/Linux-v5.4/drivers/usb/phy/ |
D | phy-ab8500-usb.c | 149 static void ab8500_usb_wd_workaround(struct ab8500_usb *ab) in ab8500_usb_wd_workaround() argument 151 abx500_set_register_interruptible(ab->dev, in ab8500_usb_wd_workaround() 158 abx500_set_register_interruptible(ab->dev, in ab8500_usb_wd_workaround() 166 abx500_set_register_interruptible(ab->dev, in ab8500_usb_wd_workaround() 172 static void ab8500_usb_regulator_enable(struct ab8500_usb *ab) in ab8500_usb_regulator_enable() argument 176 ret = regulator_enable(ab->v_ape); in ab8500_usb_regulator_enable() 178 dev_err(ab->dev, "Failed to enable v-ape\n"); in ab8500_usb_regulator_enable() 180 if (ab->flags & AB8500_USB_FLAG_REGULATOR_SET_VOLTAGE) { in ab8500_usb_regulator_enable() 181 ab->saved_v_ulpi = regulator_get_voltage(ab->v_ulpi); in ab8500_usb_regulator_enable() 182 if (ab->saved_v_ulpi < 0) in ab8500_usb_regulator_enable() [all …]
|
/Linux-v5.4/include/linux/mfd/abx500/ |
D | ab8500.h | 394 static inline int is_ab8500(struct ab8500 *ab) in is_ab8500() argument 396 return ab->version == AB8500_VERSION_AB8500; in is_ab8500() 399 static inline int is_ab8505(struct ab8500 *ab) in is_ab8505() argument 401 return ab->version == AB8500_VERSION_AB8505; in is_ab8505() 404 static inline int is_ab9540(struct ab8500 *ab) in is_ab9540() argument 406 return ab->version == AB8500_VERSION_AB9540; in is_ab9540() 409 static inline int is_ab8540(struct ab8500 *ab) in is_ab8540() argument 411 return ab->version == AB8500_VERSION_AB8540; in is_ab8540() 415 static inline int is_ab8500_1p0_or_earlier(struct ab8500 *ab) in is_ab8500_1p0_or_earlier() argument 417 return (is_ab8500(ab) && (ab->chip_id <= AB8500_CUT1P0)); in is_ab8500_1p0_or_earlier() [all …]
|
/Linux-v5.4/security/ |
D | lsm_audit.c | 184 static inline void print_ipv6_addr(struct audit_buffer *ab, in print_ipv6_addr() argument 189 audit_log_format(ab, " %s=%pI6c", name1, addr); in print_ipv6_addr() 191 audit_log_format(ab, " %s=%d", name2, ntohs(port)); in print_ipv6_addr() 194 static inline void print_ipv4_addr(struct audit_buffer *ab, __be32 addr, in print_ipv4_addr() argument 198 audit_log_format(ab, " %s=%pI4", name1, &addr); in print_ipv4_addr() 200 audit_log_format(ab, " %s=%d", name2, ntohs(port)); in print_ipv4_addr() 208 static void dump_common_audit_data(struct audit_buffer *ab, in dump_common_audit_data() argument 220 audit_log_format(ab, " pid=%d comm=", task_tgid_nr(current)); in dump_common_audit_data() 221 audit_log_untrustedstring(ab, memcpy(comm, current->comm, sizeof(comm))); in dump_common_audit_data() 227 audit_log_format(ab, " key=%d ", a->u.ipc_id); in dump_common_audit_data() [all …]
|
/Linux-v5.4/kernel/ |
D | audit.c | 383 struct audit_buffer *ab; in audit_log_config_change() local 386 ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_CONFIG_CHANGE); in audit_log_config_change() 387 if (unlikely(!ab)) in audit_log_config_change() 389 audit_log_format(ab, "op=set %s=%u old=%u ", function_name, new, old); in audit_log_config_change() 390 audit_log_session_info(ab); in audit_log_config_change() 391 rc = audit_log_task_context(ab); in audit_log_config_change() 394 audit_log_format(ab, " res=%d", allow_changes); in audit_log_config_change() 395 audit_log_end(ab); in audit_log_config_change() 1044 struct audit_buffer **ab, u16 msg_type) in audit_log_common_recv_msg() argument 1050 *ab = NULL; in audit_log_common_recv_msg() [all …]
