/kernel/linux/linux-6.6/drivers/gpu/drm/nouveau/ |
H A D | nouveau_chan.c | 209 args.access = NV_DMA_V0_ACCESS_VM; in nouveau_channel_prep() 216 * the framebuffer bar rather than direct vram access.. in nouveau_channel_prep() 220 args.access = NV_DMA_V0_ACCESS_RDWR; in nouveau_channel_prep() 226 args.access = NV_DMA_V0_ACCESS_RDWR; in nouveau_channel_prep() 233 args.access = NV_DMA_V0_ACCESS_RDWR; in nouveau_channel_prep() 239 args.access = NV_DMA_V0_ACCESS_RDWR; in nouveau_channel_prep() 400 args.access = NV_DMA_V0_ACCESS_VM; in nouveau_channel_init() 405 args.access = NV_DMA_V0_ACCESS_RDWR; in nouveau_channel_init() 418 args.access = NV_DMA_V0_ACCESS_VM; in nouveau_channel_init() 424 args.access in nouveau_channel_init() [all...] |
/third_party/mesa3d/src/mesa/main/ |
H A D | texturebindless.c | 178 GLenum access, bool resident) in make_image_handle_resident() 189 ctx->pipe->make_image_handle_resident(ctx->pipe, handle, access, GL_TRUE); in make_image_handle_resident() 201 ctx->pipe->make_image_handle_resident(ctx->pipe, handle, access, GL_FALSE); in make_image_handle_resident() 910 _mesa_MakeImageHandleResidentARB_no_error(GLuint64 handle, GLenum access) in _mesa_MakeImageHandleResidentARB_no_error() argument 917 make_image_handle_resident(ctx, imgHandleObj, access, true); in _mesa_MakeImageHandleResidentARB_no_error() 921 _mesa_MakeImageHandleResidentARB(GLuint64 handle, GLenum access) in _mesa_MakeImageHandleResidentARB() argument 934 if (access != GL_READ_ONLY && in _mesa_MakeImageHandleResidentARB() 935 access != GL_WRITE_ONLY && in _mesa_MakeImageHandleResidentARB() 936 access != GL_READ_WRITE) { in _mesa_MakeImageHandleResidentARB() 938 "glMakeImageHandleResidentARB(access)"); in _mesa_MakeImageHandleResidentARB() 176 make_image_handle_resident(struct gl_context *ctx, struct gl_image_handle_object *imgHandleObj, GLenum access, bool resident) make_image_handle_resident() argument [all...] |
/third_party/node/deps/v8/src/codegen/ |
H A D | constant-pool.cc | 74 // By definition, merged entries have regular access. in AddEntry() 76 ConstantPoolEntry::Access access = in AddEntry() local 81 if (entry->sharing_ok() && !merged && access == ConstantPoolEntry::REGULAR) { in AddEntry() 89 if (merged || info.overflow()) return access; in AddEntry() 91 if (access == ConstantPoolEntry::REGULAR) { in AddEntry() 97 return access; in AddEntry() 126 ConstantPoolEntry::Access access, in EmitGroup() 138 if (access == ConstantPoolEntry::REGULAR) { in EmitGroup() 143 if (access == ConstantPoolEntry::REGULAR) { in EmitGroup() 147 DCHECK(access in EmitGroup() 125 EmitGroup(Assembler* assm, ConstantPoolEntry::Access access, ConstantPoolEntry::Type type) EmitGroup() argument [all...] |
/third_party/skia/third_party/externals/dawn/src/tests/unittests/validation/ |
H A D | StorageTextureValidationTests.cpp | 71 const char* access = ""; in CreateComputeShaderWithStorageTexture() local 74 access = "write"; in CreateComputeShaderWithStorageTexture() 83 << imageFormatQualifier << ", " << access in CreateComputeShaderWithStorageTexture() local 361 if (bindingLayoutEntry.storageTexture.access == bindingTypeInShader) { in TEST_F() 379 errorBindGroupLayoutEntry.storageTexture.access = bindingType; in TEST_F() 394 bindGroupLayoutBinding.storageTexture.access = bindingType; in TEST_F() 518 bindGroupLayoutBinding.storageTexture.access = storageBindingType; in TEST_F() 562 bindGroupLayoutBinding.storageTexture.access = storageBindingType; in TEST_F() 591 defaultBindGroupLayoutEntry.storageTexture.access = storageBindingType; in TEST_F() 650 defaultBindGroupLayoutEntry.storageTexture.access in TEST_F() [all...] |
