| /linux/drivers/crypto/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 4 bool "Hardware crypto devices" 7 Say Y here to get to see options for hardware crypto devices and 39 called padlock-aes. 53 called padlock-sha. 61 Say 'Y' here to use the AMD Geode LX processor on-board AES 65 will be called geode-aes. 79 tristate "Kernel API for protected key handling" 83 for creation and handling of protected keys. Other parts of the 86 The protected key support is distributed into: [all …]
|
| /linux/Documentation/security/keys/ |
| H A D | trusted-encrypted.rst | 13 Trusted Keys as Protected key 15 It is the secure way of keeping the keys in the kernel key-ring as Trusted-Key, 18 - Key-blob, an encrypted key-data, created to be stored, loaded and seen by 20 - Key-data, the plain-key text in the system memory, to be used by 23 Though key-data is not accessible to the user-space in plain-text, but it is in 24 plain-text in system memory, when used in kernel space. Even though kernel-space 25 attracts small surface attack, but with compromised kernel or side-channel 29 In order to protect the key in kernel space, the concept of "protected-keys" is 30 introduced which will act as an added layer of protection. The key-data of the 31 protected keys is encrypted with Key-Encryption-Key(KEK), and decrypted inside [all …]
|
| /linux/Documentation/virt/kvm/x86/ |
| H A D | mmu.rst | 1 .. SPDX-License-Identifier: GPL-2.0 13 - correctness: 18 - security: 21 - performance: 23 - scaling: 25 - hardware: 26 support the full range of x86 virtualization hardware 27 - integration: 31 - dirty tracking: 33 and framebuffer-based displays [all …]
|
| /linux/drivers/net/wireless/ath/ath10k/ |
| H A D | core.h | 1 /* SPDX-License-Identifier: ISC */ 3 * Copyright (c) 2005-2011 Atheros Communications Inc. 4 * Copyright (c) 2011-2017 Qualcomm Atheros, Inc. 5 * Copyright (c) 2018-2019, The Linux Foundation. All rights reserved. 46 #define ATH10K_DEFAULT_NOISE_FLOOR -95 67 /* SMBIOS type structure length (excluding strings-set) */ 144 return (struct ath10k_skb_cb *)&IEEE80211_SKB_CB(skb)->driver_data; in ATH10K_SKB_CB() 149 BUILD_BUG_ON(sizeof(struct ath10k_skb_rxcb) > sizeof(skb->cb)); in ATH10K_SKB_RXCB() 150 return (struct ath10k_skb_rxcb *)skb->c in ATH10K_SKB_RXCB() [all...] |
| /linux/arch/x86/kvm/ |
| H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 53 tristate "Kernel-based Virtual Machine (KVM) support" 56 Support hosting fully virtualized guest machines using hardware 61 This module provides access to the hardware capabilities through 70 bool "Compile KVM with -Werror" 71 # Disallow KVM's -Werror if KASAN is enabled, e.g. to guard against 75 # Building KVM with -Werror and KASAN is still doable via enabling 76 # the kernel-wide WERROR=y. 79 Add -Werror to the build flags for KVM. 84 bool "Enable support for KVM software-protected VMs" [all …]
|
| /linux/Documentation/filesystems/ |
| H A D | fscrypt.rst | 2 Filesystem-level encryption (fscrypt) 11 Note: "fscrypt" in this document refers to the kernel-level portion, 14 covers the kernel-level portion. For command-line examples of how to 20 <https://source.android.com/security/encryption/file-based>`_, over 25 Unlike dm-crypt, fscrypt operates at the filesystem level rather than 28 filesystem. This is useful for multi-user systems where each user's 29 data-at-rest needs to be cryptographically isolated from the others. 34 directly into supported filesystems --- currently ext4, F2FS, UBIFS, 44 fscrypt does not support encrypting files in-place. Instead, it 54 --------------- [all …]
|
| /linux/include/drm/ |
| H A D | drm_device.h | 26 * Recovery methods for wedged device in order of less to more side-effects. 30 * Refer to "Device Wedging" chapter in Documentation/gpu/drm-uapi.rst for more 39 * struct drm_wedge_task_info - information about the guilty task of a wedge dev 49 * enum switch_power_state - power state of drm device 67 * struct drm_device - DRM device structure 76 /** @ref: Object ref-count */ 79 /** @dev: Device structure of bus-device */ 97 * for importing buffers via dma-buf. 130 * per-device structure. 140 * hardware (and not character device node) struct device @dev. [all …]
