/Linux-v5.4/include/linux/ |
D | device_cgroup.h | 16 short access); 19 short access) in __devcgroup_check_permission() argument 25 short access) in devcgroup_check_permission() argument 27 int rc = BPF_CGROUP_RUN_PROG_DEVICE_CGROUP(type, major, minor, access); in devcgroup_check_permission() 32 return __devcgroup_check_permission(type, major, minor, access); in devcgroup_check_permission() 37 short type, access = 0; in devcgroup_inode_permission() local 50 access |= DEVCG_ACC_WRITE; in devcgroup_inode_permission() 52 access |= DEVCG_ACC_READ; in devcgroup_inode_permission() 55 access); in devcgroup_inode_permission()
|
/Linux-v5.4/security/ |
D | device_cgroup.c | 35 short access; member 104 walk->access |= ex->access; in dev_exception_add() 132 walk->access &= ~ex->access; in dev_exception_rm() 133 if (!walk->access) { in dev_exception_rm() 236 static void set_access(char *acc, short access) in set_access() argument 240 if (access & DEVCG_ACC_READ) in set_access() 242 if (access & DEVCG_ACC_WRITE) in set_access() 244 if (access & DEVCG_ACC_MKNOD) in set_access() 288 set_access(acc, ex->access); in devcgroup_seq_show() 314 u32 major, u32 minor, short access) in match_exception() argument [all …]
|
/Linux-v5.4/drivers/platform/chrome/ |
D | cros_ec_lpc_mec.c | 79 enum cros_ec_lpc_mec_emi_access_mode access, new_access; in cros_ec_lpc_io_bytes_mec() local 91 access = ACCESS_TYPE_BYTE; in cros_ec_lpc_io_bytes_mec() 93 access = ACCESS_TYPE_LONG_AUTO_INCREMENT; in cros_ec_lpc_io_bytes_mec() 98 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec() 126 if (new_access != access || in cros_ec_lpc_io_bytes_mec() 127 access != ACCESS_TYPE_LONG_AUTO_INCREMENT) { in cros_ec_lpc_io_bytes_mec() 128 access = new_access; in cros_ec_lpc_io_bytes_mec() 129 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
|
/Linux-v5.4/Documentation/admin-guide/LSM/ |
D | Smack.rst | 10 Smack is a kernel based implementation of mandatory access 33 access to systems that use them as Smack does. 50 load the Smack access rules 53 report if a process with one label has access 85 Used to make access control decisions. In almost all cases 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 110 Use the Smack label in this attribute for access control 115 Use the Smack label in this attribute for access control 131 access [all …]
|
/Linux-v5.4/arch/arm/include/asm/ |
D | arch_timer.h | 27 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument 29 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 38 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 53 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 57 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 66 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
/Linux-v5.4/drivers/gpu/drm/nouveau/nvkm/engine/dma/ |
D | user.c | 92 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor() 95 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor() 135 switch (dmaobj->access) { in nvkm_dmaobj_ctor() 137 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor() 140 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor() 143 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor() 146 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
|
/Linux-v5.4/fs/afs/ |
D | security.c | 131 h += permits->permits[i].access; in afs_hash_permits() 168 if (permits->permits[i].access != caller_access) { in afs_cache_permit() 235 new->permits[j].access = caller_access; in afs_cache_permit() 239 new->permits[j].access = permits->permits[i].access; in afs_cache_permit() 246 new->permits[j].access = caller_access; in afs_cache_permit() 330 *_access = permits->permits[i].access; in afs_check_permit_rcu() 370 *_access = permits->permits[i].access; in afs_check_permit() 404 afs_access_t uninitialized_var(access); in afs_permission() 418 !afs_check_permit_rcu(vnode, key, &access)) in afs_permission() 432 ret = afs_check_permit(vnode, key, &access); in afs_permission() [all …]
|
/Linux-v5.4/Documentation/ |
D | unaligned-memory-access.txt | 14 when it comes to memory access. This document presents some details about 19 The definition of an unaligned access 26 access. 28 The above may seem a little vague, as memory access can happen in different 32 which will compile to multiple-byte memory access instructions, namely when 47 of memory access. However, we must consider ALL supported architectures; 52 Why unaligned access is bad 55 The effects of performing an unaligned memory access vary from architecture 62 happen. The exception handler is able to correct the unaligned access, 66 unaligned access to be corrected. [all …]
