| /kernel/linux/linux-4.19/arch/x86/realmode/rm/ |
| D | wakeup.h | 16 u32 pmode_entry; /* Protected mode resume point, 32-bit only */ 18 u32 pmode_cr0; /* Protected mode cr0 */ 19 u32 pmode_cr3; /* Protected mode cr3 */ 20 u32 pmode_cr4; /* Protected mode cr4 */ 21 u32 pmode_efer_low; /* Protected mode EFER */ 24 u32 pmode_misc_en_low; /* Protected mode MISC_ENABLE */
|
| /kernel/linux/linux-5.10/arch/x86/realmode/rm/ |
| D | wakeup.h | 16 u32 pmode_entry; /* Protected mode resume point, 32-bit only */ 18 u32 pmode_cr0; /* Protected mode cr0 */ 19 u32 pmode_cr3; /* Protected mode cr3 */ 20 u32 pmode_cr4; /* Protected mode cr4 */ 21 u32 pmode_efer_low; /* Protected mode EFER */ 24 u32 pmode_misc_en_low; /* Protected mode MISC_ENABLE */
|
| /kernel/linux/linux-5.10/Documentation/virt/kvm/ |
| D | s390-pv-boot.rst | 4 s390 (IBM Z) Boot/IPL of Protected VMs 9 The memory of Protected Virtual Machines (PVMs) is not accessible to 17 KVM to decrypt the protected virtual machine. 19 Based on this data, KVM will make the protected virtual machine known 44 Subcode 10: Move into Protected Virtualization mode 67 When running in protected virtualization mode, some subcodes will result in 76 Re-IPL into a protected mode is only possible via a detour into non 77 protected mode.
|
| /kernel/linux/linux-4.19/mm/ |
| D | page_counter.c | 19 unsigned long protected, old_protected; in propagate_protected_usage() local 27 protected = usage; in propagate_protected_usage() 29 protected = 0; in propagate_protected_usage() 31 old_protected = atomic_long_xchg(&c->min_usage, protected); in propagate_protected_usage() 32 delta = protected - old_protected; in propagate_protected_usage() 39 protected = usage; in propagate_protected_usage() 41 protected = 0; in propagate_protected_usage() 43 old_protected = atomic_long_xchg(&c->low_usage, protected); in propagate_protected_usage() 44 delta = protected - old_protected; in propagate_protected_usage() 206 * page_counter_set_min - set the amount of protected memory [all …]
|
| /kernel/linux/linux-4.19/arch/s390/include/uapi/asm/ |
| D | pkey.h | 24 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 37 /* Struct to hold protected key and length info */ 41 __u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */ 73 * Fabricate protected key from a secure key 79 struct pkey_protkey protkey; /* out: the protected key */ 84 * Fabricate protected key from an clear key value 89 struct pkey_protkey protkey; /* out: the protected key */ 109 struct pkey_protkey protkey; /* out: the protected key */
|
| /kernel/linux/linux-5.10/drivers/net/wireless/ath/ath10k/ |
| D | core.h | 203 /* Protected by data_lock */ 427 /* protected by ar->data_lock */ 520 /* the following are protected by ar->data_lock */ 542 /* protected by conf_mutex */ 545 /* Protected with ar->data_lock */ 548 /* Protected with ar->data_lock */ 578 /* protected by data_lock */ 626 /* For setting VHT peer fixed rate, protected by conf_mutex */ 644 /* Copy Engine register dump, protected by ce-lock */ 661 /* used for crash-dump storage, protected by data-lock */ [all …]
|
| /kernel/linux/linux-5.10/arch/s390/include/uapi/asm/ |
| D | pkey.h | 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 83 /* Struct to hold protected key and length info */ 87 __u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */ 133 * Fabricate AES protected key from a CCA AES secure key 139 struct pkey_protkey protkey; /* out: the protected key */ 144 * Fabricate AES protected key from clear key value 149 struct pkey_protkey protkey; /* out: the protected key */ 169 struct pkey_protkey protkey; /* out: the protected key */ 193 * Generate AES random protected key. [all …]
|
| /kernel/linux/linux-4.19/drivers/net/wireless/ath/ath10k/ |
| D | core.h | 191 /* Protected by data_lock */ 415 /* protected by ar->data_lock */ 475 /* the following are protected by ar->data_lock */ 487 /* protected by conf_mutex */ 490 /* Protected with ar->data_lock */ 513 /* protected by data_lock */ 566 /* Copy Engine register dump, protected by ce-lock */ 583 /* used for crash-dump storage, protected by data-lock */ 606 /* used for tpc-dump storage, protected by data-lock */ 612 /* protected by conf_mutex */ [all …]
