 2 * NiosII low-level thread information 31 * - this struct should fit entirely inside of one cache line 32 * - this struct shares the supervisor stack pages 33 * - if the contents of this structure are changed, the assembly constants 62 return (struct thread_info *)(sp & ~(THREAD_SIZE - 1)); in current_thread_info() 68 * - these are process state flags that various assembly files may need to 70 * - pending work-to-be-done flags are in LSW 71 * - other flags in MSW 78 #define TIF_SECCOMP 5 /* secure computing */
|
/linux-6.14.4/arch/s390/include/asm/ |
D | thread_info.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 13 #include <asm/asm-offsets.h> 27 #define STACK_INIT_OFFSET (THREAD_SIZE - STACK_FRAME_OVERHEAD - __PT_SIZE) 35 * - this struct should fit entirely inside of one cache line 36 * - this struct shares the supervisor stack pages 37 * - if the contents of this structure are changed, the assembly constants must also be changed 68 #define TIF_UPROBE 4 /* breakpointed or single-stepping */ 83 #define TIF_SECCOMP 26 /* secure computing */
|
/linux-6.14.4/arch/microblaze/include/asm/ |
D | thread_info.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 22 * - this struct should fit entirely inside of one cache line 23 * - this struct shares the supervisor stack pages 24 * - if the contents of this structure are changed, the assembly constants 38 /* non-volatile registers */ 62 unsigned long status; /* thread-synchronous flags */ 85 return (struct thread_info *)(sp & ~(THREAD_SIZE-1)); in current_thread_info() 93 * - these are process state flags that various assembly files may 95 * - pending work-to-be-done flags are in LSW 96 * - other flags in MSW [all …]
|
/linux-6.14.4/arch/xtensa/include/asm/ |
D | thread_info.h | 2 * include/asm-xtensa/thread_info.h 8 * Copyright (C) 2001 - 2005 Tensilica Inc. 25 * - this struct should fit entirely inside of one cache line 26 * - this struct shares the supervisor stack pages 27 * - if the contents of this structure are changed, the assembly constants 51 unsigned long status; /* thread-synchronous flags */ 65 * If i-th bit is set then coprocessor state is loaded into the 113 * - these are process state flags that various assembly files may need to access 125 #define TIF_SECCOMP 10 /* secure computing */ 143 #define THREAD_SIZE_ORDER (KERNEL_STACK_SHIFT - PAGE_SHIFT)
|
/linux-6.14.4/security/integrity/ima/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 26 an aggregate integrity value over this list inside the 71 limited to 255 characters. The 'ima-ng' measurement list 77 bool "ima-ng (default)" 79 bool "ima-sig" 84 default "ima-ng" if IMA_NG_TEMPLATE 85 default "ima-sig" if IMA_SIG_TEMPLATE 155 <http://linux-ima.sourceforge.net> 165 based on run time secure boot flags. 213 Kernel module signatures can only be verified by IMA-appraisal, [all …]
|
/linux-6.14.4/arch/arm/mach-omap2/ |
D | pm34xx.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Copyright (C) 2006-2008 Nokia Corporation 13 * Richard Woodruff <r-[email protected]> 42 #include "cm-regbits-34xx.h" 43 #include "prm-regbits-34xx.h" 47 #include "omap-secure.h" 97 * FIXME: This function should be called before entering off-mode after 98 * OMAP3 secure services have been accessed. Currently it is only called 99 * once during boot sequence, but this works as we are not using secure 110 * otherwise the WFI executed inside the ROM code in omap3_save_secure_ram_context() [all …]
|
/linux-6.14.4/arch/powerpc/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 5 def_bool PPC64 && $(cc-option, -mabi=elfv2) 8 def_bool PPC64 && $(cc-option, -mcpu=power10 -mprefixed) 11 # Clang has a bug (https://github.com/llvm/llvm-project/issues/62372) 12 # where pcrel code is not generated if -msoft-float, -mno-altivec, or 13 # -mno-vsx options are also given. Without these options, fp/vec 16 def_bool PPC64 && CC_IS_GCC && $(cc-option, -mcpu=power10 -mpcrel) 35 # On Book3S 64, the default virtual address space for 64-bit processes 38 # between bottom-up and top-down allocations for applications that 41 default 29 if PPC_BOOK3S_64 && PPC_64K_PAGES # 29 = 45 (32T) - 16 (64K) [all …]
|
/linux-6.14.4/drivers/char/hw_random/ |
D | omap-rng.c | 2 * omap-rng.c - RNG driver for TI OMAP CPU family 137 * struct omap_rng_pdata - RNG IP block-specific data 163 return __raw_readl(priv->base + priv->pdata->regs[reg]); in omap_rng_read() 169 __raw_writel(val, priv->base + priv->pdata->regs[reg]); in omap_rng_write() 179 priv = (struct omap_rng_dev *)rng->priv; in omap_rng_do_read() 181 if (max < priv->pdata->data_size) in omap_rng_do_read() 185 present = priv->pdata->data_present(priv); in omap_rng_do_read() 194 memcpy_fromio(data, priv->base + priv->pdata->regs[RNG_OUTPUT_0_REG], in omap_rng_do_read() 195 priv->pdata->data_size); in omap_rng_do_read() 197 if (priv->pdata->regs[RNG_INTACK_REG]) in omap_rng_do_read() [all …]
|