/linux-master/sound/soc/ti/ |
H A D | omap-hdmi.c | 50 struct hdmi_audio_data *ad = dev_get_drvdata(dev); local 52 mutex_lock(&ad->current_stream_lock); 53 if (ad->current_stream && ad->current_stream->runtime && 54 snd_pcm_running(ad->current_stream)) { 56 snd_pcm_stream_lock_irq(ad->current_stream); 57 snd_pcm_stop(ad->current_stream, SNDRV_PCM_STATE_DISCONNECTED); 58 snd_pcm_stream_unlock_irq(ad->current_stream); 60 mutex_unlock(&ad->current_stream_lock); 66 struct hdmi_audio_data *ad local 108 struct hdmi_audio_data *ad = card_drvdata_substream(substream); local 233 struct hdmi_audio_data *ad = card_drvdata_substream(substream); local 258 struct hdmi_audio_data *ad = card_drvdata_substream(substream); local 313 struct hdmi_audio_data *ad; local [all...] |
/linux-master/drivers/video/fbdev/ |
H A D | fsl-diu-fb.c | 336 struct diu_ad *ad; member in struct:mfb_info 355 * @ad[]: Area Descriptors for each real AOI 377 struct diu_ad ad[NUM_AOIS] __aligned(8); 503 struct diu_ad *ad = mfbi->ad; local 509 wr_reg_wa(&hw->desc[0], ad->paddr); 513 if (hw->desc[1] != ad->paddr) { /* AOI0 closed */ 515 ad->next_ad = 516 cpu_to_le32(cmfbi->ad->paddr); 518 ad 555 struct diu_ad *ad = mfbi->ad; local 911 struct diu_ad *ad = mfbi->ad; local 1133 struct diu_ad *ad = mfbi->ad; local 1270 struct diu_ad *ad = mfbi->ad; local [all...] |
/linux-master/drivers/gpu/drm/msm/disp/mdp5/ |
H A D | mdp5_cfg.h | 107 struct mdp5_sub_block ad; member in struct:mdp5_cfg_hw
|
/linux-master/tools/testing/selftests/net/forwarding/ |
H A D | lib.sh | 45 # Like INTERFACE_TIMEOUT, but default for ad-hoc waiting in testing scripts. 1539 local mac=de:ad:be:ef:13:37 1649 local mac=de:ad:be:ef:13:37
|
H A D | vxlan_bridge_1d_ipv6.sh | 551 __test_flood de:ad:be:ef:13:37 2001:db8:1::100 "flood"
|
H A D | vxlan_bridge_1q_ipv6.sh | 680 __test_flood de:ad:be:ef:13:37 2001:db8:1::100 10 "flood vlan 10" \ 759 local mac=de:ad:be:ef:13:37
|
H A D | vxlan_bridge_1q.sh | 538 __test_flood de:ad:be:ef:13:37 192.0.2.100 10 "flood vlan 10" \ 617 local mac=de:ad:be:ef:13:37 795 local mac=de:ad:be:ef:13:37
|
H A D | vxlan_bridge_1d.sh | 430 __test_flood de:ad:be:ef:13:37 192.0.2.100 "flood" 680 local mac=de:ad:be:ef:13:37
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 434 struct smk_audit_info ad, *saip = NULL; local 440 smk_ad_init(&ad, func, LSM_AUDIT_DATA_TASK); 441 smk_ad_setfield_u_tsk(&ad, tracer); 442 saip = &ad; 898 struct smk_audit_info ad; local 900 smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_DENTRY); 901 smk_ad_setfield_u_fs_path_dentry(&ad, dentry); 903 rc = smk_curacc(sbp->smk_floor, MAY_READ, &ad); 1076 struct smk_audit_info ad; local 1079 smk_ad_init(&ad, __func_ 1107 struct smk_audit_info ad; local 1140 struct smk_audit_info ad; local 1183 struct smk_audit_info ad; local 1213 struct smk_audit_info ad; local 1250 struct smk_audit_info ad; local 1274 struct smk_audit_info ad; local 1302 struct smk_audit_info ad; local 1402 struct smk_audit_info ad; local 1427 struct smk_audit_info ad; local 1486 struct smk_audit_info ad; local 1508 struct smk_audit_info ad; local 1530 struct smk_audit_info ad; local 1687 struct smk_audit_info ad; local 1718 struct smk_audit_info ad; local 1747 struct smk_audit_info ad; local 1923 struct smk_audit_info ad; local 1958 struct smk_audit_info ad; local 2016 struct smk_audit_info ad; local 2171 struct