Home
last modified time | relevance | path

Searched +full:non +full:- +full:secure +full:- +full:domain (Results 1 – 25 of 165) sorted by relevance

1234567

/openbmc/linux/Documentation/devicetree/bindings/misc/
H A Dqcom,fastrpc.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Srinivas Kandagatla <srinivas.kandagatla@linaro.org>
13 The FastRPC implements an IPC (Inter-Processor Communication)
25 - adsp
26 - mdsp
27 - sdsp
28 - cdsp
30 memory-region:
[all …]
/openbmc/u-boot/arch/arm/include/asm/arch-imx8/sci/svc/rm/
H A Dapi.h1 /* SPDX-License-Identifier: GPL-2.0+ */
26 #define SC_RM_SPA_ASSERT 2U /* Assert (force to be secure/privileged) */
27 #define SC_RM_SPA_NEGATE 3U /* Negate (force to be non-secure/user) */
31 #define SC_RM_PERM_SEC_R 1U /* Secure RO */
32 #define SC_RM_PERM_SECPRIV_RW 2U /* Secure privilege R/W */
33 #define SC_RM_PERM_SEC_RW 3U /* Secure R/W */
34 #define SC_RM_PERM_NSPRIV_R 4U /* Secure R/W, non-secure privilege RO */
35 #define SC_RM_PERM_NS_R 5U /* Secure R/W, non-secure RO */
36 #define SC_RM_PERM_NSPRIV_RW 6U /* Secure R/W, non-secure privilege R/W */
52 * This type is used to declare a resource domain ID used by the
/openbmc/linux/drivers/iommu/
H A Dipmmu-vmsa.c1 // SPDX-License-Identifier: GPL-2.0
3 * IOMMU API for Renesas VMSA-compatible IPMMU
6 * Copyright (C) 2014-2020 Renesas Electronics Corporation
11 #include <linux/dma-mapping.h>
18 #include <linux/io-pgtable.h>
29 #include <asm/dma-iommu.h>
32 #define arm_iommu_attach_device(...) -ENODEV
37 #define IPMMU_CTX_INVALID -1
94 /* -----------------------------------------------------------------------------
101 #define IMCTR 0x0000 /* R-Car Gen2/3 */
[all …]
/openbmc/linux/Documentation/trace/coresight/
H A Dcoresight-cpu-debug.rst9 ------------
11 Coresight CPU debug module is defined in ARMv8-a architecture reference manual
13 debug module and it is mainly used for two modes: self-hosted debug and
16 explore debugging method which rely on self-hosted debug mode, this document
19 The debug module provides sample-based profiling extension, which can be used
20 to sample CPU program counter, secure state and exception level, etc; usually
21 every CPU has one dedicated debug module to be connected. Based on self-hosted
29 --------------
31 - During driver registration, it uses EDDEVID and EDDEVID1 - two device ID
32 registers to decide if sample-based profiling is implemented or not. On some
[all …]
/openbmc/linux/Documentation/devicetree/bindings/mailbox/
H A Darm,mhu.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Jassi Brar <jaswinder.singh@linaro.org>
13 The ARM's Message-Handling-Unit (MHU) is a mailbox controller that has 3
19 be a 'Secure' resource, hence can't be used by Linux running NS.
22 interrupt signal using a 32-bit register, with all 32-bits logically ORed
28 interrupt. Each of the 32-bits can be used as "doorbell" to alert the remote
37 - arm,mhu
38 - arm,mhu-doorbell
[all …]
/openbmc/linux/drivers/s390/crypto/
H A Dzcrypt_ccamisc.h1 /* SPDX-License-Identifier: GPL-2.0+ */
17 #define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */
41 /* inside view of a CCA secure key token (only type 0x01 version 0x04) */
81 /* AES-128 512 640 */
82 /* AES-192 576 640 */
83 /* AES-256 640 640 */
97 /* inside view of an CCA secure ECC private key */
107 u8 htype; /* hash method, 0x02 for SHA-256 */
133 * Simple check if the token is a valid CCA secure AES data key
141 * Simple check if the token is a valid CCA secure AES cipher key
[all …]
H A Dpkey_api.c1 // SPDX-License-Identifier: GPL-2.0
168 return -EINVAL; in pkey_clr2protkey()
174 return -EINVAL; in pkey_clr2protkey()
181 return -ENODEV; in pkey_clr2protkey()
186 return -ENODEV; in pkey_clr2protkey()
205 * Find card and transform secure key into protected key.
