Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 1756) sorted by relevance

12345678910>>...71

/Linux-v5.10/security/
Ddevice_cgroup.c37 short access; member
106 walk->access |= ex->access; in dev_exception_add()
134 walk->access &= ~ex->access; in dev_exception_rm()
135 if (!walk->access) { in dev_exception_rm()
238 static void set_access(char *acc, short access) in set_access() argument
242 if (access & DEVCG_ACC_READ) in set_access()
244 if (access & DEVCG_ACC_WRITE) in set_access()
246 if (access & DEVCG_ACC_MKNOD) in set_access()
290 set_access(acc, ex->access); in devcgroup_seq_show()
316 u32 major, u32 minor, short access) in match_exception() argument
[all …]
/Linux-v5.10/kernel/kcsan/
Dkcsan-test.c142 } access[2]; member
149 const bool is_assert = (r->access[0].type | r->access[1].type) & KCSAN_ACCESS_ASSERT; in report_matches()
168 if (r->access[1].fn) { in report_matches()
173 scnprintf(tmp[0], sizeof(tmp[0]), "%pS", r->access[0].fn); in report_matches()
174 scnprintf(tmp[1], sizeof(tmp[1]), "%pS", r->access[1].fn); in report_matches()
177 cmp < 0 ? r->access[0].fn : r->access[1].fn, in report_matches()
178 cmp < 0 ? r->access[1].fn : r->access[0].fn); in report_matches()
180 scnprintf(cur, end - cur, "%pS", r->access[0].fn); in report_matches()
190 if (!r->access[1].fn) in report_matches()
195 const int ty = r->access[i].type; in report_matches()
[all …]
/Linux-v5.10/drivers/platform/chrome/
Dcros_ec_lpc_mec.c79 enum cros_ec_lpc_mec_emi_access_mode access, new_access; in cros_ec_lpc_io_bytes_mec() local
91 access = ACCESS_TYPE_BYTE; in cros_ec_lpc_io_bytes_mec()
93 access = ACCESS_TYPE_LONG_AUTO_INCREMENT; in cros_ec_lpc_io_bytes_mec()
98 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
126 if (new_access != access || in cros_ec_lpc_io_bytes_mec()
127 access != ACCESS_TYPE_LONG_AUTO_INCREMENT) { in cros_ec_lpc_io_bytes_mec()
128 access = new_access; in cros_ec_lpc_io_bytes_mec()
129 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
/Linux-v5.10/Documentation/admin-guide/LSM/
DSmack.rst10 Smack is a kernel based implementation of mandatory access
33 access to systems that use them as Smack does.
50 load the Smack access rules
53 report if a process with one label has access
85 Used to make access control decisions. In almost all cases
95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
110 Use the Smack label in this attribute for access control
115 Use the Smack label in this attribute for access control
131 access
[all …]
/Linux-v5.10/include/linux/
Ddevice_cgroup.h16 short access);
19 short type, access = 0; in devcgroup_inode_permission() local
32 access |= DEVCG_ACC_WRITE; in devcgroup_inode_permission()
34 access |= DEVCG_ACC_READ; in devcgroup_inode_permission()
37 access); in devcgroup_inode_permission()
61 short access) in devcgroup_check_permission() argument
/Linux-v5.10/arch/arm/include/asm/
Darch_timer.h27 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument
29 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15()
38 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15()
53 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument
57 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15()
66 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
/Linux-v5.10/drivers/gpu/drm/nouveau/nvkm/engine/dma/
Duser.c92 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor()
95 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor()
135 switch (dmaobj->access) { in nvkm_dmaobj_ctor()
137 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor()
140 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor()
143 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor()
146 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
/Linux-v5.10/fs/afs/
Dsecurity.c131 h += permits->permits[i].access; in afs_hash_permits()
168 if (permits->permits[i].access != caller_access) { in afs_cache_permit()
234 new->permits[j].access = caller_access; in afs_cache_permit()
238 new->permits[j].access = permits->permits[i].access; in afs_cache_permit()
245 new->permits[j].access = caller_access; in afs_cache_permit()
328 *_access = permits->permits[i].access; in afs_check_permit_rcu()
368 *_access = permits->permits[i].access; in afs_check_permit()
402 afs_access_t access; in afs_permission() local
416 !afs_check_permit_rcu(vnode, key, &access)) in afs_permission()
430 ret = afs_check_permit(vnode, key, &access); in afs_permission()
[all …]
/Linux-v5.10/Documentation/core-api/
Dunaligned-memory-access.rst14 when it comes to memory access. This document presents some details about
19 The definition of an unaligned access
26 access.
