| /linux/Documentation/core-api/ |
| H A D | protection-keys.rst | 8 protections, but without requiring modification of the page tables when an 22 Protections for each key are defined with a per-CPU user-accessible register 27 thread a different set of protections from every other thread. 40 Protections for each key are defined with a per-CPU user-writable system 45 each thread a different set of protections from every other thread.
|
| /linux/drivers/gpu/drm/amd/amdgpu/ |
| H A D | gmc_v7_0.c | 773 u32 protections = REG_GET_FIELD(status, VM_CONTEXT1_PROTECTION_FAULT_STATUS, in gmc_v7_0_vm_decode_fault() local 774 PROTECTIONS); in gmc_v7_0_vm_decode_fault() 783 protections, vmid, pasid, addr, in gmc_v7_0_vm_decode_fault() 1295 u32 protections = REG_GET_FIELD(status, in gmc_v7_0_process_interrupt() local 1297 PROTECTIONS); in gmc_v7_0_process_interrupt() 1305 info->prot_valid = protections & 0x7 ? true : false; in gmc_v7_0_process_interrupt() 1306 info->prot_read = protections & 0x8 ? true : false; in gmc_v7_0_process_interrupt() 1307 info->prot_write = protections & 0x10 ? true : false; in gmc_v7_0_process_interrupt() 1308 info->prot_exec = protections & 0x20 ? true : false; in gmc_v7_0_process_interrupt()
|
| H A D | gmc_v8_0.c | 1007 u32 protections = REG_GET_FIELD(status, VM_CONTEXT1_PROTECTION_FAULT_STATUS, in gmc_v8_0_vm_decode_fault() local 1008 PROTECTIONS); in gmc_v8_0_vm_decode_fault() 1017 protections, vmid, pasid, addr, in gmc_v8_0_vm_decode_fault() 1483 u32 protections = REG_GET_FIELD(status, in gmc_v8_0_process_interrupt() local 1485 PROTECTIONS); in gmc_v8_0_process_interrupt() 1493 info->prot_valid = protections & 0x7 ? true : false; in gmc_v8_0_process_interrupt() 1494 info->prot_read = protections & 0x8 ? true : false; in gmc_v8_0_process_interrupt() 1495 info->prot_write = protections & 0x10 ? true : false; in gmc_v8_0_process_interrupt() 1496 info->prot_exec = protections & 0x20 ? true : false; in gmc_v8_0_process_interrupt()
|
| /linux/Documentation/security/ |
| H A D | self-protection.rst | 149 kind of attack exist, and protections exist to defend against them. 168 important changes need to be made for better protections: moving the 198 While many protections can be considered deterministic (e.g. read-only 199 memory cannot be written to), some protections provide only statistical
|
| /linux/Documentation/mm/ |
| H A D | vmalloced-kernel-stacks.rst | 89 protections. 92 with PAGE_KERNEL protections.
|
| /linux/Documentation/ABI/removed/ |
| H A D | sysfs-selinux-checkreqprot | 23 check the actual protections being applied upon mmap/mprotect calls.
|
| /linux/kernel/configs/ |
| H A D | hardening.config | 93 # Provides some protections against SYN flooding.
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | Yama.rst | 6 protections that are not handled by the core kernel itself. This is
|
| /linux/arch/powerpc/mm/ |
| H A D | pageattr.c | 124 panic("%s: changing memory protections failed\n", __func__); in __kernel_map_pages()
|
| /linux/arch/x86/kvm/mmu/ |
| H A D | paging_tmpl.h | 809 * Treat the guest PTE protections as writable, supervisor-only if this in FNAME() 929 * Drop the SPTE if the new protections result in no effective in FNAME() 961 * There is no need to mark the pfn dirty, as the new protections must in FNAME() 962 * be a subset of the old protections, i.e. synchronizing a SPTE cannot in FNAME()
|
| /linux/include/linux/ |
| H A D | hmm.h | 86 * same pfn flags, both access protections and the map_order. The caller must
|
| H A D | execmem.h | 144 * The memory will have protections defined by architecture for executable
|
| /linux/rust/kernel/sync/ |
| H A D | refcount.rs | 40 /// NOTE: Usage of this function is discouraged as it can circumvent the protections offered by
|
| /linux/arch/x86/mm/ |
| H A D | pkeys.c | 97 * Protections are *not* PROT_EXEC, but the mapping in __arch_override_mprotect_pkey()
|
| /linux/arch/x86/mm/pat/ |
| H A D | set_memory.c | 572 * so the protections for kernel text and identity mappings have to in protect_kernel_text_ro() 1004 * protections. static_protections() guards against !PRESENT, so no in __should_split_large_page() 1013 * enforce static protections. in __should_split_large_page() 1115 pr_warn_once("CPA: Cannot fixup static protections for PUD split\n"); in split_set_pte() 1196 * We use the standard kernel pagetable protections for the new in __split_large_page() 1197 * pagetable protections, the actual ptes set above control the in __split_large_page() 2750 * the address is already mapped) and change its protections. As pfn is in kernel_unmap_pages_in_pgd()
|
| /linux/arch/m68k/include/asm/ |
| H A D | sun3_pgtable.h | 69 /* Use these fake page-protections on PMDs. */
|
| /linux/Documentation/networking/pse-pd/ |
| H A D | pse-pi.rst | 299 controller protections. 300 - *PSE Controller Node:* Some protections may be implemented via
|
| /linux/arch/powerpc/mm/book3s64/ |
| H A D | subpage_prot.c | 179 * Note that the normal page protections also apply; the subpage
|
| /linux/security/ipe/ |
| H A D | hooks.c | 74 * its protections via mprotect.
|
| /linux/Documentation/arch/x86/x86_64/ |
| H A D | fsgs.rst | 19 limits. The limits can be used to enforce address space protections.
|
| /linux/Documentation/arch/x86/ |
| H A D | intel_txt.rst | 152 - As one of the checks/protections provided by TXT, it makes a copy
|
| /linux/drivers/misc/lkdtm/ |
| H A D | refcount.c | 386 * protections. Looking at the number of CPU cycles tells the real story
|
| /linux/arch/hexagon/include/asm/ |
| H A D | pgtable.h | 124 * Aliases for mapping mmap() protection bits to page protections.
|
| /linux/drivers/acpi/acpica/ |
| H A D | hwvalid.c | 29 * This provides ACPICA with the desired port protections and
|
| /linux/Documentation/admin-guide/ |
| H A D | cgroup-v2.rst | 44 3-3. Protections 700 .. _cgroupv2-protections-distributor: 702 Protections section in Resource Distribution Models 707 protected levels. Protections can be hard guarantees or best effort 708 soft boundaries. Protections can also be over-committed in which case 712 Protections are in the range [0, max] and defaults to 0, which is 715 As protections can be over-committed, all configuration combinations
|