| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 4 s390 (IBM Z) Boot/IPL of Protected VMs 9 The memory of Protected Virtual Machines (PVMs) is not accessible to 17 KVM to decrypt the protected virtual machine. 19 Based on this data, KVM will make the protected virtual machine known 44 Subcode 10: Move into Protected Virtualization mode 67 When running in protected virtualization mode, some subcodes will result in 76 Re-IPL into a protected mode is only possible via a detour into non 77 protected mode.
|
| H A D | s390-pv-dump.rst | 4 s390 (IBM Z) Protected Virtualization dumps 11 it. This is especially true when a protected VM runs into trouble as 15 However when dumping a protected VM we need to maintain its
|
| /linux/include/drm/ |
| H A D | drm_auth.h | 51 * @unique: Unique identifier: e.g. busid. Protected by 56 * @unique_len: Length of unique field. Protected by 61 * @magic_map: Map of used authentication tokens. Protected by 87 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex. 95 * Not used for owners. Protected by &drm_device.mode_config's 103 * List of drm_masters leasing from this one. Protected by 115 * Objects leased to this drm_master. Protected by 127 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex.
|
| /linux/arch/s390/kvm/ |
| H A D | pv.c | 3 * Hosting Protected Virtual Machines 53 * No export is needed also when there is only one protected VM, because the 63 * shared page from a different protected VM will automatically also in should_export_before_import() 198 * struct pv_vm_to_be_destroyed - Represents a protected VM that needs to 202 * @old_gmap_table: the gmap table of the leftover protected VM 203 * @handle: the handle of the leftover protected VM 204 * @stor_var: pointer to the variable storage of the leftover protected VM 205 * @stor_base: address of the base storage of the leftover protected VM 207 * Represents a protected VM that is still registered with the Ultravisor, 364 * kvm_s390_pv_dispose_one_leftover - Clean up one leftover protected VM. [all …]
|
| /linux/arch/s390/include/uapi/asm/ |
| H A D | pkey.h | 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 94 /* Struct to hold protected key and length info */ 98 __u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */ 146 * Fabricate AES protected key from a CCA AES secure key 152 struct pkey_protkey protkey; /* out: the protected key */ 158 * Fabricate AES protected key from clear key value 163 struct pkey_protkey protkey; /* out: the protected key */ 185 struct pkey_protkey protkey; /* out: the protected key */ 211 * Generate AES random protected key. [all …]
|
| /linux/rust/kernel/sync/ |
| H A D | locked_by.rs | 3 //! A wrapper for data protected by a lock that does not wrap it. 11 /// In most cases, data protected by a lock is wrapped by the appropriate lock type, e.g., 14 /// to be protected by the same lock. 98 /// that the right owner is being used to access the protected data. If the owner is freed, the 101 /// because in any case at most one thread (or CPU) can access the protected data at a time. 115 /// Returns a reference to the protected data when the caller provides evidence (via a 119 /// the data protected by the lock without actually holding it. 123 /// Panics if `owner` is different from the data protected by the lock used in 144 /// Returns a mutable reference to the protected data when the caller provides evidence (via a 148 /// matches the data protected by the lock without actually holding it. [all …]
|
| H A D | lock.rs | 29 /// - Implementers must ensure that only one thread/CPU may access the protected data once the lock 117 /// The data protected by the lock. 172 /// Acquires the lock and gives the caller access to the data protected by it. in lock() 184 /// Returns a guard that can be used to access the data protected by the lock if successful. 199 /// protected by the lock. 207 // SAFETY: `Guard` is sync when the data protected by the lock is also sync. 252 /// Returns a pinned mutable reference to the protected data. 283 // SAFETY: The caller owns the lock, so it is safe to deref the protected data. 294 // SAFETY: The caller owns the lock, so it is safe to deref the protected data.