smk_audit_info ad; local 2324 struct smk_audit_info ad; local 2627 struct smk_audit_info ad; local 2670 struct smk_audit_info ad; local 3115 struct smk_audit_info ad; local 3204 struct smk_audit_info ad; local 3299 struct smk_audit_info ad; local 3407 struct smk_audit_info ad; local 3825 struct smk_audit_info ad; local 3872 struct smk_audit_info ad; local 4145 struct smk_audit_info ad; local 4370 struct smk_audit_info ad; local 4514 struct smk_audit_info ad; local 4611 struct smk_audit_info ad; local 4655 struct smk_audit_info ad; local 4992 struct smk_audit_info ad; local [all...] |
/linux-master/security/selinux/ |
H A D | xfrm.c | 400 struct common_audit_data *ad) 422 SECCLASS_ASSOCIATION, ASSOCIATION__RECVFROM, ad); 433 struct common_audit_data *ad, u8 proto) 465 SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO, ad); 399 selinux_xfrm_sock_rcv_skb(u32 sk_sid, struct sk_buff *skb, struct common_audit_data *ad) argument 432 selinux_xfrm_postroute_last(u32 sk_sid, struct sk_buff *skb, struct common_audit_data *ad, u8 proto) argument
|
H A D | netlabel.c | 427 * @ad: the audit data 438 struct common_audit_data *ad) 470 rc = avc_has_perm(sksec->sid, nlbl_sid, sksec->sclass, perm, ad); 435 selinux_netlbl_sock_rcv_skb(struct sk_security_struct *sksec, struct sk_buff *skb, u16 family, struct common_audit_data *ad) argument
|
H A D | hooks.c | 231 static void __ad_net_init(struct common_audit_data *ad, argument 235 ad->type = LSM_AUDIT_DATA_NET; 236 ad->u.net = net; 242 static void ad_net_init_from_sk(struct common_audit_data *ad, argument 246 __ad_net_init(ad, net, 0, sk, 0); 249 static void ad_net_init_from_iif(struct common_audit_data *ad, argument 253 __ad_net_init(ad, net, ifindex, NULL, family); 1622 struct common_audit_data ad; local 1629 ad.type = LSM_AUDIT_DATA_CAP; 1630 ad 1682 struct common_audit_data ad; local 1698 struct common_audit_data ad; local 1711 struct common_audit_data ad; local 1736 struct common_audit_data ad; local 1804 struct common_audit_data ad; local 1846 struct common_audit_data ad; local 1889 struct common_audit_data ad; local 1939 superblock_has_perm(const struct cred *cred, const struct super_block *sb, u32 perms, struct common_audit_data *ad) argument 2061 struct common_audit_data ad; local 2298 struct common_audit_data ad; local 2740 struct common_audit_data ad; local 2750 struct common_audit_data ad; local 2965 struct common_audit_data ad; local 3066 struct common_audit_data ad; local 3083 struct common_audit_data ad; local 3187 struct common_audit_data ad; local 3372 struct common_audit_data ad; local 3659 struct common_audit_data ad; local 3824 struct common_audit_data ad; local 4070 struct common_audit_data ad; local 4081 struct common_audit_data ad; local 4275 selinux_parse_skb_ipv4(struct sk_buff *skb, struct common_audit_data *ad, u8 *proto) argument 4373 selinux_parse_skb_ipv6(struct sk_buff *skb, struct common_audit_data *ad, u8 *proto) argument 4459 selinux_parse_skb(struct sk_buff *skb, struct common_audit_data *ad, char **_addrp, int src, u8 *proto) argument 4583 struct common_audit_data ad; local 4694 struct common_audit_data ad; local 4844 struct common_audit_data ad; local 5003 struct common_audit_data ad; local 5033 struct common_audit_data ad; local 5042 selinux_inet_sys_rcv_skb(struct net *ns, int ifindex, char *addrp, u16 family, u32 peer_sid, struct