/linux-master/tools/testing/selftests/alsa/conf.d/ |
H A D | Lenovo_ThinkPad_P1_Gen2.conf | 43 access RW_INTERLEAVED # can be omitted - default 51 access RW_INTERLEAVED 59 access RW_INTERLEAVED
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | dev_cgroup.c | 17 short access = ctx->access_type >> 16; local 32 if (access & BPF_DEVCG_ACC_READ) 35 if (access & BPF_DEVCG_ACC_WRITE) 38 if (access & BPF_DEVCG_ACC_MKNOD) 44 /* Allow access to /dev/zero and /dev/random.
|
/linux-master/drivers/platform/chrome/ |
H A D | cros_ec_lpc_mec.c | 24 * @access_type: Type of access, typically 32-bit auto-increment 79 enum cros_ec_lpc_mec_emi_access_mode access, new_access; local 87 * Long access cannot be used on misaligned data since reading B0 loads 91 access = ACCESS_TYPE_BYTE; 93 access = ACCESS_TYPE_LONG_AUTO_INCREMENT; 98 cros_ec_lpc_mec_emi_write_address(offset, access); 118 * Use long auto-increment access except for misaligned write, 126 if (new_access != access || 127 access != ACCESS_TYPE_LONG_AUTO_INCREMENT) { 128 access [all...] |
/linux-master/include/linux/ |
H A D | device_cgroup.h | 16 short access); 19 short type, access = 0; local 32 access |= DEVCG_ACC_WRITE; 34 access |= DEVCG_ACC_READ; 37 access); 61 short access) 60 devcgroup_check_permission(short type, u32 major, u32 minor, short access) argument
|
H A D | iommufd.h | 50 void iommufd_access_destroy(struct iommufd_access *access); 51 int iommufd_access_attach(struct iommufd_access *access, u32 ioas_id); 52 int iommufd_access_replace(struct iommufd_access *access, u32 ioas_id); 53 void iommufd_access_detach(struct iommufd_access *access); 63 int iommufd_access_pin_pages(struct iommufd_access *access, unsigned long iova, 66 void iommufd_access_unpin_pages(struct iommufd_access *access, 68 int iommufd_access_rw(struct iommufd_access *access, unsigned long iova, 83 static inline int iommufd_access_pin_pages(struct iommufd_access *access, argument 92 static inline void iommufd_access_unpin_pages(struct iommufd_access *access, argument 98 static inline int iommufd_access_rw(struct iommufd_access *access, unsigne argument [all...] |
H A D | c2port.h | 20 unsigned int access:1; member in struct:c2port_device 39 /* Enable or disable the access to C2 port */ 40 void (*access)(struct c2port_device *dev, int status); member in struct:c2port_ops
|
/linux-master/arch/arm/include/asm/ |
H A D | arch_timer.h | 28 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u64 val) argument 30 if (access == ARCH_TIMER_PHYS_ACCESS) { 42 } else if (access == ARCH_TIMER_VIRT_ACCESS) { 60 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) argument 64 if (access == ARCH_TIMER_PHYS_ACCESS) { 72 } else if (access == ARCH_TIMER_VIRT_ACCESS) {
|
/linux-master/drivers/iommu/iommufd/ |
H A D | device.c | 737 * a valid cur_ioas (access->ioas). A caller passing in a valid new_ioas should 740 static int iommufd_access_change_ioas(struct iommufd_access *access, argument 743 u32 iopt_access_list_id = access->iopt_access_list_id; 744 struct iommufd_ioas *cur_ioas = access->ioas; 747 lockdep_assert_held(&access->ioas_lock); 750 if (cur_ioas != access->ioas_unpin) 758 * iommufd_access_unpin_pages() can continue using access->ioas_unpin. 760 access->ioas = NULL; 763 rc = iopt_add_access(&new_ioas->iopt, access); 765 access 787 iommufd_access_change_ioas_id(struct iommufd_access *access, u32 id) argument 801 struct iommufd_access *access = local 828 struct iommufd_access *access; local 863 iommufd_access_destroy(struct iommufd_access *access) argument 869 iommufd_access_detach(struct iommufd_access *access) argument 881 iommufd_access_attach(struct iommufd_access *access, u32 ioas_id) argument 897 iommufd_access_replace(struct iommufd_access *access, u32 ioas_id) argument 933 struct iommufd_access *access; local 959 iommufd_access_unpin_pages(struct iommufd_access *access, unsigned long iova, unsigned long length) argument 1033 iommufd_access_pin_pages(struct iommufd_access *access, unsigned long iova, unsigned long length, struct page **out_pages, unsigned int flags) argument 1122 iommufd_access_rw(struct iommufd_access *access, unsigned long iova, void *data, size_t length, unsigned int flags) argument [all...] |
