| /tools/testing/selftests/bpf/progs/ |
| A D | dev_cgroup.c | 17 short access = ctx->access_type >> 16; in bpf_prog1() local 32 if (access & BPF_DEVCG_ACC_READ) in bpf_prog1() 35 if (access & BPF_DEVCG_ACC_WRITE) in bpf_prog1() 38 if (access & BPF_DEVCG_ACC_MKNOD) in bpf_prog1()
|
| /tools/testing/selftests/landlock/ |
| A D | fs_test.c | 600 __u64 access; in TEST_F_FORK() local 621 for (access = 1; access <= ACCESS_LAST; access <<= 1) { in TEST_F_FORK() 660 __u64 access; in TEST_F_FORK() local 674 for (access = 1ULL << 63; access != ACCESS_LAST; access >>= 1) { in TEST_F_FORK() 692 __u64 access; in TEST_F_FORK() local 701 for (access = 1; access > 0; access <<= 1) { in TEST_F_FORK() 744 __u64 access; member 785 if (!rules[i].access) in create_ruleset() 848 .access = ACCESS_RO, in TEST_F_FORK() 871 .access = ACCESS_RO, in TEST_F_FORK() [all …]
|
| A D | net_test.c | 1320 __u64 access; in TEST_F() local 1326 for (access = 1; access <= ACCESS_LAST; access <<= 1) { in TEST_F() 1327 net_port.allowed_access = access; in TEST_F() 1333 access, strerror(errno)); in TEST_F() 1365 __u64 access; in TEST_F() local 1371 for (access = 1ULL << 63; access != ACCESS_LAST; access >>= 1) { in TEST_F() 1372 net_port.allowed_access = access; in TEST_F() 1390 __u64 access; in TEST_F() local 1396 for (access = 1; access > 0; access <<= 1) { in TEST_F() 1969 EXPECT_EQ(0, records.access); in TEST_F() [all …]
|
| A D | audit_test.c | 411 EXPECT_EQ(0, records.access); in TEST_F() 413 EXPECT_EQ(1, records.access); in TEST_F() 603 EXPECT_EQ(0, records.access); in TEST_F() 622 EXPECT_EQ(0, records.access); in TEST_F() 646 EXPECT_EQ(0, records.access); in TEST_F() 669 EXPECT_EQ(0, records.access); in TEST_F()
|
| /tools/testing/selftests/alsa/conf.d/ |
| A D | Lenovo_ThinkPad_P1_Gen2.conf | 43 access RW_INTERLEAVED # can be omitted - default 51 access RW_INTERLEAVED 59 access RW_INTERLEAVED
|
| /tools/testing/selftests/exec/ |
| A D | check-exec.c | 71 FIXTURE(access) in FIXTURE() argument 77 FIXTURE_VARIANT(access) in FIXTURE_VARIANT() argument 84 FIXTURE_VARIANT_ADD(access, mount_exec_file_exec) { in FIXTURE_VARIANT_ADD() argument 91 FIXTURE_VARIANT_ADD(access, mount_exec_file_noexec) { in FIXTURE_VARIANT_ADD() argument 119 FIXTURE_SETUP(access) in FIXTURE_SETUP() argument 173 FIXTURE_TEARDOWN_PARENT(access) in FIXTURE_TEARDOWN_PARENT() argument 267 TEST_F(access, regular_file_empty) in TEST_F() argument 277 TEST_F(access, regular_file_elf) in TEST_F() argument 290 TEST_F(access, memfd_empty) in TEST_F() argument 300 TEST_F(access, memfd_elf) in TEST_F() argument [all …]
|
| /tools/perf/Documentation/ |
| A D | security.txt | 8 Enabling LSM based mandatory access control (MAC) to perf_event_open() syscall 11 LSM hooks for mandatory access control for perf_event_open() syscall can be 13 Targeted policy with perf_event_open() access control capabilities: 127 Opening access to perf_event_open() syscall on Fedora with SELinux 133 and prevent unauthorized access to perf_event_open() syscall. In such case 139 Enforced MAC policy settings (SELinux) can limit access to performance 141 more perf_event access control information and adjusting the policy. 143 access to performance monitoring and observability operations for users 148 >= 0: Disallow raw and ftrace function tracepoint access 149 >= 1: Disallow CPU event access [all …]
|
| A D | guestmount.txt | 3 root directories under <path> by a specific filesystem access method,
|
| A D | perf-mem.txt | 19 right set of options to display a memory access profile. By default, loads 111 - tlb: type of tlb access for the data at the time of the sample 112 - mem: type of memory access for the data at the time of the sample 117 - blocked: reason of blocked load access for the data at the time of the sample 134 - snoop: snoop result for the sampled data access 197 # Overhead Samples Memory access Snoop
