| /linux-6.15/Documentation/mm/damon/ |
| H A D | monitoring_intervals_tuning_example.rst | 37 access-hotness of a region. It is calculated as a weighted sum of the access 44 # damo report access --sort_regions_by temperature 71 # damo report access --style temperature-sz-hist 101 # damo report access --sort_regions_by temperature 114 12 addr 56.364 GiB size 4.000 KiB access 95 % age 16 s 117 # damo report access --style temperature-sz-hist 154 # damo report access --sort_regions_by temperature 157 2 addr 27.422 GiB size 5.801 GiB access 0 % age 6 m 175 # damo report access --style temperature-sz-hist 206 # damo report access --sort_regions_by temperature [all …]
|
| /linux-6.15/Documentation/devicetree/bindings/access-controllers/ |
| H A D | access-controllers.yaml | 4 $id: http://devicetree.org/schemas/access-controllers/access-controllers.yaml# 13 Common access controllers properties 29 property in the access controller node. 32 hardware block and grant access to it. Any of which depends on the access 34 binding of the access controller device. 42 "#access-controller-cells": 48 access-controller-names: 53 access-controller-names to match with existing access-controllers entries. 55 access-controllers: 67 #access-controller-cells = <2>; [all …]
|
| /linux-6.15/security/landlock/ |
| H A D | audit.c | 89 const access_mask_t access) in log_blockers() argument 230 access_mask_t access; in test_get_denied_layer() local 232 access = LANDLOCK_ACCESS_FS_EXECUTE; in test_get_denied_layer() 254 KUNIT_EXPECT_EQ(test, access, in test_get_denied_layer() 268 KUNIT_EXPECT_EQ(test, access, 0); in test_get_denied_layer() 314 access_mask_t access; in test_get_layer_from_deny_masks() local 321 get_layer_from_deny_masks(&access, in test_get_layer_from_deny_masks() 328 get_layer_from_deny_masks(&access, in test_get_layer_from_deny_masks() 348 KUNIT_EXPECT_EQ(test, access, in test_get_layer_from_deny_masks() 363 if (request->access) { in is_valid_request() [all …]
|
| /linux-6.15/drivers/iommu/iommufd/ |
| H A D | device.c | 1041 access->ioas = NULL; in iommufd_access_change_ioas() 1055 access->ops->unmap(access->data, 0, ULONG_MAX); in iommufd_access_change_ioas() 1086 if (access->ioas) in iommufd_access_destroy_object() 1115 access = iommufd_object_alloc(ictx, access, IOMMUFD_OBJ_ACCESS); in iommufd_access_create() 1116 if (IS_ERR(access)) in iommufd_access_create() 1117 return access; in iommufd_access_create() 1120 access->ops = ops; in iommufd_access_create() 1134 return access; in iommufd_access_create() 1146 iommufd_object_destroy_user(access->ictx, &access->obj); in iommufd_access_destroy() 1223 access->ops->unmap(access->data, iova, length); in iommufd_access_notify_unmap() [all …]
|
| /linux-6.15/drivers/infiniband/sw/rxe/ |
| H A D | rxe_mw.c | 61 if (unlikely((access & IB_ZERO_BASED))) { in rxe_check_bind_mw() 94 if (unlikely(mr->access & IB_ZERO_BASED)) { in rxe_check_bind_mw() 107 if (unlikely((access & in rxe_check_bind_mw() 116 if (access & IB_ZERO_BASED) { in rxe_check_bind_mw() 141 mw->access = access; in rxe_do_bind_mw() 172 int access = wqe->wr.wr.mw.access; in rxe_bind_mw() local 200 if (access & ~RXE_ACCESS_SUPPORTED_MW) { in rxe_bind_mw() 212 rxe_do_bind_mw(qp, wqe, mw, mr, access); in rxe_bind_mw() 252 mw->access = 0; in rxe_do_invalidate_mw() 303 (mw->length == 0) || ((access & mw->access) != access) || in rxe_lookup_mw() [all …]
|
| H A D | rxe_mr.c | 48 void rxe_mr_init(int access, struct rxe_mr *mr) in rxe_mr_init() argument 60 mr->access = access; in rxe_mr_init() 69 rxe_mr_init(access, mr); in rxe_mr_init_dma() 130 int access, struct rxe_mr *mr) in rxe_mr_init_user() argument 135 rxe_mr_init(access, mr); in rxe_mr_init_user() 337 int access, in copy_data() argument 385 mr = lookup_mr(pd, access, sge->lkey, in copy_data() 636 mr_pd(mr) != pd || ((access & mr->access) != access) || in lookup_mr() 659 remote = mr->access & RXE_ACCESS_REMOTE; in rxe_invalidate_mr() 699 u32 access = wqe->wr.wr.reg.access; in rxe_reg_fast_mr() local [all …]
