/arch/arm64/include/asm/ |
D | arch_timer.h | 36 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument 38 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 47 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 62 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 66 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 75 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
/arch/arm/include/asm/ |
D | arch_timer.h | 21 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument 23 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15() 32 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15() 47 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument 51 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15() 60 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
|
/arch/tile/gxio/ |
D | Kconfig | 1 # Support direct access to TILE-Gx hardware from user space, via the 7 # Support direct access to the common I/O DMA facility within the 13 # Support direct access to the TILE-Gx mPIPE hardware from kernel space. 19 # Support direct access to the TILE-Gx TRIO hardware from kernel space. 25 # Support direct access to the TILE-Gx USB hardware from kernel space. 30 # Support direct access to the TILE-Gx UART hardware from kernel space.
|
/arch/x86/kvm/ |
D | mmutrace.h | 39 access_str[role.access], \ 202 TP_PROTO(u64 *sptep, gfn_t gfn, unsigned access, unsigned int gen), 203 TP_ARGS(sptep, gfn, access, gen), 208 __field(unsigned, access) 215 __entry->access = access; 220 __entry->gfn, __entry->access, __entry->gen) 225 TP_PROTO(u64 addr, gfn_t gfn, unsigned access), 226 TP_ARGS(addr, gfn, access), 231 __field(unsigned, access) 237 __entry->access = access; [all …]
|
D | paging_tmpl.h | 114 static inline void FNAME(protect_clean_gpte)(unsigned *access, unsigned gpte) in FNAME() 128 *access &= mask; in FNAME() 194 unsigned access; in FNAME() local 196 access = ((gpte & VMX_EPT_WRITABLE_MASK) ? ACC_WRITE_MASK : 0) | in FNAME() 200 access = (gpte & (PT_WRITABLE_MASK | PT_USER_MASK)) | ACC_EXEC_MASK; in FNAME() 201 access &= ~(gpte >> PT64_NX_SHIFT); in FNAME() 204 return access; in FNAME() 270 gva_t addr, u32 access) in FNAME() 279 const int write_fault = access & PFERR_WRITE_MASK; in FNAME() 280 const int user_fault = access & PFERR_USER_MASK; in FNAME() [all …]
|
/arch/s390/ |
D | Kconfig.debug | 10 prompt "Filter access to /dev/mem" 12 This option restricts access to /dev/mem. If this option is 13 disabled, you allow userspace access to all memory, including 14 kernel and userspace memory. Accidental memory access is likely 16 Memory access is required for experts who want to debug the kernel.
|
/arch/powerpc/mm/ |
D | hugetlbpage-hash64.c | 21 int __hash_page_huge(unsigned long ea, unsigned long access, unsigned long vsid, in __hash_page_huge() argument 53 if (unlikely(access & ~old_pte)) in __hash_page_huge() 58 if (access & _PAGE_RW) in __hash_page_huge() 116 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_huge()
|
D | hash_utils_64.c | 958 void hash_failure_debug(unsigned long ea, unsigned long access, in hash_failure_debug() argument 965 ea, access, current->comm); in hash_failure_debug() 992 int hash_page_mm(struct mm_struct *mm, unsigned long ea, unsigned long access, unsigned long trap) in hash_page_mm() argument 1004 ea, access, trap); in hash_page_mm() 1075 access |= _PAGE_PRESENT; in hash_page_mm() 1080 if (access & ~pte_val(*ptep)) { in hash_page_mm() 1088 rc = __hash_page_thp(ea, access, vsid, (pmd_t *)ptep, in hash_page_mm() 1092 rc = __hash_page_huge(ea, access, vsid, ptep, trap, in hash_page_mm() 1152 rc = __hash_page_64K(ea, access, vsid, ptep, trap, local, ssize); in hash_page_mm() 1157 if (access & spp) in hash_page_mm() [all …]
|
D | hugepage-hash64.c | 72 int __hash_page_thp(unsigned long ea, unsigned long access, unsigned long vsid, in __hash_page_thp() argument 97 if (unlikely(access & ~old_pmd)) in __hash_page_thp() 104 if (access & _PAGE_RW) in __hash_page_thp() 221 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_thp()
|
/arch/unicore32/ |
D | Kconfig.debug | 6 bool "Filter access to /dev/mem" 9 If this option is disabled, you allow userspace (root) access to all 11 access to this is obviously disastrous, but specific access can 15 userspace access to memory mapped peripherals.
