/openbmc/linux/Documentation/devicetree/bindings/misc/ |
H A D | qcom,fastrpc.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Srinivas Kandagatla <srinivas.kandagatla@linaro.org> 13 The FastRPC implements an IPC (Inter-Processor Communication) 25 - adsp 26 - mdsp 27 - sdsp 28 - cdsp 30 memory-region: [all …]
|
/openbmc/u-boot/arch/arm/include/asm/arch-imx8/sci/svc/rm/ |
H A D | api.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 26 #define SC_RM_SPA_ASSERT 2U /* Assert (force to be secure/privileged) */ 27 #define SC_RM_SPA_NEGATE 3U /* Negate (force to be non-secure/user) */ 31 #define SC_RM_PERM_SEC_R 1U /* Secure RO */ 32 #define SC_RM_PERM_SECPRIV_RW 2U /* Secure privilege R/W */ 33 #define SC_RM_PERM_SEC_RW 3U /* Secure R/W */ 34 #define SC_RM_PERM_NSPRIV_R 4U /* Secure R/W, non-secure privilege RO */ 35 #define SC_RM_PERM_NS_R 5U /* Secure R/W, non-secure RO */ 36 #define SC_RM_PERM_NSPRIV_RW 6U /* Secure R/W, non-secure privilege R/W */ 52 * This type is used to declare a resource domain ID used by the
|
/openbmc/linux/drivers/iommu/ |
H A D | ipmmu-vmsa.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * IOMMU API for Renesas VMSA-compatible IPMMU 6 * Copyright (C) 2014-2020 Renesas Electronics Corporation 11 #include <linux/dma-mapping.h> 18 #include <linux/io-pgtable.h> 29 #include <asm/dma-iommu.h> 32 #define arm_iommu_attach_device(...) -ENODEV 37 #define IPMMU_CTX_INVALID -1 94 /* ----------------------------------------------------------------------------- 101 #define IMCTR 0x0000 /* R-Car Gen2/3 */ [all …]
|
/openbmc/linux/Documentation/trace/coresight/ |
H A D | coresight-cpu-debug.rst | 9 ------------ 11 Coresight CPU debug module is defined in ARMv8-a architecture reference manual 13 debug module and it is mainly used for two modes: self-hosted debug and 16 explore debugging method which rely on self-hosted debug mode, this document 19 The debug module provides sample-based profiling extension, which can be used 20 to sample CPU program counter, secure state and exception level, etc; usually 21 every CPU has one dedicated debug module to be connected. Based on self-hosted 29 -------------- 31 - During driver registration, it uses EDDEVID and EDDEVID1 - two device ID 32 registers to decide if sample-based profiling is implemented or not. On some [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/mailbox/ |
H A D | arm,mhu.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Jassi Brar <jaswinder.singh@linaro.org> 13 The ARM's Message-Handling-Unit (MHU) is a mailbox controller that has 3 19 be a 'Secure' resource, hence can't be used by Linux running NS. 22 interrupt signal using a 32-bit register, with all 32-bits logically ORed 28 interrupt. Each of the 32-bits can be used as "doorbell" to alert the remote 37 - arm,mhu 38 - arm,mhu-doorbell [all …]
|
/openbmc/linux/drivers/s390/crypto/ |
H A D | zcrypt_ccamisc.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 17 #define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */ 41 /* inside view of a CCA secure key token (only type 0x01 version 0x04) */ 81 /* AES-128 512 640 */ 82 /* AES-192 576 640 */ 83 /* AES-256 640 640 */ 97 /* inside view of an CCA secure ECC private key */ 107 u8 htype; /* hash method, 0x02 for SHA-256 */ 133 * Simple check if the token is a valid CCA secure AES data key 141 * Simple check if the token is a valid CCA secure AES cipher key [all …]
|
H A D | pkey_api.c | 1 // SPDX-License-Identifier: GPL-2.0 168 return -EINVAL; in pkey_clr2protkey() 174 return -EINVAL; in pkey_clr2protkey() 181 return -ENODEV; in pkey_clr2protkey() 186 return -ENODEV; in pkey_clr2protkey() 205 * Find card and transform secure key into protected key. 211 u16 cardnr, domain; in pkey_skey2pkey() local 224 rc = cca_findcard(key, &cardnr, &domain, verify); in pkey_skey2pkey() 229 switch (hdr->version) { in pkey_skey2pkey() 231 rc = cca_sec2protkey(cardnr, domain, key, in pkey_skey2pkey() [all …]