|
| /linux-6.15/security/ |
| H A D | device_cgroup.c | 38 short access; member 118 walk->access |= ex->access; in dev_exception_add() 146 walk->access &= ~ex->access; in dev_exception_rm() 147 if (!walk->access) { in dev_exception_rm() 254 if (access & DEVCG_ACC_READ) in set_access() 342 if (access & (~ex->access)) in match_exception() 388 if (!(access & ex->access)) in match_exception_partial() 431 refex->access); in verify_new_ex() 446 refex->access); in verify_new_ex() 833 short access) in devcgroup_legacy_check_permission() argument [all …]
|
| /linux-6.15/Documentation/admin-guide/mm/damon/ |
| H A D | start.rst | 45 $ sudo damo report access 48 0 addr 86.182 TiB size 8.000 KiB access 0 % age 14.900 s 49 1 addr 86.182 TiB size 8.000 KiB access 60 % age 0 ns 50 2 addr 86.182 TiB size 3.422 MiB access 0 % age 4.100 s 51 3 addr 86.182 TiB size 2.004 MiB access 95 % age 2.200 s 56 8 addr 126.990 TiB size 62.332 MiB access 0 % age 9.500 s 57 9 addr 126.990 TiB size 13.980 MiB access 0 % age 5.200 s 58 10 addr 126.990 TiB size 9.539 MiB access 100 % age 3.700 s 59 11 addr 126.990 TiB size 16.098 MiB access 0 % age 6.400 s 60 12 addr 127.987 TiB size 132.000 KiB access 0 % age 2.900 s [all …]
|
| /linux-6.15/sound/core/ |
| H A D | control_led.c | 49 unsigned int access; member 164 lctl->access = access; in snd_ctl_led_set_state() 208 if (lctl && (access == 0 || access != lctl->access)) { in snd_ctl_led_remove() 209 ret = lctl->access; in snd_ctl_led_remove() 224 if (access) in snd_ctl_led_notify() 228 access = vd->access & SNDRV_CTL_ELEM_ACCESS_LED_MASK; in snd_ctl_led_notify() 232 if (access) in snd_ctl_led_notify() 237 access = vd->access & SNDRV_CTL_ELEM_ACCESS_LED_MASK; in snd_ctl_led_notify() 238 if (access) in snd_ctl_led_notify() 262 access = vd->access & SNDRV_CTL_ELEM_ACCESS_LED_MASK; in DEFINE_FREE() [all …]
|
| /linux-6.15/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 131 access 161 access to deny. The access strings may contain only the characters 224 object label, and the third the requested access. The access 239 object label, and the third the requested access. The access 306 Writing a Smack label here sets the access to '-' for all access 351 access to pieces of data. These schemes are called discretionary access 387 Enforcement and avoided by defining access controls in terms of the access 514 of access allowed. The access specification is searched for letters that 515 describe access modes: 710 write access on LABEL1, and access to the subnet @IP2/MASK if it has write [all …]
|
| /linux-6.15/kernel/kcsan/ |
| H A D | kcsan_test.c | 152 } access[2]; member 191 cmp < 0 ? r->access[0].fn : r->access[1].fn, in __report_matches() 192 cmp < 0 ? r->access[1].fn : r->access[0].fn); in __report_matches() 244 r->access[i].addr, r->access[i].size); in __report_matches() 716 .access = { in test_basic() 722 .access = { in test_basic() 747 .access = { in test_concurrent_races() 754 .access = { in test_concurrent_races() 776 .access = { in test_novalue_change() 782 .access = { in test_novalue_change() [all …]
|
| /linux-6.15/tools/testing/selftests/landlock/ |
| H A D | fs_test.c | 600 __u64 access; in TEST_F_FORK() local 621 for (access = 1; access <= ACCESS_LAST; access <<= 1) { in TEST_F_FORK() 660 __u64 access; in TEST_F_FORK() local 674 for (access = 1ULL << 63; access != ACCESS_LAST; access >>= 1) { in TEST_F_FORK() 692 __u64 access; in TEST_F_FORK() local 701 for (access = 1; access > 0; access <<= 1) { in TEST_F_FORK() 744 __u64 access; member 785 if (!rules[i].access) in create_ruleset() 848 .access = ACCESS_RO, in TEST_F_FORK() 871 .access = ACCESS_RO, in TEST_F_FORK() [all …]
|
