/linux-6.14.4/Documentation/devicetree/bindings/mtd/ |
D | nand-chip.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/mtd/nand-chip.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Miquel Raynal <[email protected]> 13 - $ref: mtd.yaml# 18 SPI-NAND devices are concerned by this description. 23 Contains the chip-select IDs. 25 nand-ecc-engine: 31 2/ The ECC engine is part of the NAND part (on-die), in this [all …]
|
/linux-6.14.4/Documentation/devicetree/bindings/mailbox/ |
D | ti,secure-proxy.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/mailbox/ti,secure-proxy.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Texas Instruments' Secure Proxy 10 - Nishanth Menon <[email protected]> 13 The Texas Instruments' secure proxy is a mailbox controller that has 15 Message manager is broken up into different address regions that are 16 called "threads" or "proxies" - each instance is unidirectional and is 22 pattern: "^mailbox@[0-9a-f]+$" [all …]
|
/linux-6.14.4/Documentation/networking/devlink/ |
D | iosm.rst | 1 .. SPDX-License-Identifier: GPL-2.0 13 The ``iosm`` driver implements the following driver-specific parameters. 15 .. list-table:: Driver-specific parameters implemented 18 * - Name 19 - Type 20 - Mode 21 - Description 22 * - ``erase_full_flash`` 23 - u8 24 - runtime [all …]
|
/linux-6.14.4/arch/arm64/boot/dts/qcom/ |
D | qcs8550.dtsi | 1 // SPDX-License-Identifier: BSD-3-Clause 3 * Copyright (c) 2023-2024, Qualcomm Innovation Center, Inc. All rights reserved. 8 /delete-node/ &reserved_memory; 11 reserved_memory: reserved-memory { 12 #address-cells = <2>; 13 #size-cells = <2>; 17 /* These are 3 types of reserved memory regions here: 18 * 1. Firmware related regions which aren't shared with kernel. 24 * table and add reserved memory regions to efi config table. Current 27 * 2. Firmware related memory regions which are shared with Kernel [all …]
|
/linux-6.14.4/drivers/nvdimm/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 3 tristate "NVDIMM (Non-Volatile Memory Device) Support" 9 Generic support for non-volatile memory devices including 10 ACPI-6-NFIT defined resources. On platforms that define an 28 non-standard OEM-specific E820 memory type (type-12, see 31 Documentation/admin-guide/kernel-parameters.rst). This driver converts 33 capable of DAX (direct-access) file system mappings. See 34 Documentation/driver-api/nvdimm/nvdimm.rst for more details. 69 management sub-system. By default persistent memory does 85 sub-divide a namespace into character devices that can only be [all …]
|
/linux-6.14.4/Documentation/devicetree/bindings/sram/ |
D | sram.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Generic on-chip SRAM 10 - Rob Herring <[email protected]> 13 Simple IO memory regions to be managed by the genalloc API. 19 Following the generic-names recommended practice, node names should 30 - mmio-sram 31 - amlogic,meson-gxbb-sram 32 - arm,juno-sram-ns [all …]
|
/linux-6.14.4/include/linux/firmware/qcom/ |
D | qcom_qseecom.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 3 * Driver for Qualcomm Secure Execution Environment (SEE) interface (QSEECOM). 13 #include <linux/dma-mapping.h> 19 * struct qseecom_client - QSEECOM client device. 29 * qcom_qseecom_app_send() - Send to and receive data from a given QSEE app. 37 * back its response. The caller must provide two DMA memory regions, one for 39 * respective (app-specific) request data. The QSEE app reads this and returns 51 return qcom_scm_qseecom_app_send(client->app_id, req, req_size, rsp, rsp_size); in qcom_qseecom_app_send()