common_audit_data *ad) argument 5071 struct common_audit_data ad; local 5101 struct common_audit_data ad; local 5295 struct common_audit_data ad; local 5670 struct common_audit_data ad; local 5766 struct common_audit_data ad; local 5799 struct common_audit_data ad; local 5995 struct common_audit_data ad; local 6020 struct common_audit_data ad; local 6036 struct common_audit_data ad; local 6080 struct common_audit_data ad; local 6125 struct common_audit_data ad; local 6147 struct common_audit_data ad; local 6163 struct common_audit_data ad; local 6225 struct common_audit_data ad; local 6241 struct common_audit_data ad; local 6766 struct common_audit_data ad; local 6788 struct common_audit_data ad; local 7098 struct common_audit_data ad; local [all...] |
/linux-master/security/apparmor/ |
H A D | lsm.c | 607 struct apparmor_audit_data *ad = aad_of_va(va); local 609 if (ad->request & AA_URING_PERM_MASK) { 611 audit_uring_mask(ad->request)); 612 if (ad->denied & AA_URING_PERM_MASK) { 614 audit_uring_mask(ad->denied)); 617 if (ad->uring.target) { 619 aa_label_xaudit(ab, labels_ns(ad->subj_label), 620 ad->uring.target, 627 struct apparmor_audit_data *ad) 647 error = aa_check_perms(profile, &perms, request, ad, 625 profile_uring(struct aa_profile *profile, u32 request, struct aa_label *new, int cap, struct apparmor_audit_data *ad) argument [all...] |
H A D | task.c | 208 struct apparmor_audit_data *ad = aad(sa); local 210 if (ad->request & AA_PTRACE_PERM_MASK) { 212 audit_ptrace_mask(ad->request)); 214 if (ad->denied & AA_PTRACE_PERM_MASK) { 216 audit_ptrace_mask(ad->denied)); 220 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, 229 struct apparmor_audit_data *ad) 235 ad->subj_cred = cred; 236 ad 226 profile_ptrace_perm(const struct cred *cred, struct aa_profile *profile, struct aa_label *peer, u32 request, struct apparmor_audit_data *ad) argument 243 profile_tracee_perm(const struct cred *cred, struct aa_profile *tracee, struct aa_label *tracer, u32 request, struct apparmor_audit_data *ad) argument 255 profile_tracer_perm(const struct cred *cred, struct aa_profile *tracer, struct aa_label *tracee, u32 request, struct apparmor_audit_data *ad) argument 307 struct apparmor_audit_data *ad = aad_of_va(va); local 316 aa_profile_ns_perm(struct aa_profile *profile, struct apparmor_audit_data *ad, u32 request) argument [all...] |
H A D | policy_unpack.c | 37 struct apparmor_audit_data *ad = aad(sa); local 39 if (ad->iface.ns) { 41 audit_log_untrustedstring(ab, ad->iface.ns); 43 if (ad->name) { 45 audit_log_untrustedstring(ab, ad->name); 47 if (ad->iface.pos) 48 audit_log_format(ab, " offset=%ld", ad->iface.pos); 67 DEFINE_AUDIT_DATA(ad, LSM_AUDIT_DATA_NONE, AA_CLASS_NONE, NULL); 69 ad.iface.pos = e->pos - e->start; 70 ad [all...] |
/linux-master/net/bluetooth/ |
H A D | hci_sync.c | 1456 u8 ad[4 + 3]; local 1482 eir_append_service_data(ad, 0, 0x1852, bid, sizeof(bid)); 1483 hci_set_adv_instance_data(hdev, adv->instance, sizeof(ad), ad, 0, NULL);
|
/linux-master/kernel/time/ |
H A D | timekeeping.c | 2428 struct audit_ntp_data ad; local 2454 audit_ntp_init(&ad); 2463 ret = __do_adjtimex(txc, &ts, &tai, &ad); 2475 audit_ntp_log(&ad);
|
/linux-master/drivers/edac/ |
