| /linux/drivers/clk/ti/ |
| H A D | apll.c | 36 struct dpll_data *ad; in dra7_apll_enable() local 41 ad = clk->dpll_data; in dra7_apll_enable() 42 if (!ad) in dra7_apll_enable() 47 state <<= __ffs(ad->idlest_mask); in dra7_apll_enable() 50 v = ti_clk_ll_ops->clk_readl(&ad->idlest_reg); in dra7_apll_enable() 52 if ((v & ad->idlest_mask) == state) in dra7_apll_enable() 55 v = ti_clk_ll_ops->clk_readl(&ad->control_reg); in dra7_apll_enable() 56 v &= ~ad->enable_mask; in dra7_apll_enable() 57 v |= APLL_FORCE_LOCK << __ffs(ad->enable_mask); in dra7_apll_enable() 58 ti_clk_ll_ops->clk_writel(v, &ad->control_reg); in dra7_apll_enable() [all …]
|
| /linux/sound/soc/ti/ |
| H A D | omap-hdmi.c | 50 struct hdmi_audio_data *ad = dev_get_drvdata(dev); in hdmi_dai_abort() local 52 mutex_lock(&ad->current_stream_lock); in hdmi_dai_abort() 53 if (ad->current_stream && ad->current_stream->runtime && in hdmi_dai_abort() 54 snd_pcm_running(ad->current_stream)) { in hdmi_dai_abort() 56 snd_pcm_stream_lock_irq(ad->current_stream); in hdmi_dai_abort() 57 snd_pcm_stop(ad->current_stream, SNDRV_PCM_STATE_DISCONNECTED); in hdmi_dai_abort() 58 snd_pcm_stream_unlock_irq(ad->current_stream); in hdmi_dai_abort() 60 mutex_unlock(&ad->current_stream_lock); in hdmi_dai_abort() 66 struct hdmi_audio_data *ad = card_drvdata_substream(substream); in hdmi_dai_startup() local 87 snd_soc_dai_set_dma_data(dai, substream, &ad->dma_data); in hdmi_dai_startup() [all …]
|
| /linux/drivers/dma/ |
| H A D | apple-admac.c | 150 static int admac_alloc_sram_carveout(struct admac_data *ad, in admac_alloc_sram_carveout() argument 156 ad->txcache.size = readl_relaxed(ad->base + REG_TX_SRAM_SIZE); in admac_alloc_sram_carveout() 157 ad->rxcache.size = readl_relaxed(ad->base + REG_RX_SRAM_SIZE); in admac_alloc_sram_carveout() 160 sram = &ad->txcache; in admac_alloc_sram_carveout() 162 sram = &ad->rxcache; in admac_alloc_sram_carveout() 164 mutex_lock(&ad->cache_alloc_lock); in admac_alloc_sram_carveout() 179 mutex_unlock(&ad->cache_alloc_lock); in admac_alloc_sram_carveout() 184 static void admac_free_sram_carveout(struct admac_data *ad, in admac_free_sram_carveout() argument 193 sram = &ad->txcache; in admac_free_sram_carveout() 195 sram = &ad->rxcache; in admac_free_sram_carveout() [all …]
|
| /linux/security/apparmor/ |
| H A D | audit.c | 94 struct apparmor_audit_data *ad = aad_of_va(va); in audit_pre() local 98 aa_audit_type[ad->type]); in audit_pre() 101 if (ad->op) in audit_pre() 102 audit_log_format(ab, " operation=\"%s\"", ad->op); in audit_pre() 104 if (ad->class) in audit_pre() 106 ad->class <= AA_CLASS_LAST ? in audit_pre() 107 aa_class_names[ad->class] : in audit_pre() 110 if (ad->info) { in audit_pre() 111 audit_log_format(ab, " info=\"%s\"", ad->info); in audit_pre() 112 if (ad->error) in audit_pre() [all …]
|
| H A D | ipc.c | 55 struct apparmor_audit_data *ad = aad(sa); in audit_signal_cb() local 57 if (ad->request & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 59 audit_signal_mask(ad->request)); in audit_signal_cb() 60 if (ad->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 62 audit_signal_mask(ad->denied)); in audit_signal_cb() 65 if (ad->signal == SIGUNKNOWN) in audit_signal_cb() 67 ad->unmappedsig); in audit_signal_cb() 68 else if (ad->signal < MAXMAPPED_SIGNAME) in audit_signal_cb() 69 audit_log_format(ab, " signal=%s", sig_names[ad->signal]); in audit_signal_cb() 72 ad->signal - SIGRT_BASE); in audit_signal_cb() [all …]
|
| H A D | af_unix.c | 176 struct apparmor_audit_data *ad) in match_label() argument 181 ad->peer = &peer->label; in match_label() 187 ad->info = "failed peer label match"; in match_label() 191 return aa_do_perms(profile, rule->policy, state, request, p, ad); in match_label() 203 struct apparmor_audit_data *ad) in profile_create_perm() argument 215 &ad->info); in profile_create_perm() 218 NULL, ad); in profile_create_perm() 221 return aa_profile_af_perm(profile, ad, AA_MAY_CREATE, family, type, in profile_create_perm() 226 struct apparmor_audit_data *ad, in profile_sk_perm() argument 240 return unix_fs_perm(ad->op, request, ad->subj_cred, in profile_sk_perm() [all …]
