Home
last modified time | relevance | path

Searched full:protected (Results 1 – 25 of 1300) sorted by relevance

12345678910>>...52

/linux/drivers/crypto/
H A DKconfig79 tristate "Kernel API for protected key handling"
83 for creation and handling of protected keys. Other parts of the
86 The protected key support is distributed into:
90 implementations using protected key.
92 loaded when pckmo support (that is generation of protected keys
100 protected execution environment.
103 API for protected key handling.
110 This is the CCA support handler for deriving protected keys
112 way to make protected keys from clear key values.
118 this option unless you are sure you never need to derive protected
[all …]
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst4 s390 (IBM Z) Boot/IPL of Protected VMs
9 The memory of Protected Virtual Machines (PVMs) is not accessible to
17 KVM to decrypt the protected virtual machine.
19 Based on this data, KVM will make the protected virtual machine known
44 Subcode 10: Move into Protected Virtualization mode
67 When running in protected virtualization mode, some subcodes will result in
76 Re-IPL into a protected mode is only possible via a detour into non
77 protected mode.
/linux/arch/s390/kvm/
H A Dpv.c3 * Hosting Protected Virtual Machines
96 * struct pv_vm_to_be_destroyed - Represents a protected VM that needs to
100 * @old_gmap_table: the gmap table of the leftover protected VM
101 * @handle: the handle of the leftover protected VM
102 * @stor_var: pointer to the variable storage of the leftover protected VM
103 * @stor_base: address of the base storage of the leftover protected VM
105 * Represents a protected VM that is still registered with the Ultravisor,
262 * kvm_s390_pv_dispose_one_leftover - Clean up one leftover protected VM.
263 * @kvm: the KVM that was associated with this leftover protected VM
264 * @leftover: details about the leftover protected VM that needs a clean up
[all …]
/linux/drivers/net/wireless/ath/ath10k/
H A Dcore.h209 /* Protected by data_lock */
433 /* protected by ar->data_lock */
526 /* the following are protected by ar->data_lock */
548 /* protected by conf_mutex */
551 /* Protected with ar->data_lock */
554 /* Protected with ar->data_lock */
584 /* protected by data_lock */
632 /* For setting VHT peer fixed rate, protected by conf_mutex */
650 /* Copy Engine register dump, protected by ce-lock */
667 /* used for crash-dump storage, protected b
[all...]
/linux/include/drm/
H A Ddrm_auth.h51 * @unique: Unique identifier: e.g. busid. Protected by
56 * @unique_len: Length of unique field. Protected by
61 * @magic_map: Map of used authentication tokens. Protected by
87 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex.
95 * Not used for owners. Protected by &drm_device.mode_config's
103 * List of drm_masters leasing from this one. Protected by
115 * Objects leased to this drm_master. Protected by
127 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex.
/linux/arch/s390/include/uapi/asm/
H A Dpkey.h24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */
25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */
94 /* Struct to hold protected key and length info */
98 __u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */
146 * Fabricate AES protected key from a CCA AES secure key
152 struct pkey_protkey protkey; /* out: the protected key */
158 * Fabricate AES protected key from clear key value
163 struct pkey_protkey protkey; /* out: the protected key */
185 struct pkey_protkey protkey; /* out: the protected key */
211 * Generate AES random protected key.
[all …]
/linux/rust/kernel/sync/
H A Dlocked_by.rs3 //! A wrapper for data protected by a lock that does not wrap it.
11 /// In most cases, data protected by a lock is wrapped by the appropriate lock type, e.g.,
14 /// to be protected by the same lock.
98 /// that the right owner is being used to access the protected data. If the owner is freed, the
101 /// because in any case at most one thread (or CPU) can access the protected data at a time.
115 /// Returns a reference to the protected data when the caller provides evidence (via a
119 /// the data protected by the lock without actually holding it.
123 /// Panics if `owner` is different from the data protected by the lock used in
144 /// Returns a mutable reference to the protected data when the caller provides evidence (via a
148 /// matches the data protected by the lock without actually holding it.
[all …]
H A Dlock.rs29 /// - Implementers must ensure that only one thread/CPU may access the protected data once the lock
117 /// The data protected by the lock.
171 /// Acquires the lock and gives the caller access to the data protected by it.
182 /// Returns a guard that can be used to access the data protected by the lock if successful.
196 /// protected by the lock.
204 // SAFETY: `Guard` is sync when the data protected by the lock is also sync.
249 /// Returns a pinned mutable reference to the protected data.
