/Linux-v4.19/drivers/usb/phy/ |
D | phy-ab8500-usb.c | 149 static void ab8500_usb_wd_workaround(struct ab8500_usb *ab) in ab8500_usb_wd_workaround() argument 151 abx500_set_register_interruptible(ab->dev, in ab8500_usb_wd_workaround() 158 abx500_set_register_interruptible(ab->dev, in ab8500_usb_wd_workaround() 166 abx500_set_register_interruptible(ab->dev, in ab8500_usb_wd_workaround() 172 static void ab8500_usb_regulator_enable(struct ab8500_usb *ab) in ab8500_usb_regulator_enable() argument 176 ret = regulator_enable(ab->v_ape); in ab8500_usb_regulator_enable() 178 dev_err(ab->dev, "Failed to enable v-ape\n"); in ab8500_usb_regulator_enable() 180 if (ab->flags & AB8500_USB_FLAG_REGULATOR_SET_VOLTAGE) { in ab8500_usb_regulator_enable() 181 ab->saved_v_ulpi = regulator_get_voltage(ab->v_ulpi); in ab8500_usb_regulator_enable() 182 if (ab->saved_v_ulpi < 0) in ab8500_usb_regulator_enable() [all …]
|
/Linux-v4.19/include/linux/mfd/abx500/ |
D | ab8500.h | 394 static inline int is_ab8500(struct ab8500 *ab) in is_ab8500() argument 396 return ab->version == AB8500_VERSION_AB8500; in is_ab8500() 399 static inline int is_ab8505(struct ab8500 *ab) in is_ab8505() argument 401 return ab->version == AB8500_VERSION_AB8505; in is_ab8505() 404 static inline int is_ab9540(struct ab8500 *ab) in is_ab9540() argument 406 return ab->version == AB8500_VERSION_AB9540; in is_ab9540() 409 static inline int is_ab8540(struct ab8500 *ab) in is_ab8540() argument 411 return ab->version == AB8500_VERSION_AB8540; in is_ab8540() 415 static inline int is_ab8500_1p0_or_earlier(struct ab8500 *ab) in is_ab8500_1p0_or_earlier() argument 417 return (is_ab8500(ab) && (ab->chip_id <= AB8500_CUT1P0)); in is_ab8500_1p0_or_earlier() [all …]
|
/Linux-v4.19/security/ |
D | lsm_audit.c | 187 static inline void print_ipv6_addr(struct audit_buffer *ab, in print_ipv6_addr() argument 192 audit_log_format(ab, " %s=%pI6c", name1, addr); in print_ipv6_addr() 194 audit_log_format(ab, " %s=%d", name2, ntohs(port)); in print_ipv6_addr() 197 static inline void print_ipv4_addr(struct audit_buffer *ab, __be32 addr, in print_ipv4_addr() argument 201 audit_log_format(ab, " %s=%pI4", name1, &addr); in print_ipv4_addr() 203 audit_log_format(ab, " %s=%d", name2, ntohs(port)); in print_ipv4_addr() 211 static void dump_common_audit_data(struct audit_buffer *ab, in dump_common_audit_data() argument 223 audit_log_format(ab, " pid=%d comm=", task_tgid_nr(current)); in dump_common_audit_data() 224 audit_log_untrustedstring(ab, memcpy(comm, current->comm, sizeof(comm))); in dump_common_audit_data() 230 audit_log_format(ab, " key=%d ", a->u.ipc_id); in dump_common_audit_data() [all …]
|
/Linux-v4.19/kernel/ |
D | audit.c | 397 struct audit_buffer *ab; in audit_log_config_change() local 400 ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); in audit_log_config_change() 401 if (unlikely(!ab)) in audit_log_config_change() 403 audit_log_format(ab, "%s=%u old=%u", function_name, new, old); in audit_log_config_change() 404 audit_log_session_info(ab); in audit_log_config_change() 405 rc = audit_log_task_context(ab); in audit_log_config_change() 408 audit_log_format(ab, " res=%d", allow_changes); in audit_log_config_change() 409 audit_log_end(ab); in audit_log_config_change() 1057 static void audit_log_common_recv_msg(struct audit_buffer **ab, u16 msg_type) in audit_log_common_recv_msg() argument 1063 *ab = NULL; in audit_log_common_recv_msg() [all …]
