Home
last modified time | relevance | path

Searched full:writable (Results 1 – 25 of 498) sorted by relevance

12345678910>>...20

/linux/arch/x86/kvm/mmu/
H A Dspte.h401 * A shadow-present leaf SPTE may be non-writable for 4 possible reasons:
422 * For cases #1 and #4, KVM can safely make such SPTEs writable without taking
427 * shadow_mmu_writable_mask, aka MMU-writable -
431 * shadow_host_writable_mask, aka Host-writable -
432 * Cleared on SPTEs that are not host-writable (case 3 above)
441 * 1 | 1 | 1 (writable)
449 * Clearing the MMU-writable bit is always done under the MMU lock and always
452 * (which does not clear the MMU-writable bit), does not flush TLBs before
454 * dirty bitmap. Similarly, making the SPTE inaccessible (and non-writable) for
457 * So, there is the problem: clearing the MMU-writable bit can encounter a
[all …]
/linux/drivers/infiniband/hw/usnic/
H A Dusnic_uiom.c84 static int usnic_uiom_get_pages(unsigned long addr, size_t size, int writable, in usnic_uiom_get_pages() argument
134 if (writable) in usnic_uiom_get_pages()
215 int writable = 0; in __usnic_uiom_reg_release() local
229 writable = 1; in __usnic_uiom_reg_release()
234 usnic_uiom_put_pages(&uiomr->chunk_list, dirty & writable); in __usnic_uiom_reg_release()
253 flags |= (uiomr->writable) ? IOMMU_WRITE : 0; in usnic_uiom_map_sorted_intervals()
330 int writable, int dmasync) in usnic_uiom_reg_get() argument
343 * Hence, make all entries to be writable. in usnic_uiom_reg_get()
345 writable = 1; in usnic_uiom_reg_get()
360 uiomr->writable = writable; in usnic_uiom_reg_get()
[all …]
/linux/tools/testing/selftests/net/
H A Dnetns-sysctl.sh23 # check that this is writable in a netns
25 fail "$sc isn't writable in the init netns!"
35 # check that this isn't writable in a netns
37 fail "$sc is writable in a netns!"
/linux/security/loadpin/
H A Dloadpin.c81 static void report_writable(struct super_block *mnt_sb, bool writable) in report_writable() argument
87 writable ? "writable" : "read-only"); in report_writable()
89 pr_info("mnt_sb lacks block device, treating as: writable\n"); in report_writable()
91 if (!writable) in report_writable()
101 bool writable = true; in sb_is_writable() local
104 writable = !bdev_read_only(mnt_sb->s_bdev); in sb_is_writable()
106 return writable; in sb_is_writable()
/linux/tools/testing/selftests/bpf/progs/
H A Dtest_module_attach.c36 struct bpf_testmod_test_writable_ctx *writable) in BPF_PROG() argument
38 raw_tp_writable_bare_in_val = writable->val; in BPF_PROG()
39 writable->early_ret = raw_tp_writable_bare_early_ret; in BPF_PROG()
40 writable->val = raw_tp_writable_bare_out_val; in BPF_PROG()
/linux/include/linux/
H A Dexecmem.h75 * after it was temporarily remapped as writable. Relies on architecture
152 * execmem_alloc_rw - allocate writable executable memory
162 * Forces writable permissions on the allocated memory and the caller is
167 * will be used as they must be writable.
197 * Return: %true if the @type is read-only, %false if it's writable
/linux/tools/lib/subcmd/
H A Drun-command.h26 * .in: returns the writable pipe end; parent writes to it,
29 * it, the writable pipe end becomes child's stdout/stderr
34 * .out: a writable FD, becomes child's stdout/stderr
/linux/arch/s390/kvm/
H A Ddat.h78 unsigned long w : 1; /* Writable */
163 unsigned long w : 1; /* Writable soft-bit */
186 unsigned long w : 1; /* Writable soft-bit */
257 unsigned long w : 1; /* Writable */
382 * @writable: whether the pte should be writable.
393 static inline union pte _pte(kvm_pfn_t pfn, bool writable, bool dirty, bool special) in _pte() argument
400 res.s.w = writable; in _pte()
421 * @writable: whether the pte should be writable.
