Home
last modified time | relevance | path

Searched +full:non +full:- +full:updatable (Results 1 – 5 of 5) sorted by relevance

/linux/Documentation/devicetree/bindings/
H A Dincomplete-devices.yaml1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause
3 ---
4 $id: http://devicetree.org/schemas/incomplete-devices.yaml#
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Rob Herring <robh@kernel.org>
16 Examples are devices using ACPI PRP0001 with non-updatable firmware/ACPI
17 tables or old PowerPC platforms without in-tree DTS.
21 un-approved compatible.
29 - description:
30 Rejected compatibles in Devicetree, but used in ACPI-based devices
[all …]
/linux/security/landlock/
H A Druleset.h1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Landlock LSM - Ruleset management
5 * Copyright © 2016-2020 Mickaël Salaün <mic@digikod.net>
6 * Copyright © 2018-2020 ANSSI
26 * struct landlock_layer - Access rights for a given layer
41 * union landlock_key - Key of a ruleset's red-blac
[all...]
/linux/arch/arm64/boot/dts/exynos/
H A Dexynos7870.dtsi1 // SPDX-License-Identifier: GPL-2.0
9 #include <dt-bindings/clock/samsung,exynos7870-cmu.h>
10 #include <dt-bindings/interrupt-controller/arm-gic.h>
14 #address-cells = <2>;
15 #size-cells = <1>;
17 interrupt-parent = <&gic>;
31 #address-cells = <1>;
32 #size-cells = <0>;
34 cpu-map {
68 compatible = "arm,cortex-a53";
[all …]
H A Dexynos8895.dtsi1 // SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause
8 #include <dt-bindings/clock/samsung,exynos8895.h>
9 #include <dt-bindings/interrupt-controller/arm-gic.h>
13 #address-cells = <2>;
14 #size-cells = <1>;
16 interrupt-parent = <&gic>;
30 #address-cells = <1>;
31 #size-cells = <0>;
33 cpu-map {
67 compatible = "samsung,mongoose-m2";
[all …]
/linux/Documentation/security/
H A Dipe.rst1 .. SPDX-License-Identifier: GPL-2.0
3 Integrity Policy Enforcement (IPE) - Kernel Documentation
10 :doc:`IPE admin guide </admin-guide/LSM/ipe>`.
13 ---------------------
16 of a locked-down system. This system would be born-secure, and have
27 2. DM-Verity
29 Both options were carefully considered, however the choice to use DM-Verity
46 modify filesystem offline, the attacker could wipe all the xattrs -
50 With DM-Verity, as the xattrs are saved as part of the Merkel tree, if
51 offline mount occurs against the filesystem protected by dm-verity, the
[all …]