|
/openbmc/linux/drivers/irqchip/ |
H A D | irq-gic-v3.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2013-2017 ARM Limited, All Rights Reserved. 24 #include <linux/irqchip/arm-gic-common.h> 25 #include <linux/irqchip/arm-gic-v3.h> 26 #include <linux/irqchip/irq-partition-percpu.h> 29 #include <linux/arm-smccc.h> 36 #include "irq-gic-common.h" 59 struct irq_domain *domain; member 83 * SCR_EL3.FIQ, and the behaviour of non-secure priority registers of the 87 * When security is enabled, non-secure priority values from the (re)distributor [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/clock/ |
H A D | fujitsu,mb86s70-crg11.txt | 2 ----------------------------------- 5 - compatible : Shall contain "fujitsu,mb86s70-crg11" 6 - #clock-cells : Shall be 3 {cntrlr domain port} 13 compatible = "fujitsu,mb86s70-crg11"; 14 #clock-cells = <3>; 18 #mbox-cells = <1>; 21 interrupts = <0 36 4>, /* LP Non-Sec */ 22 <0 35 4>, /* HP Non-Sec */ 23 <0 37 4>; /* Secure */ 24 clocks = <&clock 0 2 1>; /* Cntrlr:0 Domain:2 Port:1 */ [all …]
|
/openbmc/qemu/target/arm/ |
H A D | ptw.c | 6 * SPDX-License-Identifier: GPL-2.0-or-later 12 #include "qemu/main-loop.h" 13 #include "exec/exec-all.h" 14 #include "exec/page-protection.h" 17 #include "cpu-features.h" 20 # include "tcg/oversized-guest.h" 33 * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit, 40 * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit, 46 * - if the in_ptw_idx is an ARMMMUIdx_Phys_* then the mmuidx 48 * - if the in_ptw_idx is an ARMMMUIdx_Stage2* then the security [all …]
|
/openbmc/linux/drivers/rtc/ |
H A D | rtc-mxc_v2.c | 1 // SPDX-License-Identifier: GPL-2.0 4 * Copyright (c) 2004-2011 Freescale Semiconductor, Inc. 21 #define SRTC_LPCR_NSA BIT(11) /* lp non secure access */ 22 #define SRTC_LPCR_NVE BIT(14) /* lp non valid state exit bit */ 26 #define SRTC_LPSR_NVES BIT(14) /* lp non-valid state exit status */ 29 #define SRTC_LPSCMR 0x00 /* LP Secure Counter MSB Reg */ 30 #define SRTC_LPSCLR 0x04 /* LP Secure Counter LSB Reg */ 31 #define SRTC_LPSAR 0x08 /* LP Secure Alarm Reg */ 49 * To take care of the asynchronous CKIL clock, all writes from the IP domain 50 * will be synchronized to the CKIL domain. [all …]
|
/openbmc/linux/arch/arm/mach-omap2/ |
H A D | omap-wakeupgen.c | 1 // SPDX-License-Identifier: GPL-2.0-only 9 * implemented in MPU always ON power domain. During normal operation, 28 #include "omap-wakeupgen.h" 29 #include "omap-secure.h" 32 #include "omap4-sar-layout.h" 138 _wakeupgen_clear(d->hwirq, irq_target_cpu[d->hwirq]); in wakeupgen_mask() 151 _wakeupgen_set(d->hwirq, irq_target_cpu[d->hwirq]); in wakeupgen_unmask() 179 if (inverted && d->hwirq != SYS_NIRQ1_EXT_SYS_IRQ_1 && in wakeupgen_irq_set_type() 180 d->hwirq != SYS_NIRQ2_EXT_SYS_IRQ_2) in wakeupgen_irq_set_type() 182 d->hwirq); in wakeupgen_irq_set_type() [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/timer/ |
H A D | arm,arch_timer.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Marc Zyngier <marc.zyngier@arm.com> 11 - Mark Rutland <mark.rutland@arm.com> 13 ARM cores may have a per-core architected timer, which provides per-cpu timers, 17 The per-core architected timer is attached to a GIC to deliver its 18 per-processor interrupts via PPIs. The memory mapped timer is attached to a GIC 24 - items: 25 - const: arm,cortex-a15-timer [all …]
|
/openbmc/linux/arch/arm/mach-ux500/ |
