| /linux/drivers/infiniband/hw/usnic/ |
| H A D | usnic_uiom.c | 84 static int usnic_uiom_get_pages(unsigned long addr, size_t size, int writable, in usnic_uiom_get_pages() argument 134 if (writable) in usnic_uiom_get_pages() 215 int writable = 0; in __usnic_uiom_reg_release() local 229 writable = 1; in __usnic_uiom_reg_release() 234 usnic_uiom_put_pages(&uiomr->chunk_list, dirty & writable); in __usnic_uiom_reg_release() 253 flags |= (uiomr->writable) ? IOMMU_WRITE : 0; in usnic_uiom_map_sorted_intervals() 330 int writable, int dmasync) in usnic_uiom_reg_get() argument 343 * Hence, make all entries to be writable. in usnic_uiom_reg_get() 345 writable = 1; in usnic_uiom_reg_get() 360 uiomr->writable = writable; in usnic_uiom_reg_get() [all …]
|
| /linux/tools/testing/selftests/net/ |
| H A D | netns-sysctl.sh | 23 # check that this is writable in a netns 25 fail "$sc isn't writable in the init netns!" 35 # check that this isn't writable in a netns 37 fail "$sc is writable in a netns!"
|
| /linux/Documentation/virt/kvm/ |
| H A D | locking.rst | 80 What we use to avoid all the races is the Host-writable bit and MMU-writable bit 83 - Host-writable means the gfn is writable in the host kernel page tables and in 85 - MMU-writable means the gfn is writable in the guest's mmu and it is not 145 - The pfn is writable and therefore it cannot be shared between different gfns 157 writable between reading spte and updating spte. Like below case: 206 If the spte is updated from writable to read-only, we should flush all TLBs, 208 writable spte might be cached on a CPU's TLB. 210 As mentioned before, the spte can be updated to writable out of mmu-lock on
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_module_attach.c | 34 struct bpf_testmod_test_writable_ctx *writable) 36 raw_tp_writable_bare_in_val = writable->val; in BPF_PROG() argument 37 writable->early_ret = raw_tp_writable_bare_early_ret; in BPF_PROG() 38 writable->val = raw_tp_writable_bare_out_val; in BPF_PROG()
|
| /linux/security/loadpin/ |
| H A D | loadpin.c | 81 static void report_writable(struct super_block *mnt_sb, bool writable) in report_writable() argument 87 writable ? "writable" : "read-only"); in report_writable() 89 pr_info("mnt_sb lacks block device, treating as: writable\n"); in report_writable() 91 if (!writable) in report_writable() 101 bool writable = true; in sb_is_writable() local 104 writable = !bdev_read_only(mnt_sb->s_bdev); in sb_is_writable() 106 return writable; in sb_is_writable()
|
| /linux/include/linux/ |
| H A D | execmem.h | 75 * after it was temporarily remapped as writable. Relies on architecture 152 * execmem_alloc_rw - allocate writable executable memory 162 * Forces writable permissions on the allocated memory and the caller is 167 * will be used as they must be writable. 197 * Return: %true if the @type is read-only, %false if it's writable
|
| /linux/tools/lib/subcmd/ |
| H A D | run-command.h | 26 * .in: returns the writable pipe end; parent writes to it, 29 * it, the writable pipe end becomes child's stdout/stderr 34 * .out: a writable FD, becomes child's stdout/stderr
|
| /linux/Documentation/mm/ |
| H A D | overcommit-accounting.rst | 58 | PRIVATE WRITABLE - size of mapping per instance 63 | PRIVATE WRITABLE - size of mapping per instance 66 | Pages made writable copies by mmap
|
| /linux/net/ |
| H A D | sysctl_net.c | 137 /* If it's not writable inside the netns, then it can't hurt. */ in ensure_safe_net_sysctl() 139 pr_debug(" Not writable by anyone\n"); in ensure_safe_net_sysctl() 152 /* If it is writable and points to kernel/module global in ensure_safe_net_sysctl() 158 /* Make it "safe" by dropping writable perms */ in ensure_safe_net_sysctl()
|
| /linux/Documentation/security/ |
| H A D | self-protection.rst | 37 APIs hard to use incorrectly, minimizing the areas of writable kernel 43 When all of kernel memory is writable, it becomes trivial for attacks 47 Executable code and read-only data must not be writable 50 Any areas of the kernel with executable memory must not be writable. 56 made writable during the update, and then returned to the original 61 writable, data is not executable, and read-only data is neither writable 70 Function pointers and sensitive variables must not be writable
|
| /linux/arch/powerpc/kvm/ |
