Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 1443) sorted by relevance

12345678910>>...58

/Linux-v4.19/include/linux/
Ddevice_cgroup.h16 short access);
19 short access) in __devcgroup_check_permission() argument
25 short access) in devcgroup_check_permission() argument
27 int rc = BPF_CGROUP_RUN_PROG_DEVICE_CGROUP(type, major, minor, access); in devcgroup_check_permission()
32 return __devcgroup_check_permission(type, major, minor, access); in devcgroup_check_permission()
37 short type, access = 0; in devcgroup_inode_permission() local
50 access |= DEVCG_ACC_WRITE; in devcgroup_inode_permission()
52 access |= DEVCG_ACC_READ; in devcgroup_inode_permission()
55 access); in devcgroup_inode_permission()
/Linux-v4.19/drivers/platform/chrome/
Dcros_ec_lpc_mec.c71 enum cros_ec_lpc_mec_emi_access_mode access, new_access; in cros_ec_lpc_io_bytes_mec() local
78 access = ACCESS_TYPE_BYTE; in cros_ec_lpc_io_bytes_mec()
80 access = ACCESS_TYPE_LONG_AUTO_INCREMENT; in cros_ec_lpc_io_bytes_mec()
85 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
113 if (new_access != access || in cros_ec_lpc_io_bytes_mec()
114 access != ACCESS_TYPE_LONG_AUTO_INCREMENT) { in cros_ec_lpc_io_bytes_mec()
115 access = new_access; in cros_ec_lpc_io_bytes_mec()
116 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
/Linux-v4.19/security/
Ddevice_cgroup.c35 short access; member
104 walk->access |= ex->access; in dev_exception_add()
132 walk->access &= ~ex->access; in dev_exception_rm()
133 if (!walk->access) { in dev_exception_rm()
236 static void set_access(char *acc, short access) in set_access() argument
240 if (access & DEVCG_ACC_READ) in set_access()
242 if (access & DEVCG_ACC_WRITE) in set_access()
244 if (access & DEVCG_ACC_MKNOD) in set_access()
288 set_access(acc, ex->access); in devcgroup_seq_show()
314 u32 major, u32 minor, short access) in match_exception() argument
[all …]
/Linux-v4.19/Documentation/admin-guide/LSM/
DSmack.rst10 Smack is a kernel based implementation of mandatory access
33 access to systems that use them as Smack does.
50 load the Smack access rules
53 report if a process with one label has access
85 Used to make access control decisions. In almost all cases
95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
110 Use the Smack label in this attribute for access control
115 Use the Smack label in this attribute for access control
131 access
[all …]
/Linux-v4.19/arch/arm/include/asm/
Darch_timer.h22 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument
24 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15()
33 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15()
48 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument
52 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15()
61 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
/Linux-v4.19/drivers/gpu/drm/nouveau/nvkm/engine/dma/
Duser.c92 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor()
95 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor()
135 switch (dmaobj->access) { in nvkm_dmaobj_ctor()
137 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor()
140 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor()
143 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor()
146 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
/Linux-v4.19/fs/afs/
Dsecurity.c108 h += permits->permits[i].access; in afs_hash_permits()
145 if (permits->permits[i].access != caller_access) { in afs_cache_permit()
211 new->permits[j].access = caller_access; in afs_cache_permit()
215 new->permits[j].access = permits->permits[i].access; in afs_cache_permit()
222 new->permits[j].access = caller_access; in afs_cache_permit()
310 *_access = permits->permits[i].access; in afs_check_permit()
345 afs_access_t uninitialized_var(access); in afs_permission()
366 ret = afs_check_permit(vnode, key, &access); in afs_permission()
372 mask, access, S_ISDIR(inode->i_mode) ? "dir" : "file"); in afs_permission()
376 if (!(access & AFS_ACE_LOOKUP)) in afs_permission()
[all …]
/Linux-v4.19/arch/x86/kvm/
Dmmutrace.h41 access_str[role.access], \
205 TP_PROTO(u64 *sptep, gfn_t gfn, unsigned access, unsigned int gen),
206 TP_ARGS(sptep, gfn, access, gen),
211 __field(unsigned, access)
218 __entry->access = access;
223 __entry->gfn, __entry->access, __entry->gen)
228 TP_PROTO(u64 addr, gfn_t gfn, unsigned access),
229 TP_ARGS(addr, gfn, access),
234 __field(unsigned, access)
240 __entry->access = access;
[all …]
Dpaging_tmpl.h107 static inline void FNAME(protect_clean_gpte)(struct kvm_mmu *mmu, unsigned *access, in FNAME()
122 *access &= mask; in FNAME()
186 unsigned access; in FNAME() local
188 access = ((gpte & VMX_EPT_WRITABLE_MASK) ? ACC_WRITE_MASK : 0) | in FNAME()
194 access = gpte & (PT_WRITABLE_MASK | PT_USER_MASK | PT_PRESENT_MASK); in FNAME()
196 access ^= (gpte >> PT64_NX_SHIFT); in FNAME()
199 return access; in FNAME()
280 gva_t addr, u32 access) in FNAME()
293 const int write_fault = access & PFERR_WRITE_MASK; in FNAME()
294 const int user_fault = access & PFERR_USER_MASK; in FNAME()
[all …]
/Linux-v4.19/Documentation/
Dunaligned-memory-access.txt14 when it comes to memory access. This document presents some details about
19 The definition of an unaligned access
26 access.
