/linux-master/drivers/pmdomain/amlogic/ |
H A D | Makefile | 4 obj-$(CONFIG_MESON_SECURE_PM_DOMAINS) += meson-secure-pwrc.o
|
/linux-master/drivers/gpu/drm/amd/amdgpu/ |
H A D | amdgpu_ib.c | 138 bool secure, init_shadow; local 180 dev_err(adev->dev, "secure submissions not supported on ring <%s>\n", ring->name); 247 secure = false; 249 secure = ib->flags & AMDGPU_IB_FLAGS_SECURE; 250 amdgpu_ring_emit_frame_cntl(ring, true, secure); 257 if (secure != !!(ib->flags & AMDGPU_IB_FLAGS_SECURE)) { 258 amdgpu_ring_emit_frame_cntl(ring, false, secure); 259 secure = !secure; 260 amdgpu_ring_emit_frame_cntl(ring, true, secure); [all...] |
H A D | amdgpu_ring.h | 229 bool secure);
|
H A D | gfx_v11_0.c | 134 static void gfx_v11_0_ring_emit_frame_cntl(struct amdgpu_ring *ring, bool start, bool secure); 5726 bool secure) 5728 uint32_t v = secure ? FRAME_TMZ : 0; 5725 gfx_v11_0_ring_emit_frame_cntl(struct amdgpu_ring *ring, bool start, bool secure) argument
|
/linux-master/drivers/gpu/drm/nouveau/nvkm/falcon/ |
H A D | v1.c | 30 u32 size, u16 tag, u8 port, bool secure) 38 reg = start | BIT(24) | (secure ? BIT(28) : 0); 29 nvkm_falcon_v1_load_imem(struct nvkm_falcon *falcon, void *data, u32 start, u32 size, u16 tag, u8 port, bool secure) argument
|
H A D | base.c | 213 u32 size, u16 tag, u8 port, bool secure) 215 if (secure && !falcon->secret) { 217 "writing with secure tag on a non-secure falcon!\n"); 222 secure); 212 nvkm_falcon_load_imem(struct nvkm_falcon *falcon, void *data, u32 start, u32 size, u16 tag, u8 port, bool secure) argument
|
/linux-master/drivers/of/ |
H A D | kobj.c | 68 bool secure = strncmp(pp->name, "security-", 9) == 0; local 78 pp->attr.attr.mode = secure ? 0400 : 0444; 79 pp->attr.size = secure ? 0 : pp->length;
|
/linux-master/arch/arm/mach-omap2/ |
H A D | Makefile | 16 secure-common = omap-smc.o omap-secure.o 19 obj-$(CONFIG_ARCH_OMAP3) += $(omap-2-3-common) $(hwmod-common) $(secure-common) 20 obj-$(CONFIG_ARCH_OMAP4) += $(secure-common) 21 obj-$(CONFIG_SOC_AM33XX) += $(secure-common) 22 obj-$(CONFIG_SOC_OMAP5) += $(secure-common) 23 obj-$(CONFIG_SOC_AM43XX) += $(secure-common) 24 obj-$(CONFIG_SOC_DRA7XX) += $(secure-common)
|
H A D | omap-smc.S | 3 * OMAP34xx and OMAP44xx secure APIs file. 15 * This is common routine to manage secure monitor API 16 * used to modify the PL310 secure registers. 36 * Low level common routine for secure HAL and PPA APIs. 59 * Low level common routine for secure HAL and PPA APIs via smc #1 67 mov r12, r0 @ Copy the secure service ID
|
H A D | sleep34xx.S | 82 * Function to call rom code to save secure ram context. 92 mov r12, r0 @ copy secure service ID in r12 413 mov r12, r0 @ copy secure Service ID in r12 422 mov r12, r0 @ copy secure Service ID in r12
|
/linux-master/drivers/net/wireless/ath/ath10k/ |
H A D | qmi.h | 29 bool secure; member in struct:ath10k_msa_mem_info
|
H A D | qmi.c | 48 if (mem_info->secure) { 74 if (!mem_info->secure) 182 qmi->mem_region[i].secure = resp.mem_region_info[i].secure_flag; 187 qmi->mem_region[i].secure);
|
/linux-master/drivers/gpio/ |