|
| A D | perf-amd-ibs.txt | 166 perf mem is a memory access profiler tool and perf c2c is a shared data 173 A normal perf mem report output will provide detailed memory access profile. 174 New output fields will show related access info together. For example: 196 Also, it can be aggregated based on various memory access info using the 205 # Overhead Samples Memory access Snoop
|
| /tools/memory-model/litmus-tests/ |
| A D | README | 74 Protect the access with a lock and an smp_mb__after_spinlock() 79 Protect the access with a lock in one process, and use an 84 As below, but with the second access of the writer process 85 and the first access of reader process protected by a lock. 94 As below, but with the first access of the writer process 95 and the second access of reader process protected by a lock. 214 accesses with descriptions of the second access in the pair. 227 This is related to P0()'s second access by program order ("po"), 233 access, and the resulting descriptor is "Fre". P1()'s first access is 238 "Rfi Once PodRR Once". Another fre links P1()'s last access to [all …]
|
| /tools/lib/subcmd/ |
| A D | pager.c | 84 if (!(pager || access("/usr/bin/pager", X_OK))) in setup_pager() 86 if (!(pager || access("/usr/bin/less", X_OK))) in setup_pager()
|
| /tools/perf/trace/strace/groups/ |
| A D | file | 1 access
|
| A D | string | 1 access
|
| /tools/testing/selftests/bpf/prog_tests/ |
| A D | test_bpffs.c | 109 err = access(TDIR "/fs1/b/1", F_OK); in fn() 125 err = access(TDIR "/fs1/c/1", F_OK); in fn() 135 err = access(TDIR "/fs1/b", F_OK); in fn()
|
| /tools/testing/selftests/powerpc/mm/ |
| A D | prot_sao.c | 28 access("/proc/device-tree/rtas/ibm,hypertas-functions", F_OK) == 0); in test_prot_sao()
|
| /tools/perf/arch/ |
| A D | common.c | 121 if (access(buf, F_OK) == 0) { in lookup_path() 164 if (access(buf, F_OK) == 0) in perf_env__lookup_binutils_path()
|
| /tools/testing/selftests/alsa/ |
| A D | test-pcmtest-driver.c | 26 snd_pcm_access_t access; member 96 snd_pcm_hw_params_set_access(*handle, hwparams, params->access); in setup_handle() 142 self->params.access = SND_PCM_ACCESS_RW_INTERLEAVED; in FIXTURE_SETUP() 250 params.access = SND_PCM_ACCESS_RW_NONINTERLEAVED; in TEST_F() 285 params.access = SND_PCM_ACCESS_RW_NONINTERLEAVED; in TEST_F()
|
| /tools/testing/selftests/powerpc/mce/ |
| A D | inject-ra-err.c | 42 SKIP_IF(access(devname, F_OK)); in test_ra_error()
|
| /tools/perf/util/ |
| A D | fncache.c | 65 res = access(name, R_OK) == 0; in file_available()
|
| /tools/memory-model/Documentation/ |
| A D | glossary.txt | 7 Address Dependency: When the address of a later memory access is computed 9 dependency" extends from that load extending to the later access. 119 accesses, or a marked access such as atomic_add_return() 124 guarantees the first access precedes the second. For more 128 Marked Access: An access to a variable that uses an special function or 158 Relaxed: A marked access that does not imply ordering, for example, a 175 Unmarked Access: An access to a variable that uses normal C-language
|
| A D | README | 26 o You need to locklessly access shared variables that are otherwise 42 from KCSAN: access-marking.txt 64 access-marking.txt
|
| /tools/testing/selftests/powerpc/dscr/ |
| A D | dscr_sysfs_test.c | 55 if (access(file, F_OK)) in check_all_cpu_dscr_defaults()
|
| /tools/include/nolibc/ |
| A D | unistd.h | 46 int access(const char *path, int amode) in access() function
|
| /tools/testing/selftests/timens/ |
| A D | timens.h | 107 if (access("/proc/self/ns/time", F_OK) < 0) in nscheck()
|