Home
last modified time | relevance | path

Searched refs:user (Results 1 – 200 of 1385) sorted by relevance

1234567

/linux-4.1.27/arch/arm/mach-omap2/
Domap_hwmod_33xx_43xx_interconnect_data.c26 .user = OCP_USER_MPU,
34 .user = OCP_USER_MPU | OCP_USER_SDMA,
42 .user = OCP_USER_MPU | OCP_USER_SDMA,
50 .user = OCP_USER_MPU | OCP_USER_SDMA,
58 .user = OCP_USER_MPU | OCP_USER_SDMA,
66 .user = OCP_USER_MPU | OCP_USER_SDMA,
74 .user = OCP_USER_MPU | OCP_USER_SDMA,
82 .user = OCP_USER_MPU | OCP_USER_SDMA,
90 .user = OCP_USER_MPU | OCP_USER_SDMA,
98 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_2xxx_interconnect_data.c31 .user = OCP_USER_MPU | OCP_USER_SDMA,
38 .user = OCP_USER_MPU,
51 .user = OCP_USER_MPU | OCP_USER_SDMA,
58 .user = OCP_USER_MPU | OCP_USER_SDMA,
66 .user = OCP_USER_MPU | OCP_USER_SDMA,
74 .user = OCP_USER_MPU | OCP_USER_SDMA,
82 .user = OCP_USER_MPU | OCP_USER_SDMA,
90 .user = OCP_USER_MPU | OCP_USER_SDMA,
98 .user = OCP_USER_MPU | OCP_USER_SDMA,
106 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_43xx_data.c590 .user = OCP_USER_MPU | OCP_USER_SDMA,
597 .user = OCP_USER_MPU | OCP_USER_SDMA,
604 .user = OCP_USER_MPU | OCP_USER_SDMA,
611 .user = OCP_USER_MPU,
618 .user = OCP_USER_MPU,
625 .user = OCP_USER_MPU,
632 .user = OCP_USER_MPU,
639 .user = OCP_USER_MPU,
646 .user = OCP_USER_MPU | OCP_USER_SDMA,
653 .user = OCP_USER_MPU,
[all …]
Domap_hwmod_7xx_data.c2329 .user = OCP_USER_MPU | OCP_USER_SDMA,
2337 .user = OCP_USER_MPU | OCP_USER_SDMA,
2345 .user = OCP_USER_MPU,
2353 .user = OCP_USER_MPU,
2361 .user = OCP_USER_MPU | OCP_USER_SDMA,
2369 .user = OCP_USER_MPU | OCP_USER_SDMA,
2377 .user = OCP_USER_MPU | OCP_USER_SDMA,
2385 .user = OCP_USER_MPU | OCP_USER_SDMA,
2393 .user = OCP_USER_MPU | OCP_USER_SDMA,
2401 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_44xx_data.c2122 .user = OCP_USER_MPU | OCP_USER_SDMA,
2169 .user = OCP_USER_MPU | OCP_USER_SDMA,
3158 .user = OCP_USER_SDMA,
3166 .user = OCP_USER_MPU,
3174 .user = OCP_USER_MPU | OCP_USER_SDMA,
3182 .user = OCP_USER_MPU | OCP_USER_SDMA,
3190 .user = OCP_USER_MPU | OCP_USER_SDMA,
3198 .user = OCP_USER_MPU | OCP_USER_SDMA,
3206 .user = OCP_USER_MPU | OCP_USER_SDMA,
3214 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_2420_data.c286 .user = OCP_USER_MPU | OCP_USER_SDMA,
294 .user = OCP_USER_MPU | OCP_USER_SDMA,
302 .user = OCP_USER_MPU | OCP_USER_SDMA,
310 .user = OCP_USER_MPU | OCP_USER_SDMA,
318 .user = OCP_USER_MPU | OCP_USER_SDMA,
326 .user = OCP_USER_MPU | OCP_USER_SDMA,
334 .user = OCP_USER_MPU | OCP_USER_SDMA,
342 .user = OCP_USER_MPU | OCP_USER_SDMA,
350 .user = OCP_USER_MPU | OCP_USER_SDMA,
358 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_2430_data.c447 .user = OCP_USER_MPU,
455 .user = OCP_USER_MPU | OCP_USER_SDMA,
463 .user = OCP_USER_MPU | OCP_USER_SDMA,
471 .user = OCP_USER_MPU,
479 .user = OCP_USER_MPU | OCP_USER_SDMA,
487 .user = OCP_USER_MPU | OCP_USER_SDMA,
495 .user = OCP_USER_MPU | OCP_USER_SDMA,
503 .user = OCP_USER_MPU | OCP_USER_SDMA,
511 .user = OCP_USER_MPU | OCP_USER_SDMA,
519 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_54xx_data.c2041 .user = OCP_USER_MPU | OCP_USER_SDMA,
2098 .user = OCP_USER_MPU | OCP_USER_SDMA,
2110 .user = OCP_USER_SDMA,
2118 .user = OCP_USER_MPU | OCP_USER_SDMA,
2126 .user = OCP_USER_MPU | OCP_USER_SDMA,
2134 .user = OCP_USER_MPU | OCP_USER_SDMA,
2142 .user = OCP_USER_MPU | OCP_USER_SDMA,
2150 .user = OCP_USER_MPU,
2158 .user = OCP_USER_MPU,
2166 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_81xx_data.c144 .user = OCP_USER_MPU,
151 .user = OCP_USER_MPU,
172 .user = OCP_USER_MPU,
179 .user = OCP_USER_MPU,
218 .user = OCP_USER_MPU,
239 .user = OCP_USER_MPU,
260 .user = OCP_USER_MPU,
297 .user = OCP_USER_MPU,
334 .user = OCP_USER_MPU,
365 .user = OCP_USER_MPU,
[all …]
Domap_hwmod_33xx_data.c350 .user = OCP_USER_MPU | OCP_USER_SDMA,
358 .user = OCP_USER_MPU | OCP_USER_SDMA,
366 .user = OCP_USER_MPU | OCP_USER_SDMA,
374 .user = OCP_USER_MPU | OCP_USER_SDMA,
382 .user = OCP_USER_MPU | OCP_USER_SDMA,
400 .user = OCP_USER_MPU,
408 .user = OCP_USER_MPU,
416 .user = OCP_USER_MPU,
424 .user = OCP_USER_MPU,
432 .user = OCP_USER_MPU,
[all …]
Domap_hwmod_3xxx_data.c2192 .user = OCP_USER_MPU | OCP_USER_SDMA,
2199 .user = OCP_USER_MPU | OCP_USER_SDMA,
2216 .user = OCP_USER_MPU,
2233 .user = OCP_USER_MPU,
2240 .user = OCP_USER_MPU | OCP_USER_SDMA,
2252 .user = OCP_USER_MPU | OCP_USER_SDMA,
2260 .user = OCP_USER_MPU,
2268 .user = OCP_USER_MPU,
2276 .user = OCP_USER_MPU,
2283 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Dpm-debug.c77 static int clkdm_dbg_show_counter(struct clockdomain *clkdm, void *user) in clkdm_dbg_show_counter() argument
79 struct seq_file *s = (struct seq_file *)user; in clkdm_dbg_show_counter()
92 static int pwrdm_dbg_show_counter(struct powerdomain *pwrdm, void *user) in pwrdm_dbg_show_counter() argument
94 struct seq_file *s = (struct seq_file *)user; in pwrdm_dbg_show_counter()
122 static int pwrdm_dbg_show_timer(struct powerdomain *pwrdm, void *user) in pwrdm_dbg_show_timer() argument
124 struct seq_file *s = (struct seq_file *)user; in pwrdm_dbg_show_timer()
Dpowerdomain.h209 int pwrdm_for_each(int (*fn)(struct powerdomain *pwrdm, void *user),
210 void *user);
211 int pwrdm_for_each_nolock(int (*fn)(struct powerdomain *pwrdm, void *user),
212 void *user);
/linux-4.1.27/fs/ncpfs/
Dioctl.c162 struct ncp_nls_ioctl user; in ncp_set_charsets() local
170 if (copy_from_user(&user, arg, sizeof(user))) in ncp_set_charsets()
174 user.codepage[NCP_IOCSNAME_LEN] = 0; in ncp_set_charsets()
175 if (!user.codepage[0] || !strcmp(user.codepage, "default")) in ncp_set_charsets()
178 codepage = load_nls(user.codepage); in ncp_set_charsets()
185 user.iocharset[NCP_IOCSNAME_LEN] = 0; in ncp_set_charsets()
186 if (!user.iocharset[0] || !strcmp(user.iocharset, "default")) { in ncp_set_charsets()
189 } else if (!strcmp(user.iocharset, "utf8")) { in ncp_set_charsets()
193 iocharset = load_nls(user.iocharset); in ncp_set_charsets()
227 struct ncp_nls_ioctl user; in ncp_get_charsets() local
[all …]
/linux-4.1.27/include/linux/
Dipmi.h63 ipmi_user_t user; member
105 ipmi_user_t *user);
113 int ipmi_destroy_user(ipmi_user_t user);
116 void ipmi_get_version(ipmi_user_t user,
126 int ipmi_set_my_address(ipmi_user_t user,
129 int ipmi_get_my_address(ipmi_user_t user,
132 int ipmi_set_my_LUN(ipmi_user_t user,
135 int ipmi_get_my_LUN(ipmi_user_t user,
152 int ipmi_request_settime(ipmi_user_t user,
170 int ipmi_request_supply_msgs(ipmi_user_t user,
[all …]
Ddcookies.h34 void dcookie_unregister(struct dcookie_user * user);
56 static inline void dcookie_unregister(struct dcookie_user * user) in dcookie_unregister() argument
Dkernel_stat.h87 static inline void account_process_tick(struct task_struct *tsk, int user) in account_process_tick() argument
92 extern void account_process_tick(struct task_struct *, int user);
/linux-4.1.27/arch/m68k/ifpsp060/
Dos.S57 | Each IO routine checks to see if the memory write/read is to/from user
60 | for user mode applications.
71 | working in user space
80 | a1 - user destination address
82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
110 | a0 - user source address
113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
140 | Read a data byte from user memory.