|
/linux-6.14.4/drivers/nvmem/ |
D | stm32-romem.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * STM32 Factory-programmed memory read access driver 5 * Copyright (C) 2017, STMicroelectronics - All Rights Reserved 9 #include <linux/arm-smccc.h> 12 #include <linux/nvmem-provider.h> 18 #include "stm32-bsec-optee-ta.h" 20 /* BSEC secure service access from non-secure */ 51 *buf8++ = readb_relaxed(priv->base + i); in stm32_romem_read() 63 return -EIO; in stm32_bsec_smc() 70 return -ENXIO; in stm32_bsec_smc() [all …]
|
/linux-6.14.4/drivers/soc/qcom/ |
D | ocmem.c | 1 // SPDX-License-Identifier: GPL-2.0-only 64 struct ocmem_region *regions; member 104 writel(data, ocmem->mmio + reg); in ocmem_write() 109 return readl(ocmem->mmio + reg); in ocmem_read() 118 for (i = 0; i < ocmem->config->num_regions; i++) { in update_ocmem() 119 struct ocmem_region *region = &ocmem->regions[i]; in update_ocmem() 121 if (region->mode == THIN_MODE) in update_ocmem() 125 dev_dbg(ocmem->dev, "ocmem_region_mode_control %x\n", in update_ocmem() 130 for (i = 0; i < ocmem->config->num_regions; i++) { in update_ocmem() 131 struct ocmem_region *region = &ocmem->regions[i]; in update_ocmem() [all …]
|
/linux-6.14.4/Documentation/admin-guide/ |
D | thunderbolt.rst | 1 .. SPDX-License-Identifier: GPL-2.0 25 ----------------------------------- 27 should be a userspace tool that handles all the low-level details, keeps 31 found in ``Documentation/ABI/testing/sysfs-bus-thunderbolt``. 35 ``/etc/udev/rules.d/99-local.rules``:: 66 secure 68 addition to UUID the device (if it supports secure connect) is sent 92 If the security level reads as ``user`` or ``secure`` the connected 101 Authorizing devices when security level is ``user`` or ``secure`` 102 ----------------------------------------------------------------- [all …]
|
D | perf-security.rst | 7 -------- 50 ------------------------------- 66 independently enabled and disabled on per-thread basis for processes and 74 observability operations in the kernel and provides a secure approach to 79 processes but CAP_SYS_ADMIN usage for secure monitoring and observability 84 is recommended as the preferred secure approach to resolve double access 103 --------------------------------- 105 Mechanisms of capabilities, privileged capability-dumb files [6]_, 118 # ls -alhF 119 -rwxr-xr-x 2 root root 11M Oct 19 15:12 perf [all …]
|
/linux-6.14.4/arch/arm64/boot/dts/sprd/ |
D | ums9620.dtsi | 1 // SPDX-License-Identifier: (GPL-2.0 OR MIT) 8 #include <dt-bindings/interrupt-controller/arm-gic.h> 11 interrupt-parent = <&gic>; 12 #address-cells = <2>; 13 #size-cells = <2>; 16 #address-cells = <2>; 17 #size-cells = <0>; 19 cpu-map { 50 compatible = "arm,cortex-a55"; 52 enable-method = "psci"; [all …]
|
D | sc9863a.dtsi | 1 // SPDX-License-Identifier: GPL-2.0-only 8 #include <dt-bindings/clock/sprd,sc9863a-clk.h> 9 #include <dt-bindings/interrupt-controller/arm-gic.h> 14 #address-cells = <2>; 15 #size-cells = <0>; 17 cpu-map { 48 compatible = "arm,cortex-a55"; 50 enable-method = "psci"; 51 cpu-idle-states = <&CORE_PD>; 56 compatible = "arm,cortex-a55"; [all …]
|
/linux-6.14.4/drivers/irqchip/ |
D | irq-gic-v3.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2013-2017 ARM Limited, All Rights Reserved. 26 #include <linux/irqchip/arm-gic-common.h> 27 #include <linux/irqchip/arm-gic-v3.h> 28 #include <linux/irqchip/arm-gic-v3-prio.h> 29 #include <linux/irqchip/irq-partition-percpu.h> 32 #include <linux/arm-smccc.h> 39 #include "irq-gic-common.h" 91 * are potentially stolen by the secure side. Some code, especially code dealing 98 * SCR_EL3.FIQ, and the behaviour of non-secure priority registers of the [all …]
