| /linux/include/linux/ ! |
| H A D | kcsan-checks.h | 22 #define KCSAN_ACCESS_SCOPED (1 << 4) /* Access is a scoped access. */ 130 /* Scoped access information. */ 145 /* Location where scoped access was set up. */ 157 * kcsan_begin_scoped_access - begin scoped access 159 * Begin scoped access and initialize @sa, which will cause KCSAN to 163 * Scoped accesses are implemented by appending @sa to an internal list for the 177 * kcsan_end_scoped_access - end scoped access 179 * End a scoped access, which will stop KCSAN checking the memory range. 390 * Scoped variant of ASSERT_EXCLUSIVE_WRITER(). 457 * Scoped variant of ASSERT_EXCLUSIVE_ACCESS().
|
| H A D | kcsan.h | 24 int disable_scoped; /* disable scoped access counter */ 52 /* List of scoped accesses; likely to be empty. */ 57 * Scoped access for modeling access reordering to detect missing memory
|
| H A D | uaccess.h | 651 /* Scoped user access */ 668 * __scoped_user_access_begin - Start a scoped user access 729 * Nesting scoped user access into a user access scope is invalid and fails 748 * scoped_user_read_access_size - Start a scoped user read access with given size 759 * scoped_user_read_access - Start a scoped user read access 771 * scoped_user_write_access_size - Start a scoped user write access with given size 782 * scoped_user_write_access - Start a scoped user write access 794 * scoped_user_rw_access_size - Start a scoped user read/write access with given size 805 * scoped_user_rw_access - Start a scoped user read/write access
|
| /linux/Documentation/driver-api/cxl/platform/ ! |
| H A D | cdat.rst | 21 Device Scoped Memory Affinity Structure (DSMAS) 27 This table is used by Linux in conjunction with the Device Scoped Latency and 44 Device Scoped Latency and Bandwidth Information Structure (DSLBIS) 75 Switch Scoped Latency and Bandwidth Information Structure (SSLBIS)
|
| /linux/arch/powerpc/mm/book3s64/ ! |
| H A D | radix_tlb.c | 66 /* Flush process scoped entries. */ in tlbiel_all_isa300() 108 prs = 1; /* process scoped */ in __tlbiel_pid() 122 prs = 1; /* process scoped */ in __tlbie_pid() 136 prs = 0; /* partition scoped */ in __tlbie_lpid() 150 prs = 1; /* process scoped */ in __tlbie_lpid_guest() 166 prs = 1; /* process scoped */ in __tlbiel_va() 182 prs = 1; /* process scoped */ in __tlbie_va() 198 prs = 0; /* partition scoped */ in __tlbie_lpid_va() 1146 * Flush partition scoped LPID address translation for all CPUs. 1159 * Flush partition scoped PWC from LPID for all CPUs. [all …]
|
| /linux/security/landlock/ ! |
| H A D | task.c | 33 * domain_scope_le - Checks domain ordering for scoped ptrace 55 /* @parent is in the scoped hierarchy of @child. */ in domain_scope_le() 177 * is scoped to access @server (i.e. access should be denied). 204 * parent domains are scoped. in domain_is_scoped() 223 * hierarchy. If the client is scoped, the request is in domain_is_scoped()
|
| H A D | syscalls.c | 105 ruleset_size += sizeof(ruleset_attr.scoped); in build_check_abi() 244 if ((ruleset_attr.scoped | LANDLOCK_MASK_SCOPE) != LANDLOCK_MASK_SCOPE) in SYSCALL_DEFINE3() 250 ruleset_attr.scoped); in SYSCALL_DEFINE3()
|
| /linux/samples/landlock/ ! |
| H A D | sandboxer.c | 239 if (!(ruleset_attr->scoped & in check_ruleset_scope() 270 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET; in check_ruleset_scope() 272 ruleset_attr->scoped &= ~LANDLOCK_SCOPE_SIGNAL; in check_ruleset_scope() 358 .scoped = LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | in main() 432 ruleset_attr.scoped &= ~(LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | in main()
|
| /linux/samples/rust/ ! |
| H A D | Kconfig | 77 tristate "Scoped DebugFS Test Module" 80 This option builds the Rust Scoped DebugFS Test module sample.
|
| /linux/tools/testing/selftests/landlock/ ! |
| H A D | scoped_signal_test.c | 77 * after getting scoped. 107 * domain is not scoped. in TEST_F() 169 * This test ensures that a scoped process cannot send signal out of 170 * scoped domain.