28 The above may seem a little vague, as memory access can happen in different
32 which will compile to multiple-byte memory access instructions, namely when
47 of memory access. However, we must consider ALL supported architectures;
52 Why unaligned access is bad
55 The effects of performing an unaligned memory access vary from architecture
62 happen. The exception handler is able to correct the unaligned access,
66 unaligned access to be corrected.
[all …]
/Linux-v5.10/Documentation/arm/
Dmem_alignment.rst5 Too many problems popped up because of unnoticed misaligned memory access in
14 unaligned memory access in general. If those access are predictable, you
16 alignment trap can fixup misaligned access for the exception cases, but at
20 trap to SIGBUS any code performing unaligned access (good for debugging bad
21 code), or even fixup the access by software like for kernel code. The later
36 0 A user process performing an unaligned memory access
42 performing the unaligned access. This is of course
47 performing the unaligned access.
59 information on unaligned access occurrences plus the current mode of
/Linux-v5.10/drivers/infiniband/sw/rxe/
Drxe_mr.c50 static void rxe_mem_init(int access, struct rxe_mem *mem) in rxe_mem_init() argument
53 u32 rkey = (access & IB_ACCESS_REMOTE) ? lkey : 0; in rxe_mem_init()
116 int access, struct rxe_mem *mem) in rxe_mem_init_dma() argument
118 rxe_mem_init(access, mem); in rxe_mem_init_dma()
121 mem->access = access; in rxe_mem_init_dma()
127 u64 length, u64 iova, int access, struct ib_udata *udata, in rxe_mem_init_user() argument
138 umem = ib_umem_get(pd->ibpd.device, start, length, access); in rxe_mem_init_user()
149 rxe_mem_init(access, mem); in rxe_mem_init_user()
191 mem->access = access; in rxe_mem_init_user()
404 int access, in copy_data() argument
[all …]
/Linux-v5.10/tools/testing/selftests/bpf/progs/
Ddev_cgroup.c17 short access = ctx->access_type >> 16; in bpf_prog1() local
32 if (access & BPF_DEVCG_ACC_READ) in bpf_prog1()
35 if (access & BPF_DEVCG_ACC_WRITE) in bpf_prog1()
38 if (access & BPF_DEVCG_ACC_MKNOD) in bpf_prog1()
/Linux-v5.10/tools/perf/Documentation/
Dsecurity.txt8 Enabling LSM based mandatory access control (MAC) to perf_event_open() syscall
11 LSM hooks for mandatory access control for perf_event_open() syscall can be
13 Targeted policy with perf_event_open() access control capabilities:
127 Opening access to perf_event_open() syscall on Fedora with SELinux
133 and prevent unauthorized access to perf_event_open() syscall. In such case
139 Enforced MAC policy settings (SELinux) can limit access to performance
141 more perf_event access control information and adjusting the policy.
143 access to performance monitoring and observability operations for users
148 >= 0: Disallow raw and ftrace function tracepoint access
149 >= 1: Disallow CPU event access
[all …]
/Linux-v5.10/drivers/net/dsa/sja1105/
Dsja1105_dynamic_config.c645 .access = OP_WRITE,
653 .access = (OP_READ | OP_WRITE | OP_DEL),
661 .access = (OP_READ | OP_WRITE),
669 .access = (OP_WRITE | OP_DEL),
678 .access = OP_WRITE,
686 .access = OP_WRITE,
694 .access = OP_WRITE,
702 .access = OP_WRITE,
710 .access = (OP_WRITE | OP_DEL),
718 .access = OP_WRITE,
[all …]
/Linux-v5.10/arch/arm64/include/asm/
Darch_timer.h105 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument
107 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15()
116 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15()
131 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument
133 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15()
140 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
/Linux-v5.10/arch/x86/kvm/mmu/
Dpaging_tmpl.h104 static inline void FNAME(protect_clean_gpte)(struct kvm_mmu *mmu, unsigned *access, in FNAME()
119 *access &= mask; in FNAME()
219 unsigned access; in FNAME() local
221 access = ((gpte & VMX_EPT_WRITABLE_MASK) ? ACC_WRITE_MASK : 0) | in FNAME()
227 access = gpte & (PT_WRITABLE_MASK | PT_USER_MASK | PT_PRESENT_MASK); in FNAME()
229 access ^= (gpte >> PT64_NX_SHIFT); in FNAME()
232 return access; in FNAME()
313 gpa_t addr, u32 access) in FNAME()