143 | a0 - user source address
144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
[all …]
/linux-4.1.27/net/bridge/netfilter/
Debt_mark_m.c47 const struct compat_ebt_mark_m_info *user = src; in mark_mt_compat_from_user() local
50 kern->mark = user->mark; in mark_mt_compat_from_user()
51 kern->mask = user->mask; in mark_mt_compat_from_user()
52 kern->invert = user->invert; in mark_mt_compat_from_user()
53 kern->bitmask = user->bitmask; in mark_mt_compat_from_user()
58 struct compat_ebt_mark_m_info __user *user = dst; in mark_mt_compat_to_user() local
61 if (put_user(kern->mark, &user->mark) || in mark_mt_compat_to_user()
62 put_user(kern->mask, &user->mask) || in mark_mt_compat_to_user()
63 put_user(kern->invert, &user->invert) || in mark_mt_compat_to_user()
64 put_user(kern->bitmask, &user->bitmask)) in mark_mt_compat_to_user()
Debt_mark.c63 const struct compat_ebt_mark_t_info *user = src; in mark_tg_compat_from_user() local
66 kern->mark = user->mark; in mark_tg_compat_from_user()
67 kern->target = user->target; in mark_tg_compat_from_user()
72 struct compat_ebt_mark_t_info __user *user = dst; in mark_tg_compat_to_user() local
75 if (put_user(kern->mark, &user->mark) || in mark_tg_compat_to_user()
76 put_user(kern->target, &user->target)) in mark_tg_compat_to_user()
Debt_limit.c58 user2credits(u_int32_t user) in user2credits() argument
61 if (user > 0xFFFFFFFF / (HZ*CREDITS_PER_JIFFY)) in user2credits()
63 return (user / EBT_LIMIT_SCALE) * HZ * CREDITS_PER_JIFFY; in user2credits()
65 return (user * HZ * CREDITS_PER_JIFFY) / EBT_LIMIT_SCALE; in user2credits()
Debtables.c1095 static int do_replace(struct net *net, const void __user *user, in do_replace() argument
1102 if (copy_from_user(&tmp, user, sizeof(tmp)) != 0) in do_replace()
1281 const void __user *user, unsigned int len) in do_update_counters() argument
1327 static int update_counters(struct net *net, const void __user *user, in update_counters() argument
1332 if (copy_from_user(&hlp, user, sizeof(hlp))) in update_counters()
1339 hlp.num_counters, user, len); in update_counters()
1396 void __user *user, unsigned int num_counters, in copy_counters_to_user() argument
1419 if (copy_to_user(user, counterstmp, in copy_counters_to_user()
1427 static int copy_everything_to_user(struct ebt_table *t, void __user *user, in copy_everything_to_user() argument
1448 if (copy_from_user(&tmp, user, sizeof(tmp))) in copy_everything_to_user()
[all …]
/linux-4.1.27/security/keys/
Dkey.c56 struct key_user *candidate = NULL, *user; in key_user_lookup() local
67 user = rb_entry(parent, struct key_user, node); in key_user_lookup()
69 if (uid_lt(uid, user->uid)) in key_user_lookup()
71 else if (uid_gt(uid, user->uid)) in key_user_lookup()
83 user = NULL; in key_user_lookup()
108 user = candidate; in key_user_lookup()
113 atomic_inc(&user->usage); in key_user_lookup()
117 return user; in key_user_lookup()
123 void key_user_put(struct key_user *user) in key_user_put() argument
125 if (atomic_dec_and_lock(&user->usage, &key_user_lock)) { in key_user_put()
[all …]
Dproc.c92 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next()
129 if (kuid_has_mapping(user_ns, minkey->user->uid)) in find_ge_key()
275 struct key_user *user = rb_entry(n, struct key_user, node); in __key_user_next() local
276 if (kuid_has_mapping(user_ns, user->uid)) in __key_user_next()
335 struct key_user *user = rb_entry(_p, struct key_user, node); in proc_key_users_show() local
336 unsigned maxkeys = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show()
338 unsigned maxbytes = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show()
342 from_kuid_munged(seq_user_ns(m), user->uid), in proc_key_users_show()
343 atomic_read(&user->usage), in proc_key_users_show()
344 atomic_read(&user->nkeys), in proc_key_users_show()
[all …]
Dprocess_keys.c45 struct user_struct *user; in install_user_keyrings() local
55 user = cred->user; in install_user_keyrings()
56 uid = from_kuid(cred->user_ns, user->uid); in install_user_keyrings()
58 kenter("%p{%u}", user, uid); in install_user_keyrings()
60 if (user->uid_keyring && user->session_keyring) { in install_user_keyrings()
68 if (!user->uid_keyring) { in install_user_keyrings()
77 uid_keyring = keyring_alloc(buf, user->uid, INVALID_GID, in install_user_keyrings()
93 keyring_alloc(buf, user->uid, INVALID_GID, in install_user_keyrings()
109 user->uid_keyring = uid_keyring; in install_user_keyrings()
110 user->session_keyring = session_keyring; in install_user_keyrings()
[all …]
Drequest_key.c150 session = cred->user->session_keyring; in call_sbin_request_key()
305 key_get(cred->user->session_keyring); in construct_get_dest_keyring()
309 dest_keyring = key_get(cred->user->uid_keyring); in construct_get_dest_keyring()
333 struct key_user *user, in construct_alloc_key() argument
346 mutex_lock(&user->cons_lock); in construct_alloc_key()
385 mutex_unlock(&user->cons_lock); in construct_alloc_key()
404 mutex_unlock(&user->cons_lock); in construct_alloc_key()
410 mutex_unlock(&user->cons_lock); in construct_alloc_key()
416 mutex_unlock(&user->cons_lock); in construct_alloc_key()
422 mutex_unlock(&user->cons_lock); in construct_alloc_key()
[all …]
Dgc.c147 spin_lock(&key->user->lock); in key_gc_unused_keys()
148 key->user->qnkeys--; in key_gc_unused_keys()
149 key->user->qnbytes -= key->quotalen; in key_gc_unused_keys()
150 spin_unlock(&key->user->lock); in key_gc_unused_keys()
153 atomic_dec(&key->user->nkeys); in key_gc_unused_keys()
155 atomic_dec(&key->user->nikeys); in key_gc_unused_keys()
157 key_user_put(key->user); in key_gc_unused_keys()
Dkeyctl.c793 long keyctl_chown_key(key_serial_t id, uid_t user, gid_t group) in keyctl_chown_key() argument
802 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key()
805 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key()
811 if (user == (uid_t) -1 && group == (gid_t) -1) in keyctl_chown_key()
829 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key()
839 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key()
863 spin_lock(&key->user->lock); in keyctl_chown_key()
864 key->user->qnkeys--; in keyctl_chown_key()
865 key->user->qnbytes -= key->quotalen; in keyctl_chown_key()
866 spin_unlock(&key->user->lock); in keyctl_chown_key()
[all …]
/linux-4.1.27/drivers/char/ipmi/
Dipmi_poweroff.c64 static void (*specific_poweroff_func)(ipmi_user_t user);
141 static int ipmi_request_wait_for_response(ipmi_user_t user, in ipmi_request_wait_for_response() argument
150 rv = ipmi_request_supply_msgs(user, addr, 0, send_msg, &comp, in ipmi_request_wait_for_response()
161 static int ipmi_request_in_rc_mode(ipmi_user_t user, in ipmi_request_in_rc_mode() argument
168 rv = ipmi_request_supply_msgs(user, addr, 0, send_msg, NULL, in ipmi_request_in_rc_mode()
179 ipmi_poll_interface(user); in ipmi_request_in_rc_mode()
201 static void (*atca_oem_poweroff_hook)(ipmi_user_t user);
203 static void pps_poweroff_atca(ipmi_user_t user) in pps_poweroff_atca() argument
221 rv = ipmi_request_in_rc_mode(user, in pps_poweroff_atca()
231 static int ipmi_atca_detect(ipmi_user_t user) in ipmi_atca_detect() argument
[all …]
Dipmi_msghandler.c118 ipmi_user_t user; member
735 if (!msg->user) { in deliver_response()
748 ipmi_user_t user = msg->user; in deliver_response() local
749 user->handler->ipmi_recv_hndl(msg, user->handler_data); in deliver_response()
916 ipmi_user_t *user) in ipmi_create_user() argument
1002 *user = new_user; in ipmi_create_user()
1043 ipmi_user_t user = container_of(ref, struct ipmi_user, refcount); in free_user() local
1044 kfree(user); in free_user()
1047 int ipmi_destroy_user(ipmi_user_t user) in ipmi_destroy_user() argument
1049 ipmi_smi_t intf = user->intf; in ipmi_destroy_user()
[all …]
Dipmi_devintf.c49 ipmi_user_t user; member
133 &(priv->user)); in ipmi_open()
162 rv = ipmi_destroy_user(priv->user); in ipmi_release()
175 static int handle_send_req(ipmi_user_t user, in handle_send_req() argument
221 rv = ipmi_request_settime(user, in handle_send_req()
253 rv = handle_send_req(priv->user, in ipmi_ioctl()
269 rv = handle_send_req(priv->user, in ipmi_ioctl()
386 rv = ipmi_register_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl()
400 rv = ipmi_unregister_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl()
414 rv = ipmi_register_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl()
[all …]
/linux-4.1.27/arch/frv/kernel/
Dptrace.c45 const struct user_int_regs *iregs = &target->thread.user->i; in genregs_get()
65 struct user_int_regs *iregs = &target->thread.user->i; in genregs_set()
110 const struct user_fpmedia_regs *fpregs = &target->thread.user->f; in fpmregs_get()
130 struct user_fpmedia_regs *fpregs = &target->thread.user->f; in fpmregs_set()
205 struct user_context *user = task->thread.user; in get_reg() local
210 return ((unsigned long *) user)[regno]; in get_reg()
219 struct user_context *user = task->thread.user; in put_reg() local
231 ((unsigned long *) user)[regno] = data; in put_reg()
323 0, sizeof(child->thread.user->i), in arch_ptrace()
329 0, sizeof(child->thread.user->i), in arch_ptrace()
[all …]
Dentry-table.S25 # (3) The trap table for user mode
35 # The user and kernel trap tables use the same prologue for normal
40 # (6) The fixup table for user-trap single-step
47 # The linker script places the user mode and kernel mode trap tables on to
59 # trap table for entry from user mode
60 .section .trap.user,"ax"
77 # trap fixup table for single-stepping in user mode
78 .section .trap.fixup.user,"a"
83 # trap fixup table for single-stepping in user mode
91 .section .trap.user
[all …]
Dsignal.c61 struct user_context *user = current->thread.user; in restore_sigcontext() local
67 tbr = user->i.tbr; in restore_sigcontext()
68 psr = user->i.psr; in restore_sigcontext()
69 if (copy_from_user(user, &sc->sc_context, sizeof(sc->sc_context))) in restore_sigcontext()
71 user->i.tbr = tbr; in restore_sigcontext()
72 user->i.psr = psr; in restore_sigcontext()
74 restore_user_regs(user); in restore_sigcontext()
76 user->i.syscallno = -1; /* disable syscall checks */ in restore_sigcontext()
78 *_gr8 = user->i.gr[8]; in restore_sigcontext()
142 save_user_regs(current->thread.user); in setup_sigcontext()
[all …]
Dprocess.c151 save_user_regs(p->thread.user); in copy_thread()
164 save_user_regs(p->thread.user); in copy_thread()
278 &current->thread.user->f, in dump_fpu()
279 sizeof(current->thread.user->f)); in dump_fpu()
Dvmlinux.lds.S49 *(.trap.user)
86 *(.trap.fixup.user .trap.fixup.kernel)
/linux-4.1.27/arch/arm/kernel/
Dsys_oabi-compat.c199 struct oabi_flock64 user; in sys_oabi_fcntl64() local
212 if (copy_from_user(&user, (struct oabi_flock64 __user *)arg, in sys_oabi_fcntl64()
213 sizeof(user))) in sys_oabi_fcntl64()
215 kernel.l_type = user.l_type; in sys_oabi_fcntl64()
216 kernel.l_whence = user.l_whence; in sys_oabi_fcntl64()
217 kernel.l_start = user.l_start; in sys_oabi_fcntl64()
218 kernel.l_len = user.l_len; in sys_oabi_fcntl64()
219 kernel.l_pid = user.l_pid; in sys_oabi_fcntl64()
230 user.l_type = kernel.l_type; in sys_oabi_fcntl64()
231 user.l_whence = kernel.l_whence; in sys_oabi_fcntl64()
[all …]
/linux-4.1.27/block/
Dioprio.c66 struct user_struct *user; in SYSCALL_DEFINE3() local
118 user = current_user(); in SYSCALL_DEFINE3()
120 user = find_user(uid); in SYSCALL_DEFINE3()
122 if (!user) in SYSCALL_DEFINE3()
134 free_uid(user); in SYSCALL_DEFINE3()
181 struct user_struct *user; in SYSCALL_DEFINE2() local
215 user = current_user(); in SYSCALL_DEFINE2()
217 user = find_user(uid); in SYSCALL_DEFINE2()
219 if (!user) in SYSCALL_DEFINE2()
223 if (!uid_eq(task_uid(p), user->uid)) in SYSCALL_DEFINE2()
[all …]
/linux-4.1.27/arch/x86/include/asm/
Dpm-trace.h6 #define TRACE_RESUME(user) \ argument
17 generate_pm_trace(tracedata, user); \
21 #define TRACE_SUSPEND(user) TRACE_RESUME(user) argument
/linux-4.1.27/include/uapi/mtd/
DKbuild2 header-y += inftl-user.h
4 header-y += mtd-user.h
5 header-y += nftl-user.h
6 header-y += ubi-user.h
/linux-4.1.27/fs/
Ddcookies.c312 struct dcookie_user * user; in dcookie_register() local
316 user = kmalloc(sizeof(struct dcookie_user), GFP_KERNEL); in dcookie_register()
317 if (!user) in dcookie_register()
323 list_add(&user->next, &dcookie_users); in dcookie_register()
327 return user; in dcookie_register()
329 kfree(user); in dcookie_register()
330 user = NULL; in dcookie_register()
335 void dcookie_unregister(struct dcookie_user * user) in dcookie_unregister() argument
339 list_del(&user->next); in dcookie_unregister()
340 kfree(user); in dcookie_unregister()
Dopen.c565 static int chown_common(struct path *path, uid_t user, gid_t group) in chown_common() argument
574 uid = make_kuid(current_user_ns(), user); in chown_common()
579 if (user != (uid_t) -1) { in chown_common()
607 SYSCALL_DEFINE5(fchownat, int, dfd, const char __user *, filename, uid_t, user, in SYSCALL_DEFINE5() argument
627 error = chown_common(&path, user, group); in SYSCALL_DEFINE5()
639 SYSCALL_DEFINE3(chown, const char __user *, filename, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument
641 return sys_fchownat(AT_FDCWD, filename, user, group, 0); in SYSCALL_DEFINE3()
644 SYSCALL_DEFINE3(lchown, const char __user *, filename, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument
646 return sys_fchownat(AT_FDCWD, filename, user, group, in SYSCALL_DEFINE3()
650 SYSCALL_DEFINE3(fchown, unsigned int, fd, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument
[all …]
/linux-4.1.27/Documentation/namespaces/
Dcompatibility-list.txt3 This document contains the information about the problems user
28 2. Intentionally, two equal user IDs in different user namespaces
30 words, user 10 in one user namespace shouldn't have the same
31 access permissions to files, belonging to user 10 in another
35 from different user namespaces should not access the same IPC objects
Dresource-control.txt3 of processes is allowed to switch user ids. With user namespaces
8 kernels that enable user namespaces, and it is further recommended
10 memory user's they don't trust to play nice can use.