|
D | auditsc.c | 981 struct audit_buffer *ab; in audit_log_pid_context() local 986 ab = audit_log_start(context, GFP_KERNEL, AUDIT_OBJ_PID); in audit_log_pid_context() 987 if (!ab) in audit_log_pid_context() 990 audit_log_format(ab, "opid=%d oauid=%d ouid=%d oses=%d", pid, in audit_log_pid_context() 995 audit_log_format(ab, " obj=(none)"); in audit_log_pid_context() 998 audit_log_format(ab, " obj=%s", ctx); in audit_log_pid_context() 1002 audit_log_format(ab, " ocomm="); in audit_log_pid_context() 1003 audit_log_untrustedstring(ab, comm); in audit_log_pid_context() 1004 audit_log_end(ab); in audit_log_pid_context() 1010 struct audit_buffer **ab) in audit_log_execve_info() argument [all …]
|
D | audit_fsnotify.c | 125 struct audit_buffer *ab; in audit_mark_log_rule_change() local 130 ab = audit_log_start(NULL, GFP_NOFS, AUDIT_CONFIG_CHANGE); in audit_mark_log_rule_change() 131 if (unlikely(!ab)) in audit_mark_log_rule_change() 133 audit_log_format(ab, "auid=%u ses=%u op=%s", in audit_mark_log_rule_change() 136 audit_log_format(ab, " path="); in audit_mark_log_rule_change() 137 audit_log_untrustedstring(ab, audit_mark->path); in audit_mark_log_rule_change() 138 audit_log_key(ab, rule->filterkey); in audit_mark_log_rule_change() 139 audit_log_format(ab, " list=%d res=1", rule->listnr); in audit_mark_log_rule_change() 140 audit_log_end(ab); in audit_mark_log_rule_change()
|
/Linux-v4.19/security/apparmor/ |
D | ipc.c | 30 static void audit_ptrace_mask(struct audit_buffer *ab, u32 mask) in audit_ptrace_mask() argument 34 audit_log_string(ab, "read"); in audit_ptrace_mask() 37 audit_log_string(ab, "trace"); in audit_ptrace_mask() 40 audit_log_string(ab, "readby"); in audit_ptrace_mask() 43 audit_log_string(ab, "tracedby"); in audit_ptrace_mask() 49 static void audit_ptrace_cb(struct audit_buffer *ab, void *va) in audit_ptrace_cb() argument 54 audit_log_format(ab, " requested_mask="); in audit_ptrace_cb() 55 audit_ptrace_mask(ab, aad(sa)->request); in audit_ptrace_cb() 58 audit_log_format(ab, " denied_mask="); in audit_ptrace_cb() 59 audit_ptrace_mask(ab, aad(sa)->denied); in audit_ptrace_cb() [all …]
|
D | audit.c | 59 static void audit_pre(struct audit_buffer *ab, void *ca) in audit_pre() argument 64 audit_log_format(ab, "apparmor="); in audit_pre() 65 audit_log_string(ab, aa_audit_type[aad(sa)->type]); in audit_pre() 69 audit_log_format(ab, " operation="); in audit_pre() 70 audit_log_string(ab, aad(sa)->op); in audit_pre() 74 audit_log_format(ab, " info="); in audit_pre() 75 audit_log_string(ab, aad(sa)->info); in audit_pre() 77 audit_log_format(ab, " error=%d", aad(sa)->error); in audit_pre() 87 audit_log_format(ab, " namespace="); in audit_pre() 88 audit_log_untrustedstring(ab, in audit_pre() [all …]
|