211 u16 cardnr, domain; in pkey_skey2pkey() local
224 rc = cca_findcard(key, &cardnr, &domain, verify); in pkey_skey2pkey()
229 switch (hdr->version) { in pkey_skey2pkey()
231 rc = cca_sec2protkey(cardnr, domain, key, in pkey_skey2pkey()
[all …]
/openbmc/linux/drivers/irqchip/
H A Dirq-gic-v3.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2013-2017 ARM Limited, All Rights Reserved.
24 #include <linux/irqchip/arm-gic-common.h>
25 #include <linux/irqchip/arm-gic-v3.h>
26 #include <linux/irqchip/irq-partition-percpu.h>
29 #include <linux/arm-smccc.h>
36 #include "irq-gic-common.h"
59 struct irq_domain *domain; member
83 * SCR_EL3.FIQ, and the behaviour of non-secure priority registers of the
87 * When security is enabled, non-secure priority values from the (re)distributor
[all …]
/openbmc/linux/Documentation/devicetree/bindings/clock/
H A Dfujitsu,mb86s70-crg11.txt2 -----------------------------------
5 - compatible : Shall contain "fujitsu,mb86s70-crg11"
6 - #clock-cells : Shall be 3 {cntrlr domain port}
13 compatible = "fujitsu,mb86s70-crg11";
14 #clock-cells = <3>;
18 #mbox-cells = <1>;
21 interrupts = <0 36 4>, /* LP Non-Sec */
22 <0 35 4>, /* HP Non-Sec */
23 <0 37 4>; /* Secure */
24 clocks = <&clock 0 2 1>; /* Cntrlr:0 Domain:2 Port:1 */
[all …]
/openbmc/qemu/target/arm/
H A Dptw.c6 * SPDX-License-Identifier: GPL-2.0-or-later
12 #include "qemu/main-loop.h"
13 #include "exec/exec-all.h"
14 #include "exec/page-protection.h"
17 #include "cpu-features.h"
20 # include "tcg/oversized-guest.h"
33 * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit,
40 * If a Secure ptw is "downgraded" to NonSecure by an NSTable bit,
46 * - if the in_ptw_idx is an ARMMMUIdx_Phys_* then the mmuidx
48 * - if the in_ptw_idx is an ARMMMUIdx_Stage2* then the security
[all …]
/openbmc/linux/drivers/rtc/
H A Drtc-mxc_v2.c1 // SPDX-License-Identifier: GPL-2.0
4 * Copyright (c) 2004-2011 Freescale Semiconductor, Inc.
21 #define SRTC_LPCR_NSA BIT(11) /* lp non secure access */
22 #define SRTC_LPCR_NVE BIT(14) /* lp non valid state exit bit */
26 #define SRTC_LPSR_NVES BIT(14) /* lp non-valid state exit status */
29 #define SRTC_LPSCMR 0x00 /* LP Secure Counter MSB Reg */
30 #define SRTC_LPSCLR 0x04 /* LP Secure Counter LSB Reg */
31 #define SRTC_LPSAR 0x08 /* LP Secure Alarm Reg */
49 * To take care of the asynchronous CKIL clock, all writes from the IP domain
50 * will be synchronized to the CKIL domain.
