Home
last modified time | relevance | path

Searched refs:SEC (Results 1 – 34 of 34) sorted by relevance

/linux-4.4.14/Documentation/devicetree/bindings/crypto/
Dfsl-sec2.txt1 Freescale SoC SEC Security Engines versions 1.x-2.x-3.x
6 SEC versions, high to low, e.g., "fsl,sec2.1", "fsl,sec2.0" (SEC2/3)
10 - interrupts : the SEC's interrupt number
17 should be encoded following the SEC's Descriptor Header Dword
21 bit 1 = set if SEC has the ARC4 EU (AFEU)
22 bit 2 = set if SEC has the DES/3DES EU (DEU)
23 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A)
24 bit 4 = set if SEC has the random number generator EU (RNG)
25 bit 5 = set if SEC has the public key EU (PKEU)
26 bit 6 = set if SEC has the AES EU (AESU)
[all …]
Dfsl-sec6.txt1 SEC 6 is as Freescale's Cryptographic Accelerator and Assurance Module (CAAM).
2 Currently Freescale powerpc chip C29X is embedded with SEC 6.
3 SEC 6 device tree binding include:
4 -SEC 6 Node
9 SEC 6 Node
13 Node defines the base address of the SEC 6 block.
15 configuration registers for the SEC 6 block.
16 For example, In C293, we could see three SEC 6 node.
28 Definition: A standard property. Define the 'ERA' of the SEC
48 address and length of the SEC 6 configuration registers.
[all …]
Dfsl-sec4.txt2 SEC 4 Device Tree Binding
7 -SEC 4 Node
15 NOTE: the SEC 4 is also known as Freescale's Cryptographic Accelerator
23 SEC 4 h/w can process requests from 2 types of sources.
24 1. DPAA Queue Interface (HW interface between Queue Manager & SEC 4).
25 2. Job Rings (HW interface between cores & SEC 4 registers).
29 HW interface between QM & SEC 4 and also BM & SEC 4, on DPAA-enabled parts
32 SEC version. E.g., the SEC 4.0 in the P4080 has 5 DECOs and can thus
42 SEC 4 Node
46 Node defines the base address of the SEC 4 block.
[all …]
/linux-4.4.14/samples/bpf/
Dtracex4_kern.c17 struct bpf_map_def SEC("maps") my_map = {
27 SEC("kprobe/kmem_cache_free")
36 SEC("kretprobe/kmem_cache_alloc_node")
53 char _license[] SEC("license") = "GPL";
54 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtracex3_kern.c13 struct bpf_map_def SEC("maps") my_map = {
23 SEC("kprobe/blk_mq_start_request")
44 struct bpf_map_def SEC("maps") lat_map = {
51 SEC("kprobe/blk_update_request")
88 char _license[] SEC("license") = "GPL";
89 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dlathist_kern.c21 struct bpf_map_def SEC("maps") my_map = {
28 SEC("kprobe/trace_preempt_off")
64 struct bpf_map_def SEC("maps") my_lat = {
71 SEC("kprobe/trace_preempt_on")
98 char _license[] SEC("license") = "GPL";
99 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtracex2_kern.c13 struct bpf_map_def SEC("maps") my_map = {
23 SEC("kprobe/kfree_skb")
72 struct bpf_map_def SEC("maps") my_hist_map = {
79 SEC("kprobe/sys_write")
99 char _license[] SEC("license") = "GPL";
100 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtracex6_kern.c6 struct bpf_map_def SEC("maps") my_map = {
13 SEC("kprobe/sys_write")
26 char _license[] SEC("license") = "GPL";
27 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtrace_output_kern.c6 struct bpf_map_def SEC("maps") my_map = {
13 SEC("kprobe/sys_write")
29 char _license[] SEC("license") = "GPL";
30 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtcbpf1_kern.c53 SEC("classifier")
67 SEC("redirect_xmit")
72 SEC("redirect_recv")
77 SEC("clone_redirect_xmit")
83 SEC("clone_redirect_recv")
89 char _license[] SEC("license") = "GPL";
Dtracex5_kern.c13 #define PROG(F) SEC("kprobe/"__stringify(F)) int bpf_func_##F
15 struct bpf_map_def SEC("maps") progs = {
22 SEC("kprobe/seccomp_phase1")
74 char _license[] SEC("license") = "GPL";
75 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dsockex1_kern.c7 struct bpf_map_def SEC("maps") my_map = {
14 SEC("socket1")
29 char _license[] SEC("license") = "GPL";
Dtracex1_kern.c20 SEC("kprobe/__netif_receive_skb_core")
49 char _license[] SEC("license") = "GPL";