28 The above may seem a little vague, as memory access can happen in different
32 which will compile to multiple-byte memory access instructions, namely when
47 of memory access. However, we must consider ALL supported architectures;
52 Why unaligned access is bad
55 The effects of performing an unaligned memory access vary from architecture
62 happen. The exception handler is able to correct the unaligned access,
66 unaligned access to be corrected.
[all …]
/Linux-v4.19/arch/arm64/include/asm/
Darch_timer.h88 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument
90 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15()
99 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15()
114 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument
116 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15()
123 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
/Linux-v4.19/Documentation/arm/
Dmem_alignment1 Too many problems poped up because of unnoticed misaligned memory access in
10 unaligned memory access in general. If those access are predictable, you
12 alignment trap can fixup misaligned access for the exception cases, but at
16 trap to SIGBUS any code performing unaligned access (good for debugging bad
17 code), or even fixup the access by software like for kernel code. The later
32 0 A user process performing an unaligned memory access
38 performing the unaligned access. This is of course
43 performing the unaligned access.
54 information on unaligned access occurrences plus the current mode of
/Linux-v4.19/drivers/infiniband/sw/rxe/
Drxe_mr.c77 static void rxe_mem_init(int access, struct rxe_mem *mem) in rxe_mem_init() argument
80 u32 rkey = (access & IB_ACCESS_REMOTE) ? lkey : 0; in rxe_mem_init()
149 int access, struct rxe_mem *mem) in rxe_mem_init_dma() argument
151 rxe_mem_init(access, mem); in rxe_mem_init_dma()
154 mem->access = access; in rxe_mem_init_dma()
162 u64 length, u64 iova, int access, struct ib_udata *udata, in rxe_mem_init_user() argument
174 umem = ib_umem_get(pd->ibpd.uobject->context, start, length, access, 0); in rxe_mem_init_user()
185 rxe_mem_init(access, mem); in rxe_mem_init_user()
225 mem->access = access; in rxe_mem_init_user()
438 int access, in copy_data() argument
[all …]
/Linux-v4.19/tools/testing/selftests/bpf/
Ddev_cgroup.c17 short access = ctx->access_type >> 16; in bpf_prog1() local
32 if (access & BPF_DEVCG_ACC_READ) in bpf_prog1()
35 if (access & BPF_DEVCG_ACC_WRITE) in bpf_prog1()
38 if (access & BPF_DEVCG_ACC_MKNOD) in bpf_prog1()
/Linux-v4.19/drivers/dax/
DKconfig6 tristate "DAX: direct access to differentiated memory"
13 tristate "Device DAX: direct access mapping device"
16 Support raw access to differentiated (persistence, bandwidth,
24 tristate "PMEM DAX: direct access to persistent memory"
28 Support raw access to persistent memory. Note that this
/Linux-v4.19/arch/powerpc/include/asm/
Dtrace.h153 TP_PROTO(unsigned long addr, unsigned long access, unsigned long trap),
154 TP_ARGS(addr, access, trap),
157 __field(unsigned long, access)
163 __entry->access = access;
168 __entry->addr, __entry->access, __entry->trap)
/Linux-v4.19/sound/core/
Dcontrol.c212 unsigned int access, struct snd_ctl_file *file) in snd_ctl_new() argument
228 (*kctl)->vd[idx].access = access; in snd_ctl_new()
252 unsigned int access; in snd_ctl_new1() local
262 access = ncontrol->access; in snd_ctl_new1()
263 if (access == 0) in snd_ctl_new1()
264 access = SNDRV_CTL_ELEM_ACCESS_READWRITE; in snd_ctl_new1()
265 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE | in snd_ctl_new1()
272 err = snd_ctl_new(&kctl, count, access, NULL); in snd_ctl_new1()
559 if (!(kctl->vd[0].access & SNDRV_CTL_ELEM_ACCESS_USER)) { in snd_ctl_remove_user_ctl()
607 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE)) in snd_ctl_activate_id()
[all …]
/Linux-v4.19/arch/s390/mm/
Dfault.c344 static noinline void do_fault_error(struct pt_regs *regs, int access, in do_fault_error() argument