|
| H A D | gpu_scheduler.h | 28 #include <linux/dma-fence.h> 36 * DRM_SCHED_FENCE_DONT_PIPELINE - Prevent dependency pipelining 45 * DRM_SCHED_FENCE_FLAG_HAS_DEADLINE_BIT - A fence deadline hint has been set 75 * struct drm_sched_entity - A wrapper around a job queue (typically 78 * Entities will emit jobs in order to their corresponding hardware 89 * Protected by &drm_sched_rq.lock of @rq. 96 * Lock protecting the run-queue (@rq) to which this entity belongs, 106 * FIXME: Locking is very unclear for this. Writers are protected by 141 * drm_sched_entity_set_priority(). Protected by @lock. 239 * struct drm_sched_rq - queu [all...] |
| H A D | drm_mode_config.h | 42 * struct drm_mode_config_funcs - basic driver provided mode setting functions 44 * Some global (i.e. not per-CRTC, connector, etc) mode setting functions that 59 * ie. when (@mode_cmd->flags & DRM_MODE_FB_MODIFIERS) == 0. 70 * driver-specific information (like the internal native buffer object 116 * function must reject any modeset and state changes which the hardware 120 * - Checking that the modes, framebuffers, scaling and placement 121 * requirements and so on are within the limits of the hardware. 123 * - Checking that any hidden shared resources are not oversubscribed. 128 * - Checking that virtualized resources exported to userspace are not 131 * example is dual-pipe operations (which generally should be hidden [all …]
|
| /linux/include/soc/fsl/ |
| H A D | caam-blob.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 * Copyright 2024-2025 NXP 25 * struct caam_pkey_info - information for CAAM protected key 26 * @is_pkey: flag to identify, if the key is protected. 42 * struct caam_blob_info - information for CAAM blobbing 43 * @pkey_info: pointer to keep protected key information 66 * caam_blob_gen_init - initialize blob generation 68 * and ``ERR_PTR(-ENODEV)`` if CAAM has no hardware blobbing support 74 * caam_blob_gen_exit - free blob generation resources 80 * caam_process_blob - encapsulate or decapsulate blob [all …]
|
| /linux/Documentation/RCU/ |
| H A D | rcu_dereference.rst | 17 (prefix "*"), field selection ("->"), assignment ("="), address-of 27 - You must use one of the rcu_dereference() family of primitives 28 to load an RCU-protected pointer, otherwise CONFIG_PROVE_RCU 29 will complain. Worse yet, your code can see random memory-corruption 45 - In the special case where data is added but is never removed 51 - You are only permitted to use rcu_dereference() on pointer values. 57 - Set bits and clear bits down in the must-be-zero low-order 62 - XOR bits to translate pointers, as is done in some 63 classic buddy-allocator algorithms. 68 - Avoid cancellation when using the "+" and "-" infix arithmetic [all …]
|
| /linux/Documentation/dev-tools/ |
| H A D | kfence.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 Kernel Electric-Fence (KFENCE) 7 Kernel Electric-Fence (KFENCE) is a low-overhead sampling-based memory safety 8 error detector. KFENCE detects heap out-of-bounds access, use-after-free, and 9 invalid-free errors. 15 non-production test workloads. One way to quickly achieve a large enough total 19 ----- 26 ``kfence.sample_interval`` to non-zero value), configure the kernel with:: 46 causes CPU wake-ups when the system is completely idle. This may be undesirable 47 on power-constrained systems. The boot parameter ``kfence.deferrable=1`` [all …]
|
| /linux/Documentation/fb/ |