[all …]
/openbmc/linux/arch/arm/mach-omap2/
H A Domap-wakeupgen.c1 // SPDX-License-Identifier: GPL-2.0-only
9 * implemented in MPU always ON power domain. During normal operation,
28 #include "omap-wakeupgen.h"
29 #include "omap-secure.h"
32 #include "omap4-sar-layout.h"
138 _wakeupgen_clear(d->hwirq, irq_target_cpu[d->hwirq]); in wakeupgen_mask()
151 _wakeupgen_set(d->hwirq, irq_target_cpu[d->hwirq]); in wakeupgen_unmask()
179 if (inverted && d->hwirq != SYS_NIRQ1_EXT_SYS_IRQ_1 && in wakeupgen_irq_set_type()
180 d->hwirq != SYS_NIRQ2_EXT_SYS_IRQ_2) in wakeupgen_irq_set_type()
182 d->hwirq); in wakeupgen_irq_set_type()
[all …]
/openbmc/linux/Documentation/devicetree/bindings/timer/
H A Darm,arch_timer.yaml1 # SPDX-License-Identifier: GPL-2.0
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Marc Zyngier <marc.zyngier@arm.com>
11 - Mark Rutland <mark.rutland@arm.com>
13 ARM cores may have a per-core architected timer, which provides per-cpu timers,
17 The per-core architected timer is attached to a GIC to deliver its
18 per-processor interrupts via PPIs. The memory mapped timer is attached to a GIC
24 - items:
25 - const: arm,cortex-a15-timer
[all …]
/openbmc/linux/arch/arm/mach-ux500/
H A Dcpu-db8500.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (C) 2008-2009 ST-Ericsson SA
14 #include <linux/irqchip/arm-gic.h>
15 #include <linux/mfd/dbx500-prcmu.h>
16 #include <linux/platform_data/arm-ux500-pm.h>
25 #include <asm/hardware/cache-l2x0.h>
35 np = of_find_compatible_node(NULL, NULL, "arm,pl310-cache"); in ux500_l2x0_unlock()
39 return -ENODEV; in ux500_l2x0_unlock()
42 * Unlock Data and Instruction Lock if locked. Ux500 U-Boot versions in ux500_l2x0_unlock()
61 * We can't write to secure registers as we are in non-secure in ux500_l2c310_write_sec()
[all …]
/openbmc/linux/Documentation/arch/s390/
H A Dvfio-ap.rst13 The AP adapter cards are exposed via the AP bus. The motivation for vfio-ap
45 sub-directory::
50 * AP domain
53 depending upon the adapter type and hardware configuration. A domain is
54 identified by a number from 0 to 255; however, the maximum domain number is
55 determined by machine model and/or adapter type.. A domain can be thought of
57 domain can be configured with a secure private key used for clear key
58 encryption. A domain is classified in one of two ways depending upon how it
65 usage domain; for example, to set the secure private key for the control
66 domain.
[all …]
/openbmc/linux/Documentation/admin-guide/
H A Dthunderbolt.rst1 .. SPDX-License-Identifier: GPL-2.0
25 -----------------------------------
27 should be a userspace tool that handles all the low-level details, keeps
31 found in ``Documentation/ABI/testing/sysfs-bus-thunderbolt``.
35 ``/etc/udev/rules.d/99-local.rules``::
66 secure
68 addition to UUID the device (if it supports secure connect) is sent
89 the Thunderbolt domain the host controller manages. There is typically
90 one domain per Thunderbolt host controller.
92 If the security level reads as ``user`` or ``secure`` the connected
[all …]
/openbmc/qemu/include/hw/xen/interface/io/
H A Dblkif.h1 /* SPDX-License-Identifier: MIT */
5 * Unified block-device I/O interface for Xen guest OSes.
7 * Copyright (c) 2003-2004, Keir Fraser
18 * Front->back notifications: When enqueuing a new request, sending a
20 * hold-off mechanism provided by the ring macros). Backends must set
23 * Back->front notifications: When enqueuing a new response, sending a
25 * hold-off mechanism provided by the ring macros). Frontends must set
63 *------------------ Backend Device Identification (PRIVATE) ------------------
78 * physical-device
85 * physical-device-path
[all …]
/openbmc/linux/Documentation/process/
H A Dembargoed-hardware-issues.rst7 -----
23 -------
31 Linux kernel security team (:ref:`Documentation/admin-guide/
34 The team can be contacted by email at <hardware-security@kernel.org>. This
43 - PGP: https://www.kernel.org/static/files/hardware-security.asc
44 - S/MIME: https://www.kernel.org/static/files/hardware-security.crt
55 - Linus Torvalds (Linux Foundation Fellow)
56 - Greg Kroah-Hartman (Linux Foundation Fellow)
57 - Thomas Gleixner (Linux Foundation Fellow)
59 Operation of mailing-lists
[all …]
/openbmc/u-boot/arch/arm/mach-stm32mp/
H A Dcpu.c1 // SPDX-License-Identifier: GPL-2.0+ OR BSD-3-Clause
3 * Copyright (C) 2018, STMicroelectronics - All Rights Reserved
48 * - boot instance = bit 31:16
49 * - boot device = bit 15:0
64 /* Disable the backup domain write protection */ in security_init()
73 * to reset the backup domain in security_init()
82 /* allow non secure access in Write/Read for all peripheral */ in security_init()
85 /* Open SYSRAM for no secure access */ in security_init()
98 /* bit 30 / 31 => Secure Global Enable : write/read */ in security_init()
113 * Bit 16 ITAMP1E: RTC power domain supply monitoring in security_init()
[all …]
/openbmc/linux/include/xen/interface/io/
H A Dblkif.h1 /* SPDX-License-Identifier: MIT */
5 * Unified block-device I/O interface for Xen guest OSes.