|
| /linux/net/mac80211/tests/ |
| H A D | mfp.c | 77 /* protected dual of public action */ 79 .desc = "protected dual: drop unicast from unknown peer", 87 .desc = "protected dual: drop multicast from unknown peer", 95 .desc = "protected dual: drop unicast without MFP", 104 .desc = "protected dual: drop multicast without MFP", 113 .desc = "protected dual: drop undecrypted unicast with MFP", 123 .desc = "protected dual: drop undecrypted multicast with MFP", 133 .desc = "protected dual: accept unicast with MFP", 144 .desc = "protected dual: accept multicast with MFP",
|
| /linux/drivers/virt/vboxguest/ |
| H A D | vboxguest_core.h | 111 * Protected by session_mutex. 116 * Protected by session_mutex. 133 * Protected by session_mutex. 138 * Protected by session_mutex. 167 * Protected by vbg_gdev.session_mutex. 173 * host filter. Protected by vbg_gdev.session_mutex. 184 * host. Protected by vbg_gdev.session_mutex. 189 /** Set on CANCEL_ALL_WAITEVENTS, protected by vbg_devevent_spinlock. */
|
| /linux/arch/arm64/kernel/ |
| H A D | rsi.c | 71 * protected memory. We should take extra care to ensure that we DO NOT in arm64_rsi_setup_memory() 75 * protected has failed here, then future accesses to the memory are in arm64_rsi_setup_memory() 82 panic("Failed to set memory range to protected: %pa-%pa", in arm64_rsi_setup_memory() 89 * Check if a given PA range is Trusted (e.g., Protected memory, a Trusted Device 93 * protected. 97 * RIPAS_RAM - Memory (RAM), protected by the RMM guarantees. (e.g., Firmware
|
| /linux/Documentation/pcmcia/ |
| H A D | locking.rst | 62 protected by pcmcia_socket_list_rwsem; 67 The resource_ops and their data are protected by ops_mutex. 69 The "main" struct pcmcia_socket is protected as follows (read-only fields 112 The "main" struct pcmcia_device is protected as follows (read-only fields
|
| /linux/include/linux/ |
| H A D | cgroup-defs.h | 211 * linkage is protected by cgroup_mutex or RCU 252 * Protected by cgroup_mutex. 261 * Protected by rstat_base_lock when css is cgroup::self. 262 * Protected by css->ss->rstat_ss_lock otherwise. 296 /* internal task count, protected by css_set_lock */ 302 * process of being migrated out or in. Protected by 328 * slot. Protected by css_set_lock 334 * css_set. Protected by css_set_lock. 340 * source or destination. Protected by cgroup_mutex. 351 * on this cset should be migrated to. Protected by cgroup_mutex. [all …]
|
| H A D | iocontext.h | 57 * - ioc->icq_list and icq->ioc_node are protected by ioc lock. 60 * - ioc->icq_tree and ioc->icq_hint are protected by ioc lock, while icq 61 * itself is protected by q lock. However, both the indexes and icq 106 /* all the fields below are protected by this lock */
|
| /linux/net/ieee802154/ |
| H A D | core.h | 14 /* also protected by devlist_mtx */ 18 /* protected by RTNL only */ 21 /* associated wpan interfaces, protected by rtnl or RCU */
|
| /linux/drivers/gpu/drm/xe/ |
| H A D | xe_vm_types.h | 74 * for migration on a SVM page-fault. The pointer is protected by the 107 * Protected by BO dma-resv lock. Set via DRM_IOCTL_XE_MADVISE. 137 * protected by BO's resv and for userptrs, vm->svm.gpusvm.notifier_lock in 150 * protected by vm->lock, vm->resv and for userptrs, 281 * @rebind_list: list of VMAs that need rebinding. Protected by the 318 * due to no work available. Protected by the vm resv. 333 /** @exec_queues: Manages list of exec queues attached to this VM, protected by lock. */ 387 * Protected by the VM's resv for writing. Opportunistic reading can be done 395 * Protected by the vm's resv. 402 * protected by the vm resv.
