/linux-5.19.10/drivers/xen/ |
D | grant-dma-ops.c | 32 static inline dma_addr_t grant_to_dma(grant_ref_t grant) in grant_to_dma() argument 34 return XEN_GRANT_DMA_ADDR_OFF | ((dma_addr_t)grant << PAGE_SHIFT); in grant_to_dma() 69 grant_ref_t grant; in xen_grant_dma_alloc() local 85 if (gnttab_alloc_grant_reference_seq(n_pages, &grant)) { in xen_grant_dma_alloc() 91 gnttab_grant_foreign_access_ref(grant + i, data->backend_domid, in xen_grant_dma_alloc() 95 *dma_handle = grant_to_dma(grant); in xen_grant_dma_alloc() 105 grant_ref_t grant; in xen_grant_dma_free() local 114 grant = dma_to_grant(dma_handle); in xen_grant_dma_free() 117 if (unlikely(!gnttab_end_foreign_access_ref(grant + i))) { in xen_grant_dma_free() 124 gnttab_free_grant_reference_seq(grant, n_pages); in xen_grant_dma_free() [all …]
|
D | Makefile | 3 obj-y += grant-table.o features.o balloon.o manage.o time.o 42 obj-$(CONFIG_XEN_GRANT_DMA_OPS) += grant-dma-ops.o 43 obj-$(CONFIG_XEN_GRANT_DMA_IOMMU) += grant-dma-iommu.o
|
D | Kconfig | 137 tristate "userspace grant access device driver" 145 bool "Add support for dma-buf grant access device driver extension" 150 dma-buf implementation. With this extension grant references to 152 use and grant references coming from a foreign domain can be 156 tristate "User-space grant reference allocator driver" 165 bool "Allow allocating DMA capable buffers with grant reference module" 168 Extends grant table module API to allow allocating DMA capable 169 buffers and mapping foreign grant references on top of it. 334 memory regions, including grant maps and foreign pages. This avoids 362 Require virtio for Xen guests to use grant mappings.
|
D | xen-scsiback.c | 452 struct page **pg, grant_handle_t *grant, int cnt) in scsiback_gnttab_data_map_batch() argument 469 grant[i] = map[i].handle; in scsiback_gnttab_data_map_batch() 476 grant_handle_t *grant, int cnt, u32 flags) in scsiback_gnttab_data_map_list() argument 493 err = scsiback_gnttab_data_map_batch(map, pg, grant, mapcount); in scsiback_gnttab_data_map_list() 495 grant += mapcount; in scsiback_gnttab_data_map_list() 501 err = scsiback_gnttab_data_map_batch(map, pg, grant, mapcount); in scsiback_gnttab_data_map_list() 517 grant_handle_t *grant; in scsiback_gnttab_data_map() local 571 grant = pending_req->grant_handles + nr_sgl; in scsiback_gnttab_data_map() 575 pg, grant, nr_segments, flags); in scsiback_gnttab_data_map() 585 pg, grant, n_segs, flags); in scsiback_gnttab_data_map() [all …]
|
/linux-5.19.10/Documentation/devicetree/bindings/iommu/ |
D | xen,grant-dma.yaml | 4 $id: http://devicetree.org/schemas/iommu/xen,grant-dma.yaml# 13 The Xen IOMMU represents the Xen grant table interface. Grant mappings 16 The binding is required to restrict memory access using Xen grant mappings. 20 const: xen,grant-dma 37 compatible = "xen,grant-dma";
|
/linux-5.19.10/Documentation/ABI/testing/ |
D | sysfs-fs-xfs | 23 The current state of the log reserve grant head. It 25 outstanding transactions. The grant head is exported in 34 The current state of the log write grant head. It 37 rolling transactions. The grant head is exported in
|
D | sysfs-driver-xen-blkback | 24 How long a persistent grant is allowed to remain 36 cache any page not backed by a grant mapping.
