/linux-6.14.4/drivers/android/ |
D | binder_internal.h | 179 * (protected by @proc->inner_lock) 181 * (protected by @proc->inner_lock) 183 * (protected by binder_dead_nodes_lock) 187 * (protected by @lock) 190 * (protected by @proc->inner_lock if @proc 193 * (protected by @proc->inner_lock if @proc 196 * (protected by @proc->inner_lock if @proc 199 * (protected by @proc->inner_lock while @proc 202 * it is also protected by @lock to provide safety 209 * (protected by @proc->inner_lock if @proc [all …]
|
/linux-6.14.4/mm/ |
D | page_counter.c | 24 unsigned long protected, old_protected; in propagate_protected_usage() local 30 protected = min(usage, READ_ONCE(c->min)); in propagate_protected_usage() 32 if (protected != old_protected) { in propagate_protected_usage() 33 old_protected = atomic_long_xchg(&c->min_usage, protected); in propagate_protected_usage() 34 delta = protected - old_protected; in propagate_protected_usage() 39 protected = min(usage, READ_ONCE(c->low)); in propagate_protected_usage() 41 if (protected != old_protected) { in propagate_protected_usage() 42 old_protected = atomic_long_xchg(&c->low_usage, protected); in propagate_protected_usage() 43 delta = protected - old_protected; in propagate_protected_usage() 228 * page_counter_set_min - set the amount of protected memory [all …]
|
/linux-6.14.4/arch/x86/realmode/rm/ |
D | wakeup.h | 16 u32 pmode_entry; /* Protected mode resume point, 32-bit only */ 18 u32 pmode_cr0; /* Protected mode cr0 */ 19 u32 pmode_cr3; /* Protected mode cr3 */ 20 u32 pmode_cr4; /* Protected mode cr4 */ 21 u32 pmode_efer_low; /* Protected mode EFER */ 24 u32 pmode_misc_en_low; /* Protected mode MISC_ENABLE */
|
/linux-6.14.4/Documentation/virt/kvm/s390/ |
D | s390-pv-boot.rst | 4 s390 (IBM Z) Boot/IPL of Protected VMs 9 The memory of Protected Virtual Machines (PVMs) is not accessible to 17 KVM to decrypt the protected virtual machine. 19 Based on this data, KVM will make the protected virtual machine known 44 Subcode 10: Move into Protected Virtualization mode 67 When running in protected virtualization mode, some subcodes will result in 76 Re-IPL into a protected mode is only possible via a detour into non 77 protected mode.
|
/linux-6.14.4/drivers/crypto/ |
D | Kconfig | 79 tristate "Kernel API for protected key handling" 83 for creation and handling of protected keys. Other parts of the 86 The protected key support is distributed into: 90 implementations using protected key. 92 loaded when pckmo support (that is generation of protected keys 100 protected execution environment. 103 API for protected key handling. 110 This is the CCA support handler for deriving protected keys 112 way to make protected keys from clear key values. 118 this option unless you are sure you never need to derive protected [all …]
|
/linux-6.14.4/arch/s390/kvm/ |
D | pv.c | 3 * Hosting Protected Virtual Machines 37 * struct pv_vm_to_be_destroyed - Represents a protected VM that needs to 41 * @old_gmap_table: the gmap table of the leftover protected VM 42 * @handle: the handle of the leftover protected VM 43 * @stor_var: pointer to the variable storage of the leftover protected VM 44 * @stor_base: address of the base storage of the leftover protected VM 46 * Represents a protected VM that is still registered with the Ultravisor, 203 * kvm_s390_pv_dispose_one_leftover - Clean up one leftover protected VM. 204 * @kvm: the KVM that was associated with this leftover protected VM 205 * @leftover: details about the leftover protected VM that needs a clean up [all …]
|
/linux-6.14.4/include/drm/ |
D | drm_auth.h | 51 * @unique: Unique identifier: e.g. busid. Protected by 56 * @unique_len: Length of unique field. Protected by 61 * @magic_map: Map of used authentication tokens. Protected by 87 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex. 95 * Not used for owners. Protected by &drm_device.mode_config's 103 * List of drm_masters leasing from this one. Protected by 115 * Objects leased to this drm_master. Protected by 127 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex.
