/Linux-v5.10/include/trace/events/ |
D | huge_memory.h | 53 TP_PROTO(struct mm_struct *mm, struct page *page, bool writable, 56 TP_ARGS(mm, page, writable, referenced, none_or_zero, status, unmapped), 61 __field(bool, writable) 71 __entry->writable = writable; 81 __entry->writable, 115 int referenced, bool writable, int status), 117 TP_ARGS(page, none_or_zero, referenced, writable, status), 123 __field(bool, writable) 131 __entry->writable = writable; 139 __entry->writable,
|
/Linux-v5.10/drivers/infiniband/hw/usnic/ |
D | usnic_uiom.c | 85 static int usnic_uiom_get_pages(unsigned long addr, size_t size, int writable, in usnic_uiom_get_pages() argument 137 flags |= (writable) ? IOMMU_WRITE : 0; in usnic_uiom_get_pages() 139 gup_flags |= (writable) ? 0 : FOLL_FORCE; in usnic_uiom_get_pages() 221 int writable = 0; in __usnic_uiom_reg_release() local 235 writable = 1; in __usnic_uiom_reg_release() 240 usnic_uiom_put_pages(&uiomr->chunk_list, dirty & writable); in __usnic_uiom_reg_release() 259 flags |= (uiomr->writable) ? IOMMU_WRITE : 0; in usnic_uiom_map_sorted_intervals() 336 int writable, int dmasync) in usnic_uiom_reg_get() argument 351 writable = 1; in usnic_uiom_reg_get() 366 uiomr->writable = writable; in usnic_uiom_reg_get() [all …]
|
D | usnic_uiom.h | 71 int writable; member
|
/Linux-v5.10/drivers/crypto/ccp/ |
D | sev-dev.c | 309 static int sev_ioctl_do_reset(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_reset() argument 313 if (!writable) in sev_ioctl_do_reset() 357 static int sev_ioctl_do_pek_pdh_gen(int cmd, struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_pdh_gen() argument 362 if (!writable) in sev_ioctl_do_pek_pdh_gen() 374 static int sev_ioctl_do_pek_csr(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_csr() argument 383 if (!writable) in sev_ioctl_do_pek_csr() 566 static int sev_ioctl_do_pek_import(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pek_import() argument 574 if (!writable) in sev_ioctl_do_pek_import() 721 static int sev_ioctl_do_pdh_export(struct sev_issue_cmd *argp, bool writable) in sev_ioctl_do_pdh_export() argument 733 if (!writable) in sev_ioctl_do_pdh_export() [all …]
|
/Linux-v5.10/Documentation/vm/ |
D | arch_pgtable_helpers.rst | 31 | pte_write | Tests a writable PTE | 51 | pte_mkwrite | Creates a writable PTE | 101 | pmd_write | Tests a writable PMD | 121 | pmd_mkwrite | Creates a writable PMD | 175 | pud_write | Tests a writable PUD | 187 | pud_mkwrite | Creates a writable PUD | 221 | huge_pte_write | Tests a writable HugeTLB | 225 | huge_pte_mkwrite | Creates a writable HugeTLB |
|
/Linux-v5.10/drivers/mfd/ |
D | wm8350-regmap.c | 19 u16 writable; /* Mask of writable bits */ member 298 return wm8350_reg_io_map[reg].writable; in wm8350_writeable()
|
/Linux-v5.10/drivers/infiniband/hw/hfi1/ |
D | user_pages.c | 104 bool writable, struct page **pages) in hfi1_acquire_user_pages() argument 107 unsigned int gup_flags = FOLL_LONGTERM | (writable ? FOLL_WRITE : 0); in hfi1_acquire_user_pages()
|
/Linux-v5.10/Documentation/virt/kvm/ |
