/Linux-v5.15/Documentation/admin-guide/LSM/ |
D | Smack.rst | 9 Smack is the Simplified Mandatory Access Control Kernel. 10 Smack is a kernel based implementation of mandatory access 13 Smack is not the only Mandatory Access Control scheme 14 available for Linux. Those new to Mandatory Access Control 33 access to systems that use them as Smack does. 50 load the Smack access rules 53 report if a process with one label has access 85 Used to make access control decisions. In almost all cases 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access [all …]
|
/Linux-v5.15/include/linux/ |
D | instrumented.h | 4 * This header provides generic wrappers for memory access instrumentation that 16 * instrument_read - instrument regular read access 18 * Instrument a regular read access. The instrumentation should be inserted 21 * @ptr address of access 22 * @size size of access 31 * instrument_write - instrument regular write access 33 * Instrument a regular write access. The instrumentation should be inserted 36 * @ptr address of access 37 * @size size of access 46 * instrument_read_write - instrument regular read-write access [all …]
|
D | kcsan-checks.h | 3 * KCSAN access checks and modifiers. These can be used to explicitly check 16 /* Access types -- if KCSAN_ACCESS_WRITE is not set, the access is a read. */ 17 #define KCSAN_ACCESS_WRITE (1 << 0) /* Access is a write. */ 19 #define KCSAN_ACCESS_ATOMIC (1 << 2) /* Access is atomic. */ 21 #define KCSAN_ACCESS_ASSERT (1 << 3) /* Access is an assertion. */ 22 #define KCSAN_ACCESS_SCOPED (1 << 4) /* Access is a scoped access. */ 27 * to validate access to an address. Never use these in header files! 31 * __kcsan_check_access - check generic access for races 33 * @ptr: address of access 34 * @size: size of access [all …]
|
/Linux-v5.15/tools/perf/pmu-events/arch/arm64/ |
D | armv8-recommended.json | 3 "PublicDescription": "Attributable Level 1 data cache access, read", 6 "BriefDescription": "L1D cache access, read" 9 "PublicDescription": "Attributable Level 1 data cache access, write", 12 "BriefDescription": "L1D cache access, write" 69 "PublicDescription": "Attributable Level 1 data or unified TLB access, read", 72 "BriefDescription": "L1D tlb access, read" 75 "PublicDescription": "Attributable Level 1 data or unified TLB access, write", 78 "BriefDescription": "L1D tlb access, write" 81 "PublicDescription": "Attributable Level 2 data cache access, read", 84 "BriefDescription": "L2D cache access, read" [all …]
|
D | armv8-common-and-microarch.json | 27 "PublicDescription": "Level 1 data cache access", 30 "BriefDescription": "Level 1 data cache access" 81 "PublicDescription": "Data memory access", 84 "BriefDescription": "Data memory access" 87 "PublicDescription": "Attributable Level 1 instruction cache access", 90 "BriefDescription": "Attributable Level 1 instruction cache access" 99 "PublicDescription": "Level 2 data cache access", 102 "BriefDescription": "Level 2 data cache access" 117 "PublicDescription": "Attributable Bus access", 120 "BriefDescription": "Attributable Bus access" [all …]
|
/Linux-v5.15/drivers/net/ethernet/mellanox/mlxsw/ |
D | reg.h | 45 * Access: RW 68 * Access: RW 85 * Access: Index 92 * Access: Index 98 * Access: RW 104 * Access: W 135 * Access: RW 142 * Access: RW 150 * Access: RW 160 * Access: Index [all …]
|
/Linux-v5.15/tools/testing/selftests/bpf/verifier/ |
D | direct_value_access.c | 2 "direct map access, write test 1", 14 "direct map access, write test 2", 26 "direct map access, write test 3", 38 "direct map access, write test 4", 50 "direct map access, write test 5", 62 "direct map access, write test 6", 75 "direct map access, write test 7", 87 "direct map access, write test 8", 99 "direct map access, write test 9", 108 .errstr = "invalid access to map value pointer", [all …]