H A D | cpu-db8500.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2008-2009 ST-Ericsson SA 14 #include <linux/irqchip/arm-gic.h> 15 #include <linux/mfd/dbx500-prcmu.h> 16 #include <linux/platform_data/arm-ux500-pm.h> 25 #include <asm/hardware/cache-l2x0.h> 35 np = of_find_compatible_node(NULL, NULL, "arm,pl310-cache"); in ux500_l2x0_unlock() 39 return -ENODEV; in ux500_l2x0_unlock() 42 * Unlock Data and Instruction Lock if locked. Ux500 U-Boot versions in ux500_l2x0_unlock() 61 * We can't write to secure registers as we are in non-secure in ux500_l2c310_write_sec() [all …]
|
/openbmc/linux/Documentation/arch/s390/ |
H A D | vfio-ap.rst | 13 The AP adapter cards are exposed via the AP bus. The motivation for vfio-ap 45 sub-directory:: 50 * AP domain 53 depending upon the adapter type and hardware configuration. A domain is 54 identified by a number from 0 to 255; however, the maximum domain number is 55 determined by machine model and/or adapter type.. A domain can be thought of 57 domain can be configured with a secure private key used for clear key 58 encryption. A domain is classified in one of two ways depending upon how it 65 usage domain; for example, to set the secure private key for the control 66 domain. [all …]
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | thunderbolt.rst | 1 .. SPDX-License-Identifier: GPL-2.0 25 ----------------------------------- 27 should be a userspace tool that handles all the low-level details, keeps 31 found in ``Documentation/ABI/testing/sysfs-bus-thunderbolt``. 35 ``/etc/udev/rules.d/99-local.rules``:: 66 secure 68 addition to UUID the device (if it supports secure connect) is sent 89 the Thunderbolt domain the host controller manages. There is typically 90 one domain per Thunderbolt host controller. 92 If the security level reads as ``user`` or ``secure`` the connected [all …]
|
/openbmc/qemu/include/hw/xen/interface/io/ |
H A D | blkif.h | 1 /* SPDX-License-Identifier: MIT */ 5 * Unified block-device I/O interface for Xen guest OSes. 7 * Copyright (c) 2003-2004, Keir Fraser 18 * Front->back notifications: When enqueuing a new request, sending a 20 * hold-off mechanism provided by the ring macros). Backends must set 23 * Back->front notifications: When enqueuing a new response, sending a 25 * hold-off mechanism provided by the ring macros). Frontends must set 63 *------------------ Backend Device Identification (PRIVATE) ------------------ 78 * physical-device 85 * physical-device-path [all …]
|
/openbmc/linux/Documentation/process/ |
H A D | embargoed-hardware-issues.rst | 7 ----- 23 ------- 31 Linux kernel security team (:ref:`Documentation/admin-guide/ 34 The team can be contacted by email at <hardware-security@kernel.org>. This 43 - PGP: https://www.kernel.org/static/files/hardware-security.asc 44 - S/MIME: https://www.kernel.org/static/files/hardware-security.crt 55 - Linus Torvalds (Linux Foundation Fellow) 56 - Greg Kroah-Hartman (Linux Foundation Fellow) 57 - Thomas Gleixner (Linux Foundation Fellow) 59 Operation of mailing-lists [all …]
|
/openbmc/u-boot/arch/arm/mach-stm32mp/ |
H A D | cpu.c | 1 // SPDX-License-Identifier: GPL-2.0+ OR BSD-3-Clause 3 * Copyright (C) 2018, STMicroelectronics - All Rights Reserved 48 * - boot instance = bit 31:16 49 * - boot device = bit 15:0 64 /* Disable the backup domain write protection */ in security_init() 73 * to reset the backup domain in security_init() 82 /* allow non secure access in Write/Read for all peripheral */ in security_init() 85 /* Open SYSRAM for no secure access */ in security_init() 98 /* bit 30 / 31 => Secure Global Enable : write/read */ in security_init() 113 * Bit 16 ITAMP1E: RTC power domain supply monitoring in security_init() [all …]
|
/openbmc/linux/include/xen/interface/io/ |