/kernel/linux/linux-6.6/arch/x86/kvm/mmu/ |
H A D | mmu.c | 297 unsigned int access) in mark_mmio_spte() 299 u64 spte = make_mmio_spte(vcpu, gfn, access); in mark_mmio_spte() 632 * lost when the SPTE is marked for access tracking. in mmu_spte_age() 733 * For leaf SPTEs, fetch the *guest* access permissions being shadowed. Note 734 * that the SPTE itself may have a more constrained access permissions that 745 * KVM is not shadowing any guest page tables, so the "guest access in kvm_mmu_page_get_access() 749 * is shadowing a guest huge page with small pages, the guest access in kvm_mmu_page_get_access() 750 * permissions being shadowed are the access permissions of the huge in kvm_mmu_page_get_access() 753 * In both cases, sp->role.access contains the correct access bit in kvm_mmu_page_get_access() 296 mark_mmio_spte(struct kvm_vcpu *vcpu, u64 *sptep, u64 gfn, unsigned int access) mark_mmio_spte() argument 758 kvm_mmu_page_set_translation(struct kvm_mmu_page *sp, int index, gfn_t gfn, unsigned int access) kvm_mmu_page_set_translation() argument 777 kvm_mmu_page_set_access(struct kvm_mmu_page *sp, int index, unsigned int access) kvm_mmu_page_set_access() argument 1635 __rmap_add(struct kvm *kvm, struct kvm_mmu_memory_cache *cache, const struct kvm_memory_slot *slot, u64 *spte, gfn_t gfn, unsigned int access) __rmap_add() argument 1659 rmap_add(struct kvm_vcpu *vcpu, const struct kvm_memory_slot *slot, u64 *spte, gfn_t gfn, unsigned int access) rmap_add() argument 2301 kvm_mmu_child_role(u64 *sptep, bool direct, unsigned int access) kvm_mmu_child_role() argument 2347 kvm_mmu_get_child_sp(struct kvm_vcpu *vcpu, u64 *sptep, gfn_t gfn, bool direct, unsigned int access) kvm_mmu_get_child_sp() argument 2977 unsigned int access = sp->role.access; direct_pte_prefetch_many() local 3291 kvm_handle_noslot_fault(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault, unsigned int access) kvm_handle_noslot_fault() argument 4047 nonpaging_gva_to_gpa(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu, gpa_t vaddr, u64 access, struct x86_exception *exception) nonpaging_gva_to_gpa() argument 4160 unsigned int access = get_mmio_spte_access(spte); handle_mmio_page_fault() local 4315 kvm_faultin_pfn(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault, unsigned int access) kvm_faultin_pfn() argument 4665 sync_mmio_spte(struct kvm_vcpu *vcpu, u64 *sptep, gfn_t gfn, unsigned int access) sync_mmio_spte() argument 6346 unsigned int access; shadow_mmu_get_sp_for_split() local [all...] |
/kernel/linux/linux-5.10/drivers/net/ethernet/ti/ |
H A D | davinci_mdio.c | 65 u32 access; member 115 * In the worst case, we could be kicking off a user-access immediately in davinci_mdio_init_clk() 117 * so, our request could get deferred by one access cycle. We in davinci_mdio_init_clk() 118 * defensively allow for 4 access cycles. in davinci_mdio_init_clk() 176 /* wait until hardware is ready for another user access */ 184 reg = readl(®s->user[0].access); in wait_for_user_access() 204 reg = readl(®s->user[0].access); in wait_for_user_access() 208 dev_err(data->dev, "timed out waiting for user access\n"); in wait_for_user_access() 251 writel(reg, &data->regs->user[0].access); in davinci_mdio_read() 259 reg = readl(&data->regs->user[0].access); in davinci_mdio_read() [all...] |