D | net.c | 74 void audit_net_cb(struct audit_buffer *ab, void *va) in audit_net_cb() argument 78 audit_log_format(ab, " family="); in audit_net_cb() 80 audit_log_string(ab, address_family_names[sa->u.net->family]); in audit_net_cb() 82 audit_log_format(ab, "\"unknown(%d)\"", sa->u.net->family); in audit_net_cb() 83 audit_log_format(ab, " sock_type="); in audit_net_cb() 85 audit_log_string(ab, sock_type_names[aad(sa)->net.type]); in audit_net_cb() 87 audit_log_format(ab, "\"unknown(%d)\"", aad(sa)->net.type); in audit_net_cb() 88 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb() 91 audit_log_format(ab, " requested_mask="); in audit_net_cb() 92 aa_audit_perm_mask(ab, aad(sa)->request, NULL, 0, in audit_net_cb() [all …]
|
D | mount.c | 30 static void audit_mnt_flags(struct audit_buffer *ab, unsigned long flags) in audit_mnt_flags() argument 33 audit_log_format(ab, "ro"); in audit_mnt_flags() 35 audit_log_format(ab, "rw"); in audit_mnt_flags() 37 audit_log_format(ab, ", nosuid"); in audit_mnt_flags() 39 audit_log_format(ab, ", nodev"); in audit_mnt_flags() 41 audit_log_format(ab, ", noexec"); in audit_mnt_flags() 43 audit_log_format(ab, ", sync"); in audit_mnt_flags() 45 audit_log_format(ab, ", remount"); in audit_mnt_flags() 47 audit_log_format(ab, ", mand"); in audit_mnt_flags() 49 audit_log_format(ab, ", dirsync"); in audit_mnt_flags() [all …]
|
D | lib.c | 223 void aa_audit_perm_names(struct audit_buffer *ab, const char * const *names, in aa_audit_perm_names() argument 232 audit_log_format(ab, fmt, names[i]); in aa_audit_perm_names() 241 void aa_audit_perm_mask(struct audit_buffer *ab, u32 mask, const char *chrs, in aa_audit_perm_mask() argument 246 audit_log_format(ab, "\""); in aa_audit_perm_mask() 250 audit_log_format(ab, "%s", str); in aa_audit_perm_mask() 252 audit_log_format(ab, " "); in aa_audit_perm_mask() 255 aa_audit_perm_names(ab, names, mask & namesmask); in aa_audit_perm_mask() 256 audit_log_format(ab, "\""); in aa_audit_perm_mask() 264 static void aa_audit_perms_cb(struct audit_buffer *ab, void *va) in aa_audit_perms_cb() argument 269 audit_log_format(ab, " requested_mask="); in aa_audit_perms_cb() [all …]
|
/Linux-v4.19/security/integrity/ |
D | integrity_audit.c | 35 struct audit_buffer *ab; in integrity_audit_msg() local 41 ab = audit_log_start(audit_context(), GFP_KERNEL, audit_msgno); in integrity_audit_msg() 42 audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u", in integrity_audit_msg() 47 audit_log_task_context(ab); in integrity_audit_msg() 48 audit_log_format(ab, " op=%s cause=%s comm=", op, cause); in integrity_audit_msg() 49 audit_log_untrustedstring(ab, get_task_comm(name, current)); in integrity_audit_msg() 51 audit_log_format(ab, " name="); in integrity_audit_msg() 52 audit_log_untrustedstring(ab, fname); in integrity_audit_msg() 55 audit_log_format(ab, " dev="); in integrity_audit_msg() 56 audit_log_untrustedstring(ab, inode->i_sb->s_id); in integrity_audit_msg() [all …]
|
/Linux-v4.19/arch/x86/crypto/ |
D | twofish-x86_64-asm_64-3way.S | 92 #define do16bit_ror(rot, op1, op2, T0, T1, tmp1, tmp2, ab, dst) \ argument 93 movzbl ab ## bl, tmp2 ## d; \ 94 movzbl ab ## bh, tmp1 ## d; \ 95 rorq $(rot), ab; \ 99 #define swap_ab_with_cd(ab, cd, tmp) \ argument 101 movq ab, cd; \ 102 movq tmp, ab; 108 #define g1g2_3(ab, cd, Tx0, Tx1, Tx2, Tx3, Ty0, Ty1, Ty2, Ty3, x, y) \ argument 110 do16bit_ror(32, mov, xor, Tx0, Tx1, RT0, x ## 0, ab ## 0, x ## 0); \ 111 do16bit_ror(48, mov, xor, Ty1, Ty2, RT0, y ## 0, ab ## 0, y ## 0); \ [all …]
