| /OK3568_Linux_fs/kernel/security/ |
| H A D | device_cgroup.c | 37 short access; member 106 walk->access |= ex->access; in dev_exception_add() 134 walk->access &= ~ex->access; in dev_exception_rm() 135 if (!walk->access) { in dev_exception_rm() 238 static void set_access(char *acc, short access) in set_access() argument 242 if (access & DEVCG_ACC_READ) in set_access() 244 if (access & DEVCG_ACC_WRITE) in set_access() 246 if (access & DEVCG_ACC_MKNOD) in set_access() 290 set_access(acc, ex->access); in devcgroup_seq_show() 316 u32 major, u32 minor, short access) in match_exception() argument [all …]
|
| /OK3568_Linux_fs/kernel/kernel/kcsan/ |
| H A D | kcsan-test.c | 142 } access[2]; member 149 const bool is_assert = (r->access[0].type | r->access[1].type) & KCSAN_ACCESS_ASSERT; in report_matches() 168 if (r->access[1].fn) { in report_matches() 173 scnprintf(tmp[0], sizeof(tmp[0]), "%pS", r->access[0].fn); in report_matches() 174 scnprintf(tmp[1], sizeof(tmp[1]), "%pS", r->access[1].fn); in report_matches() 177 cmp < 0 ? r->access[0].fn : r->access[1].fn, in report_matches() 178 cmp < 0 ? r->access[1].fn : r->access[0].fn); in report_matches() 180 scnprintf(cur, end - cur, "%pS", r->access[0].fn); in report_matches() 190 if (!r->access[1].fn) in report_matches() 195 const int ty = r->access[i].type; in report_matches() [all …]
|
| /OK3568_Linux_fs/buildroot/docs/website/ |
| H A D | .htaccess | 12 ExpiresDefault "access plus 1 seconds" 13 ExpiresByType image/x-icon "access plus 2592000 seconds" 14 ExpiresByType image/jpeg "access plus 2592000 seconds" 15 ExpiresByType image/png "access plus 2592000 seconds" 16 ExpiresByType image/gif "access plus 2592000 seconds" 17 ExpiresByType application/x-shockwave-flash "access plus 2592000 seconds" 18 ExpiresByType text/css "access plus 604800 seconds" 19 ExpiresByType text/javascript "access plus 216000 seconds" 20 ExpiresByType application/javascript "access plus 216000 seconds" 21 ExpiresByType application/x-javascript "access plus 216000 seconds" [all …]
|
| /OK3568_Linux_fs/buildroot/dl/unixbench/git/UnixBench/testdir/ |
| H A D | large.txt | 4 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) 689 access("/usr/share/X11/locale/en_US.UTF-8/XLC_LOCALE", R_OK) = 0 702 access("/user/folk/clint/.Xauthority", R_OK) = 0 944 access("/etc/gtk-2.0/gtkrc.en_US", F_OK) = -1 ENOENT (No such file or directory) 945 access("/etc/gtk-2.0/gtkrc.en", F_OK) = -1 ENOENT (No such file or directory) 962 access("/usr/local/lib/gtk-2.0/2.10.0/i686-suse-linux-gnu/engines/libqtcurve.so", F_OK) = -1 ENOENT… 963 access("/usr/local/lib/gtk-2.0/2.10.0/i686-suse-linux-gnu/engines/libqtcurve.la", F_OK) = -1 ENOENT… 964 access("/usr/local/lib/gtk-2.0/2.10.0/engines/libqtcurve.so", F_OK) = -1 ENOENT (No such file or di… 965 access("/usr/local/lib/gtk-2.0/2.10.0/engines/libqtcurve.la", F_OK) = -1 ENOENT (No such file or di… 966 access("/usr/local/lib/gtk-2.0/i686-suse-linux-gnu/engines/libqtcurve.so", F_OK) = -1 ENOENT (No su… [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 10 Smack is a kernel based implementation of mandatory access 33 access to systems that use them as Smack does. 50 load the Smack access rules 53 report if a process with one label has access 85 Used to make access control decisions. In almost all cases 95 label does not allow all of the access permitted to a process 102 the Smack rule (more below) that permitted the write access 110 Use the Smack label in this attribute for access control 115 Use the Smack label in this attribute for access control 131 access [all …]
|
| /OK3568_Linux_fs/kernel/drivers/gpu/arm/bifrost/ |
