/linux/drivers/soc/qcom/ |
H A D | Kconfig | 26 resource on a RPM-hardened platform must use this database to get 164 tristate "Qualcomm RPM-Hardened (RPMH) Communication" 168 Support for communication with the hardened-RPM blocks in
|
/linux/arch/um/kernel/skas/ |
H A D | Makefile | 9 # GCC hardened also auto-enables -fpic, but we need %ebx so it can't work ->
|
/linux/Documentation/devicetree/bindings/crypto/ |
H A D | xlnx,zynqmp-aes.yaml | 14 The ZynqMP AES-GCM hardened cryptographic accelerator is used to
|
/linux/drivers/misc/lkdtm/ |
H A D | usercopy.c | 17 * normally be ignored by hardened usercopy, so force the compiler 19 * hardened usercopy checks by added "unconst" to all the const copies, 131 * This checks for whole-object size validation with hardened usercopy,
|
/linux/Documentation/devicetree/bindings/soc/qcom/ |
H A D | qcom,rpmh-rsc.yaml | 13 Resource Power Manager Hardened (RPMH) is the mechanism for communicating 14 with the hardened resource accelerators on Qualcomm SoCs. Requests to the
|
/linux/Documentation/devicetree/bindings/clock/ |
H A D | qcom,rpmhcc.yaml | 13 Resource Power Manager Hardened (RPMh) manages shared resources on
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_kmod.sh | 31 echo "[ JIT enabled:$1 hardened:$2 ]"
|
/linux/Documentation/devicetree/bindings/interrupt-controller/ |
H A D | qcom,pdc.yaml | 13 Qualcomm Technologies Inc. SoCs based on the RPM Hardened architecture have a
|
/linux/arch/arm/include/asm/ |
H A D | processor.h | 42 * no hardened usercopy whitelist is needed.
|
/linux/Documentation/virt/hyperv/ |
H A D | coco.rst | 205 Many drivers for VMBus devices have been "hardened" by adding code to fully 209 CoCo VM have not been hardened, and they are not allowed to load in a CoCo
|
/linux/Documentation/devicetree/bindings/firmware/xilinx/ |
H A D | xlnx,zynqmp-firmware.yaml | 103 description: The ZynqMP AES-GCM hardened cryptographic accelerator is
|
/linux/arch/riscv/include/asm/ |
H A D | processor.h | 118 /* Whitelist the fstate from the task_struct for hardened usercopy */
|
/linux/arch/x86/kernel/ |
H A D | tls.c | 45 * hardened this function to disallow 16-bit TLS segments. Fix in tls_desc_okay()
|
/linux/kernel/ |
H A D | panic.c | 181 * unfortunately means it may not be hardened to work in a panic in crash_smp_send_stop() 267 * which unfortunately may not be hardened to work in a panic in panic_other_cpus_shutdown()
|
/linux/arch/arm64/boot/dts/qcom/ |
H A D | sdm660-xiaomi-lavender.dts | 227 * by the Core Power Reduction hardened (CPRh) and the
|
H A D | sdm670-google-sargo.dts | 202 * by the Core Power Reduction hardened (CPRh) and the
|
H A D | sdm630-sony-xperia-nile.dtsi | 431 * by the Core Power Reduction hardened (CPRh) and the
|
/linux/arch/arm64/include/asm/ |
H A D | processor.h | 151 * Whitelisted fields for hardened usercopy:
|
/linux/Documentation/security/tpm/ |
H A D | tpm-security.rst | 18 the moment, most hardened security environments require a discrete
|
/linux/drivers/misc/ |
H A D | Kconfig | 487 SDFEC(16nm) hardened block. To compile this as a module choose M.
|
/linux/tools/memory-model/Documentation/ |
H A D | access-marking.txt | 220 compiler, though one could imagine hardened kernel builds treating the
|
/linux/arch/x86/kernel/fpu/ |
H A D | core.c | 658 * Whitelist the FPU register state embedded into task_struct for hardened
|
/linux/drivers/scsi/ |
H A D | libiscsi_tcp.c | 129 * triggers one of hardened usercopy checks. in iscsi_tcp_segment_map()
|
/linux/arch/ |
H A D | Kconfig | 329 An architecture should select this to provide hardened usercopy
|
/linux/net/ceph/ |
H A D | messenger_v1.c | 95 * triggers one of hardened usercopy checks. in ceph_tcp_sendpage()
|