| /linux-6.15/drivers/platform/chrome/ |
| H A D | cros_ec_lpc_mec.c | 129 enum cros_ec_lpc_mec_emi_access_mode access, new_access; in cros_ec_lpc_io_bytes_mec() local 145 access = ACCESS_TYPE_BYTE; in cros_ec_lpc_io_bytes_mec() 147 access = ACCESS_TYPE_LONG_AUTO_INCREMENT; in cros_ec_lpc_io_bytes_mec() 154 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec() 182 if (new_access != access || in cros_ec_lpc_io_bytes_mec() 183 access != ACCESS_TYPE_LONG_AUTO_INCREMENT) { in cros_ec_lpc_io_bytes_mec() 184 access = new_access; in cros_ec_lpc_io_bytes_mec() 185 cros_ec_lpc_mec_emi_write_address(offset, access); in cros_ec_lpc_io_bytes_mec()
|
| /linux-6.15/drivers/gpu/drm/nouveau/nvkm/engine/dma/ |
| H A D | user.c | 87 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor() 90 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor() 120 switch (dmaobj->access) { in nvkm_dmaobj_ctor() 122 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor() 125 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor() 128 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor() 131 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
|
| /linux-6.15/include/linux/ |
| H A D | device_cgroup.h | 16 short access); 19 short type, access = 0; in devcgroup_inode_permission() local 32 access |= DEVCG_ACC_WRITE; in devcgroup_inode_permission() 34 access |= DEVCG_ACC_READ; in devcgroup_inode_permission() 37 access); in devcgroup_inode_permission() 61 short access) in devcgroup_check_permission() argument
|
| H A D | iommufd.h | 85 void iommufd_access_destroy(struct iommufd_access *access); 86 int iommufd_access_attach(struct iommufd_access *access, u32 ioas_id); 87 int iommufd_access_replace(struct iommufd_access *access, u32 ioas_id); 88 void iommufd_access_detach(struct iommufd_access *access); 139 int iommufd_access_pin_pages(struct iommufd_access *access, unsigned long iova, 142 void iommufd_access_unpin_pages(struct iommufd_access *access, 144 int iommufd_access_rw(struct iommufd_access *access, unsigned long iova, 159 static inline int iommufd_access_pin_pages(struct iommufd_access *access, in iommufd_access_pin_pages() argument 168 static inline void iommufd_access_unpin_pages(struct iommufd_access *access, in iommufd_access_unpin_pages() argument 174 static inline int iommufd_access_rw(struct iommufd_access *access, unsigned long iova, in iommufd_access_rw() argument
|
| /linux-6.15/arch/arm/include/asm/ |
| H A D | arch_timer.h | 28 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u64 val) in arch_timer_reg_write_cp15() argument 30 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 42 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 60 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 64 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 72 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
| /linux-6.15/fs/afs/ |
| H A D | security.c | 131 h += permits->permits[i].access; in afs_hash_permits() 233 new->permits[j].access = caller_access; in afs_cache_permit() 237 new->permits[j].access = permits->permits[i].access; in afs_cache_permit() 244 new->permits[j].access = caller_access; in afs_cache_permit() 327 *_access = permits->permits[i].access; in afs_check_permit_rcu() 367 *_access = permits->permits[i].access; in afs_check_permit() 402 afs_access_t access; in afs_permission() local 442 if (!(access & AFS_ACE_LOOKUP)) in afs_permission() 451 if (!(access & AFS_ACE_LOOKUP)) in afs_permission() 456 if (!(access & AFS_ACE_READ)) in afs_permission() [all …]
|
| /linux-6.15/Documentation/core-api/ |
| H A D | unaligned-memory-access.rst | 14 when it comes to memory access. This document presents some details about 19 The definition of an unaligned access 26 access. 47 of memory access. However, we must consider ALL supported architectures; 52 Why unaligned access is bad 66 unaligned access to be corrected. 76 Code that does not cause unaligned access 139 the memory access in a way that does not cause unaligned access. Of course, 145 Code that causes unaligned access 173 (Hint: it'd be an unaligned access.) [all …]
