Home
last modified time | relevance | path

Searched full:protections (Results 1 – 25 of 53) sorted by relevance

123

/linux/Documentation/core-api/
H A Dprotection-keys.rst8 protections, but without requiring modification of the page tables when an
22 Protections for each key are defined with a per-CPU user-accessible register
27 thread a different set of protections from every other thread.
40 Protections for each key are defined with a per-CPU user-writable system
45 each thread a different set of protections from every other thread.
/linux/drivers/gpu/drm/amd/amdgpu/
H A Dgmc_v7_0.c773 u32 protections = REG_GET_FIELD(status, VM_CONTEXT1_PROTECTION_FAULT_STATUS, in gmc_v7_0_vm_decode_fault() local
774 PROTECTIONS); in gmc_v7_0_vm_decode_fault()
783 protections, vmid, pasid, addr, in gmc_v7_0_vm_decode_fault()
1295 u32 protections = REG_GET_FIELD(status, in gmc_v7_0_process_interrupt() local
1297 PROTECTIONS); in gmc_v7_0_process_interrupt()
1305 info->prot_valid = protections & 0x7 ? true : false; in gmc_v7_0_process_interrupt()
1306 info->prot_read = protections & 0x8 ? true : false; in gmc_v7_0_process_interrupt()
1307 info->prot_write = protections & 0x10 ? true : false; in gmc_v7_0_process_interrupt()
1308 info->prot_exec = protections & 0x20 ? true : false; in gmc_v7_0_process_interrupt()
H A Dgmc_v8_0.c1007 u32 protections = REG_GET_FIELD(status, VM_CONTEXT1_PROTECTION_FAULT_STATUS, in gmc_v8_0_vm_decode_fault() local
1008 PROTECTIONS); in gmc_v8_0_vm_decode_fault()
1017 protections, vmid, pasid, addr, in gmc_v8_0_vm_decode_fault()
1483 u32 protections = REG_GET_FIELD(status, in gmc_v8_0_process_interrupt() local
1485 PROTECTIONS); in gmc_v8_0_process_interrupt()
1493 info->prot_valid = protections & 0x7 ? true : false; in gmc_v8_0_process_interrupt()
1494 info->prot_read = protections & 0x8 ? true : false; in gmc_v8_0_process_interrupt()
1495 info->prot_write = protections & 0x10 ? true : false; in gmc_v8_0_process_interrupt()
1496 info->prot_exec = protections & 0x20 ? true : false; in gmc_v8_0_process_interrupt()
/linux/Documentation/security/
H A Dself-protection.rst149 kind of attack exist, and protections exist to defend against them.
168 important changes need to be made for better protections: moving the
198 While many protections can be considered deterministic (e.g. read-only
199 memory cannot be written to), some protections provide only statistical
/linux/Documentation/mm/
H A Dvmalloced-kernel-stacks.rst89 protections.
92 with PAGE_KERNEL protections.
/linux/Documentation/ABI/removed/
H A Dsysfs-selinux-checkreqprot23 check the actual protections being applied upon mmap/mprotect calls.
/linux/kernel/configs/
H A Dhardening.config93 # Provides some protections against SYN flooding.
/linux/Documentation/admin-guide/LSM/
H A DYama.rst6 protections that are not handled by the core kernel itself. This is
/linux/arch/powerpc/mm/
H A Dpageattr.c124 panic("%s: changing memory protections failed\n", __func__); in __kernel_map_pages()
/linux/arch/x86/kvm/mmu/
H A Dpaging_tmpl.h809 * Treat the guest PTE protections as writable, supervisor-only if this in FNAME()
929 * Drop the SPTE if the new protections result in no effective in FNAME()
961 * There is no need to mark the pfn dirty, as the new protections must in FNAME()
962 * be a subset of the old protections, i.e. synchronizing a SPTE cannot in FNAME()
/linux/include/linux/
H A Dhmm.h86 * same pfn flags, both access protections and the map_order. The caller must
H A Dexecmem.h144 * The memory will have protections defined by architecture for executable
/linux/rust/kernel/sync/
H A Drefcount.rs40 /// NOTE: Usage of this function is discouraged as it can circumvent the protections offered by
/linux/arch/x86/mm/
H A Dpkeys.c97 * Protections are *not* PROT_EXEC, but the mapping in __arch_override_mprotect_pkey()
/linux/arch/x86/mm/pat/
H A Dset_memory.c572 * so the protections for kernel text and identity mappings have to in protect_kernel_text_ro()
1004 * protections. static_protections() guards against !PRESENT, so no in __should_split_large_page()
1013 * enforce static protections. in __should_split_large_page()
1115 pr_warn_once("CPA: Cannot fixup static protections for PUD split\n"); in split_set_pte()
1196 * We use the standard kernel pagetable protections for the new in __split_large_page()
1197 * pagetable protections, the actual ptes set above control the in __split_large_page()
2750 * the address is already mapped) and change its protections. As pfn is in kernel_unmap_pages_in_pgd()
/linux/arch/m68k/include/asm/
H A Dsun3_pgtable.h69 /* Use these fake page-protections on PMDs. */
/linux/Documentation/networking/pse-pd/
H A Dpse-pi.rst299 controller protections.
300 - *PSE Controller Node:* Some protections may be implemented via
/linux/arch/powerpc/mm/book3s64/
H A Dsubpage_prot.c179 * Note that the normal page protections also apply; the subpage
/linux/security/ipe/
H A Dhooks.c74 * its protections via mprotect.
/linux/Documentation/arch/x86/x86_64/
H A Dfsgs.rst19 limits. The limits can be used to enforce address space protections.
/linux/Documentation/arch/x86/
H A Dintel_txt.rst152 - As one of the checks/protections provided by TXT, it makes a copy
/linux/drivers/misc/lkdtm/
H A Drefcount.c386 * protections. Looking at the number of CPU cycles tells the real story
/linux/arch/hexagon/include/asm/
H A Dpgtable.h124 * Aliases for mapping mmap() protection bits to page protections.
/linux/drivers/acpi/acpica/
H A Dhwvalid.c29 * This provides ACPICA with the desired port protections and
/linux/Documentation/admin-guide/
H A Dcgroup-v2.rst44 3-3. Protections
700 .. _cgroupv2-protections-distributor:
702 Protections section in Resource Distribution Models
707 protected levels. Protections can be hard guarantees or best effort
708 soft boundaries. Protections can also be over-committed in which case
712 Protections are in the range [0, max] and defaults to 0, which is
715 As protections can be over-committed, all configuration combinations

123