/openbmc/linux/drivers/misc/ |
H A D | sram-exec.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * SRAM protect-exec region helper functions 5 * Copyright (C) 2017 Texas Instruments Incorporated - https://www.ti.com/ 25 unsigned long base = (unsigned long)part->base; in sram_check_protect_exec() 26 unsigned long end = base + block->size; in sram_check_protect_exec() 29 dev_err(sram->dev, in sram_check_protect_exec() 30 "SRAM pool marked with 'protect-exec' is not page aligned and will not be created.\n"); in sram_check_protect_exec() 31 return -ENOMEM; in sram_check_protect_exec() 40 list_add_tail(&part->list, &exec_pool_list); in sram_add_protect_exec() 47 * sram_exec_copy - copy data to a protected executable region of sram [all …]
|
/openbmc/linux/tools/testing/selftests/powerpc/mm/ |
H A D | pkey_siginfo.c | 1 // SPDX-License-Identifier: GPL-2.0 44 if (sinfo->si_code != SEGV_PKUERR) { in segv_handler() 50 if (sinfo->si_addr != (void *) fault_addr) { in segv_handler() 68 pgstart = (void *) ((unsigned long) fault_addr & ~(pgsize - 1)); in segv_handler() 72 * reassociate the page with the exec-only pkey since execute in segv_handler() 77 * read-write rights, change the AMR permission bits for the in segv_handler() 97 static void *protect(void *p) in protect() function 105 base = ((struct region *) p)->base; in protect() 106 size = ((struct region *) p)->size; in protect() 119 * Repeatedly try to protect the common region with a permissive in protect() [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/arm/omap/ |
H A D | mpu.txt | 1 * TI - MPU (Main Processor Unit) subsystem 8 - compatible : Should be "ti,omap3-mpu" for OMAP3 9 Should be "ti,omap4-mpu" for OMAP4 10 Should be "ti,omap5-mpu" for OMAP5 11 - ti,hwmods: "mpu" 14 - sram: Phandle to the ocmcram node 17 - pm-sram: Phandles to ocmcram nodes to be used for power management. 18 First should be type 'protect-exec' for the driver to use to copy 25 - For an OMAP5 SMP system: 28 compatible = "ti,omap5-mpu"; [all …]
|
/openbmc/u-boot/doc/ |
H A D | README.mpc83xxads | 2 ----------------------------------------- 7 $ CROSS_COMPILE=powerpc-linux- 10 $ powerpc-linux-gcc -v 11 Reading specs from /usr/powerpc/lib/gcc/powerpc-linux/3.4.3/specs 12 Configured with: ../configure --prefix=/usr/powerpc 13 --exec-prefix=/usr/powerpc --target=powerpc-linux --enable-shared 14 --disable-nls --disable-multilib --enable-languages=c,c++,ada,f77,objc 18 $ powerpc-linux-as -v 19 GNU assembler version 2.15 (powerpc-linux) using BFD version 2.15 53 CONFIG_TSEC_ENET Use on-chip 10/100/1000 ethernet [all …]
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/ |
H A D | config | 3 # Q: Should Bastille disable clear-text r-protocols that use IP-based authentication? [Y] 5 # Q: Should we disallow root login on tty's 1-6? [N] 13 # Q: Would you like to password protect single-user mode? [Y] 39 # Q: ICMP allowed types: [destination-unreachable echo-reply time-exceeded] 40 Firewall.ip_s_icmpallowed="destination-unreachable echo-reply time-exceeded" 43 # Q: ICMP types to disallow outbound: [destination-unreachable time-exceeded] 44 Firewall.ip_s_icmpout="destination-unreachable time-exceeded" 69 # Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh] 70 Firewall.ip_s_tcpaudit="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh" 93 # Q: Would you like to display "Authorized Use" messages at log-in time? [Y] [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 203 | 24 # BDRV_POLL_WHILE(). Protect against regressions even though the AioContext 37 iotests.qemu_img_create('-f', iotests.imgfmt, disk0_img_path, img_size) 38 iotests.qemu_img_create('-f', iotests.imgfmt, disk1_img_path, img_size) 42 .add_drive(disk0_img_path, 'node-name=drive0-node', interface='none') 43 .add_drive(disk1_img_path, 'node-name=drive1-node', interface='none') 47 iotests.log(vm.qmp('x-blockdev-set-iothread', 48 node_name='drive0-node', iothread='iothread0', 50 iotests.log(vm.qmp('x-blockdev-set-iothread', 51 node_name='drive1-node', iothread='iothread0', 55 iotests.log(vm.qmp('migrate-set-capabilities', capabilities=[ [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/memory-controllers/ti/ |