|
D | auditsc.c | 959 struct audit_buffer *ab; in audit_log_pid_context() local 964 ab = audit_log_start(context, GFP_KERNEL, AUDIT_OBJ_PID); in audit_log_pid_context() 965 if (!ab) in audit_log_pid_context() 968 audit_log_format(ab, "opid=%d oauid=%d ouid=%d oses=%d", pid, in audit_log_pid_context() 973 audit_log_format(ab, " obj=(none)"); in audit_log_pid_context() 976 audit_log_format(ab, " obj=%s", ctx); in audit_log_pid_context() 980 audit_log_format(ab, " ocomm="); in audit_log_pid_context() 981 audit_log_untrustedstring(ab, comm); in audit_log_pid_context() 982 audit_log_end(ab); in audit_log_pid_context() 988 struct audit_buffer **ab) in audit_log_execve_info() argument [all …]
|
D | audit_fsnotify.c | 116 struct audit_buffer *ab; in audit_mark_log_rule_change() local 121 ab = audit_log_start(audit_context(), GFP_NOFS, AUDIT_CONFIG_CHANGE); in audit_mark_log_rule_change() 122 if (unlikely(!ab)) in audit_mark_log_rule_change() 124 audit_log_session_info(ab); in audit_mark_log_rule_change() 125 audit_log_format(ab, " op=%s path=", op); in audit_mark_log_rule_change() 126 audit_log_untrustedstring(ab, audit_mark->path); in audit_mark_log_rule_change() 127 audit_log_key(ab, rule->filterkey); in audit_mark_log_rule_change() 128 audit_log_format(ab, " list=%d res=1", rule->listnr); in audit_mark_log_rule_change() 129 audit_log_end(ab); in audit_mark_log_rule_change()
|
/Linux-v5.4/security/apparmor/ |
D | ipc.c | 26 static void audit_ptrace_mask(struct audit_buffer *ab, u32 mask) in audit_ptrace_mask() argument 30 audit_log_string(ab, "read"); in audit_ptrace_mask() 33 audit_log_string(ab, "trace"); in audit_ptrace_mask() 36 audit_log_string(ab, "readby"); in audit_ptrace_mask() 39 audit_log_string(ab, "tracedby"); in audit_ptrace_mask() 45 static void audit_ptrace_cb(struct audit_buffer *ab, void *va) in audit_ptrace_cb() argument 50 audit_log_format(ab, " requested_mask="); in audit_ptrace_cb() 51 audit_ptrace_mask(ab, aad(sa)->request); in audit_ptrace_cb() 54 audit_log_format(ab, " denied_mask="); in audit_ptrace_cb() 55 audit_ptrace_mask(ab, aad(sa)->denied); in audit_ptrace_cb() [all …]
|
D | audit.c | 55 static void audit_pre(struct audit_buffer *ab, void *ca) in audit_pre() argument 60 audit_log_format(ab, "apparmor="); in audit_pre() 61 audit_log_string(ab, aa_audit_type[aad(sa)->type]); in audit_pre() 65 audit_log_format(ab, " operation="); in audit_pre() 66 audit_log_string(ab, aad(sa)->op); in audit_pre() 70 audit_log_format(ab, " info="); in audit_pre() 71 audit_log_string(ab, aad(sa)->info); in audit_pre() 73 audit_log_format(ab, " error=%d", aad(sa)->error); in audit_pre() 83 audit_log_format(ab, " namespace="); in audit_pre() 84 audit_log_untrustedstring(ab, in audit_pre() [all …]
|
