/openbmc/linux/drivers/android/ |
H A D | binder_internal.h | 176 * (protected by @proc->inner_lock) 178 * (protected by @proc->inner_lock) 180 * (protected by binder_dead_nodes_lock) 184 * (protected by @lock) 187 * (protected by @proc->inner_lock if @proc 190 * (protected by @proc->inner_lock if @proc 193 * (protected by @proc->inner_lock if @proc 196 * (protected by @proc->inner_lock while @proc 199 * it is also protected by @lock to provide safety 206 * (protected by @proc->inner_lock if @proc [all …]
|
/openbmc/linux/arch/arm64/kvm/hyp/include/nvhe/ |
H A D | fixed_config.h | 25 * The approach taken for protected VMs is to allow features that are: 33 * Allow for protected VMs: 47 * Restrict to the following *unsigned* features for protected VMs: 63 * Allow for protected VMs: 73 * Allow for protected VMs: 87 * Restrict to the following *unsigned* features for protected VMs: 97 * Allow for protected VMs: 115 * Allow for protected VMs: 137 * No support for Scalable Vectors for protected VMs: 144 * No support for debug, including breakpoints, and watchpoints for protected [all …]
|
/openbmc/linux/arch/x86/realmode/rm/ |
H A D | wakeup.h | 16 u32 pmode_entry; /* Protected mode resume point, 32-bit only */ 18 u32 pmode_cr0; /* Protected mode cr0 */ 19 u32 pmode_cr3; /* Protected mode cr3 */ 20 u32 pmode_cr4; /* Protected mode cr4 */ 21 u32 pmode_efer_low; /* Protected mode EFER */ 24 u32 pmode_misc_en_low; /* Protected mode MISC_ENABLE */
|
/openbmc/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv-boot.rst | 4 s390 (IBM Z) Boot/IPL of Protected VMs 9 The memory of Protected Virtual Machines (PVMs) is not accessible to 17 KVM to decrypt the protected virtual machine. 19 Based on this data, KVM will make the protected virtual machine known 44 Subcode 10: Move into Protected Virtualization mode 67 When running in protected virtualization mode, some subcodes will result in 76 Re-IPL into a protected mode is only possible via a detour into non 77 protected mode.
|
/openbmc/linux/arch/s390/kvm/ |
H A D | pv.c | 3 * Hosting Protected Virtual Machines 36 * struct pv_vm_to_be_destroyed - Represents a protected VM that needs to 40 * @old_gmap_table: the gmap table of the leftover protected VM 41 * @handle: the handle of the leftover protected VM 42 * @stor_var: pointer to the variable storage of the leftover protected VM 43 * @stor_base: address of the base storage of the leftover protected VM 45 * Represents a protected VM that is still registered with the Ultravisor, 202 * kvm_s390_pv_dispose_one_leftover - Clean up one leftover protected VM. 203 * @kvm: the KVM that was associated with this leftover protected VM 204 * @leftover: details about the leftover protected VM that needs a clean up [all …]
|
/openbmc/linux/mm/ |
H A D | page_counter.c | 19 unsigned long protected, old_protected; in propagate_protected_usage() local 25 protected = min(usage, READ_ONCE(c->min)); in propagate_protected_usage() 27 if (protected != old_protected) { in propagate_protected_usage() 28 old_protected = atomic_long_xchg(&c->min_usage, protected); in propagate_protected_usage() 29 delta = protected - old_protected; in propagate_protected_usage() 34 protected = min(usage, READ_ONCE(c->low)); in propagate_protected_usage() 36 if (protected != old_protected) { in propagate_protected_usage() 37 old_protected = atomic_long_xchg(&c->low_usage, protected); in propagate_protected_usage() 38 delta = protected - old_protected; in propagate_protected_usage() 204 * page_counter_set_min - set the amount of protected memory [all …]
|
/openbmc/linux/drivers/net/wireless/ath/ath10k/ |
H A D | core.h | 206 /* Protected by data_lock */ 430 /* protected by ar->data_lock */ 523 /* the following are protected by ar->data_lock */ 545 /* protected by conf_mutex */ 548 /* Protected with ar->data_lock */ 551 /* Protected with ar->data_lock */ 581 /* protected by data_lock */ 629 /* For setting VHT peer fixed rate, protected by conf_mutex */ 647 /* Copy Engine register dump, protected by ce-lock */ 664 /* used for crash-dump storage, protected by data-lock */ [all …]
|
/openbmc/u-boot/board/keymile/km83xx/ |
H A D | README.kmeter1 | 67 Un-Protected 5 sectors 73 Protected 5 sectors 77 Un-Protected 1 sectors 79 Un-Protected 1 sectors 85 Protected 1 sectors 87 Protected 1 sectors
|
/openbmc/linux/include/drm/ |
H A D | drm_auth.h | 69 * @unique: Unique identifier: e.g. busid. Protected by 74 * @unique_len: Length of unique field. Protected by 79 * @magic_map: Map of used authentication tokens. Protected by 105 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex. 113 * Not used for owners. Protected by &drm_device.mode_config's 121 * List of drm_masters leasing from this one. Protected by 133 * Objects leased to this drm_master. Protected by 145 * Protected by &drm_device.mode_config's &drm_mode_config.idr_mutex.