|
/linux-6.14.4/drivers/net/wireless/ath/ath10k/ |
D | core.h | 207 /* Protected by data_lock */ 431 /* protected by ar->data_lock */ 524 /* the following are protected by ar->data_lock */ 546 /* protected by conf_mutex */ 549 /* Protected with ar->data_lock */ 552 /* Protected with ar->data_lock */ 582 /* protected by data_lock */ 630 /* For setting VHT peer fixed rate, protected by conf_mutex */ 648 /* Copy Engine register dump, protected by ce-lock */ 665 /* used for crash-dump storage, protected by data-lock */ [all …]
|
/linux-6.14.4/rust/kernel/sync/ |
D | locked_by.rs | 3 //! A wrapper for data protected by a lock that does not wrap it. 11 /// In most cases, data protected by a lock is wrapped by the appropriate lock type, e.g., 14 /// to be protected by the same lock. 98 /// that the right owner is being used to access the protected data. If the owner is freed, the 101 /// because in any case at most one thread (or CPU) can access the protected data at a time. 115 /// Returns a reference to the protected data when the caller provides evidence (via a 119 /// the data protected by the lock without actually holding it. 123 /// Panics if `owner` is different from the data protected by the lock used in 144 /// Returns a mutable reference to the protected data when the caller provides evidence (via a 148 /// matches the data protected by the lock without actually holding it. [all …]
|
/linux-6.14.4/arch/s390/include/uapi/asm/ |
D | pkey.h | 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 94 /* Struct to hold protected key and length info */ 98 __u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */ 146 * Fabricate AES protected key from a CCA AES secure key 152 struct pkey_protkey protkey; /* out: the protected key */ 158 * Fabricate AES protected key from clear key value 163 struct pkey_protkey protkey; /* out: the protected key */ 185 struct pkey_protkey protkey; /* out: the protected key */ 211 * Generate AES random protected key. [all …]
|
/linux-6.14.4/net/mac80211/tests/ |
D | mfp.c | 77 /* protected dual of public action */ 79 .desc = "protected dual: drop unicast from unknown peer", 87 .desc = "protected dual: drop multicast from unknown peer", 95 .desc = "protected dual: drop unicast without MFP", 104 .desc = "protected dual: drop multicast without MFP", 113 .desc = "protected dual: drop undecrypted unicast with MFP", 123 .desc = "protected dual: drop undecrypted multicast with MFP", 133 .desc = "protected dual: accept unicast with MFP", 144 .desc = "protected dual: accept multicast with MFP",
|
/linux-6.14.4/drivers/s390/crypto/ |
D | pkey_pckmo.c | 23 MODULE_DESCRIPTION("s390 protected key PCKMO handler"); 64 * Create a protected key from a clear key value via PCKMO instruction. 163 /* copy created protected key to key buffer including the wkvp block */ in pckmo_clr2protkey() 176 * Verify a raw protected key blob. 196 /* generate a dummy AES 128 protected key */ in pckmo_verify_protkey() 208 PKEY_DBF_ERR("%s protected key WK VP mismatch\n", __func__); in pckmo_verify_protkey() 238 PKEY_DBF_ERR("%s protected key token: unknown keytype %u\n", in pckmo_key2protkey() 300 * Generate a random protected key. 339 /* convert it to a dummy protected key */ in pckmo_gen_protkey() 345 /* replace the key part of the protected key with random bytes */ in pckmo_gen_protkey() [all …]
|
D | pkey_base.h | 32 #define PROTKEYBLOBBUFSIZE 256 /* protected key buffer size used internal */ 36 /* inside view of a generic protected key token */ 40 u8 version; /* should be 0x01 for protected key token */ 44 u8 protkey[]; /* the protected key blob */ 47 /* inside view of a protected AES key token */ 51 u8 version; /* should be 0x01 for protected key token */ 55 u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */ 101 * to the protected key size minus the WK VP length
|
/linux-6.14.4/drivers/virt/vboxguest/ |
D | vboxguest_core.h | 111 * Protected by session_mutex. 116 * Protected by session_mutex. 133 * Protected by session_mutex. 138 * Protected by session_mutex. 167 * Protected by vbg_gdev.session_mutex. 173 * host filter. Protected by vbg_gdev.session_mutex. 184 * host. Protected by vbg_gdev.session_mutex. 189 /** Set on CANCEL_ALL_WAITEVENTS, protected by vbg_devevent_spinlock. */
|
/linux-6.14.4/arch/arm64/include/asm/stacktrace/ |
D | nvhe.h | 7 * 1) Non-protected nVHE mode - the host can directly access the 12 * 2) pKVM (protected nVHE) mode - the host cannot directly access 42 * Conventional (non-protected) nVHE HYP stack unwinder 44 * In non-protected mode, the unwinding is done from kernel proper context
|
/linux-6.14.4/Documentation/arch/arm64/ |
D | arm-cca.rst | 24 is split into two. The lower half is protected - any memory that is 35 request that areas of the protected address space are transitioned 48 * All protected RAM described to Linux (by DT or ACPI) must be marked 61 devices. It will transition some protected memory to RIPAS EMPTY and 64 VMM will remove the physical pages from the protected mapping and