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/fifo/
Dbase.c121 if (chan->user) in nvkm_fifo_channel_destroy()
122 iounmap(chan->user); in nvkm_fifo_channel_destroy()
153 if (unlikely(!chan->user)) { in _nvkm_fifo_channel_rd32()
154 chan->user = ioremap(chan->addr, chan->size); in _nvkm_fifo_channel_rd32()
155 if (WARN_ON_ONCE(chan->user == NULL)) in _nvkm_fifo_channel_rd32()
158 return ioread32_native(chan->user + addr); in _nvkm_fifo_channel_rd32()
165 if (unlikely(!chan->user)) { in _nvkm_fifo_channel_wr32()
166 chan->user = ioremap(chan->addr, chan->size); in _nvkm_fifo_channel_wr32()
167 if (WARN_ON_ONCE(chan->user == NULL)) in _nvkm_fifo_channel_wr32()
170 iowrite32_native(data, chan->user + addr); in _nvkm_fifo_channel_wr32()
Dgf100.c53 } user; member
205 priv->user.bar.offset, 0x1000, in gf100_fifo_chan_ctor()
228 nv_wo32(priv->user.mem, usermem + i, 0x00000000); in gf100_fifo_chan_ctor()
230 nv_wo32(base, 0x08, lower_32_bits(priv->user.mem->addr + usermem)); in gf100_fifo_chan_ctor()
231 nv_wo32(base, 0x0c, upper_32_bits(priv->user.mem->addr + usermem)); in gf100_fifo_chan_ctor()
883 &priv->user.mem); in gf100_fifo_ctor()
887 ret = nvkm_gpuobj_map(priv->user.mem, NV_MEM_ACCESS_RW, in gf100_fifo_ctor()
888 &priv->user.bar); in gf100_fifo_ctor()
908 nvkm_gpuobj_unmap(&priv->user.bar); in gf100_fifo_dtor()
909 nvkm_gpuobj_ref(NULL, &priv->user.mem); in gf100_fifo_dtor()
[all …]
Dgk104.c71 } user; member
247 priv->user.bar.offset, 0x200, in gk104_fifo_chan_ctor()
265 nv_wo32(priv->user.mem, usermem + i, 0x00000000); in gk104_fifo_chan_ctor()
267 nv_wo32(base, 0x08, lower_32_bits(priv->user.mem->addr + usermem)); in gk104_fifo_chan_ctor()
268 nv_wo32(base, 0x0c, upper_32_bits(priv->user.mem->addr + usermem)); in gk104_fifo_chan_ctor()
1053 nv_wr32(priv, 0x002254, 0x10000000 | priv->user.bar.offset >> 12); in gk104_fifo_init()
1066 nvkm_gpuobj_unmap(&priv->user.bar); in gk104_fifo_dtor()
1067 nvkm_gpuobj_ref(NULL, &priv->user.mem); in gk104_fifo_dtor()
1109 0x1000, NVOBJ_FLAG_ZERO_ALLOC, &priv->user.mem); in gk104_fifo_ctor()
1113 ret = nvkm_gpuobj_map(priv->user.mem, NV_MEM_ACCESS_RW, in gk104_fifo_ctor()
[all …]
/linux-4.1.27/drivers/base/power/
Dtrace.c79 static int set_magic_time(unsigned int user, unsigned int file, unsigned int device) in set_magic_time() argument
81 unsigned int n = user + USERHASH*(file + FILEHASH*device); in set_magic_time()
157 void generate_pm_trace(const void *tracedata, unsigned int user) in generate_pm_trace() argument
163 user_hash_value = user % USERHASH; in generate_pm_trace()
251 unsigned int user, file, dev; in late_resume_init() local
253 user = val % USERHASH; in late_resume_init()
259 pr_info(" Magic number: %d:%d:%d\n", user, file, dev); in late_resume_init()
/linux-4.1.27/kernel/printk/
Dprintk.c572 struct devkmsg_user *user = file->private_data; in devkmsg_read() local
580 if (!user) in devkmsg_read()
583 ret = mutex_lock_interruptible(&user->lock); in devkmsg_read()
587 while (user->seq == log_next_seq) { in devkmsg_read()
596 user->seq != log_next_seq); in devkmsg_read()
602 if (user->seq < log_first_seq) { in devkmsg_read()
604 user->idx = log_first_idx; in devkmsg_read()
605 user->seq = log_first_seq; in devkmsg_read()
611 msg = log_from_idx(user->idx); in devkmsg_read()
623 if (msg->flags & LOG_CONT && !(user->prev & LOG_CONT)) in devkmsg_read()
[all …]
/linux-4.1.27/arch/um/drivers/
Dnet_kern.c157 lp->fd = (*lp->open)(&lp->user); in uml_net_open()
171 lp->tl.data = (unsigned long) &lp->user; in uml_net_open()
186 if (lp->close != NULL) (*lp->close)(lp->fd, &lp->user); in uml_net_open()
200 (*lp->close)(lp->fd, &lp->user); in uml_net_close()
364 (*lp->remove)(&lp->user); in net_device_release()
459 .max_packet = transport->user->max_packet, in eth_configure()
461 .open = transport->user->open, in eth_configure()
462 .close = transport->user->close, in eth_configure()
463 .remove = transport->user->remove, in eth_configure()
466 .add_address = transport->user->add_address, in eth_configure()
[all …]
Dslip_kern.c23 spri = (struct slip_data *) private->user; in slip_init()
50 (struct slip_data *) &lp->user); in slip_read()
56 (struct slip_data *) &lp->user); in slip_write()
81 .user = &slip_user_info,
Dslirp_kern.c26 spri = (struct slirp_data *) private->user; in slirp_init()
55 (struct slirp_data *) &lp->user); in slirp_read()
61 (struct slirp_data *) &lp->user); in slirp_write()
108 .user = &slirp_user_info,
Dvde_kern.c23 vpri = (struct vde_data *) pri->user; in vde_init()
41 struct vde_data *pri = (struct vde_data *) &lp->user; in vde_read()
53 struct vde_data *pri = (struct vde_data *) &lp->user; in vde_write()
117 .user = &vde_user_info,
Ddaemon_kern.c26 dpri = (struct daemon_data *) pri->user; in daemon_init()
51 (struct daemon_data *) &lp->user); in daemon_write()
83 .user = &daemon_user_info,
Dumcast_kern.c34 dpri = (struct umcast_data *) pri->user; in umcast_init()
60 (struct umcast_data *) &lp->user); in umcast_write()
165 .user = &umcast_user_info,
175 .user = &umcast_user_info,
Dpcap_kern.c25 ppri = (struct pcap_data *) pri->user; in pcap_init()
38 (struct pcap_data *) &lp->user); in pcap_read()
101 .user = &pcap_user_info,
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/dmaobj/
Dgf100.c82 u32 kind, user, unkn; in gf100_dmaobj_ctor() local
96 user = args->v0.priv; in gf100_dmaobj_ctor()
102 user = GF100_DMA_V0_PRIV_US; in gf100_dmaobj_ctor()
106 user = GF100_DMA_V0_PRIV_VM; in gf100_dmaobj_ctor()
112 if (user > 2) in gf100_dmaobj_ctor()
114 priv->flags0 |= (kind << 22) | (user << 20); in gf100_dmaobj_ctor()
Dnv50.c94 u32 user, part, comp, kind; in nv50_dmaobj_ctor() local
109 user = args->v0.priv; in nv50_dmaobj_ctor()
116 user = NV50_DMA_V0_PRIV_US; in nv50_dmaobj_ctor()
121 user = NV50_DMA_V0_PRIV_VM; in nv50_dmaobj_ctor()
129 if (user > 2 || part > 2 || comp > 3 || kind > 0x7f) in nv50_dmaobj_ctor()
131 priv->flags0 = (comp << 29) | (kind << 22) | (user << 20); in nv50_dmaobj_ctor()
/linux-4.1.27/Documentation/cgroups/
Dcpuacct.txt34 CPU time obtained by the cgroup into user and system times. Currently
37 user: Time spent by tasks of the cgroup in user mode.
40 user and system are in USER_HZ unit.
42 cpuacct controller uses percpu_counter interface to collect user and
45 - It is theoretically possible to see wrong values for user and system times.
48 - It is possible to see slightly outdated values for user and system times
/linux-4.1.27/Documentation/arm64/
Dmemory.txt12 (256TB) virtual addresses, respectively, for both user and kernel. With
19 mappings while the user pgd contains only user (non-global) mappings.