| H A D | mali_kbase_ccswe.c | 34 lockdep_assert_held(&self->access); in kbasep_ccswe_cycle_at_no_lock() 50 spin_lock_init(&self->access); in kbase_ccswe_init() 58 spin_lock_irqsave(&self->access, flags); in kbase_ccswe_cycle_at() 60 spin_unlock_irqrestore(&self->access, flags); in kbase_ccswe_cycle_at() 70 spin_lock_irqsave(&self->access, flags); in kbase_ccswe_freq_change() 85 spin_unlock_irqrestore(&self->access, flags); in kbase_ccswe_freq_change() 92 spin_lock_irqsave(&self->access, flags); in kbase_ccswe_reset() 99 spin_unlock_irqrestore(&self->access, flags); in kbase_ccswe_reset()
|
| /OK3568_Linux_fs/kernel/drivers/platform/chrome/ |
| H A D | cros_ec_lpc_mec.c | 79 enum cros_ec_lpc_mec_emi_access_mode access, new_access; in cros_ec_lpc_io_bytes_mec() local 91 access = ACCESS_TYPE_BYTE; in cros_ec_lpc_io_bytes_mec() 93 access = ACCESS_TYPE_LONG_AUTO_INCREMENT; in cros_ec_lpc_io_bytes_mec() 98 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec() 126 if (new_access != access || in cros_ec_lpc_io_bytes_mec() 127 access != ACCESS_TYPE_LONG_AUTO_INCREMENT) { in cros_ec_lpc_io_bytes_mec() 128 access = new_access; in cros_ec_lpc_io_bytes_mec() 129 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
|
| /OK3568_Linux_fs/u-boot/doc/ |
| H A D | README.unaligned-memory-access.txt | 8 when it comes to memory access. This document presents some details about 13 The definition of an unaligned access 20 access. 22 The above may seem a little vague, as memory access can happen in different 26 which will compile to multiple-byte memory access instructions, namely when 41 of memory access. However, we must consider ALL supported architectures; 46 Why unaligned access is bad 49 The effects of performing an unaligned memory access vary from architecture 56 happen. The exception handler is able to correct the unaligned access, 60 unaligned access to be corrected. [all …]
|
| /OK3568_Linux_fs/external/xserver/glamor/ |
| H A D | glamor_prepare.c | 34 glamor_prep_pixmap_box(PixmapPtr pixmap, glamor_access_t access, BoxPtr box) in glamor_prep_pixmap_box() argument 74 if (access == GLAMOR_ACCESS_RW) in glamor_prep_pixmap_box() 96 (access == GLAMOR_ACCESS_RW) ? in glamor_prep_pixmap_box() 103 priv->map_access = access; in glamor_prep_pixmap_box() 143 priv->map_access = access; in glamor_prep_pixmap_box() 236 glamor_prepare_access(DrawablePtr drawable, glamor_access_t access) in glamor_prepare_access() argument 248 return glamor_prep_pixmap_box(pixmap, access, &box); in glamor_prepare_access() 252 glamor_prepare_access_box(DrawablePtr drawable, glamor_access_t access, in glamor_prepare_access_box() argument 264 return glamor_prep_pixmap_box(pixmap, access, &box); in glamor_prepare_access_box() 278 glamor_prepare_access_picture(PicturePtr picture, glamor_access_t access) in glamor_prepare_access_picture() argument [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/core-api/ |
| H A D | unaligned-memory-access.rst | 14 when it comes to memory access. This document presents some details about 19 The definition of an unaligned access 26 access. 28 The above may seem a little vague, as memory access can happen in different 32 which will compile to multiple-byte memory access instructions, namely when 47 of memory access. However, we must consider ALL supported architectures; 52 Why unaligned access is bad 55 The effects of performing an unaligned memory access vary from architecture 62 happen. The exception handler is able to correct the unaligned access, 66 unaligned access to be corrected. [all …]
|
| /OK3568_Linux_fs/kernel/fs/afs/ |
| H A D | security.c | 131 h += permits->permits[i].access; in afs_hash_permits() 168 if (permits->permits[i].access != caller_access) { in afs_cache_permit() 234 new->permits[j].access = caller_access; in afs_cache_permit() 238 new->permits[j].access = permits->permits[i].access; in afs_cache_permit() 245 new->permits[j].access = caller_access; in afs_cache_permit() 328 *_access = permits->permits[i].access; in afs_check_permit_rcu() 368 *_access = permits->permits[i].access; in afs_check_permit() 402 afs_access_t access; in afs_permission() local 416 !afs_check_permit_rcu(vnode, key, &access)) in afs_permission() 430 ret = afs_check_permit(vnode, key, &access); in afs_permission() [all …]