|
/openbmc/linux/rust/kernel/sync/ |
H A D | locked_by.rs | 3 //! A wrapper for data protected by a lock that does not wrap it. 11 /// In most cases, data protected by a lock is wrapped by the appropriate lock type, e.g., 14 /// to be protected by the same lock. 95 /// that the right owner is being used to access the protected data. If the owner is freed, the 98 /// because in any case at most one thread (or CPU) can access the protected data at a time. 112 /// Returns a reference to the protected data when the caller provides evidence (via a 116 /// the data protected by the lock without actually holding it. 120 /// Panics if `owner` is different from the data protected by the lock used in 141 /// Returns a mutable reference to the protected data when the caller provides evidence (via a 145 /// matches the data protected by the lock without actually holding it. [all …]
|
H A D | lock.rs | 23 /// - Implementers must ensure that only one thread/CPU may access the protected data once the lock 89 /// The data protected by the lock. 117 /// Acquires the lock and gives the caller access to the data protected by it. 131 /// protected by the lock. 139 // SAFETY: `Guard` is sync when the data protected by the lock is also sync. 159 // SAFETY: The caller owns the lock, so it is safe to deref the protected data. in deref() 166 // SAFETY: The caller owns the lock, so it is safe to deref the protected data. in deref_mut()
|
/openbmc/linux/arch/s390/include/uapi/asm/ |
H A D | pkey.h | 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 88 /* Struct to hold protected key and length info */ 92 __u8 protkey[MAXPROTKEYSIZE]; /* the protected key blob */ 138 * Fabricate AES protected key from a CCA AES secure key 144 struct pkey_protkey protkey; /* out: the protected key */ 149 * Fabricate AES protected key from clear key value 154 struct pkey_protkey protkey; /* out: the protected key */ 174 struct pkey_protkey protkey; /* out: the protected key */ 198 * Generate AES random protected key. [all …]
|
/openbmc/u-boot/include/ |
H A D | spi_flash.h | 41 * 'protected area'. This function checks if this protected area is 45 * @return 0 if no region is write-protected, 1 if a region is 46 * write-protected, -ENOSYS if the driver does not implement this, 97 * 'protected area'. This function checks if this protected area is 101 * @return 0 if no region is write-protected, 1 if a region is 102 * write-protected, -ENOSYS if the driver does not implement this,
|
/openbmc/linux/drivers/virt/vboxguest/ |
H A D | vboxguest_core.h | 111 * Protected by session_mutex. 116 * Protected by session_mutex. 133 * Protected by session_mutex. 138 * Protected by session_mutex. 167 * Protected by vbg_gdev.session_mutex. 173 * host filter. Protected by vbg_gdev.session_mutex. 184 * host. Protected by vbg_gdev.session_mutex. 189 /** Set on CANCEL_ALL_WAITEVENTS, protected by vbg_devevent_spinlock. */
|
/openbmc/linux/arch/arm64/include/asm/stacktrace/ |
H A D | nvhe.h | 7 * 1) Non-protected nVHE mode - the host can directly access the 12 * 2) pKVM (protected nVHE) mode - the host cannot directly access 42 * Conventional (non-protected) nVHE HYP stack unwinder 44 * In non-protected mode, the unwinding is done from kernel proper context
|
/openbmc/linux/drivers/pinctrl/intel/ |
H A D | pinctrl-tangier.h | 32 * @protected: True if family is protected by access 39 bool protected; member 55 .protected = true, \
|
/openbmc/qemu/docs/system/s390x/ |