|
D | camellia-x86_64-asm_64.S | 94 #define xor2ror16(T0, T1, tmp1, tmp2, ab, dst) \ argument 95 movzbl ab ## bl, tmp2 ## d; \ 96 movzbl ab ## bh, tmp1 ## d; \ 97 rorq $16, ab; \ 104 #define roundsm(ab, subkey, cd) \ argument 107 xor2ror16(sp00444404, sp03303033, RT0, RT1, ab ## 0, cd ## 0); \ 108 xor2ror16(sp22000222, sp10011110, RT0, RT1, ab ## 0, RT2); \ 109 xor2ror16(sp11101110, sp44044404, RT0, RT1, ab ## 0, cd ## 0); \ 110 xor2ror16(sp30333033, sp02220222, RT0, RT1, ab ## 0, RT2); \ 281 #define roundsm2(ab, subkey, cd) \ argument [all …]
|
/Linux-v4.19/drivers/md/persistent-data/ |
D | dm-array.c | 96 static void *element_at(struct dm_array_info *info, struct array_block *ab, in element_at() argument 99 unsigned char *entry = (unsigned char *) (ab + 1); in element_at() 110 static void on_entries(struct dm_array_info *info, struct array_block *ab, in on_entries() argument 113 unsigned i, nr_entries = le32_to_cpu(ab->nr_entries); in on_entries() 116 fn(info->value_type.context, element_at(info, ab, i)); in on_entries() 122 static void inc_ablock_entries(struct dm_array_info *info, struct array_block *ab) in inc_ablock_entries() argument 127 on_entries(info, ab, vt->inc); in inc_ablock_entries() 133 static void dec_ablock_entries(struct dm_array_info *info, struct array_block *ab) in dec_ablock_entries() argument 138 on_entries(info, ab, vt->dec); in dec_ablock_entries() 154 struct dm_block **block, struct array_block **ab) in alloc_ablock() argument [all …]
|
/Linux-v4.19/arch/arc/lib/ |
D | memcpy-archs.S | 30 # define LOADX(DST,RX) ldd.ab DST, [RX, 8] 31 # define STOREX(SRC,RX) std.ab SRC, [RX, 8] 37 # define LOADX(DST,RX) ld.ab DST, [RX, 4] 38 # define STOREX(SRC,RX) st.ab SRC, [RX, 4] 60 ldb.ab r5, [r1,1] 62 stb.ab r5, [r3,1] 90 ldb.ab r5, [r1,1] 91 stb.ab r5, [r3,1] 103 ldb.ab r5, [r1, 1] 108 ldh.ab r6, [r1, 2] [all …]
|
D | memcpy-700.S | 21 st.ab r12,[r5,4] 26 st.ab r12,[r5,4] 28 st.ab r3,[r5,4] 55 stb.ab r12,[r5,1] 60 stb.ab r12,[r5,1] 62 stb.ab r3,[r5,1]
|
D | strcpy-700.S | 38 st.ab r4,[r10,4] 45 st.ab r3,[r10,4] 59 stb.ab r1,[r10,1] 64 ldb.ab r3,[r1,1] 68 stb.ab r3,[r10,1]
|
D | strcmp-archs.S | 17 ld.ab r2, [r0, 4] 23 ld.ab r3, [r1, 4] 26 ld.ab r5, [r0, 4] 68 ldb.ab r2, [r0, 1] 69 ldb.ab r3, [r1, 1]
|
/Linux-v4.19/net/netfilter/ |
D | xt_AUDIT.c | 34 static bool audit_ip4(struct audit_buffer *ab, struct sk_buff *skb) in audit_ip4() argument 43 audit_log_format(ab, " saddr=%pI4 daddr=%pI4 proto=%hhu", in audit_ip4() 49 static bool audit_ip6(struct audit_buffer *ab, struct sk_buff *skb) in audit_ip6() argument 63 audit_log_format(ab, " saddr=%pI6c daddr=%pI6c proto=%hhu", in audit_ip6() 72 struct audit_buffer *ab; in audit_tg() local 77 ab = audit_log_start(NULL, GFP_ATOMIC, AUDIT_NETFILTER_PKT); in audit_tg() 78 if (ab == NULL) in audit_tg() 81 audit_log_format(ab, "mark=%#x", skb->mark); in audit_tg() 87 fam = audit_ip4(ab, skb) ? NFPROTO_IPV4 : -1; in audit_tg() 90 fam = audit_ip6(ab, skb) ? NFPROTO_IPV6 : -1; in audit_tg() [all …]
|
