/linux-4.1.27/arch/arm/mach-omap2/ |
D | omap_hwmod_33xx_43xx_interconnect_data.c | 26 .user = OCP_USER_MPU, 34 .user = OCP_USER_MPU | OCP_USER_SDMA, 42 .user = OCP_USER_MPU | OCP_USER_SDMA, 50 .user = OCP_USER_MPU | OCP_USER_SDMA, 58 .user = OCP_USER_MPU | OCP_USER_SDMA, 66 .user = OCP_USER_MPU | OCP_USER_SDMA, 74 .user = OCP_USER_MPU | OCP_USER_SDMA, 82 .user = OCP_USER_MPU | OCP_USER_SDMA, 90 .user = OCP_USER_MPU | OCP_USER_SDMA, 98 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_2xxx_interconnect_data.c | 31 .user = OCP_USER_MPU | OCP_USER_SDMA, 38 .user = OCP_USER_MPU, 51 .user = OCP_USER_MPU | OCP_USER_SDMA, 58 .user = OCP_USER_MPU | OCP_USER_SDMA, 66 .user = OCP_USER_MPU | OCP_USER_SDMA, 74 .user = OCP_USER_MPU | OCP_USER_SDMA, 82 .user = OCP_USER_MPU | OCP_USER_SDMA, 90 .user = OCP_USER_MPU | OCP_USER_SDMA, 98 .user = OCP_USER_MPU | OCP_USER_SDMA, 106 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_43xx_data.c | 590 .user = OCP_USER_MPU | OCP_USER_SDMA, 597 .user = OCP_USER_MPU | OCP_USER_SDMA, 604 .user = OCP_USER_MPU | OCP_USER_SDMA, 611 .user = OCP_USER_MPU, 618 .user = OCP_USER_MPU, 625 .user = OCP_USER_MPU, 632 .user = OCP_USER_MPU, 639 .user = OCP_USER_MPU, 646 .user = OCP_USER_MPU | OCP_USER_SDMA, 653 .user = OCP_USER_MPU, [all …]
|
D | omap_hwmod_7xx_data.c | 2329 .user = OCP_USER_MPU | OCP_USER_SDMA, 2337 .user = OCP_USER_MPU | OCP_USER_SDMA, 2345 .user = OCP_USER_MPU, 2353 .user = OCP_USER_MPU, 2361 .user = OCP_USER_MPU | OCP_USER_SDMA, 2369 .user = OCP_USER_MPU | OCP_USER_SDMA, 2377 .user = OCP_USER_MPU | OCP_USER_SDMA, 2385 .user = OCP_USER_MPU | OCP_USER_SDMA, 2393 .user = OCP_USER_MPU | OCP_USER_SDMA, 2401 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_44xx_data.c | 2122 .user = OCP_USER_MPU | OCP_USER_SDMA, 2169 .user = OCP_USER_MPU | OCP_USER_SDMA, 3158 .user = OCP_USER_SDMA, 3166 .user = OCP_USER_MPU, 3174 .user = OCP_USER_MPU | OCP_USER_SDMA, 3182 .user = OCP_USER_MPU | OCP_USER_SDMA, 3190 .user = OCP_USER_MPU | OCP_USER_SDMA, 3198 .user = OCP_USER_MPU | OCP_USER_SDMA, 3206 .user = OCP_USER_MPU | OCP_USER_SDMA, 3214 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_2420_data.c | 286 .user = OCP_USER_MPU | OCP_USER_SDMA, 294 .user = OCP_USER_MPU | OCP_USER_SDMA, 302 .user = OCP_USER_MPU | OCP_USER_SDMA, 310 .user = OCP_USER_MPU | OCP_USER_SDMA, 318 .user = OCP_USER_MPU | OCP_USER_SDMA, 326 .user = OCP_USER_MPU | OCP_USER_SDMA, 334 .user = OCP_USER_MPU | OCP_USER_SDMA, 342 .user = OCP_USER_MPU | OCP_USER_SDMA, 350 .user = OCP_USER_MPU | OCP_USER_SDMA, 358 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_2430_data.c | 447 .user = OCP_USER_MPU, 455 .user = OCP_USER_MPU | OCP_USER_SDMA, 463 .user = OCP_USER_MPU | OCP_USER_SDMA, 471 .user = OCP_USER_MPU, 479 .user = OCP_USER_MPU | OCP_USER_SDMA, 487 .user = OCP_USER_MPU | OCP_USER_SDMA, 495 .user = OCP_USER_MPU | OCP_USER_SDMA, 503 .user = OCP_USER_MPU | OCP_USER_SDMA, 511 .user = OCP_USER_MPU | OCP_USER_SDMA, 519 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_54xx_data.c | 2041 .user = OCP_USER_MPU | OCP_USER_SDMA, 2098 .user = OCP_USER_MPU | OCP_USER_SDMA, 2110 .user = OCP_USER_SDMA, 2118 .user = OCP_USER_MPU | OCP_USER_SDMA, 2126 .user = OCP_USER_MPU | OCP_USER_SDMA, 2134 .user = OCP_USER_MPU | OCP_USER_SDMA, 2142 .user = OCP_USER_MPU | OCP_USER_SDMA, 2150 .user = OCP_USER_MPU, 2158 .user = OCP_USER_MPU, 2166 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_81xx_data.c | 144 .user = OCP_USER_MPU, 151 .user = OCP_USER_MPU, 172 .user = OCP_USER_MPU, 179 .user = OCP_USER_MPU, 218 .user = OCP_USER_MPU, 239 .user = OCP_USER_MPU, 260 .user = OCP_USER_MPU, 297 .user = OCP_USER_MPU, 334 .user = OCP_USER_MPU, 365 .user = OCP_USER_MPU, [all …]
|
D | omap_hwmod_33xx_data.c | 350 .user = OCP_USER_MPU | OCP_USER_SDMA, 358 .user = OCP_USER_MPU | OCP_USER_SDMA, 366 .user = OCP_USER_MPU | OCP_USER_SDMA, 374 .user = OCP_USER_MPU | OCP_USER_SDMA, 382 .user = OCP_USER_MPU | OCP_USER_SDMA, 400 .user = OCP_USER_MPU, 408 .user = OCP_USER_MPU, 416 .user = OCP_USER_MPU, 424 .user = OCP_USER_MPU, 432 .user = OCP_USER_MPU, [all …]
|
D | omap_hwmod_3xxx_data.c | 2192 .user = OCP_USER_MPU | OCP_USER_SDMA, 2199 .user = OCP_USER_MPU | OCP_USER_SDMA, 2216 .user = OCP_USER_MPU, 2233 .user = OCP_USER_MPU, 2240 .user = OCP_USER_MPU | OCP_USER_SDMA, 2252 .user = OCP_USER_MPU | OCP_USER_SDMA, 2260 .user = OCP_USER_MPU, 2268 .user = OCP_USER_MPU, 2276 .user = OCP_USER_MPU, 2283 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | pm-debug.c | 77 static int clkdm_dbg_show_counter(struct clockdomain *clkdm, void *user) in clkdm_dbg_show_counter() argument 79 struct seq_file *s = (struct seq_file *)user; in clkdm_dbg_show_counter() 92 static int pwrdm_dbg_show_counter(struct powerdomain *pwrdm, void *user) in pwrdm_dbg_show_counter() argument 94 struct seq_file *s = (struct seq_file *)user; in pwrdm_dbg_show_counter() 122 static int pwrdm_dbg_show_timer(struct powerdomain *pwrdm, void *user) in pwrdm_dbg_show_timer() argument 124 struct seq_file *s = (struct seq_file *)user; in pwrdm_dbg_show_timer()