|
| /linux/arch/arm64/kvm/hyp/nvhe/ |
| H A D | pkvm.c | 28 * The currently loaded hyp vCPU for each physical CPU. Used in protected mode 29 * for both protected and non-protected VMs. 134 * enabled for protected VMs. 140 /* No AArch32 support for protected guests. */ in pkvm_check_pvm_cpu_features() 161 * Initialize trap register values in protected mode. 175 /* Trust the host for non-protected vcpu features. */ in pkvm_vcpu_init_traps() 220 * A table that tracks all VMs in protected mode. 345 /* CTR_EL0 is always under host control, even for protected VMs. */ in pkvm_init_features_from_host() 351 /* No restrictions for non-protected VM in pkvm_init_features_from_host() [all...] |
| /linux/drivers/mtd/spi-nor/ |
| H A D | Kconfig | 47 power-up or a reset the flash is software write protected by 65 protected or will be automatically software write protected after
|
| /linux/arch/arm64/kvm/ |
| H A D | Kconfig | 93 bool "Protected KVM hypervisor stacktraces" 99 If using protected nVHE mode, but cannot afford the associated 103 If unsure, or not using protected nVHE (pKVM), say N.
|
| /linux/drivers/scsi/elx/libefc/ |
| H A D | efclib.c | 10 * The critical sections protected by the efc's spinlock are quite broad and 15 * means that the entry points into the libefc library are protected by efc 16 * lock. So all the state machine transitions are protected.
|
| /linux/Documentation/filesystems/ |
| H A D | files.rst | 10 Up until 2.6.12, the file descriptor table has been protected 12 ->file_lock protected accesses to all the file related fields 18 The files (struct file) themselves are protected using 58 2. Reading of the fdtable as described above must be protected
|
| /linux/drivers/gpu/drm/vmwgfx/ |
| H A D | vmwgfx_drv.h | 108 * @id: Device id. Protected by @dev_priv::resource_lock. 112 * Protected by resource reserved. 114 * resource. Protected by resource reserved. 116 * @guest_memory_bo: The guest memory buffer if any. Protected by resource 118 * @guest_memory_offset: Offset into the guest memory buffer if any. Protected 125 * @mob_node: Node for the MOB guest memory rbtree. Protected by 127 * @lru_head: List head for the LRU list. Protected by @dev_priv::resource_lock. 128 * @binding_head: List head for the context binding list. Protected by 534 int fence_queue_waiters; /* Protected by waiter_lock */ 535 int goal_queue_waiters; /* Protected by waiter_lock */ [all …]
|
| /linux/Documentation/RCU/ |
| H A D | checklist.rst | 66 As a rough rule of thumb, any dereference of an RCU-protected 84 Letting RCU-protected pointers "leak" out of an RCU read-side 99 an RCU-protected list. Alternatively, use the other 100 RCU-protected data structures that have been added to 153 code know exactly which pointers are protected by RCU. 192 in their respective types of RCU-protected lists. 195 type of RCU-protected linked lists. 302 used by the RCU-protected data structure, including 348 critical section or must be protected by appropriate update-side 494 check that accesses to RCU-protected data structures [all …]
|
| /linux/drivers/gpu/drm/vkms/ |
| H A D | vkms_drv.h | 178 * @crc_pending: Protected by @vkms_output.composer_lock, true when the frame CRC is not computed 180 * @wb_pending: Protected by @vkms_output.composer_lock, true when a writeback frame is requested. 181 * @frame_start: Protected by @vkms_output.composer_lock, saves the frame number before the start 183 * @frame_end: Protected by @vkms_output.composer_lock, saves the last requested frame number. 213 * @composer_enabled: Protected by @lock, true when the VKMS composer is active (crc needed or 215 * @composer_state: Protected by @lock, current state of this VKMS output
|
| /linux/include/net/ |
| H A D | amt.h | 279 /* protected by gnode->lock */ 292 /* Protected by amt_tunnel_list->lock */ 323 /* Protected by RTNL */ 325 /* Protected by RTNL */ 327 /* Protected by RTNL */
|
| /linux/tools/testing/selftests/cgroup/ |
| H A D | memcg_protection.m | 51 protected = min(n, c); % start with nominal variable 52 e = protected * min(1, E / siblings); % normalize overcommit 58 overuse = max(0, c - protected);
|