/linux-master/sound/core/ |
H A D | control_led.c | 49 unsigned int access; member in struct:snd_ctl_led_ctl 81 static inline unsigned int access_to_group(unsigned int access) argument 83 return ((access & SNDRV_CTL_ELEM_ACCESS_LED_MASK) >> 92 static struct snd_ctl_led *snd_ctl_led_get_by_access(unsigned int access) argument 94 unsigned int group = access_to_group(access); 137 static void snd_ctl_led_set_state(struct snd_card *card, unsigned int access, argument 145 led = snd_ctl_led_get_by_access(access); 163 lctl->access = access; 197 unsigned int access) 196 snd_ctl_led_remove(struct snd_kcontrol *kctl, unsigned int ioff, unsigned int access) argument 216 unsigned int access, access2; local 247 unsigned int ioff, access, new_access; local [all...] |
/linux-master/drivers/gpu/drm/nouveau/nvkm/engine/dma/ |
H A D | user.c | 85 nvif_ioctl(parent, "create dma vers %d target %d access %d " 87 args->v0.version, args->v0.target, args->v0.access, 90 dmaobj->access = args->v0.access; 120 switch (dmaobj->access) { 122 dmaobj->access = NV_MEM_ACCESS_VM; 125 dmaobj->access = NV_MEM_ACCESS_RO; 128 dmaobj->access = NV_MEM_ACCESS_WO; 131 dmaobj->access = NV_MEM_ACCESS_RW;
|
/linux-master/drivers/infiniband/sw/rxe/ |
H A D | rxe_mw.c | 51 struct rxe_mw *mw, struct rxe_mr *mr, int access) 61 if (unlikely((access & IB_ZERO_BASED))) { 94 if (unlikely(mr->access & IB_ZERO_BASED)) { 100 if (unlikely(!(mr->access & IB_ACCESS_MW_BIND))) { 102 "attempt to bind an MW to an MR without bind access\n"); 107 if (unlikely((access & 109 !(mr->access & IB_ACCESS_LOCAL_WRITE))) { 111 "attempt to bind an Writable MW to an MR without local write access\n"); 116 if (access & IB_ZERO_BASED) { 136 struct rxe_mw *mw, struct rxe_mr *mr, int access) 50 rxe_check_bind_mw(struct rxe_qp *qp, struct rxe_send_wqe *wqe, struct rxe_mw *mw, struct rxe_mr *mr, int access) argument 135 rxe_do_bind_mw(struct rxe_qp *qp, struct rxe_send_wqe *wqe, struct rxe_mw *mw, struct rxe_mr *mr, int access) argument 172 int access = wqe->wr.wr.mw.access; local 290 rxe_lookup_mw(struct rxe_qp *qp, int access, u32 rkey) argument [all...] |
/linux-master/drivers/sh/intc/ |
H A D | Makefile | 2 obj-y := access.o chip.o core.o handle.o irqdomain.o virq.o
|
/linux-master/fs/nfsd/ |
H A D | lockd.c | 32 int access; local 41 access = (mode == O_WRONLY) ? NFSD_MAY_WRITE : NFSD_MAY_READ; 42 access |= NFSD_MAY_LOCK; 43 nfserr = nfsd_open(rqstp, &fh, S_IFREG, access, filp);
|
/linux-master/drivers/ras/amd/atl/ |
H A D | Makefile | 10 amd_atl-y := access.o
|
/linux-master/drivers/media/i2c/ccs/ |
H A D | Makefile | 2 ccs-objs += ccs-core.o ccs-reg-access.o \
|
/linux-master/arch/arm/mm/ |
H A D | abort-ev7.S | 20 uaccess_disable ip @ disable userspace access
|
/linux-master/drivers/rapidio/ |
H A D | Makefile | 6 rapidio-y := rio.o rio-access.o rio-driver.o rio-sysfs.o
|
/linux-master/drivers/hwtracing/coresight/ |
H A D | coresight-catu.h | 45 * Bit 0: 0 - Unprivileged access, 1 - Privileged access 46 * Bit 1: 0 - Secure access, 1 - Non-secure access. 47 * Bit 2: 0 - Data access, 1 - instruction access. 49 * CATU AXICTRL:ARPROT[2] is res0 as we always access data. 73 return csdev_access_relaxed_read32(&drvdata->csdev->access, offset); \ 78 csdev_access_relaxed_write32(&drvdata->csdev->access, val, offset); \ 85 return csdev_access_relaxed_read_pair(&drvdata->csdev->access, lo_of [all...] |
