/openbmc/linux/Documentation/admin-guide/device-mapper/ |
H A D | dm-raid.rst | 203 uses it to close the 'write hole' caused by the non-atomic updates 214 and must not suffer from the 'write hole' problem itself (e.g. use
|
/openbmc/linux/arch/powerpc/boot/dts/ |
H A D | taishan.dts | 391 enable-msi-hole;
|
H A D | icon.dts | 287 enable-msi-hole;
|
H A D | katmai.dts | 284 enable-msi-hole;
|
H A D | canyonlands.dts | 439 enable-msi-hole;
|
H A D | glacier.dts | 467 enable-msi-hole;
|
/openbmc/linux/Documentation/arch/x86/ |
H A D | kernel-stacks.rst | 98 the IST stackpointer to a guard hole to catch triple nesting.
|
/openbmc/linux/Documentation/filesystems/caching/ |
H A D | netfs-api.rst | 267 partially populated region (a hole) in the disk content. This may be to ignore 268 it, skip over an initial hole and place zeros in the buffer or give an error.
|
/openbmc/linux/Documentation/arch/ia64/ |
H A D | aliasing.rst | 226 0x00000-0xFFFFF WB only (no VGA MMIO hole)
|
/openbmc/linux/Documentation/arch/s390/ |
H A D | monreader.rst | 39 You can use the CP command DEF STOR CONFIG to define a "memory hole" in your
|
/openbmc/linux/mm/ |
H A D | Kconfig.debug | 182 still fine, as W+X mappings are not a security hole in
|
/openbmc/linux/Documentation/staging/ |
H A D | crc32.rst | 59 Also, to add the CRC to a message, we need a 32-bit-long hole for it at
|
H A D | tee.rst | 242 OP-TEE driver isn't loaded, leaving the SMC hole open.
|
/openbmc/linux/drivers/net/ |
H A D | virtio_net.c | 1948 unsigned int len, hole; in add_recvbuf_mergeable() local 1964 hole = alloc_frag->size - alloc_frag->offset; in add_recvbuf_mergeable() 1965 if (hole < len + room) { in add_recvbuf_mergeable() 1973 len += hole; in add_recvbuf_mergeable() 1974 alloc_frag->offset += hole; in add_recvbuf_mergeable()
|
/openbmc/linux/fs/ocfs2/ |
H A D | dir.c | 1178 unsigned int hole; in ocfs2_figure_dirent_hole() local 1181 hole = le16_to_cpu(de->rec_len); in ocfs2_figure_dirent_hole() 1183 hole = le16_to_cpu(de->rec_len) - in ocfs2_figure_dirent_hole() 1186 return hole; in ocfs2_figure_dirent_hole()
|
/openbmc/linux/net/ipv4/ |
H A D | tcp_output.c | 3412 struct sk_buff *skb, *rtx_head, *hole = NULL; in tcp_xmit_retransmit_queue() local 3432 if (!hole) in tcp_xmit_retransmit_queue() 3447 if (!hole && !(sacked & (TCPCB_SACKED_RETRANS|TCPCB_SACKED_ACKED))) in tcp_xmit_retransmit_queue() 3448 hole = skb; in tcp_xmit_retransmit_queue()
|
/openbmc/linux/Documentation/filesystems/ |
H A D | porting.rst | 441 filesystem does not support hole punching (deallocating space in the middle of a 444 so the i_size should not change when hole punching, even when puching the end of 475 data and there is a virtual hole at the end of the file. So if the provided
|
/openbmc/qemu/pc-bios/ |
H A D | canyonlands.dts | 439 enable-msi-hole;
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | useradd-staticids.bbclass | 96 # in the useradd command may introduce a security hole. It's assumed that
|
/openbmc/linux/arch/m68k/ |
H A D | Kconfig.cpu | 412 value also defines the minimal size of the hole that allows
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-fs-f2fs | 591 f2fs will allocate 1..<max_fragment_chunk> blocks in a chunk and make a hole 599 f2fs will allocate 1..<max_fragment_chunk> blocks in a chunk and make a hole
|
/openbmc/linux/Documentation/security/ |
H A D | self-protection.rst | 170 hole at the bottom of the stack to catch these overflows.
|
/openbmc/linux/Documentation/mm/ |
H A D | unevictable-lru.rst | 509 File truncation or hole punching forcibly unmaps the deleted pages from 520 present, if one of those pages were unmapped by truncation or hole punch before
|
H A D | hugetlbfs_reserv.rst | 426 - When a hole is being punched in a hugetlbfs file. In this case, huge pages 434 happen in the hole punch case where it has to split an existing file_region
|
/openbmc/linux/Documentation/driver-api/ |
H A D | dma-buf.rst | 70 potential security hole. It could give the newly exec'd application
|