| H A D | uvesafb.rst | 2 uvesafb - A Generic Driver for VBE2+ compliant video cards 6 --------------- 30 -------------------------- 36 - Lack of any type of acceleration. 37 - A strict and limited set of supported video modes. Often the native 42 ratio, which is what most BIOS-es are limited to. 43 - Adjusting the refresh rate is only possible with a VBE 3.0 compliant 44 Video BIOS. Note that many nVidia Video BIOS-es claim to be VBE 3.0 48 ---------------- 54 video=uvesafb:1024x768-32,mtrr:3,ywrap (compiled into the kernel) [all …]
|
| /linux/Documentation/admin-guide/mm/ |
| H A D | userfaultfd.rst | 8 Userfaults allow the implementation of on-demand paging from userland 38 Vmas are not suitable for page- (or hugepage) granular fault tracking 48 is a corner case that would currently return ``-EBUSY``). 54 ---------------------- 63 - Any user can always create a userfaultfd which traps userspace page faults 67 - In order to also trap kernel page faults for the address space, either the 84 -------------------------- 101 - The ``UFFD_FEATURE_EVENT_*`` flags indicate that various other events 103 detail below in the `Non-cooperative userfaultfd`_ section. 105 - ``UFFD_FEATURE_MISSING_HUGETLBFS`` and ``UFFD_FEATURE_MISSING_SHMEM`` [all …]
|
| /linux/arch/x86/kvm/mmu/ |
| H A D | spte.h | 1 // SPDX-License-Identifier: GPL-2.0-only 13 * in hardware. E.g. MMIO SPTEs are not considered present. Use bit 11, as it 22 * be restricted to using write-protection (for L2 when CPU dirty logging, i.e. 28 * is guaranteed to have A/D bits and write-protection is forced only for 29 * TDP with CPU dirty logging (PML). If NPT ever gains PML-like support, it 30 * must be restricted to 64-bit KVM. 40 #define SPTE_BASE_ADDR_MASK (physical_mask & ~(u64)(PAGE_SIZE-1)) 42 #define SPTE_BASE_ADDR_MASK (((1ULL << 52) - 1) & ~(u64)(PAGE_SIZE-1)) 64 * as not-present for access tracking purposes. We do not save the W bit as the 78 * SPTE is write-protected. See is_writable_pte() for details. [all …]
|
| /linux/tools/memory-model/Documentation/ |
| H A D | README | 4 Linux-kernel memory model (LKMM) audience might be anywhere from novice 12 If LKMM-specific terms lost you, glossary.txt might help you. 14 o You are new to Linux-kernel concurrency: simple.txt 16 o You have some background in Linux-kernel concurrency, and would 17 like an overview of the types of low-level concurrency primitives 22 o You are familiar with the Linux-kernel concurrency primitives 24 tests: litmus-tests.txt 27 protected by a lock: locking.txt 30 recipes.txt, but is self-contained. 32 o You are familiar with Linux-kernel concurrency, and would [all …]
|
| /linux/drivers/net/ethernet/aquantia/atlantic/macsec/ |
| H A D | macsec_struct.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 21 /*! The match mask is per-nibble. 0 means don't care, i.e. every value 122 /*! Mask is per-byte. 137 * For explicit SECTAG, AN is hardware controlled. For sending 142 /*! Mask is per-byte. 148 * PN number is hardware controlled. 151 /*! Mask is per-byte. 156 /*! Mask is per-byte. 171 /*! Mask is per-byte. 176 /*! Mask is per-byte. [all …]
|
| /linux/arch/s390/crypto/ |
| H A D | phmac_s390.c | 1 // SPDX-License-Identifier: GPL-2.0+ 5 * s390 specific HMAC support for protected keys. 44 hwh->walkbytes = crypto_hash_walk_first(req, &hwh->walk); in hwh_prepare() 45 if (hwh->walkbytes < 0) in hwh_prepare() 46 return hwh->walkbytes; in hwh_prepare() 47 hwh->walkaddr = hwh->walk.data; in hwh_prepare() 62 return crypto_hash_walk_done(&hwh->walk, n); in hwh_advance() 64 hwh->walkbytes -= n; in hwh_advance() 65 hwh->walkaddr += n; in hwh_advance() 66 if (hwh->walkbytes > 0) in hwh_advance() [all …]
|
| /linux/drivers/gpu/drm/vmwgfx/ |
| H A D | vmwgfx_so.c | 1 // SPDX-License-Identifier: GPL-2.0 OR MIT 3 * Copyright 2014-2015 VMware, Inc., Palo Alto, CA., USA 19 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL 35 * destroy a hardware surface, all views pointing to it must also be destroyed, 44 * struct vmw_view - view metadata 48 * @ctx: Non-refcounted pointer to the context this view belongs to. 51 * @srf_head: List head for the surface-to-view list. 52 * @cotable_head: List head for the cotable-to_view list. 54 * @view_id: User-space per context view id. Currently used also as per 68 struct list_head srf_head; /* Protected by binding_mutex */ [all …]