28 0000000000000000 0000007fffffffff 512GB user
36 0000000000000000 0000ffffffffffff 256TB user
44 0000000000000000 000003ffffffffff 4TB user
52 0000000000000000 0000ffffffffffff 256TB user
Dtagged-pointers.txt16 (1) The kernel requires that all user addresses passed to EL1
18 parameters containing user virtual addresses *must* have
23 of tags cannot rely on the tag information for user virtual
/linux-4.1.27/Documentation/security/
Dkeys-ecryptfs.txt7 either in kernel space or in user space with a daemon called 'ecryptfsd'. In
9 using a key, the FEFEK, derived from a user prompted passphrase; in the latter
16 kernel key of the 'user' type, inserted in the user's session specific keyring
44 key-type:= 'trusted' | 'user'
51 'ecryptfs' and save it using a previously loaded user key "test":
53 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u
57 ecryptfs user:test 64 490045d4bfe48c99f0d465fbbbb79e7500da954178e2de0697
Dkeys-trusted-encrypted.txt5 and in both cases all keys are created in the kernel, and user space sees,
8 Keys can be used on any system. All user level blobs, are displayed and loaded
50 'master' key can either be a trusted-key or user-key type. The main
52 they are only as secure as the user key encrypting them. The master user key
67 key-type:= 'trusted' | 'user'
127 compromised by a user level problem, and when sealed to specific boot PCR
/linux-4.1.27/Documentation/
Dgdb-kernel-debugging.txt66 scanning for modules in /home/user/linux/build
67 loading @0xffffffffa0020000: /home/user/linux/build/net/netfilter/xt_tcpudp.ko
68 loading @0xffffffffa0016000: /home/user/linux/build/net/netfilter/xt_pkttype.ko
69 loading @0xffffffffa0002000: /home/user/linux/build/net/netfilter/xt_limit.ko
70 loading @0xffffffffa00ca000: /home/user/linux/build/net/packet/af_packet.ko
71 loading @0xffffffffa003c000: /home/user/linux/build/fs/fuse/fuse.ko
73 loading @0xffffffffa0000000: /home/user/linux/build/drivers/ata/ata_generic.ko
86 loading @0xffffffffa0034000: /home/user/linux/build/lib/libcrc32c.ko
87 loading @0xffffffffa0050000: /home/user/linux/build/lib/lzo/lzo_compress.ko
88 loading @0xffffffffa006e000: /home/user/linux/build/lib/zlib_deflate/zlib_deflate.ko
[all …]
Dcachetlb.txt18 if it can be proven that a user address space has never executed
42 This interface flushes an entire user address space from
55 Here we are flushing a specific range of (user) virtual
84 user virtual address 'addr' will be visible to the cpu. That
148 This interface flushes an entire user address space from
157 This interface flushes an entire user address space from
170 Here we are flushing a specific range of (user) virtual
242 size). This setting will force the SYSv IPC layer to only allow user
251 mapped into some user address space, there is always at least one more
253 PAGE_OFFSET. So immediately, once the first user maps a given
[all …]
Ddell_rbu.txt30 The user should not unload the rbu driver after downloading the BIOS image
55 In the packet update mechanism, the user needs to create a new file having
57 The user creates packets header, gets the chunk of the BIOS image and
60 packet, the user needs to create more such packets out of the entire BIOS
69 In monolithic update the user simply get the BIOS image (.hdr file) and copies
84 If a user by accident executes steps 1 and 3 above without executing step 2;
96 Also after updating the BIOS image a user mode application needs to execute
Ddma-buf-sharing.txt12 either the 'exporter' of buffers, or the 'user' of buffers.
15 exporter, and A as buffer-user.
25 The buffer-user
40 3. Each buffer-user 'connects' itself to the buffer
41 4. When needed, buffer-user requests access to the buffer from exporter
42 5. When finished with its use, the buffer-user notifies end-of-DMA to exporter
43 6. when buffer-user is done using this buffer completely, it 'disconnects'
85 3. Each buffer-user 'connects' itself to the buffer
87 Each buffer-user now gets a reference to the buffer, using the fd passed to
96 After this, the buffer-user needs to attach its device with the buffer, which
[all …]
Dvgaarbiter.txt47 open : open user instance of the arbiter. By default, it's attached to
50 close : close user instance. Release locks made by the user
72 unlock all : release all locks on target held by this user (not
86 The driver keeps track of which user has which locks on which card. It
88 a bit, but makes the arbiter more tolerant to user space problems and able
91 user space for a given user (file descriptor instance) of the arbiter.
182 implementation of the user space side [3]. Now (2009) Tiago Vignatti and Dave
Dpi-futex.txt6 - in the user-space fastpath a PI-enabled futex involves no kernel work
22 The short reply: user-space PI helps achieving/improving determinism for
23 user-space applications. In the best-case, it can help achieve
54 implementation to user-space.
57 inheritance only apply to kernel-space locks. But user-space locks are
60 does not apply (user-space spinlocks have the same priority inversion
61 problems as other user-space locking constructs). Fact is, pretty much
Drpmsg.txt34 expose appropriate user space interfaces, if needed.
84 channel belongs, using the channel's src address, and the user-provided
98 addresses provided by the user.
103 ignored (and the user-provided addresses will be used instead).
127 to a destination address provided by the user.
128 The user should specify the channel, the data it wants to send,
131 channel belongs, using the channel's src address, and the user-provided
142 destination addresses provided by the user.
143 The user should specify the channel, the data it wants to send,
147 ignored (and the user-provided addresses will be used instead).
[all …]
Dcoccinelle.txt37 as a regular user, and install it with
204 /home/user/linux/crypto/ctr.c:188:9-16: ERR_CAST can be used with alg
205 /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth
206 /home/user/linux/crypto/xts.c:227:9-16: ERR_CAST can be used with alg
277 diff -u -p /home/user/linux/crypto/ctr.c /tmp/nothing
278 --- /home/user/linux/crypto/ctr.c 2010-05-26 10:49:38.000000000 +0200
322 * TODO [[view:/home/user/linux/crypto/ctr.c::face=ovl-face1::linb=188::colb=9::cole=16][ERR_CAST ca…
323 * TODO [[view:/home/user/linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAS…
324 * TODO [[view:/home/user/linux/crypto/xts.c::face=ovl-face1::linb=227::colb=9::cole=16][ERR_CAST ca…
Dfutex-requeue-pi.txt48 mutex only after it has returned to user space. This will leave the
55 user space already holding the PI futex. The glibc implementation
90 to be able to acquire the rt_mutex before returning to user space.
93 requeue call returning to user space and the waiter waking and
100 Two new system calls provide the kernel<->user interface to
/linux-4.1.27/tools/perf/
Dperf-with-kcore.sh121 …find "$USER_HOME/.debug" -xdev -type d ! -user "$SUDO_USER" -ls -exec chown "$SUDO_USE…
122 …find "$USER_HOME/.debug" -xdev -type f -links 1 ! -user "$SUDO_USER" -ls -exec chown "$SUDO_USE…
123 …find "$USER_HOME/.debug" -xdev -type l ! -user "$SUDO_USER" -ls -exec chown -h "$SUDO_USE…
140 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type d ! -user "$USER" -print -quit)
141 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type f -links 1 ! -user "$USER" -print -quit)
142 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type l ! -user "$USER" -print -quit)
/linux-4.1.27/Documentation/acpi/
Dvideo_extension.txt13 1 Export a sysfs interface for user space to control backlight level
61 as a "brightness level" indicator. Thus from the user space perspective
65 2 Notify user space about hotkey event
68 i) For some laptops, when user presses the hotkey, a scancode will be
69 generated and sent to user space through the input device created by
71 following key code will appear to user space:
84 notify value it received and send the event to user space through the
94 Once user space tool receives this event, it can modify the backlight
101 not affect the sending of event to user space, they are always sent to user
/linux-4.1.27/net/ipv6/netfilter/
Dip6_tables.c488 (strcmp(t->target.u.user.name, in mark_source_chains()
494 if ((strcmp(t->target.u.user.name, in mark_source_chains()
537 if (strcmp(t->target.u.user.name, in mark_source_chains()
624 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match()
625 m->u.user.revision); in find_check_match()
627 duprintf("find_check_match: `%s' not found\n", m->u.user.name); in find_check_match()
696 target = xt_request_find_target(NFPROTO_IPV6, t->u.user.name, in find_check_entry()
697 t->u.user.revision); in find_check_entry()
699 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry()
728 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow()
[all …]
/linux-4.1.27/net/ipv4/netfilter/
Dip_tables.c475 (strcmp(t->target.u.user.name, in mark_source_chains()
481 if ((strcmp(t->target.u.user.name, in mark_source_chains()
524 if (strcmp(t->target.u.user.name, in mark_source_chains()
611 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match()
612 m->u.user.revision); in find_check_match()
614 duprintf("find_check_match: `%s' not found\n", m->u.user.name); in find_check_match()
682 target = xt_request_find_target(NFPROTO_IPV4, t->u.user.name, in find_check_entry()
683 t->u.user.revision); in find_check_entry()
685 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry()
714 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow()
[all …]
Darp_tables.c401 (strcmp(t->target.u.user.name, in mark_source_chains()
407 if ((strcmp(t->target.u.user.name, in mark_source_chains()
442 if (strcmp(t->target.u.user.name, in mark_source_chains()
525 target = xt_request_find_target(NFPROTO_ARP, t->u.user.name, in find_check_entry()
526 t->u.user.revision); in find_check_entry()
528 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry()
552 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow()
651 if (strcmp(arpt_get_target(iter)->u.user.name, in translate_table()
801 u.user.name), in copy_entries_to_user()
886 static int get_info(struct net *net, void __user *user, in get_info() argument
[all …]
Dnf_defrag_ipv4.c25 static int nf_ct_ipv4_gather_frags(struct sk_buff *skb, u_int32_t user) in nf_ct_ipv4_gather_frags() argument
32 err = ip_defrag(skb, user); in nf_ct_ipv4_gather_frags()
85 enum ip_defrag_users user = in ipv4_conntrack_defrag() local
88 if (nf_ct_ipv4_gather_frags(skb, user)) in ipv4_conntrack_defrag()
/linux-4.1.27/arch/cris/arch-v32/drivers/
DKconfig200 hex "PA user changeable dir mask"
206 user can change direction on using ioctl's.
211 hex "PA user changeable bits mask"
217 that a user can change the value on using ioctl's.
221 hex "PB user changeable dir mask"
227 that a user can change direction on using ioctl's.
232 hex "PB user changeable bits mask"
238 that a user can change the value on using ioctl's.
242 hex "PC user changeable dir mask"
248 that a user can change direction on using ioctl's.