|
/linux-6.14.4/Documentation/arch/s390/ |
D | mm.rst | 1 .. SPDX-License-Identifier: GPL-2.0 12 - Some aspects of the virtual memory layout setup are not 15 - Unused gaps in the virtual memory layout could be present 16 or not - depending on how partucular system is configured. 19 - The virtual memory regions are tracked or untracked by KASAN 28 +- 0 --------------+- 0 --------------+ 29 | | S390_lowcore | Low-address memory 30 | +- 8 KB -----------+ 35 +- AMODE31_START --+- AMODE31_START --+ .amode31 rand. phys/virt start 37 +- AMODE31_END ----+- AMODE31_END ----+ .amode31 rand. phys/virt end (<2GB) [all …]
|
/linux-6.14.4/arch/x86/platform/efi/ |
D | quirks.c | 1 // SPDX-License-Identifier: GPL-2.0-only 45 * yyyy=4 digit year, mm=1-12, dd=1-31. 54 * @rsvd_next_header: 32-bit pointer to the next Secure Boot Module in the 60 …rom https://downloadcenter.intel.com/download/23197/Intel-Quark-SoC-X1000-Board-Support-Package-BSP 146 if (remaining_size - size < EFI_MIN_RESERVE) in query_variable_store_nonblocking() 181 if ((remaining_size - size < EFI_MIN_RESERVE) && in efi_query_variable_store() 225 if (remaining_size - size < EFI_MIN_RESERVE) in efi_query_variable_store() 243 * However, some boot services regions contain data that is required 245 * freed. This is done by tagging those regions with the 250 * into efi.memmap (splitting existing regions if necessary) and tag [all …]
|
/linux-6.14.4/drivers/firmware/efi/libstub/ |
D | fdt.c | 1 // SPDX-License-Identifier: GPL-2.0 24 /* Set the #address-cells and #size-cells values for an empty tree */ in fdt_update_cell_size() 26 fdt_setprop_u32(fdt, offset, "#address-cells", EFI_DT_ADDR_CELLS_DEFAULT); in fdt_update_cell_size() 27 fdt_setprop_u32(fdt, offset, "#size-cells", EFI_DT_SIZE_CELLS_DEFAULT); in fdt_update_cell_size() 61 * non-critical: in update_fdt() 72 * kernel will use the UEFI memory map to find reserved regions. in update_fdt() 75 while (num_rsv-- > 0) in update_fdt() 99 status = fdt_setprop_var(fdt, node, "linux,uefi-system-table", fdt_val64); in update_fdt() 105 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-start", fdt_val64); in update_fdt() 111 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-size", fdt_val32); in update_fdt() [all …]
|
/linux-6.14.4/drivers/xen/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 32 2) control domain: xl mem-max <target-domain> <maxmem> 35 3) control domain: xl mem-set <target-domain> <memory> 51 …SUBSYSTEM=="memory", ACTION=="add", RUN+="/bin/sh -c '[ -f /sys$devpath/state ] && echo online > /… 76 secure, but slightly less efficient. This can be controlled with 145 bool "Add support for dma-buf grant access device driver extension" 150 dma-buf implementation. With this extension grant references to 151 the pages of an imported dma-buf can be exported for other domain 153 converted into a local dma-buf for local export. 156 tristate "User-space grant reference allocator driver" [all …]
|
/linux-6.14.4/Documentation/arch/arm64/ |
D | booting.rst | 13 (EL0 - EL3), with EL0, EL1 and EL2 having a secure and a non-secure 15 level and exists only in secure mode. Both are architecturally optional. 19 is passed to the Linux kernel. This may include secure monitor and 33 --------------------------- 49 ------------------------- 53 The device tree blob (dtb) must be placed on an 8-byte boundary and must 62 ------------------------------ 74 ------------------------ 78 The decompressed kernel image contains a 64-byte header as follows:: 94 - As of v3.17, all fields are little endian unless stated otherwise. [all …]
