| /arch/powerpc/platforms/ps3/ |
| A D | spu.c | 112 struct spe_shadow __iomem *shadow; member 124 unsigned long problem, unsigned long ls, unsigned long shadow, in _dump_areas() argument 131 pr_debug("%s:%d: shadow: %lxh\n", func, line, shadow); in _dump_areas() 180 iounmap(spu_pdata(spu)->shadow); in spu_unmap() 194 spu_pdata(spu)->shadow = ioremap_prot(spu_pdata(spu)->shadow_addr, in setup_areas() 197 if (!spu_pdata(spu)->shadow) { in setup_areas() 231 (unsigned long)spu_pdata(spu)->shadow); in setup_areas() 368 while (in_be64(&spu_pdata(spu)->shadow->spe_execution_status) in ps3_create_spu() 514 return in_be64(&spu_pdata(spu)->shadow->mfc_dar_RW); in mfc_dar_get() 524 return in_be64(&spu_pdata(spu)->shadow->mfc_dsisr_RW); in mfc_dsisr_get()
|
| /arch/s390/kvm/ |
| A D | trace-s390.h | 340 TP_PROTO(unsigned long start, unsigned long end, unsigned int shadow), 341 TP_ARGS(start, end, shadow), 346 __field(unsigned int, shadow) 352 __entry->shadow = shadow; 356 __entry->start, __entry->end, __entry->shadow)
|
| A D | gaccess.h | 457 int kvm_s390_shadow_fault(struct kvm_vcpu *vcpu, struct gmap *shadow,
|
| /arch/alpha/include/asm/ |
| A D | mce.h | 26 unsigned long shadow[8]; /* Shadow reg. 8-14, 25 */ member
|
| /arch/x86/mm/ |
| A D | kasan_init_64.c | 320 unsigned long shadow = (unsigned long)kasan_mem_to_shadow((void *)va); in kasan_mem_to_shadow_align_down() local 322 return round_down(shadow, PAGE_SIZE); in kasan_mem_to_shadow_align_down() 327 unsigned long shadow = (unsigned long)kasan_mem_to_shadow((void *)va); in kasan_mem_to_shadow_align_up() local 329 return round_up(shadow, PAGE_SIZE); in kasan_mem_to_shadow_align_up()
|
| /arch/mips/boot/dts/econet/ |
| A D | en751221.dtsi | 41 econet,shadow-interrupts = <7 2>, <8 3>, <13 12>, <30 29>;
|
| /arch/x86/kvm/vmx/ |
| A D | vmx.h | 667 struct vmcs *alloc_vmcs_cpu(bool shadow, int cpu, gfp_t flags); 673 static inline struct vmcs *alloc_vmcs(bool shadow) in alloc_vmcs() argument 675 return alloc_vmcs_cpu(shadow, raw_smp_processor_id(), in alloc_vmcs()
|
| A D | vmx.c | 2859 struct vmcs *alloc_vmcs_cpu(bool shadow, int cpu, gfp_t flags) in alloc_vmcs_cpu() argument 2877 if (shadow) in alloc_vmcs_cpu()
|
| /arch/mips/boot/dts/lantiq/ |
| A D | danube_easy50712.dts | 100 lantiq,shadow = <0xfff>;
|
| /arch/alpha/kernel/ |
| A D | core_mcpcia.c | 459 i, i+1, frame->shadow[i], in mcpcia_print_uncorrectable() 460 frame->shadow[i+1]); in mcpcia_print_uncorrectable()
|
| /arch/um/ |
| A D | Kconfig | 247 This is the offset at which the ~16TB of shadow memory is 250 by 8) amount of space so that the KASAN shadow memory does not conflict
|
| /arch/x86/xen/ |
| A D | enlighten_pv.c | 621 struct desc_struct *shadow = &per_cpu(shadow_tls_desc, cpu).desc[i]; in load_TLS_descriptor() local 626 if (desc_equal(shadow, &t->tls_array[i])) in load_TLS_descriptor() 629 *shadow = t->tls_array[i]; in load_TLS_descriptor()
|
| /arch/mips/include/asm/sn/ |
| A D | ioc3.h | 19 u32 shadow; member
|
| /arch/m68k/q40/ |
| A D | README | 81 shadow ROM.
|
| /arch/openrisc/ |
| A D | Kconfig | 222 bool "Support for shadow gpr files" if !SMP
|
| /arch/x86/include/uapi/asm/ |
| A D | kvm.h | 347 __u8 shadow; member
|
| /arch/arm64/boot/dts/apple/ |
| A D | t600x-die0.dtsi | 94 fault_shadow: fault-shadow@867b {
|
| A D | t8103.dtsi | 843 fault_shadow: fault-shadow@a67b {
|
| A D | t8112.dtsi | 860 fault_shadow: fault-shadow@867b {
|
| /arch/ |
| A D | Kconfig | 712 Shadow Call Stack and implements runtime support for shadow stack 722 uses a shadow stack to protect function return addresses from 731 of shadow stacks in memory, which means an attacker capable of 739 shadow call stack push and pop instructions rather than on the 1459 backing virtual mappings with real shadow memory, and KASAN_VMALLOC
|
| /arch/m68k/fpsp040/ |
| A D | fpsp.h | 137 .set FPSR_SHADOW,LV-64 | fpsr shadow reg
|
| /arch/riscv/ |
| A D | Kconfig | 232 # -Zsanitizer=shadow-call-stack flag. 246 def_bool $(cc-option,-fsanitize=shadow-call-stack)
|
| /arch/arm64/ |
| A D | Kconfig | 296 # -Zsanitizer=shadow-call-stack flag. 1581 def_bool $(cc-option, -fsanitize=shadow-call-stack -ffixed-x18) 2365 bool "Enable shadow call stack dynamically using code patching"
|
| /arch/x86/ |
| A D | Kconfig | 1873 bool "X86 userspace shadow stack" 1885 CPUs supporting shadow stacks were first released in 2020.
|
| /arch/arm/ |
| A D | Kconfig | 801 one is in the shadow of a branch or abort, can lead to a
|