/Linux-v6.1/drivers/android/ |
D | binder_internal.h | 175 * (protected by @proc->inner_lock) 177 * (protected by @proc->inner_lock) 179 * (protected by binder_dead_nodes_lock) 183 * (protected by @lock) 186 * (protected by @proc->inner_lock if @proc 189 * (protected by @proc->inner_lock if @proc 192 * (protected by @proc->inner_lock if @proc 195 * (protected by @proc->inner_lock while @proc 198 * it is also protected by @lock to provide safety 205 * (protected by @proc->inner_lock if @proc [all …]
|
/Linux-v6.1/arch/arm64/kvm/hyp/include/nvhe/ |
D | fixed_config.h | 25 * The approach taken for protected VMs is to allow features that are: 33 * Allow for protected VMs: 44 * Restrict to the following *unsigned* features for protected VMs: 60 * Allow for protected VMs: 70 * Allow for protected VMs: 84 * Restrict to the following *unsigned* features for protected VMs: 94 * Allow for protected VMs: 112 * Allow for protected VMs: 134 * No support for Scalable Vectors for protected VMs: 141 * No support for debug, including breakpoints, and watchpoints for protected [all …]
|
/Linux-v6.1/arch/x86/realmode/rm/ |
D | wakeup.h | 16 u32 pmode_entry; /* Protected mode resume point, 32-bit only */ 18 u32 pmode_cr0; /* Protected mode cr0 */ 19 u32 pmode_cr3; /* Protected mode cr3 */ 20 u32 pmode_cr4; /* Protected mode cr4 */ 21 u32 pmode_efer_low; /* Protected mode EFER */ 24 u32 pmode_misc_en_low; /* Protected mode MISC_ENABLE */
|
/Linux-v6.1/Documentation/virt/kvm/s390/ |
D | s390-pv-boot.rst | 4 s390 (IBM Z) Boot/IPL of Protected VMs 9 The memory of Protected Virtual Machines (PVMs) is not accessible to 17 KVM to decrypt the protected virtual machine. 19 Based on this data, KVM will make the protected virtual machine known 44 Subcode 10: Move into Protected Virtualization mode 67 When running in protected virtualization mode, some subcodes will result in 76 Re-IPL into a protected mode is only possible via a detour into non 77 protected mode.
|
/Linux-v6.1/drivers/net/wireless/ath/ath10k/ |
D | core.h | 205 /* Protected by data_lock */ 429 /* protected by ar->data_lock */ 522 /* the following are protected by ar->data_lock */ 544 /* protected by conf_mutex */ 547 /* Protected with ar->data_lock */ 550 /* Protected with ar->data_lock */ 580 /* protected by data_lock */ 628 /* For setting VHT peer fixed rate, protected by conf_mutex */ 646 /* Copy Engine register dump, protected by ce-lock */ 663 /* used for crash-dump storage, protected by data-lock */ [all …]
|
/Linux-v6.1/mm/ |
D | page_counter.c | 19 unsigned long protected, old_protected; in propagate_protected_usage() local 25 protected = min(usage, READ_ONCE(c->min)); in propagate_protected_usage() 27 if (protected != old_protected) { in propagate_protected_usage() 28 old_protected = atomic_long_xchg(&c->min_usage, protected); in propagate_protected_usage() 29 delta = protected - old_protected; in propagate_protected_usage() 34 protected = min(usage, READ_ONCE(c->low)); in propagate_protected_usage() 36 if (protected != old_protected) { in propagate_protected_usage() 37 old_protected = atomic_long_xchg(&c->low_usage, protected); in propagate_protected_usage() 38 delta = protected - old_protected; in propagate_protected_usage() 204 * page_counter_set_min - set the amount of protected memory [all …]
|
/Linux-v6.1/include/drm/ |
D | drm_auth.h | 69 * @unique: Unique identifier: e.g. busid. Protected by 74 * @unique_len: Length of unique field. Protected by 79 * @magic_map: Map of used authentication tokens. Protected by 105 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex. 113 * Not used for owners. Protected by &drm_device.mode_config's 121 * List of drm_masters leasing from this one. Protected by 133 * Objects leased to this drm_master. Protected by 145 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex.
