/linux-4.4.14/Documentation/devicetree/bindings/crypto/ |
D | fsl-sec2.txt | 1 Freescale SoC SEC Security Engines versions 1.x-2.x-3.x 6 SEC versions, high to low, e.g., "fsl,sec2.1", "fsl,sec2.0" (SEC2/3) 10 - interrupts : the SEC's interrupt number 17 should be encoded following the SEC's Descriptor Header Dword 21 bit 1 = set if SEC has the ARC4 EU (AFEU) 22 bit 2 = set if SEC has the DES/3DES EU (DEU) 23 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A) 24 bit 4 = set if SEC has the random number generator EU (RNG) 25 bit 5 = set if SEC has the public key EU (PKEU) 26 bit 6 = set if SEC has the AES EU (AESU) [all …]
|
D | fsl-sec6.txt | 1 SEC 6 is as Freescale's Cryptographic Accelerator and Assurance Module (CAAM). 2 Currently Freescale powerpc chip C29X is embedded with SEC 6. 3 SEC 6 device tree binding include: 4 -SEC 6 Node 9 SEC 6 Node 13 Node defines the base address of the SEC 6 block. 15 configuration registers for the SEC 6 block. 16 For example, In C293, we could see three SEC 6 node. 28 Definition: A standard property. Define the 'ERA' of the SEC 48 address and length of the SEC 6 configuration registers. [all …]
|
D | fsl-sec4.txt | 2 SEC 4 Device Tree Binding 7 -SEC 4 Node 15 NOTE: the SEC 4 is also known as Freescale's Cryptographic Accelerator 23 SEC 4 h/w can process requests from 2 types of sources. 24 1. DPAA Queue Interface (HW interface between Queue Manager & SEC 4). 25 2. Job Rings (HW interface between cores & SEC 4 registers). 29 HW interface between QM & SEC 4 and also BM & SEC 4, on DPAA-enabled parts 32 SEC version. E.g., the SEC 4.0 in the P4080 has 5 DECOs and can thus 42 SEC 4 Node 46 Node defines the base address of the SEC 4 block. [all …]
|
/linux-4.4.14/samples/bpf/ |
D | tracex4_kern.c | 17 struct bpf_map_def SEC("maps") my_map = { 27 SEC("kprobe/kmem_cache_free") 36 SEC("kretprobe/kmem_cache_alloc_node") 53 char _license[] SEC("license") = "GPL"; 54 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | tracex3_kern.c | 13 struct bpf_map_def SEC("maps") my_map = { 23 SEC("kprobe/blk_mq_start_request") 44 struct bpf_map_def SEC("maps") lat_map = { 51 SEC("kprobe/blk_update_request") 88 char _license[] SEC("license") = "GPL"; 89 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | lathist_kern.c | 21 struct bpf_map_def SEC("maps") my_map = { 28 SEC("kprobe/trace_preempt_off") 64 struct bpf_map_def SEC("maps") my_lat = { 71 SEC("kprobe/trace_preempt_on") 98 char _license[] SEC("license") = "GPL"; 99 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | tracex2_kern.c | 13 struct bpf_map_def SEC("maps") my_map = { 23 SEC("kprobe/kfree_skb") 72 struct bpf_map_def SEC("maps") my_hist_map = { 79 SEC("kprobe/sys_write") 99 char _license[] SEC("license") = "GPL"; 100 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | tracex6_kern.c | 6 struct bpf_map_def SEC("maps") my_map = { 13 SEC("kprobe/sys_write") 26 char _license[] SEC("license") = "GPL"; 27 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | trace_output_kern.c | 6 struct bpf_map_def SEC("maps") my_map = { 13 SEC("kprobe/sys_write") 29 char _license[] SEC("license") = "GPL"; 30 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | tcbpf1_kern.c | 53 SEC("classifier") 67 SEC("redirect_xmit") 72 SEC("redirect_recv") 77 SEC("clone_redirect_xmit") 83 SEC("clone_redirect_recv") 89 char _license[] SEC("license") = "GPL";
|
D | tracex5_kern.c | 13 #define PROG(F) SEC("kprobe/"__stringify(F)) int bpf_func_##F 15 struct bpf_map_def SEC("maps") progs = { 22 SEC("kprobe/seccomp_phase1") 74 char _license[] SEC("license") = "GPL"; 75 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | sockex1_kern.c | 7 struct bpf_map_def SEC("maps") my_map = { 14 SEC("socket1") 29 char _license[] SEC("license") = "GPL";
|