|
| H A D | scoped_test.c | 24 .scoped = scoped_mask, in TEST()
|
| H A D | scoped_common.h | 17 .scoped = scope, in create_scoped_domain()
|
| H A D | audit_test.c | 76 .scoped = LANDLOCK_SCOPE_SIGNAL, in TEST_F() 222 .scoped = LANDLOCK_SCOPE_SIGNAL, in TEST_F() 364 .scoped = LANDLOCK_SCOPE_SIGNAL, in TEST_F() 557 .scoped = LANDLOCK_SCOPE_SIGNAL, in TEST_F()
|
| H A D | scoped_abstract_unix_test.c | 71 * parent, when they have scoped domain or no domain. 167 * its child, when they have scoped domain or no domain. 413 * grand child processes when they can have scoped or non-scoped domains. 1021 * the domain is not scoped. in TEST() 1110 /* Child's domain is scoped. */ in TEST()
|
| H A D | sandbox-and-launch.c | 22 .scoped = LANDLOCK_SCOPE_SIGNAL, in main()
|
| /linux/rust/kernel/ ! |
| H A D | debugfs.rs | 396 let scoped = self.scoped_dir(name); in scope() localVariable 397 init(data, &scoped); in scope() 398 scoped.into_entry() in scope() 495 let scoped = ScopedDir::new(name); in dir() localVariable 496 init(data, &scoped); in dir() 497 scoped.into_entry() in dir()
|
| /linux/Documentation/security/ ! |
| H A D | landlock.rst | 12 Landlock's goal is to create scoped access-control (i.e. sandboxing). To 45 sandboxed process shall retain their scoped accesses (at the time of resource
|
| /linux/Documentation/userspace-api/ ! |
| H A D | landlock.rst | 84 .scoped = 128 ruleset_attr.scoped &= ~(LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET | 354 The operations which can be scoped are: 373 If an operation is scoped within a domain, no rules can be added to allow access 676 ``LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET`` to the ``scoped`` ruleset attribute. 683 ``scoped`` ruleset attribute.
|
| /linux/kernel/kcsan/ ! |
| H A D | core.c | 212 /* Check scoped accesses; never inline because this is a slow-path! */ 568 * 2. Avoid races of scoped accesses from nested interrupts (below). in kcsan_setup_watchpoint() 574 * Avoid races of scoped accesses from nested interrupts (or scheduler). in kcsan_setup_watchpoint() 575 * Assume setting up a watchpoint for a non-scoped (normal) access that in kcsan_setup_watchpoint() 576 * also conflicts with a current scoped access. In a nested interrupt, in kcsan_setup_watchpoint() 577 * which shares the context, it would check a conflicting scoped access. in kcsan_setup_watchpoint() 578 * To avoid, disable scoped access checking. in kcsan_setup_watchpoint()
|
| /linux/Documentation/arch/powerpc/ ! |
| H A D | ultravisor.rst | 305 scoped page table. But the Hypervisor can provide a hint to the 372 partition-scoped page-table of the SVM. If `dest_gpa` is not shared, 488 scoped page tables for the Hypervisor as well as each of the 490 operates in partition 0 and its partition-scoped page tables 494 scoped and process-scoped page table entries for the Hypervisor
|
| /linux/security/landlock/errata/ ! |
| H A D | abi-6.h | 6 * Erratum 2: Scoped signal handling
|
| /linux/include/uapi/linux/ ! |
| H A D | openat2.h | 36 be scoped inside the dirfd
|
| /linux/Documentation/userspace-api/fwctl/ ! |
| H A D | pds_fwctl.rst | 31 scoped user requests.
|
| /linux/Documentation/virt/kvm/arm/ ! |
| H A D | vcpu-features.rst | 27 system. The ID register values may be VM-scoped in KVM, meaning that the
|
| /linux/net/ipv4/ ! |
| H A D | ping.c | 342 int addr_type, scoped, has_addr; in ping_check_bind_addr() local 355 scoped = __ipv6_addr_needs_scope_id(addr_type); in ping_check_bind_addr() 358 (scoped && !addr->sin6_scope_id)) in ping_check_bind_addr() 378 scoped); in ping_check_bind_addr() 385 if (scoped) in ping_check_bind_addr()
|