| /linux/mm/ |
| H A D | page_counter.c | 24 unsigned long protected, old_protected; in propagate_protected_usage() local 30 protected = min(usage, READ_ONCE(c->min)); in propagate_protected_usage() 32 if (protected != old_protected) { in propagate_protected_usage() 33 old_protected = atomic_long_xchg(&c->min_usage, protected); in propagate_protected_usage() 34 delta = protected - old_protected; in propagate_protected_usage() 39 protected = min(usage, READ_ONCE(c->low)); in propagate_protected_usage() 41 if (protected != old_protected) { in propagate_protected_usage() 42 old_protected = atomic_long_xchg(&c->low_usage, protected); in propagate_protected_usage() 43 delta = protected - old_protected; in propagate_protected_usage() 344 unsigned long protected; in effective_protection() local [all …]
|
| /linux/Documentation/mm/ |
| H A D | arch_pgtable_helpers.rst | 51 | pte_wrprotect | Creates a write protected PTE | 73 | ptep_set_wrprotect | Converts into a write protected PTE | 121 | pmd_wrprotect | Creates a write protected PMD | 146 | pmdp_set_wrprotect | Converts into a write protected PMD | 182 | pud_wrprotect | Creates a write protected PUD | 197 | pudp_set_wrprotect | Converts into a write protected PUD | 219 | huge_pte_wrprotect | Creates a write protected HugeTLB | 223 | huge_ptep_set_wrprotect | Converts into a write protected HugeTLB |
|
| /linux/Documentation/pcmcia/ |
| H A D | locking.rst | 62 protected by pcmcia_socket_list_rwsem; 67 The resource_ops and their data are protected by ops_mutex. 69 The "main" struct pcmcia_socket is protected as follows (read-only fields 112 The "main" struct pcmcia_device is protected as follows (read-only fields
|
| /linux/drivers/crypto/ |
| H A D | Kconfig | 79 tristate "Kernel API for protected key handling" 83 for creation and handling of protected keys. Other parts of the 86 The protected key support is distributed into: 90 implementations using protected key. 92 loaded when pckmo support (that is generation of protected keys 100 protected execution environment. 103 API for protected key handling. 110 This is the CCA support handler for deriving protected keys 112 way to make protected keys from clear key values. 118 this option unless you are sure you never need to derive protected [all …]
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 17 KVM to decrypt the protected virtual machine. 19 Based on this data, KVM will make the protected virtual machine known 67 When running in protected virtualization mode, some subcodes will result in 76 Re-IPL into a protected mode is only possible via a detour into non 77 protected mode.
|
| H A D | s390-pv-dump.rst | 11 it. This is especially true when a protected VM runs into trouble as 15 However when dumping a protected VM we need to maintain its
|
| /linux/drivers/pinctrl/intel/ |
| H A D | pinctrl-tangier.h | 39 bool protected; member 55 .protected = true, \
|
| /linux/Documentation/virt/kvm/arm/ |
| H A D | hypercalls.rst | 51 Query the memory protection parameters for a pKVM protected virtual machine. 54 | Presence: | Optional; pKVM protected guests only. | 78 | Presence: | Optional; pKVM protected guests only. | 103 | Presence: | Optional; pKVM protected guests only. | 129 | Presence: | Optional; pKVM protected guests only. |
|
| /linux/Documentation/arch/arm64/ |
| H A D | arm-cca.rst | 24 is split into two. The lower half is protected - any memory that is 35 request that areas of the protected address space are transitioned 48 * All protected RAM described to Linux (by DT or ACPI) must be marked 61 devices. It will transition some protected memory to RIPAS EMPTY and 64 VMM will remove the physical pages from the protected mapping and
|
| /linux/tools/testing/selftests/cgroup/ |
