Home
last modified time | relevance | path

Searched full:trustzone (Results 1 – 25 of 47) sorted by relevance

12

/linux/drivers/firmware/qcom/
H A DKconfig18 prompt "TrustZone interface memory allocator mode"
23 suitable format for sharing with the TrustZone. If in doubt, select
39 With this selected, all buffers passed to the TrustZone must be allocated
40 using the TZMem allocator or else the TrustZone will refuse to use them.
H A Dqcom_tzmem.c3 * Memory allocator for buffers shared with the TrustZone.
194 * Create a new pool of memory suitable for sharing with the TrustZone.
479 MODULE_DESCRIPTION("TrustZone memory allocator for Qualcomm firmware drivers");
/linux/Documentation/devicetree/bindings/rng/
H A Darm-cctrng.yaml7 title: Arm TrustZone CryptoCell TRNG engine
13 Arm TrustZone CryptoCell TRNG (True Random Number Generator) engine.
29 Arm TrustZone CryptoCell TRNG engine has 4 ring oscillators.
/linux/arch/arm/mach-mediatek/
H A Dplatsmp.c77 static void __init __mtk_smp_prepare_cpus(unsigned int max_cpus, int trustzone) in __mtk_smp_prepare_cpus() argument
82 if (trustzone) { in __mtk_smp_prepare_cpus()
103 if (trustzone) { in __mtk_smp_prepare_cpus()
104 /* smp_base(trustzone-bootinfo) is reserved by device tree */ in __mtk_smp_prepare_cpus()
/linux/Documentation/devicetree/bindings/arm/
H A Dsecure.txt3 ARM CPUs with TrustZone support have two distinct address spaces,
5 kernel) are not TrustZone aware and run entirely in either the Normal
7 TrustZone aware and need to be able to determine whether devices are
H A Darm,realview.yaml15 earlier CPUs such as TrustZone and multicore (MPCore).
28 (HBI-0147) was created as a development board to test ARM TrustZone,
/linux/Documentation/devicetree/bindings/bus/
H A Dst,stm32-etzpc.yaml7 title: STM32 Extended TrustZone protection controller
10 The ETZPC configures TrustZone security in a SoC having bus masters and
/linux/Documentation/devicetree/bindings/gpio/
H A Dgpio-vf610.yaml41 - description: GPIO Trustzone non-secure interrupt number
42 - description: GPIO Trustzone secure interrupt number
/linux/arch/arm/boot/dts/mediatek/
H A Dmt8127.dtsi50 trustzone-bootinfo@80002000 {
51 compatible = "mediatek,trustzone-bootinfo";
H A Dmt8135.dtsi75 trustzone-bootinfo@80002000 {
76 compatible = "mediatek,trustzone-bootinfo";
/linux/arch/arm/boot/dts/st/
H A Dste-db9500.dtsi24 * to actually call into trustzone to run secure
H A Dste-db8500.dtsi42 * to actually call into trustzone to run secure
H A Dste-db8520.dtsi42 * to actually call into trustzone to run secure
/linux/Documentation/tee/
H A Dtee.rst13 TrustZone on ARM CPUs, or a separate secure co-processor etc. A TEE driver
H A Dop-tee.rst8 TrustZone based OP-TEE solution that is supported.
22 to tell, for instance, a TrustZone OP-TEE apart from an OP-TEE running on a
/linux/arch/arm/common/
H A Dsecure_cntvoff.S16 * mode or secure Monitor mode with SCR.NS==1. If TrustZone is enabled
/linux/Documentation/devicetree/bindings/crypto/
H A Darm,cryptocell.yaml7 title: Arm TrustZone CryptoCell cryptographic engine
/linux/Documentation/devicetree/bindings/media/
H A Dqcom,venus-common.yaml56 have TrustZone.
/linux/Documentation/security/tpm/
H A Dtpm_ftpm_tee.rst11 This driver is a shim for firmware implemented in ARM's TrustZone
/linux/Documentation/devicetree/bindings/soc/mediatek/
H A Ddevapc.yaml11 MediaTek bus fabric provides TrustZone security support and data
/linux/Documentation/devicetree/bindings/tpm/
H A Dmicrosoft,ftpm.yaml20 Microsoft's firmware-based TPM 2.0 (fTPM) leverages ARM TrustZone to overcome
/linux/Documentation/devicetree/bindings/arm/firmware/
H A Dlinaro,optee-tz.yaml14 Execution Environment. The security can be provided with ARM TrustZone, but
/linux/Documentation/devicetree/bindings/mtd/
H A Dnand-chip.yaml66 like Trustzone. This property contains the start address and size of
/linux/Documentation/arch/arm/
H A Dfirmware.rst7 Some boards are running with secure firmware running in TrustZone secure
/linux/drivers/soc/qcom/
H A Dice.c133 * usable by Linux, the TrustZone software also needs to support certain in qcom_ice_check_supported()
251 * slave. Without this, TrustZone cannot program keys into ICE. in qcom_ice_hwkm_init()
327 /* Call into TrustZone to program the wrapped key using HWKM. */ in qcom_ice_program_wrapped_key()

12