Home
last modified time | relevance | path

Searched full:access (Results 1 – 25 of 917) sorted by relevance

12345678910>>...37

/Documentation/admin-guide/LSM/
DSmack.rst9 Smack is the Simplified Mandatory Access Control Kernel.
10 Smack is a kernel based implementation of mandatory access
13 Smack is not the only Mandatory Access Control scheme
14 available for Linux. Those new to Mandatory Access Control
33 access to systems that use them as Smack does.
50 load the Smack access rules
53 report if a process with one label has access
85 Used to make access control decisions. In almost all cases
95 label does not allow all of the access permitted to a process
102 the Smack rule (more below) that permitted the write access
[all …]
/Documentation/core-api/
Dunaligned-memory-access.rst14 when it comes to memory access. This document presents some details about
19 The definition of an unaligned access
26 access.
28 The above may seem a little vague, as memory access can happen in different
32 which will compile to multiple-byte memory access instructions, namely when
47 of memory access. However, we must consider ALL supported architectures;
52 Why unaligned access is bad
55 The effects of performing an unaligned memory access vary from architecture
62 happen. The exception handler is able to correct the unaligned access,
66 unaligned access to be corrected.
[all …]
Dprotection-keys.rst23 bits (Access Disable and Write Disable) for each key. Being a CPU
30 permissions are enforced on data access only and have no effect on
45 directly in order to change access permissions to memory covered
57 gain access, do the update, then remove its write access::
88 That should be true whether something() is a direct access to 'ptr'
93 or when the kernel does the access on the application's behalf like
Dthis_cpu_ops.rst8 this_cpu operations are a way of optimizing access to per cpu
31 Access to the variable without the lock prefix is not synchronized but
144 access local per cpu data in a critical section. When preemption
273 Remote access to per cpu data
278 be "atomic" as no other CPU has access to these data structures.
280 There are special cases where you might need to access per cpu data
281 structures remotely. It is usually safe to do a remote read access
282 and that is frequently done to summarize counters. Remote write access
291 To access per-cpu data structure remotely, typically the per_cpu_ptr()
299 This makes it explicit that we are getting ready to access a percpu
[all …]
/Documentation/arm/
Dmem_alignment.rst5 Too many problems popped up because of unnoticed misaligned memory access in
14 unaligned memory access in general. If those access are predictable, you
16 alignment trap can fixup misaligned access for the exception cases, but at
20 trap to SIGBUS any code performing unaligned access (good for debugging bad
21 code), or even fixup the access by software like for kernel code. The later
36 0 A user process performing an unaligned memory access
42 performing the unaligned access. This is of course
47 performing the unaligned access.
59 information on unaligned access occurrences plus the current mode of
/Documentation/ABI/testing/
Dsysfs-class-power9 Access: Read
18 Access: Read
27 Access: Read
36 Access: Read
58 Access: Read
76 Access: Read
89 Access: Read
98 Access: Read, Write
118 Access: Read
142 Access: Read
[all …]
Dsysfs-bus-event_source-devices-hv_gpci36 '0' if the hypervisor is configured to forbid access to event
40 '1' if that access is allowed.
46 0 or 1. Indicates whether we have access to "GA" events (listed
53 0 or 1. Indicates whether we have access to "EXPANDED" events (listed
60 0 or 1. Indicates whether we have access to "LAB" events (listed
Dsysfs-driver-input-exc30006 Access: Read
15 Access: Read
/Documentation/driver-api/mmc/
Dmmc-dev-parts.rst15 Read and write access is provided to the two MMC boot partitions. Due to
18 platform, write access is disabled by default to reduce the chance of
21 To enable write access to /dev/mmcblkXbootY, disable the forced read-only
22 access with::
26 To re-enable read-only access::
/Documentation/devicetree/bindings/spi/
Dspi-sprd-adi.txt3 ADI is the abbreviation of Anolog-Digital interface, which is used to access
9 48 hardware channels to access analog chip. For 2 software read/write channels,
10 users should set ADI registers to access analog chip. For hardware channels,
13 then users can access the mapped analog chip address by this hardware channel
19 the analog chip address where user want to access by hardware components.
21 Since we have multi-subsystems will use unique ADI to access analog chip, when
48 value specifies the analog chip address where user want to access
/Documentation/admin-guide/mm/
Dnumaperf.rst36 pair may be organized into different ranked access classes to represent
39 the highest access class, 0. Any given target may have one or more
45 relationship for the access class "0" memory initiators and targets::
53 A memory initiator may have multiple memory targets in the same access
55 nodes' access characteristics share the same performance relative to other
56 linked initiator nodes. Each target within an initiator's access class,
59 The access class "1" is used to allow differentiation between initiators
61 IO initiators such as GPUs and NICs. Unlike access class 0, only
72 memory node's access class 0 initiators as follows::
77 are linked under the this access's inititiators.
[all …]
/Documentation/sound/cards/
Dhdspm.rst64 * access-mode -- MMAP (memory mapped), Not interleaved (PCM_NON-INTERLEAVED)
125 * Access -- Read Write
141 * Access -- Read Write
159 * Access -- Read Write
178 * Access -- Read Write
195 * Access -- Read Write
207 * Access -- Read Write
220 * Access -- Read Write
235 * Access -- Read Write
255 * Access -- Read Write
[all …]
/Documentation/bpf/
Dprog_cgroup_sysctl.rst22 ``BPF_PROG_TYPE_CGROUP_SYSCTL`` provides access to the following context from