|
| /OK3568_Linux_fs/u-boot/drivers/spi/ |
| H A D | Kconfig | 12 the SPI uclass. Drivers provide methods to access the SPI 32 access the SPI NOR flash on platforms embedding this Altera 40 used to access the SPI flash on AE3XX and AE250 platforms embedding 48 to access SPI NOR flash and other SPI peripherals. This driver 57 many AT91 (ARM) chips. This driver can be used to access 65 access the SPI NOR flash on platforms embedding this Broadcom 73 access the SPI NOR flash on platforms embedding these Broadcom 80 be used to access the SPI flash on platforms embedding this 87 used to access the SPI NOR flash on platforms embedding this 94 access the SPI NOR flash on platforms embedding this Designware [all …]
|
| /OK3568_Linux_fs/kernel/drivers/infiniband/sw/rxe/ |
| H A D | rxe_mr.c | 50 static void rxe_mem_init(int access, struct rxe_mem *mem) in rxe_mem_init() argument 53 u32 rkey = (access & IB_ACCESS_REMOTE) ? lkey : 0; in rxe_mem_init() 116 int access, struct rxe_mem *mem) in rxe_mem_init_dma() argument 118 rxe_mem_init(access, mem); in rxe_mem_init_dma() 121 mem->access = access; in rxe_mem_init_dma() 127 u64 length, u64 iova, int access, struct ib_udata *udata, in rxe_mem_init_user() argument 138 umem = ib_umem_get(pd->ibpd.device, start, length, access); in rxe_mem_init_user() 149 rxe_mem_init(access, mem); in rxe_mem_init_user() 191 mem->access = access; in rxe_mem_init_user() 404 int access, in copy_data() argument [all …]
|
| /OK3568_Linux_fs/kernel/drivers/gpu/drm/nouveau/nvkm/engine/dma/ |
| H A D | user.c | 92 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor() 95 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor() 135 switch (dmaobj->access) { in nvkm_dmaobj_ctor() 137 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor() 140 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor() 143 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor() 146 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | device_cgroup.h | 16 short access); 19 short type, access = 0; in devcgroup_inode_permission() local 32 access |= DEVCG_ACC_WRITE; in devcgroup_inode_permission() 34 access |= DEVCG_ACC_READ; in devcgroup_inode_permission() 37 access); in devcgroup_inode_permission() 61 short access) in devcgroup_check_permission() argument
|
| /OK3568_Linux_fs/kernel/arch/arm/include/asm/ |
| H A D | arch_timer.h | 27 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument 29 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 38 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 53 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 57 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 66 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
| /OK3568_Linux_fs/kernel/Documentation/arm/ |
| H A D | mem_alignment.rst | 5 Too many problems popped up because of unnoticed misaligned memory access in 14 unaligned memory access in general. If those access are predictable, you 16 alignment trap can fixup misaligned access for the exception cases, but at 20 trap to SIGBUS any code performing unaligned access (good for debugging bad 21 code), or even fixup the access by software like for kernel code. The later 36 0 A user process performing an unaligned memory access 42 performing the unaligned access. This is of course 47 performing the unaligned access. 59 information on unaligned access occurrences plus the current mode of
|
| /OK3568_Linux_fs/buildroot/package/vlc/ |
| H A D | 0010-modules-access-live555.cpp-fix-build-with-live555-20.patch | 4 Subject: [PATCH] modules/access/live555.cpp: fix build with live555 >= 16 modules/access/live555.cpp | 4 +++- 19 diff --git a/modules/access/live555.cpp b/modules/access/live555.cpp 21 --- a/modules/access/live555.cpp 22 +++ b/modules/access/live555.cpp
|