|
/linux-6.14.4/Documentation/arch/x86/ |
D | tdx.rst | 1 .. SPDX-License-Identifier: GPL-2.0 16 TDX introduces a new CPU mode called Secure Arbitration Mode (SEAM) and 18 CPU-attested software module called 'the TDX module' runs inside the new 22 TDX also leverages Intel Multi-Key Total Memory Encryption (MKTME) to 23 provide crypto-protection to the VMs. TDX reserves part of MKTME KeyIDs 32 TDX boot-time detection 33 ----------------------- 41 --------------------------------------- 59 Besides initializing the TDX module, a per-cpu initialization SEAMCALL 103 ------------------------------------------ [all …]
|
/linux-6.14.4/drivers/mailbox/ |
D | ti-msgmgr.c | 1 // SPDX-License-Identifier: GPL-2.0 5 * Copyright (C) 2015-2022 Texas Instruments Incorporated - https://www.ti.com/ 22 #include <linux/soc/ti/ti-msgmgr.h> 41 * struct ti_msgmgr_valid_queue_desc - SoC valid queues meant for this processor 53 * struct ti_msgmgr_desc - Description of message manager integration 68 * @is_sproxy: Is this an Secure Proxy instance? 92 * struct ti_queue_inst - Description of a queue instance 122 * struct ti_msgmgr_inst - Description of a Message Manager Instance 126 * @queue_state_debug_region: Queue status register regions 127 * @queue_ctrl_region: Queue Control register regions [all …]
|
/linux-6.14.4/Documentation/userspace-api/ |
D | vduse.rst | 2 VDUSE - "vDPA Device in Userspace" 9 possible to implement software-emulated vDPA devices in userspace. And 10 to make the device emulation more secure, the emulated vDPA device's 21 ---------------------------- 49 .. code-block:: c 59 return -ENOMEM; 92 return -1; 96 --------------- 104 add per-virtqueue configuration such as the max size of virtqueue to the device. 111 .. code-block:: c [all …]
|
/linux-6.14.4/Documentation/ABI/testing/ |
D | sysfs-bus-coresight-devices-etm4x | 76 Description: (Read) Indicates the number of single-shot comparator controls that 135 Description: (RW) Controls which regions in the memory map are enabled to 148 Description: (RW) In Secure state, each bit controls whether instruction 155 Description: (RW) In non-secure state, each bit controls whether instruction 289 Description: (RW) Set the Exception Level matching bits for secure and 290 non-secure exception levels. 486 Description: (Read) Returns the number of P0 right-hand keys that the trace unit 493 Description: (Read) Returns the number of P1 right-hand keys that the trace unit 500 Description: (Read) Returns the number of special P1 right-hand keys that the 508 Description: (Read) Returns the number of conditional P1 right-hand keys that [all …]
|
/linux-6.14.4/arch/arm/boot/dts/qcom/ |
D | qcom-sdx55-telit-fn980-tlb.dts | 1 // SPDX-License-Identifier: BSD-3-Clause 6 /dts-v1/; 8 #include <dt-bindings/gpio/gpio.h> 9 #include <dt-bindings/regulator/qcom,rpmh-regulator.h> 10 #include "qcom-sdx55.dtsi" 15 compatible = "qcom,sdx55-telit-fn980-tlb", "qcom,sdx55"; 16 qcom,board-id = <0xb010008 0x0>; 23 stdout-path = "serial0:921600n8"; 26 reserved-memory { 27 #address-cells = <1>; [all …]
|
D | qcom-sdx55-t55.dts | 1 // SPDX-License-Identifier: BSD-3-Clause 6 /dts-v1/; 8 #include <dt-bindings/gpio/gpio.h> 9 #include <dt-bindings/regulator/qcom,rpmh-regulator.h> 10 #include "qcom-sdx55.dtsi" 15 compatible = "qcom,sdx55-t55", "qcom,sdx55"; 16 qcom,board-id = <0xb010008 0x4>; 23 stdout-path = "serial0:115200n8"; 26 reserved-memory { 27 #address-cells = <1>; [all …]
|