|
| /kernel/linux/linux-5.10/mm/ |
| D | page_counter.c | 19 unsigned long protected, old_protected; in propagate_protected_usage() local 28 protected = min(usage, min); in propagate_protected_usage() 29 old_protected = atomic_long_xchg(&c->min_usage, protected); in propagate_protected_usage() 30 delta = protected - old_protected; in propagate_protected_usage() 37 protected = min(usage, low); in propagate_protected_usage() 38 old_protected = atomic_long_xchg(&c->low_usage, protected); in propagate_protected_usage() 39 delta = protected - old_protected; in propagate_protected_usage() 202 * page_counter_set_min - set the amount of protected memory 219 * page_counter_set_low - set the amount of protected memory
|
| /kernel/linux/linux-4.19/drivers/virt/vboxguest/ |
| D | vboxguest_core.h | 111 * Protected by session_mutex. 116 * Protected by session_mutex. 123 * Protected by session_mutex. 128 * Protected by session_mutex. 157 * Protected by vbg_gdev.session_mutex. 163 * host filter. Protected by vbg_gdev.session_mutex. 169 * host. Protected by vbg_gdev.session_mutex. 174 /** Set on CANCEL_ALL_WAITEVENTS, protected by vbg_devevent_spinlock. */
|
| /kernel/linux/linux-5.10/drivers/virt/vboxguest/ |
| D | vboxguest_core.h | 111 * Protected by session_mutex. 116 * Protected by session_mutex. 133 * Protected by session_mutex. 138 * Protected by session_mutex. 167 * Protected by vbg_gdev.session_mutex. 173 * host filter. Protected by vbg_gdev.session_mutex. 184 * host. Protected by vbg_gdev.session_mutex. 189 /** Set on CANCEL_ALL_WAITEVENTS, protected by vbg_devevent_spinlock. */
|
| /kernel/linux/linux-4.19/Documentation/pcmcia/ |
| D | locking.txt | 53 protected by pcmcia_socket_list_rwsem; 58 The resource_ops and their data are protected by ops_mutex. 60 The "main" struct pcmcia_socket is protected as follows (read-only fields 99 The "main" struct pcmcia_device is protected as follows (read-only fields
|
| /kernel/linux/linux-5.10/include/drm/ |
| D | drm_dp_mst_helper.h | 68 * @input: if this port is an input port. Protected by 70 * @mcs: message capability status - DP 1.2 spec. Protected by 72 * @ddps: DisplayPort Device Plug Status - DP 1.2. Protected by 74 * @pdt: Peer Device Type. Protected by 76 * @ldps: Legacy Device Plug Status. Protected by 78 * @dpcd_rev: DPCD revision of device on this port. Protected by 80 * @num_sdp_streams: Number of simultaneous streams. Protected by 82 * @num_sdp_stream_sinks: Number of stream sinks. Protected by 84 * @full_pbn: Max possible bandwidth for this port. Protected by 87 * @aux: i2c aux transport to talk to device connected to this port, protected [all …]
|
| D | drm_auth.h | 75 * @unique: Unique identifier: e.g. busid. Protected by 80 * @unique_len: Length of unique field. Protected by 85 * @magic_map: Map of used authentication tokens. Protected by 93 * at the top of the tree (for which lessor is NULL). Protected by
|
| /kernel/linux/linux-4.19/arch/s390/include/asm/ |
| D | pkey.h | 47 * @param protkey pointer to buffer receiving the protected key and 56 * Derive (AES) protected key from a given clear key value. 59 * @param protkey pointer to buffer receiving the protected key and 82 * Find card and transform secure key to protected key. 84 * @param protkey pointer to buffer receiving the protected key and
|
| /kernel/linux/linux-5.10/Documentation/pcmcia/ |
| D | locking.rst | 62 protected by pcmcia_socket_list_rwsem; 67 The resource_ops and their data are protected by ops_mutex. 69 The "main" struct pcmcia_socket is protected as follows (read-only fields 112 The "main" struct pcmcia_device is protected as follows (read-only fields
|
| /kernel/linux/linux-4.19/net/ieee802154/ |
| D | core.h | 14 /* also protected by devlist_mtx */ 18 /* protected by RTNL only */ 21 /* associated wpan interfaces, protected by rtnl or RCU */
|
| /kernel/linux/linux-5.10/net/ieee802154/ |
| D | core.h | 14 /* also protected by devlist_mtx */ 18 /* protected by RTNL only */ 21 /* associated wpan interfaces, protected by rtnl or RCU */
|
| /kernel/linux/linux-4.19/arch/x86/kernel/ |