279 // SAFETY: The caller owns the lock, so it is safe to deref the protected data. in deref()
289 // SAFETY: The caller owns the lock, so it is safe to deref the protected data. in deref_mut()
/linux/net/mac80211/tests/
H A Dmfp.c77 /* protected dual of public action */
79 .desc = "protected dual: drop unicast from unknown peer",
87 .desc = "protected dual: drop multicast from unknown peer",
95 .desc = "protected dual: drop unicast without MFP",
104 .desc = "protected dual: drop multicast without MFP",
113 .desc = "protected dual: drop undecrypted unicast with MFP",
123 .desc = "protected dual: drop undecrypted multicast with MFP",
133 .desc = "protected dual: accept unicast with MFP",
144 .desc = "protected dual: accept multicast with MFP",
/linux/drivers/virt/vboxguest/
H A Dvboxguest_core.h111 * Protected by session_mutex.
116 * Protected by session_mutex.
133 * Protected by session_mutex.
138 * Protected by session_mutex.
167 * Protected by vbg_gdev.session_mutex.
173 * host filter. Protected by vbg_gdev.session_mutex.
184 * host. Protected by vbg_gdev.session_mutex.
189 /** Set on CANCEL_ALL_WAITEVENTS, protected by vbg_devevent_spinlock. */
/linux/arch/arm64/kernel/
H A Drsi.c70 * protected memory. We should take extra care to ensure that we DO NOT in arm64_rsi_setup_memory()
74 * protected has failed here, then future accesses to the memory are in arm64_rsi_setup_memory()
81 panic("Failed to set memory range to protected: %pa-%pa", in arm64_rsi_setup_memory()
88 * Check if a given PA range is Trusted (e.g., Protected memory, a Trusted Device
92 * protected.
96 * RIPAS_RAM - Memory (RAM), protected by the RMM guarantees. (e.g., Firmware
/linux/drivers/pinctrl/intel/
H A Dpinctrl-tangier.h32 * @protected: True if family is protected by access
39 bool protected; member
55 .protected = true, \
/linux/include/linux/
H A Drcupdate.h436 * lockdep_assert_in_rcu_read_lock - WARN if not protected by rcu_read_lock()
444 * lockdep_assert_in_rcu_read_lock_bh - WARN if not protected by rcu_read_lock_bh()
454 * lockdep_assert_in_rcu_read_lock_sched - WARN if not protected by rcu_read_lock_sched()
467 * type in effect. Note that regions of code protected by things like
515 * unrcu_pointer - mark a pointer as not being RCU protected
552 * RCU_INITIALIZER() - statically initialize an RCU-protected global variable
558 * rcu_assign_pointer() - assign to RCU-protected pointer
562 * Assigns the specified value to the specified RCU-protected
621 * Return the value of the specified RCU-protected pointer, but omit the
624 * not dereferenced, for example, when testing an RCU-protected pointer
[all …]
H A Dcgroup-defs.h209 * linkage is protected by cgroup_mutex or RCU
250 * Protected by cgroup_mutex.
259 * Protected by rstat_base_lock when css is cgroup::self.
260 * Protected by css->ss->rstat_ss_lock otherwise.
294 /* internal task count, protected by css_set_lock */
300 * process of being migrated out or in. Protected by
326 * slot. Protected by css_set_lock
332 * css_set. Protected by css_set_lock.
338 * source or destination. Protected by cgroup_mutex.
349 * on this cset should be migrated to. Protected by cgroup_mutex.
[all …]
H A Dsrcu.h215 * srcu_dereference_check - fetch SRCU-protected pointer for later dereferencing
231 * srcu_dereference - fetch SRCU-protected pointer for later dereferencing
251 * srcu_read_lock - register a new reader for an SRCU-protected structure.
282 * srcu_read_lock_fast - register a new reader for an SRCU-protected structure.
373 * srcu_down_read_fast - register a new reader for an SRCU-protected structure.
393 * srcu_read_lock_nmisafe - register a new reader for an SRCU-protected structure.
425 * srcu_down_read - register a new reader for an SRCU-protected structure.
454 * srcu_read_unlock - unregister a old reader from an SRCU-protected structure.
470 * srcu_read_unlock_fast - unregister a old reader from an SRCU-protected structure.
514 * srcu_up_read_fast - unregister a old reader from an SRCU-protected structure.
[all …]
H A Diocontext.h57 * - ioc->icq_list and icq->ioc_node are protected by ioc lock.