/kernel/linux/linux-5.10/fs/nfsd/ |
H A D | nfs2acl.c | 80 /* resp->acl_{access,default} are released in nfssvc_release_getacl. */ in nfsacld_proc_getacl() 130 /* argp->acl_{access,default} may have been allocated in in nfsacld_proc_setacl() 164 * Check file access 173 argp->access); in nfsacld_proc_access() 176 resp->access = argp->access; in nfsacld_proc_access() 177 resp->status = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); in nfsacld_proc_access() 249 argp->access = ntohl(*p++); in nfsaclsvc_decode_accessargs() 340 *p++ = htonl(resp->access); in nfsaclsvc_encode_accessres()
|
H A D | nfsfh.c | 139 * A pseudoroot export gives permission to access only one in check_pseudo_root() 141 * before granting access to anything else under it: in check_pseudo_root() 229 * access control settings being in effect, we cannot in nfsd_set_fh_dentry() 301 * fh_verify - filehandle lookup and access checking 305 * @access: type of access needed to object 308 * access to the export, and set the current task's credentials. 324 * @access is formed from the NFSD_MAY_* constants defined in 328 fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, umode_t type, int access) in fh_verify() argument 347 * "access" argument in fh_verify() [all...] |
/third_party/cups-filters/filter/ |
H A D | sys5ippprinter.c | 273 if (filter_present("gstoraster") && access(CUPS_GHOSTSCRIPT, X_OK) == 0) in main() 305 if (access(CUPS_GHOSTSCRIPT, X_OK) != 0) in main() 312 else if (access(CUPS_POPPLER_PDFTOPS, X_OK) != 0) in main() 336 if (filter_present("gstopxl") && access(CUPS_GHOSTSCRIPT, X_OK) == 0) in main() 416 if (filter_present("gstoraster") && access(CUPS_GHOSTSCRIPT, X_OK) == 0) in main() 501 if (access(filter_path, X_OK) == 0) in filter_present()
|
/third_party/ltp/lib/ |
H A D | tst_kconfig.c | 36 if (!access(path, F_OK)) in kconfig_path() 42 if (!access("/proc/config.gz", F_OK)) in kconfig_path() 50 if (!access(path_buf, F_OK)) in kconfig_path() 55 if (!access(path_buf, F_OK)) in kconfig_path() 61 if (!access(path_buf, F_OK)) in kconfig_path() 67 if (!access(path_buf, F_OK)) in kconfig_path()
|
/third_party/node/deps/v8/src/utils/ |
H A D | allocation.cc | 199 size_t alignment, PageAllocator::Permission access) { in AllocatePages() 208 result = page_allocator->AllocatePages(hint, size, alignment, access); in AllocatePages() 232 size_t size, PageAllocator::Permission access) { in SetPermissions() 234 return page_allocator->SetPermissions(address, size, access); in SetPermissions() 278 PageAllocator::Permission access) { in SetPermissions() 281 v8::internal::SetPermissions(page_allocator_, address, size, access); in SetPermissions() 198 AllocatePages(v8::PageAllocator* page_allocator, void* hint, size_t size, size_t alignment, PageAllocator::Permission access) AllocatePages() argument 231 SetPermissions(v8::PageAllocator* page_allocator, void* address, size_t size, PageAllocator::Permission access) SetPermissions() argument 277 SetPermissions(Address address, size_t size, PageAllocator::Permission access) SetPermissions() argument
|
/third_party/skia/third_party/externals/angle2/src/tests/perf_tests/ |
H A D | MapBufferRange.cpp | 38 access = GL_MAP_WRITE_BIT | GL_MAP_INVALIDATE_RANGE_BIT; in MapBufferRangeParams() 51 GLbitfield access; member 259 strstr << "_access0x" << std::hex << access; in story() local 344 params.access); in drawBenchmark() 448 params.access = GL_MAP_WRITE_BIT | GL_MAP_UNSYNCHRONIZED_BIT; in BufferUpdateVulkanParamsUnsynchronized() 460 params.access = GL_MAP_WRITE_BIT | GL_MAP_UNSYNCHRONIZED_BIT; in BufferUpdateVulkanParamsLargeUpdateUnsynchronized()
