/openbmc/qemu/tests/qtest/ |
H A D | tpm-tis-util.c | 48 uint8_t access; in tpm_tis_test_check_localities() local 55 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_localities() 78 uint8_t access; in tpm_tis_test_check_access_reg() local 82 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg() 109 uint8_t access; in tpm_tis_test_check_access_reg_seize() local 255 access = readb(TIS_REG(l, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg_seize() 263 access = readb(TIS_REG(l, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg_seize() 302 uint8_t access; in tpm_tis_test_check_access_reg_release() local 377 uint8_t access; in tpm_tis_test_check_transmit() local 384 access = readb(TIS_REG(0, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_transmit() [all …]
|
H A D | tpm-tis-i2c-test.c | 94 uint8_t access; in tpm_tis_i2c_test_basic() local 103 access = tpm_tis_i2c_readb(0, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_basic() 163 uint8_t access; in tpm_tis_i2c_test_check_localities() local 198 uint8_t access; in tpm_tis_i2c_test_check_access_reg() local 230 uint8_t access; in tpm_tis_i2c_test_check_access_reg_seize() local 381 access = tpm_tis_i2c_readb(l, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_access_reg_seize() 389 access = tpm_tis_i2c_readb(l, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_access_reg_seize() 428 uint8_t access; in tpm_tis_i2c_test_check_access_reg_release() local 505 uint8_t access; in tpm_tis_i2c_test_check_transmit() local 521 access = tpm_tis_i2c_readb(0, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_transmit() [all …]
|
/openbmc/linux/drivers/iommu/iommufd/ |
H A D | device.c | 710 access->ioas = NULL; in iommufd_access_change_ioas() 724 access->ops->unmap(access->data, 0, ULONG_MAX); in iommufd_access_change_ioas() 755 if (access->ioas) in iommufd_access_destroy_object() 784 access = iommufd_object_alloc(ictx, access, IOMMUFD_OBJ_ACCESS); in iommufd_access_create() 785 if (IS_ERR(access)) in iommufd_access_create() 786 return access; in iommufd_access_create() 788 access->data = data; in iommufd_access_create() 789 access->ops = ops; in iommufd_access_create() 803 return access; in iommufd_access_create() 815 iommufd_object_destroy_user(access->ictx, &access->obj); in iommufd_access_destroy() [all …]
|
/openbmc/qemu/target/arm/ |
H A D | cortex-regs.c | 32 .access = PL1_RW, .readfn = l2ctlr_read, 36 .access = PL1_RW, .readfn = l2ctlr_read, 40 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 43 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 46 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 49 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 52 .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 }, 55 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 58 .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 }, 61 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, [all …]
|
H A D | helper.c | 2062 .access = PL0_RW, 2203 .access = PL1_R, 2209 .access = PL1_RW, 2391 .access = PL0_RW, 2395 .access = PL0_RW, 2414 .access = PL1_RW, 2418 .access = PL1_RW, 5421 .access = PL0_W, 6247 .access = PL2_W, 6250 .access = PL2_W, [all …]
|
/openbmc/linux/drivers/infiniband/sw/rxe/ |
H A D | rxe_mw.c | 61 if (unlikely((access & IB_ZERO_BASED))) { in rxe_check_bind_mw() 94 if (unlikely(mr->access & IB_ZERO_BASED)) { in rxe_check_bind_mw() 107 if (unlikely((access & in rxe_check_bind_mw() 116 if (access & IB_ZERO_BASED) { in rxe_check_bind_mw() 141 mw->access = access; in rxe_do_bind_mw() 172 int access = wqe->wr.wr.mw.access; in rxe_bind_mw() local 200 if (access & ~RXE_ACCESS_SUPPORTED_MW) { in rxe_bind_mw() 212 rxe_do_bind_mw(qp, wqe, mw, mr, access); in rxe_bind_mw() 252 mw->access = 0; in rxe_do_invalidate_mw() 303 (mw->length == 0) || ((access & mw->access) != access) || in rxe_lookup_mw() [all …]
|
/openbmc/linux/include/linux/ |