|
D | ctx_skb.c | 2 "access skb fields ok", 33 "access skb fields bad1", 38 .errstr = "invalid bpf_context access", 42 "access skb fields bad2", 63 "access skb fields bad3", 85 "access skb fields bad4", 108 "invalid access __sk_buff family", 114 .errstr = "invalid bpf_context access", 118 "invalid access __sk_buff remote_ip4", 124 .errstr = "invalid bpf_context access", [all …]
|
D | helper_value_access.c | 2 "helper access to map: full range", 21 "helper access to map: partial range", 40 "helper access to map: empty range", 54 .errstr = "invalid access to map value, value_size=48 off=0 size=0", 59 "helper access to map: out-of-bound range", 74 .errstr = "invalid access to map value, value_size=48 off=0 size=56", 79 "helper access to map: negative range", 99 "helper access to adjusted map (via const imm): full range", 120 "helper access to adjusted map (via const imm): partial range", 140 "helper access to adjusted map (via const imm): empty range", [all …]
|
D | direct_packet_access.c | 16 "direct packet access: test1", 33 "direct packet access: test2", 67 "direct packet access: test3", 74 .errstr = "invalid bpf_context access off=76", 79 "direct packet access: test4 (write)", 96 "direct packet access: test5 (pkt_end >= reg, good access)", 115 "direct packet access: test6 (pkt_end >= reg, bad access)", 130 .errstr = "invalid access to packet", 135 "direct packet access: test7 (pkt_end >= reg, both accesses)", 151 .errstr = "invalid access to packet", [all …]
|
D | helper_packet_access.c | 2 "helper access to packet: test1, valid packet_ptr range", 23 "helper access to packet: test2, unchecked packet_ptr", 33 .errstr = "invalid access to packet", 37 "helper access to packet: test3, variable add", 62 "helper access to packet: test4, packet_ptr with bad range", 79 .errstr = "invalid access to packet", 83 "helper access to packet: test5, packet_ptr with too short range", 99 .errstr = "invalid access to packet", 103 "helper access to packet: test6, cls valid packet_ptr range", 124 "helper access to packet: test7, cls unchecked packet_ptr", [all …]
|
D | cgroup_storage.c | 2 "valid cgroup storage access", 17 "invalid cgroup storage access 1", 33 "invalid cgroup storage access 2", 46 "invalid cgroup storage access 3", 58 .errstr = "invalid access to map value, value_size=64 off=256 size=4", 62 "invalid cgroup storage access 4", 74 .errstr = "invalid access to map value, value_size=64 off=-2 size=4", 79 "invalid cgroup storage access 5", 95 "invalid cgroup storage access 6", 112 "valid per-cpu cgroup storage access", [all …]
|
D | meta_access.c | 2 "meta access, test1", 18 "meta access, test2", 33 .errstr = "invalid access to packet, off=-8", 37 "meta access, test3", 51 .errstr = "invalid access to packet", 55 "meta access, test4", 70 .errstr = "invalid access to packet", 74 "meta access, test5", 93 "meta access, test6", 108 .errstr = "invalid access to packet", [all …]
|
D | wide_access.c | 21 "invalid bpf_context access off=12 size=8", 26 "invalid bpf_context access off=20 size=8", 31 "invalid bpf_context access off=44 size=8", 36 "invalid bpf_context access off=52 size=8", 39 "invalid bpf_context access off=56 size=8", 0), 63 "invalid bpf_context access off=12 size=8", 68 "invalid bpf_context access off=20 size=8", 73 "invalid bpf_context access off=44 size=8", 78 "invalid bpf_context access off=52 size=8", 81 "invalid bpf_context access off=56 size=8", 0),
|
D | xdp_direct_packet_access.c | 2 "XDP pkt read, pkt_end mangling, bad access 1", 20 "XDP pkt read, pkt_end mangling, bad access 2", 38 "XDP pkt read, pkt_data' > pkt_end, good access", 55 "XDP pkt read, pkt_data' > pkt_end, bad access 1", 73 "XDP pkt read, pkt_data' > pkt_end, bad access 2", 91 "XDP pkt read, pkt_end > pkt_data', good access", 109 "XDP pkt read, pkt_end > pkt_data', bad access 1", 128 "XDP pkt read, pkt_end > pkt_data', bad access 2", 146 "XDP pkt read, pkt_data' < pkt_end, good access", 164 "XDP pkt read, pkt_data' < pkt_end, bad access 1", [all …]
