/linux-master/sound/drivers/ |
H A D | aloop.c | 122 snd_pcm_access_t access; member in struct:loopback_setup 164 /* size of per channel buffer in case of non-interleaved access */ 325 static bool is_access_interleaved(snd_pcm_access_t access) argument 327 switch (access) { 355 is_access_interleaved(runtime->access) != 356 is_access_interleaved(cruntime->access); 384 if (is_access_interleaved(setup->access) != 385 is_access_interleaved(runtime->access)) { 388 setup->access = runtime->access; 1557 snd_pcm_access_t access; local [all...] |
/linux-master/sound/i2c/ |
H A D | cs8427.c | 475 .access = (SNDRV_CTL_ELEM_ACCESS_READ | 484 .access = (SNDRV_CTL_ELEM_ACCESS_READ | 490 .access = SNDRV_CTL_ELEM_ACCESS_READ, 505 .access = (SNDRV_CTL_ELEM_ACCESS_READWRITE | 518 .access = (SNDRV_CTL_ELEM_ACCESS_READ | 567 chip->playback.pcm_ctl->vd[0].access &= ~SNDRV_CTL_ELEM_ACCESS_INACTIVE; 569 chip->playback.pcm_ctl->vd[0].access |= SNDRV_CTL_ELEM_ACCESS_INACTIVE;
|
/linux-master/drivers/cxl/core/ |
H A D | cdat.c | 92 int access, unsigned int val) 94 switch (access) { 119 int access, unsigned int val) 122 __cxl_access_coordinate_set(&coord[i], access, val); 591 enum access_coordinate_class access) 593 return hmat_update_target_coordinates(nid, &cxlr->coord[access], access); 91 __cxl_access_coordinate_set(struct access_coordinate *coord, int access, unsigned int val) argument 118 cxl_access_coordinate_set(struct access_coordinate *coord, int access, unsigned int val) argument 590 cxl_update_hmat_access_coordinates(int nid, struct cxl_region *cxlr, enum access_coordinate_class access) argument
|
/linux-master/fs/nfsd/ |
H A D | nfsfh.c | 140 * A pseudoroot export gives permission to access only one 142 * before granting access to anything else under it: 218 * access control settings being in effect, we cannot 301 * fh_verify - filehandle lookup and access checking 305 * @access: type of access needed to object 308 * access to the export, and set the current task's credentials. 324 * @access is formed from the NFSD_MAY_* constants defined in 328 fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, umode_t type, int access) argument 343 trace_nfsd_fh_verify(rqstp, fhp, type, access); [all...] |
/linux-master/include/sound/ |
H A D | soc.h | 85 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 93 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ | \ 105 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 124 .access = SNDRV_CTL_ELEM_ACCESS_READ | \ 143 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 152 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ | \ 165 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 176 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 186 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 195 .access [all...] |
/linux-master/drivers/gpu/drm/nouveau/ |
H A D | nouveau_chan.c | 209 args.access = NV_DMA_V0_ACCESS_VM; 216 * the framebuffer bar rather than direct vram access.. 220 args.access = NV_DMA_V0_ACCESS_RDWR; 226 args.access = NV_DMA_V0_ACCESS_RDWR; 233 args.access = NV_DMA_V0_ACCESS_RDWR; 239 args.access = NV_DMA_V0_ACCESS_RDWR; 400 args.access = NV_DMA_V0_ACCESS_VM; 405 args.access = NV_DMA_V0_ACCESS_RDWR; 418 args.access = NV_DMA_V0_ACCESS_VM; 424 args.access [all...] |
/linux-master/sound/pci/oxygen/ |
H A D | oxygen_mixer.c | 741 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | \ 758 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 799 .access = SNDRV_CTL_ELEM_ACCESS_READ, 807 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 820 .access = SNDRV_CTL_ELEM_ACCESS_READ, 828 .access = SNDRV_CTL_ELEM_ACCESS_READ, 868 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 893 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 920 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 947 .access [all...] |
/linux-master/arch/x86/kvm/mmu/ |