H A D | gpio-tegra186.c | 106 void __iomem *secure; member in struct:tegra_gpio 156 return gpio->secure + offset + pin * TEGRA186_GPIO_SCR_PIN_SIZE; 161 void __iomem *secure; local 164 secure = tegra186_gpio_get_secure_base(gpio, pin); 167 value = readl(secure + TEGRA186_GPIO_VM); 172 value = __raw_readl(secure + TEGRA186_GPIO_SCR); 759 base = gpio->secure + port->bank * 0x1000 + 0x800; 844 gpio->secure = devm_platform_ioremap_resource_byname(pdev, "security"); 845 if (IS_ERR(gpio->secure)) { 846 gpio->secure [all...] |
/linux-master/drivers/crypto/ |
H A D | Makefile | 47 obj-$(CONFIG_CRYPTO_DEV_SAFEXCEL) += inside-secure/
|
/linux-master/drivers/memory/tegra/ |
H A D | tegra20.c | 704 const char *direction = "read", *secure = ""; local 740 secure = "secure "; 754 client, secure, direction, &addr, error,
|
H A D | mc.c | 591 const char *direction, *secure; local 666 secure = "secure "; 668 secure = ""; 719 client, secure, direction, &addr, error,
|
/linux-master/arch/x86/kernel/cpu/ |
H A D | bugs.c | 1256 bool secure; member in struct:__anon32 1267 static void __init spec_v2_user_print_cond(const char *reason, bool secure) argument 1269 if (boot_cpu_has_bug(X86_BUG_SPECTRE_V2) != secure) 1298 v2_user_options[i].secure); 1427 bool secure; member in struct:__anon33 1442 static void __init spec_v2_print_cond(const char *reason, bool secure) argument 1444 if (boot_cpu_has_bug(X86_BUG_SPECTRE_V2) != secure) 1527 mitigation_options[i].secure);
|
/linux-master/drivers/misc/ |
H A D | fastrpc.c | 280 bool secure; member in struct:fastrpc_channel_ctx 288 bool secure; member in struct:fastrpc_device 1217 /* Check if the device node is non-secure and channel is secure*/ 1218 if (!fl->is_secure_dev && fl->cctx->secure) { 1221 * channel is configured as secure and block untrusted apps on channel 1582 fl->is_secure_dev = fdevice->secure; 2231 fdev->secure = is_secured; 2236 domain, is_secured ? "-secure" : ""); 2300 secure_dsp = !(of_property_read_bool(rdev->of_node, "qcom,non-secure [all...] |
/linux-master/net/ceph/ |
H A D | messenger_v2.c | 390 static int head_onwire_len(int ctrl_len, bool secure) argument 397 if (secure) { 413 bool secure) 422 if (!secure) 430 static int tail_onwire_len(const struct ceph_msg *msg, bool secure) argument 433 data_len(msg), secure); 793 return 0; /* auth_x, secure mode */ 827 return ret; /* auth_x, both plain and secure modes */ 3278 /* we end up here both plain and secure modes */ 3639 dout("%s con %p secure 412 __tail_onwire_len(int front_len, int middle_len, int data_len, bool secure) argument [all...] |
/linux-master/include/net/bluetooth/ |
H A D | mgmt.h | 958 __u8 secure; member in struct:mgmt_ev_pin_code_request
|
H A D | hci_core.h | 2273 void mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure);
|
/linux-master/drivers/mfd/ |
H A D | cs42l43.c | 59 __u8 secure; member in struct:cs42l43_patch_header 768 dev_err(cs42l43->dev, "Unpatched secure device\n");
|
/linux-master/drivers/net/ethernet/ti/ |
H A D | cpsw_ale.c | 226 DEFINE_ALE_FIELD(secure, 64, 1)
|
/linux-master/net/bluetooth/ |
H A D | hci_event.c | 737 * secure approach is to then assume the key size is 0 to force a 754 * handler of l2cap conn req will get the right secure 4653 u8 secure; local 4656 secure = 1; 4658 secure = 0; 4660 mgmt_pin_code_request(hdev, &ev->bdaddr, secure);
|
/linux-master/arch/s390/kernel/ |
H A D | ipl.c | 327 __ATTR(secure, 0444, ipl_secure_show, NULL);
|