/openbmc/qemu/tests/qtest/ |
H A D | tpm-tis-util.c | 37 __func__, __LINE__, locty, l, access, pending_request_flag) 48 uint8_t access; in tpm_tis_test_check_localities() local 55 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_localities() 56 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_localities() 78 uint8_t access; in tpm_tis_test_check_access_reg() local 82 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg() 83 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_access_reg() 89 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg() 90 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_test_check_access_reg() 97 access = readb(TIS_REG(locty, TPM_TIS_REG_ACCESS)); in tpm_tis_test_check_access_reg() [all …]
|
H A D | tpm-tis-i2c-test.c | 34 __func__, __LINE__, locty, l, access, pending_request_flag) 94 uint8_t access; in tpm_tis_i2c_test_basic() local 103 access = tpm_tis_i2c_readb(0, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_basic() 104 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_basic() 163 uint8_t access; in tpm_tis_i2c_test_check_localities() local 169 access = tpm_tis_i2c_readb(locty, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_localities() 170 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_check_localities() 198 uint8_t access; in tpm_tis_i2c_test_check_access_reg() local 202 access = tpm_tis_i2c_readb(locty, TPM_I2C_REG_ACCESS); in tpm_tis_i2c_test_check_access_reg() 203 g_assert_cmpint(access, ==, TPM_TIS_ACCESS_TPM_REG_VALID_STS | in tpm_tis_i2c_test_check_access_reg() [all …]
|
/openbmc/linux/drivers/iommu/iommufd/ |
H A D | device.c | 690 static int iommufd_access_change_ioas(struct iommufd_access *access, in iommufd_access_change_ioas() argument 693 u32 iopt_access_list_id = access->iopt_access_list_id; in iommufd_access_change_ioas() 694 struct iommufd_ioas *cur_ioas = access->ioas; in iommufd_access_change_ioas() 697 lockdep_assert_held(&access->ioas_lock); in iommufd_access_change_ioas() 700 if (cur_ioas != access->ioas_unpin) in iommufd_access_change_ioas() 710 access->ioas = NULL; in iommufd_access_change_ioas() 713 rc = iopt_add_access(&new_ioas->iopt, access); in iommufd_access_change_ioas() 715 access->ioas = cur_ioas; in iommufd_access_change_ioas() 722 if (access->ops->unmap) { in iommufd_access_change_ioas() 723 mutex_unlock(&access->ioas_lock); in iommufd_access_change_ioas() [all …]
|
/openbmc/qemu/target/arm/ |
H A D | cortex-regs.c | 32 .access = PL1_RW, .readfn = l2ctlr_read, 36 .access = PL1_RW, .readfn = l2ctlr_read, 40 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 43 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 46 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 49 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 52 .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 }, 55 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 58 .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 }, 61 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, [all …]
|
H A D | helper.c | 635 .access = PL1_RW, .secure = ARM_CP_SECSTATE_NS, 640 .access = PL1_RW, .secure = ARM_CP_SECSTATE_S, 652 .access = PL1_RW, .accessfn = access_tvm_trvm, 660 .access = PL1_RW, .accessfn = access_tvm_trvm, 674 .access = PL1_RW, .accessfn = access_tvm_trvm, .resetvalue = 0, 683 .opc1 = CP_ANY, .opc2 = CP_ANY, .access = PL1_RW, .type = ARM_CP_NOP }, 685 .opc1 = CP_ANY, .opc2 = CP_ANY, .access = PL1_RW, .type = ARM_CP_NOP }, 687 .opc1 = CP_ANY, .opc2 = CP_ANY, .access = PL1_RW, .type = ARM_CP_NOP }, 689 .opc1 = CP_ANY, .opc2 = CP_ANY, .access = PL1_RW, .type = ARM_CP_NOP }, 692 .opc1 = 0, .opc2 = CP_ANY, .access = PL1_W, [all …]
|
/openbmc/linux/drivers/infiniband/sw/rxe/ |
H A D | rxe_mw.c | 51 struct rxe_mw *mw, struct rxe_mr *mr, int access) in rxe_check_bind_mw() argument 61 if (unlikely((access & IB_ZERO_BASED))) { in rxe_check_bind_mw() 94 if (unlikely(mr->access & IB_ZERO_BASED)) { in rxe_check_bind_mw() 100 if (unlikely(!(mr->access & IB_ACCESS_MW_BIND))) { in rxe_check_bind_mw() 107 if (unlikely((access & in rxe_check_bind_mw() 109 !(mr->access & IB_ACCESS_LOCAL_WRITE))) { in rxe_check_bind_mw() 116 if (access & IB_ZERO_BASED) { in rxe_check_bind_mw() 136 struct rxe_mw *mw, struct rxe_mr *mr, int access) in rxe_do_bind_mw() argument 141 mw->access = access; in rxe_do_bind_mw() 172 int access = wqe->wr.wr.mw.access; in rxe_bind_mw() local [all …]
