| /linux/Documentation/mm/ |
| H A D | arch_pgtable_helpers.rst | 27 | pte_write | Tests a writable PTE | 45 | pte_mkwrite | Creates a writable PTE of the type specified by | 48 | pte_mkwrite_novma | Creates a writable PTE, of the conventional type | 49 | | of writable. | 97 | pmd_write | Tests a writable PMD | 115 | pmd_mkwrite | Creates a writable PMD of the type specified by | 118 | pmd_mkwrite_novma | Creates a writable PMD, of the conventional type | 119 | | of writable. | 170 | pud_write | Tests a writable PUD | 180 | pud_mkwrite | Creates a writable PUD | [all …]
|
| /linux/drivers/infiniband/hw/usnic/ |
| H A D | usnic_uiom.c | 84 static int usnic_uiom_get_pages(unsigned long addr, size_t size, int writable, in usnic_uiom_get_pages() argument 134 if (writable) in usnic_uiom_get_pages() 215 int writable = 0; in __usnic_uiom_reg_release() local 229 writable = 1; in __usnic_uiom_reg_release() 234 usnic_uiom_put_pages(&uiomr->chunk_list, dirty & writable); in __usnic_uiom_reg_release() 253 flags |= (uiomr->writable) ? IOMMU_WRITE : 0; in usnic_uiom_map_sorted_intervals() 330 int writable, int dmasync) in usnic_uiom_reg_get() argument 345 writable = 1; in usnic_uiom_reg_get() 360 uiomr->writable = writable; in usnic_uiom_reg_get() 363 err = usnic_uiom_get_pages(addr, size, writable, dmasync, in usnic_uiom_reg_get() [all …]
|
| H A D | usnic_uiom.h | 71 int writable; member
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_module_attach.c | 34 struct bpf_testmod_test_writable_ctx *writable) 36 raw_tp_writable_bare_in_val = writable->val; in BPF_PROG() argument 37 writable->early_ret = raw_tp_writable_bare_early_ret; in BPF_PROG() 38 writable->val = raw_tp_writable_bare_out_val; in BPF_PROG()
|
| /linux/arch/riscv/kvm/ |
| H A D | mmu.c | 36 unsigned long size, bool writable, bool in_atomic) in kvm_riscv_mmu_ioremap() argument 61 if (!writable) in kvm_riscv_mmu_ioremap() 162 bool writable; in kvm_arch_prepare_memory_region() local 180 writable = !(new->flags & KVM_MEM_READONLY); in kvm_arch_prepare_memory_region() 207 if (writable && !(vma->vm_flags & VM_WRITE)) { in kvm_arch_prepare_memory_region() 430 bool writable; in kvm_riscv_mmu_map() local 493 &writable, &page); in kvm_riscv_mmu_map() 507 writable = false; in kvm_riscv_mmu_map() 518 if (writable) { in kvm_riscv_mmu_map() 531 kvm_release_faultin_page(kvm, page, ret && ret != -EEXIST, writable); in kvm_riscv_mmu_map()
|
| H A D | vcpu_exit.c | 21 bool writable; in gstage_page_fault() local 28 hva = gfn_to_hva_memslot_prot(memslot, gfn, &writable); in gstage_page_fault() 31 (trap->scause == EXC_STORE_GUEST_PAGE_FAULT && !writable)) { in gstage_page_fault()
|
| /linux/arch/powerpc/kvm/ |
| H A D | e500_mmu_host.c | 48 static inline u32 e500_shadow_mas3_attrib(u32 mas3, bool writable, int usermode) in e500_shadow_mas3_attrib() argument 53 if (!writable) in e500_shadow_mas3_attrib() 251 bool writable) in kvmppc_e500_tlbe_setup() argument 255 if (writable) in kvmppc_e500_tlbe_setup() 309 bool writable = !!(tlbe->flags & E500_TLB_WRITABLE); in kvmppc_e500_setup_stlbe() local 317 e500_shadow_mas3_attrib(gtlbe->mas7_3, writable, pr); in kvmppc_e500_setup_stlbe() 338 bool writable = false; in kvmppc_e500_shadow_map() local 355 pfn = __kvm_faultin_pfn(slot, gfn, FOLL_WRITE, &writable, &page); in kvmppc_e500_shadow_map() 455 kvmppc_e500_tlbe_setup(tlbe, gtlbe, pfn, wimg, writable); in kvmppc_e500_shadow_map() 458 writable = tlbe_is_writable(stlbe); in kvmppc_e500_shadow_map() [all …]
|
| /linux/security/loadpin/ |
| H A D | loadpin.c | 81 static void report_writable(struct super_block *mnt_sb, bool writable) in report_writable() argument 87 writable ? "writable" : "read-only"); in report_writable() 91 if (!writable) in report_writable() 101 bool writable = true; in sb_is_writable() local 104 writable = !bdev_read_only(mnt_sb->s_bdev); in sb_is_writable() 106 return writable; in sb_is_writable()
|
| /linux/Documentation/virt/kvm/ |
| H A D | locking.rst | 80 What we use to avoid all the races is the Host-writable bit and MMU-writable bit 83 - Host-writable means the gfn is writable in the host kernel page tables and in 85 - MMU-writable means the gfn is writable in the guest's mmu and it is not 145 - The pfn is writable and therefore it cannot be shared between different gfns 157 writable between reading spte and updating spte. Like below case: 206 If the spte is updated from writable to read-only, we should flush all TLBs, 208 writable spte might be cached on a CPU's TLB. 210 As mentioned before, the spte can be updated to writable out of mmu-lock on
|
| /linux/drivers/mfd/ |
| H A D | wm8350-regmap.c | 19 u16 writable; /* Mask of writable bits */ member 298 return wm8350_reg_io_map[reg].writable; in wm8350_writeable()