H A D | iommufd.h | 50 void iommufd_access_destroy(struct iommufd_access *access); 51 int iommufd_access_attach(struct iommufd_access *access, u32 ioas_id); 52 int iommufd_access_replace(struct iommufd_access *access, u32 ioas_id); 53 void iommufd_access_detach(struct iommufd_access *access); 63 int iommufd_access_pin_pages(struct iommufd_access *access, unsigned long iova, 66 void iommufd_access_unpin_pages(struct iommufd_access *access, 68 int iommufd_access_rw(struct iommufd_access *access, unsigned long iova, 83 static inline int iommufd_access_pin_pages(struct iommufd_access *access, in iommufd_access_pin_pages() argument 92 static inline void iommufd_access_unpin_pages(struct iommufd_access *access, in iommufd_access_unpin_pages() argument 98 static inline int iommufd_access_rw(struct iommufd_access *access, unsigned long iova, in iommufd_access_rw() argument
|
H A D | device_cgroup.h | 16 short access); 19 short type, access = 0; in devcgroup_inode_permission() local 32 access |= DEVCG_ACC_WRITE; in devcgroup_inode_permission() 34 access |= DEVCG_ACC_READ; in devcgroup_inode_permission() 37 access); in devcgroup_inode_permission() 61 short access) in devcgroup_check_permission() argument
|
/openbmc/linux/security/ |
H A D | device_cgroup.c | 38 short access; member 118 walk->access |= ex->access; in dev_exception_add() 146 walk->access &= ~ex->access; in dev_exception_rm() 147 if (!walk->access) { in dev_exception_rm() 254 if (access & DEVCG_ACC_READ) in set_access() 342 if (access & (~ex->access)) in match_exception() 388 if (!(access & ex->access)) in match_exception_partial() 431 refex->access); in verify_new_ex() 446 refex->access); in verify_new_ex() 833 short access) in devcgroup_legacy_check_permission() argument [all …]
|
/openbmc/linux/drivers/platform/chrome/ |
H A D | cros_ec_lpc_mec.c | 79 enum cros_ec_lpc_mec_emi_access_mode access, new_access; in cros_ec_lpc_io_bytes_mec() local 91 access = ACCESS_TYPE_BYTE; in cros_ec_lpc_io_bytes_mec() 93 access = ACCESS_TYPE_LONG_AUTO_INCREMENT; in cros_ec_lpc_io_bytes_mec() 98 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec() 126 if (new_access != access || in cros_ec_lpc_io_bytes_mec() 127 access != ACCESS_TYPE_LONG_AUTO_INCREMENT) { in cros_ec_lpc_io_bytes_mec() 128 access = new_access; in cros_ec_lpc_io_bytes_mec() 129 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
|
/openbmc/linux/sound/core/ |
H A D | control_led.c | 49 unsigned int access; member 165 lctl->access = access; in snd_ctl_led_set_state() 206 if (lctl && (access == 0 || access != lctl->access)) { in snd_ctl_led_remove() 207 ret = lctl->access; in snd_ctl_led_remove() 223 if (access) in snd_ctl_led_notify() 227 access = vd->access & SNDRV_CTL_ELEM_ACCESS_LED_MASK; in snd_ctl_led_notify() 231 if (access) in snd_ctl_led_notify() 236 access = vd->access & SNDRV_CTL_ELEM_ACCESS_LED_MASK; in snd_ctl_led_notify() 237 if (access) in snd_ctl_led_notify() 258 access = vd->access & SNDRV_CTL_ELEM_ACCESS_LED_MASK; in snd_ctl_led_set_id() [all …]
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | Smack.rst | 131 access 161 access to deny. The access strings may contain only the characters 224 object label, and the third the requested access. The access 239 object label, and the third the requested access. The access 306 Writing a Smack label here sets the access to '-' for all access 351 access to pieces of data. These schemes are called discretionary access 387 Enforcement and avoided by defining access controls in terms of the access 514 of access allowed. The access specification is searched for letters that 515 describe access modes: 710 write access on LABEL1, and access to the subnet @IP2/MASK if it has write [all …]
|
/openbmc/linux/kernel/kcsan/ |