|
/Linux-v5.15/arch/mips/include/asm/octeon/ |
D | cvmx-fau.h | 123 * @reg: FAU atomic register to access. 0 <= reg < 2048. 124 * - Step by 2 for 16 bit access. 125 * - Step by 4 for 32 bit access. 126 * - Step by 8 for 64 bit access. 143 * @reg: FAU atomic register to access. 0 <= reg < 2048. 144 * - Step by 2 for 16 bit access. 145 * - Step by 4 for 32 bit access. 146 * - Step by 8 for 64 bit access. 148 * Note: When performing 32 and 64 bit access, only the low 164 * @reg: FAU atomic register to access. 0 <= reg < 2048. [all …]
|
/Linux-v5.15/tools/perf/pmu-events/arch/x86/haswell/ |
D | uncore.json | 115 "BriefDescription": "L3 Lookup read request that access cache and found line in M-state.", 116 "PublicDescription": "L3 Lookup read request that access cache and found line in M-state.", 127 "BriefDescription": "L3 Lookup write request that access cache and found line in M-state.", 128 "PublicDescription": "L3 Lookup write request that access cache and found line in M-state.", 139 …"BriefDescription": "L3 Lookup external snoop request that access cache and found line in M-state.… 140 …"PublicDescription": "L3 Lookup external snoop request that access cache and found line in M-state… 151 "BriefDescription": "L3 Lookup any request that access cache and found line in M-state.", 152 "PublicDescription": "L3 Lookup any request that access cache and found line in M-state.", 163 "BriefDescription": "L3 Lookup read request that access cache and found line in I-state.", 164 "PublicDescription": "L3 Lookup read request that access cache and found line in I-state.", [all …]
|
/Linux-v5.15/Documentation/core-api/ |
D | unaligned-memory-access.rst | 14 when it comes to memory access. This document presents some details about 19 The definition of an unaligned access 26 access. 28 The above may seem a little vague, as memory access can happen in different 32 which will compile to multiple-byte memory access instructions, namely when 47 of memory access. However, we must consider ALL supported architectures; 52 Why unaligned access is bad 55 The effects of performing an unaligned memory access vary from architecture 62 happen. The exception handler is able to correct the unaligned access, 66 unaligned access to be corrected. [all …]
|
/Linux-v5.15/tools/testing/selftests/landlock/ |
D | fs_test.c | 255 * (access type) confusion for this test. in test_open_rel() 363 /* Test with no access. */ in TEST_F_FORK() 401 __u64 access; in TEST_F_FORK() local 412 /* Tests access rights for files. */ in TEST_F_FORK() 415 for (access = 1; access <= ACCESS_LAST; access <<= 1) { in TEST_F_FORK() 416 path_beneath.allowed_access = access; in TEST_F_FORK() 419 if ((access | ACCESS_FILE) == ACCESS_FILE) { in TEST_F_FORK() 452 __u64 access; member 485 add_path_beneath(_metadata, ruleset_fd, rules[i].access, in create_ruleset() 505 .access = LANDLOCK_ACCESS_FS_READ_FILE | in TEST_F_FORK() [all …]
|
/Linux-v5.15/Documentation/ABI/testing/ |
D | sysfs-class-power | 9 Access: Read 18 Access: Read 27 Access: Read 36 Access: Read 58 Access: Read 76 Access: Read 89 Access: Read 98 Access: Read, Write 118 Access: Read 142 Access: Read [all …]
|
/Linux-v5.15/tools/perf/pmu-events/arch/x86/broadwell/ |