D | mount.c | 27 static void audit_mnt_flags(struct audit_buffer *ab, unsigned long flags) in audit_mnt_flags() argument 30 audit_log_format(ab, "ro"); in audit_mnt_flags() 32 audit_log_format(ab, "rw"); in audit_mnt_flags() 34 audit_log_format(ab, ", nosuid"); in audit_mnt_flags() 36 audit_log_format(ab, ", nodev"); in audit_mnt_flags() 38 audit_log_format(ab, ", noexec"); in audit_mnt_flags() 40 audit_log_format(ab, ", sync"); in audit_mnt_flags() 42 audit_log_format(ab, ", remount"); in audit_mnt_flags() 44 audit_log_format(ab, ", mand"); in audit_mnt_flags() 46 audit_log_format(ab, ", dirsync"); in audit_mnt_flags() [all …]
|
D | net.c | 71 void audit_net_cb(struct audit_buffer *ab, void *va) in audit_net_cb() argument 75 audit_log_format(ab, " family="); in audit_net_cb() 77 audit_log_string(ab, address_family_names[sa->u.net->family]); in audit_net_cb() 79 audit_log_format(ab, "\"unknown(%d)\"", sa->u.net->family); in audit_net_cb() 80 audit_log_format(ab, " sock_type="); in audit_net_cb() 82 audit_log_string(ab, sock_type_names[aad(sa)->net.type]); in audit_net_cb() 84 audit_log_format(ab, "\"unknown(%d)\"", aad(sa)->net.type); in audit_net_cb() 85 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb() 88 audit_log_format(ab, " requested_mask="); in audit_net_cb() 89 aa_audit_perm_mask(ab, aad(sa)->request, NULL, 0, in audit_net_cb() [all …]
|
D | lib.c | 221 void aa_audit_perm_names(struct audit_buffer *ab, const char * const *names, in aa_audit_perm_names() argument 230 audit_log_format(ab, fmt, names[i]); in aa_audit_perm_names() 239 void aa_audit_perm_mask(struct audit_buffer *ab, u32 mask, const char *chrs, in aa_audit_perm_mask() argument 244 audit_log_format(ab, "\""); in aa_audit_perm_mask() 248 audit_log_format(ab, "%s", str); in aa_audit_perm_mask() 250 audit_log_format(ab, " "); in aa_audit_perm_mask() 253 aa_audit_perm_names(ab, names, mask & namesmask); in aa_audit_perm_mask() 254 audit_log_format(ab, "\""); in aa_audit_perm_mask() 262 static void aa_audit_perms_cb(struct audit_buffer *ab, void *va) in aa_audit_perms_cb() argument 267 audit_log_format(ab, " requested_mask="); in aa_audit_perms_cb() [all …]
|
/Linux-v5.4/security/integrity/ |
D | integrity_audit.c | 32 struct audit_buffer *ab; in integrity_audit_msg() local 38 ab = audit_log_start(audit_context(), GFP_KERNEL, audit_msgno); in integrity_audit_msg() 39 audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u", in integrity_audit_msg() 44 audit_log_task_context(ab); in integrity_audit_msg() 45 audit_log_format(ab, " op=%s cause=%s comm=", op, cause); in integrity_audit_msg() 46 audit_log_untrustedstring(ab, get_task_comm(name, current)); in integrity_audit_msg() 48 audit_log_format(ab, " name="); in integrity_audit_msg() 49 audit_log_untrustedstring(ab, fname); in integrity_audit_msg() 52 audit_log_format(ab, " dev="); in integrity_audit_msg() 53 audit_log_untrustedstring(ab, inode->i_sb->s_id); in integrity_audit_msg() [all …]
|
/Linux-v5.4/arch/x86/crypto/ |
