Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 244) sorted by relevance

12345678910

/arch/arm64/include/asm/
Darch_timer.h36 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument
38 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15()
47 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15()
62 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument
66 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15()
75 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
/arch/arm/include/asm/
Darch_timer.h21 void arch_timer_reg_write_cp15(int access, enum arch_timer_reg reg, u32 val) in arch_timer_reg_write_cp15() argument
23 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_write_cp15()
32 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_write_cp15()
47 u32 arch_timer_reg_read_cp15(int access, enum arch_timer_reg reg) in arch_timer_reg_read_cp15() argument
51 if (access == ARCH_TIMER_PHYS_ACCESS) { in arch_timer_reg_read_cp15()
60 } else if (access == ARCH_TIMER_VIRT_ACCESS) { in arch_timer_reg_read_cp15()
/arch/tile/gxio/
DKconfig1 # Support direct access to TILE-Gx hardware from user space, via the
7 # Support direct access to the common I/O DMA facility within the
13 # Support direct access to the TILE-Gx mPIPE hardware from kernel space.
19 # Support direct access to the TILE-Gx TRIO hardware from kernel space.
25 # Support direct access to the TILE-Gx USB hardware from kernel space.
30 # Support direct access to the TILE-Gx UART hardware from kernel space.
/arch/x86/kvm/
Dmmutrace.h39 access_str[role.access], \
202 TP_PROTO(u64 *sptep, gfn_t gfn, unsigned access, unsigned int gen),
203 TP_ARGS(sptep, gfn, access, gen),
208 __field(unsigned, access)
215 __entry->access = access;
220 __entry->gfn, __entry->access, __entry->gen)
225 TP_PROTO(u64 addr, gfn_t gfn, unsigned access),
226 TP_ARGS(addr, gfn, access),
231 __field(unsigned, access)
237 __entry->access = access;
[all …]
Dpaging_tmpl.h114 static inline void FNAME(protect_clean_gpte)(unsigned *access, unsigned gpte) in FNAME()
128 *access &= mask; in FNAME()
194 unsigned access; in FNAME() local
196 access = ((gpte & VMX_EPT_WRITABLE_MASK) ? ACC_WRITE_MASK : 0) | in FNAME()
200 access = (gpte & (PT_WRITABLE_MASK | PT_USER_MASK)) | ACC_EXEC_MASK; in FNAME()
201 access &= ~(gpte >> PT64_NX_SHIFT); in FNAME()
204 return access; in FNAME()
270 gva_t addr, u32 access) in FNAME()
279 const int write_fault = access & PFERR_WRITE_MASK; in FNAME()
280 const int user_fault = access & PFERR_USER_MASK; in FNAME()
[all …]
/arch/s390/
DKconfig.debug10 prompt "Filter access to /dev/mem"
12 This option restricts access to /dev/mem. If this option is
13 disabled, you allow userspace access to all memory, including
14 kernel and userspace memory. Accidental memory access is likely
16 Memory access is required for experts who want to debug the kernel.
/arch/powerpc/mm/
Dhugetlbpage-hash64.c21 int __hash_page_huge(unsigned long ea, unsigned long access, unsigned long vsid, in __hash_page_huge() argument
53 if (unlikely(access & ~old_pte)) in __hash_page_huge()
58 if (access & _PAGE_RW) in __hash_page_huge()
116 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_huge()
Dhash_utils_64.c958 void hash_failure_debug(unsigned long ea, unsigned long access, in hash_failure_debug() argument
965 ea, access, current->comm); in hash_failure_debug()
992 int hash_page_mm(struct mm_struct *mm, unsigned long ea, unsigned long access, unsigned long trap) in hash_page_mm() argument
1004 ea, access, trap); in hash_page_mm()
1075 access |= _PAGE_PRESENT; in hash_page_mm()
1080 if (access & ~pte_val(*ptep)) { in hash_page_mm()
1088 rc = __hash_page_thp(ea, access, vsid, (pmd_t *)ptep, in hash_page_mm()
1092 rc = __hash_page_huge(ea, access, vsid, ptep, trap, in hash_page_mm()
1152 rc = __hash_page_64K(ea, access, vsid, ptep, trap, local, ssize); in hash_page_mm()
1157 if (access & spp) in hash_page_mm()
[all …]
Dhugepage-hash64.c72 int __hash_page_thp(unsigned long ea, unsigned long access, unsigned long vsid, in __hash_page_thp() argument