|
/Linux-v5.4/Documentation/arm/ |
D | mem_alignment.rst | 5 Too many problems popped up because of unnoticed misaligned memory access in 14 unaligned memory access in general. If those access are predictable, you 16 alignment trap can fixup misaligned access for the exception cases, but at 20 trap to SIGBUS any code performing unaligned access (good for debugging bad 21 code), or even fixup the access by software like for kernel code. The later 36 0 A user process performing an unaligned memory access 42 performing the unaligned access. This is of course 47 performing the unaligned access. 59 information on unaligned access occurrences plus the current mode of
|
/Linux-v5.4/arch/x86/kvm/ |
D | mmutrace.h | 41 access_str[role.access], \ 205 TP_PROTO(u64 *sptep, gfn_t gfn, unsigned access, unsigned int gen), 206 TP_ARGS(sptep, gfn, access, gen), 211 __field(unsigned, access) 218 __entry->access = access; 223 __entry->gfn, __entry->access, __entry->gen) 228 TP_PROTO(u64 addr, gfn_t gfn, unsigned access), 229 TP_ARGS(addr, gfn, access), 234 __field(unsigned, access) 240 __entry->access = access; [all …]
|
D | paging_tmpl.h | 104 static inline void FNAME(protect_clean_gpte)(struct kvm_mmu *mmu, unsigned *access, in FNAME() 119 *access &= mask; in FNAME() 204 unsigned access; in FNAME() local 206 access = ((gpte & VMX_EPT_WRITABLE_MASK) ? ACC_WRITE_MASK : 0) | in FNAME() 212 access = gpte & (PT_WRITABLE_MASK | PT_USER_MASK | PT_PRESENT_MASK); in FNAME() 214 access ^= (gpte >> PT64_NX_SHIFT); in FNAME() 217 return access; in FNAME() 298 gva_t addr, u32 access) in FNAME() 311 const int write_fault = access & PFERR_WRITE_MASK; in FNAME() 312 const int user_fault = access & PFERR_USER_MASK; in FNAME() [all …]
|
/Linux-v5.4/drivers/infiniband/sw/rxe/ |
D | rxe_mr.c | 77 static void rxe_mem_init(int access, struct rxe_mem *mem) in rxe_mem_init() argument 80 u32 rkey = (access & IB_ACCESS_REMOTE) ? lkey : 0; in rxe_mem_init() 148 int access, struct rxe_mem *mem) in rxe_mem_init_dma() argument 150 rxe_mem_init(access, mem); in rxe_mem_init_dma() 153 mem->access = access; in rxe_mem_init_dma() 161 u64 length, u64 iova, int access, struct ib_udata *udata, in rxe_mem_init_user() argument 172 umem = ib_umem_get(udata, start, length, access, 0); in rxe_mem_init_user() 183 rxe_mem_init(access, mem); in rxe_mem_init_user() 224 mem->access = access; in rxe_mem_init_user() 437 int access, in copy_data() argument [all …]
|
/Linux-v5.4/tools/testing/selftests/bpf/progs/ |
D | dev_cgroup.c | 17 short access = ctx->access_type >> 16; in bpf_prog1() local 32 if (access & BPF_DEVCG_ACC_READ) in bpf_prog1() 35 if (access & BPF_DEVCG_ACC_WRITE) in bpf_prog1() 38 if (access & BPF_DEVCG_ACC_MKNOD) in bpf_prog1()
|
/Linux-v5.4/drivers/net/dsa/sja1105/ |
D | sja1105_dynamic_config.c | 496 .access = (OP_READ | OP_WRITE | OP_DEL), 504 .access = (OP_READ | OP_WRITE), 513 .access = (OP_WRITE | OP_DEL), 522 .access = OP_WRITE, 530 .access = OP_WRITE, 540 .access = OP_WRITE, 550 .access = OP_WRITE, 564 .access = (OP_READ | OP_WRITE | OP_DEL | OP_SEARCH), 572 .access = (OP_READ | OP_WRITE | OP_DEL | OP_SEARCH), 581 .access = (OP_READ | OP_WRITE | OP_DEL), [all …]
|
/Linux-v5.4/arch/arm64/include/asm/ |
D | arch_timer.h | 104 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument 106 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 115 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 130 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 132 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 139 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
/Linux-v5.4/drivers/dax/ |
D | Kconfig | 7 tristate "DAX: direct access to differentiated memory" 14 tristate "Device DAX: direct access mapping device" 17 Support raw access to differentiated (persistence, bandwidth, 25 tristate "PMEM DAX: direct access to persistent memory" 29 Support raw access to persistent memory. Note that this 41 Support access to persistent memory as if it were RAM. This
|
/Linux-v5.4/sound/core/ |