H A D | emif.txt | 3 EMIF - External Memory Interface - is an SDRAM controller used in 11 - compatible : Should be of the form "ti,emif-<ip-rev>" where <ip-rev> 14 "ti,emif-am3352" 15 "ti,emif-am4372" 16 "ti,emif-dra7xx" 17 "ti,emif-keystone" 19 - phy-type : <u32> indicating the DDR phy type. Following are the 24 - device-handle : phandle to a "lpddr2" node representing the memory part 26 - ti,hwmods : For TI hwmods processing and omap device creation 29 - interrupts : interrupt used by the controller [all …]
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | shstk.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 Control-flow Enforcement Technology (CET) Shadow Stack 10 Control-flow Enforcement Technology (CET) covers several related x86 processor 12 can protect both applications and the kernel. 20 control-protection fault. IBT verifies indirect CALL/JMP targets are intended 22 Stack and Indirect Branch Tracking. Today in the 64-bit kernel, only userspace 45 from readelf/llvm-readelf output:: 47 readelf -n <application> | grep -a SHSTK 60 on a per-thread basis. The enablement status is inherited on clone, so if the 90 -EPERM if any of the passed feature are locked. [all …]
|
/openbmc/qemu/hw/ppc/ |
H A D | prep_systemio.c | 29 #include "hw/qdev-properties.h" 31 #include "exec/address-spaces.h" 33 #include "qemu/error-report.h" /* for error_report() */ 39 #define TYPE_PREP_SYSTEMIO "prep-systemio" 43 #define PREP_BIT(n) (1 << (7 - (n))) 59 /* PORT 0092 -- Special Port 92 (Read/Write) */ 72 s->sreset = val & PORT0092_SOFTRESET; in prep_port0092_write() 73 qemu_set_irq(s->softreset_irq, s->sreset); in prep_port0092_write() 77 error_report("little-endian mode not supported"); in prep_port0092_write() 87 trace_prep_systemio_read(addr, s->sreset); in prep_port0092_read() [all …]
|
/openbmc/linux/drivers/gpu/drm/amd/amdgpu/ |
H A D | amdgpu_gem.c | 32 #include <linux/dma-buf.h> 50 struct ttm_buffer_object *bo = vmf->vma->vm_private_data; in amdgpu_gem_fault() 51 struct drm_device *ddev = bo->base.dev; in amdgpu_gem_fault() 66 ret = ttm_bo_vm_fault_reserved(vmf, vmf->vma->vm_page_prot, in amdgpu_gem_fault() 71 ret = ttm_bo_vm_dummy_page(vmf, vmf->vma->vm_page_prot); in amdgpu_gem_fault() 73 if (ret == VM_FAULT_RETRY && !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) in amdgpu_gem_fault() 77 dma_resv_unlock(bo->base.resv); in amdgpu_gem_fault() 126 bo = &ubo->bo; in amdgpu_gem_object_create() 127 *obj = &bo->tbo.base; in amdgpu_gem_object_create() 128 (*obj)->funcs = &amdgpu_gem_object_funcs; in amdgpu_gem_object_create() [all …]
|
H A D | amdgpu_amdkfd_gpuvm.c | 1 // SPDX-License-Identifier: MIT 3 * Copyright 2014-2018 Advanced Micro Devices, Inc. 23 #include <linux/dma-buf.h> 72 #define domain_string(domain) domain_bit_to_string[ffs(domain)-1] 81 list_for_each_entry(entry, &mem->attachments, list) in kfd_mem_is_attached() 82 if (entry->bo_va->base.vm == avm) in kfd_mem_is_attached() 89 * reuse_dmamap() - Check whether adev can share the original 103 return (adev->ram_is_direct_mapped && bo_adev->ram_is_direct_mapped) || in reuse_dmamap() 104 (adev->dev->iommu_group == bo_adev->dev->iommu_group); in reuse_dmamap() 108 * System (TTM + userptr) memory - 15/16th System RAM [all …]
|
/openbmc/qemu/include/sysemu/ |