|
D | powerdomain.h | 209 int pwrdm_for_each(int (*fn)(struct powerdomain *pwrdm, void *user), 210 void *user); 211 int pwrdm_for_each_nolock(int (*fn)(struct powerdomain *pwrdm, void *user), 212 void *user);
|
/linux-4.1.27/fs/ncpfs/ |
D | ioctl.c | 162 struct ncp_nls_ioctl user; in ncp_set_charsets() local 170 if (copy_from_user(&user, arg, sizeof(user))) in ncp_set_charsets() 174 user.codepage[NCP_IOCSNAME_LEN] = 0; in ncp_set_charsets() 175 if (!user.codepage[0] || !strcmp(user.codepage, "default")) in ncp_set_charsets() 178 codepage = load_nls(user.codepage); in ncp_set_charsets() 185 user.iocharset[NCP_IOCSNAME_LEN] = 0; in ncp_set_charsets() 186 if (!user.iocharset[0] || !strcmp(user.iocharset, "default")) { in ncp_set_charsets() 189 } else if (!strcmp(user.iocharset, "utf8")) { in ncp_set_charsets() 193 iocharset = load_nls(user.iocharset); in ncp_set_charsets() 227 struct ncp_nls_ioctl user; in ncp_get_charsets() local [all …]
|
/linux-4.1.27/include/linux/ |
D | ipmi.h | 63 ipmi_user_t user; member 105 ipmi_user_t *user); 113 int ipmi_destroy_user(ipmi_user_t user); 116 void ipmi_get_version(ipmi_user_t user, 126 int ipmi_set_my_address(ipmi_user_t user, 129 int ipmi_get_my_address(ipmi_user_t user, 132 int ipmi_set_my_LUN(ipmi_user_t user, 135 int ipmi_get_my_LUN(ipmi_user_t user, 152 int ipmi_request_settime(ipmi_user_t user, 170 int ipmi_request_supply_msgs(ipmi_user_t user, [all …]
|
D | dcookies.h | 34 void dcookie_unregister(struct dcookie_user * user); 56 static inline void dcookie_unregister(struct dcookie_user * user) in dcookie_unregister() argument
|
D | kernel_stat.h | 87 static inline void account_process_tick(struct task_struct *tsk, int user) in account_process_tick() argument 92 extern void account_process_tick(struct task_struct *, int user);
|
/linux-4.1.27/arch/m68k/ifpsp060/ |
D | os.S | 57 | Each IO routine checks to see if the memory write/read is to/from user 60 | for user mode applications. 71 | working in user space 80 | a1 - user destination address 82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 110 | a0 - user source address 113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 140 | Read a data byte from user memory. 143 | a0 - user source address 144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode [all …]
|
/linux-4.1.27/net/bridge/netfilter/ |
D | ebt_mark_m.c | 47 const struct compat_ebt_mark_m_info *user = src; in mark_mt_compat_from_user() local 50 kern->mark = user->mark; in mark_mt_compat_from_user() 51 kern->mask = user->mask; in mark_mt_compat_from_user() 52 kern->invert = user->invert; in mark_mt_compat_from_user() 53 kern->bitmask = user->bitmask; in mark_mt_compat_from_user() 58 struct compat_ebt_mark_m_info __user *user = dst; in mark_mt_compat_to_user() local 61 if (put_user(kern->mark, &user->mark) || in mark_mt_compat_to_user() 62 put_user(kern->mask, &user->mask) || in mark_mt_compat_to_user() 63 put_user(kern->invert, &user->invert) || in mark_mt_compat_to_user() 64 put_user(kern->bitmask, &user->bitmask)) in mark_mt_compat_to_user()
|
D | ebt_mark.c | 63 const struct compat_ebt_mark_t_info *user = src; in mark_tg_compat_from_user() local 66 kern->mark = user->mark; in mark_tg_compat_from_user() 67 kern->target = user->target; in mark_tg_compat_from_user() 72 struct compat_ebt_mark_t_info __user *user = dst; in mark_tg_compat_to_user() local 75 if (put_user(kern->mark, &user->mark) || in mark_tg_compat_to_user() 76 put_user(kern->target, &user->target)) in mark_tg_compat_to_user()
|
D | ebt_limit.c | 58 user2credits(u_int32_t user) in user2credits() argument 61 if (user > 0xFFFFFFFF / (HZ*CREDITS_PER_JIFFY)) in user2credits() 63 return (user / EBT_LIMIT_SCALE) * HZ * CREDITS_PER_JIFFY; in user2credits() 65 return (user * HZ * CREDITS_PER_JIFFY) / EBT_LIMIT_SCALE; in user2credits()
|
D | ebtables.c | 1095 static int do_replace(struct net *net, const void __user *user, in do_replace() argument 1102 if (copy_from_user(&tmp, user, sizeof(tmp)) != 0) in do_replace() 1281 const void __user *user, unsigned int len) in do_update_counters() argument 1327 static int update_counters(struct net *net, const void __user *user, in update_counters() argument 1332 if (copy_from_user(&hlp, user, sizeof(hlp))) in update_counters() 1339 hlp.num_counters, user, len); in update_counters() 1396 void __user *user, unsigned int num_counters, in copy_counters_to_user() argument 1419 if (copy_to_user(user, counterstmp, in copy_counters_to_user() 1427 static int copy_everything_to_user(struct ebt_table *t, void __user *user, in copy_everything_to_user() argument 1448 if (copy_from_user(&tmp, user, sizeof(tmp))) in copy_everything_to_user() [all …]
