Searched +full:non +full:- +full:updatable (Results 1 – 5 of 5) sorted by relevance
| /linux/Documentation/devicetree/bindings/ |
| H A D | incomplete-devices.yaml | 1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause 3 --- 4 $id: http://devicetree.org/schemas/incomplete-devices.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Rob Herring <robh@kernel.org> 16 Examples are devices using ACPI PRP0001 with non-updatable firmware/ACPI 17 tables or old PowerPC platforms without in-tree DTS. 21 un-approved compatible. 29 - description: 30 Rejected compatibles in Devicetree, but used in ACPI-based devices [all …]
|
| /linux/security/landlock/ |
| H A D | ruleset.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * Landlock LSM - Ruleset management 5 * Copyright © 2016-2020 Mickaël Salaün <mic@digikod.net> 6 * Copyright © 2018-2020 ANSSI 26 * struct landlock_layer - Access rights for a given layer 41 * union landlock_key - Key of a ruleset's red-blac [all...] |
| /linux/arch/arm64/boot/dts/exynos/ |
| H A D | exynos7870.dtsi | 1 // SPDX-License-Identifier: GPL-2.0 9 #include <dt-bindings/clock/samsung,exynos7870-cmu.h> 10 #include <dt-bindings/interrupt-controller/arm-gic.h> 14 #address-cells = <2>; 15 #size-cells = <1>; 17 interrupt-parent = <&gic>; 31 #address-cells = <1>; 32 #size-cells = <0>; 34 cpu-map { 68 compatible = "arm,cortex-a53"; [all …]
|
| H A D | exynos8895.dtsi | 1 // SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause 8 #include <dt-bindings/clock/samsung,exynos8895.h> 9 #include <dt-bindings/interrupt-controller/arm-gic.h> 13 #address-cells = <2>; 14 #size-cells = <1>; 16 interrupt-parent = <&gic>; 30 #address-cells = <1>; 31 #size-cells = <0>; 33 cpu-map { 67 compatible = "samsung,mongoose-m2"; [all …]
|
| /linux/Documentation/security/ |
| H A D | ipe.rst | 1 .. SPDX-License-Identifier: GPL-2.0 3 Integrity Policy Enforcement (IPE) - Kernel Documentation 10 :doc:`IPE admin guide </admin-guide/LSM/ipe>`. 13 --------------------- 16 of a locked-down system. This system would be born-secure, and have 27 2. DM-Verity 29 Both options were carefully considered, however the choice to use DM-Verity 46 modify filesystem offline, the attacker could wipe all the xattrs - 50 With DM-Verity, as the xattrs are saved as part of the Merkel tree, if 51 offline mount occurs against the filesystem protected by dm-verity, the [all …]
|