| H A D | memcg_protection.m | 51 protected = min(n, c); % start with nominal variable 52 e = protected * min(1, E / siblings); % normalize overcommit 58 overuse = max(0, c - protected);
|
| /linux/arch/x86/realmode/rm/ |
| H A D | trampoline_32.S | 53 movw $1, %dx # protected mode (PE) bit 54 lmsw %dx # into protected mode
|
| /linux/scripts/kconfig/ |
| H A D | qconf.h | 57 protected: 202 protected: 225 protected: 260 protected:
|
| /linux/arch/powerpc/boot/dts/ |
| H A D | mpc5121ads.dts | 39 protected@0 { 40 label = "protected"; 41 reg = <0x00000000 0x00040000>; // first sector is protected
|
| /linux/drivers/mtd/spi-nor/ |
| H A D | Kconfig | 47 power-up or a reset the flash is software write protected by 65 protected or will be automatically software write protected after
|
| /linux/Documentation/filesystems/ |
| H A D | files.rst | 10 Up until 2.6.12, the file descriptor table has been protected 12 ->file_lock protected accesses to all the file related fields 18 The files (struct file) themselves are protected using 58 2. Reading of the fdtable as described above must be protected
|
| /linux/drivers/clk/sunxi/ |
| H A D | clk-simple-gates.c | 19 const int protected[], in sunxi_simple_gates_setup() argument 68 if (protected[j] == index) in sunxi_simple_gates_setup()
|
| /linux/Documentation/hwmon/ |
| H A D | max20730.rst | 67 write protected; read-write otherwise. 78 degrees C. Read-only if the chip is write protected;
|
| /linux/Documentation/locking/ |
| H A D | preempt-locking.rst | 40 RULE #2: CPU state must be protected. 44 Under preemption, the state of the CPU must be protected. This is arch- 140 is done. They may also be called within a spin-lock protected region, however, 143 are also protected by preemption locks and so may use the versions which do
|
| H A D | seqlock.rst | 35 This mechanism cannot be used if the protected data contains pointers, 107 that it is properly protected. 151 between two copies of protected data. This allows the sequence counter 154 Use seqcount_latch_t when the write side sections cannot be protected
|
| /linux/arch/arm64/kvm/ |
| H A D | Kconfig | 63 If using protected nVHE mode, but cannot afford the associated 67 If unsure, or not using protected nVHE (pKVM), say N.
|
| /linux/arch/powerpc/sysdev/ |
| H A D | mpic.c | 1013 if (mpic->protected && test_bit(hw, mpic->protected)) { in mpic_host_map() 1329 mpic->protected = bitmap_zalloc(intvec_top + 1, GFP_KERNEL); in mpic_alloc() 1330 BUG_ON(mpic->protected == NULL); in mpic_alloc() 1334 __set_bit(psrc[i], mpic->protected); in mpic_alloc() 1615 if (mpic->protected && test_bit(i, mpic->protected)) in mpic_init() 1782 if (unlikely(mpic->protected && test_bit(src, mpic->protected))) { in _mpic_get_one_irq() 1821 if (unlikely(mpic->protected && test_bit(src, mpic->protected))) { in mpic_get_coreint_irq()
|
| /linux/Documentation/fb/ |
| H A D | vesafb.rst | 12 graphics mode. Switching mode later on (in protected mode) is 114 The VESA BIOS provides protected mode interface for changing 129 ypan enable display panning using the VESA protected mode 155 pmipal Use the protected mode interface for palette changes.
|
| /linux/drivers/virt/coco/pkvm-guest/ |
| H A D | Kconfig | 2 bool "Arm pKVM protected guest driver"
|
| /linux/arch/x86/kvm/ |
| H A D | Kconfig | 84 bool "Enable support for KVM software-protected VMs" 89 Enable support for KVM software-protected VMs. Currently, software- 90 protected VMs are purely a development and testing vehicle for 92 software-protected VM will fail miserably.
|
| /linux/tools/memory-model/litmus-tests/ |
| H A D | MP+onceassign+derefonce.litmus | 8 * pre-initialization garbage when it traverses an RCU-protected data
|