|
| H A D | vmwgfx_cmdbuf.c | 1 // SPDX-License-Identifier: GPL-2.0 OR MIT 4 * Copyright 2015-2023 VMware, Inc., Palo Alto, CA., USA 20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL 42 (1024 - ALIGN(sizeof(SVGACBHeader), VMW_CMDBUF_INLINE_ALIGN)) 45 * struct vmw_cmdbuf_context - Command buffer context queues 48 * manager but not yet submitted to hardware. 49 * @hw_submitted: List of command buffers submitted to hardware. 51 * @num_hw_submitted: Number of buffers currently being processed by hardware 63 * struct vmw_cmdbuf_man - Command buffer manager 76 * data is protected by @lock. [all …]
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | spectre.rst | 1 .. SPDX-License-Identifier: GPL-2.0 14 ------------------- 22 - Intel Core, Atom, Pentium, and Xeon processors 24 - AMD Phenom, EPYC, and Zen processors 26 - IBM POWER and zSeries processors 28 - Higher end ARM processors 30 - Apple CPUs 32 - Higher end MIPS CPUs 34 - Likely most other high performance CPUs. Contact your CPU vendor for details. 40 ------------ [all …]
|
| /linux/arch/m68k/mm/ |
| H A D | hwtest.c | 1 // SPDX-License-Identifier: GPL-2.0 2 /* Tests for presence or absence of hardware registers. 8 * The test is for use when trying to read a hardware register 12 * There is a test-by-reading and a test-by-writing; I present 15 * -- PMM <pmaydell@chiark.greenend.org.uk>, 05/1998 19 * hardware register address. It is called very early in the kernel 60 /* Basically the same, but writes a value into a word register, protected
|
| /linux/arch/x86/kernel/ |
| H A D | umip.c | 2 * umip.c Emulation for instruction protected by the User-Mode Instruction 6 * Ricardo Neri <ricardo.neri-calderon@linux.intel.com> 13 #include <asm/insn-eval.h> 19 /** DOC: Emulation for User-Mode Instruction Prevention (UMIP) 21 * User-Mode Instruction Prevention is a security feature present in recent 27 * the UMIP-protected instructions (in the form of a SIGSEGV signal), it can be 38 * The instructions protected by UMIP can be split in two groups. Those which 44 * not the actual location of the table. The result is emulated as a hard-coded 52 * - SLDT returns (GDT_ENTRY_LDT * 8) if an LDT has been set, 0 if not. 53 * - STR returns (GDT_ENTRY_TSS * 8). [all …]
|
| /linux/Documentation/kernel-hacking/ |
| H A D | locking.rst | 37 +------------------------------------+------------------------------------+ 41 +------------------------------------+------------------------------------+ 43 +------------------------------------+------------------------------------+ 45 +------------------------------------+------------------------------------+ 47 +------------------------------------+------------------------------------+ 49 +------------------------------------+------------------------------------+ 51 +------------------------------------+------------------------------------+ 57 +------------------------------------+------------------------------------+ 61 +------------------------------------+------------------------------------+ 63 +------------------------------------+------------------------------------+ [all …]
|
| /linux/drivers/net/wireless/marvell/libertas/ |
| H A D | dev.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 73 /* Hardware debugging */ 94 /* Hardware access */ 130 /* Command responses sent from the hardware to the driver */ 135 /* Events sent from hardware to driver */ 156 int tx_pending_len; /* -1 while building packet */ 158 /* protected by hard_start_xmit serialization */ 201 r = netif_running(priv->dev); in lbs_iface_active() 202 if (priv->mesh_dev) in lbs_iface_active() 203 r |= netif_running(priv->mesh_dev); in lbs_iface_active()
|