[all …]
/linux-4.1.27/arch/sh/kernel/
Dptrace_32.c383 addr > sizeof(struct user) - 3) in arch_ptrace()
388 else if (addr >= offsetof(struct user, fpu) && in arch_ptrace()
389 addr < offsetof(struct user, u_fpvalid)) { in arch_ptrace()
391 if (addr == offsetof(struct user, fpu.fpscr)) in arch_ptrace()
400 index = addr - offsetof(struct user, fpu); in arch_ptrace()
404 } else if (addr == offsetof(struct user, u_fpvalid)) in arch_ptrace()
423 addr > sizeof(struct user) - 3) in arch_ptrace()
428 else if (addr >= offsetof(struct user, fpu) && in arch_ptrace()
429 addr < offsetof(struct user, u_fpvalid)) { in arch_ptrace()
434 index = addr - offsetof(struct user, fpu); in arch_ptrace()
[all …]
Dptrace_64.c403 else if ((addr >= offsetof(struct user, fpu)) && in arch_ptrace()
404 (addr < offsetof(struct user, u_fpvalid))) { in arch_ptrace()
409 index = addr - offsetof(struct user, fpu); in arch_ptrace()
411 } else if (addr == offsetof(struct user, u_fpvalid)) { in arch_ptrace()
445 else if ((addr >= offsetof(struct user, fpu)) && in arch_ptrace()
446 (addr < offsetof(struct user, u_fpvalid))) { in arch_ptrace()
451 index = addr - offsetof(struct user, fpu); in arch_ptrace()
/linux-4.1.27/tools/perf/Documentation/
DMakefile177 pdf: $(OUTPUT)user-manual.pdf
219 $(INSTALL) -m 644 $(OUTPUT)user-manual.pdf $(DESTDIR)$(pdfdir)
284 $(OUTPUT)user-manual.html: $(OUTPUT)user-manual.xml
287 $(OUTPUT)perf.info: $(OUTPUT)user-manual.texi
288 $(QUIET_MAKEINFO)$(MAKEINFO) --no-split -o $@ $(OUTPUT)user-manual.texi
290 $(OUTPUT)user-manual.texi: $(OUTPUT)user-manual.xml
292 $(DOCBOOK2X_TEXI) $(OUTPUT)user-manual.xml --encoding=UTF-8 --to-stdout >$@++ && \
297 $(OUTPUT)user-manual.pdf: $(OUTPUT)user-manual.xml
/linux-4.1.27/security/selinux/ss/
Dcontext.h27 u32 user; member
121 dst->user = src->user; in context_cpy()
143 c->user = c->role = c->type = 0; in context_destroy()
156 return ((c1->user == c2->user) && in context_cmp()
Dservices.c305 val1 = scontext->user; in constraint_expr_eval()
306 val2 = tcontext->user; in constraint_expr_eval()
413 val1 = c->user; in constraint_expr_eval()
1031 *scontext_len += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) + 1; in context_struct_to_string()
1049 sym_name(&policydb, SYM_USERS, context->user - 1), in context_struct_to_string()
1052 scontextp += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) + in context_struct_to_string()
1179 ctx->user = usrdatum->value; in string_to_context_struct()
1458 newcontext.user = tcontext->user; in security_compute_sid()
1462 newcontext.user = scontext->user; in security_compute_sid()
1467 newcontext.user = tcontext->user; in security_compute_sid()
[all …]
Dmls.c207 if (!c->user || c->user > p->p_users.nprim) in mls_context_isvalid()
209 usrdatum = p->user_val_to_struct[c->user - 1]; in mls_context_isvalid()
419 int mls_setup_user_range(struct context *fromcon, struct user_datum *user, in mls_setup_user_range() argument
425 struct mls_level *user_low = &(user->range.level[0]); in mls_setup_user_range()
426 struct mls_level *user_clr = &(user->range.level[1]); in mls_setup_user_range()
427 struct mls_level *user_def = &(user->dfltlevel); in mls_setup_user_range()
/linux-4.1.27/Documentation/ia64/
Dfsys.txt18 switched over to kernel memory. The user-level state is saved
21 - user mode:
23 user memory. The user-level state is contained in the
28 interruption-handlers start execution in. The user-level
36 - CPU registers may contain a mixture of user-level and kernel-level
39 user-level)
46 in fsys-mode (they point to the user-level stacks, which may
49 In summary, fsys-mode is much more similar to running in user-mode
69 to by "regs" was executing in user mode (privilege level 3).
71 executing on the user-level stack(s). Finally, fsys_mode() returns
[all …]
Dmca.txt40 * If an MCA/INIT event occurs while the kernel was running (not user
146 What happens when MCA/INIT is delivered what a cpu is running user
149 The user mode registers are stored in the RSE area of the MCA/INIT on
150 entry to the OS and are restored from there on return to SAL, so user
152 OS has no idea what unwind data is available for the user space stack,
153 MCA/INIT never tries to backtrace user space. Which means that the OS
154 does not bother making the user space process look like a blocked task,
155 i.e. the OS does not copy pt_regs and switch_stack to the user space
156 stack. Also the OS has no idea how big the user space RSE and memory
157 stacks are, which makes it too risky to copy the saved state to a user
/linux-4.1.27/Documentation/devicetree/bindings/sound/
Dwidgets.txt7 "template-wname", "user-supplied-wname"
12 The "user-supplied-wname" being the user specified widget name.
/linux-4.1.27/kernel/
Duser.c114 struct user_struct *user; in uid_hash_find() local
116 hlist_for_each_entry(user, hashent, uidhash_node) { in uid_hash_find()
117 if (uid_eq(user->uid, uid)) { in uid_hash_find()
118 atomic_inc(&user->__count); in uid_hash_find()
119 return user; in uid_hash_find()
Duid16.c19 SYSCALL_DEFINE3(chown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument
21 return sys_chown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3()
24 SYSCALL_DEFINE3(lchown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument
26 return sys_lchown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3()
29 SYSCALL_DEFINE3(fchown16, unsigned int, fd, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument
31 return sys_fchown(fd, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3()
Dcred.c57 .user = INIT_USER,
118 free_uid(cred->user); in put_cred_rcu()
258 get_uid(new->user); in prepare_creds()
334 atomic_inc(&p->cred->user->processes); in copy_creds()
367 atomic_inc(&new->user->processes); in copy_creds()
459 if (new->user != old->user) in commit_creds()
460 atomic_inc(&new->user->processes); in commit_creds()
463 if (new->user != old->user) in commit_creds()
464 atomic_dec(&old->user->processes); in commit_creds()
610 get_uid(new->user); in prepare_kernel_cred()
/linux-4.1.27/arch/x86/um/
Dptrace_64.c120 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user()
121 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user()
122 addr -= offsetof(struct user, u_debugreg[0]); in poke_user()
187 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user()
188 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user()
189 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
Dptrace_32.c127 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user()
128 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user()
129 addr -= offsetof(struct user, u_debugreg[0]); in poke_user()
184 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user()
185 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user()
186 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
DMakefile38 extra-y += user-offsets.s
39 $(obj)/user-offsets.s: c_flags = -Wp,-MD,$(depfile) $(USER_CFLAGS) \
/linux-4.1.27/Documentation/filesystems/
Dquota.txt9 and the second one hardlimit. An user can never exceed a hardlimit for any
12 period" or "grace time". When grace time is over, user is not able to allocate
23 When user exceeds a softlimit, runs out of grace time or reaches hardlimit,
26 when user is using a graphical desktop he usually cannot see the message.
42 - UID/GID (depends on quota type) of user / group whose limit
45 - UID of a user who caused the event
56 - four warnings are also defined for the event when user stops
D9p.txt64 uname=name user name to attempt mount as on the remote server. The
65 server may override or ignore this value. Certain user
121 user = if a user tries to access a file on v9fs
123 attach command (Tattach) for that user.
125 <uid> = allows only user with uid=<uid> to access
128 operations as one user
148 There are user and developer mailing lists available through the v9fs project
Daffs.txt33 The muFS (multi user File System) equivalents of the above file systems
42 system to uid or the uid of the current user, respectively.
94 - R maps to r for user, group and others. On directories, R implies x.
105 options. Since most of the Amiga file systems are single user systems
107 Amiga filesystem will be owned by the user who actually mounts the
114 - r permission will set R for user, group and others.
116 - w permission will set W and D for user, group and others.
118 - x permission of the user will set E for plain files.
123 Newly created files and directories will get the user and group ID
124 of the current user and a mode according to the umask.
[all …]
Dfuse.txt14 Non-privileged mount (or user mount):
16 A userspace filesystem mounted by a non-privileged (non-root) user.
18 user. NOTE: this is not the same as mounts allowed with the "user"
31 The user who does the mounting.
35 The user who is performing filesystem operations.
85 The numeric user id of the mount owner.
103 to the user mounting the filesystem. This option is by default only
232 other users' and the super user's processes
235 other users' or the super user's processes
253 B) If another user is accessing files or directories in the
[all …]
/linux-4.1.27/arch/tile/include/hv/
Diorpc.h365 user; /**< Buffer as described by user apps. */ member
401 user; /**< Interrupt as described by user applications. */ member
425 user; /**< pollfd_setup as described by user applications. */ member
449 user; /**< pollfd as described by user applications. */ member
/linux-4.1.27/Documentation/device-mapper/
Dkcopyd.txt15 To start a copy job, the user must set up io_region structures to describe
27 To start the copy, the user calls kcopyd_copy(), passing in the client
38 When the copy completes, kcopyd will call the user's completion routine,
39 passing back the user's context pointer. It will also indicate if a read or
42 When a user is done with all their copy jobs, they should call
/linux-4.1.27/arch/arm/include/asm/
Dtls.h13 mrc p15, 0, \tmp2, c13, c0, 2 @ get the user r/w register
15 mcr p15, 0, \tpuser, c13, c0, 2 @ and the user r/w register
25 mrcne p15, 0, \tmp2, c13, c0, 2 @ get the user r/w register
27 mcrne p15, 0, \tpuser, c13, c0, 2 @ set user r/w register
/linux-4.1.27/arch/arm/boot/dts/
Dste-nomadik-s8815.dts51 user-led {
59 user-button {
116 /* The user LED on the board is set up to be used for heartbeat */
119 user-led {
132 user-button {
Dimx27-phytec-phycore-rdk.dts228 label = "system:red1:user";
233 label = "system:green1:user";
238 label = "system:blue1:user";
243 label = "system:red2:user";
248 label = "system:green2:user";
253 label = "system:blue2:user";
Dvexpress-v2m-rs1.dtsi319 user@1 {
325 user@2 {
331 user@3 {
337 user@4 {
343 user@5 {
349 user@6 {
355 user@7 {
361 user@8 {
Dvexpress-v2m.dtsi318 user@1 {
324 user@2 {
330 user@3 {
336 user@4 {
342 user@5 {
348 user@6 {
354 user@7 {
360 user@8 {
Dimx28-sps1.dts150 label = "sps1-1:yellow:user";
157 label = "sps1-2:red:user";
164 label = "sps1-3:red:user";
/linux-4.1.27/fs/proc/
Dstat.c84 u64 user, nice, system, idle, iowait, irq, softirq, steal; in show_stat() local
91 user = nice = system = idle = iowait = in show_stat()
98 user += kcpustat_cpu(i).cpustat[CPUTIME_USER]; in show_stat()
121 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(user)); in show_stat()
135 user = kcpustat_cpu(i).cpustat[CPUTIME_USER]; in show_stat()
146 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(user)); in show_stat()
/linux-4.1.27/Documentation/arm/
Dmem_alignment15 Now for user space applications, it is possible to configure the alignment
23 real bad - it changes the behaviour of all unaligned instructions in user
32 0 A user process performing an unaligned memory access
37 1 The kernel will attempt to fix up the user process
42 2 The kernel will send a SIGBUS signal to the user process
55 operation for user space code.
DPorting67 The maximum size of a user process in bytes. Since user space
68 always starts at zero, this is the maximum address that a user
69 process can access+1. The user space stack grows down from this
72 Any virtual address below TASK_SIZE is deemed to be user process
74 basis by the kernel. I'll call this the user segment.
Dkernel_user_helpers.txt4 These are segment of kernel provided user code reachable from user space
5 at a fixed address in kernel memory. This is used to provide user space
8 code to be executed directly in user mode for best efficiency but which is
9 too intimate with the kernel counter part to be left to user libraries.
19 since those code segments only use a few cycles before returning to user
/linux-4.1.27/drivers/staging/i2o/
DREADME.ioctl13 utilized by user space applications to communicate with IOPs and devices
15 that are available to the user and provides examples of their uses.