|
/linux-4.1.27/security/keys/ |
D | key.c | 56 struct key_user *candidate = NULL, *user; in key_user_lookup() local 67 user = rb_entry(parent, struct key_user, node); in key_user_lookup() 69 if (uid_lt(uid, user->uid)) in key_user_lookup() 71 else if (uid_gt(uid, user->uid)) in key_user_lookup() 83 user = NULL; in key_user_lookup() 108 user = candidate; in key_user_lookup() 113 atomic_inc(&user->usage); in key_user_lookup() 117 return user; in key_user_lookup() 123 void key_user_put(struct key_user *user) in key_user_put() argument 125 if (atomic_dec_and_lock(&user->usage, &key_user_lock)) { in key_user_put() [all …]
|
D | proc.c | 92 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next() 129 if (kuid_has_mapping(user_ns, minkey->user->uid)) in find_ge_key() 275 struct key_user *user = rb_entry(n, struct key_user, node); in __key_user_next() local 276 if (kuid_has_mapping(user_ns, user->uid)) in __key_user_next() 335 struct key_user *user = rb_entry(_p, struct key_user, node); in proc_key_users_show() local 336 unsigned maxkeys = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show() 338 unsigned maxbytes = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show() 342 from_kuid_munged(seq_user_ns(m), user->uid), in proc_key_users_show() 343 atomic_read(&user->usage), in proc_key_users_show() 344 atomic_read(&user->nkeys), in proc_key_users_show() [all …]
|
D | process_keys.c | 45 struct user_struct *user; in install_user_keyrings() local 55 user = cred->user; in install_user_keyrings() 56 uid = from_kuid(cred->user_ns, user->uid); in install_user_keyrings() 58 kenter("%p{%u}", user, uid); in install_user_keyrings() 60 if (user->uid_keyring && user->session_keyring) { in install_user_keyrings() 68 if (!user->uid_keyring) { in install_user_keyrings() 77 uid_keyring = keyring_alloc(buf, user->uid, INVALID_GID, in install_user_keyrings() 93 keyring_alloc(buf, user->uid, INVALID_GID, in install_user_keyrings() 109 user->uid_keyring = uid_keyring; in install_user_keyrings() 110 user->session_keyring = session_keyring; in install_user_keyrings() [all …]
|
D | request_key.c | 150 session = cred->user->session_keyring; in call_sbin_request_key() 305 key_get(cred->user->session_keyring); in construct_get_dest_keyring() 309 dest_keyring = key_get(cred->user->uid_keyring); in construct_get_dest_keyring() 333 struct key_user *user, in construct_alloc_key() argument 346 mutex_lock(&user->cons_lock); in construct_alloc_key() 385 mutex_unlock(&user->cons_lock); in construct_alloc_key() 404 mutex_unlock(&user->cons_lock); in construct_alloc_key() 410 mutex_unlock(&user->cons_lock); in construct_alloc_key() 416 mutex_unlock(&user->cons_lock); in construct_alloc_key() 422 mutex_unlock(&user->cons_lock); in construct_alloc_key() [all …]
|
D | gc.c | 147 spin_lock(&key->user->lock); in key_gc_unused_keys() 148 key->user->qnkeys--; in key_gc_unused_keys() 149 key->user->qnbytes -= key->quotalen; in key_gc_unused_keys() 150 spin_unlock(&key->user->lock); in key_gc_unused_keys() 153 atomic_dec(&key->user->nkeys); in key_gc_unused_keys() 155 atomic_dec(&key->user->nikeys); in key_gc_unused_keys() 157 key_user_put(key->user); in key_gc_unused_keys()
|
D | keyctl.c | 793 long keyctl_chown_key(key_serial_t id, uid_t user, gid_t group) in keyctl_chown_key() argument 802 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key() 805 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key() 811 if (user == (uid_t) -1 && group == (gid_t) -1) in keyctl_chown_key() 829 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key() 839 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key() 863 spin_lock(&key->user->lock); in keyctl_chown_key() 864 key->user->qnkeys--; in keyctl_chown_key() 865 key->user->qnbytes -= key->quotalen; in keyctl_chown_key() 866 spin_unlock(&key->user->lock); in keyctl_chown_key() [all …]
|
/linux-4.1.27/drivers/char/ipmi/ |
D | ipmi_poweroff.c | 64 static void (*specific_poweroff_func)(ipmi_user_t user); 141 static int ipmi_request_wait_for_response(ipmi_user_t user, in ipmi_request_wait_for_response() argument 150 rv = ipmi_request_supply_msgs(user, addr, 0, send_msg, &comp, in ipmi_request_wait_for_response() 161 static int ipmi_request_in_rc_mode(ipmi_user_t user, in ipmi_request_in_rc_mode() argument 168 rv = ipmi_request_supply_msgs(user, addr, 0, send_msg, NULL, in ipmi_request_in_rc_mode() 179 ipmi_poll_interface(user); in ipmi_request_in_rc_mode() 201 static void (*atca_oem_poweroff_hook)(ipmi_user_t user); 203 static void pps_poweroff_atca(ipmi_user_t user) in pps_poweroff_atca() argument 221 rv = ipmi_request_in_rc_mode(user, in pps_poweroff_atca() 231 static int ipmi_atca_detect(ipmi_user_t user) in ipmi_atca_detect() argument [all …]
|