H A D | mmu.c | 293 unsigned int access) 295 u64 spte = make_mmio_spte(vcpu, gfn, access); 628 * lost when the SPTE is marked for access tracking. 729 * For leaf SPTEs, fetch the *guest* access permissions being shadowed. Note 730 * that the SPTE itself may have a more constrained access permissions that 741 * KVM is not shadowing any guest page tables, so the "guest access 745 * is shadowing a guest huge page with small pages, the guest access 746 * permissions being shadowed are the access permissions of the huge 749 * In both cases, sp->role.access contains the correct access bit 292 mark_mmio_spte(struct kvm_vcpu *vcpu, u64 *sptep, u64 gfn, unsigned int access) argument 754 kvm_mmu_page_set_translation(struct kvm_mmu_page *sp, int index, gfn_t gfn, unsigned int access) argument 773 kvm_mmu_page_set_access(struct kvm_mmu_page *sp, int index, unsigned int access) argument 1597 __rmap_add(struct kvm *kvm, struct kvm_mmu_memory_cache *cache, const struct kvm_memory_slot *slot, u64 *spte, gfn_t gfn, unsigned int access) argument 1621 rmap_add(struct kvm_vcpu *vcpu, const struct kvm_memory_slot *slot, u64 *spte, gfn_t gfn, unsigned int access) argument 2264 kvm_mmu_child_role(u64 *sptep, bool direct, unsigned int access) argument 2310 kvm_mmu_get_child_sp(struct kvm_vcpu *vcpu, u64 *sptep, gfn_t gfn, bool direct, unsigned int access) argument 2940 unsigned int access = sp->role.access; local 3268 kvm_handle_noslot_fault(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault, unsigned int access) argument 4055 nonpaging_gva_to_gpa(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu, gpa_t vaddr, u64 access, struct x86_exception *exception) argument 4168 unsigned int access = get_mmio_spte_access(spte); local 4343 kvm_faultin_pfn(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault, unsigned int access) argument 4806 sync_mmio_spte(struct kvm_vcpu *vcpu, u64 *sptep, gfn_t gfn, unsigned int access) argument 6508 unsigned int access; local [all...] |
/linux-master/drivers/infiniband/sw/rxe/ |
H A D | rxe_verbs.c | 790 wr->wr.reg.access = reg_wr(ibwr)->access; 1220 static struct ib_mr *rxe_get_dma_mr(struct ib_pd *ibpd, int access) argument 1241 rxe_mr_init_dma(access, mr); 1252 u64 length, u64 iova, int access, 1260 if (access & ~RXE_ACCESS_SUPPORTED_MR) { 1261 rxe_err_pd(pd, "access = %#x not supported (%#x)\n", access, 1280 err = rxe_mr_init_user(rxe, start, length, access, mr); 1301 int access, struc 1251 rxe_reg_user_mr(struct ib_pd *ibpd, u64 start, u64 length, u64 iova, int access, struct ib_udata *udata) argument 1299 rxe_rereg_user_mr(struct ib_mr *ibmr, int flags, u64 start, u64 length, u64 iova, int access, struct ib_pd *ibpd, struct ib_udata *udata) argument [all...] |
/linux-master/sound/soc/ |
H A D | soc-topology.c | 479 && (k->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ 480 || k->access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE) 481 && k->access & SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK) { 503 k->access |= SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK; 516 if ((k->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ) && !sbe->get) 518 if ((k->access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE) && !sbe->put) 624 u32 access = le32_to_cpu(tc->access); local 626 if (!(access & SNDRV_CTL_ELEM_ACCESS_TLV_READWRITE)) 629 if (!(access [all...] |
/linux-master/drivers/infiniband/hw/mthca/ |
H A D | mthca_mr.c | 428 u64 iova, u64 total_size, u32 access, struct mthca_mr *mr) 460 access); 510 u32 access, struct mthca_mr *mr) 513 return mthca_mr_alloc(dev, pd, 12, 0, ~0ULL, access, mr); 519 u32 access, struct mthca_mr *mr) 534 total_size, access, mr); 427 mthca_mr_alloc(struct mthca_dev *dev, u32 pd, int buffer_size_shift, u64 iova, u64 total_size, u32 access, struct mthca_mr *mr) argument 509 mthca_mr_alloc_notrans(struct mthca_dev *dev, u32 pd, u32 access, struct mthca_mr *mr) argument 516 mthca_mr_alloc_phys(struct mthca_dev *dev, u32 pd, u64 *buffer_list, int buffer_size_shift, int list_len, u64 iova, u64 total_size, u32 access, struct mthca_mr *mr) argument
|
/linux-master/arch/x86/kvm/ |
H A D | i8254.c | 444 int channel, access; local 474 access = (val >> 4) & KVM_PIT_CHANNEL_MASK; 475 if (access == 0) { 478 s->rw_mode = access; 479 s->read_state = access; 480 s->write_state = access;
|
/linux-master/sound/soc/uniphier/ |
H A D | aio-cpu.c | 664 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 673 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 682 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 691 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 700 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 709 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE,
|
/linux-master/drivers/net/ethernet/ti/ |
H A D | davinci_mdio.c | 78 u32 access; member in struct:davinci_mdio_regs::__anon1634 130 * In the worst case, we could be kicking off a user-access immediately 132 * so, our request could get deferred by one access cycle. We 133 * defensively allow for 4 access cycles. 358 /* wait until hardware is ready for another user access */ 366 reg = readl(®s->user[0].access); 386 reg = readl(®s->user[0].access); 390 dev_err(data->dev, "timed out waiting for user access\n"); 431 writel(reg, &data->regs->user[0].access); 439 reg = readl(&data->regs->user[0].access); [all...] |
/linux-master/drivers/hwtracing/coresight/ |
H A D | coresight-tmc-core.c | 41 struct csdev_access *csa = &csdev->access; 55 struct csdev_access *csa = &csdev->access; 405 struct csdev_access *access) 415 tmc_pid = coresight_get_pid(access); 495 desc.access = CSDEV_ACCESS_IOMEM(base); 528 ret = tmc_etr_setup_caps(dev, devid, &desc.access); 404 tmc_etr_setup_caps(struct device *parent, u32 devid, struct csdev_access *access) argument
|
/linux-master/drivers/vhost/ |
H A D | vhost.c | 1044 /* No one will access memory at this point */ 1146 struct iovec iov[], int iov_size, int access); 1158 * could be access through iotlb. So -EAGAIN should 1193 * could be access through iotlb. So -EAGAIN should 1240 vq_err(vq, "Non atomic userspace memory access: uaddr " 1251 * could be access through iotlb. So -EAGAIN should 1407 static bool umem_access_ok(u64 uaddr, u64 size, int access) argument 1415 if ((access & VHOST_ACCESS_RO) && 1418 if ((access & VHOST_ACCESS_WO) && 1620 static int vhost_iotlb_miss(struct vhost_virtqueue *vq, u64 iova, int access) argument 1667 int access = (type == VHOST_ADDR_USED) ? local 1674 iotlb_access_ok(struct vhost_virtqueue *vq, int access, u64 addr, u64 len, int type) argument 2388 translate_desc(struct vhost_virtqueue *vq, u64 addr, u32 len, struct iovec iov[], int iov_size, int access) argument 2459 int ret, access; local 2560 int ret, access; local [all...] |
/linux-master/drivers/misc/c2port/ |
H A D | c2port-duramar2150.c | 41 /* When access is "off" is important that both lines are set 105 .access = duramar2150_c2port_access, 143 /* Setup the GPIOs as input by default (access = 0) */
|
/linux-master/sound/pcmcia/vx/ |
H A D | vxp_mixer.c | 61 .access = (SNDRV_CTL_ELEM_ACCESS_READWRITE |
|
/linux-master/include/linux/platform_data/ |
H A D | gpmc-omap.h | 58 u32 page_burst_access; /* Multiple access word delay */ 59 u32 access; /* Start-cycle to first data valid delay */ member in struct:gpmc_timings 91 u32 t_aa; /* access time from ADV assertion */ 92 u32 t_iaa; /* initial access time */ 93 u32 t_oe; /* access time from OE assertion */ 94 u32 t_ce; /* access time from CS asertion */ 105 u32 t_bacc; /* burst access valid clock to output delay */ 120 u8 cyc_oe; /* access time from OE assertion in cycles */ 122 u32 cyc_iaa; /* initial access time in cycles */
|
/linux-master/drivers/gpu/drm/etnaviv/ |
H A D | etnaviv_gem.h | 44 u32 access; member in struct:etnaviv_gem_object
|
/linux-master/sound/soc/atmel/ |
H A D | mchp-spdifrx.c | 891 .access = SNDRV_CTL_ELEM_ACCESS_READ | 900 .access = SNDRV_CTL_ELEM_ACCESS_READ | 908 .access = SNDRV_CTL_ELEM_ACCESS_READ, 916 .access = SNDRV_CTL_ELEM_ACCESS_READ | 924 .access = SNDRV_CTL_ELEM_ACCESS_READ | 933 .access = SNDRV_CTL_ELEM_ACCESS_READ | 942 .access = SNDRV_CTL_ELEM_ACCESS_READ | 951 .access = SNDRV_CTL_ELEM_ACCESS_READ | 960 .access = SNDRV_CTL_ELEM_ACCESS_READ |
|
/linux-master/include/uapi/rdma/ |
H A D | siw-abi.h | 120 __aligned_u64 access; member in union:siw_sqe::__anon2166
|
/linux-master/drivers/net/ethernet/intel/ice/ |
H A D | ice_flex_pipe.h | 10 ice_acquire_change_lock(struct ice_hw *hw, enum ice_aq_res_access_type access);
|
/linux-master/tools/testing/selftests/net/tcp_ao/lib/ |
H A D | kconfig.c | 15 if (access("/proc/self/ns/net", F_OK) < 0) { 19 test_print("Unable to access /proc/self/ns/net: %m");
|
/linux-master/arch/mips/include/asm/ |
H A D | mips-cpc.h | 80 /* CPC_ACCESS - Control core/IOCU access to CPC registers prior to CM 3 */ 81 CPC_ACCESSOR_RW(32, 0x000, access) 154 * mips_cpc_lock_other - lock access to another core 158 * order to prevent the region being moved during access. Must be called 165 * mips_cpc_unlock_other - unlock access to another core
|