60 * - ioc->icq_tree and ioc->icq_hint are protected by ioc lock, while icq
61 * itself is protected by q lock. However, both the indexes and icq
106 /* all the fields below are protected by this lock */
/linux/Documentation/pcmcia/
H A Dlocking.rst62 protected by pcmcia_socket_list_rwsem;
67 The resource_ops and their data are protected by ops_mutex.
69 The "main" struct pcmcia_socket is protected as follows (read-only fields
112 The "main" struct pcmcia_device is protected as follows (read-only fields
/linux/fs/btrfs/
H A Dbtrfs_inode.h181 * of extent items we've reserved metadata for. Protected by 'lock'.
205 * Protected by 'lock'.
211 * Protected by 'lock'.
217 * Protected by 'lock'.
221 /* A local copy of root's last_log_commit. Protected by 'lock'. */
228 * only for files. Protected by 'lock'.
246 * is used only for files. Protected by 'lock'.
251 * This is used only for directories. Protected by 'log_mutex'.
259 * it needs COW. Protected by 'lock'.
274 * because not all the blocks are written yet. Protected b
[all...]
/linux/arch/s390/crypto/
H A Dphmac_s390.c5 * s390 specific HMAC support for protected keys.
120 /* phmac protected key struct */
133 /* source key material used to derive a protected key from */
137 /* cpacf function code to use with this protected key type */
148 /* if state is valid, pk holds the protected key */
186 * Pkey 'token' struct used to derive a protected key value from a clear key.
310 * Convert the raw key material into a protected key via PKEY api.
340 * (Re-)Convert the raw key material from the tfm ctx into a protected
342 * and the protected key in the tfm context.
346 * order of update. So a fresh converted valid protected key may get
[all …]
/linux/net/ieee802154/
H A Dcore.h14 /* also protected by devlist_mtx */
18 /* protected by RTNL only */
21 /* associated wpan interfaces, protected by rtnl or RCU */
/linux/arch/arm64/kvm/hyp/nvhe/
H A Dpkvm.c26 * The currently loaded hyp vCPU for each physical CPU. Used in protected mode
27 * for both protected and non-protected VMs.
132 * enabled for protected VMs.
138 /* No AArch32 support for protected guests. */ in pkvm_check_pvm_cpu_features()
159 * Initialize trap register values in protected mode.
173 /* Trust the host for non-protected vcpu features. */ in pkvm_vcpu_init_traps()
219 * A table that tracks all VMs in protected mode.
337 /* CTR_EL0 is always under host control, even for protected VMs. */ in pkvm_init_features_from_host()
346 /* No restrictions for non-protected VMs. */ in pkvm_init_features_from_host()
533 * Initializing protected state might have failed, yet a malicious in allocate_vm_table_entry()
[all …]
/linux/arch/x86/kernel/
H A Dumip.c2 * umip.c Emulation for instruction protected by the User-Mode Instruction
27 * the UMIP-protected instructions (in the form of a SIGSEGV signal), it can be
38 * The instructions protected by UMIP can be split in two groups. Those which
107 * UMIP-protected instructions. Thus, the printed text is prepended with the
137 * identify_insn() - Identify a UMIP-protected instruction
140 * From the opcode and ModRM.reg in @insn identify, if any, a UMIP-protected
145 * On success, a constant identifying a specific UMIP-protected instruction that
148 * -EINVAL on error or when not an UMIP-protected instruction that can be
205 * Emulate an instruction protected by UMIP and provide a dummy result. The
/linux/arch/arm64/kvm/
H A DKconfig57 bool "Protected KVM hypervisor stacktraces"
63 If using protected nVHE mode, but cannot afford the associated
67 If unsure, or not using protected nVHE (pKVM), say N.
/linux/drivers/mtd/spi-nor/
H A DKconfig47 power-up or a reset the flash is software write protected by
65 protected or will be automatically software write protected after
/linux/Documentation/security/keys/
H A Dtrusted-encrypted.rst13 Trusted Keys as Protected key
29 In order to protect the key in kernel space, the concept of "protected-keys" is
31 protected keys is encrypted with Key-Encryption-Key(KEK), and decrypted inside
34 protected key, can only be done by the trust source, which generated the
37 Hence, if the protected-key is leaked or compromised, it is of no use to the
40 Trusted keys as protected keys, with trust source having the capability of
166 child key must be protected by a strong access control policy within the
296 Trusted Keys as Protected Keys Usage::
302 where, 'pk' is used to direct trust source to generate protected key.
392 Create and save a trusted key as protected key named "kmk" of length 32 bytes.

12345678910>>...52