50 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dsockex3_kern.c19 #define PROG(F) SEC("socket/"__stringify(F)) int bpf_func_##F
21 struct bpf_map_def SEC("maps") jmp_table = {
94 struct bpf_map_def SEC("maps") percpu_map = {
115 struct bpf_map_def SEC("maps") hash_map = {
279 SEC("socket/0")
290 char _license[] SEC("license") = "GPL";
Dsockex2_kern.c191 struct bpf_map_def SEC("maps") hash_map = {
198 SEC("socket2")
221 char _license[] SEC("license") = "GPL";
Dbpf_helpers.h8 #define SEC(NAME) __attribute__((section(NAME), used)) macro
/linux-4.4.14/tools/perf/tests/
Dbpf-script-example.c26 #define SEC(NAME) __attribute__((section(NAME), used)) macro
27 struct bpf_map_def SEC("maps") flip_table = {
34 SEC("func=sys_epoll_pwait")
47 char _license[] SEC("license") = "GPL";
48 int _version SEC("version") = LINUX_VERSION_CODE;
Dbpf-script-test-kbuild.c9 #define SEC(NAME) __attribute__((section(NAME), used)) macro
14 SEC("func=vfs_llseek")
20 char _license[] SEC("license") = "GPL";
21 int _version SEC("version") = LINUX_VERSION_CODE;
/linux-4.4.14/drivers/crypto/qat/qat_common/
Dqat_crypto.c57 #define SEC ADF_KERNEL_SEC macro
174 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances()
191 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances()
197 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances()
206 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances()
215 if (adf_create_ring(accel_dev, SEC, bank, num_msg_sym, in qat_crypto_create_instances()
221 if (adf_create_ring(accel_dev, SEC, bank, num_msg_asym, in qat_crypto_create_instances()
227 if (adf_create_ring(accel_dev, SEC, bank, num_msg_sym, in qat_crypto_create_instances()
233 if (adf_create_ring(accel_dev, SEC, bank, num_msg_asym, in qat_crypto_create_instances()
/linux-4.4.14/drivers/crypto/
DKconfig226 tristate "Talitos Freescale Security Engine (SEC)"
234 Say 'Y' here to use the Freescale Security Engine (SEC)
237 The Freescale SEC is present on PowerQUICC 'E' processors, such
244 bool "SEC1 (SEC 1.0 and SEC Lite 1.2)"
249 Say 'Y' here to use the Freescale Security Engine (SEC) version 1.0
250 found on MPC82xx or the Freescale Security Engine (SEC Lite)
254 bool "SEC2+ (SEC version 2.0 or upper)"
258 Say 'Y' here to use the Freescale Security Engine (SEC)
/linux-4.4.14/Documentation/dvb/
Dtechnisat.txt51 c.) => "ISL6421 SEC controller"
56 c.) => "ISL6421 SEC controller"
/linux-4.4.14/drivers/media/dvb-frontends/
DKconfig718 comment "SEC control devices for DVB-S"
724 tristate "LNBH25 SEC controller"
728 An SEC control chip.
732 tristate "LNBP21/LNBH24 SEC controllers"
736 An SEC control chips.
739 tristate "LNBP22 SEC controllers"
749 tristate "ISL6405 SEC controller"
753 An SEC control chip.
756 tristate "ISL6421 SEC controller"
760 An SEC control chip.
[all …]
/linux-4.4.14/drivers/staging/lustre/lustre/include/
Dlprocfs_status.h278 OPC_RANGE(SEC) + in opcode_offset()
291 OPC_RANGE(SEC) + in opcode_offset()
312 OPC_RANGE(SEC) + \
314 OPC_RANGE(SEC) + \
/linux-4.4.14/drivers/crypto/caam/
DKconfig6 and Assurance Module (CAAM), also known as the SEC version 4 (SEC4).
/linux-4.4.14/arch/powerpc/boot/dts/
Dhaleakala.dts96 0x6 0x4>; /* ECC SEC Error */
Dobs600.dts110 0x6 0x4>; /* ECC SEC Error */
Dmakalu.dts97 0x6 0x4 /* ECC SEC Error */ >;
Dkilauea.dts106 0x6 0x4>; /* ECC SEC Error */
/linux-4.4.14/drivers/net/ethernet/intel/e1000e/
Dmac.c376 er32(SEC); in e1000e_clear_hw_cntrs_base()
/linux-4.4.14/arch/blackfin/mach-bf609/
DKconfig13 int "SEC interrupt priority levels"
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/device/
Dbase.c2130 _(SEC , device->sec , device->sec); in nvkm_device_engine()
/linux-4.4.14/drivers/net/ethernet/intel/e1000/
De1000_hw.c4704 temp = er32(SEC); in e1000_clear_hw_cntrs()
De1000_main.c3649 adapter->stats.sec += er32(SEC); in e1000_update_stats()
/linux-4.4.14/
DCREDITS3584 S: 2F 14 ALY 31 LN 166 SEC 1 SHIH-PEI RD