D | twofish-x86_64-asm_64-3way.S | 77 #define do16bit_ror(rot, op1, op2, T0, T1, tmp1, tmp2, ab, dst) \ argument 78 movzbl ab ## bl, tmp2 ## d; \ 79 movzbl ab ## bh, tmp1 ## d; \ 80 rorq $(rot), ab; \ 84 #define swap_ab_with_cd(ab, cd, tmp) \ argument 86 movq ab, cd; \ 87 movq tmp, ab; 93 #define g1g2_3(ab, cd, Tx0, Tx1, Tx2, Tx3, Ty0, Ty1, Ty2, Ty3, x, y) \ argument 95 do16bit_ror(32, mov, xor, Tx0, Tx1, RT0, x ## 0, ab ## 0, x ## 0); \ 96 do16bit_ror(48, mov, xor, Ty1, Ty2, RT0, y ## 0, ab ## 0, y ## 0); \ [all …]
|
D | camellia-x86_64-asm_64.S | 79 #define xor2ror16(T0, T1, tmp1, tmp2, ab, dst) \ argument 80 movzbl ab ## bl, tmp2 ## d; \ 81 movzbl ab ## bh, tmp1 ## d; \ 82 rorq $16, ab; \ 89 #define roundsm(ab, subkey, cd) \ argument 92 xor2ror16(sp00444404, sp03303033, RT0, RT1, ab ## 0, cd ## 0); \ 93 xor2ror16(sp22000222, sp10011110, RT0, RT1, ab ## 0, RT2); \ 94 xor2ror16(sp11101110, sp44044404, RT0, RT1, ab ## 0, cd ## 0); \ 95 xor2ror16(sp30333033, sp02220222, RT0, RT1, ab ## 0, RT2); \ 266 #define roundsm2(ab, subkey, cd) \ argument [all …]
|
/Linux-v5.4/drivers/md/persistent-data/ |
D | dm-array.c | 96 static void *element_at(struct dm_array_info *info, struct array_block *ab, in element_at() argument 99 unsigned char *entry = (unsigned char *) (ab + 1); in element_at() 110 static void on_entries(struct dm_array_info *info, struct array_block *ab, in on_entries() argument 113 unsigned i, nr_entries = le32_to_cpu(ab->nr_entries); in on_entries() 116 fn(info->value_type.context, element_at(info, ab, i)); in on_entries() 122 static void inc_ablock_entries(struct dm_array_info *info, struct array_block *ab) in inc_ablock_entries() argument 127 on_entries(info, ab, vt->inc); in inc_ablock_entries() 133 static void dec_ablock_entries(struct dm_array_info *info, struct array_block *ab) in dec_ablock_entries() argument 138 on_entries(info, ab, vt->dec); in dec_ablock_entries() 154 struct dm_block **block, struct array_block **ab) in alloc_ablock() argument [all …]
|
/Linux-v5.4/arch/arc/lib/ |
D | memcpy-archs.S | 25 # define LOADX(DST,RX) ldd.ab DST, [RX, 8] 26 # define STOREX(SRC,RX) std.ab SRC, [RX, 8] 30 # define LOADX(DST,RX) ld.ab DST, [RX, 4] 31 # define STOREX(SRC,RX) st.ab SRC, [RX, 4] 51 ldb.ab r5, [r1,1] 53 stb.ab r5, [r3,1] 79 ldb.ab r5, [r1,1] 80 stb.ab r5, [r3,1] 92 ldb.ab r5, [r1, 1] 97 ldh.ab r6, [r1, 2] [all …]
|
D | memcpy-archs-unaligned.S | 12 # define LOADX(DST,RX) ldd.ab DST, [RX, 8] 13 # define STOREX(SRC,RX) std.ab SRC, [RX, 8] 17 # define LOADX(DST,RX) ld.ab DST, [RX, 4] 18 # define STOREX(SRC,RX) st.ab SRC, [RX, 4] 42 ldb.ab r5, [r1, 1] 43 stb.ab r5, [r3, 1]
|
D | memcpy-700.S | 18 st.ab r12,[r5,4] 23 st.ab r12,[r5,4] 25 st.ab r3,[r5,4] 52 stb.ab r12,[r5,1] 57 stb.ab r12,[r5,1] 59 stb.ab r3,[r5,1]
|
D | strcpy-700.S | 35 st.ab r4,[r10,4] 42 st.ab r3,[r10,4] 56 stb.ab r1,[r10,1] 61 ldb.ab r3,[r1,1] 65 stb.ab r3,[r10,1]
|
/Linux-v5.4/net/netfilter/ |
D | xt_AUDIT.c | 31 static bool audit_ip4(struct audit_buffer *ab, struct sk_buff *skb) in audit_ip4() argument 40 audit_log_format(ab, " saddr=%pI4 daddr=%pI4 proto=%hhu", in audit_ip4() 46 static bool audit_ip6(struct audit_buffer *ab, struct sk_buff *skb) in audit_ip6() argument 60 audit_log_format(ab, " saddr=%pI6c daddr=%pI6c proto=%hhu", in audit_ip6() 69 struct audit_buffer *ab; in audit_tg() local 74 ab = audit_log_start(NULL, GFP_ATOMIC, AUDIT_NETFILTER_PKT); in audit_tg() 75 if (ab == NULL) in audit_tg() 78 audit_log_format(ab, "mark=%#x", skb->mark); in audit_tg() 84 fam = audit_ip4(ab, skb) ? NFPROTO_IPV4 : -1; in audit_tg() 87 fam = audit_ip6(ab, skb) ? NFPROTO_IPV6 : -1; in audit_tg() [all …]