351 if (access == VM_EXEC && signal_return(regs) == 0) in do_fault_error()
405 static inline vm_fault_t do_exception(struct pt_regs *regs, int access) in do_exception() argument
455 if (access == VM_WRITE || (trans_exc_code & store_indication) == 0x400) in do_exception()
492 if (unlikely(!(vma->vm_flags & access))) in do_exception()
568 int access; in do_protection_exception() local
591 access = VM_EXEC; in do_protection_exception()
594 access = VM_WRITE; in do_protection_exception()
595 fault = do_exception(regs, access); in do_protection_exception()
598 do_fault_error(regs, access, fault); in do_protection_exception()
[all …]
/Linux-v4.19/arch/powerpc/mm/
Dhash64_64k.c36 int __hash_page_4K(unsigned long ea, unsigned long access, unsigned long vsid, in __hash_page_4K() argument
59 if (unlikely(!check_pte_access(access, old_pte))) in __hash_page_4K()
67 if (access & _PAGE_WRITE) in __hash_page_4K()
211 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_4K()
223 int __hash_page_64K(unsigned long ea, unsigned long access, in __hash_page_64K() argument
245 if (unlikely(!check_pte_access(access, old_pte))) in __hash_page_64K()
259 if (access & _PAGE_WRITE) in __hash_page_64K()
323 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_64K()
Dhash_utils_64.c1182 void hash_failure_debug(unsigned long ea, unsigned long access, in hash_failure_debug() argument
1189 ea, access, current->comm); in hash_failure_debug()
1217 unsigned long access, unsigned long trap, in hash_page_mm() argument
1230 ea, access, trap); in hash_page_mm()
1231 trace_hash_fault(ea, access, trap); in hash_page_mm()
1301 access |= _PAGE_PRESENT; in hash_page_mm()
1306 if (!check_pte_access(access, pte_val(*ptep))) { in hash_page_mm()
1314 rc = __hash_page_thp(ea, access, vsid, (pmd_t *)ptep, in hash_page_mm()
1318 rc = __hash_page_huge(ea, access, vsid, ptep, trap, in hash_page_mm()
1378 rc = __hash_page_64K(ea, access, vsid, ptep, trap, in hash_page_mm()
[all …]
/Linux-v4.19/security/smack/
DKconfig16 bool "Reporting on access granted by Smack rules"
20 Enable the bring-up ("b") access mode in Smack rules.
21 When access is granted by a rule with the "b" mode a
22 message about the access requested is generated. The
24 of access initially with the bringup mode set on the
28 access rule set once the behavior is well understood.
/Linux-v4.19/Documentation/mmc/
Dmmc-dev-parts.txt14 Read and write access is provided to the two MMC boot partitions. Due to
17 platform, write access is disabled by default to reduce the chance of
20 To enable write access to /dev/mmcblkXbootY, disable the forced read-only
21 access with:
25 To re-enable read-only access:
/Linux-v4.19/fs/nfsd/
Dnfs2acl.c172 argp->access); in nfsacld_proc_access()
175 resp->access = argp->access; in nfsacld_proc_access()
176 nfserr = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsacld_proc_access()
242 argp->access = ntohl(*p++); in nfsaclsvc_decode_accessargs()
320 *p++ = htonl(resp->access); in nfsaclsvc_encode_accessres()
379 PROC(access, access, access, access, RC_NOCACHE, ST+AT+1),
/Linux-v4.19/sound/core/oss/
Dio.c46 if (plugin->access == SNDRV_PCM_ACCESS_RW_INTERLEAVED) { in io_playback_transfer()
72 if (plugin->access == SNDRV_PCM_ACCESS_RW_INTERLEAVED) { in io_capture_transfer()
101 if (plugin->access == SNDRV_PCM_ACCESS_RW_INTERLEAVED) { in io_src_channels()
130 plugin->access = params_access(params); in snd_pcm_plugin_build_io()
133 if (plugin->access == SNDRV_PCM_ACCESS_RW_INTERLEAVED) in snd_pcm_plugin_build_io()
/Linux-v4.19/Documentation/ABI/testing/
Dsysfs-bus-event_source-devices-hv_gpci5 '0' if the hypervisor is configured to forbid access to event
8 '1' if that access is allowed.
14 0 or 1. Indicates whether we have access to "GA" events (listed
21 0 or 1. Indicates whether we have access to "EXPANDED" events (listed
28 0 or 1. Indicates whether we have access to "LAB" events (listed

12345678910>>...58