| /OK3568_Linux_fs/buildroot/dl/qt5location/git/src/3rdparty/mapbox-gl-native/deps/boost/1.65.1/include/boost/geometry/core/ |
| H A D | access.hpp | 55 struct access struct 144 struct access struct 166 struct access<point_tag, Point, CoordinateType, Dimension, boost::false_type> struct 170 return traits::access<Point, Dimension>::get(point); in get() 174 traits::access<Point, Dimension>::set(p, value); in set() 179 struct access<point_tag, Point, CoordinateType, Dimension, boost::true_type> struct 183 return traits::access<typename boost::remove_pointer<Point>::type, Dimension>::get(*point); in get() 187 traits::access<typename boost::remove_pointer<Point>::type, Dimension>::set(*p, value); in set() 277 typedef core_dispatch::access in get() 312 typedef core_dispatch::access in set()
|
| /OK3568_Linux_fs/kernel/drivers/net/dsa/sja1105/ |
| H A D | sja1105_dynamic_config.c | 660 .access = OP_WRITE, 668 .access = (OP_READ | OP_WRITE | OP_DEL), 676 .access = (OP_READ | OP_WRITE), 684 .access = (OP_WRITE | OP_DEL), 693 .access = OP_WRITE, 701 .access = OP_WRITE, 709 .access = OP_WRITE, 717 .access = OP_WRITE, 725 .access = (OP_WRITE | OP_DEL), 733 .access = OP_WRITE, [all …]
|
| /OK3568_Linux_fs/kernel/tools/perf/Documentation/ |
| H A D | security.txt | 8 Enabling LSM based mandatory access control (MAC) to perf_event_open() syscall 11 LSM hooks for mandatory access control for perf_event_open() syscall can be 13 Targeted policy with perf_event_open() access control capabilities: 127 Opening access to perf_event_open() syscall on Fedora with SELinux 133 and prevent unauthorized access to perf_event_open() syscall. In such case 139 Enforced MAC policy settings (SELinux) can limit access to performance 141 more perf_event access control information and adjusting the policy. 143 access to performance monitoring and observability operations for users 148 >= 0: Disallow raw and ftrace function tracepoint access 149 >= 1: Disallow CPU event access [all …]
|
| /OK3568_Linux_fs/kernel/arch/x86/kvm/mmu/ |
| H A D | paging_tmpl.h | 105 static inline void FNAME(protect_clean_gpte)(struct kvm_mmu *mmu, unsigned *access, in FNAME() 120 *access &= mask; in FNAME() 216 unsigned access; in FNAME() local 218 access = ((gpte & VMX_EPT_WRITABLE_MASK) ? ACC_WRITE_MASK : 0) | in FNAME() 224 access = gpte & (PT_WRITABLE_MASK | PT_USER_MASK | PT_PRESENT_MASK); in FNAME() 226 access ^= (gpte >> PT64_NX_SHIFT); in FNAME() 229 return access; in FNAME() 310 gpa_t addr, u32 access) in FNAME() 323 const int write_fault = access & PFERR_WRITE_MASK; in FNAME() 324 const int user_fault = access & PFERR_USER_MASK; in FNAME() [all …]
|
| /OK3568_Linux_fs/external/mpp/osal/ |
| H A D | mpp_runtime.cpp | 87 allocator_valid[MPP_BUFFER_TYPE_ION] = !access("/dev/ion", F_OK | R_OK | W_OK); in MppRuntimeService() 88 allocator_valid[MPP_BUFFER_TYPE_DRM] = !access("/dev/dri/card0", F_OK | R_OK | W_OK); in MppRuntimeService() 89 allocator_valid[MPP_BUFFER_TYPE_DMA_HEAP] = !access("/dev/dma_heap", F_OK | R_OK); in MppRuntimeService() 113 if (!access("/dev/mpp_service", F_OK | R_OK | W_OK)) { in MppRuntimeService() 138 int f_ok = access(path, F_OK); in MppRuntimeService() 141 f_ok = access(path, F_OK); in MppRuntimeService()
|
| /OK3568_Linux_fs/kernel/arch/arm64/include/asm/ |
| H A D | arch_timer.h | 105 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument 107 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 116 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 131 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 133 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 140 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/progs/ |
| H A D | dev_cgroup.c | 17 short access = ctx->access_type >> 16; in bpf_prog1() local 32 if (access & BPF_DEVCG_ACC_READ) in bpf_prog1() 35 if (access & BPF_DEVCG_ACC_WRITE) in bpf_prog1() 38 if (access & BPF_DEVCG_ACC_MKNOD) in bpf_prog1()
|