|
/third_party/skia/src/image/ |
H A D | SkSurface.cpp | 347 GrBackendTexture SkSurface::getBackendTexture(BackendHandleAccess access) { in getBackendTexture() argument 348 return asSB(this)->onGetBackendTexture(access); in getBackendTexture() 351 GrBackendRenderTarget SkSurface::getBackendRenderTarget(BackendHandleAccess access) { in getBackendRenderTarget() argument 352 return asSB(this)->onGetBackendRenderTarget(access); in getBackendRenderTarget() 363 GrSemaphoresSubmitted SkSurface::flush(BackendSurfaceAccess access, const GrFlushInfo& flushInfo) { in flush() argument 364 return asSB(this)->onFlush(access, flushInfo, nullptr); in flush()
|
/third_party/vk-gl-cts/framework/randomshaders/ |
H A D | rsgProgramExecutor.cpp | 241 ExecValueAccess access = execCtx.getValue(input->getVariable()); in execute() local 250 interpolateVertexInput(access, vtxNdx-packetStart, input->getValueRange(), xf, yf); in execute() 265 ExecConstValueAccess access = execCtx.getValue(output); in execute() local 271 copyVarying(varyingAccess, access, vtxNdx-packetStart); in execute() 317 ExecValueAccess access = execCtx.getValue(input->getVariable()); in execute() local 329 interpolateFragmentInput(access, fragNdx-packetStart, in execute()
|
/kernel/linux/linux-6.6/drivers/iommu/iommufd/ |
H A D | pages.c | 21 * If access_itree includes the PFN's index then an in-kernel access has 31 * means removing an iommu_domain or releasing a in-kernel access will not fail 1298 * If the range ends in a access then we do the residual unmap without in __iopt_area_unfill_domain() 1534 * iopt_pages_unfill_xarray() - Update the xarry after removing an access 1540 * The access should already be removed from the access_itree. 1570 /* Otherwise covered by an existing access */ in iopt_pages_unfill_xarray() 1903 * iopt_area_add_access() - Record an in-knerel access for PFNs 1910 * Record that an in-kernel access will be accessing the pages, ensure they are 1920 struct iopt_pages_access *access; in iopt_area_add_access() local 1927 access in iopt_area_add_access() 1975 struct iopt_pages_access *access; iopt_area_remove_access() local [all...] |
/kernel/linux/linux-5.10/sound/pci/oxygen/ |
H A D | oxygen_mixer.c | 741 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | \ 758 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 799 .access = SNDRV_CTL_ELEM_ACCESS_READ, 807 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 820 .access = SNDRV_CTL_ELEM_ACCESS_READ, 828 .access = SNDRV_CTL_ELEM_ACCESS_READ, 868 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 893 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 920 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 947 .access [all...] |
/kernel/linux/linux-6.6/sound/pci/oxygen/ |
H A D | oxygen_mixer.c | 741 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | \ 758 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE, 799 .access = SNDRV_CTL_ELEM_ACCESS_READ, 807 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 820 .access = SNDRV_CTL_ELEM_ACCESS_READ, 828 .access = SNDRV_CTL_ELEM_ACCESS_READ, 868 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 893 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 920 .access = SNDRV_CTL_ELEM_ACCESS_READWRITE | 947 .access [all...] |
