Function report |
Source Code:mm\gup.c |
Create Date:2022-07-28 14:34:14 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:FOLL_FORCE can write to even unwritable pte's, but only* after we've gone through a COW cycle and they are dirty.
Proto:static inline bool can_follow_write_pte(pte_t pte, unsigned int flags)
Type:bool
Parameter:
| Type | Parameter | Name |
|---|---|---|
| pte_t | pte | |
| unsigned int | flags |
| 169 | Return pte_write(pte) || flags & get_user_pages read/write w/o permission && flags & rnal GUP flag && The following only work if pte_present() is true.* Undefined behaviour if not.. |
| Name | Describe |
|---|---|
| follow_page_pte |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |