/linux-master/drivers/gpu/drm/nouveau/ |
H A D | nouveau_svm.c | 64 u8 access; member in struct:nouveau_svm::nouveau_svm_fault_buffer::nouveau_svm_fault 448 return nouveau_svm_fault_priority(fa->access) - 449 nouveau_svm_fault_priority(fb->access); 493 fault->access = (info & 0x000f0000) >> 16; 498 fault->inst, fault->addr, fault->access); 750 * instance to SVMM translations, followed by address and access 798 * fault window, determining required pages and access 806 * access flags. 808 switch (buffer->fault[fi]->access) { 843 * same SVMM as faults are ordered by access typ [all...] |
H A D | nouveau_chan.c | 209 args.access = NV_DMA_V0_ACCESS_VM; 216 * the framebuffer bar rather than direct vram access.. 220 args.access = NV_DMA_V0_ACCESS_RDWR; 226 args.access = NV_DMA_V0_ACCESS_RDWR; 233 args.access = NV_DMA_V0_ACCESS_RDWR; 239 args.access = NV_DMA_V0_ACCESS_RDWR; 400 args.access = NV_DMA_V0_ACCESS_VM; 405 args.access = NV_DMA_V0_ACCESS_RDWR; 418 args.access = NV_DMA_V0_ACCESS_VM; 424 args.access [all...] |
/linux-master/drivers/base/ |
H A D | node.c | 74 * @dev: Device for this memory access class 75 * @list_node: List element in the node's access list 76 * @access: The access class rank 82 unsigned int access; member in struct:node_access_nodes 129 enum access_coordinate_class access) 135 if (access_node->access == access) 142 access_node->access = access; 128 node_init_node_access(struct node *node, enum access_coordinate_class access) argument 193 node_set_perf_attrs(unsigned int nid, struct access_coordinate *coord, enum access_coordinate_class access) argument 691 register_memory_node_under_compute_node(unsigned int mem_nid, unsigned int cpu_nid, enum access_coordinate_class access) argument [all...] |
/linux-master/drivers/iommu/iommufd/ |
H A D | pages.c | 21 * If access_itree includes the PFN's index then an in-kernel access has 31 * means removing an iommu_domain or releasing a in-kernel access will not fail 1298 * If the range ends in a access then we do the residual unmap without 1534 * iopt_pages_unfill_xarray() - Update the xarry after removing an access 1540 * The access should already be removed from the access_itree. 1570 /* Otherwise covered by an existing access */ 1903 * iopt_area_add_access() - Record an in-knerel access for PFNs 1910 * Record that an in-kernel access will be accessing the pages, ensure they are 1920 struct iopt_pages_access *access; local 1927 access 1975 struct iopt_pages_access *access; local [all...] |
/linux-master/tools/testing/selftests/alsa/ |
H A D | test-pcmtest-driver.c | 26 snd_pcm_access_t access; member in struct:pcmtest_test_params 96 snd_pcm_hw_params_set_access(*handle, hwparams, params->access); 142 self->params.access = SND_PCM_ACCESS_RW_INTERLEAVED; 237 // Test capture in the non-interleaved access mode. The are buffers for each recorded channel 250 params.access = SND_PCM_ACCESS_RW_NONINTERLEAVED; 285 params.access = SND_PCM_ACCESS_RW_NONINTERLEAVED;
|
/linux-master/sound/drivers/ |
H A D | aloop.c | 122 snd_pcm_access_t access; member in struct:loopback_setup 164 /* size of per channel buffer in case of non-interleaved access */ 325 static bool is_access_interleaved(snd_pcm_access_t access) argument 327 switch (access) { 355 is_access_interleaved(runtime->access) != 356 is_access_interleaved(cruntime->access); 384 if (is_access_interleaved(setup->access) != 385 is_access_interleaved(runtime->access)) { 388 setup->access = runtime->access; 1554 snd_pcm_access_t access; local [all...] |
/linux-master/sound/i2c/ |
H A D | cs8427.c | 475 .access = (SNDRV_CTL_ELEM_ACCESS_READ | 484 .access = (SNDRV_CTL_ELEM_ACCESS_READ | 490 .access = SNDRV_CTL_ELEM_ACCESS_READ, 505 .access = (SNDRV_CTL_ELEM_ACCESS_READWRITE | 518 .access = (SNDRV_CTL_ELEM_ACCESS_READ | 567 chip->playback.pcm_ctl->vd[0].access &= ~SNDRV_CTL_ELEM_ACCESS_INACTIVE; 569 chip->playback.pcm_ctl->vd[0].access |= SNDRV_CTL_ELEM_ACCESS_INACTIVE;
|
/linux-master/fs/nfsd/ |
H A D | nfsfh.c | 140 * A pseudoroot export gives permission to access only one 142 * before granting access to anything else under it: 218 * access control settings being in effect, we cannot 301 * fh_verify - filehandle lookup and access checking 305 * @access: type of access needed to object 308 * access to the export, and set the current task's credentials. 324 * @access is formed from the NFSD_MAY_* constants defined in 328 fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, umode_t type, int access) argument 343 trace_nfsd_fh_verify(rqstp, fhp, type, access); [all...] |
/linux-master/drivers/cxl/core/ |
H A D | cdat.c | 92 int access, unsigned int val) 94 switch (access) { 119 int access, unsigned int val) 122 __cxl_access_coordinate_set(&coord[i], access, val); 591 enum access_coordinate_class access) 593 return hmat_update_target_coordinates(nid, &cxlr->coord[access], access); 91 __cxl_access_coordinate_set(struct access_coordinate *coord, int access, unsigned int val) argument 118 cxl_access_coordinate_set(struct access_coordinate *coord, int access, unsigned int val) argument 590 cxl_update_hmat_access_coordinates(int nid, struct cxl_region *cxlr, enum access_coordinate_class access) argument
|
/linux-master/include/sound/ |
H A D | soc.h | 75 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 83 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ | \ 95 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 114 .access = SNDRV_CTL_ELEM_ACCESS_READ | \ 133 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 142 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ | \ 154 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 164 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ |\ 173 .access = SNDRV_CTL_ELEM_ACCESS_TLV_READ | \ 185 .access [all...] |
/linux-master/sound/pci/oxygen/ |
H A D | oxygen_mixer.c | 741 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | \ 758 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 799 .access = SNDRV_CTL_ELEM_ACCESS_READ, 807 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 820 .access = SNDRV_CTL_ELEM_ACCESS_READ, 828 .access = SNDRV_CTL_ELEM_ACCESS_READ, 868 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 893 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 920 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 947 .access [all...] |
/linux-master/drivers/infiniband/sw/rxe/ |
H A D | rxe_verbs.c | 790 wr->wr.reg.access = reg_wr(ibwr)->access; 1221 static struct ib_mr *rxe_get_dma_mr(struct ib_pd *ibpd, int access) argument 1242 rxe_mr_init_dma(access, mr); 1253 u64 length, u64 iova, int access, 1261 if (access & ~RXE_ACCESS_SUPPORTED_MR) { 1262 rxe_err_pd(pd, "access = %#x not supported (%#x)\n", access, 1281 err = rxe_mr_init_user(rxe, start, length, access, mr); 1302 int access, struc 1252 rxe_reg_user_mr(struct ib_pd *ibpd, u64 start, u64 length, u64 iova, int access, struct ib_udata *udata) argument 1300 rxe_rereg_user_mr(struct ib_mr *ibmr, int flags, u64 start, u64 length, u64 iova, int access, struct ib_pd *ibpd, struct ib_udata *udata) argument [all...] |
/linux-master/sound/soc/ |
H A D | soc-topology.c | 479 && (k->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ 480 || k->access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE) 481 && k->access & SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK) { 503 k->access |= SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK; 516 if ((k->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ) && !sbe->get) 518 if ((k->access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE) && !sbe->put) 624 u32 access = le32_to_cpu(tc->access); local 626 if (!(access & SNDRV_CTL_ELEM_ACCESS_TLV_READWRITE)) 629 if (!(access [all...] |
/linux-master/arch/x86/kvm/mmu/ |
H A D | mmu.c | 293 unsigned int access) 295 u64 spte = make_mmio_spte(vcpu, gfn, access); 628 * lost when the SPTE is marked for access tracking. 729 * For leaf SPTEs, fetch the *guest* access permissions being shadowed. Note 730 * that the SPTE itself may have a more constrained access permissions that 741 * KVM is not shadowing any guest page tables, so the "guest access 745 * is shadowing a guest huge page with small pages, the guest access 746 * permissions being shadowed are the access permissions of the huge 749 * In both cases, sp->role.access contains the correct access bit 292 mark_mmio_spte(struct kvm_vcpu *vcpu, u64 *sptep, u64 gfn, unsigned int access) argument 754 kvm_mmu_page_set_translation(struct kvm_mmu_page *sp, int index, gfn_t gfn, unsigned int access) argument 773 kvm_mmu_page_set_access(struct kvm_mmu_page *sp, int index, unsigned int access) argument 1641 __rmap_add(struct kvm *kvm, struct kvm_mmu_memory_cache *cache, const struct kvm_memory_slot *slot, u64 *spte, gfn_t gfn, unsigned int access) argument 1665 rmap_add(struct kvm_vcpu *vcpu, const struct kvm_memory_slot *slot, u64 *spte, gfn_t gfn, unsigned int access) argument 2307 kvm_mmu_child_role(u64 *sptep, bool direct, unsigned int access) argument 2353 kvm_mmu_get_child_sp(struct kvm_vcpu *vcpu, u64 *sptep, gfn_t gfn, bool direct, unsigned int access) argument 2983 unsigned int access = sp->role.access; local 3311 kvm_handle_noslot_fault(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault, unsigned int access) argument 4088 nonpaging_gva_to_gpa(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu, gpa_t vaddr, u64 access, struct x86_exception *exception) argument 4201 unsigned int access = get_mmio_spte_access(spte); local 4413 kvm_faultin_pfn(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault, unsigned int access) argument 4812 sync_mmio_spte(struct kvm_vcpu *vcpu, u64 *sptep, gfn_t gfn, unsigned int access) argument 6495 unsigned int access; local [all...] |
/linux-master/drivers/infiniband/hw/mthca/ |
H A D | mthca_mr.c | 428 u64 iova, u64 total_size, u32 access, struct mthca_mr *mr) 460 access); 510 u32 access, struct mthca_mr *mr) 513 return mthca_mr_alloc(dev, pd, 12, 0, ~0ULL, access, mr); 519 u32 access, struct mthca_mr *mr) 534 total_size, access, mr); 427 mthca_mr_alloc(struct mthca_dev *dev, u32 pd, int buffer_size_shift, u64 iova, u64 total_size, u32 access, struct mthca_mr *mr) argument 509 mthca_mr_alloc_notrans(struct mthca_dev *dev, u32 pd, u32 access, struct mthca_mr *mr) argument 516 mthca_mr_alloc_phys(struct mthca_dev *dev, u32 pd, u64 *buffer_list, int buffer_size_shift, int list_len, u64 iova, u64 total_size, u32 access, struct mthca_mr *mr) argument
|
/linux-master/arch/x86/kvm/ |
H A D | i8254.c | 444 int channel, access; local 474 access = (val >> 4) & KVM_PIT_CHANNEL_MASK; 475 if (access == 0) { 478 s->rw_mode = access; 479 s->read_state = access; 480 s->write_state = access;
|