/kernel/linux/linux-5.10/sound/soc/ |
H A D | soc-topology.c | 581 && (k->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ in soc_tplg_kcontrol_bind_io() 582 || k->access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE) in soc_tplg_kcontrol_bind_io() 583 && k->access & SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK) { in soc_tplg_kcontrol_bind_io() 605 k->access |= SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK; in soc_tplg_kcontrol_bind_io() 618 if ((k->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ) && !sbe->get) in soc_tplg_kcontrol_bind_io() 620 if ((k->access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE) && !sbe->put) in soc_tplg_kcontrol_bind_io() 722 u32 access = le32_to_cpu(tc->access); in soc_tplg_create_tlv() local 724 if (!(access & SNDRV_CTL_ELEM_ACCESS_TLV_READWRITE)) in soc_tplg_create_tlv() 727 if (!(access in soc_tplg_create_tlv() [all...] |
/kernel/linux/linux-6.6/sound/soc/ |
H A D | soc-topology.c | 479 && (k->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ in soc_tplg_kcontrol_bind_io() 480 || k->access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE) in soc_tplg_kcontrol_bind_io() 481 && k->access & SNDRV_CTL_ELEM_ACCESS_TLV_CALLBACK) { in soc_tplg_kcontrol_bind_io() 503 k->access |= SNDRV_CTL_ELEM_ACCESS_SKIP_CHECK; in soc_tplg_kcontrol_bind_io() 516 if ((k->access & SNDRV_CTL_ELEM_ACCESS_TLV_READ) && !sbe->get) in soc_tplg_kcontrol_bind_io() 518 if ((k->access & SNDRV_CTL_ELEM_ACCESS_TLV_WRITE) && !sbe->put) in soc_tplg_kcontrol_bind_io() 624 u32 access = le32_to_cpu(tc->access); in soc_tplg_create_tlv() local 626 if (!(access & SNDRV_CTL_ELEM_ACCESS_TLV_READWRITE)) in soc_tplg_create_tlv() 629 if (!(access in soc_tplg_create_tlv() [all...] |
/device/soc/rockchip/common/vendor/drivers/gpu/arm/midgard/ |
H A D | mali_kbase_regs_history_debugfs.c | 43 * regs_history_show - show callback for the register access history file. 61 seq_puts(sfile, "The register access history is disabled\n"); in regs_history_show() 71 char const access = (io->addr & 1) ? 'w' : 'r'; in regs_history_show() local 73 seq_printf(sfile, "%6i: %c: reg 0x%p val %08x\n", i, access, (void *)(io->addr & ~0x1), io->value); in regs_history_show()
|
/device/soc/rockchip/common/kernel/drivers/gpu/arm/midgard/ |
H A D | mali_kbase_regs_history_debugfs.c | 51 * regs_history_show - show callback for the register access history file. 69 seq_puts(sfile, "The register access history is disabled\n"); in regs_history_show() 81 char const access = (io->addr & 1) ? 'w' : 'r'; in regs_history_show() local 83 seq_printf(sfile, "%6i: %c: reg 0x%p val %08x\n", i, access, in regs_history_show()
|
/kernel/linux/linux-5.10/tools/lib/subcmd/ |
H A D | pager.c | 84 if (!(pager || access("/usr/bin/pager", X_OK))) in setup_pager() 86 if (!(pager || access("/usr/bin/less", X_OK))) in setup_pager()
|
/kernel/linux/linux-5.10/include/rdma/ |
H A D | ib_umem.h | 75 size_t size, int access); 89 int access) in ib_umem_get() 87 ib_umem_get(struct ib_device *device, unsigned long addr, size_t size, int access) ib_umem_get() argument
|
/kernel/linux/linux-6.6/tools/lib/subcmd/ |
H A D | pager.c | 84 if (!(pager || access("/usr/bin/pager", X_OK))) in setup_pager() 86 if (!(pager || access("/usr/bin/less", X_OK))) in setup_pager()
|
/third_party/alsa-utils/axfer/ |
H A D | xfer.h | 65 snd_pcm_access_t *access, 91 snd_pcm_access_t *access,
|