|
| H A D | task.c | 208 struct apparmor_audit_data *ad = aad(sa); in audit_ptrace_cb() local 210 if (ad->request & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 212 audit_ptrace_mask(ad->request)); in audit_ptrace_cb() 214 if (ad->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 216 audit_ptrace_mask(ad->denied)); in audit_ptrace_cb() 220 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_ptrace_cb() 229 struct apparmor_audit_data *ad) in profile_ptrace_perm() argument 234 ad->subj_cred = cred; in profile_ptrace_perm() 235 ad->peer = peer; in profile_ptrace_perm() 239 return aa_check_perms(profile, &perms, request, ad, audit_ptrace_cb); in profile_ptrace_perm() [all …]
|
| H A D | net.c | 117 struct apparmor_audit_data *ad = aad(sa); in audit_net_cb() local 119 if (address_family_names[ad->common.u.net->family]) in audit_net_cb() 121 address_family_names[ad->common.u.net->family]); in audit_net_cb() 124 ad->common.u.net->family); in audit_net_cb() 125 if (sock_type_names[ad->net.type]) in audit_net_cb() 127 sock_type_names[ad->net.type]); in audit_net_cb() 130 ad->net.type); in audit_net_cb() 131 audit_log_format(ab, " protocol=%d", ad->net.protocol); in audit_net_cb() 133 if (ad->request & NET_PERMS_MASK) { in audit_net_cb() 135 aa_audit_perm_mask(ab, ad->request, NULL, 0, in audit_net_cb() [all …]
|
| H A D | capability.c | 67 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile, in audit_caps() argument 76 ad->error = error; in audit_caps() 97 if (ad->subj_cred == ent->ad_subj_cred && ktime_get_ns() <= ent->ktime_ns_expiration[cap]) { in audit_caps() 104 ent->ad_subj_cred = get_cred(ad->subj_cred); in audit_caps() 109 return aa_audit(type, profile, ad, audit_cb); in audit_caps() 122 unsigned int opts, struct apparmor_audit_data *ad) in profile_capable() argument 128 state = RULE_MEDIATES(rules, ad->class); in profile_capable() 141 ad->info = "optional: no audit"; in profile_capable() 143 ad = NULL; in profile_capable() 145 return aa_check_perms(profile, &perms, request, ad, in profile_capable() [all …]
|
| H A D | resource.c | 33 struct apparmor_audit_data *ad = aad(sa); in audit_cb() local 36 rlim_names[ad->rlim.rlim], ad->rlim.max); in audit_cb() 37 if (ad->peer) { in audit_cb() 39 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_cb() 61 DEFINE_AUDIT_DATA(ad, LSM_AUDIT_DATA_NONE, AA_CLASS_RLIMITS, in audit_resource() 64 ad.subj_cred = subj_cred; in audit_resource() 65 ad.rlim.rlim = resource; in audit_resource() 66 ad.rlim.max = value; in audit_resource() 67 ad.peer = peer; in audit_resource() 68 ad.info = info; in audit_resource() [all …]
|
| H A D | file.c | 48 struct apparmor_audit_data *ad = aad(sa); in file_audit_cb() local 49 kuid_t fsuid = ad->subj_cred ? ad->subj_cred->fsuid : current_fsuid(); in file_audit_cb() 52 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 54 map_mask_to_chr_mask(ad->request)); in file_audit_cb() 57 if (ad->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 59 map_mask_to_chr_mask(ad->denied)); in file_audit_cb() 62 if (ad->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 66 from_kuid(&init_user_ns, ad->fs.ouid)); in file_audit_cb() 69 if (ad->peer) { in file_audit_cb() 71 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in file_audit_cb() [all …]
|
| H A D | mount.c | 91 struct apparmor_audit_data *ad = aad(sa); in audit_cb() local 93 if (ad->mnt.type) { in audit_cb() 95 audit_log_untrustedstring(ab, ad->mnt.type); in audit_cb() 97 if (ad->mnt.src_name) { in audit_cb() 99 audit_log_untrustedstring(ab, ad->mnt.src_name); in audit_cb() 101 if (ad->mnt.trans) { in audit_cb() 103 audit_log_untrustedstring(ab, ad->mnt.trans); in audit_cb() 105 if (ad->mnt.flags) { in audit_cb() 107 audit_mnt_flags(ab, ad->mnt.flags); in audit_cb() 110 if (ad->mnt.data) { in audit_cb() [all …]