|
| /linux/drivers/crypto/ccp/ |
| H A D | sev-dev.c | 1748 static int sev_ioctl_do_reset(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_reset() argument 1752 if (!writable) in sev_ioctl_do_reset() 1797 static int sev_ioctl_do_pek_pdh_gen(int cmd, struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_pdh_gen() argument 1803 if (!writable) in sev_ioctl_do_pek_pdh_gen() 1820 static int sev_ioctl_do_pek_csr(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_csr() argument 1830 if (!writable) in sev_ioctl_do_pek_csr() 2124 static int sev_ioctl_do_pek_import(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_import() argument 2133 if (!writable) in sev_ioctl_do_pek_import() 2282 static int sev_ioctl_do_pdh_export(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pdh_export() argument 2334 if (!writable) { in sev_ioctl_do_pdh_export() [all …]
|
| /linux/drivers/infiniband/hw/hfi1/ |
| H A D | user_pages.c | 81 bool writable, struct page **pages) in hfi1_acquire_user_pages() argument 84 unsigned int gup_flags = FOLL_LONGTERM | (writable ? FOLL_WRITE : 0); in hfi1_acquire_user_pages()
|
| /linux/drivers/virt/acrn/ |
| H A D | mm.c | 180 bool writable; in acrn_vm_ram_map() local 200 writable = args.writable; in acrn_vm_ram_map() 204 if (!writable && in acrn_vm_ram_map()
|
| /linux/fs/fuse/ |
| H A D | dax.c | 55 bool writable; member 182 struct fuse_dax_mapping *dmap, bool writable, in fuse_setup_one_mapping() argument 202 if (writable) in fuse_setup_one_mapping() 212 dmap->writable = writable; in fuse_setup_one_mapping() 440 bool writable = flags & IOMAP_WRITE; in fuse_setup_new_dax_mapping() local 488 writable, false); in fuse_setup_new_dax_mapping() 542 if (dmap->writable) { in fuse_upgrade_dax_mapping() 568 bool writable = flags & IOMAP_WRITE; in fuse_iomap_begin() local 592 if (writable && !dmap->writable) { in fuse_iomap_begin()
|
| /linux/drivers/infiniband/core/ |
| H A D | umem.c | 52 bool make_dirty = umem->writable && dirty; in __ib_umem_release() 202 umem->writable = ib_access_writable(access); in ib_umem_get() 233 if (umem->writable) in ib_umem_get()
|
| H A D | umem_odp.c | 148 umem->writable = ib_access_writable(access); in ib_umem_odp_alloc_implicit() 191 umem->writable = root->umem.writable; in ib_umem_odp_alloc_child() 251 umem_odp->umem.writable = ib_access_writable(access); in ib_umem_odp_get()
|
| /linux/arch/arm/ |
| H A D | Kconfig-nommu | 50 vectors to be mapped to writable memory, say 'n' here. 54 the writable versions located at DRAM_BASE.
|
| /linux/Documentation/security/ |
| H A D | self-protection.rst | 37 APIs hard to use incorrectly, minimizing the areas of writable kernel 43 When all of kernel memory is writable, it becomes trivial for attacks 47 Executable code and read-only data must not be writable 50 Any areas of the kernel with executable memory must not be writable. 56 made writable during the update, and then returned to the original 61 writable, data is not executable, and read-only data is neither writable 70 Function pointers and sensitive variables must not be writable
|
| /linux/Documentation/admin-guide/mm/ |
| H A D | soft-dirty.rst | 22 Internally, to do this tracking, the writable bit is cleared from PTEs 30 the kernel does is finds this fact out and puts both writable and soft-dirty
|
| /linux/arch/riscv/include/asm/ |
| H A D | kvm_mmu.h | 12 unsigned long size, bool writable, bool in_atomic);
|
| /linux/Documentation/userspace-api/media/v4l/ |
| H A D | vidioc-g-audioout.rst | 45 Audio outputs have no writable properties. Nevertheless, to select the 47 ``reserved`` array (which in the future may contain writable properties)
|
| /linux/rust/kernel/mm/ |
| H A D | virt.rs | 335 /// This flag indicates whether userspace is mapping this vma as writable. 337 pub fn writable(&self) -> bool { 343 /// This flag indicates whether userspace is allowed to make this vma writable with 350 if self.writable() { 339 pub fn writable(&self) -> bool { writable() method
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-kernel-livepatch | 24 A writable attribute that indicates whether the patched 41 A writable attribute that allows administrator to affect the
|
| /linux/arch/s390/kvm/ |
| H A D | dat.h | 398 static inline union pte _pte(kvm_pfn_t pfn, bool writable, bool dirty, bool special) in _pte() argument 405 res.s.w = writable; in _pte() 436 static inline union crste _crste_fc1(kvm_pfn_t pfn, int tt, bool writable, bool dirty) in _crste_fc1() argument 445 res.s.fc1.w = writable; in _crste_fc1() 499 bool writable; /* Mapping is writable */ member
|
| /linux/tools/testing/selftests/kvm/include/x86/ |
| H A D | kvm_util_arch.h | 15 u64 writable; member
|