| /linux/include/linux/ |
| H A D | kcsan-checks.h | 22 #define KCSAN_ACCESS_SCOPED (1 << 4) /* Access is a scoped access. */ 130 /* Scoped access information. */ 145 /* Location where scoped access was set up. */ 157 * kcsan_begin_scoped_access - begin scoped access 159 * Begin scoped access and initialize @sa, which will cause KCSAN to 163 * Scoped accesses are implemented by appending @sa to an internal list for the 177 * kcsan_end_scoped_access - end scoped access 179 * End a scoped access, which will stop KCSAN checking the memory range. 390 * Scoped variant of ASSERT_EXCLUSIVE_WRITER(). 457 * Scoped variant of ASSERT_EXCLUSIVE_ACCESS().
|
| H A D | kcsan.h | 24 int disable_scoped; /* disable scoped access counter */ 52 /* List of scoped accesses; likely to be empty. */ 57 * Scoped access for modeling access reordering to detect missing memory
|
| H A D | uaccess.h | 656 /* Scoped user access */ 673 * __scoped_user_access_begin - Start a scoped user access 734 * Nesting scoped user access into a user access scope is invalid and fails 753 * scoped_user_read_access_size - Start a scoped user read access with given size 764 * scoped_user_read_access - Start a scoped user read access 776 * scoped_user_write_access_size - Start a scoped user write access with given size 787 * scoped_user_write_access - Start a scoped user write access 799 * scoped_user_rw_access_size - Start a scoped user read/write access with given size 810 * scoped_user_rw_access - Start a scoped user read/write access
|
| /linux/Documentation/driver-api/cxl/platform/ |
| H A D | cdat.rst | 21 Device Scoped Memory Affinity Structure (DSMAS) 27 This table is used by Linux in conjunction with the Device Scoped Latency and 44 Device Scoped Latency and Bandwidth Information Structure (DSLBIS) 75 Switch Scoped Latency and Bandwidth Information Structure (SSLBIS)
|
| /linux/security/landlock/ |
| H A D | task.c | 33 * domain_scope_le - Checks domain ordering for scoped ptrace 58 /* @parent is in the scoped hierarchy of @child. */ in domain_scope_le() 178 * is scoped to access @server (i.e. access should be denied), false otherwise. 208 * parent domains are scoped. in domain_is_scoped() 227 * hierarchy. If the client is scoped, the request is in domain_is_scoped()
|
| H A D | access.h | 43 /* Makes sure all scoped rights can be stored. */
|
| H A D | syscalls.c | 107 ruleset_size += sizeof(ruleset_attr.scoped); in build_check_abi() 249 if ((ruleset_attr.scoped | LANDLOCK_MASK_SCOPE) != LANDLOCK_MASK_SCOPE) in SYSCALL_DEFINE3() 255 ruleset_attr.scoped); in SYSCALL_DEFINE3()
|
| /linux/samples/landlock/ |
| H A D | sandboxer.c | 240 if (!(ruleset_attr->scoped & in check_ruleset_scope() 271 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET; in check_ruleset_scope() 273 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_SIGNAL; in check_ruleset_scope() 360 .scoped = LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | in main() 434 ruleset_attr.scoped &= ~(LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | in main()
|
| /linux/samples/rust/ |
| H A D | Kconfig | 77 tristate "Scoped DebugFS Test Module" 80 This option builds the Rust Scoped DebugFS Test module sample.
|
| /linux/tools/testing/selftests/landlock/ |
| H A D | scoped_signal_test.c | 77 * after getting scoped. 107 * domain is not scoped. in TEST_F() 169 * This test ensures that a scoped process cannot send signal out of 170 * scoped domain.