H A D | kcsan_test.c | 152 } access[2]; member 191 cmp < 0 ? r->access[0].fn : r->access[1].fn, in __report_matches() 192 cmp < 0 ? r->access[1].fn : r->access[0].fn); in __report_matches() 244 r->access[i].addr, r->access[i].size); in __report_matches() 716 .access = { in test_basic() 722 .access = { in test_basic() 747 .access = { in test_concurrent_races() 754 .access = { in test_concurrent_races() 776 .access = { in test_novalue_change() 782 .access = { in test_novalue_change() [all …]
|
/openbmc/linux/drivers/gpu/drm/nouveau/nvkm/engine/dma/ |
H A D | user.c | 87 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor() 90 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor() 120 switch (dmaobj->access) { in nvkm_dmaobj_ctor() 122 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor() 125 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor() 128 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor() 131 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
|
/openbmc/qemu/docs/specs/ |
H A D | acpi_pci_hotplug.rst | 7 ACPI GPE block (IO ports 0xafe0-0xafe3, byte access) 13 PCI slot injection notification pending (IO port 0xae00-0xae03, 4-byte access) 21 PCI slot removal notification (IO port 0xae04-0xae07, 4-byte access) 29 PCI device eject (IO port 0xae08-0xae0b, 4-byte access) 38 - Read-only "up" register @0xae00, 4-byte access, bit per slot 39 - Read-only "down" register @0xae04, 4-byte access, bit per slot 40 - Read/write "eject" register @0xae08, 4-byte access, 42 - Read-only hotplug capable register @0xae0c, 4-byte access, bit per slot 44 PCI removability status (IO port 0xae0c-0xae0f, 4-byte access)
|
/openbmc/linux/tools/testing/selftests/landlock/ |
H A D | fs_test.c | 552 __u64 access; in TEST_F_FORK() local 573 for (access = 1; access <= ACCESS_LAST; access <<= 1) { in TEST_F_FORK() 635 __u64 access; member 746 .access = ACCESS_RO, in TEST_F_FORK() 769 .access = ACCESS_RO, in TEST_F_FORK() 827 .access = ACCESS_RO, in TEST_F_FORK() 1353 .access = ACCESS_RO, in TEST_F_FORK() 1391 .access = ACCESS_RO, in TEST_F_FORK() 1448 .access = ACCESS_RO, in TEST_F_FORK() 1453 .access = ACCESS_RO, in TEST_F_FORK() [all …]
|
/openbmc/qemu/pc-bios/optionrom/ |
H A D | optrom_fw_cfg.h | 54 struct fw_cfg_dma_access access; in bios_cfg_read_entry_dma() local 58 access.address = cpu_to_be64((uint64_t)(uint32_t)buf); in bios_cfg_read_entry_dma() 59 access.length = cpu_to_be32(len); in bios_cfg_read_entry_dma() 60 access.control = cpu_to_be32(control); in bios_cfg_read_entry_dma() 64 outl(cpu_to_be32((uint32_t)&access), BIOS_CFG_DMA_ADDR_LOW); in bios_cfg_read_entry_dma() 66 while (be32_to_cpu(access.control) & ~FW_CFG_DMA_CTL_ERROR) { in bios_cfg_read_entry_dma()
|
/openbmc/linux/arch/arm/include/asm/ |
H A D | arch_timer.h | 28 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u64 val) in arch_timer_reg_write_cp15() argument 30 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 42 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 60 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 64 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 72 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
/openbmc/qemu/target/xtensa/ |
H A D | mmu_helper.c | 319 unsigned access; in xtensa_cpu_get_phys_page_debug() local 573 unsigned access = 0; in mmu_attr_to_access() local 576 access |= PAGE_READ; in mmu_attr_to_access() 578 access |= PAGE_EXEC; in mmu_attr_to_access() 581 access |= PAGE_WRITE; in mmu_attr_to_access() 600 return access; in mmu_attr_to_access() 619 return access[attr & 0xf]; in region_attr_to_access() 637 return access[attr & 0xf]; in cacheattr_attr_to_access() 787 return access & PAGE_READ; in is_access_granted() 793 return access & PAGE_EXEC; in is_access_granted() [all …]
|
/openbmc/u-boot/doc/ |