|
/openbmc/linux/security/ |
H A D | device_cgroup.c | 38 short access; member 118 walk->access |= ex->access; in dev_exception_add() 146 walk->access &= ~ex->access; in dev_exception_rm() 147 if (!walk->access) { in dev_exception_rm() 250 static void set_access(char *acc, short access) in set_access() argument 254 if (access & DEVCG_ACC_READ) in set_access() 256 if (access & DEVCG_ACC_WRITE) in set_access() 258 if (access & DEVCG_ACC_MKNOD) in set_access() 302 set_access(acc, ex->access); in devcgroup_seq_show() 328 u32 major, u32 minor, short access) in match_exception() argument [all …]
|
/openbmc/linux/include/linux/ |
H A D | iommufd.h | 50 void iommufd_access_destroy(struct iommufd_access *access); 51 int iommufd_access_attach(struct iommufd_access *access, u32 ioas_id); 52 int iommufd_access_replace(struct iommufd_access *access, u32 ioas_id); 53 void iommufd_access_detach(struct iommufd_access *access); 63 int iommufd_access_pin_pages(struct iommufd_access *access, unsigned long iova, 66 void iommufd_access_unpin_pages(struct iommufd_access *access, 68 int iommufd_access_rw(struct iommufd_access *access, unsigned long iova, 83 static inline int iommufd_access_pin_pages(struct iommufd_access *access, in iommufd_access_pin_pages() argument 92 static inline void iommufd_access_unpin_pages(struct iommufd_access *access, in iommufd_access_unpin_pages() argument 98 static inline int iommufd_access_rw(struct iommufd_access *access, unsigned long iova, in iommufd_access_rw() argument
|
H A D | device_cgroup.h | 16 short access); 19 short type, access = 0; in devcgroup_inode_permission() local 32 access |= DEVCG_ACC_WRITE; in devcgroup_inode_permission() 34 access |= DEVCG_ACC_READ; in devcgroup_inode_permission() 37 access); in devcgroup_inode_permission() 61 short access) in devcgroup_check_permission() argument
|
/openbmc/linux/sound/core/ |
H A D | control_led.c | 49 unsigned int access; member 81 static inline unsigned int access_to_group(unsigned int access) in access_to_group() argument 83 return ((access & SNDRV_CTL_ELEM_ACCESS_LED_MASK) >> in access_to_group() 92 static struct snd_ctl_led *snd_ctl_led_get_by_access(unsigned int access) in snd_ctl_led_get_by_access() argument 94 unsigned int group = access_to_group(access); in snd_ctl_led_get_by_access() 137 static void snd_ctl_led_set_state(struct snd_card *card, unsigned int access, in snd_ctl_led_set_state() argument 145 led = snd_ctl_led_get_by_access(access); in snd_ctl_led_set_state() 165 lctl->access = access; in snd_ctl_led_set_state() 199 unsigned int access) in snd_ctl_led_remove() argument 206 if (lctl && (access == 0 || access != lctl->access)) { in snd_ctl_led_remove() [all …]
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | Smack.rst | 10 Smack is a kernel based implementation of mandatory access 33 access to systems that use them as Smack does. 50 load the Smack access rules 53 report if a process with one label has access 85 Used to make access control decisions. In almost all cases 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 110 Use the Smack label in this attribute for access control 115 Use the Smack label in this attribute for access control 131 access [all …]
|
/openbmc/linux/kernel/kcsan/ |
H A D | kcsan_test.c | 152 } access[2]; member 159 const bool is_assert = (r->access[0].type | r->access[1].type) & KCSAN_ACCESS_ASSERT; in __report_matches() 182 if (r->access[1].fn) { in __report_matches() 187 scnprintf(tmp[0], sizeof(tmp[0]), "%pS", r->access[0].fn); in __report_matches() 188 scnprintf(tmp[1], sizeof(tmp[1]), "%pS", r->access[1].fn); in __report_matches() 191 cmp < 0 ? r->access[0].fn : r->access[1].fn, in __report_matches() 192 cmp < 0 ? r->access[1].fn : r->access[0].fn); in __report_matches() 194 scnprintf(cur, end - cur, "%pS", r->access[0].fn); in __report_matches() 204 if (!r->access[1].fn) in __report_matches() 209 const int ty = r->access[i].type; in __report_matches() [all …]