|
/arch/powerpc/platforms/cell/spufs/ |
D | fault.c | 112 u64 ea, dsisr, access; in spufs_handle_class1() local 144 access = (_PAGE_PRESENT | _PAGE_USER); in spufs_handle_class1() 145 access |= (dsisr & MFC_DSISR_ACCESS_PUT) ? _PAGE_RW : 0UL; in spufs_handle_class1() 147 ret = hash_page(ea, access, 0x300); in spufs_handle_class1()
|
/arch/powerpc/include/asm/ |
D | mmu-hash64.h | 319 extern int __hash_page_4K(unsigned long ea, unsigned long access, 322 extern int __hash_page_64K(unsigned long ea, unsigned long access, 327 extern int hash_page_mm(struct mm_struct *mm, unsigned long ea, unsigned long access, unsigned long… 328 extern int hash_page(unsigned long ea, unsigned long access, unsigned long trap); 329 int __hash_page_huge(unsigned long ea, unsigned long access, unsigned long vsid, 333 extern int __hash_page_thp(unsigned long ea, unsigned long access, 337 static inline int __hash_page_thp(unsigned long ea, unsigned long access, in __hash_page_thp() argument 346 extern void hash_failure_debug(unsigned long ea, unsigned long access,
|
/arch/arm/mach-iop32x/include/mach/ |
D | entry-macro.S | 15 mcr p15, 0, \tmp, c15, c1, 0 @ Enable cp6 access 32 mcrne p15, 0, \tmp1, c15, c1, 0 @ Disable cp6 access
|
/arch/arm/boot/dts/ |
D | omap-gpmc-smsc9221.dtsi | 44 gpmc,access-ns = <36>; 45 gpmc,page-burst-access-ns = <0>; 49 gpmc,wr-access-ns = <42>;
|
D | omap3430-sdp.dts | 78 gpmc,access-ns = <114>; 79 gpmc,page-burst-access-ns = <6>; 83 gpmc,wr-access-ns = <186>; 124 gpmc,access-ns = <54>; 125 gpmc,wr-access-ns = <30>; 169 gpmc,access-ns = <78>;
|
D | omap3-sb-t35.dtsi | 37 gpmc,access-ns = <144>; 38 gpmc,page-burst-access-ns = <24>;
|
D | omap-gpmc-smsc911x.dtsi | 38 gpmc,access-ns = <144>; 39 gpmc,page-burst-access-ns = <24>;
|
/arch/arm/mach-iop13xx/include/mach/ |
D | entry-macro.S | 22 mcr p15, 0, \tmp, c15, c1, 0 @ Enable cp6 access 41 mcrne p15, 0, \tmp1, c15, c1, 0 @ Disable cp6 access
|
/arch/arm/mach-iop33x/include/mach/ |
D | entry-macro.S | 15 mcr p15, 0, \tmp, c15, c1, 0 @ Enable cp6 access 33 mcrne p15, 0, \tmp1, c15, c1, 0 @ Disable cp6 access
|
/arch/avr32/mach-at32ap/ |
D | Kconfig | 12 when doing little-endian port access. 16 raw access and is thus not affected by any of this.)
|
/arch/powerpc/boot/dts/ |
D | currituck.dts | 41 dcr-access-method = "native"; 55 dcr-access-method = "native"; 133 reg = <0x00000101 0x00000000 0x0 0x10000000 /* Config space access */ 134 0x00000100 0x00000000 0x0 0x00001000>; /* UTL Registers space access */ 171 reg = <0x00000301 0x00000000 0x0 0x10000000 /* Config space access */ 172 0x00000300 0x00000000 0x0 0x00001000>; /* UTL Registers space access */ 208 reg = <0x00000381 0x00000000 0x0 0x10000000 /* Config space access */ 209 0x00000380 0x00000000 0x0 0x00001000>; /* UTL Registers space access */
|
D | iss4xx-mpic.dts | 45 dcr-access-method = "native"; 59 dcr-access-method = "native"; 75 dcr-access-method = "native"; 91 dcr-access-method = "native";
|
/arch/arm64/ |
D | Kconfig.debug | 22 bool "Filter access to /dev/mem" 25 If this option is disabled, you allow userspace (root) access to all 27 access to this is obviously disastrous, but specific access can 31 userspace access to memory mapped peripherals.
|
/arch/cris/arch-v32/lib/ |
D | checksumcopy.S | 30 1: ;; A failing userspace access (the read) will have this as PC. 71 2: ;; A failing userspace access for the read below will have this as PC. 87 3: ;; A failing userspace access for the read below will have this as PC.
|
/arch/s390/kernel/ |
D | head31.S | 54 .long 0 # cr8: access registers translation 73 .long 0x80000000,0,0,0 # invalid access-list entries 94 lam 0,15,.Laregs-.LPG3(%r13) # load access regs needed by uaccess
|