39 value to the field can be used to access part of sysctl value starting from
40 specified ``file_pos``. Not all sysctl support access with ``file_pos !=
52 * ``0`` means "reject access to sysctl";
53 * ``1`` means "proceed with access".
62 helpers focus on providing access to these properties:
98 See `test_sysctl_prog.c`_ for an example of BPF program in C that access
100 the result to make decision whether to allow or deny access to sysctl.
/Documentation/powerpc/
Dcxlflash.rst27 user space application direct access to Flash storage.
33 special path for user space access, and performing error recovery. It
46 either raw access to the entire LUN (referred to as direct
47 or physical LUN access) or access to a kernel/AFU-mediated
48 partition of the LUN (referred to as virtual LUN access). The
90 access to the Flash from user space (without requiring a system call).
93 block library to enable this user space access. The driver supports
115 Applications intending to get access to the CXL Flash from user
121 specifically for devices (LUNs) operating in user space access
135 device (LUN) via user space access need to use the services provided
[all …]
/Documentation/vm/
Dsplit_page_table_lock.rst13 access to the table. At the moment we use split lock for PTE and PMD
14 tables. Access to higher level tables protected by mm->page_table_lock.
83 page->ptl is used to access split page table lock, where 'page' is struct
91 can avoid indirect access and save a cache line.
95 one more cache line for indirect access;
100 Please, never access page->ptl directly -- use appropriate helper.
/Documentation/admin-guide/cgroup-v1/
Ddevices.rst9 on device files. A device cgroup associates a device access
13 either an integer or * for all. Access is a composition of r
19 never receive a device access which is denied by its parent.
61 access permissions than its parent. Every time an entry is written to
65 more access than the cgroup's parent, it'll be removed from the whitelist.
129 implementation. Removal or addition of exceptions that will reduce the access
132 on current parent's access rules.
/Documentation/block/
Dpr.rst8 access to block devices to specific initiators in a shared storage
30 Only the initiator that owns the reservation can access the
38 Only initiators with a registered key can access the device.
50 Only initiators with a registered key can access the device.
75 This ioctl command reserves the device and thus restricts access for other
85 and thus removes any access restriction implied by it.
/Documentation/driver-api/
Ddma-buf.rst5 hardware (DMA) access across multiple device drivers and subsystems, and
6 for synchronizing asynchronous hardware access.
14 one device has finished access, and (3) reservation, which manages the
44 - and needs a mechanism to get access to the scatterlist that makes up this
45 buffer in memory, mapped into its own address space, so it can access the
71 access to buffers, via the leaked fd, to which it should otherwise
72 not be permitted access.
86 discussion below on `CPU Access to DMA Buffer Objects`_ for the full details.
91 Basic Operation and Device DMA Access
95 :doc: dma buf device access
[all …]
/Documentation/misc-devices/
Dc2port.rst57 access flash_block_size flash_erase rev_id
61 Initially the C2port access is disabled since you hardware may have
62 such lines multiplexed with other devices so, to get access to the
65 # echo 1 > /sys/class/c2port/c2port0/access
75 However, for security reasons, the in-system flash access in not
/Documentation/devicetree/bindings/powerpc/fsl/
Decm.txt6 Local Access Window (LAW) Node
8 The LAW node represents the region of CCSR space where local access
11 number of local access windows as specified by fsl,num-laws.
30 Definition: The value specifies the number of local access
Dmcm.txt6 Local Access Window (LAW) Node
8 The LAW node represents the region of CCSR space where local access
11 number of local access windows as specified by fsl,num-laws.
30 Definition: The value specifies the number of local access
/Documentation/dev-tools/
Dkasan.rst15 validity checks before every memory access, and therefore require a compiler
53 A typical out-of-bounds access generic KASAN report looks like this::
115 page dumped because: kasan: bad access detected
127 and what kind of access caused it. It's followed by a stack trace of the bad
128 access, a stack trace of where the accessed memory was allocated (in case bad
129 access happens on a slab object), and a stack trace of where the object was
166 Synchronous mode: a bad access is detected immediately when a tag
168 Asynchronous mode: a bad access detection is delayed. When a tag check
206 memory is safe to access, and use compile-time instrumentation to insert checks
207 of shadow memory on each memory access.
[all …]
/Documentation/devicetree/bindings/mfd/
Dbrcm,iproc-mhb.txt5 interface; 3) access to the Nitro (network processing) engine
7 This node allows access to these MHB registers via syscon.
/Documentation/devicetree/bindings/gpio/
Dnvidia,tegra186-gpio.txt14 a) Security registers, which allow configuration of allowed access to the GPIO
19 Access to this set of registers is not necessary in all circumstances. Code
20 that wishes to configure access to the GPIO registers needs access to these
22 need access to these registers.
26 address space, each of which access the same underlying state. See the hardware
27 documentation for rationale. Any particular GPIO client is expected to access
/Documentation/ABI/stable/
Dsysfs-devices-node99 The node's relationship to other nodes for access class "Y".
106 nodes that have class "Y" access to this target node's
116 this initiator node has class "Y" access.
123 nodes found in this access class's linked initiators.
130 from nodes found in this access class's linked initiators.
137 found in this access class's linked initiators.
143 This node's write latency in nanoseconds when access

12345678910>>...37