D | ipmi_msghandler.c | 118 ipmi_user_t user; member 735 if (!msg->user) { in deliver_response() 748 ipmi_user_t user = msg->user; in deliver_response() local 749 user->handler->ipmi_recv_hndl(msg, user->handler_data); in deliver_response() 916 ipmi_user_t *user) in ipmi_create_user() argument 1002 *user = new_user; in ipmi_create_user() 1043 ipmi_user_t user = container_of(ref, struct ipmi_user, refcount); in free_user() local 1044 kfree(user); in free_user() 1047 int ipmi_destroy_user(ipmi_user_t user) in ipmi_destroy_user() argument 1049 ipmi_smi_t intf = user->intf; in ipmi_destroy_user() [all …]
|
D | ipmi_devintf.c | 49 ipmi_user_t user; member 133 &(priv->user)); in ipmi_open() 162 rv = ipmi_destroy_user(priv->user); in ipmi_release() 175 static int handle_send_req(ipmi_user_t user, in handle_send_req() argument 221 rv = ipmi_request_settime(user, in handle_send_req() 253 rv = handle_send_req(priv->user, in ipmi_ioctl() 269 rv = handle_send_req(priv->user, in ipmi_ioctl() 386 rv = ipmi_register_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl() 400 rv = ipmi_unregister_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl() 414 rv = ipmi_register_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl() [all …]
|
/linux-4.1.27/arch/frv/kernel/ |
D | ptrace.c | 45 const struct user_int_regs *iregs = &target->thread.user->i; in genregs_get() 65 struct user_int_regs *iregs = &target->thread.user->i; in genregs_set() 110 const struct user_fpmedia_regs *fpregs = &target->thread.user->f; in fpmregs_get() 130 struct user_fpmedia_regs *fpregs = &target->thread.user->f; in fpmregs_set() 205 struct user_context *user = task->thread.user; in get_reg() local 210 return ((unsigned long *) user)[regno]; in get_reg() 219 struct user_context *user = task->thread.user; in put_reg() local 231 ((unsigned long *) user)[regno] = data; in put_reg() 323 0, sizeof(child->thread.user->i), in arch_ptrace() 329 0, sizeof(child->thread.user->i), in arch_ptrace() [all …]
|
D | entry-table.S | 25 # (3) The trap table for user mode 35 # The user and kernel trap tables use the same prologue for normal 40 # (6) The fixup table for user-trap single-step 47 # The linker script places the user mode and kernel mode trap tables on to 59 # trap table for entry from user mode 60 .section .trap.user,"ax" 77 # trap fixup table for single-stepping in user mode 78 .section .trap.fixup.user,"a" 83 # trap fixup table for single-stepping in user mode 91 .section .trap.user [all …]
|
D | signal.c | 61 struct user_context *user = current->thread.user; in restore_sigcontext() local 67 tbr = user->i.tbr; in restore_sigcontext() 68 psr = user->i.psr; in restore_sigcontext() 69 if (copy_from_user(user, &sc->sc_context, sizeof(sc->sc_context))) in restore_sigcontext() 71 user->i.tbr = tbr; in restore_sigcontext() 72 user->i.psr = psr; in restore_sigcontext() 74 restore_user_regs(user); in restore_sigcontext() 76 user->i.syscallno = -1; /* disable syscall checks */ in restore_sigcontext() 78 *_gr8 = user->i.gr[8]; in restore_sigcontext() 142 save_user_regs(current->thread.user); in setup_sigcontext() [all …]
|
D | process.c | 151 save_user_regs(p->thread.user); in copy_thread() 164 save_user_regs(p->thread.user); in copy_thread() 278 ¤t->thread.user->f, in dump_fpu() 279 sizeof(current->thread.user->f)); in dump_fpu()
|
D | vmlinux.lds.S | 49 *(.trap.user) 86 *(.trap.fixup.user .trap.fixup.kernel)
|
/linux-4.1.27/arch/arm/kernel/ |
D | sys_oabi-compat.c | 199 struct oabi_flock64 user; in sys_oabi_fcntl64() local 212 if (copy_from_user(&user, (struct oabi_flock64 __user *)arg, in sys_oabi_fcntl64() 213 sizeof(user))) in sys_oabi_fcntl64() 215 kernel.l_type = user.l_type; in sys_oabi_fcntl64() 216 kernel.l_whence = user.l_whence; in sys_oabi_fcntl64() 217 kernel.l_start = user.l_start; in sys_oabi_fcntl64() 218 kernel.l_len = user.l_len; in sys_oabi_fcntl64() 219 kernel.l_pid = user.l_pid; in sys_oabi_fcntl64() 230 user.l_type = kernel.l_type; in sys_oabi_fcntl64() 231 user.l_whence = kernel.l_whence; in sys_oabi_fcntl64() [all …]
|
/linux-4.1.27/block/ |
D | ioprio.c | 66 struct user_struct *user; in SYSCALL_DEFINE3() local 118 user = current_user(); in SYSCALL_DEFINE3() 120 user = find_user(uid); in SYSCALL_DEFINE3() 122 if (!user) in SYSCALL_DEFINE3() 134 free_uid(user); in SYSCALL_DEFINE3() 181 struct user_struct *user; in SYSCALL_DEFINE2() local 215 user = current_user(); in SYSCALL_DEFINE2() 217 user = find_user(uid); in SYSCALL_DEFINE2() 219 if (!user) in SYSCALL_DEFINE2() 223 if (!uid_eq(task_uid(p), user->uid)) in SYSCALL_DEFINE2() [all …]
|
/linux-4.1.27/arch/x86/include/asm/ |
D | pm-trace.h | 6 #define TRACE_RESUME(user) \ argument 17 generate_pm_trace(tracedata, user); \ 21 #define TRACE_SUSPEND(user) TRACE_RESUME(user) argument
|
/linux-4.1.27/include/uapi/mtd/ |
D | Kbuild | 2 header-y += inftl-user.h 4 header-y += mtd-user.h 5 header-y += nftl-user.h 6 header-y += ubi-user.h