| D | umip.c | 2 * umip.c Emulation for instruction protected by the Intel User-Mode 27 * the UMIP-protected instructions (in the form of a SIGSEGV signal), it can be 38 * The instructions protected by UMIP can be split in two groups. Those which 107 * UMIP-protected instructions. Thus, the printed text is prepended with the 137 * identify_insn() - Identify a UMIP-protected instruction 140 * From the opcode and ModRM.reg in @insn identify, if any, a UMIP-protected 145 * On success, a constant identifying a specific UMIP-protected instruction that 148 * -EINVAL on error or when not an UMIP-protected instruction that can be 193 * Emulate an instruction protected by UMIP and provide a dummy result. The 330 * use. This is true in protected mode (if the process defined a local in fixup_umip_exception() [all …]
|
| /kernel/linux/linux-5.10/arch/x86/kernel/ |
| D | umip.c | 2 * umip.c Emulation for instruction protected by the User-Mode Instruction 27 * the UMIP-protected instructions (in the form of a SIGSEGV signal), it can be 38 * The instructions protected by UMIP can be split in two groups. Those which 107 * UMIP-protected instructions. Thus, the printed text is prepended with the 137 * identify_insn() - Identify a UMIP-protected instruction 140 * From the opcode and ModRM.reg in @insn identify, if any, a UMIP-protected 145 * On success, a constant identifying a specific UMIP-protected instruction that 148 * -EINVAL on error or when not an UMIP-protected instruction that can be 194 * Emulate an instruction protected by UMIP and provide a dummy result. The 353 * is protected by a memory protection key. Give up on emulation in fixup_umip_exception()
|
| /kernel/linux/linux-4.19/include/drm/ |
| D | drm_auth.h | 69 * @unique: Unique identifier: e.g. busid. Protected by 74 * @unique_len: Length of unique field. Protected by 79 * @magic_map: Map of used authentication tokens. Protected by 88 * at the top of the tree (for which lessor is NULL). Protected by
|
| /kernel/linux/linux-4.19/Documentation/RCU/ |
| D | arrayRCU.txt | 13 Each of these three situations involves an RCU-protected pointer to an 16 case is -not- supported. The problem with RCU-protected indexes into 19 are far more trouble than they are worth. If RCU-protected indexes into 24 That aside, each of the three RCU-protected pointer situations are 31 has a linked-list hash chain. Each hash chain can be protected by RCU
|
| D | checklist.txt | 62 As a rough rule of thumb, any dereference of an RCU-protected 68 Letting RCU-protected pointers "leak" out of an RCU read-side 83 an RCU-protected list. Alternatively, use the other 84 RCU-protected data structures that have been added to 134 code know exactly which pointers are protected by RCU. 174 in their respective types of RCU-protected lists. 177 type of RCU-protected linked lists. 259 used by the RCU-protected data structure, including 308 critical section or must be protected by appropriate update-side 328 all currently executing rcu_read_lock()-protected RCU read-side [all …]
|
| /kernel/linux/linux-4.19/include/linux/ |
| D | rcupdate.h | 366 * RCU_INITIALIZER() - statically initialize an RCU-protected global variable 372 * rcu_assign_pointer() - assign to RCU-protected pointer 376 * Assigns the specified value to the specified RCU-protected 433 * Return the value of the specified RCU-protected pointer, but omit the 436 * not dereferenced, for example, when testing an RCU-protected pointer 480 * which pointers are protected by RCU and checks that the pointer is 521 * Return the value of the specified RCU-protected pointer, but omit 529 * when protected only by rcu_read_lock() will result in infrequent 537 * rcu_dereference() - fetch RCU-protected pointer for dereferencing 545 * rcu_dereference_bh() - fetch an RCU-bh-protected pointer for dereferencing [all …]
|
| /kernel/linux/linux-5.10/Documentation/RCU/ |
| D | arrayRCU.rst | 15 Each of these three situations involves an RCU-protected pointer to an 18 case is **not** supported. The problem with RCU-protected indexes into 21 are far more trouble than they are worth. If RCU-protected indexes into 26 That aside, each of the three RCU-protected pointer situations are 35 has a linked-list hash chain. Each hash chain can be protected by RCU
|