431 static inline union crste _crste_fc1(kvm_pfn_t pfn, int tt, bool writable, bool dirty) in _crste_fc1() argument
440 res.s.fc1.w = writable; in _crste_fc1()
[all …]
/linux/arch/powerpc/kvm/
H A De500_mmu_host.c48 static inline u32 e500_shadow_mas3_attrib(u32 mas3, bool writable, int usermode) in e500_shadow_mas3_attrib() argument
53 if (!writable) in e500_shadow_mas3_attrib()
251 bool writable) in kvmppc_e500_ref_setup() argument
255 if (writable) in kvmppc_e500_ref_setup()
312 bool writable = !!(ref->flags & E500_TLB_WRITABLE); in kvmppc_e500_setup_stlbe() local
320 e500_shadow_mas3_attrib(gtlbe->mas7_3, writable, pr); in kvmppc_e500_setup_stlbe()
341 bool writable = false; in kvmppc_e500_shadow_map() local
358 pfn = __kvm_faultin_pfn(slot, gfn, FOLL_WRITE, &writable, &page); in kvmppc_e500_shadow_map()
458 kvmppc_e500_ref_setup(ref, gtlbe, pfn, wimg, writable); in kvmppc_e500_shadow_map()
461 writable = tlbe_is_writable(stlbe); in kvmppc_e500_shadow_map()
[all …]
/linux/Documentation/security/
H A Dself-protection.rst37 APIs hard to use incorrectly, minimizing the areas of writable kernel
43 When all of kernel memory is writable, it becomes trivial for attacks
47 Executable code and read-only data must not be writable
50 Any areas of the kernel with executable memory must not be writable.
56 made writable during the update, and then returned to the original
61 writable, data is not executable, and read-only data is neither writable
70 Function pointers and sensitive variables must not be writable
/linux/net/
H A Dsysctl_net.c137 /* If it's not writable inside the netns, then it can't hurt. */ in ensure_safe_net_sysctl()
139 pr_debug(" Not writable by anyone\n"); in ensure_safe_net_sysctl()
152 /* If it is writable and points to kernel/module global in ensure_safe_net_sysctl()
158 /* Make it "safe" by dropping writable perms */ in ensure_safe_net_sysctl()
/linux/Documentation/mm/
H A Dovercommit-accounting.rst58 | PRIVATE WRITABLE - size of mapping per instance
63 | PRIVATE WRITABLE - size of mapping per instance
66 | Pages made writable copies by mmap
/linux/tools/testing/selftests/kvm/arm64/
H A Dset_id_regs.c445 /* Get writable masks for feature ID registers */ in test_vm_ftr_id_regs()
466 /* Make sure the feature field is writable */ in test_vm_ftr_id_regs()
495 /* Get writable masks for feature ID registers */ in test_user_set_mpam_reg()
502 ksft_test_result_skip("ID_AA64PFR0_EL1.MPAM is officially writable, nothing to test\n"); in test_user_set_mpam_reg()
523 ksft_test_result_skip("ID_AA64PFR0_EL1.MPAM is not writable, nothing to test\n"); in test_user_set_mpam_reg()
525 ksft_test_result_pass("ID_AA64PFR0_EL1.MPAM=1 was writable\n"); in test_user_set_mpam_reg()
539 ksft_test_result_skip("ID_AA64PFR1_EL1.MPAM_frac is officially writable, nothing to test\n"); in test_user_set_mpam_reg()
560 ksft_test_result_skip("ID_AA64PFR1_EL1.MPAM_frac is not writable, nothing to test\n"); in test_user_set_mpam_reg()
562 ksft_test_result_pass("ID_AA64PFR0_EL1.MPAM_frac=1 was writable\n"); in test_user_set_mpam_reg()
593 /* Get writable mask in test_user_set_mte_reg()
[all...]
/linux/mm/
H A Dmprotect.c70 * Writable MAP_PRIVATE mapping: We can only special-case on in can_change_private_pte_writable()
72 * write-fault handler similarly would map them writable without in can_change_private_pte_writable()
88 * Writable MAP_SHARED mapping: "clean" might indicate that the FS still in can_change_shared_pte_writable()
91 * FS was already notified and we can simply mark the PTE writable in can_change_shared_pte_writable()
162 * the pte to writable just from the vma and the pte, we then need to look
168 * not change the ptes to writable just by using information from the first
280 * In some writable, shared mappings, we might want in change_pte_range()
284 * In all writable, private mappings, we have to in change_pte_range()
288 * writable and avoid the write-fault handler, for in change_pte_range()
731 * If we make a private mapping writable w in mprotect_fixup()
[all...]