|
D | sysfs-firmware-ofw | 3 Contact: Grant Likely <grant.likely@arm.com>, devicetree@vger.kernel.org
|
/linux-5.19.10/arch/arm/xen/ |
D | Makefile | 2 obj-y := enlighten.o hypercall.o grant-table.o p2m.o mm.o
|
/linux-5.19.10/arch/arm64/xen/ |
D | Makefile | 2 xen-arm-y += $(addprefix ../../arm/xen/, enlighten.o grant-table.o p2m.o mm.o)
|
/linux-5.19.10/fs/xfs/ |
D | xfs_log.c | 202 xlog_assign_grant_head(&head->grant, 1, 0); in xlog_grant_head_init() 312 } while (xlog_space_left(log, &head->grant) < need_bytes); in xlog_grant_head_wait() 357 free_bytes = xlog_space_left(log, &head->grant); in xlog_grant_head_check() 434 xlog_grant_add_space(log, &log->l_write_head.grant, need_bytes); in xfs_log_regrant() 490 xlog_grant_add_space(log, &log->l_reserve_head.grant, need_bytes); in xfs_log_reserve() 491 xlog_grant_add_space(log, &log->l_write_head.grant, need_bytes); in xfs_log_reserve() 1155 free_bytes = xlog_space_left(log, &log->l_write_head.grant); in xfs_log_space_wake() 1164 free_bytes = xlog_space_left(log, &log->l_reserve_head.grant); in xfs_log_space_wake() 1699 free_bytes = xlog_space_left(log, &log->l_reserve_head.grant); in xlog_grant_push_threshold() 2041 xlog_grant_add_space(log, &log->l_reserve_head.grant, roundoff); in xlog_sync() [all …]
|
D | xfs_sysfs.c | 385 xlog_crack_grant_head(&log->l_reserve_head.grant, &cycle, &bytes); in reserve_grant_head_show() 399 xlog_crack_grant_head(&log->l_write_head.grant, &cycle, &bytes); in write_grant_head_show()
|
/linux-5.19.10/Documentation/devicetree/bindings/arm/ |
D | xen.txt | 13 Region 0 is reserved for mapping grant table, it must be always present. 14 The memory region is large enough to map the whole grant table (it is larger
|
/linux-5.19.10/drivers/block/ |
D | xen-blkfront.c | 87 struct grant { struct 104 struct grant **grants_used; argument 105 struct grant **indirect_grants; 313 struct grant *gnt_list_entry, *n; in fill_grant_buffer() 317 gnt_list_entry = kzalloc(sizeof(struct grant), GFP_NOIO); in fill_grant_buffer() 350 static struct grant *get_free_grant(struct blkfront_ring_info *rinfo) in get_free_grant() 352 struct grant *gnt_list_entry; in get_free_grant() 355 gnt_list_entry = list_first_entry(&rinfo->grants, struct grant, in get_free_grant() 365 static inline void grant_foreign_access(const struct grant *gnt_list_entry, in grant_foreign_access() 374 static struct grant *get_grant(grant_ref_t *gref_head, in get_grant() [all …]
|
/linux-5.19.10/Documentation/userspace-api/ |
D | no_new_privs.rst | 5 The execve system call can grant a newly-started program privileges that 26 promises not to grant the privilege to do anything that could not have
|
/linux-5.19.10/fs/ceph/ |
D | caps.c | 3344 struct ceph_mds_caps *grant, in handle_cap_grant() argument 3351 int seq = le32_to_cpu(grant->seq); in handle_cap_grant() 3352 int newcaps = le32_to_cpu(grant->caps); in handle_cap_grant() 3354 u64 size = le64_to_cpu(grant->size); in handle_cap_grant() 3355 u64 max_size = le64_to_cpu(grant->max_size); in handle_cap_grant() 3403 WARN_ON(cap->cap_id != le64_to_cpu(grant->cap_id)); in handle_cap_grant() 3418 umode_t mode = le32_to_cpu(grant->mode); in handle_cap_grant() 3425 inode->i_uid = make_kuid(&init_user_ns, le32_to_cpu(grant->uid)); in handle_cap_grant() 3426 inode->i_gid = make_kgid(&init_user_ns, le32_to_cpu(grant->gid)); in handle_cap_grant() 3435 set_nlink(inode, le32_to_cpu(grant->nlink)); in handle_cap_grant() [all …]
|
/linux-5.19.10/arch/x86/xen/ |
D | Makefile | 17 obj-y += grant-table.o
|
/linux-5.19.10/Documentation/devicetree/bindings/net/can/ |
D | mpc5xxx-mscan.txt | 5 Grant Likely <grant.likely@secretlab.ca>
|
/linux-5.19.10/net/sunrpc/xprtrdma/ |
D | rpc_rdma.c | 989 u32 grant) in __rpcrdma_update_cwnd_locked() argument 991 buf->rb_credits = grant; in __rpcrdma_update_cwnd_locked() 992 xprt->cwnd = grant << RPC_CWNDSHIFT; in __rpcrdma_update_cwnd_locked() 995 static void rpcrdma_update_cwnd(struct rpcrdma_xprt *r_xprt, u32 grant) in rpcrdma_update_cwnd() argument 1000 __rpcrdma_update_cwnd_locked(xprt, &r_xprt->rx_buf, grant); in rpcrdma_update_cwnd()
|
/linux-5.19.10/Documentation/translations/zh_CN/ |
D | gpio.txt | 9 Maintainer: Grant Likely <grant.likely@secretlab.ca> 18 英文版维护者: Grant Likely <grant.likely@secretlab.ca>
|
/linux-5.19.10/Documentation/translations/zh_TW/ |
D | gpio.txt | 9 Maintainer: Grant Likely <grant.likely@secretlab.ca> 19 英文版維護者: Grant Likely <grant.likely@secretlab.ca>
|
/linux-5.19.10/arch/powerpc/boot/dts/ |
D | media5200.dts | 6 * Grant Likely <grant.likely@secretlab.ca>
|
D | lite5200b.dts | 6 * Grant Likely <grant.likely@secretlab.ca>
|
D | amigaone.dts | 67 min-grant = <0>;
|
/linux-5.19.10/fs/ocfs2/dlm/ |
D | dlmconvert.c | 166 goto grant; in __dlmconvert_master() 187 grant: in __dlmconvert_master()
|