97 if (unlikely(access & ~old_pmd)) in __hash_page_thp()
104 if (access & _PAGE_RW) in __hash_page_thp()
221 hash_failure_debug(ea, access, vsid, trap, ssize, in __hash_page_thp()
/arch/unicore32/
DKconfig.debug6 bool "Filter access to /dev/mem"
9 If this option is disabled, you allow userspace (root) access to all
11 access to this is obviously disastrous, but specific access can
15 userspace access to memory mapped peripherals.
/arch/powerpc/platforms/cell/spufs/
Dfault.c112 u64 ea, dsisr, access; in spufs_handle_class1() local
144 access = (_PAGE_PRESENT | _PAGE_USER); in spufs_handle_class1()
145 access |= (dsisr & MFC_DSISR_ACCESS_PUT) ? _PAGE_RW : 0UL; in spufs_handle_class1()
147 ret = hash_page(ea, access, 0x300); in spufs_handle_class1()
/arch/powerpc/include/asm/
Dmmu-hash64.h319 extern int __hash_page_4K(unsigned long ea, unsigned long access,
322 extern int __hash_page_64K(unsigned long ea, unsigned long access,
327 extern int hash_page_mm(struct mm_struct *mm, unsigned long ea, unsigned long access, unsigned long…
328 extern int hash_page(unsigned long ea, unsigned long access, unsigned long trap);
329 int __hash_page_huge(unsigned long ea, unsigned long access, unsigned long vsid,
333 extern int __hash_page_thp(unsigned long ea, unsigned long access,
337 static inline int __hash_page_thp(unsigned long ea, unsigned long access, in __hash_page_thp() argument
346 extern void hash_failure_debug(unsigned long ea, unsigned long access,
/arch/arm/mach-iop32x/include/mach/
Dentry-macro.S15 mcr p15, 0, \tmp, c15, c1, 0 @ Enable cp6 access
32 mcrne p15, 0, \tmp1, c15, c1, 0 @ Disable cp6 access
/arch/arm/boot/dts/
Domap-gpmc-smsc9221.dtsi44 gpmc,access-ns = <36>;
45 gpmc,page-burst-access-ns = <0>;
49 gpmc,wr-access-ns = <42>;
Domap3430-sdp.dts78 gpmc,access-ns = <114>;
79 gpmc,page-burst-access-ns = <6>;
83 gpmc,wr-access-ns = <186>;
124 gpmc,access-ns = <54>;
125 gpmc,wr-access-ns = <30>;
169 gpmc,access-ns = <78>;
Domap3-sb-t35.dtsi37 gpmc,access-ns = <144>;
38 gpmc,page-burst-access-ns = <24>;
Domap-gpmc-smsc911x.dtsi38 gpmc,access-ns = <144>;
39 gpmc,page-burst-access-ns = <24>;
/arch/arm/mach-iop13xx/include/mach/
Dentry-macro.S22 mcr p15, 0, \tmp, c15, c1, 0 @ Enable cp6 access
41 mcrne p15, 0, \tmp1, c15, c1, 0 @ Disable cp6 access
/arch/arm/mach-iop33x/include/mach/
Dentry-macro.S15 mcr p15, 0, \tmp, c15, c1, 0 @ Enable cp6 access
33 mcrne p15, 0, \tmp1, c15, c1, 0 @ Disable cp6 access
/arch/avr32/mach-at32ap/
DKconfig12 when doing little-endian port access.
16 raw access and is thus not affected by any of this.)
/arch/powerpc/boot/dts/
Dcurrituck.dts41 dcr-access-method = "native";
55 dcr-access-method = "native";
133 reg = <0x00000101 0x00000000 0x0 0x10000000 /* Config space access */
134 0x00000100 0x00000000 0x0 0x00001000>; /* UTL Registers space access */
171 reg = <0x00000301 0x00000000 0x0 0x10000000 /* Config space access */
172 0x00000300 0x00000000 0x0 0x00001000>; /* UTL Registers space access */
208 reg = <0x00000381 0x00000000 0x0 0x10000000 /* Config space access */
209 0x00000380 0x00000000 0x0 0x00001000>; /* UTL Registers space access */
Diss4xx-mpic.dts45 dcr-access-method = "native";
59 dcr-access-method = "native";
75 dcr-access-method = "native";
91 dcr-access-method = "native";
/arch/arm64/
DKconfig.debug22 bool "Filter access to /dev/mem"
25 If this option is disabled, you allow userspace (root) access to all
27 access to this is obviously disastrous, but specific access can
31 userspace access to memory mapped peripherals.
/arch/cris/arch-v32/lib/
Dchecksumcopy.S30 1: ;; A failing userspace access (the read) will have this as PC.
71 2: ;; A failing userspace access for the read below will have this as PC.
87 3: ;; A failing userspace access for the read below will have this as PC.
/arch/s390/kernel/
Dhead31.S54 .long 0 # cr8: access registers translation
73 .long 0x80000000,0,0,0 # invalid access-list entries
94 lam 0,15,.Laregs-.LPG3(%r13) # load access regs needed by uaccess

12345678910