|
/linux-4.1.27/fs/ |
D | dcookies.c | 312 struct dcookie_user * user; in dcookie_register() local 316 user = kmalloc(sizeof(struct dcookie_user), GFP_KERNEL); in dcookie_register() 317 if (!user) in dcookie_register() 323 list_add(&user->next, &dcookie_users); in dcookie_register() 327 return user; in dcookie_register() 329 kfree(user); in dcookie_register() 330 user = NULL; in dcookie_register() 335 void dcookie_unregister(struct dcookie_user * user) in dcookie_unregister() argument 339 list_del(&user->next); in dcookie_unregister() 340 kfree(user); in dcookie_unregister()
|
D | open.c | 565 static int chown_common(struct path *path, uid_t user, gid_t group) in chown_common() argument 574 uid = make_kuid(current_user_ns(), user); in chown_common() 579 if (user != (uid_t) -1) { in chown_common() 607 SYSCALL_DEFINE5(fchownat, int, dfd, const char __user *, filename, uid_t, user, in SYSCALL_DEFINE5() argument 627 error = chown_common(&path, user, group); in SYSCALL_DEFINE5() 639 SYSCALL_DEFINE3(chown, const char __user *, filename, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument 641 return sys_fchownat(AT_FDCWD, filename, user, group, 0); in SYSCALL_DEFINE3() 644 SYSCALL_DEFINE3(lchown, const char __user *, filename, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument 646 return sys_fchownat(AT_FDCWD, filename, user, group, in SYSCALL_DEFINE3() 650 SYSCALL_DEFINE3(fchown, unsigned int, fd, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument [all …]
|
/linux-4.1.27/Documentation/namespaces/ |
D | compatibility-list.txt | 3 This document contains the information about the problems user 28 2. Intentionally, two equal user IDs in different user namespaces 30 words, user 10 in one user namespace shouldn't have the same 31 access permissions to files, belonging to user 10 in another 35 from different user namespaces should not access the same IPC objects
|
D | resource-control.txt | 3 of processes is allowed to switch user ids. With user namespaces 8 kernels that enable user namespaces, and it is further recommended 10 memory user's they don't trust to play nice can use.
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/fifo/ |
D | base.c | 121 if (chan->user) in nvkm_fifo_channel_destroy() 122 iounmap(chan->user); in nvkm_fifo_channel_destroy() 153 if (unlikely(!chan->user)) { in _nvkm_fifo_channel_rd32() 154 chan->user = ioremap(chan->addr, chan->size); in _nvkm_fifo_channel_rd32() 155 if (WARN_ON_ONCE(chan->user == NULL)) in _nvkm_fifo_channel_rd32() 158 return ioread32_native(chan->user + addr); in _nvkm_fifo_channel_rd32() 165 if (unlikely(!chan->user)) { in _nvkm_fifo_channel_wr32() 166 chan->user = ioremap(chan->addr, chan->size); in _nvkm_fifo_channel_wr32() 167 if (WARN_ON_ONCE(chan->user == NULL)) in _nvkm_fifo_channel_wr32() 170 iowrite32_native(data, chan->user + addr); in _nvkm_fifo_channel_wr32()
|
D | gf100.c | 53 } user; member 205 priv->user.bar.offset, 0x1000, in gf100_fifo_chan_ctor() 228 nv_wo32(priv->user.mem, usermem + i, 0x00000000); in gf100_fifo_chan_ctor() 230 nv_wo32(base, 0x08, lower_32_bits(priv->user.mem->addr + usermem)); in gf100_fifo_chan_ctor() 231 nv_wo32(base, 0x0c, upper_32_bits(priv->user.mem->addr + usermem)); in gf100_fifo_chan_ctor() 883 &priv->user.mem); in gf100_fifo_ctor() 887 ret = nvkm_gpuobj_map(priv->user.mem, NV_MEM_ACCESS_RW, in gf100_fifo_ctor() 888 &priv->user.bar); in gf100_fifo_ctor() 908 nvkm_gpuobj_unmap(&priv->user.bar); in gf100_fifo_dtor() 909 nvkm_gpuobj_ref(NULL, &priv->user.mem); in gf100_fifo_dtor() [all …]
|
D | gk104.c | 71 } user; member 247 priv->user.bar.offset, 0x200, in gk104_fifo_chan_ctor() 265 nv_wo32(priv->user.mem, usermem + i, 0x00000000); in gk104_fifo_chan_ctor() 267 nv_wo32(base, 0x08, lower_32_bits(priv->user.mem->addr + usermem)); in gk104_fifo_chan_ctor() 268 nv_wo32(base, 0x0c, upper_32_bits(priv->user.mem->addr + usermem)); in gk104_fifo_chan_ctor() 1053 nv_wr32(priv, 0x002254, 0x10000000 | priv->user.bar.offset >> 12); in gk104_fifo_init() 1066 nvkm_gpuobj_unmap(&priv->user.bar); in gk104_fifo_dtor() 1067 nvkm_gpuobj_ref(NULL, &priv->user.mem); in gk104_fifo_dtor() 1109 0x1000, NVOBJ_FLAG_ZERO_ALLOC, &priv->user.mem); in gk104_fifo_ctor() 1113 ret = nvkm_gpuobj_map(priv->user.mem, NV_MEM_ACCESS_RW, in gk104_fifo_ctor() [all …]
|
/linux-4.1.27/drivers/base/power/ |
D | trace.c | 79 static int set_magic_time(unsigned int user, unsigned int file, unsigned int device) in set_magic_time() argument 81 unsigned int n = user + USERHASH*(file + FILEHASH*device); in set_magic_time() 157 void generate_pm_trace(const void *tracedata, unsigned int user) in generate_pm_trace() argument 163 user_hash_value = user % USERHASH; in generate_pm_trace() 251 unsigned int user, file, dev; in late_resume_init() local 253 user = val % USERHASH; in late_resume_init() 259 pr_info(" Magic number: %d:%d:%d\n", user, file, dev); in late_resume_init()