|
/openbmc/linux/tools/testing/selftests/landlock/ |
H A D | fs_test.c | 552 __u64 access; in TEST_F_FORK() local 573 for (access = 1; access <= ACCESS_LAST; access <<= 1) { in TEST_F_FORK() 574 path_beneath_dir.allowed_access = access; in TEST_F_FORK() 579 path_beneath_file.allowed_access = access; in TEST_F_FORK() 582 if (access & ACCESS_FILE) { in TEST_F_FORK() 635 __u64 access; member 676 add_path_beneath(_metadata, ruleset_fd, rules[i].access, in create_ruleset() 697 .access = LANDLOCK_ACCESS_FS_READ_FILE | in TEST_F_FORK() 704 _metadata, rules[0].access | LANDLOCK_ACCESS_FS_READ_DIR, in TEST_F_FORK() 746 .access = ACCESS_RO, in TEST_F_FORK() [all …]
|
/openbmc/qemu/target/xtensa/ |
H A D | mmu_helper.c | 320 unsigned access; in xtensa_cpu_get_phys_page_debug() local 323 &paddr, &page_size, &access) == 0) { in xtensa_cpu_get_phys_page_debug() 327 &paddr, &page_size, &access) == 0) { in xtensa_cpu_get_phys_page_debug() 574 unsigned access = 0; in mmu_attr_to_access() local 577 access |= PAGE_READ; in mmu_attr_to_access() 579 access |= PAGE_EXEC; in mmu_attr_to_access() 582 access |= PAGE_WRITE; in mmu_attr_to_access() 587 access |= PAGE_CACHE_BYPASS; in mmu_attr_to_access() 591 access |= PAGE_CACHE_WB; in mmu_attr_to_access() 595 access |= PAGE_CACHE_WT; in mmu_attr_to_access() [all …]
|
/openbmc/qemu/docs/specs/ |
H A D | acpi_pci_hotplug.rst | 7 ACPI GPE block (IO ports 0xafe0-0xafe3, byte access) 13 PCI slot injection notification pending (IO port 0xae00-0xae03, 4-byte access) 21 PCI slot removal notification (IO port 0xae04-0xae07, 4-byte access) 29 PCI device eject (IO port 0xae08-0xae0b, 4-byte access) 38 - Read-only "up" register @0xae00, 4-byte access, bit per slot 39 - Read-only "down" register @0xae04, 4-byte access, bit per slot 40 - Read/write "eject" register @0xae08, 4-byte access, 42 - Read-only hotplug capable register @0xae0c, 4-byte access, bit per slot 44 PCI removability status (IO port 0xae0c-0xae0f, 4-byte access)
|
/openbmc/linux/drivers/gpu/drm/nouveau/nvkm/engine/dma/ |
H A D | user.c | 87 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor() 90 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor() 120 switch (dmaobj->access) { in nvkm_dmaobj_ctor() 122 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor() 125 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor() 128 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor() 131 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
|
/openbmc/linux/drivers/platform/chrome/ |
H A D | cros_ec_lpc_mec.c | 131 enum cros_ec_lpc_mec_emi_access_mode access, new_access; in cros_ec_lpc_io_bytes_mec() local 144 access = ACCESS_TYPE_BYTE; in cros_ec_lpc_io_bytes_mec() 146 access = ACCESS_TYPE_LONG_AUTO_INCREMENT; in cros_ec_lpc_io_bytes_mec() 153 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec() 181 if (new_access != access || in cros_ec_lpc_io_bytes_mec() 182 access != ACCESS_TYPE_LONG_AUTO_INCREMENT) { in cros_ec_lpc_io_bytes_mec() 183 access = new_access; in cros_ec_lpc_io_bytes_mec() 184 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
|
/openbmc/u-boot/doc/ |
H A D | README.unaligned-memory-access.txt | 8 when it comes to memory access. This document presents some details about 13 The definition of an unaligned access 20 access. 22 The above may seem a little vague, as memory access can happen in different 26 which will compile to multiple-byte memory access instructions, namely when 41 of memory access. However, we must consider ALL supported architectures; 46 Why unaligned access is bad 49 The effects of performing an unaligned memory access vary from architecture 56 happen. The exception handler is able to correct the unaligned access, 60 unaligned access to be corrected. [all …]
|
/openbmc/qemu/target/arm/tcg/ |
H A D | cpu32.c | 198 .access = PL1_RW, in arm1026_initfn() 338 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 340 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 389 .access = PL1_RW, .resetvalue = 0, 392 .access = PL1_RW, .resetvalue = 0, 395 .access = PL1_RW, .resetvalue = 0, 398 .access = PL1_RW, .resetvalue = 0, .type = ARM_CP_CONST }, 401 .access = PL1_W, .resetvalue = 0, .type = ARM_CP_NOP }, 403 .access = PL1_W, .resetvalue = 0, .type = ARM_CP_NOP }, 405 .access = PL1_RW, .resetvalue = 0, .type = ARM_CP_CONST }, [all …]