|
D | nft_log.c | 29 static bool audit_ip4(struct audit_buffer *ab, struct sk_buff *skb) in audit_ip4() argument 38 audit_log_format(ab, " saddr=%pI4 daddr=%pI4 proto=%hhu", in audit_ip4() 44 static bool audit_ip6(struct audit_buffer *ab, struct sk_buff *skb) in audit_ip6() argument 58 audit_log_format(ab, " saddr=%pI6c daddr=%pI6c proto=%hhu", in audit_ip6() 67 struct audit_buffer *ab; in nft_log_eval_audit() local 73 ab = audit_log_start(NULL, GFP_ATOMIC, AUDIT_NETFILTER_PKT); in nft_log_eval_audit() 74 if (!ab) in nft_log_eval_audit() 77 audit_log_format(ab, "mark=%#x", skb->mark); in nft_log_eval_audit() 83 fam = audit_ip4(ab, skb) ? NFPROTO_IPV4 : -1; in nft_log_eval_audit() 86 fam = audit_ip6(ab, skb) ? NFPROTO_IPV6 : -1; in nft_log_eval_audit() [all …]
|
/Linux-v5.4/include/linux/ |
D | audit.h | 139 void audit_log_format(struct audit_buffer *ab, const char *fmt, ...); 140 extern void audit_log_end(struct audit_buffer *ab); 143 extern void audit_log_n_hex(struct audit_buffer *ab, 146 extern void audit_log_n_string(struct audit_buffer *ab, 149 extern void audit_log_n_untrustedstring(struct audit_buffer *ab, 152 extern void audit_log_untrustedstring(struct audit_buffer *ab, 154 extern void audit_log_d_path(struct audit_buffer *ab, 157 extern void audit_log_key(struct audit_buffer *ab, 162 extern int audit_log_task_context(struct audit_buffer *ab); 163 extern void audit_log_task_info(struct audit_buffer *ab); [all …]
|
/Linux-v5.4/security/integrity/evm/ |
D | evm_secfs.c | 179 struct audit_buffer *ab; in evm_write_xattrs() local 192 ab = audit_log_start(audit_context(), GFP_KERNEL, in evm_write_xattrs() 194 if (!ab) in evm_write_xattrs() 215 audit_log_format(ab, "xattr="); in evm_write_xattrs() 216 audit_log_untrustedstring(ab, xattr->name); in evm_write_xattrs() 249 audit_log_format(ab, " res=0"); in evm_write_xattrs() 250 audit_log_end(ab); in evm_write_xattrs() 253 audit_log_format(ab, " res=%d", err); in evm_write_xattrs() 254 audit_log_end(ab); in evm_write_xattrs()
|
/Linux-v5.4/drivers/tty/ |
D | tty_audit.c | 63 struct audit_buffer *ab; in tty_audit_log() local 69 ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_TTY); in tty_audit_log() 70 if (ab) { in tty_audit_log() 73 audit_log_format(ab, "%s pid=%u uid=%u auid=%u ses=%u major=%d" in tty_audit_log() 77 audit_log_untrustedstring(ab, name); in tty_audit_log() 78 audit_log_format(ab, " data="); in tty_audit_log() 79 audit_log_n_hex(ab, data, size); in tty_audit_log() 80 audit_log_end(ab); in tty_audit_log()
|
/Linux-v5.4/fs/xfs/scrub/ |
D | attr.h | 35 struct xchk_xattr_buf *ab = sc->buf; in xchk_xattr_valuebuf() local 37 return ab->buf; in xchk_xattr_valuebuf() 45 struct xchk_xattr_buf *ab = sc->buf; in xchk_xattr_usedmap() local 47 return (unsigned long *)ab->buf; in xchk_xattr_usedmap()
|