Home
last modified time | relevance | path

Searched full:trustzone (Results 1 – 25 of 48) sorted by relevance

12

/linux/Documentation/devicetree/bindings/rng/
H A Darm-cctrng.yaml7 title: Arm TrustZone CryptoCell TRNG engine
13 Arm TrustZone CryptoCell TRNG (True Random Number Generator) engine.
29 Arm TrustZone CryptoCell TRNG engine has 4 ring oscillators.
/linux/arch/arm/mach-mediatek/
H A Dplatsmp.c84 static void __init __mtk_smp_prepare_cpus(unsigned int max_cpus, int trustzone) in __mtk_smp_prepare_cpus() argument
89 if (trustzone) { in __mtk_smp_prepare_cpus()
110 if (trustzone) { in __mtk_smp_prepare_cpus()
111 /* smp_base(trustzone-bootinfo) is reserved by device tree */ in __mtk_smp_prepare_cpus()
/linux/drivers/remoteproc/
H A DKconfig192 for the non-TrustZone part of Qualcomm Technology Inc. ADSP and CDSP
193 remote processors. The TrustZone part is handled by QCOM_Q6V5_PAS
213 subsystem based on Hexagon V5. The TrustZone based system is
232 Say y here to support the TrustZone based Peripheral Image Loader for
255 a non-TrustZone wireless subsystem.
288 System (PAS) in TrustZone.
/linux/Documentation/devicetree/bindings/arm/
H A Dsecure.txt3 ARM CPUs with TrustZone support have two distinct address spaces,
5 kernel) are not TrustZone aware and run entirely in either the Normal
7 TrustZone aware and need to be able to determine whether devices are
H A Darm,realview.yaml15 earlier CPUs such as TrustZone and multicore (MPCore).
28 (HBI-0147) was created as a development board to test ARM TrustZone,
/linux/Documentation/devicetree/bindings/bus/
H A Dst,stm32-etzpc.yaml7 title: STM32 Extended TrustZone protection controller
10 The ETZPC configures TrustZone security in a SoC having bus masters and
/linux/Documentation/devicetree/bindings/gpio/
H A Dgpio-vf610.yaml41 - description: GPIO Trustzone non-secure interrupt number
42 - description: GPIO Trustzone secure interrupt number
/linux/arch/arm/boot/dts/mediatek/
H A Dmt8127.dtsi50 trustzone-bootinfo@80002000 {
51 compatible = "mediatek,trustzone-bootinfo";
H A Dmt8135.dtsi75 trustzone-bootinfo@80002000 {
76 compatible = "mediatek,trustzone-bootinfo";
/linux/arch/arm/boot/dts/st/
H A Dste-db9500.dtsi24 * to actually call into trustzone to run secure
H A Dste-db8500.dtsi42 * to actually call into trustzone to run secure
H A Dste-db8520.dtsi42 * to actually call into trustzone to run secure
/linux/Documentation/tee/
H A Dtee.rst13 TrustZone on ARM CPUs, or a separate secure co-processor etc. A TEE driver
H A Dop-tee.rst8 TrustZone based OP-TEE solution that is supported.
22 to tell, for instance, a TrustZone OP-TEE apart from an OP-TEE running on a
/linux/drivers/firmware/qcom/
H A Dqcom_tzmem.c3 * Memory allocator for buffers shared with the TrustZone.
195 * Create a new pool of memory suitable for sharing with the TrustZone.
480 MODULE_DESCRIPTION("TrustZone memory allocator for Qualcomm firmware drivers");
/linux/arch/arm/common/
H A Dsecure_cntvoff.S16 * mode or secure Monitor mode with SCR.NS==1. If TrustZone is enabled
/linux/Documentation/devicetree/bindings/crypto/
H A Darm,cryptocell.yaml7 title: Arm TrustZone CryptoCell cryptographic engine
/linux/Documentation/devicetree/bindings/media/
H A Dqcom,venus-common.yaml56 have TrustZone.
/linux/Documentation/security/tpm/
H A Dtpm_ftpm_tee.rst11 This driver is a shim for firmware implemented in ARM's TrustZone
H A Dtpm_ffa_crb.rst22 Secure world environment (also know as TrustZone)
/linux/Documentation/devicetree/bindings/soc/mediatek/
H A Ddevapc.yaml11 MediaTek bus fabric provides TrustZone security support and data
/linux/Documentation/devicetree/bindings/tpm/
H A Dmicrosoft,ftpm.yaml20 Microsoft's firmware-based TPM 2.0 (fTPM) leverages ARM TrustZone to overcome
/linux/Documentation/devicetree/bindings/arm/firmware/
H A Dlinaro,optee-tz.yaml14 Execution Environment. The security can be provided with ARM TrustZone, but
/linux/Documentation/devicetree/bindings/mtd/
H A Dnand-chip.yaml66 like Trustzone. This property contains the start address and size of
/linux/Documentation/arch/arm/
H A Dfirmware.rst7 Some boards are running with secure firmware running in TrustZone secure

12