7 * Copyright (c) 2003-2004, Keir Fraser
17 * Front->back notifications: When enqueuing a new request, sending a
19 * hold-off mechanism provided by the ring macros). Backends must set
22 * Back->front notifications: When enqueuing a new response, sending a
24 * hold-off mechanism provided by the ring macros). Frontends must set
33 * If supported, the backend will write the key "multi-queue-max-queues" to
37 * key "multi-queue-num-queues" with the number they wish to use, which must be
39 * "multi-queue-max-queues".
[all …]
/openbmc/openbmc-tools/openbmctool/
H A DREADME.md12 - `-H`: The hostname or IP for the BMC
13 - `-U`: The username One of the password options:
14 - `-P`: The password, provided in-line
15 - `-A`: Prompt for a password
16 - `-E`: Take the password from envvar `OPENBMCTOOL_PASSWORD`
21 re-enabled with the `local_users` sub-command.
39 To re-enable all local user accounts:
54 - <https://www.rsyslog.com/storing-and-forwarding-remote-messages/>
55 - <https://www.rsyslog.com/doc/rsyslog%255Fconf%255Ffilter.html>
56 - <https://www.thegeekdiary.com/understanding-rsyslog-filter-options/>
[all …]
/openbmc/linux/arch/arm/mach-exynos/
H A Dsuspend.c1 // SPDX-License-Identifier: GPL-2.0
3 // Copyright (c) 2011-2014 Samsung Electronics Co., Ltd.
6 // Exynos - Suspend support
8 // Based on arch/arm/mach-s3c2410/pm.c
23 #include <linux/soc/samsung/exynos-pmu.h>
24 #include <linux/soc/samsung/exynos-regs-pmu.h>
27 #include <asm/hardware/cache-l2x0.h>
36 #define REG_TABLE_END (-1U)
41 * struct exynos_wkup_irq - PMU IRQ to mask mapping
43 * @mask: Mask in PMU wake-up mask register
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/files/corstone1000/
H A D0005-feat-corstone1000-Add-multicore-support-for-FVP-plat.patch6 This changeset adds the multicore support for the Corstone-1000 FVP.
7 It adds the PSCI CPU_ON and CPU_ON_FINISH power domain functionalities
10 Upstream-Status: Backport [https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/29176]
11 Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
12 ---
14 .../corstone1000/common/corstone1000_pm.c | 43 ++++++++++++++++++-
15 .../common/include/platform_def.h | 15 ++++++-
17 4 files changed, 89 insertions(+), 2 deletions(-)
19 diff --git a/plat/arm/board/corstone1000/common/corstone1000_helpers.S b/plat/arm/board/corstone100…
21 --- a/plat/arm/board/corstone1000/common/corstone1000_helpers.S
[all …]
/openbmc/linux/drivers/thunderbolt/
H A Ddomain.c1 // SPDX-License-Identifier: GPL-2.0
24 if (id->match_flags & TBSVC_MATCH_PROTOCOL_KEY) { in match_service_id()
25 if (strcmp(id->protocol_key, svc->key)) in match_service_id()
29 if (id->match_flags & TBSVC_MATCH_PROTOCOL_ID) { in match_service_id()
30 if (id->protocol_id != svc->prtcid) in match_service_id()
34 if (id->match_flags & TBSVC_MATCH_PROTOCOL_VERSION) { in match_service_id()
35 if (id->protocol_version != svc->prtcvers) in match_service_id()
39 if (id->match_flags & TBSVC_MATCH_PROTOCOL_VERSION) { in match_service_id()
40 if (id->protocol_revision != svc->prtcrevs) in match_service_id()
59 if (!driver->id_table) in __tb_service_match()
[all …]
/openbmc/qemu/docs/system/s390x/
H A Dvfio-ap.rst7 ------------
19 -------------------------
34 * AP domain
36 An adapter is partitioned into domains. Each domain can be thought of as
38 hold up to 256 domains; however, the maximum domain number allowed is
39 determined by machine model. Each domain is identified by a number from 0 to
46 commands sent to a usage domain to control or change the domain; for
47 example, to set a secure private key for the domain.
51 An AP queue is the means by which an AP command-request message is sent to an
52 AP usage domain inside a specific AP. An AP queue is identified by a tuple
[all …]

1234567