|
| /linux-6.15/Documentation/security/ |
| H A D | landlock.rst | 12 Landlock's goal is to create scoped access-control (i.e. sandboxing). To 20 system security policy enforced by other access control mechanisms (e.g. DAC, 21 LSM). A Landlock rule shall not interfere with other access-controls enforced 31 Guiding principles for safe access controls 40 * Kernel access check shall not slow down access request from unsandboxed 47 Cf. `File descriptor access rights`_. 56 Inode access rights 68 File descriptor access rights 78 hierarchy doesn't grant that access right. The following sequences of 84 Similarly to file access modes (e.g. ``O_RDWR``), Landlock access rights [all …]
|
| /linux-6.15/Documentation/arch/arm/ |
| H A D | mem_alignment.rst | 5 Too many problems popped up because of unnoticed misaligned memory access in 14 unaligned memory access in general. If those access are predictable, you 16 alignment trap can fixup misaligned access for the exception cases, but at 20 trap to SIGBUS any code performing unaligned access (good for debugging bad 21 code), or even fixup the access by software like for kernel code. The later 36 0 A user process performing an unaligned memory access 42 performing the unaligned access. This is of course 47 performing the unaligned access. 59 information on unaligned access occurrences plus the current mode of
|
| /linux-6.15/drivers/acpi/numa/ |
| H A D | hmat.c | 343 u8 type, u32 value, int access) in hmat_update_target_access() argument 347 target->coord[access].read_latency = value; in hmat_update_target_access() 372 enum access_coordinate_class access) in hmat_update_target_coordinates() argument 387 coord->read_latency, access); in hmat_update_target_coordinates() 389 coord->write_latency, access); in hmat_update_target_coordinates() 391 coord->read_bandwidth, access); in hmat_update_target_coordinates() 393 coord->write_bandwidth, access); in hmat_update_target_coordinates() 794 if (access == ACCESS_COORDINATE_LOCAL || in hmat_update_target_attrs() 823 if ((access == ACCESS_COORDINATE_CPU || in hmat_update_target_attrs() 845 int access) in __hmat_register_target_initiators() argument [all …]
|
| /linux-6.15/include/rdma/ |
| H A D | ib_umem.h | 108 size_t size, int access); 148 int fd, int access, 153 int access); 158 int fd, int access); 170 int access) in ib_umem_get() argument 195 int access, in ib_umem_dmabuf_get() argument 202 size_t size, int fd, int access) in ib_umem_dmabuf_get_pinned() argument 211 int fd, int access) in ib_umem_dmabuf_get_pinned_with_dma_device() argument
|
| /linux-6.15/drivers/dax/ |
| H A D | Kconfig | 3 tristate "DAX: direct access to differentiated memory" 9 tristate "Device DAX: direct access mapping device" 12 Support raw access to differentiated (persistence, bandwidth, 20 tristate "PMEM DAX: direct access to persistent memory" 24 Support raw access to persistent memory. Note that this 31 tristate "HMEM DAX: direct access to 'specific purpose' memory" 48 tristate "CXL DAX: direct access to CXL RAM regions" 56 instance is created to access that unmapped-by-default address range. 57 Per usual it can remain as dedicated access via a device interface, or 70 Support access to persistent, or other performance
|
| /linux-6.15/drivers/net/dsa/sja1105/ |
| H A D | sja1105_dynamic_config.c | 886 .access = OP_WRITE, 910 .access = (OP_WRITE | OP_DEL), 919 .access = OP_WRITE, 927 .access = OP_WRITE, 935 .access = OP_WRITE, 943 .access = OP_WRITE, 959 .access = OP_WRITE, 1003 .access = OP_WRITE, 1051 .access = OP_WRITE, 1274 if (!(ops->access & OP_READ)) in sja1105_dynamic_config_read() [all …]
|