21 This document and the I2O user space interface are currently maintained
53 EFAULT Invalid user space pointer was passed
79 EFAULT Invalid user space pointer was passed
108 EFAULT Invalid user space pointer was passed
143 EFAULT Invalid user space pointer was passed
151 changed properly on the IOP. The user should check the result
180 EFAULT Invalid user space pointer was passed
188 properly retrieved. The user should check the result list
[all …]
/linux-4.1.27/Documentation/vm/
Dactive_mm.txt20 user-level page tables at all, so when we do a context switch into an
25 doesn't need any user mappings - all kernel threads basically fall into
27 some amount of time they are not going to be interested in user space,
37 "stole" for such an anonymous user. For that, we have "tsk->active_mm",
54 Usually there is at least one real user, but it could be that the real
55 user exited on another CPU while a lazy user was still active, so you do
73 we have a user context", and is generally done by the page fault handler
/linux-4.1.27/Documentation/filesystems/nfs/
Didmapper.txt5 Id mapper is used by NFS to translate user and group ids into names, and to
6 translate user and group names into ids. Part of this translation involves
39 uid: Find the UID for the given user
41 user: Find the user name for the given UID
56 /usr/sbin/nfs.idmap will handle gid, user, and group lookups.
73 "uid:user@domain".
Drpc-cache.txt28 - making requests to user-space to fill in cache entries
29 - allowing user-space to directly set entries in the cache
77 Format a request to be send to user-space for an item
84 A message from user space has arrived to fill out a
123 saves any user of an item from worrying about content changing while
134 for communicating between kernel and user for populating the cache.
152 user-space. These requests appear in the channel file.
159 Thus a user-space helper is likely to:
171 written from user-space and processes it. It should return an error
/linux-4.1.27/Documentation/ABI/testing/
Dsysfs-kernel-uids7 to set the cpu bandwidth a user is allowed. This is a
11 example would be, if User A has shares = 1024 and user
13 bandwidth user A will. For more details refer
Dsysfs-platform-kim10 firmware. The name exposed is read from the user-space
22 command. The entry is read and made use by the user-space
42 transport driver, which will signal the user-space for opening,
44 entry. This entry would be polled upon by the user-space
Dsysfs-class-cxl48 provided that no user contexts are attached.
74 Decimal value of the current version of the kernel/user API.
170 Will return "user" or "factory" depending on the image loaded
177 Valid entries are "none", "user", and "factory".
182 "user" and "factory" means PERST will cause either the user or
183 user or factory image to be loaded.
Dsysfs-driver-sunxi-sid10 details see the user manual:
21 Users: any user space application which wants to read the SID on
/linux-4.1.27/include/net/irda/
Dirias_object.h89 int user);
91 int user);
93 int len, int user);
/linux-4.1.27/Documentation/video4linux/
Dsh_mobile_ceu_camera.txt43 Such a configuration can be produced by user requests:
58 (6) to (6') - CEU scale - user window
71 current sensor scales onto input window - this is user S_CROP:
75 3. Calculate new combined scales from "effective" input window to requested user
105 10. Use CEU scaling to scale to the requested user window:
123 1. Request exactly user rectangle from the sensor.
/linux-4.1.27/net/ipv4/
Dip_fragment.c72 u32 user; member
100 u32 user; member
129 qp->user == arg->user; in ip4_frag_match()
146 qp->user = arg->user; in ip4_frag_init()
220 if (qp->user == IP_DEFRAG_AF_PACKET || in ip_expire()
221 ((qp->user >= IP_DEFRAG_CONNTRACK_IN) && in ip_expire()
222 (qp->user <= __IP_DEFRAG_CONNTRACK_IN_END) && in ip_expire()
239 static struct ipq *ip_find(struct net *net, struct iphdr *iph, u32 user) in ip_find() argument
246 arg.user = user; in ip_find()
636 int ip_defrag(struct sk_buff *skb, u32 user) in ip_defrag() argument
[all …]
/linux-4.1.27/Documentation/leds/
Dledtrig-transient.txt14 Without one shot timer interface, user space can still use timer trigger to
15 set a timer to hold a state, however when user space application crashes or
22 feature, to prevent user space crashes leaving the phone in vibrate mode
46 class device property. When brightness is set to 0 from user space via
64 Transient trigger can be enabled and disabled from user space on led class
79 - state allows user to specify a transient state to be held for the specified
94 get changed by the trigger unless user does a set via
115 allow user app to set the time once and activate it to run it once for the
147 - Control of vibrate (phones, tablets etc.) hardware by user space app.
148 - Use of LED by user space app as activity indicator.
[all …]
/linux-4.1.27/arch/m68k/fpsp040/
Dx_unimp.S7 | Invoked when the user program encounters a floating-point
61 fmovel #0,%FPSR |clear all user bits
62 fmovel #0,%FPCR |clear all user exceptions for FPSP
72 bsrl sto_res |store the result in user space
Dfpsp.h63 | because it needs to report an exception back to the user. This
83 .set USER_D0,LV+0 | saved user D0
84 .set USER_D1,LV+4 | saved user D1
85 .set USER_A0,LV+8 | saved user A0
86 .set USER_A1,LV+12 | saved user A1
87 .set USER_FP0,LV+16 | saved user FP0
88 .set USER_FP1,LV+28 | saved user FP1
89 .set USER_FP2,LV+40 | saved user FP2
90 .set USER_FP3,LV+52 | saved user FP3
91 .set USER_FPCR,LV+64 | saved user FPCR
[all …]
Dx_store.S100 | dest_dbl --- write double precision value to user space
167 exg %a0,%a1 |a0=supervisor source, a1=user dest
168 bsrl mem_write |move the number to the user's memory
251 exg %a0,%a1 |a0=supervisor source, a1=user dest
252 bsrl mem_write |move the number to the user's memory
Dslog2.S41 | 2.1 Restore the user FPCR
55 | 2.1 Restore the user FPCR
70 | 2.1 Restore the user FPCR
86 | 2.2 Restore the user FPCR.
92 | 4.1 Restore the user FPCR
/linux-4.1.27/Documentation/networking/
Dxfrm_sync.txt69 message (kernel<->user) as well the cause (config, query or event).
74 when going from kernel to user space)
122 a) XFRM_MSG_GETAE issued by user-->kernel.
130 b) XFRM_MSG_NEWAE is issued by either user space to configure
133 i) user --> kernel to configure a specific SA.
136 A response is issued back to the sender in user space to indicate success
141 ii) kernel->user direction as a response to XFRM_MSG_GETAE
146 iii) kernel->user to report as event if someone sets any values or
148 In such a case XFRM_AE_CU flag is set to inform the user that
152 iv) kernel->user to report event when replay threshold or a timeout
[all …]
Dgeneric-hdlc.txt10 experimental InARP user-space daemon available on:
83 dce - Frame Relay DCE (network) side LMI instead of default DTE (user).
85 t391 - link integrity verification polling timer (in seconds) - user
87 n391 - full status polling counter - user
88 n392 - error threshold - both user and network
89 n393 - monitored events count - both user and network
Dnetlink_mmap.txt18 user-space memory without copying them as done with regular socket I/O,
20 syscalls have to be issued by user-space to get more message.
22 The TX ring is used to process messages directly from user-space memory, the
29 In order to use memory mapped netlink I/O, user-space needs three main changes:
82 The blocks are only visible to the kernel, from the point of view of user-space
142 - nm_status is used for synchronizing processing between the kernel and user-
157 for user-space. Approriate action is to invoke poll()
160 TX ring: frame belongs to user-space and can be used for
176 TX ring: the frame contains a valid message from user-space to
178 the kernel will release the frame back to user-space by
[all …]
Dnfc.txt87 The user must call START_POLL to poll for NFC targets, passing the desired NFC
89 state until it finds any target. However, the user can stop the polling
94 sent (including the device id). The user must call GET_TARGET to get the list of
113 To establish a connection with one target, the user must create an
116 netlink event. As a target can support more than one NFC protocol, the user
Dpacket_mmap.txt30 configurable circular buffer mapped in user space that can be used to either
34 highest bandwidth. By using a shared buffer between the kernel and the user
50 From the user standpoint, you should use the higher level libpcap library, which
78 user process
107 also the mapping of the circular buffer in the user process and
120 user process
179 By default, the user should put data at :
183 the beginning of the user data will be at :
186 If you wish to put user data at a custom offset from the beginning of
196 To setup PACKET_MMAP from user level code is done with a call like
[all …]
/linux-4.1.27/net/ax25/
Dax25_uid.c76 ax25_uid_assoc *user; in ax25_uid_ioctl() local
101 user = ax25_findbyuid(sax25_kuid); in ax25_uid_ioctl()
102 if (user) { in ax25_uid_ioctl()
103 ax25_uid_put(user); in ax25_uid_ioctl()
Dax25_route.c413 ax25_uid_assoc *user; in ax25_rt_autobind() local
425 user = ax25_findbyuid(current_euid()); in ax25_rt_autobind()
426 if (user) { in ax25_rt_autobind()
427 ax25->source_addr = user->call; in ax25_rt_autobind()
428 ax25_uid_put(user); in ax25_rt_autobind()
/linux-4.1.27/fs/notify/fanotify/
Dfanotify.c242 struct user_struct *user; in fanotify_free_group_priv() local
244 user = group->fanotify_data.user; in fanotify_free_group_priv()
245 atomic_dec(&user->fanotify_listeners); in fanotify_free_group_priv()
246 free_uid(user); in fanotify_free_group_priv()
/linux-4.1.27/drivers/staging/lustre/lustre/
DKconfig20 To mount Lustre file systems, you also need to install the user space
21 mount.lustre and other user space commands which can be found in the
26 performance computing. Source code of both kernel space and user space
39 This option defines the maximum size of buffer in bytes that user space
/linux-4.1.27/Documentation/ptp/
Dptp.txt6 presents a standardized method for developing PTP user space
11 drivers and a user space interface. The infrastructure supports a
21 - One short or periodic alarms, with signal delivery to user program
23 - Period output signals configurable from user space
29 class driver handles all of the dealings with user space. The
40 ** PTP hardware clock user space API
/linux-4.1.27/net/netfilter/
Dxt_limit.c92 static u32 user2credits(u32 user) in user2credits() argument
95 if (user > 0xFFFFFFFF / (HZ*CREDITS_PER_JIFFY)) in user2credits()
97 return (user / XT_LIMIT_SCALE) * HZ * CREDITS_PER_JIFFY; in user2credits()
99 return (user * HZ * CREDITS_PER_JIFFY) / XT_LIMIT_SCALE; in user2credits()
/linux-4.1.27/drivers/misc/
Datmel-ssc.c52 if (ssc->user) { in ssc_request()
57 ssc->user++; in ssc_request()
71 if (ssc->user) in ssc_free()
72 ssc->user--; in ssc_free()
/linux-4.1.27/net/core/
Dscm.c90 fpl->user = NULL; in scm_fp_copy()
112 if (!fpl->user) in scm_fp_copy()
113 fpl->user = get_uid(current_user()); in scm_fp_copy()
127 free_uid(fpl->user); in __scm_destroy()
345 new_fpl->user = get_uid(fpl->user); in scm_fp_dup()
/linux-4.1.27/Documentation/watchdog/
Dhpwdt.txt11 by the user. Remember that the two modes are not dependent on one another.