| H A D | e500_mmu_host.c | 48 static inline u32 e500_shadow_mas3_attrib(u32 mas3, bool writable, int usermode) in e500_shadow_mas3_attrib() argument 53 if (!writable) in e500_shadow_mas3_attrib() 251 bool writable) in kvmppc_e500_tlbe_setup() argument 255 if (writable) in kvmppc_e500_tlbe_setup() 309 bool writable = !!(tlbe->flags & E500_TLB_WRITABLE); in kvmppc_e500_setup_stlbe() local 317 e500_shadow_mas3_attrib(gtlbe->mas7_3, writable, pr); in kvmppc_e500_setup_stlbe() 338 bool writable = false; in kvmppc_e500_shadow_map() local 355 pfn = __kvm_faultin_pfn(slot, gfn, FOLL_WRITE, &writable, &page); in kvmppc_e500_shadow_map() 455 kvmppc_e500_tlbe_setup(tlbe, gtlbe, pfn, wimg, writable); in kvmppc_e500_shadow_map() 458 writable = tlbe_is_writable(stlbe); in kvmppc_e500_shadow_map() [all …]
|
| /linux/tools/testing/selftests/kvm/arm64/ |
| H A D | set_id_regs.c | 455 /* Get writable masks for feature ID registers */ in test_vm_ftr_id_regs() 476 /* Make sure the feature field is writable */ in test_vm_ftr_id_regs() 505 /* Get writable masks for feature ID registers */ in test_user_set_mpam_reg() 512 ksft_test_result_skip("ID_AA64PFR0_EL1.MPAM is officially writable, nothing to test\n"); in test_user_set_mpam_reg() 533 ksft_test_result_skip("ID_AA64PFR0_EL1.MPAM is not writable, nothing to test\n"); in test_user_set_mpam_reg() 535 ksft_test_result_pass("ID_AA64PFR0_EL1.MPAM=1 was writable\n"); in test_user_set_mpam_reg() 549 ksft_test_result_skip("ID_AA64PFR1_EL1.MPAM_frac is officially writable, nothing to test\n"); in test_user_set_mpam_reg() 570 ksft_test_result_skip("ID_AA64PFR1_EL1.MPAM_frac is not writable, nothing to test\n"); in test_user_set_mpam_reg() 572 ksft_test_result_pass("ID_AA64PFR0_EL1.MPAM_frac=1 was writable\n"); in test_user_set_mpam_reg() 603 /* Get writable mask in test_user_set_mte_reg() [all...] |
| /linux/drivers/net/arcnet/ |
| H A D | com9026.h | 7 #define COM9026_REG_W_INTMASK 0 /* writable */ 9 #define COM9026_REG_W_COMMAND 1 /* writable, returns random vals on read (?) */
|
| /linux/include/crypto/ |
| H A D | if_alg.h | 200 * @return true => writable, false => not writable 226 * @return true => writable, false => not writable
|
| /linux/drivers/virt/acrn/ |
| H A D | mm.c | 180 bool writable; in acrn_vm_ram_map() local 200 writable = args.writable; in acrn_vm_ram_map() 203 /* Disallow write access if the PTE is not writable. */ in acrn_vm_ram_map() 204 if (!writable && in acrn_vm_ram_map()
|
| /linux/arch/riscv/include/asm/ |
| H A D | xip_fixup.h | 28 * writable section, the VMA is increased while LMA remains the same. 33 * reads the "writable" section at wrong addresses, because VMA is used
|
| /linux/arch/arm/ |
| H A D | Kconfig-nommu | 50 vectors to be mapped to writable memory, say 'n' here. 54 the writable versions located at DRAM_BASE.
|
| /linux/Documentation/admin-guide/mm/ |
| H A D | soft-dirty.rst | 22 Internally, to do this tracking, the writable bit is cleared from PTEs 30 the kernel does is finds this fact out and puts both writable and soft-dirty
|
| /linux/include/uapi/linux/ |
| H A D | pktcdvd.h | 48 #define PACKET_WRITABLE 1 /* pd is writable */ 49 #define PACKET_NWA_VALID 2 /* next writable address valid */
|
| /linux/virt/kvm/ |
| H A D | kvm_mm.h | 41 * If non-NULL, try to get a writable mapping even for a read fault. 42 * Set to true if a writable mapping was obtained.
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-kernel-livepatch | 24 A writable attribute that indicates whether the patched 41 A writable attribute that allows administrator to affect the
|
| /linux/drivers/infiniband/hw/hfi1/ |
| H A D | user_pages.c | 81 bool writable, struct page **pages) in hfi1_acquire_user_pages() argument 84 unsigned int gup_flags = FOLL_LONGTERM | (writable ? FOLL_WRITE : 0); in hfi1_acquire_user_pages()
|
| /linux/Documentation/userspace-api/media/v4l/ |
| H A D | vidioc-g-audioout.rst | 45 Audio outputs have no writable properties. Nevertheless, to select the 47 ``reserved`` array (which in the future may contain writable properties)
|
| /linux/fs/fuse/ |
| H A D | dax.c | 55 bool writable; member 182 struct fuse_dax_mapping *dmap, bool writable, in fuse_setup_one_mapping() argument 202 if (writable) in fuse_setup_one_mapping() 212 dmap->writable = writable; in fuse_setup_one_mapping() 440 bool writable = flags & IOMAP_WRITE; in fuse_setup_new_dax_mapping() local 488 writable, false); in fuse_setup_new_dax_mapping() 542 if (dmap->writable) { in fuse_upgrade_dax_mapping() 568 bool writable = flags & IOMAP_WRITE; in fuse_iomap_begin() local 592 if (writable && !dmap->writable) { in fuse_iomap_begin()
|
| /linux/arch/riscv/kvm/ |
| H A D | vcpu_exit.c | 21 bool writable; in gstage_page_fault() local 28 hva = gfn_to_hva_memslot_prot(memslot, gfn, &writable); in gstage_page_fault() 31 (trap->scause == EXC_STORE_GUEST_PAGE_FAULT && !writable)) { in gstage_page_fault()
|