326 const int write_fault = access & PFERR_WRITE_MASK; in FNAME()
327 const int user_fault = access & PFERR_USER_MASK; in FNAME()
[all …]
Dmmutrace.h41 access_str[role.access], \
211 __field(unsigned, access)
218 __entry->access = spte & ACC_ALL;
223 __entry->gfn, __entry->access, __entry->gen)
228 TP_PROTO(u64 addr, gfn_t gfn, unsigned access),
229 TP_ARGS(addr, gfn, access),
234 __field(unsigned, access)
240 __entry->access = access;
244 __entry->access)
/Linux-v5.10/drivers/thermal/st/
DKconfig13 tristate "STi series syscfg register access based thermal sensors"
17 tristate "STi series memory mapped access based thermal sensors"
25 SoCs. This thermal driver allows to access to general thermal framework
26 functionalities and to access to SoC sensor functionalities. This
/Linux-v5.10/arch/powerpc/mm/book3s64/
Dhash_64k.c36 int __hash_page_4K(unsigned long ea, unsigned long access, unsigned long vsid, in __hash_page_4K() argument
59 if (unlikely(!check_pte_access(access, old_pte))) in __hash_page_4K()
67 if (access & _PAGE_WRITE) in __hash_page_4K()
211 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_4K()
223 int __hash_page_64K(unsigned long ea, unsigned long access, in __hash_page_64K() argument
245 if (unlikely(!check_pte_access(access, old_pte))) in __hash_page_64K()
259 if (access & _PAGE_WRITE) in __hash_page_64K()
323 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_64K()
/Linux-v5.10/arch/powerpc/include/asm/
Dtrace.h169 TP_PROTO(unsigned long addr, unsigned long access, unsigned long trap),
170 TP_ARGS(addr, access, trap),
173 __field(unsigned long, access)
179 __entry->access = access;
184 __entry->addr, __entry->access, __entry->trap)
/Linux-v5.10/security/smack/
DKconfig17 bool "Reporting on access granted by Smack rules"
21 Enable the bring-up ("b") access mode in Smack rules.
22 When access is granted by a rule with the "b" mode a
23 message about the access requested is generated. The
25 of access initially with the bringup mode set on the
29 access rule set once the behavior is well understood.
/Linux-v5.10/Documentation/driver-api/mmc/
Dmmc-dev-parts.rst15 Read and write access is provided to the two MMC boot partitions. Due to
18 platform, write access is disabled by default to reduce the chance of
21 To enable write access to /dev/mmcblkXbootY, disable the forced read-only
22 access with::
26 To re-enable read-only access::
/Linux-v5.10/drivers/dax/
DKconfig7 tristate "DAX: direct access to differentiated memory"
14 tristate "Device DAX: direct access mapping device"
17 Support raw access to differentiated (persistence, bandwidth,
25 tristate "PMEM DAX: direct access to persistent memory"
29 Support raw access to persistent memory. Note that this
36 tristate "HMEM DAX: direct access to 'specific purpose' memory"
62 Support access to persistent, or other performance
/Linux-v5.10/sound/core/
Dcontrol.c198 unsigned int access, struct snd_ctl_file *file) in snd_ctl_new() argument
210 (*kctl)->vd[idx].access = access; in snd_ctl_new()
234 unsigned int access; in snd_ctl_new1() local
244 access = ncontrol->access; in snd_ctl_new1()
245 if (access == 0) in snd_ctl_new1()
246 access = SNDRV_CTL_ELEM_ACCESS_READWRITE; in snd_ctl_new1()
247 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE | in snd_ctl_new1()
255 err = snd_ctl_new(&kctl, count, access, NULL); in snd_ctl_new1()
530 if (!(kctl->vd[0].access & SNDRV_CTL_ELEM_ACCESS_USER)) { in snd_ctl_remove_user_ctl()
578 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE)) in snd_ctl_activate_id()
[all …]
/Linux-v5.10/drivers/staging/vc04_services/bcm2835-audio/
Dbcm2835-ctl.c104 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | SNDRV_CTL_ELEM_ACCESS_TLV_READ,
114 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE,
123 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE,
202 .access = SNDRV_CTL_ELEM_ACCESS_READ,
240 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE |
253 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE,
274 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE |
287 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE,

12345678910>>...71