H A D | README.unaligned-memory-access.txt | 8 when it comes to memory access. This document presents some details about 13 The definition of an unaligned access 20 access. 41 of memory access. However, we must consider ALL supported architectures; 46 Why unaligned access is bad 60 unaligned access to be corrected. 70 Code that does not cause unaligned access 133 the memory access in a way that does not cause unaligned access. Of course, 139 Code that causes unaligned access 167 (Hint: it'd be an unaligned access.) [all …]
|
/openbmc/phosphor-mboxd/vpnor/ |
H A D | README.md | 8 Enabling the feature virtualises both the host's access to the flash (the mbox 9 protocol), and the BMC's access to the flash (via some filesystem on top of the 32 1. The FFS ToC defines the set of valid access ranges in terms of partitions 35 4. Read access to valid ranges must be granted 36 5. Write access to valid ranges may be granted 39 7. A read of a valid access range that maps into the backing file will render 41 8. A read of a valid access range that does not map into the backing file will 43 9. A read of an invalid access range will appear erased 46 11. A write to a valid access range that does not map into the backing file 48 12. A write to a valid access range may fail if the range is not marked as [all …]
|
/openbmc/hiomapd/vpnor/ |
H A D | README.md | 7 Enabling the feature virtualises both the host's access to the flash (the mbox 8 protocol), and the BMC's access to the flash (via some filesystem on top of the 28 1. The FFS ToC defines the set of valid access ranges in terms of partitions 31 4. Read access to valid ranges must be granted 32 5. Write access to valid ranges may be granted 35 7. A read of a valid access range that maps into the backing file will render 37 8. A read of a valid access range that does not map into the backing file will 39 9. A read of an invalid access range will appear erased 40 10. A write to a valid access range that maps into the backing file will update 42 11. A write to a valid access range that does not map into the backing file will [all …]
|
/openbmc/linux/fs/afs/ |
H A D | security.c | 131 h += permits->permits[i].access; in afs_hash_permits() 233 new->permits[j].access = caller_access; in afs_cache_permit() 237 new->permits[j].access = permits->permits[i].access; in afs_cache_permit() 244 new->permits[j].access = caller_access; in afs_cache_permit() 327 *_access = permits->permits[i].access; in afs_check_permit_rcu() 367 *_access = permits->permits[i].access; in afs_check_permit() 402 afs_access_t access; in afs_permission() local 442 if (!(access & AFS_ACE_LOOKUP)) in afs_permission() 451 if (!(access & AFS_ACE_LOOKUP)) in afs_permission() 456 if (!(access & AFS_ACE_READ)) in afs_permission() [all …]
|
/openbmc/linux/Documentation/security/ |
H A D | landlock.rst | 12 Landlock's goal is to create scoped access-control (i.e. sandboxing). To 20 system security policy enforced by other access control mechanisms (e.g. DAC, 21 LSM). Indeed, a Landlock rule shall not interfere with other access-controls 31 Guiding principles for safe access controls 40 * Kernel access check shall not slow down access request from unsandboxed 47 Cf. `File descriptor access rights`_. 52 Inode access rights 64 File descriptor access rights 74 hierarchy doesn't grant such access right. The following sequences of 80 Similarly to file access modes (e.g. ``O_RDWR``), Landlock access rights [all …]
|
/openbmc/qemu/target/arm/tcg/ |
H A D | cpu64.c | 488 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 505 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 509 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 513 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 540 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 544 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 548 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 552 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 564 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 752 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, [all …]
|