12 A user can have the NMI sourcing without the watchdog timer and vice-versa.
24 soft_margin - allows the user to set the watchdog timer value
25 allow_kdump - allows the user to save off a kernel dump image after an NMI
30 for this module parameter is 0 or LAST. If the user wants to
46 NMIs in a matter of seconds. If a user sees the Linux kernel's "dazed and
/linux-4.1.27/arch/s390/kernel/
Dvtime.c69 u64 timer, clock, user, system, steal; in do_account_vtime() local
110 user = S390_lowcore.user_timer - ti->user_timer; in do_account_vtime()
111 S390_lowcore.steal_timer -= user; in do_account_vtime()
118 user_scaled = user; in do_account_vtime()
128 account_user_time(tsk, user, user_scaled); in do_account_vtime()
137 return virt_timer_forward(user + system); in do_account_vtime()
Dcompat_linux.h90 long compat_sys_s390_chown16(const char __user *filename, u16 user, u16 group);
91 long compat_sys_s390_lchown16(const char __user *filename, u16 user, u16 group);
92 long compat_sys_s390_fchown16(unsigned int fd, u16 user, u16 group);
/linux-4.1.27/arch/arm/mm/
Dproc-macros.S159 @ user read-only -> kernel read-only
201 tst r3, #L_PTE_USER @ user?
243 tst r3, #L_PTE_USER @ user?
244 orrne r2, r2, #PTE_EXT_AP_URO_SRW @ yes -> user r/o, system r/w
247 orreq r2, r2, #PTE_EXT_AP_UNO_SRW @ yes -> user n/a, system r/w
248 @ combined with user -> user r/w
/linux-4.1.27/drivers/scsi/isci/
Dinit.c466 struct sci_user_parameters *user = &ihost->user_parameters; in sci_oem_defaults() local
489 user->phys[i].max_speed_generation = SCIC_SDS_PARM_GEN2_SPEED; in sci_oem_defaults()
492 user->phys[i].align_insertion_frequency = 0x7f; in sci_oem_defaults()
493 user->phys[i].in_connection_align_insertion_frequency = 0xff; in sci_oem_defaults()
494 user->phys[i].notify_enable_spin_up_insertion_frequency = 0x33; in sci_oem_defaults()
505 user->stp_inactivity_timeout = 5; in sci_oem_defaults()
506 user->ssp_inactivity_timeout = 5; in sci_oem_defaults()
507 user->stp_max_occupancy_timeout = 5; in sci_oem_defaults()
508 user->ssp_max_occupancy_timeout = 20; in sci_oem_defaults()
509 user->no_outbound_task_timeout = 2; in sci_oem_defaults()
/linux-4.1.27/drivers/infiniband/hw/ehca/
Dhcp_phyp.c66 galpas->user.fw_handle = paddr_user; in hcp_galpas_ctor()
79 galpas->user.fw_handle = galpas->kernel.fw_handle = 0; in hcp_galpas_dtor()
/linux-4.1.27/arch/arm64/include/asm/
Dpage.h53 extern void __cpu_clear_user_page(void *p, unsigned long user);
55 unsigned long user);
/linux-4.1.27/arch/um/
DKconfig.um30 booting and normal file access, this module lets the UML user
38 /tmp/umlshare is a directory on the host with files the UML user
42 <http://user-mode-linux.sourceforge.net/hostfs.html>.
57 See <http://user-mode-linux.sf.net/old/hppfs.html> for more information.
66 The user mode linux management console is a low-level interface to
68 a full-blown operating system running under every user mode linux
DKconfig.debug12 See <http://user-mode-linux.sourceforge.net/old/gprof.html> for more
25 See <http://user-mode-linux.sourceforge.net/old/gprof.html> for more
/linux-4.1.27/fs/exofs/
DKconfig.ore4 # for every ORE user we do it like this. Any user should add itself here
/linux-4.1.27/fs/notify/inotify/
Dinotify_fsnotify.c168 if (group->inotify_data.user) { in inotify_free_group_priv()
169 atomic_dec(&group->inotify_data.user->inotify_devs); in inotify_free_group_priv()
170 free_uid(group->inotify_data.user); in inotify_free_group_priv()
/linux-4.1.27/include/uapi/linux/netfilter/
Dx_tables.h18 } user; member
41 } user; member
58 .target.u.user = { \
/linux-4.1.27/arch/um/include/shared/
Dnet_kern.h42 char user[0]; member
56 const struct net_user_info *user; member
/linux-4.1.27/sound/core/seq/
Dseq_clientmgr.c321 struct snd_seq_user_client *user; in snd_seq_open() local
342 user = &client->data.user; in snd_seq_open()
343 user->fifo = NULL; in snd_seq_open()
344 user->fifo_pool_size = 0; in snd_seq_open()
347 user->fifo_pool_size = SNDRV_SEQ_DEFAULT_CLIENT_EVENTS; in snd_seq_open()
348 user->fifo = snd_seq_fifo_new(user->fifo_pool_size); in snd_seq_open()
349 if (user->fifo == NULL) { in snd_seq_open()
365 user->file = file; in snd_seq_open()
381 if (client->data.user.fifo) in snd_seq_release()
382 snd_seq_fifo_delete(&client->data.user.fifo); in snd_seq_release()
[all …]
/linux-4.1.27/mm/
Dmlock.c730 int user_shm_lock(size_t size, struct user_struct *user) in user_shm_lock() argument
742 locked + user->locked_shm > lock_limit && !capable(CAP_IPC_LOCK)) in user_shm_lock()
744 get_uid(user); in user_shm_lock()
745 user->locked_shm += locked; in user_shm_lock()
752 void user_shm_unlock(size_t size, struct user_struct *user) in user_shm_unlock() argument
755 user->locked_shm -= (size + PAGE_SIZE - 1) >> PAGE_SHIFT; in user_shm_unlock()
757 free_uid(user); in user_shm_unlock()
/linux-4.1.27/arch/x86/kernel/
Dptrace.c827 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) in arch_ptrace()
833 else if (addr >= offsetof(struct user, u_debugreg[0]) && in arch_ptrace()
834 addr <= offsetof(struct user, u_debugreg[7])) { in arch_ptrace()
835 addr -= offsetof(struct user, u_debugreg[0]); in arch_ptrace()
844 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) in arch_ptrace()
849 else if (addr >= offsetof(struct user, u_debugreg[0]) && in arch_ptrace()
850 addr <= offsetof(struct user, u_debugreg[7])) { in arch_ptrace()
851 addr -= offsetof(struct user, u_debugreg[0]); in arch_ptrace()
1143 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user) || in x32_arch_ptrace()
1150 else if (addr >= offsetof(struct user, u_debugreg[0]) && in x32_arch_ptrace()
[all …]
/linux-4.1.27/Documentation/power/
Dfreezing-of-tasks.txt6 The freezing of tasks is a mechanism by which user space processes and some
14 PF_NOFREEZE unset (all user space processes and some kernel threads) are
24 fake signal to all user space processes, and wakes up all the kernel threads.
38 For user space processes try_to_freeze() is called automatically from the
110 The majority of these are user space processes, but if any of the kernel threads
122 3. The third reason is to prevent user space processes and some kernel threads
123 from interfering with the suspending and resuming of devices. A user space
138 user threads and then waiting for a sync is practically one of the easier
142 freezing user threads I don't find really objectionable."
152 4. Another reason for freezing tasks is to prevent user space processes from
[all …]
/linux-4.1.27/Documentation/ABI/stable/
Dsysfs-driver-w1_ds28e046 Users: any user space application which wants to communicate with DS28E04-100
15 Users: any user space application which wants to communicate with DS28E04-100
Dsysfs-firmware-opal-elog23 Typically, a user space daemon will monitor for new
33 user space to solve the problem. In future, we may
35 it easier for simple user space processes to extract
/linux-4.1.27/include/uapi/linux/
Datmsap.h111 unsigned char user; /* user-specified l2 information */ member
122 unsigned char user; /* user specified l3 information */ member
/linux-4.1.27/net/iucv/
DKconfig6 Select this option if you want to use inter-user communication
16 based on z/VM inter-user communication vehicle or based on
/linux-4.1.27/kernel/events/
Dcallchain.c166 int user = !event->attr.exclude_callchain_user; in perf_callchain() local
168 if (!kernel && !user) in perf_callchain()
185 if (user) { in perf_callchain()
/linux-4.1.27/Documentation/x86/
Dentry_64.txt48 toggles whether gs is the kernel gs or the user gs. The swapgs
50 single depth, it should only be used if entering from user mode to
51 kernel mode and then when returning to user-space, and precisely
81 If we are at an interrupt or user-trap/gate-alike boundary then we can
86 user-space execution then we must do the SWAPGS.
98 - Interrupt entry from user mode will switch off the IST stack.
Dexception-tables.txt4 When a process runs in kernel mode, it often has to access user
54 to executable code. This code is hidden inside the user access macros.
138 > 1: movb (%ebx),%dl /* this is the actual user access */
153 understand. Can we? The actual user access is quite obvious. Thanks
154 to the unified address space we can just access the address in user
199 The whole user memory access is reduced to 10 x86 machine instructions.
275 8b) DL becomes zero (the value we "read" from user space)
277 instruction immediately after the faulting user access).
283 get_user macro actually returns a value: 0, if the user access was
/linux-4.1.27/drivers/net/ethernet/ti/
Ddavinci_mdio.c83 } user[0]; member
179 reg = __raw_readl(&regs->user[0].access); in wait_for_user_access()
197 reg = __raw_readl(&regs->user[0].access); in wait_for_user_access()
245 __raw_writel(reg, &data->regs->user[0].access); in davinci_mdio_read()
253 reg = __raw_readl(&data->regs->user[0].access); in davinci_mdio_read()
290 __raw_writel(reg, &data->regs->user[0].access); in davinci_mdio_write()
/linux-4.1.27/net/sched/
Dact_ipt.c39 target = xt_request_find_target(AF_INET, t->u.user.name, in ipt_init_target()
40 t->u.user.revision); in ipt_init_target()
234 t = kmemdup(ipt->tcfi_t, ipt->tcfi_t->u.user.target_size, GFP_ATOMIC); in tcf_ipt_dump()
240 strcpy(t->u.user.name, ipt->tcfi_t->u.kernel.target->name); in tcf_ipt_dump()
242 if (nla_put(skb, TCA_IPT_TARG, ipt->tcfi_t->u.user.target_size, t) || in tcf_ipt_dump()
/linux-4.1.27/kernel/rcu/
Dtiny.c149 void rcu_check_callbacks(int user) in rcu_check_callbacks() argument
152 if (user) in rcu_check_callbacks()
156 if (user) in rcu_check_callbacks()
/linux-4.1.27/net/sctp/
DKconfig22 -- acknowledged error-free non-duplicated transfer of user data,
24 -- sequenced delivery of user messages within multiple streams,
25 with an option for order-of-arrival delivery of individual user
27 -- optional bundling of multiple user messages into a single SCTP
/linux-4.1.27/net/unix/
Dgarbage.c119 void unix_inflight(struct user_struct *user, struct file *fp) in unix_inflight() argument
136 user->unix_inflight++; in unix_inflight()
140 void unix_notinflight(struct user_struct *user, struct file *fp) in unix_notinflight() argument
155 user->unix_inflight--; in unix_notinflight()
/linux-4.1.27/Documentation/i2c/
Dold-module-parameters1 I2C device driver binding control from user-space
5 <linux/i2c.h> which created standard module parameters to let the user
15 "instantiating-devices", section "Method 4: Instantiate from user-space".