H A D | altera_edac.c | 1645 struct altr_edac_device_dev *ad = dev_id; local 1646 void __iomem *base = ad->base; 1647 const struct edac_device_prv_data *priv = ad->data; 1649 if (irq == ad->sb_irq) { 1652 edac_device_handle_ce(ad->edac_dev, 0, 0, ad->edac_dev_name); 1654 } else if (irq == ad->db_irq) { 1657 edac_device_handle_ue(ad->edac_dev, 0, 0, ad->edac_dev_name);
|
/linux-master/drivers/ata/ |
H A D | libata-core.c | 4267 const struct ata_blacklist_entry *ad = ata_device_blacklist; local 4272 while (ad->model_num) { 4273 if (glob_match(ad->model_num, model_num)) { 4274 if (ad->model_rev == NULL) 4275 return ad->horkage; 4276 if (glob_match(ad->model_rev, model_rev)) 4277 return ad->horkage; 4279 ad++;
|
/linux-master/drivers/slimbus/ |
H A D | qcom-ngd-ctrl.c | 95 #define SLIM_MSG_ASM_FIRST_WORD(l, mt, mc, dt, ad) \ 96 ((l) | ((mt) << 5) | ((mc) << 8) | ((dt) << 15) | ((ad) << 16))
|
/linux-master/drivers/clk/ti/ |
H A D | apll.c | 36 struct dpll_data *ad; local 41 ad = clk->dpll_data; 42 if (!ad) 47 state <<= __ffs(ad->idlest_mask); 50 v = ti_clk_ll_ops->clk_readl(&ad->idlest_reg); 52 if ((v & ad->idlest_mask) == state) 55 v = ti_clk_ll_ops->clk_readl(&ad->control_reg); 56 v &= ~ad->enable_mask; 57 v |= APLL_FORCE_LOCK << __ffs(ad->enable_mask); 58 ti_clk_ll_ops->clk_writel(v, &ad 86 struct dpll_data *ad; local 103 struct dpll_data *ad; local 133 struct dpll_data *ad = clk_hw->dpll_data; local 180 struct dpll_data *ad = NULL; local 238 struct dpll_data *ad = clk->dpll_data; local 263 struct dpll_data *ad = clk->dpll_data; local 294 struct dpll_data *ad = clk->dpll_data; local 312 struct dpll_data *ad = clk->dpll_data; local 341 struct dpll_data *ad = NULL; local [all...] |
/linux-master/tools/perf/util/ |
H A D | dwarf-aux.c | 566 struct __addr_die_search_param *ad = data; local 571 addr == ad->addr) { 572 memcpy(ad->die_mem, fn_die, sizeof(Dwarf_Die)); 591 struct __addr_die_search_param ad; local 592 ad.addr = addr; 593 ad.die_mem = die_mem; 595 if (!dwarf_getfuncs(cu_die, __die_search_func_tail_cb, &ad, 0)) 604 struct __addr_die_search_param *ad = data; local 611 dwarf_haspc(fn_die, ad->addr)) { 612 memcpy(ad 630 struct __addr_die_search_param ad; local [all...] |
/linux-master/tools/testing/selftests/net/ |
H A D | rtnetlink.sh | 549 run_cmd ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef" 550 run_cmd ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef" sa 0 pn 1 on key 00 0123456789abcdef0123456789abcdef 611 run_cmd ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef" 612 run_cmd ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef" sa 0 pn 1 on \ 614 run_cmd_fail ip macsec add "$msname" rx port 1235 address "1c:ed:de:ad:be:ef" 1030 test_mac=de:ad:be:ef:13:37 1070 dstmac=de:ad:be:ef:13:37 1131 run_cmd ip link add name test-bond0 type bond mode 802.3ad
|
/linux-master/tools/testing/selftests/drivers/net/bonding/ |
H A D | dev_addr_lists.sh | 53 test_LAG_cleanup "bonding" "802.3ad" 63 ip link add bond1 "$init_state" type bond mode 802.3ad
|
/linux-master/net/netfilter/ipset/ |
H A D | ip_set_hash_gen.h | 304 struct list_head ad; /* Resize add|del backlist */ member in struct:htype 314 enum ipset_adt ad; /* ADD|DEL element */ member in struct:mtype_resize_ad 456 list_for_each_safe(l, lt, &h->ad) { 768 list_for_each_safe(l, lt, &h->ad) { 770 if (x->ad == IPSET_ADD) { 1005 x->ad = IPSET_ADD; 1011 list_add_tail(&x->list, &h->ad); 1092 x->ad = IPSET_DEL; 1134 list_add(&x->list, &h->ad); 1608 INIT_LIST_HEAD(&h->ad); [all...] |