/linux/drivers/net/arcnet/
H A Dcom9026.h7 #define COM9026_REG_W_INTMASK 0 /* writable */
9 #define COM9026_REG_W_COMMAND 1 /* writable, returns random vals on read (?) */
/linux/include/crypto/
H A Dif_alg.h200 * @return true => writable, false => not writable
226 * @return true => writable, false => not writable
/linux/drivers/virt/acrn/
H A Dmm.c180 bool writable; in acrn_vm_ram_map() local
200 writable = args.writable; in acrn_vm_ram_map()
203 /* Disallow write access if the PTE is not writable. */ in acrn_vm_ram_map()
204 if (!writable && in acrn_vm_ram_map()
/linux/drivers/crypto/ccp/
H A Dsev-dev.c51 * Maximum number of firmware-writable buffers that might be specified
1750 static int sev_ioctl_do_reset(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_reset() argument
1754 if (!writable) in sev_ioctl_do_reset()
1799 static int sev_ioctl_do_pek_pdh_gen(int cmd, struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_pdh_gen() argument
1805 if (!writable) in sev_ioctl_do_pek_pdh_gen()
1822 static int sev_ioctl_do_pek_csr(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_csr() argument
1832 if (!writable) in sev_ioctl_do_pek_csr()
2121 static int sev_ioctl_do_pek_import(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_import() argument
2130 if (!writable) in sev_ioctl_do_pek_import()
2276 static int sev_ioctl_do_pdh_export(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pdh_export() argument
[all …]
/linux/arch/riscv/include/asm/
H A Dxip_fixup.h28 * writable section, the VMA is increased while LMA remains the same.
33 * reads the "writable" section at wrong addresses, because VMA is used
/linux/arch/arm64/kvm/
H A Dmmu.c1175 * @writable: Whether or not to create a writable mapping
1178 phys_addr_t pa, unsigned long size, bool writable) in kvm_phys_addr_ioremap() argument
1187 (writable ? KVM_PGTABLE_PROT_W : 0); in kvm_phys_addr_ioremap()
1548 bool *writable) in adjust_nested_fault_perms() argument
1550 *writable &= kvm_s2_trans_writable(nested); in adjust_nested_fault_perms()
1571 bool write_fault, exec_fault, writable; in gmem_abort() local
1608 writable = !(memslot->flags & KVM_MEM_READONLY); in gmem_abort()
1611 adjust_nested_fault_perms(nested, &prot, &writable); in gmem_abort()
1613 if (writable) in gmem_abort()
1633 kvm_release_faultin_page(kvm, page, !!ret, writable); in gmem_abort()
[all …]
/linux/arch/arm/
H A DKconfig-nommu50 vectors to be mapped to writable memory, say 'n' here.
54 the writable versions located at DRAM_BASE.
/linux/Documentation/admin-guide/mm/
H A Dsoft-dirty.rst22 Internally, to do this tracking, the writable bit is cleared from PTEs
30 the kernel does is finds this fact out and puts both writable and soft-dirty
/linux/include/uapi/linux/
H A Dpktcdvd.h48 #define PACKET_WRITABLE 1 /* pd is writable */
49 #define PACKET_NWA_VALID 2 /* next writable address valid */
/linux/virt/kvm/
H A Dkvm_mm.h41 * If non-NULL, try to get a writable mapping even for a read fault.
42 * Set to true if a writable mapping was obtained.
/linux/fs/fuse/
H A Ddax.c55 bool writable; member
182 struct fuse_dax_mapping *dmap, bool writable, in fuse_setup_one_mapping() argument
202 if (writable) in fuse_setup_one_mapping()
212 dmap->writable = writable; in fuse_setup_one_mapping()
440 bool writable = flags & IOMAP_WRITE; in fuse_setup_new_dax_mapping() local
488 writable, false); in fuse_setup_new_dax_mapping()
542 if (dmap->writable) { in fuse_upgrade_dax_mapping()
568 bool writable = flags & IOMAP_WRITE; in fuse_iomap_begin() local
592 if (writable && !dmap->writable) { in fuse_iomap_begin()

12345678910>>...20