|
| H A D | scoped_test.c | 24 .scoped = scoped_mask, in TEST()
|
| H A D | scoped_common.h | 17 .scoped = scope, in create_scoped_domain()
|
| H A D | audit_test.c | 76 .scoped = LANDLOCK_SCOPE_SIGNAL, in TEST_F() 224 .scoped = LANDLOCK_SCOPE_SIGNAL, in TEST_F() 295 .scoped = LANDLOCK_SCOPE_SIGNAL, in FIXTURE_VARIANT_ADD() 452 .scoped = LANDLOCK_SCOPE_SIGNAL, in TEST_F() 535 .scoped = LANDLOCK_SCOPE_SIGNAL, in FIXTURE_TEARDOWN() 682 .scoped = LANDLOCK_SCOPE_SIGNAL, 873 .scoped = LANDLOCK_SCOPE_SIGNAL,
|
| H A D | scoped_abstract_unix_test.c | 71 * parent, when they have scoped domain or no domain. 167 * its child, when they have scoped domain or no domain. 412 * grand child processes when they can have scoped or non-scoped domains. 1020 * the domain is not scoped. in TEST() 1109 /* Child's domain is scoped. */ in TEST()
|
| H A D | sandbox-and-launch.c | 22 .scoped = LANDLOCK_SCOPE_SIGNAL, in main()
|
| /linux/rust/kernel/ |
| H A D | debugfs.rs | 396 let scoped = self.scoped_dir(name); 397 init(data, &scoped); 398 scoped.into_entry() 495 let scoped = ScopedDir::new(name); 496 init(data, &scoped); 497 scoped.into_entry() 372 let scoped = self.scoped_dir(name); scope() localVariable 471 let scoped = ScopedDir::new(name); dir() localVariable
|
| /linux/Documentation/userspace-api/ |
| H A D | landlock.rst | 85 .scoped = 129 ruleset_attr.scoped &= ~(LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | 359 The operations which can be scoped are: 378 If an operation is scoped within a domain, no rules can be added to allow access 685 ``LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET`` to the ``scoped`` ruleset attribute. 692 ``scoped`` ruleset attribute.
|
| /linux/kernel/kcsan/ |
| H A D | core.c | 212 /* Check scoped accesses; never inline because this is a slow-path! */ 568 * 2. Avoid races of scoped accesses from nested interrupts (below). in kcsan_setup_watchpoint() 574 * Avoid races of scoped accesses from nested interrupts (or scheduler). in kcsan_setup_watchpoint() 575 * Assume setting up a watchpoint for a non-scoped (normal) access that in kcsan_setup_watchpoint() 576 * also conflicts with a current scoped access. In a nested interrupt, in kcsan_setup_watchpoint() 577 * which shares the context, it would check a conflicting scoped access. in kcsan_setup_watchpoint() 578 * To avoid, disable scoped access checking. in kcsan_setup_watchpoint()
|
| /linux/security/landlock/errata/ |
| H A D | abi-6.h | 6 * Erratum 2: Scoped signal handling
|
| /linux/include/uapi/linux/ |
| H A D | openat2.h | 36 be scoped inside the dirfd
|
| /linux/tools/include/uapi/linux/ |
| H A D | openat2.h | |
| /linux/Documentation/arch/powerpc/ |
| H A D | ultravisor.rst | 305 scoped page table. But the Hypervisor can provide a hint to the 372 partition-scoped page-table of the SVM. If `dest_gpa` is not shared, 488 scoped page tables for the Hypervisor as well as each of the 490 operates in partition 0 and its partition-scoped page tables 494 scoped and process-scoped page table entries for the Hypervisor
|
| /linux/Documentation/virt/kvm/arm/ |
| H A D | vcpu-features.rst | 27 system. The ID register values may be VM-scoped in KVM, meaning that the
|
| /linux/Documentation/networking/devlink/ |
| H A D | devlink-region.rst | 17 Snapshot identifiers are scoped to the devlink instance, not a region.
|
| /linux/arch/powerpc/kvm/ |
| H A D | book3s_hv_nested.c | 1235 * is == 1 -> Partition scoped translations not associated with pid in kvmhv_emulate_priv_tlbie() 1345 * Performs partition-scoped invalidations for nested guests 1372 * because intermediate partition scoped table in nested guest doesn't in do_h_rpt_invalidate_pat() 1469 /* Are the rc bits set in the L1 partition scoped pte? */ in kvmhv_handle_nested_set_rc() 1555 * translation in the l1 partition-scoped tree, remove the shadow pte in __kvmhv_nested_page_fault() 1580 * means we have no partition scoped translation for that. This means in __kvmhv_nested_page_fault() 1625 /* See if can find translation in our partition scoped tables for L1 */ in __kvmhv_nested_page_fault()
|