/linux-4.1.27/drivers/android/
DKconfig30 Enable this to support an old 32-bit Android user-space (v4.4 and
33 Note that enabling this will break newer Android user-space.
/linux-4.1.27/drivers/lguest/
Dcore.c209 int run_guest(struct lg_cpu *cpu, unsigned long __user *user) in run_guest() argument
213 if (put_user(*cpu->reg_read, user)) in run_guest()
230 if (copy_to_user(user, &cpu->pending, in run_guest()
/linux-4.1.27/drivers/staging/iio/Documentation/
Dsysfs-bus-iio-dds9 (out_altvoltageX_pincontrol_frequency_en is active) or the user
28 To exit this mode the user can write
39 (out_altvoltageX_pincontrol_phase_en is active) or the user can
58 out_altvoltageX_phaseY. To exit this mode the user can write
Dsysfs-bus-iio-adc-ad7280a15 The inY-inZ_balance_timer file allows the user to program
17 allows the user to set the timer to a value from 0 minutes to
/linux-4.1.27/Documentation/crypto/
Dapi-intro.txt21 'Transforms' are user-instantiated objects, which maintain state, handle all
23 abstraction to the underlying algorithms. However, at the user
28 [transform api] (user interface)
32 The idea is to make the user interface and algorithm registration API
81 Transforms may only be allocated in user context, and cryptographic
82 methods may only be called from softirq and user contexts. For
84 user context.
/linux-4.1.27/arch/tile/
DKconfig281 Select the desired split between kernel and user memory.
288 available to user programs, making the address space there
297 bool "3.75G/0.25G user/kernel split (no kernel networking)"
299 bool "3.5G/0.5G user/kernel split"
301 bool "3G/1G user/kernel split"
303 bool "2.75G/1.25G user/kernel split (for full 1G low memory)"
305 bool "2.5G/1.5G user/kernel split"
307 bool "2.25G/1.75G user/kernel split"
309 bool "2G/2G user/kernel split"
311 bool "1G/3G user/kernel split"
[all …]
/linux-4.1.27/arch/um/os-Linux/drivers/
Dtuntap_kern.c25 tpri = (struct tuntap_data *) pri->user; in tuntap_init()
74 .user = &tuntap_user_info,
Dethertap_kern.c26 epri = (struct ethertap_data *) pri->user; in etap_init()
88 .user = &ethertap_user_info,
/linux-4.1.27/include/net/
Daf_unix.h9 void unix_inflight(struct user_struct *user, struct file *fp);
10 void unix_notinflight(struct user_struct *user, struct file *fp);
/linux-4.1.27/tools/perf/util/
Dprobe-event.h132 bool user);
137 bool user);
/linux-4.1.27/Documentation/hid/
Dhiddev.txt52 So you point your hiddev compliant user-space program at the correct
55 Assuming that you have a hiddev compliant user-space program, of
113 The user passes in a hiddev_collection_info struct with the index
143 be filled in by the user through HIDIOCSUSAGE calls (below) to fill in
148 Fills in a hiddev_report_info structure for the user. The report is
150 must be filled in by the user. The ID can be absolute -- the actual
161 hiddev_field_info structure. The user must fill in report_id and
173 usage to be retrieved can be specified as above, or the user can
180 Sets the value of a usage in an output report. The user fills in
Duhid.txt4 UHID allows user-space to implement HID transport drivers. Please see
8 With UHID, a user-space transport driver can create kernel hid-devices for each
9 device connected to the user-space controlled bus. The UHID API defines the I/O
10 events provided from the kernel to user-space and vice versa.
12 There is an example user-space application in ./samples/uhid/uhid-example.c
50 UHID_OPEN event, the internally attached HID Device Driver has no user attached.
53 user closes the HID device, you will receive an UHID_CLOSE event. This may be
55 reference-counting in user-space. That is, you will never receive multiple
137 For messages sent by user-space to the kernel, you must adjust the
/linux-4.1.27/Documentation/usb/
Dfunctionfs.txt5 the user space driver has registered by writing descriptors and
6 strings (the user space program has to provide the same information
13 From user space point of view it is a file system which when
40 where the last two are implemented via FunctionFS. On user space
Dhotplug.txt9 to publish their device (and class) support to user utilities.
19 This involves a mix of kernel mode and user mode actions. Making devices
20 be immediately usable means that any user mode actions can't wait for an
23 actively (calling such a user mode helper program directly).
75 user mode daemon to detect changes in system configuration.
86 files can be used by various user mode policy agents to make sure all the
/linux-4.1.27/arch/mn10300/kernel/
Dptrace.c265 struct user *dummy = NULL; in user_enable_single_step()
280 struct user *dummy = NULL; in user_disable_single_step()
308 if ((addr & 3) || addr > sizeof(struct user) - 3) in arch_ptrace()
321 if ((addr & 3) || addr > sizeof(struct user) - 3) in arch_ptrace()
/linux-4.1.27/Documentation/wimax/
DREADME.wimax7 control API for WiMAX devices, usable from kernel and user space.
22 the user. As well, the stack provides API functions that the driver
25 The stack exports the API calls needed to control the device to user
47 The drivers will register debugfs entries that allow the user to tweak
/linux-4.1.27/net/bluetooth/hidp/
Dcore.c65 struct l2cap_user *user);
67 struct l2cap_user *user);
930 session->user.probe = hidp_session_probe; in hidp_session_new()
931 session->user.remove = hidp_session_remove; in hidp_session_new()
1088 struct l2cap_user *user) in hidp_session_probe() argument
1090 struct hidp_session *session = container_of(user, in hidp_session_probe()
1092 user); in hidp_session_probe()
1149 struct l2cap_user *user) in hidp_session_remove() argument
1151 struct hidp_session *session = container_of(user, in hidp_session_remove()
1153 user); in hidp_session_remove()
[all …]
/linux-4.1.27/net/netrom/
Daf_netrom.c568 ax25_uid_assoc *user; in nr_bind() local
607 user = ax25_findbyuid(current_euid()); in nr_bind()
608 if (user) { in nr_bind()
609 nr->user_addr = user->call; in nr_bind()
610 ax25_uid_put(user); in nr_bind()
640 ax25_uid_assoc *user; in nr_connect() local
681 user = ax25_findbyuid(current_euid()); in nr_connect()
682 if (user) { in nr_connect()
683 nr->user_addr = user->call; in nr_connect()
684 ax25_uid_put(user); in nr_connect()
[all …]
/linux-4.1.27/arch/m68k/include/asm/
Da.out-core.h23 static inline void aout_dump_thread(struct pt_regs *regs, struct user *dump) in aout_dump_thread()
40 dump->u_ar0 = offsetof(struct user, regs); in aout_dump_thread()
/linux-4.1.27/fs/autofs4/
DKconfig7 automounter (amd), which is a pure user space daemon.
9 To use the automounter you need the user-space tools from
/linux-4.1.27/fs/coda/
DKconfig14 *client*. You will need user level code as well, both for the
15 client and server. Servers are currently user level, i.e. they need
/linux-4.1.27/arch/xtensa/kernel/
Dptrace.c145 ret |= __copy_to_user(&xtregs->user,&ti->xtregs_user, in ptrace_getxregs()
146 sizeof(xtregs->user)); in ptrace_getxregs()
171 ret |= __copy_from_user(&ti->xtregs_user, &xtregs->user, in ptrace_setxregs()
172 sizeof(xtregs->user)); in ptrace_setxregs()
/linux-4.1.27/Documentation/s390/
Dkvm.txt28 This call causes the kernel to switch on PGSTE in the user page table. This
31 will implicitly try to switch on PGSTE if the user process has not called
36 the calling process. It does not have any user-visible effect other than a small
48 at guest absolute address zero and at a user address that is aligned on any
52 user memory layout this does still allow a large flexibility when
54 ** KVM_GET_DIRTY_LOG doesn't work properly yet. The user will receive an empty
/linux-4.1.27/Documentation/early-userspace/
DREADME41 built by an unprivileged user.
49 directory, limited user and group ID translation can be performed.
50 INITRAMFS_ROOT_UID can be set to a user ID that needs to be mapped to
51 user root (0). INITRAMFS_ROOT_GID can be set to a group ID that needs
60 initramfs image will be an aggregate of all of them. In this way a user
62 Because device-special files cannot be created by a unprivileged user,
65 early userspace image can be built by an unprivileged user.
/linux-4.1.27/drivers/usb/atm/
DKconfig26 two parts of the firmware, extracted by the user space tools; see
38 install the firmware, extracted by the user space tools; see
63 the modem using a user space utility (a firmware loader for example).
/linux-4.1.27/Documentation/filesystems/cifs/
DREADME70 domain to the proper network user. The mount.cifs mount helper can be
89 2) an entry for the share in /etc/fstab indicating that a user may
91 //server/usersharename /mnt/username cifs user 0 0
93 Note that when the mount.cifs utility is run suid (allowing user mounts),
99 by simply specifying "nosuid" among the mount options. For user mounts
110 To permit users to ummount directories that they have user mounted (see above),
115 helper). As with mount.cifs, to enable user unmounts umount.cifs must be marked
119 must be a cifs mount, and the uid of the current user must match the uid
120 of the user who mounted the resource.
122 Also note that the customary way of allowing user mounts and unmounts is
[all …]
/linux-4.1.27/drivers/clocksource/
Dem_sti.c163 static int em_sti_start(struct em_sti_priv *p, unsigned int user) in em_sti_start() argument
175 p->active[user] = 1; in em_sti_start()
181 static void em_sti_stop(struct em_sti_priv *p, unsigned int user) in em_sti_stop() argument
188 p->active[user] = 0; in em_sti_stop()
/linux-4.1.27/Documentation/serial/
Dserial-rs485.txt22 available at user-level to allow switching from one mode to the other, and
39 to enable/disable RS485 mode from user-space
42 to get RS485 mode from kernel-space (i.e., driver) to user-space.
83 From user-level, RS485 configuration can be get/set using the previous
/linux-4.1.27/arch/cris/arch-v10/
DREADME.mm37 space. We also use it to keep the user-mode virtual mapping in the same
39 user-mode process' data.
42 address 0, overlapping with the user-mode virtual space, so that descriptor
45 0xc0000000, to co-exist with the user-mode mapping. We will do something
84 In user-mode it looks the same except that only the space 0-AFFFFFFF is
91 and shrinking the user-mode memory space.
93 The MMU can map all 4 GB in user mode, but doing that would mean that a
94 few extra instructions would be needed for each access to user mode
/linux-4.1.27/fs/cifs/
Dcifsencrypt.c495 __le16 *user; in calc_ntlmv2_hash() local
522 user = kmalloc(2 + (len * 2), GFP_KERNEL); in calc_ntlmv2_hash()
523 if (user == NULL) { in calc_ntlmv2_hash()
529 len = cifs_strtoUTF16(user, ses->user_name, len, nls_cp); in calc_ntlmv2_hash()
530 UniStrupr(user); in calc_ntlmv2_hash()
532 memset(user, '\0', 2); in calc_ntlmv2_hash()
536 (char *)user, 2 * len); in calc_ntlmv2_hash()
537 kfree(user); in calc_ntlmv2_hash()
/linux-4.1.27/drivers/thermal/
DKconfig71 Select this if you want to let the user space manage the
100 Enable this to let the user space manage the platform thermals.
132 user can manually input temperature and test the different trip
239 user interface is exposed via generic thermal framework.
249 two trip points which can be set by user to get notifications via thermal
260 be set by user mode programs to get notifications via Linux thermal
279 the information to the user or use this information for making
281 information to allow the user to select his laptop to run without

1234567