H A D | replay.h | 4 * Copyright (c) 2010-2015 Institute for System Programming 8 * See the COPYING file in the top-level directory. 18 #include "exec/replay-core.h" 19 #include "qapi/qapi-types-misc.h" 20 #include "qapi/qapi-types-run-state.h" 21 #include "qapi/qapi-types-ui.h" 56 * The locks are needed to protect the shared structures and log file 57 * when doing record/replay. They also are the main sync-point between 58 * the main-loop thread and the vCPU thread. This was a role
|
/openbmc/qemu/target/microblaze/ |
H A D | cpu.c | 5 * Copyright (c) 2009-2012 PetaLogix Qld Pty Ltd. 21 * <http://www.gnu.org/licenses/lgpl-2.1.html> 29 #include "hw/qdev-properties.h" 30 #include "exec/exec-all.h" 31 #include "exec/cpu_ldst.h" 32 #include "exec/gdbstub.h" 33 #include "fpu/softfloat-helpers.h" 85 cpu->env.pc = value; in mb_cpu_set_pc() 87 cpu->env.iflags = 0; in mb_cpu_set_pc() 94 return cpu->env.pc; in mb_cpu_get_pc() [all …]
|
/openbmc/qemu/include/exec/ |
H A D | cpu_ldst.h | 2 * Software MMU support (per-target) 69 #include "exec/memopidx.h" 70 #include "exec/abi_ptr.h" 71 #include "exec/mmu-access-type.h" 76 #include "user/guest-base.h" 103 return len - 1 <= GUEST_ADDR_MAX && start <= GUEST_ADDR_MAX - len + 1; in guest_range_valid_untagged() 108 (uintptr_t)(x) - guest_base <= GUEST_ADDR_MAX) 111 uintptr_t __ret = (uintptr_t)(x) - guest_base; \ 383 * For user-only, helpers that use guest to host address translation 384 * must protect the actual host memory access by recording 'retaddr'
|
/openbmc/qemu/accel/hvf/ |
H A D | hvf-accel-ops.c | 51 #include "qemu/error-report.h" 52 #include "qemu/main-loop.h" 53 #include "exec/address-spaces.h" 54 #include "exec/exec-all.h" 61 #include "qemu/guest-random.h" 71 for (x = 0; x < hvf_state->num_slots; ++x) { in hvf_find_overlap_slot() 72 slot = &hvf_state->slots[x]; in hvf_find_overlap_slot() 73 if (slot->size && start < (slot->start + slot->size) && in hvf_find_overlap_slot() 74 (start + size) > slot->start) { in hvf_find_overlap_slot() 95 macslot = &mac_slots[slot->slot_id]; in do_hvf_set_memory() [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/sram/ |
H A D | sram.yaml | 1 # SPDX-License-Identifier: GPL-2.0 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Generic on-chip SRAM 10 - Rob Herring <robh@kernel.org> 19 Following the generic-names recommended practice, node names should 30 - mmio-sram 31 - amlogic,meson-gxbb-sram 32 - arm,juno-sram-ns 33 - atmel,sama5d2-securam [all …]
|
/openbmc/linux/include/uapi/linux/ |
H A D | taskstats.h | 1 /* SPDX-License-Identifier: LGPL-2.1 WITH Linux-syscall-note */ 2 /* taskstats.h - exporting per-task statistics 22 /* Format for per-task data returned to userland when 23 * - a task exits 24 * - listener requests stats for a task 33 * c) add new fields after version comment; maintain 64-bit alignment 76 /* Following four fields atomically updated using task->delays->lock */ 88 /* cpu "wall-clock" running time 127 /* Accumulated RSS usage in duration of a task, in MBytes-usecs. 133 __u64 coremem; /* accumulated RSS usage in MB-usec */ [all …]
|
/openbmc/linux/fs/ |
H A D | exec.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * linux/fs/exec.c 9 * #!-checking implemented by tytso. 12 * Demand-loading implemented 01.12.91 - no need to read anything but 14 * "current->executable", and page faults do the actual loading. Clean. 17 * was less than 2 hours work to get demand-loading completely implemented. 20 * current->executable is only used by the procfs. This allows a dispatch 89 insert ? list_add(&fmt->lh, &formats) : in __register_binfmt() 90 list_add_tail(&fmt->lh, &formats); in __register_binfmt() 99 list_del(&fmt->lh); in unregister_binfmt() [all …]
|
/openbmc/qemu/system/ |