|
D | drm_file.h | 207 * This client has or had, master capability. Protected by struct 218 * This client is the creator of @master. Protected by struct 229 * Master this node is currently associated with. Protected by struct 264 * &drm_device.filelist. Protected by &drm_device.filelist_mutex. 275 * subsystem. Protected by @table_lock. 304 * Protected by @fbs_lock. Note that the @fbs list holds a reference on 318 * Protected by @drm_mode_config.blob_lock;
|
/Linux-v6.1/arch/s390/include/uapi/asm/ |
D | pkey.h | 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 83 /* Struct to hold protected key and length info */ 87 __u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */ 133 * Fabricate AES protected key from a CCA AES secure key 139 struct pkey_protkey protkey; /* out: the protected key */ 144 * Fabricate AES protected key from clear key value 149 struct pkey_protkey protkey; /* out: the protected key */ 169 struct pkey_protkey protkey; /* out: the protected key */ 193 * Generate AES random protected key. [all …]
|
/Linux-v6.1/drivers/gpu/drm/i915/pxp/ |
D | intel_pxp.c | 17 * PXP (Protected Xe Path) is a feature available in Gen12 and newer platforms. 18 * It allows execution and flip to display of protected (i.e. encrypted) 23 * correctly protected they must be used in conjunction with a context created 27 * Protected objects are tied to a pxp session; currently we only support one 30 * protected objects. 33 * session are marked as invalid and all contexts marked as using protected 138 drm_info(>->i915->drm, "Protected Xe Path (PXP) protected content support initialized\n"); in intel_pxp_init() 274 /* ban all contexts marked as protected */ in intel_pxp_invalidate()
|
/Linux-v6.1/drivers/virt/vboxguest/ |
D | vboxguest_core.h | 111 * Protected by session_mutex. 116 * Protected by session_mutex. 133 * Protected by session_mutex. 138 * Protected by session_mutex. 167 * Protected by vbg_gdev.session_mutex. 173 * host filter. Protected by vbg_gdev.session_mutex. 184 * host. Protected by vbg_gdev.session_mutex. 189 /** Set on CANCEL_ALL_WAITEVENTS, protected by vbg_devevent_spinlock. */
|
/Linux-v6.1/arch/arm64/include/asm/stacktrace/ |
D | nvhe.h | 7 * 1) Non-protected nVHE mode - the host can directly access the 12 * 2) pKVM (protected nVHE) mode - the host cannot directly access 42 * Conventional (non-protected) nVHE HYP stack unwinder 44 * In non-protected mode, the unwinding is done from kernel proper context
|
/Linux-v6.1/include/drm/display/ |
D | drm_dp_mst_helper.h | 54 * @input: if this port is an input port. Protected by 56 * @mcs: message capability status - DP 1.2 spec. Protected by 58 * @ddps: DisplayPort Device Plug Status - DP 1.2. Protected by 60 * @pdt: Peer Device Type. Protected by 62 * @ldps: Legacy Device Plug Status. Protected by 64 * @dpcd_rev: DPCD revision of device on this port. Protected by 66 * @num_sdp_streams: Number of simultaneous streams. Protected by 68 * @num_sdp_stream_sinks: Number of stream sinks. Protected by 70 * @full_pbn: Max possible bandwidth for this port. Protected by 73 * @aux: i2c aux transport to talk to device connected to this port, protected [all …]
|
/Linux-v6.1/Documentation/pcmcia/ |
D | locking.rst | 62 protected by pcmcia_socket_list_rwsem; 67 The resource_ops and their data are protected by ops_mutex. 69 The "main" struct pcmcia_socket is protected as follows (read-only fields 112 The "main" struct pcmcia_device is protected as follows (read-only fields
|
/Linux-v6.1/arch/arm64/kvm/ |
D | stacktrace.c | 7 * 1) Non-protected nVHE mode - the host can directly access the 12 * 2) pKVM (protected nVHE) mode - the host cannot directly access 169 * hyp_dump_backtrace - Dump the non-protected nVHE backtrace. 173 * The host can directly access HYP stack pages in non-protected 204 * pkvm_dump_backtrace - Dump the protected nVHE HYP backtrace. 210 * host cannot directly access hypervisor memory in protected
|
D | Kconfig | 60 bool "Protected KVM hypervisor stacktraces" 66 If using protected nVHE mode, but cannot afford the associated 70 If unsure, or not using protected nVHE (pKVM), say N.