D | locking.rst | 44 - SPTE_HOST_WRITEABLE means the gfn is writable on host. 45 - SPTE_MMU_WRITEABLE means the gfn is writable on mmu. The bit is set when 46 the gfn is writable on guest mmu and it is not write-protected by shadow 106 - The pfn is writable and therefore it cannot be shared between different gfns 118 writable between reading spte and updating spte. Like below case: 165 If the spte is updated from writable to readonly, we should flush all TLBs, 167 writable spte might be cached on a CPU's TLB. 169 As mentioned before, the spte can be updated to writable out of mmu-lock on
|
/Linux-v5.10/drivers/infiniband/sw/siw/ |
D | siw_mem.c | 78 umem->writable && dirty); in siw_umem_release() 365 struct siw_umem *siw_umem_get(u64 start, u64 len, bool writable) in siw_umem_get() argument 390 umem->writable = writable; in siw_umem_get() 394 if (!writable) in siw_umem_get()
|
/Linux-v5.10/arch/arm64/kvm/ |
D | mmu.c | 500 phys_addr_t pa, unsigned long size, bool writable) in kvm_phys_addr_ioremap() argument 508 (writable ? KVM_PGTABLE_PROT_W : 0); in kvm_phys_addr_ioremap() 746 bool write_fault, writable, force_pte = false; in user_mem_abort() local 848 pfn = gfn_to_pfn_prot(kvm, gfn, write_fault, &writable); in user_mem_abort() 864 writable = false; in user_mem_abort() 882 if (writable) { in user_mem_abort() 957 bool is_iabt, write_fault, writable; in kvm_handle_guest_abort() local 995 hva = gfn_to_hva_memslot_prot(memslot, gfn, &writable); in kvm_handle_guest_abort() 997 if (kvm_is_error_hva(hva) || (write_fault && !writable)) { in kvm_handle_guest_abort() 1301 bool writable = !(mem->flags & KVM_MEM_READONLY); in kvm_arch_prepare_memory_region() local [all …]
|
/Linux-v5.10/tools/testing/selftests/kvm/lib/x86_64/ |
D | processor.c | 30 uint64_t writable:1; member 45 uint64_t writable:1; member 60 uint64_t writable:1; member 75 uint64_t writable:1; member 263 pml4e[index[3]].writable = true; in virt_pg_map() 274 pdpe[index[2]].writable = true; in virt_pg_map() 285 pde[index[1]].writable = true; in virt_pg_map() 293 pte[index[0]].writable = true; in virt_pg_map() 323 pml4e->writable, pml4e->execute_disable); in virt_dump() 336 (uint64_t) pdpe->address, pdpe->writable, in virt_dump() [all …]
|
D | vmx.c | 25 uint64_t writable:1; member 434 pml4e[index[3]].writable = true; in nested_pg_map() 446 pdpe[index[2]].writable = true; in nested_pg_map() 458 pde[index[1]].writable = true; in nested_pg_map() 467 pte[index[0]].writable = true; in nested_pg_map()
|
/Linux-v5.10/fs/fuse/ |
D | dax.c | 55 bool writable; member 182 struct fuse_dax_mapping *dmap, bool writable, in fuse_setup_one_mapping() argument 202 if (writable) in fuse_setup_one_mapping() 212 dmap->writable = writable; in fuse_setup_one_mapping() 439 bool writable = flags & IOMAP_WRITE; in fuse_setup_new_dax_mapping() local 487 writable, false); in fuse_setup_new_dax_mapping() 541 if (dmap->writable) { in fuse_upgrade_dax_mapping() 567 bool writable = flags & IOMAP_WRITE; in fuse_iomap_begin() local 591 if (writable && !dmap->writable) { in fuse_iomap_begin()
|
/Linux-v5.10/drivers/infiniband/core/ |
D | umem.c | 58 unpin_user_pages_dirty_lock(&page, 1, umem->writable && dirty); in __ib_umem_release() 181 umem->writable = ib_access_writable(access); in ib_umem_get() 208 if (!umem->writable) in ib_umem_get()
|