|
/linux-4.1.27/kernel/printk/ |
D | printk.c | 572 struct devkmsg_user *user = file->private_data; in devkmsg_read() local 580 if (!user) in devkmsg_read() 583 ret = mutex_lock_interruptible(&user->lock); in devkmsg_read() 587 while (user->seq == log_next_seq) { in devkmsg_read() 596 user->seq != log_next_seq); in devkmsg_read() 602 if (user->seq < log_first_seq) { in devkmsg_read() 604 user->idx = log_first_idx; in devkmsg_read() 605 user->seq = log_first_seq; in devkmsg_read() 611 msg = log_from_idx(user->idx); in devkmsg_read() 623 if (msg->flags & LOG_CONT && !(user->prev & LOG_CONT)) in devkmsg_read() [all …]
|
/linux-4.1.27/arch/um/drivers/ |
D | net_kern.c | 157 lp->fd = (*lp->open)(&lp->user); in uml_net_open() 171 lp->tl.data = (unsigned long) &lp->user; in uml_net_open() 186 if (lp->close != NULL) (*lp->close)(lp->fd, &lp->user); in uml_net_open() 200 (*lp->close)(lp->fd, &lp->user); in uml_net_close() 364 (*lp->remove)(&lp->user); in net_device_release() 459 .max_packet = transport->user->max_packet, in eth_configure() 461 .open = transport->user->open, in eth_configure() 462 .close = transport->user->close, in eth_configure() 463 .remove = transport->user->remove, in eth_configure() 466 .add_address = transport->user->add_address, in eth_configure() [all …]
|
D | slip_kern.c | 23 spri = (struct slip_data *) private->user; in slip_init() 50 (struct slip_data *) &lp->user); in slip_read() 56 (struct slip_data *) &lp->user); in slip_write() 81 .user = &slip_user_info,
|
D | slirp_kern.c | 26 spri = (struct slirp_data *) private->user; in slirp_init() 55 (struct slirp_data *) &lp->user); in slirp_read() 61 (struct slirp_data *) &lp->user); in slirp_write() 108 .user = &slirp_user_info,
|
D | vde_kern.c | 23 vpri = (struct vde_data *) pri->user; in vde_init() 41 struct vde_data *pri = (struct vde_data *) &lp->user; in vde_read() 53 struct vde_data *pri = (struct vde_data *) &lp->user; in vde_write() 117 .user = &vde_user_info,
|
D | daemon_kern.c | 26 dpri = (struct daemon_data *) pri->user; in daemon_init() 51 (struct daemon_data *) &lp->user); in daemon_write() 83 .user = &daemon_user_info,
|
D | umcast_kern.c | 34 dpri = (struct umcast_data *) pri->user; in umcast_init() 60 (struct umcast_data *) &lp->user); in umcast_write() 165 .user = &umcast_user_info, 175 .user = &umcast_user_info,
|
D | pcap_kern.c | 25 ppri = (struct pcap_data *) pri->user; in pcap_init() 38 (struct pcap_data *) &lp->user); in pcap_read() 101 .user = &pcap_user_info,
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/dmaobj/ |
D | gf100.c | 82 u32 kind, user, unkn; in gf100_dmaobj_ctor() local 96 user = args->v0.priv; in gf100_dmaobj_ctor() 102 user = GF100_DMA_V0_PRIV_US; in gf100_dmaobj_ctor() 106 user = GF100_DMA_V0_PRIV_VM; in gf100_dmaobj_ctor() 112 if (user > 2) in gf100_dmaobj_ctor() 114 priv->flags0 |= (kind << 22) | (user << 20); in gf100_dmaobj_ctor()
|
D | nv50.c | 94 u32 user, part, comp, kind; in nv50_dmaobj_ctor() local 109 user = args->v0.priv; in nv50_dmaobj_ctor() 116 user = NV50_DMA_V0_PRIV_US; in nv50_dmaobj_ctor() 121 user = NV50_DMA_V0_PRIV_VM; in nv50_dmaobj_ctor() 129 if (user > 2 || part > 2 || comp > 3 || kind > 0x7f) in nv50_dmaobj_ctor() 131 priv->flags0 = (comp << 29) | (kind << 22) | (user << 20); in nv50_dmaobj_ctor()
|
/linux-4.1.27/Documentation/cgroups/ |
D | cpuacct.txt | 34 CPU time obtained by the cgroup into user and system times. Currently 37 user: Time spent by tasks of the cgroup in user mode. 40 user and system are in USER_HZ unit. 42 cpuacct controller uses percpu_counter interface to collect user and 45 - It is theoretically possible to see wrong values for user and system times. 48 - It is possible to see slightly outdated values for user and system times
|
/linux-4.1.27/Documentation/arm64/ |
D | memory.txt | 12 (256TB) virtual addresses, respectively, for both user and kernel. With 19 mappings while the user pgd contains only user (non-global) mappings. 28 0000000000000000 0000007fffffffff 512GB user 36 0000000000000000 0000ffffffffffff 256TB user 44 0000000000000000 000003ffffffffff 4TB user 52 0000000000000000 0000ffffffffffff 256TB user
|
D | tagged-pointers.txt | 16 (1) The kernel requires that all user addresses passed to EL1 18 parameters containing user virtual addresses *must* have 23 of tags cannot rely on the tag information for user virtual
|
/linux-4.1.27/Documentation/security/ |
D | keys-ecryptfs.txt | 7 either in kernel space or in user space with a daemon called 'ecryptfsd'. In 9 using a key, the FEFEK, derived from a user prompted passphrase; in the latter 16 kernel key of the 'user' type, inserted in the user's session specific keyring 44 key-type:= 'trusted' | 'user' 51 'ecryptfs' and save it using a previously loaded user key "test": 53 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u 57 ecryptfs user:test 64 490045d4bfe48c99f0d465fbbbb79e7500da954178e2de0697