|
/Linux-v6.1/net/ieee802154/ |
D | core.h | 14 /* also protected by devlist_mtx */ 18 /* protected by RTNL only */ 21 /* associated wpan interfaces, protected by rtnl or RCU */
|
/Linux-v6.1/arch/x86/kernel/ |
D | umip.c | 2 * umip.c Emulation for instruction protected by the User-Mode Instruction 27 * the UMIP-protected instructions (in the form of a SIGSEGV signal), it can be 38 * The instructions protected by UMIP can be split in two groups. Those which 107 * UMIP-protected instructions. Thus, the printed text is prepended with the 137 * identify_insn() - Identify a UMIP-protected instruction 140 * From the opcode and ModRM.reg in @insn identify, if any, a UMIP-protected 145 * On success, a constant identifying a specific UMIP-protected instruction that 148 * -EINVAL on error or when not an UMIP-protected instruction that can be 194 * Emulate an instruction protected by UMIP and provide a dummy result. The
|
/Linux-v6.1/Documentation/RCU/ |
D | arrayRCU.rst | 15 Each of these three situations involves an RCU-protected pointer to an 18 case is **not** supported. The problem with RCU-protected indexes into 21 are far more trouble than they are worth. If RCU-protected indexes into 26 That aside, each of the three RCU-protected pointer situations are 35 has a linked-list hash chain. Each hash chain can be protected by RCU
|
D | checklist.rst | 66 As a rough rule of thumb, any dereference of an RCU-protected 77 Letting RCU-protected pointers "leak" out of an RCU read-side 92 an RCU-protected list. Alternatively, use the other 93 RCU-protected data structures that have been added to 141 code know exactly which pointers are protected by RCU. 180 in their respective types of RCU-protected lists. 183 type of RCU-protected linked lists. 278 used by the RCU-protected data structure, including 323 critical section or must be protected by appropriate update-side 445 check that accesses to RCU-protected data [all …]
|
/Linux-v6.1/drivers/gpu/drm/i915/gt/ |
D | intel_context_types.h | 77 * Unless otherwise noted a field can safely be assumed to be protected 156 unsigned int active_count; /* protected by timeline->mutex */ 216 * with the GuC, protected by guc->submission_state.lock 221 * transitioning in and out of zero protected by 227 * still valid, protected by guc->submission_state.lock 235 * GuC), protected by guc->submission_state.lock
|
/Linux-v6.1/drivers/mtd/spi-nor/ |
D | Kconfig | 47 power-up or a reset the flash is software write protected by 65 protected or will be automatically software write protected after
|
/Linux-v6.1/include/linux/ |
D | iocontext.h | 57 * - ioc->icq_list and icq->ioc_node are protected by ioc lock. 60 * - ioc->icq_tree and ioc->icq_hint are protected by ioc lock, while icq 61 * itself is protected by q lock. However, both the indexes and icq 106 /* all the fields below are protected by this lock */
|
/Linux-v6.1/arch/arm64/kvm/hyp/nvhe/ |
D | stacktrace.c | 18 * hyp_prepare_backtrace - Prepare non-protected nVHE backtrace. 23 * Save the information needed by the host to unwind the non-protected 86 * pkvm_save_backtrace_entry - Saves a protected nVHE HYP stacktrace entry 113 * pkvm_save_backtrace - Saves the protected nVHE HYP stacktrace
|
/Linux-v6.1/drivers/gpu/drm/vc4/ |
D | vc4_hdmi.h | 205 * for use by ALSA hooks and interrupt handlers. Protected by @mutex. 211 * on? Protected by @mutex. 217 * the scrambler on? Protected by @mutex. 223 * outside of KMS hooks. Protected by @mutex. 229 * for use outside of KMS hooks. Protected by @mutex.
|