H A D | blkif.h | 1 /* SPDX-License-Identifier: MIT */ 5 * Unified block-device I/O interface for Xen guest OSes. 7 * Copyright (c) 2003-2004, Keir Fraser 17 * Front->back notifications: When enqueuing a new request, sending a 19 * hold-off mechanism provided by the ring macros). Backends must set 22 * Back->front notifications: When enqueuing a new response, sending a 24 * hold-off mechanism provided by the ring macros). Frontends must set 33 * If supported, the backend will write the key "multi-queue-max-queues" to 37 * key "multi-queue-num-queues" with the number they wish to use, which must be 39 * "multi-queue-max-queues". [all …]
|
/openbmc/openbmc-tools/openbmctool/ |
H A D | README.md | 12 - `-H`: The hostname or IP for the BMC 13 - `-U`: The username One of the password options: 14 - `-P`: The password, provided in-line 15 - `-A`: Prompt for a password 16 - `-E`: Take the password from envvar `OPENBMCTOOL_PASSWORD` 21 re-enabled with the `local_users` sub-command. 39 To re-enable all local user accounts: 54 - <https://www.rsyslog.com/storing-and-forwarding-remote-messages/> 55 - <https://www.rsyslog.com/doc/rsyslog%255Fconf%255Ffilter.html> 56 - <https://www.thegeekdiary.com/understanding-rsyslog-filter-options/> [all …]
|
/openbmc/linux/arch/arm/mach-exynos/ |
H A D | suspend.c | 1 // SPDX-License-Identifier: GPL-2.0 3 // Copyright (c) 2011-2014 Samsung Electronics Co., Ltd. 6 // Exynos - Suspend support 8 // Based on arch/arm/mach-s3c2410/pm.c 23 #include <linux/soc/samsung/exynos-pmu.h> 24 #include <linux/soc/samsung/exynos-regs-pmu.h> 27 #include <asm/hardware/cache-l2x0.h> 36 #define REG_TABLE_END (-1U) 41 * struct exynos_wkup_irq - PMU IRQ to mask mapping 43 * @mask: Mask in PMU wake-up mask register [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/corstone1000/ |
H A D | 0005-feat-corstone1000-Add-multicore-support-for-FVP-plat.patch | 6 This changeset adds the multicore support for the Corstone-1000 FVP. 7 It adds the PSCI CPU_ON and CPU_ON_FINISH power domain functionalities 10 Upstream-Status: Backport [https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/29176] 11 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com> 12 --- 14 .../corstone1000/common/corstone1000_pm.c | 43 ++++++++++++++++++- 15 .../common/include/platform_def.h | 15 ++++++- 17 4 files changed, 89 insertions(+), 2 deletions(-) 19 diff --git a/plat/arm/board/corstone1000/common/corstone1000_helpers.S b/plat/arm/board/corstone100… 21 --- a/plat/arm/board/corstone1000/common/corstone1000_helpers.S [all …]
|
/openbmc/linux/drivers/thunderbolt/ |
H A D | domain.c | 1 // SPDX-License-Identifier: GPL-2.0 24 if (id->match_flags & TBSVC_MATCH_PROTOCOL_KEY) { in match_service_id() 25 if (strcmp(id->protocol_key, svc->key)) in match_service_id() 29 if (id->match_flags & TBSVC_MATCH_PROTOCOL_ID) { in match_service_id() 30 if (id->protocol_id != svc->prtcid) in match_service_id() 34 if (id->match_flags & TBSVC_MATCH_PROTOCOL_VERSION) { in match_service_id() 35 if (id->protocol_version != svc->prtcvers) in match_service_id() 39 if (id->match_flags & TBSVC_MATCH_PROTOCOL_VERSION) { in match_service_id() 40 if (id->protocol_revision != svc->prtcrevs) in match_service_id() 59 if (!driver->id_table) in __tb_service_match() [all …]
|
/openbmc/qemu/docs/system/s390x/ |
H A D | vfio-ap.rst | 7 ------------ 19 ------------------------- 34 * AP domain 36 An adapter is partitioned into domains. Each domain can be thought of as 38 hold up to 256 domains; however, the maximum domain number allowed is 39 determined by machine model. Each domain is identified by a number from 0 to 46 commands sent to a usage domain to control or change the domain; for 47 example, to set a secure private key for the domain. 51 An AP queue is the means by which an AP command-request message is sent to an 52 AP usage domain inside a specific AP. An AP queue is identified by a tuple [all …]
|