|
/linux-6.14.4/arch/arm64/kvm/hyp/nvhe/ |
D | pkvm.c | 27 * protected KVM is enabled, but for both protected and non-protected VMs. 131 * enabled for protected VMs. 137 /* Protected KVM does not support AArch32 guests. */ in pkvm_check_pvm_cpu_features() 158 * Initialize trap register values in protected mode. 206 * The table of VM entries for protected VMs in hyp. 321 /* No restrictions for non-protected VMs. */ in pkvm_init_features_from_host() 441 * Return a unique handle to the protected VM on success, 453 * Initializing protected state might have failed, yet a malicious in insert_vm_table_entry() 540 * Initialize the hypervisor copy of the protected VM state using the 552 * Return a unique handle to the protected VM on success, [all …]
|
/linux-6.14.4/drivers/pinctrl/intel/ |
D | pinctrl-tangier.h | 32 * @protected: True if family is protected by access 39 bool protected; member 55 .protected = true, \
|
/linux-6.14.4/include/drm/display/ |
D | drm_dp_mst_helper.h | 62 * @input: if this port is an input port. Protected by 64 * @mcs: message capability status - DP 1.2 spec. Protected by 66 * @ddps: DisplayPort Device Plug Status - DP 1.2. Protected by 68 * @pdt: Peer Device Type. Protected by 70 * @ldps: Legacy Device Plug Status. Protected by 72 * @dpcd_rev: DPCD revision of device on this port. Protected by 74 * @num_sdp_streams: Number of simultaneous streams. Protected by 76 * @num_sdp_stream_sinks: Number of stream sinks. Protected by 78 * @full_pbn: Max possible bandwidth for this port. Protected by 81 * @aux: i2c aux transport to talk to device connected to this port, protected [all …]
|
/linux-6.14.4/Documentation/pcmcia/ |
D | locking.rst | 62 protected by pcmcia_socket_list_rwsem; 67 The resource_ops and their data are protected by ops_mutex. 69 The "main" struct pcmcia_socket is protected as follows (read-only fields 112 The "main" struct pcmcia_device is protected as follows (read-only fields
|
/linux-6.14.4/arch/arm64/kvm/ |
D | stacktrace.c | 7 * 1) Non-protected nVHE mode - the host can directly access the 12 * 2) pKVM (protected nVHE) mode - the host cannot directly access 170 * hyp_dump_backtrace - Dump the non-protected nVHE backtrace. 174 * The host can directly access HYP stack pages in non-protected 205 * pkvm_dump_backtrace - Dump the protected nVHE HYP backtrace. 211 * host cannot directly access hypervisor memory in protected
|
/linux-6.14.4/include/linux/ |
D | cgroup-defs.h | 175 * linkage is protected by cgroup_mutex or RCU 219 * Protected by cgroup_mutex. 253 /* internal task count, protected by css_set_lock */ 259 * process of being migrated out or in. Protected by 285 * slot. Protected by css_set_lock 291 * css_set. Protected by css_set_lock. 297 * source or destination. Protected by cgroup_mutex. 308 * on this cset should be migrated to. Protected by cgroup_mutex. 317 /* For RCU-protected deletion */ 387 * Protected by per-cpu cgroup_rstat_cpu_lock. [all …]
|
D | rcupdate.h | 442 * lockdep_assert_in_rcu_read_lock - WARN if not protected by rcu_read_lock() 450 * lockdep_assert_in_rcu_read_lock_bh - WARN if not protected by rcu_read_lock_bh() 460 * lockdep_assert_in_rcu_read_lock_sched - WARN if not protected by rcu_read_lock_sched() 473 * type in effect. Note that regions of code protected by things like 521 * unrcu_pointer - mark a pointer as not being RCU protected 558 * RCU_INITIALIZER() - statically initialize an RCU-protected global variable 564 * rcu_assign_pointer() - assign to RCU-protected pointer 568 * Assigns the specified value to the specified RCU-protected 627 * Return the value of the specified RCU-protected pointer, but omit the 630 * not dereferenced, for example, when testing an RCU-protected pointer [all …]
|
D | srcu.h | 194 * srcu_dereference_check - fetch SRCU-protected pointer for later dereferencing 210 * srcu_dereference - fetch SRCU-protected pointer for later dereferencing 230 * srcu_read_lock - register a new reader for an SRCU-protected structure. 261 * srcu_read_lock_lite - register a new reader for an SRCU-protected structure. 288 * srcu_read_lock_nmisafe - register a new reader for an SRCU-protected structure. 320 * srcu_down_read - register a new reader for an SRCU-protected structure. 348 * srcu_read_unlock - unregister a old reader from an SRCU-protected structure. 364 * srcu_read_unlock_lite - unregister a old reader from an SRCU-protected structure. 380 * srcu_read_unlock_nmisafe - unregister a old reader from an SRCU-protected structure. 404 * srcu_up_read - unregister a old reader from an SRCU-protected structure.
|
/linux-6.14.4/net/ieee802154/ |
D | core.h | 14 /* also protected by devlist_mtx */ 18 /* protected by RTNL only */ 21 /* associated wpan interfaces, protected by rtnl or RCU */
|