D | nft_log.c | 32 static bool audit_ip4(struct audit_buffer *ab, struct sk_buff *skb) in audit_ip4() argument 41 audit_log_format(ab, " saddr=%pI4 daddr=%pI4 proto=%hhu", in audit_ip4() 47 static bool audit_ip6(struct audit_buffer *ab, struct sk_buff *skb) in audit_ip6() argument 61 audit_log_format(ab, " saddr=%pI6c daddr=%pI6c proto=%hhu", in audit_ip6() 70 struct audit_buffer *ab; in nft_log_eval_audit() local 76 ab = audit_log_start(NULL, GFP_ATOMIC, AUDIT_NETFILTER_PKT); in nft_log_eval_audit() 77 if (!ab) in nft_log_eval_audit() 80 audit_log_format(ab, "mark=%#x", skb->mark); in nft_log_eval_audit() 86 fam = audit_ip4(ab, skb) ? NFPROTO_IPV4 : -1; in nft_log_eval_audit() 89 fam = audit_ip6(ab, skb) ? NFPROTO_IPV6 : -1; in nft_log_eval_audit() [all …]
|
/Linux-v4.19/include/linux/ |
D | audit.h | 118 extern void audit_log_session_info(struct audit_buffer *ab); 132 void audit_log_format(struct audit_buffer *ab, const char *fmt, ...); 133 extern void audit_log_end(struct audit_buffer *ab); 136 extern void audit_log_n_hex(struct audit_buffer *ab, 139 extern void audit_log_n_string(struct audit_buffer *ab, 142 extern void audit_log_n_untrustedstring(struct audit_buffer *ab, 145 extern void audit_log_untrustedstring(struct audit_buffer *ab, 147 extern void audit_log_d_path(struct audit_buffer *ab, 150 extern void audit_log_key(struct audit_buffer *ab, 155 extern int audit_log_task_context(struct audit_buffer *ab); [all …]
|
/Linux-v4.19/security/integrity/evm/ |
D | evm_secfs.c | 182 struct audit_buffer *ab; in evm_write_xattrs() local 195 ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_EVM_XATTR); in evm_write_xattrs() 196 if (!ab) in evm_write_xattrs() 225 audit_log_format(ab, "locked"); in evm_write_xattrs() 231 audit_log_format(ab, "xattr="); in evm_write_xattrs() 232 audit_log_untrustedstring(ab, xattr->name); in evm_write_xattrs() 252 audit_log_format(ab, " res=0"); in evm_write_xattrs() 253 audit_log_end(ab); in evm_write_xattrs() 256 audit_log_format(ab, " res=%d", err); in evm_write_xattrs() 257 audit_log_end(ab); in evm_write_xattrs()
|
/Linux-v4.19/security/integrity/ima/ |
D | ima_policy.c | 657 static void ima_log_string_op(struct audit_buffer *ab, char *key, char *value, in ima_log_string_op() argument 660 if (!ab) in ima_log_string_op() 664 audit_log_format(ab, "%s>", key); in ima_log_string_op() 666 audit_log_format(ab, "%s<", key); in ima_log_string_op() 668 audit_log_format(ab, "%s=", key); in ima_log_string_op() 669 audit_log_format(ab, "%s ", value); in ima_log_string_op() 671 static void ima_log_string(struct audit_buffer *ab, char *key, char *value) in ima_log_string() argument 673 ima_log_string_op(ab, key, value, NULL); in ima_log_string() 678 struct audit_buffer *ab; in ima_parse_rule() local 684 ab = integrity_audit_log_start(audit_context(), GFP_KERNEL, in ima_parse_rule() [all …]
|
/Linux-v4.19/drivers/tty/ |
D | tty_audit.c | 63 struct audit_buffer *ab; in tty_audit_log() local 70 ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_TTY); in tty_audit_log() 71 if (ab) { in tty_audit_log() 74 audit_log_format(ab, "%s pid=%u uid=%u auid=%u ses=%u major=%d" in tty_audit_log() 78 audit_log_untrustedstring(ab, name); in tty_audit_log() 79 audit_log_format(ab, " data="); in tty_audit_log() 80 audit_log_n_hex(ab, data, size); in tty_audit_log() 81 audit_log_end(ab); in tty_audit_log()
|