|
D | keys-trusted-encrypted.txt | 5 and in both cases all keys are created in the kernel, and user space sees, 8 Keys can be used on any system. All user level blobs, are displayed and loaded 50 'master' key can either be a trusted-key or user-key type. The main 52 they are only as secure as the user key encrypting them. The master user key 67 key-type:= 'trusted' | 'user' 127 compromised by a user level problem, and when sealed to specific boot PCR
|
/linux-4.1.27/Documentation/ |
D | gdb-kernel-debugging.txt | 66 scanning for modules in /home/user/linux/build 67 loading @0xffffffffa0020000: /home/user/linux/build/net/netfilter/xt_tcpudp.ko 68 loading @0xffffffffa0016000: /home/user/linux/build/net/netfilter/xt_pkttype.ko 69 loading @0xffffffffa0002000: /home/user/linux/build/net/netfilter/xt_limit.ko 70 loading @0xffffffffa00ca000: /home/user/linux/build/net/packet/af_packet.ko 71 loading @0xffffffffa003c000: /home/user/linux/build/fs/fuse/fuse.ko 73 loading @0xffffffffa0000000: /home/user/linux/build/drivers/ata/ata_generic.ko 86 loading @0xffffffffa0034000: /home/user/linux/build/lib/libcrc32c.ko 87 loading @0xffffffffa0050000: /home/user/linux/build/lib/lzo/lzo_compress.ko 88 loading @0xffffffffa006e000: /home/user/linux/build/lib/zlib_deflate/zlib_deflate.ko [all …]
|
D | cachetlb.txt | 18 if it can be proven that a user address space has never executed 42 This interface flushes an entire user address space from 55 Here we are flushing a specific range of (user) virtual 84 user virtual address 'addr' will be visible to the cpu. That 148 This interface flushes an entire user address space from 157 This interface flushes an entire user address space from 170 Here we are flushing a specific range of (user) virtual 242 size). This setting will force the SYSv IPC layer to only allow user 251 mapped into some user address space, there is always at least one more 253 PAGE_OFFSET. So immediately, once the first user maps a given [all …]
|
D | dell_rbu.txt | 30 The user should not unload the rbu driver after downloading the BIOS image 55 In the packet update mechanism, the user needs to create a new file having 57 The user creates packets header, gets the chunk of the BIOS image and 60 packet, the user needs to create more such packets out of the entire BIOS 69 In monolithic update the user simply get the BIOS image (.hdr file) and copies 84 If a user by accident executes steps 1 and 3 above without executing step 2; 96 Also after updating the BIOS image a user mode application needs to execute
|
D | dma-buf-sharing.txt | 12 either the 'exporter' of buffers, or the 'user' of buffers. 15 exporter, and A as buffer-user. 25 The buffer-user 40 3. Each buffer-user 'connects' itself to the buffer 41 4. When needed, buffer-user requests access to the buffer from exporter 42 5. When finished with its use, the buffer-user notifies end-of-DMA to exporter 43 6. when buffer-user is done using this buffer completely, it 'disconnects' 85 3. Each buffer-user 'connects' itself to the buffer 87 Each buffer-user now gets a reference to the buffer, using the fd passed to 96 After this, the buffer-user needs to attach its device with the buffer, which [all …]
|
D | vgaarbiter.txt | 47 open : open user instance of the arbiter. By default, it's attached to 50 close : close user instance. Release locks made by the user 72 unlock all : release all locks on target held by this user (not 86 The driver keeps track of which user has which locks on which card. It 88 a bit, but makes the arbiter more tolerant to user space problems and able 91 user space for a given user (file descriptor instance) of the arbiter. 182 implementation of the user space side [3]. Now (2009) Tiago Vignatti and Dave
|
D | pi-futex.txt | 6 - in the user-space fastpath a PI-enabled futex involves no kernel work 22 The short reply: user-space PI helps achieving/improving determinism for 23 user-space applications. In the best-case, it can help achieve 54 implementation to user-space. 57 inheritance only apply to kernel-space locks. But user-space locks are 60 does not apply (user-space spinlocks have the same priority inversion 61 problems as other user-space locking constructs). Fact is, pretty much
|
D | rpmsg.txt | 34 expose appropriate user space interfaces, if needed. 84 channel belongs, using the channel's src address, and the user-provided 98 addresses provided by the user. 103 ignored (and the user-provided addresses will be used instead). 127 to a destination address provided by the user. 128 The user should specify the channel, the data it wants to send, 131 channel belongs, using the channel's src address, and the user-provided 142 destination addresses provided by the user. 143 The user should specify the channel, the data it wants to send, 147 ignored (and the user-provided addresses will be used instead). [all …]