/linux-master/drivers/crypto/ccp/ |
H A D | platform-access.h | 16 #include <linux/psp-platform-access.h>
|
/linux-master/include/rdma/ |
H A D | ib_umem_odp.h | 22 * The lower two bits designate access permissions. 29 * also protects access to the mmu notifier counters. 87 int access, const struct mmu_interval_notifier_ops *ops); 89 int access); 106 int access, const struct mmu_interval_notifier_ops *ops) 105 ib_umem_odp_get(struct ib_device *device, unsigned long addr, size_t size, int access, const struct mmu_interval_notifier_ops *ops) argument
|
/linux-master/security/ |
H A D | device_cgroup.c | 38 short access; member in struct:dev_exception_item 118 walk->access |= ex->access; 146 walk->access &= ~ex->access; 147 if (!walk->access) { 250 static void set_access(char *acc, short access) argument 254 if (access & DEVCG_ACC_READ) 256 if (access & DEVCG_ACC_WRITE) 258 if (access 327 match_exception(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument 364 match_exception_partial(struct list_head *exceptions, short type, u32 major, u32 minor, short access) argument 832 devcgroup_legacy_check_permission(short type, u32 major, u32 minor, short access) argument 860 devcgroup_check_permission(short type, u32 major, u32 minor, short access) argument [all...] |
/linux-master/kernel/kcsan/ |
H A D | kcsan_test.c | 46 /* Points to current test-case memory access "kernels". */ 149 void *addr; /* Address of access; unchecked if NULL. */ 150 size_t size; /* Size of access; unchecked if @addr is NULL. */ 152 } access[2]; member in struct:expect_report 159 const bool is_assert = (r->access[0].type | r->access[1].type) & KCSAN_ACCESS_ASSERT; 182 if (r->access[1].fn) { 187 scnprintf(tmp[0], sizeof(tmp[0]), "%pS", r->access[0].fn); 188 scnprintf(tmp[1], sizeof(tmp[1]), "%pS", r->access[1].fn); 191 cmp < 0 ? r->access[ [all...] |
/linux-master/tools/testing/selftests/landlock/ |
H A D | fs_test.c | 395 * (access type) confusion for this test. 496 /* Tests with denied-by-default access right. */ 510 /* Test with no access. */ 554 __u64 access; local 566 /* Tests access rights for files. */ 570 /* Tests access rights for directories. */ 575 for (access = 1; access <= ACCESS_LAST; access <<= 1) { 576 path_beneath_dir.allowed_access = access; 614 __u64 access; local 646 __u64 access; local 698 __u64 access; member in struct:rule 3119 test_make_file(struct __test_metadata *const _metadata, const __u64 access, const mode_t mode, const dev_t dev) argument [all...] |
/linux-master/fs/afs/ |
H A D | security.c | 131 h += permits->permits[i].access; 157 /* Check for the common case first: We got back the same access as last 168 if (permits->permits[i].access != caller_access) { 233 new->permits[j].access = caller_access; 237 new->permits[j].access = permits->permits[i].access; 244 new->permits[j].access = caller_access; 327 *_access = permits->permits[i].access; 339 * permitted to be accessed with this authorisation, and if so, what access it 367 *_access = permits->permits[i].access; 402 afs_access_t access; local [all...] |
/linux-master/arch/arm64/include/asm/ |
H A D | arch_timer.h | 100 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u64 val) argument 102 if (access == ARCH_TIMER_PHYS_ACCESS) { 114 } else if (access == ARCH_TIMER_VIRT_ACCESS) { 132 u64 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) argument 134 if (access == ARCH_TIMER_PHYS_ACCESS) { 141 } else if (access == ARCH_TIMER_VIRT_ACCESS) {
|