D | umem_odp.c | 133 umem->writable = ib_access_writable(access); in ib_umem_odp_alloc_implicit() 182 umem->writable = root->umem.writable; in ib_umem_odp_alloc_child() 243 umem_odp->umem.writable = ib_access_writable(access); in ib_umem_odp_get()
|
/Linux-v5.10/virt/kvm/ |
D | kvm_main.c | 1775 gfn_t gfn, bool *writable) in gfn_to_hva_memslot_prot() argument 1779 if (!kvm_is_error_hva(hva) && writable) in gfn_to_hva_memslot_prot() 1780 *writable = !memslot_is_readonly(slot); in gfn_to_hva_memslot_prot() 1785 unsigned long gfn_to_hva_prot(struct kvm *kvm, gfn_t gfn, bool *writable) in gfn_to_hva_prot() argument 1789 return gfn_to_hva_memslot_prot(slot, gfn, writable); in gfn_to_hva_prot() 1792 unsigned long kvm_vcpu_gfn_to_hva_prot(struct kvm_vcpu *vcpu, gfn_t gfn, bool *writable) in kvm_vcpu_gfn_to_hva_prot() argument 1796 return gfn_to_hva_memslot_prot(slot, gfn, writable); in kvm_vcpu_gfn_to_hva_prot() 1813 bool *writable, kvm_pfn_t *pfn) in hva_to_pfn_fast() argument 1822 if (!(write_fault || writable)) in hva_to_pfn_fast() 1828 if (writable) in hva_to_pfn_fast() [all …]
|
/Linux-v5.10/arch/arm/ |
D | Kconfig-nommu | 50 vectors to be mapped to writable memory, say 'n' here. 54 the writable versions located at DRAM_BASE.
|
/Linux-v5.10/Documentation/ABI/testing/ |
D | sysfs-kernel-livepatch | 24 A writable attribute that indicates whether the patched 41 A writable attribute that allows administrator to affect the
|
/Linux-v5.10/Documentation/admin-guide/mm/ |
D | soft-dirty.rst | 24 Internally, to do this tracking, the writable bit is cleared from PTEs 32 the kernel does is finds this fact out and puts both writable and soft-dirty
|
/Linux-v5.10/Documentation/security/ |
D | self-protection.rst | 37 APIs hard to use incorrectly, minimizing the areas of writable kernel 43 When all of kernel memory is writable, it becomes trivial for attacks 47 Executable code and read-only data must not be writable 50 Any areas of the kernel with executable memory must not be writable. 56 made writable during the update, and then returned to the original 61 writable, data is not executable, and read-only data is neither writable 70 Function pointers and sensitive variables must not be writable
|
/Linux-v5.10/include/linux/ |
D | mm_types_task.h | 95 bool writable; member
|
/Linux-v5.10/arch/powerpc/kvm/ |
D | book3s_32_mmu_host.c | 145 bool writable; in kvmppc_mmu_map_page() local 148 hpaddr = kvmppc_gpa_to_pfn(vcpu, orig_pte->raddr, iswrite, &writable); in kvmppc_mmu_map_page() 198 if (orig_pte->may_write && writable) { in kvmppc_mmu_map_page()
|
D | book3s_64_mmu_host.c | 84 bool writable; in kvmppc_mmu_map_page() local 96 pfn = kvmppc_gpa_to_pfn(vcpu, orig_pte->raddr, iswrite, &writable); in kvmppc_mmu_map_page() 124 if (!orig_pte->may_write || !writable) in kvmppc_mmu_map_page()
|
/Linux-v5.10/drivers/misc/eeprom/ |
D | at24.c | 599 bool writable; in at24_probe() local 701 writable = !(flags & AT24_FLAG_READONLY); in at24_probe() 702 if (writable) { in at24_probe() 739 nvmem_config.read_only = !writable; in at24_probe() 783 if (writable) in at24_probe()
|
/Linux-v5.10/Documentation/userspace-api/media/v4l/ |
D | vidioc-g-audioout.rst | 45 Audio outputs have no writable properties. Nevertheless, to select the 47 ``reserved`` array (which in the future may contain writable properties)
|