D | tracex1_kern.c | 20 SEC("kprobe/__netif_receive_skb_core") 49 char _license[] SEC("license") = "GPL"; 50 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | sockex3_kern.c | 19 #define PROG(F) SEC("socket/"__stringify(F)) int bpf_func_##F 21 struct bpf_map_def SEC("maps") jmp_table = { 94 struct bpf_map_def SEC("maps") percpu_map = { 115 struct bpf_map_def SEC("maps") hash_map = { 279 SEC("socket/0") 290 char _license[] SEC("license") = "GPL";
|
D | sockex2_kern.c | 191 struct bpf_map_def SEC("maps") hash_map = { 198 SEC("socket2") 221 char _license[] SEC("license") = "GPL";
|
D | bpf_helpers.h | 8 #define SEC(NAME) __attribute__((section(NAME), used)) macro
|
/linux-4.4.14/tools/perf/tests/ |
D | bpf-script-example.c | 26 #define SEC(NAME) __attribute__((section(NAME), used)) macro 27 struct bpf_map_def SEC("maps") flip_table = { 34 SEC("func=sys_epoll_pwait") 47 char _license[] SEC("license") = "GPL"; 48 int _version SEC("version") = LINUX_VERSION_CODE;
|
D | bpf-script-test-kbuild.c | 9 #define SEC(NAME) __attribute__((section(NAME), used)) macro 14 SEC("func=vfs_llseek") 20 char _license[] SEC("license") = "GPL"; 21 int _version SEC("version") = LINUX_VERSION_CODE;
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_crypto.c | 57 #define SEC ADF_KERNEL_SEC macro 174 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances() 191 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances() 197 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances() 206 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances() 215 if (adf_create_ring(accel_dev, SEC, bank, num_msg_sym, in qat_crypto_create_instances() 221 if (adf_create_ring(accel_dev, SEC, bank, num_msg_asym, in qat_crypto_create_instances() 227 if (adf_create_ring(accel_dev, SEC, bank, num_msg_sym, in qat_crypto_create_instances() 233 if (adf_create_ring(accel_dev, SEC, bank, num_msg_asym, in qat_crypto_create_instances()
|
/linux-4.4.14/drivers/crypto/ |
D | Kconfig | 226 tristate "Talitos Freescale Security Engine (SEC)" 234 Say 'Y' here to use the Freescale Security Engine (SEC) 237 The Freescale SEC is present on PowerQUICC 'E' processors, such 244 bool "SEC1 (SEC 1.0 and SEC Lite 1.2)" 249 Say 'Y' here to use the Freescale Security Engine (SEC) version 1.0 250 found on MPC82xx or the Freescale Security Engine (SEC Lite) 254 bool "SEC2+ (SEC version 2.0 or upper)" 258 Say 'Y' here to use the Freescale Security Engine (SEC)
|
/linux-4.4.14/Documentation/dvb/ |
D | technisat.txt | 51 c.) => "ISL6421 SEC controller" 56 c.) => "ISL6421 SEC controller"
|
/linux-4.4.14/drivers/media/dvb-frontends/ |
D | Kconfig | 718 comment "SEC control devices for DVB-S" 724 tristate "LNBH25 SEC controller" 728 An SEC control chip. 732 tristate "LNBP21/LNBH24 SEC controllers" 736 An SEC control chips. 739 tristate "LNBP22 SEC controllers" 749 tristate "ISL6405 SEC controller" 753 An SEC control chip. 756 tristate "ISL6421 SEC controller" 760 An SEC control chip. [all …]
|
/linux-4.4.14/drivers/staging/lustre/lustre/include/ |
D | lprocfs_status.h | 278 OPC_RANGE(SEC) + in opcode_offset() 291 OPC_RANGE(SEC) + in opcode_offset() 312 OPC_RANGE(SEC) + \ 314 OPC_RANGE(SEC) + \
|
/linux-4.4.14/drivers/crypto/caam/ |
D | Kconfig | 6 and Assurance Module (CAAM), also known as the SEC version 4 (SEC4).
|
/linux-4.4.14/arch/powerpc/boot/dts/ |
D | haleakala.dts | 96 0x6 0x4>; /* ECC SEC Error */
|
D | obs600.dts | 110 0x6 0x4>; /* ECC SEC Error */
|
D | makalu.dts | 97 0x6 0x4 /* ECC SEC Error */ >;
|
D | kilauea.dts | 106 0x6 0x4>; /* ECC SEC Error */
|
/linux-4.4.14/drivers/net/ethernet/intel/e1000e/ |
D | mac.c | 376 er32(SEC); in e1000e_clear_hw_cntrs_base()
|
/linux-4.4.14/arch/blackfin/mach-bf609/ |
D | Kconfig | 13 int "SEC interrupt priority levels"
|
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/device/ |
D | base.c | 2130 _(SEC , device->sec , device->sec); in nvkm_device_engine()
|
/linux-4.4.14/drivers/net/ethernet/intel/e1000/ |
D | e1000_hw.c | 4704 temp = er32(SEC); in e1000_clear_hw_cntrs()
|
D | e1000_main.c | 3649 adapter->stats.sec += er32(SEC); in e1000_update_stats()
|
/linux-4.4.14/ |
D | CREDITS | 3584 S: 2F 14 ALY 31 LN 166 SEC 1 SHIH-PEI RD
|