|
| H A D | lib.c | 224 DEFINE_AUDIT_DATA(ad, LSM_AUDIT_DATA_NONE, AA_CLASS_NONE, NULL); in aa_info_message() 226 ad.info = str; in aa_info_message() 227 aa_audit_msg(AUDIT_APPARMOR_STATUS, &ad, NULL); in aa_info_message() 419 u32 request, struct apparmor_audit_data *ad, in aa_check_perms() argument 428 if (!request || !ad) in aa_check_perms() 447 if (!ad || !denied) in aa_check_perms() 451 if (ad) { in aa_check_perms() 452 ad->subj_label = &profile->label; in aa_check_perms() 453 ad->request = request; in aa_check_perms() 454 ad->denied = denied; in aa_check_perms() [all …]
|
| /linux/security/smack/ |
| H A D | smack_lsm.c | 417 struct smk_audit_info ad, *saip = NULL; in smk_ptrace_rule_check() local 423 smk_ad_init(&ad, func, LSM_AUDIT_DATA_TASK); in smk_ptrace_rule_check() 424 smk_ad_setfield_u_tsk(&ad, tracer); in smk_ptrace_rule_check() 425 saip = &ad; in smk_ptrace_rule_check() 881 struct smk_audit_info ad; in smack_sb_statfs() local 883 smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_DENTRY); in smack_sb_statfs() 884 smk_ad_setfield_u_fs_path_dentry(&ad, dentry); in smack_sb_statfs() 886 rc = smk_curacc(sbp->smk_floor, MAY_READ, &ad); in smack_sb_statfs() 1093 struct smk_audit_info ad; in smack_inode_link() local 1096 smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_DENTRY); in smack_inode_link() [all …]
|
| /linux/security/selinux/ |
| H A D | hooks.c | 234 static void __ad_net_init(struct common_audit_data *ad, in __ad_net_init() argument 238 ad->type = LSM_AUDIT_DATA_NET; in __ad_net_init() 239 ad->u.net = net; in __ad_net_init() 245 static void ad_net_init_from_sk(struct common_audit_data *ad, in ad_net_init_from_sk() argument 249 __ad_net_init(ad, net, 0, sk, 0); in ad_net_init_from_sk() 252 static void ad_net_init_from_iif(struct common_audit_data *ad, in ad_net_init_from_iif() argument 256 __ad_net_init(ad, net, ifindex, NULL, family); in ad_net_init_from_iif() 1638 struct common_audit_data ad; in cred_has_capability() local 1645 ad.type = LSM_AUDIT_DATA_CAP; in cred_has_capability() 1646 ad.u.cap = cap; in cred_has_capability() [all …]
|
| /linux/lib/crypto/ |
| H A D | chacha20poly1305.c | 56 const u8 *ad, const size_t ad_len, in __chacha20poly1305_encrypt() argument 69 poly1305_update(&poly1305_state, ad, ad_len); in __chacha20poly1305_encrypt() 90 const u8 *ad, const size_t ad_len, in chacha20poly1305_encrypt() argument 104 __chacha20poly1305_encrypt(dst, src, src_len, ad, ad_len, in chacha20poly1305_encrypt() 113 const u8 *ad, const size_t ad_len, in xchacha20poly1305_encrypt() argument 120 __chacha20poly1305_encrypt(dst, src, src_len, ad, ad_len, in xchacha20poly1305_encrypt() 127 const u8 *ad, const size_t ad_len, in __chacha20poly1305_decrypt() argument 146 poly1305_update(&poly1305_state, ad, ad_len); in __chacha20poly1305_decrypt() 171 const u8 *ad, const size_t ad_len, in chacha20poly1305_decrypt() argument 186 ret = __chacha20poly1305_decrypt(dst, src, src_len, ad, ad_len, in chacha20poly1305_decrypt() [all …]
|
| /linux/include/crypto/ |
| H A D | chacha20poly1305.h | 19 const u8 *ad, const size_t ad_len, 25 const u8 *ad, const size_t ad_len, const u64 nonce, 29 const u8 *ad, const size_t ad_len, 35 const u8 *ad, const size_t ad_len, 40 const u8 *ad, const size_t ad_len, 45 const u8 *ad, const size_t ad_len,
|
| /linux/tools/testing/selftests/drivers/net/mlxsw/ |
| H A D | q_in_q_veto.sh | 75 protocol 802.1ad id 100 2>/dev/null 79 protocol 802.1ad id 100 2>&1 >/dev/null \ 98 protocol 802.1ad id 100 2>/dev/null 102 protocol 802.1ad id 100 2>&1 >/dev/null \ 115 ip link add name bond1 type bond mode 802.3ad 120 protocol 802.1ad id 100 2>/dev/null 124 protocol 802.1ad id 100 2>&1 >/dev/null \ 159 vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 182 vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 186 ip link add name bond1 type bond mode 802.3ad [all …]