|
H A D | cpu64.c | 482 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 487 .access = PL2_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 490 .access = PL3_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 493 .access = PL2_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 496 .access = PL2_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, 499 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 503 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 507 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0, 515 .access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 4 }, 518 .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0x961563010, [all …]
|
/openbmc/qemu/pc-bios/optionrom/ |
H A D | optrom_fw_cfg.h | 54 struct fw_cfg_dma_access access; in bios_cfg_read_entry_dma() local 58 access.address = cpu_to_be64((uint64_t)(uint32_t)buf); in bios_cfg_read_entry_dma() 59 access.length = cpu_to_be32(len); in bios_cfg_read_entry_dma() 60 access.control = cpu_to_be32(control); in bios_cfg_read_entry_dma() 64 outl(cpu_to_be32((uint32_t)&access), BIOS_CFG_DMA_ADDR_LOW); in bios_cfg_read_entry_dma() 66 while (be32_to_cpu(access.control) & ~FW_CFG_DMA_CTL_ERROR) { in bios_cfg_read_entry_dma()
|
/openbmc/linux/arch/arm/include/asm/ |
H A D | arch_timer.h | 28 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u64 val) in arch_timer_reg_write_cp15() argument 30 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 42 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 60 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 64 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 72 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
/openbmc/phosphor-mboxd/vpnor/ |
H A D | README.md | 8 Enabling the feature virtualises both the host's access to the flash (the mbox 9 protocol), and the BMC's access to the flash (via some filesystem on top of the 32 1. The FFS ToC defines the set of valid access ranges in terms of partitions 35 4. Read access to valid ranges must be granted 36 5. Write access to valid ranges may be granted 39 7. A read of a valid access range that maps into the backing file will render 41 8. A read of a valid access range that does not map into the backing file will 43 9. A read of an invalid access range will appear erased 44 10. A write to a valid access range that maps into the backing file will update 46 11. A write to a valid access range that does not map into the backing file [all …]
|
/openbmc/hiomapd/vpnor/ |
H A D | README.md | 7 Enabling the feature virtualises both the host's access to the flash (the mbox 8 protocol), and the BMC's access to the flash (via some filesystem on top of the 28 1. The FFS ToC defines the set of valid access ranges in terms of partitions 31 4. Read access to valid ranges must be granted 32 5. Write access to valid ranges may be granted 35 7. A read of a valid access range that maps into the backing file will render 37 8. A read of a valid access range that does not map into the backing file will 39 9. A read of an invalid access range will appear erased 40 10. A write to a valid access range that maps into the backing file will update 42 11. A write to a valid access range that does not map into the backing file will [all …]
|
/openbmc/linux/fs/afs/ |
H A D | security.c | 131 h += permits->permits[i].access; in afs_hash_permits() 168 if (permits->permits[i].access != caller_access) { in afs_cache_permit() 233 new->permits[j].access = caller_access; in afs_cache_permit() 237 new->permits[j].access = permits->permits[i].access; in afs_cache_permit() 244 new->permits[j].access = caller_access; in afs_cache_permit() 327 *_access = permits->permits[i].access; in afs_check_permit_rcu() 367 *_access = permits->permits[i].access; in afs_check_permit() 402 afs_access_t access; in afs_permission() local 416 !afs_check_permit_rcu(vnode, key, &access)) in afs_permission() 430 ret = afs_check_permit(vnode, key, &access); in afs_permission() [all …]
|