D | uncore.json | 55 "BriefDescription": "L3 Lookup read request that access cache and found line in M-state", 56 "PublicDescription": "L3 Lookup read request that access cache and found line in M-state.", 67 "BriefDescription": "L3 Lookup write request that access cache and found line in M-state", 68 "PublicDescription": "L3 Lookup write request that access cache and found line in M-state.", 79 "BriefDescription": "L3 Lookup any request that access cache and found line in M-state", 80 "PublicDescription": "L3 Lookup any request that access cache and found line in M-state.", 91 "BriefDescription": "L3 Lookup read request that access cache and found line in I-state", 92 "PublicDescription": "L3 Lookup read request that access cache and found line in I-state.", 103 "BriefDescription": "L3 Lookup any request that access cache and found line in I-state", 104 "PublicDescription": "L3 Lookup any request that access cache and found line in I-state.", [all …]
|
/Linux-v5.15/tools/perf/pmu-events/arch/x86/skylake/ |
D | uncore.json | 55 "BriefDescription": "L3 Lookup write request that access cache and found line in M-state", 56 "PublicDescription": "L3 Lookup write request that access cache and found line in M-state.", 67 "BriefDescription": "L3 Lookup any request that access cache and found line in M-state", 68 "PublicDescription": "L3 Lookup any request that access cache and found line in M-state.", 79 "BriefDescription": "L3 Lookup read request that access cache and found line in I-state", 80 "PublicDescription": "L3 Lookup read request that access cache and found line in I-state.", 91 "BriefDescription": "L3 Lookup any request that access cache and found line in I-state", 92 "PublicDescription": "L3 Lookup any request that access cache and found line in I-state.", 103 "BriefDescription": "L3 Lookup read request that access cache and found line in any MESI-state", 104 … "PublicDescription": "L3 Lookup read request that access cache and found line in any MESI-state.", [all …]
|
/Linux-v5.15/security/ |
D | device_cgroup.c | 37 short access; member 106 walk->access |= ex->access; in dev_exception_add() 134 walk->access &= ~ex->access; in dev_exception_rm() 135 if (!walk->access) { in dev_exception_rm() 238 static void set_access(char *acc, short access) in set_access() argument 242 if (access & DEVCG_ACC_READ) in set_access() 244 if (access & DEVCG_ACC_WRITE) in set_access() 246 if (access & DEVCG_ACC_MKNOD) in set_access() 290 set_access(acc, ex->access); in devcgroup_seq_show() 308 * @access: permission mask (DEVCG_ACC_READ, DEVCG_ACC_WRITE, DEVCG_ACC_MKNOD) [all …]
|
/Linux-v5.15/Documentation/vm/damon/ |
D | design.rst | 10 DAMON provides data access monitoring functionality while making the accuracy 11 and the overhead controllable. The fundamental access monitorings require 25 Also, if some architectures or devices support special optimized access check 32 The low level primitives for the fundamental access monitoring are defined in 36 2. Access check of specific address range in the target space. 71 PTE Accessed-bit Based Access Check 75 basic access checks. It finds the relevant PTE Accessed bit from the address 94 Access Frequency Monitoring 98 duration. The resolution of the access frequency is controlled by setting 100 access to each page per ``sampling interval`` and aggregates the results. In [all …]
|
/Linux-v5.15/kernel/kcsan/ |
D | kcsan_test.c | 38 /* Points to current test-case memory access "kernels". */ 138 /* Access information of both accesses. */ 141 void *addr; /* Address of access; unchecked if NULL. */ 142 size_t size; /* Size of access; unchecked if @addr is NULL. */ 143 int type; /* Access type, see KCSAN_ACCESS definitions. */ 144 } access[2]; member 151 const bool is_assert = (r->access[0].type | r->access[1].type) & KCSAN_ACCESS_ASSERT; in report_matches() 170 if (r->access[1].fn) { in report_matches() 175 scnprintf(tmp[0], sizeof(tmp[0]), "%pS", r->access[0].fn); in report_matches() 176 scnprintf(tmp[1], sizeof(tmp[1]), "%pS", r->access[1].fn); in report_matches() [all …]
|