H A D | protvirt.rst | 1 Protected Virtualization on s390x 4 The memory and most of the registers of Protected Virtual Machines 14 To run PVMs, a machine with the Protected Virtualization feature, as 25 Running a Protected Virtual Machine
|
/openbmc/linux/Documentation/pcmcia/ |
H A D | locking.rst | 62 protected by pcmcia_socket_list_rwsem; 67 The resource_ops and their data are protected by ops_mutex. 69 The "main" struct pcmcia_socket is protected as follows (read-only fields 112 The "main" struct pcmcia_device is protected as follows (read-only fields
|
/openbmc/linux/fs/btrfs/ |
H A D | btrfs_inode.h | 111 * of extent items we've reserved metadata for. Protected by 'lock'. 136 * Protected by 'lock'. 142 * Protected by 'lock'. 148 * Protected by 'lock'. 152 /* A local copy of root's last_log_commit. Protected by 'lock'. */ 159 * only for files. Protected by 'lock'. 177 * is used only for files. Protected by 'lock'. 189 * it needs COW. Protected by 'lock'. 196 * because not all the blocks are written yet. Protected by 'lock'. 224 * Protected by the vfs inode lock. [all …]
|
/openbmc/linux/net/ieee802154/ |
H A D | core.h | 14 /* also protected by devlist_mtx */ 18 /* protected by RTNL only */ 21 /* associated wpan interfaces, protected by rtnl or RCU */
|
/openbmc/linux/arch/arm64/kvm/ |
H A D | stacktrace.c | 7 * 1) Non-protected nVHE mode - the host can directly access the 12 * 2) pKVM (protected nVHE) mode - the host cannot directly access 169 * hyp_dump_backtrace - Dump the non-protected nVHE backtrace. 173 * The host can directly access HYP stack pages in non-protected 204 * pkvm_dump_backtrace - Dump the protected nVHE HYP backtrace. 210 * host cannot directly access hypervisor memory in protected
|
H A D | Kconfig | 62 bool "Protected KVM hypervisor stacktraces" 68 If using protected nVHE mode, but cannot afford the associated 72 If unsure, or not using protected nVHE (pKVM), say N.
|
/openbmc/linux/include/drm/display/ |
H A D | drm_dp_mst_helper.h | 54 * @input: if this port is an input port. Protected by 56 * @mcs: message capability status - DP 1.2 spec. Protected by 58 * @ddps: DisplayPort Device Plug Status - DP 1.2. Protected by 60 * @pdt: Peer Device Type. Protected by 62 * @ldps: Legacy Device Plug Status. Protected by 64 * @dpcd_rev: DPCD revision of device on this port. Protected by 66 * @num_sdp_streams: Number of simultaneous streams. Protected by 68 * @num_sdp_stream_sinks: Number of stream sinks. Protected by 70 * @full_pbn: Max possible bandwidth for this port. Protected by 73 * @aux: i2c aux transport to talk to device connected to this port, protected [all …]
|
/openbmc/linux/include/linux/ |
H A D | srcu.h | 157 * srcu_dereference_check - fetch SRCU-protected pointer for later dereferencing 173 * srcu_dereference - fetch SRCU-protected pointer for later dereferencing 193 * srcu_read_lock - register a new reader for an SRCU-protected structure. 220 * srcu_read_lock_nmisafe - register a new reader for an SRCU-protected structure. 248 * srcu_down_read - register a new reader for an SRCU-protected structure. 276 * srcu_read_unlock - unregister a old reader from an SRCU-protected structure. 292 * srcu_read_unlock_nmisafe - unregister a old reader from an SRCU-protected structure. 316 * srcu_up_read - unregister a old reader from an SRCU-protected structure.
|
/openbmc/linux/drivers/gpu/drm/vc4/ |
H A D | vc4_hdmi.h | 204 * for use by ALSA hooks and interrupt handlers. Protected by @mutex. 210 * on? Protected by @mutex. 216 * the scrambler on? Protected by @mutex. 222 * outside of KMS hooks. Protected by @mutex. 228 * for use outside of KMS hooks. Protected by @mutex.
|