Home
last modified time | relevance | path

Searched refs:backing (Results 1 – 6 of 6) sorted by relevance

/arch/x86/kernel/cpu/sgx/
Dmain.c160 struct sgx_backing *backing) in __sgx_encl_ewb() argument
168 pginfo.contents = (unsigned long)kmap_local_page(backing->contents); in __sgx_encl_ewb()
169 pginfo.metadata = (unsigned long)kmap_local_page(backing->pcmd) + in __sgx_encl_ewb()
170 backing->pcmd_offset; in __sgx_encl_ewb()
173 set_page_dirty(backing->pcmd); in __sgx_encl_ewb()
174 set_page_dirty(backing->contents); in __sgx_encl_ewb()
177 backing->pcmd_offset)); in __sgx_encl_ewb()
198 struct sgx_backing *backing) in sgx_encl_ewb() argument
216 ret = __sgx_encl_ewb(epc_page, va_slot, backing); in sgx_encl_ewb()
224 ret = __sgx_encl_ewb(epc_page, va_slot, backing); in sgx_encl_ewb()
[all …]
Dencl.h64 struct file *backing; member
111 struct sgx_backing *backing);
112 void sgx_encl_put_backing(struct sgx_backing *backing);
Dencl.c16 struct sgx_backing *backing);
123 struct inode *inode = file_inode(encl->backing); in sgx_encl_truncate_backing_page()
756 if (encl->backing) in sgx_encl_release()
757 fput(encl->backing); in sgx_encl_release()
952 struct address_space *mapping = encl->backing->f_mapping; in sgx_encl_get_backing_page()
972 struct sgx_backing *backing) in __sgx_encl_get_backing() argument
988 backing->contents = contents; in __sgx_encl_get_backing()
989 backing->pcmd = pcmd; in __sgx_encl_get_backing()
990 backing->pcmd_offset = page_pcmd_off & (PAGE_SIZE - 1); in __sgx_encl_get_backing()
1063 struct sgx_backing *backing) in sgx_encl_alloc_backing() argument
[all …]
Dioctl.c64 struct file *backing; in sgx_encl_create() local
77 backing = shmem_file_setup("SGX backing", encl_size + (encl_size >> 5), in sgx_encl_create()
79 if (IS_ERR(backing)) { in sgx_encl_create()
80 ret = PTR_ERR(backing); in sgx_encl_create()
84 encl->backing = backing; in sgx_encl_create()
126 fput(encl->backing); in sgx_encl_create()
127 encl->backing = NULL; in sgx_encl_create()
/arch/
DKconfig1258 backing virtual mappings with real shadow memory, and KASAN_VMALLOC
/arch/arm64/
DKconfig1634 the backing pages as well. This prevents code or read-only data