|
| H A D | vxlan_flooding.sh | 182 flower skip_hw dst_mac de:ad:be:ef:13:37 action pass 245 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 259 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 271 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 283 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 294 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 303 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 312 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1
|
| /linux/tools/testing/selftests/net/forwarding/ |
| H A D | bridge_vlan_aware.sh | 115 local mac=de:ad:be:ef:13:37 121 bridge fdb add de:ad:be:ef:13:37 dev $swp1 master extern_learn vlan 1 123 bridge fdb show brport $swp1 | grep -q de:ad:be:ef:13:37 131 bridge fdb show brport $swp1 | grep -q de:ad:be:ef:13:37 136 bridge fdb show brport $swp2 | grep -q de:ad:be:ef:13:37 141 bridge fdb del de:ad:be:ef:13:37 dev $swp2 master vlan 1 &> /dev/null 142 bridge fdb del de:ad:be:ef:13:37 dev $swp1 master vlan 1 &> /dev/null 147 local mac=de:ad:be:ef:13:37 200 local mac=de:ad:be:ef:13:37
|
| /linux/tools/testing/selftests/drivers/net/mlxsw/spectrum/ |
| H A D | vxlan_flooding_ipv6.sh | 229 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 245 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 259 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 273 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 284 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 293 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 302 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 311 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 320 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1
|
| /linux/include/linux/ |
| H A D | audit.h | 446 extern void __audit_ntp_log(const struct audit_ntp_data *ad); 567 static inline void audit_ntp_init(struct audit_ntp_data *ad) in audit_ntp_init() argument 569 memset(ad, 0, sizeof(*ad)); in audit_ntp_init() 572 static inline void audit_ntp_set_old(struct audit_ntp_data *ad, in audit_ntp_set_old() argument 575 ad->vals[type].oldval = val; in audit_ntp_set_old() 578 static inline void audit_ntp_set_new(struct audit_ntp_data *ad, in audit_ntp_set_new() argument 581 ad->vals[type].newval = val; in audit_ntp_set_new() 584 static inline void audit_ntp_log(const struct audit_ntp_data *ad) in audit_ntp_log() argument 587 __audit_ntp_log(ad); in audit_ntp_log() 712 static inline void audit_ntp_init(struct audit_ntp_data *ad) in audit_ntp_init() argument [all …]
|
| /linux/security/selinux/include/ |
| H A D | xfrm.h | 42 struct common_audit_data *ad); 44 struct common_audit_data *ad, u8 proto); 64 struct common_audit_data *ad) in selinux_xfrm_sock_rcv_skb() argument 70 struct common_audit_data *ad, in selinux_xfrm_postroute_last() argument
|
| /linux/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
| H A D | vxlan_flooding_ipv6.sh | 169 flower skip_hw dst_mac de:ad:be:ef:13:37 action pass 246 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 261 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 274 $MZ $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 287 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 298 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 307 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 316 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1 325 $MZ -6 $h1 -q -p 64 -b de:ad:be:ef:13:37 -t ip -c 1
|
| /linux/arch/arm64/crypto/ |
| H A D | ghash-ce-core.S | 71 .macro __pmull_p8, rq, ad, bd 72 ext t3.8b, \ad\().8b, \ad\().8b, #1 // A1 73 ext t5.8b, \ad\().8b, \ad\().8b, #2 // A2 74 ext t7.8b, \ad\().8b, \ad\().8b, #3 // A3 76 __pmull_p8_\bd \rq, \ad 79 .macro __pmull2_p8, rq, ad, bd 80 tbl t3.16b, {\ad\().16b}, perm1.16b // A1 81 tbl t5.16b, {\ad\().16b}, perm2.16b // A2 82 tbl t7.16b, {\ad\().16b}, perm3.16b // A3 84 __pmull2_p8_\bd \rq, \ad [all …]
|