D | control.c | 197 unsigned int access, struct snd_ctl_file *file) in snd_ctl_new() argument 209 (*kctl)->vd[idx].access = access; in snd_ctl_new() 233 unsigned int access; in snd_ctl_new1() local 243 access = ncontrol->access; in snd_ctl_new1() 244 if (access == 0) in snd_ctl_new1() 245 access = SNDRV_CTL_ELEM_ACCESS_READWRITE; in snd_ctl_new1() 246 access &= (SNDRV_CTL_ELEM_ACCESS_READWRITE | in snd_ctl_new1() 253 err = snd_ctl_new(&kctl, count, access, NULL); in snd_ctl_new1() 528 if (!(kctl->vd[0].access & SNDRV_CTL_ELEM_ACCESS_USER)) { in snd_ctl_remove_user_ctl() 576 if (!(vd->access & SNDRV_CTL_ELEM_ACCESS_INACTIVE)) in snd_ctl_activate_id() [all …]
|
/Linux-v5.4/arch/s390/mm/ |
D | fault.c | 321 static noinline void do_fault_error(struct pt_regs *regs, int access, in do_fault_error() argument 328 if (access == VM_EXEC && signal_return(regs) == 0) in do_fault_error() 385 static inline vm_fault_t do_exception(struct pt_regs *regs, int access) in do_exception() argument 435 if (access == VM_WRITE || (trans_exc_code & store_indication) == 0x400) in do_exception() 472 if (unlikely(!(vma->vm_flags & access))) in do_exception() 548 int access; in do_protection_exception() local 571 access = VM_EXEC; in do_protection_exception() 574 access = VM_WRITE; in do_protection_exception() 575 fault = do_exception(regs, access); in do_protection_exception() 578 do_fault_error(regs, access, fault); in do_protection_exception() [all …]
|
/Linux-v5.4/arch/powerpc/mm/book3s64/ |
D | hash_64k.c | 36 int __hash_page_4K(unsigned long ea, unsigned long access, unsigned long vsid, in __hash_page_4K() argument 59 if (unlikely(!check_pte_access(access, old_pte))) in __hash_page_4K() 67 if (access & _PAGE_WRITE) in __hash_page_4K() 211 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_4K() 223 int __hash_page_64K(unsigned long ea, unsigned long access, in __hash_page_64K() argument 245 if (unlikely(!check_pte_access(access, old_pte))) in __hash_page_64K() 259 if (access & _PAGE_WRITE) in __hash_page_64K() 323 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_64K()
|
D | hash_utils.c | 1200 void hash_failure_debug(unsigned long ea, unsigned long access, in hash_failure_debug() argument 1207 ea, access, current->comm); in hash_failure_debug() 1236 unsigned long access, unsigned long trap, in hash_page_mm() argument 1249 ea, access, trap); in hash_page_mm() 1250 trace_hash_fault(ea, access, trap); in hash_page_mm() 1325 access |= _PAGE_PRESENT; in hash_page_mm() 1331 if (!check_pte_access(access, pte_val(*ptep))) { in hash_page_mm() 1339 rc = __hash_page_thp(ea, access, vsid, (pmd_t *)ptep, in hash_page_mm() 1343 rc = __hash_page_huge(ea, access, vsid, ptep, trap, in hash_page_mm() 1404 rc = __hash_page_64K(ea, access, vsid, ptep, trap, in hash_page_mm() [all …]
|
/Linux-v5.4/security/smack/ |
D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 22 When access is granted by a rule with the "b" mode a 23 message about the access requested is generated. The 25 of access initially with the bringup mode set on the 29 access rule set once the behavior is well understood.
|
/Linux-v5.4/arch/powerpc/include/asm/ |
D | trace.h | 169 TP_PROTO(unsigned long addr, unsigned long access, unsigned long trap), 170 TP_ARGS(addr, access, trap), 173 __field(unsigned long, access) 179 __entry->access = access; 184 __entry->addr, __entry->access, __entry->trap)
|
/Linux-v5.4/Documentation/driver-api/mmc/ |
D | mmc-dev-parts.rst | 15 Read and write access is provided to the two MMC boot partitions. Due to 18 platform, write access is disabled by default to reduce the chance of 21 To enable write access to /dev/mmcblkXbootY, disable the forced read-only 22 access with:: 26 To re-enable read-only access::
|
/Linux-v5.4/drivers/staging/vc04_services/bcm2835-audio/ |
D | bcm2835-ctl.c | 104 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | SNDRV_CTL_ELEM_ACCESS_TLV_READ, 114 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 123 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 202 .access = SNDRV_CTL_ELEM_ACCESS_READ, 240 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 253 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 274 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 287 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE,
|
/Linux-v5.4/fs/nfsd/ |
D | nfs2acl.c | 172 argp->access); in nfsacld_proc_access() 175 resp->access = argp->access; in nfsacld_proc_access() 176 nfserr = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsacld_proc_access() 242 argp->access = ntohl(*p++); in nfsaclsvc_decode_accessargs() 320 *p++ = htonl(resp->access); in nfsaclsvc_encode_accessres() 379 PROC(access, access, access, access, RC_NOCACHE, ST+AT+1),
|