/linux-master/sound/soc/uniphier/ |
H A D | aio-cpu.c | 664 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 673 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 682 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 691 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 700 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 709 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE,
|
/linux-master/drivers/net/ethernet/ti/ |
H A D | davinci_mdio.c | 78 u32 access; member in struct:davinci_mdio_regs::__anon1634 130 * In the worst case, we could be kicking off a user-access immediately 132 * so, our request could get deferred by one access cycle. We 133 * defensively allow for 4 access cycles. 358 /* wait until hardware is ready for another user access */ 366 reg = readl(®s->user[0].access); 386 reg = readl(®s->user[0].access); 390 dev_err(data->dev, "timed out waiting for user access\n"); 431 writel(reg, &data->regs->user[0].access); 439 reg = readl(&data->regs->user[0].access); [all...] |
/linux-master/drivers/vhost/ |
H A D | vhost.c | 988 /* No one will access memory at this point */ 1090 struct iovec iov[], int iov_size, int access); 1102 * could be access through iotlb. So -EAGAIN should 1137 * could be access through iotlb. So -EAGAIN should 1184 vq_err(vq, "Non atomic userspace memory access: uaddr " 1195 * could be access through iotlb. So -EAGAIN should 1351 static bool umem_access_ok(u64 uaddr, u64 size, int access) argument 1359 if ((access & VHOST_ACCESS_RO) && 1362 if ((access & VHOST_ACCESS_WO) && 1564 static int vhost_iotlb_miss(struct vhost_virtqueue *vq, u64 iova, int access) argument 1611 int access = (type == VHOST_ADDR_USED) ? local 1618 iotlb_access_ok(struct vhost_virtqueue *vq, int access, u64 addr, u64 len, int type) argument 2332 translate_desc(struct vhost_virtqueue *vq, u64 addr, u32 len, struct iovec iov[], int iov_size, int access) argument 2403 int ret, access; local 2504 int ret, access; local [all...] |
/linux-master/drivers/misc/c2port/ |
H A D | c2port-duramar2150.c | 41 /* When access is "off" is important that both lines are set 105 .access = duramar2150_c2port_access, 143 /* Setup the GPIOs as input by default (access = 0) */
|
/linux-master/sound/pcmcia/vx/ |
H A D | vxp_mixer.c | 61 .access = (SNDRV_CTL_ELEM_ACCESS_READWRITE |
|
/linux-master/include/linux/platform_data/ |
H A D | gpmc-omap.h | 58 u32 page_burst_access; /* Multiple access word delay */ 59 u32 access; /* Start-cycle to first data valid delay */ member in struct:gpmc_timings 91 u32 t_aa; /* access time from ADV assertion */ 92 u32 t_iaa; /* initial access time */ 93 u32 t_oe; /* access time from OE assertion */ 94 u32 t_ce; /* access time from CS asertion */ 105 u32 t_bacc; /* burst access valid clock to output delay */ 120 u8 cyc_oe; /* access time from OE assertion in cycles */ 122 u32 cyc_iaa; /* initial access time in cycles */
|
/linux-master/drivers/gpu/drm/etnaviv/ |
H A D | etnaviv_gem.h | 44 u32 access; member in struct:etnaviv_gem_object
|
/linux-master/sound/soc/atmel/ |
H A D | mchp-spdifrx.c | 891 .access = SNDRV_CTL_ELEM_ACCESS_READ | 900 .access = SNDRV_CTL_ELEM_ACCESS_READ | 908 .access = SNDRV_CTL_ELEM_ACCESS_READ, 916 .access = SNDRV_CTL_ELEM_ACCESS_READ | 924 .access = SNDRV_CTL_ELEM_ACCESS_READ | 933 .access = SNDRV_CTL_ELEM_ACCESS_READ | 942 .access = SNDRV_CTL_ELEM_ACCESS_READ | 951 .access = SNDRV_CTL_ELEM_ACCESS_READ | 960 .access = SNDRV_CTL_ELEM_ACCESS_READ |
|
/linux-master/include/uapi/rdma/ |
H A D | siw-abi.h | 120 __aligned_u64 access; member in union:siw_sqe::__anon2166
|