H A D | dirtylimit.c | 10 * See the COPYING file in the top-level directory. 14 #include "qemu/main-loop.h" 15 #include "qapi/qapi-commands-migration.h" 22 #include "exec/memory.h" 23 #include "exec/target_page.h" 71 /* protect dirtylimit_state */ 95 vcpu_dirty_rate_stat->stat.rates[i].id = i; in vcpu_dirty_rate_stat_collect() 96 vcpu_dirty_rate_stat->stat.rates[i].dirty_rate = in vcpu_dirty_rate_stat_collect() 110 while (qatomic_read(&vcpu_dirty_rate_stat->running)) { in vcpu_dirty_rate_stat_thread() 126 DirtyRateVcpu *rates = vcpu_dirty_rate_stat->stat.rates; in vcpu_dirty_rate_get() [all …]
|
/openbmc/linux/Documentation/driver-api/ |
H A D | dma-buf.rst | 1 Buffer Sharing and Synchronization (dma-buf) 4 The dma-buf subsystem provides the framework for sharing buffers for 8 This is used, for example, by drm "prime" multi-GPU support, but is of 11 The three main components of this are: (1) dma-buf, representing a 18 ------------------ 20 This document serves as a guide to device-driver writers on what is the dma-buf 27 exporter, and A as buffer-user/importer. 31 - implements and manages operations in :c:type:`struct dma_buf_ops 33 - allows other users to share the buffer by using dma_buf sharing APIs, 34 - manages the details of buffer allocation, wrapped in a :c:type:`struct [all …]
|
/openbmc/qemu/migration/ |
H A D | dirtyrate.c | 10 * See the COPYING file in the top-level directory. 14 #include "qemu/error-report.h" 17 #include "exec/ramblock.h" 18 #include "exec/target_page.h" 20 #include "qemu/main-loop.h" 21 #include "qapi/qapi-commands-migration.h" 30 #include "exec/memory.h" 56 if ((current_time - initial_time) >= msec) { in dirty_stat_wait() 57 msec = current_time - initial_time; in dirty_stat_wait() 59 g_usleep((msec + initial_time - current_time) * 1000); in dirty_stat_wait() [all …]
|
/openbmc/linux/Documentation/filesystems/ |
H A D | affs.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 in file names are case-insensitive, as they ought to be. 44 protect 107 Amiga -> Linux: 111 - R maps to r for user, group and others. On directories, R implies x. 113 - W maps to w. 115 - E maps to x. 117 - D is ignored. 119 - H, S and P are always retained and ignored under Linux. 121 - A is cleared when a file is written to. [all …]
|
/openbmc/qemu/accel/tcg/ |
H A D | tb-maint.c | 21 #include "qemu/interval-tree.h" 23 #include "exec/cputlb.h" 24 #include "exec/log.h" 25 #include "exec/exec-all.h" 26 #include "exec/page-protection.h" 27 #include "exec/tb-flush.h" 28 #include "exec/translate-all.h" 31 #include "tb-hash.h" 32 #include "tb-context.h" 33 #include "internal-common.h" [all …]
|
H A D | user-exec.c | 4 * Copyright (c) 2003-2005 Fabrice Bellard 20 #include "hw/core/tcg-cpu-ops.h" 22 #include "exec/exec-all.h" 26 #include "exec/cpu_ldst.h" 27 #include "qemu/main-loop.h" 28 #include "exec/translate-all.h" 29 #include "exec/page-protection.h" 30 #include "exec/helper-proto.h" 33 #include "tcg/tcg-ldst.h" 34 #include "internal-common.h" [all …]
|
/openbmc/linux/include/linux/ |
H A D | fsnotify_backend.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 43 #define FS_OPEN_EXEC 0x00001000 /* File was opened for exec */ 57 #define FS_OPEN_EXEC_PERM 0x00040000 /* open/exec event in a permission hook */ 73 * Directory entry modification events - reported only to directory 125 * handle_event - main call for a group to handle an fs event 130 * @dir: optional directory associated with event - 137 * handle_inode_event - simple variant of handle_event() for groups that only 142 * @dir: optional directory associated with event - 145 * Either @inode or @dir must be non-NULL. 149 * free_group_priv - called when a group refcnt hits 0 to clean up the private union [all …]
|