|
D | coccinelle.txt | 37 as a regular user, and install it with 204 /home/user/linux/crypto/ctr.c:188:9-16: ERR_CAST can be used with alg 205 /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth 206 /home/user/linux/crypto/xts.c:227:9-16: ERR_CAST can be used with alg 277 diff -u -p /home/user/linux/crypto/ctr.c /tmp/nothing 278 --- /home/user/linux/crypto/ctr.c 2010-05-26 10:49:38.000000000 +0200 322 * TODO [[view:/home/user/linux/crypto/ctr.c::face=ovl-face1::linb=188::colb=9::cole=16][ERR_CAST ca… 323 * TODO [[view:/home/user/linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAS… 324 * TODO [[view:/home/user/linux/crypto/xts.c::face=ovl-face1::linb=227::colb=9::cole=16][ERR_CAST ca…
|
D | futex-requeue-pi.txt | 48 mutex only after it has returned to user space. This will leave the 55 user space already holding the PI futex. The glibc implementation 90 to be able to acquire the rt_mutex before returning to user space. 93 requeue call returning to user space and the waiter waking and 100 Two new system calls provide the kernel<->user interface to
|
/linux-4.1.27/tools/perf/ |
D | perf-with-kcore.sh | 121 …find "$USER_HOME/.debug" -xdev -type d ! -user "$SUDO_USER" -ls -exec chown "$SUDO_USE… 122 …find "$USER_HOME/.debug" -xdev -type f -links 1 ! -user "$SUDO_USER" -ls -exec chown "$SUDO_USE… 123 …find "$USER_HOME/.debug" -xdev -type l ! -user "$SUDO_USER" -ls -exec chown -h "$SUDO_USE… 140 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type d ! -user "$USER" -print -quit) 141 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type f -links 1 ! -user "$USER" -print -quit) 142 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type l ! -user "$USER" -print -quit)
|
/linux-4.1.27/Documentation/acpi/ |
D | video_extension.txt | 13 1 Export a sysfs interface for user space to control backlight level 61 as a "brightness level" indicator. Thus from the user space perspective 65 2 Notify user space about hotkey event 68 i) For some laptops, when user presses the hotkey, a scancode will be 69 generated and sent to user space through the input device created by 71 following key code will appear to user space: 84 notify value it received and send the event to user space through the 94 Once user space tool receives this event, it can modify the backlight 101 not affect the sending of event to user space, they are always sent to user
|
/linux-4.1.27/net/ipv6/netfilter/ |
D | ip6_tables.c | 488 (strcmp(t->target.u.user.name, in mark_source_chains() 494 if ((strcmp(t->target.u.user.name, in mark_source_chains() 537 if (strcmp(t->target.u.user.name, in mark_source_chains() 624 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match() 625 m->u.user.revision); in find_check_match() 627 duprintf("find_check_match: `%s' not found\n", m->u.user.name); in find_check_match() 696 target = xt_request_find_target(NFPROTO_IPV6, t->u.user.name, in find_check_entry() 697 t->u.user.revision); in find_check_entry() 699 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry() 728 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() [all …]
|
/linux-4.1.27/net/ipv4/netfilter/ |
D | ip_tables.c | 475 (strcmp(t->target.u.user.name, in mark_source_chains() 481 if ((strcmp(t->target.u.user.name, in mark_source_chains() 524 if (strcmp(t->target.u.user.name, in mark_source_chains() 611 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match() 612 m->u.user.revision); in find_check_match() 614 duprintf("find_check_match: `%s' not found\n", m->u.user.name); in find_check_match() 682 target = xt_request_find_target(NFPROTO_IPV4, t->u.user.name, in find_check_entry() 683 t->u.user.revision); in find_check_entry() 685 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry() 714 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() [all …]
|
D | arp_tables.c | 401 (strcmp(t->target.u.user.name, in mark_source_chains() 407 if ((strcmp(t->target.u.user.name, in mark_source_chains() 442 if (strcmp(t->target.u.user.name, in mark_source_chains() 525 target = xt_request_find_target(NFPROTO_ARP, t->u.user.name, in find_check_entry() 526 t->u.user.revision); in find_check_entry() 528 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry() 552 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() 651 if (strcmp(arpt_get_target(iter)->u.user.name, in translate_table() 801 u.user.name), in copy_entries_to_user() 886 static int get_info(struct net *net, void __user *user, in get_info() argument [all …]
|
D | nf_defrag_ipv4.c | 25 static int nf_ct_ipv4_gather_frags(struct sk_buff *skb, u_int32_t user) in nf_ct_ipv4_gather_frags() argument 32 err = ip_defrag(skb, user); in nf_ct_ipv4_gather_frags() 85 enum ip_defrag_users user = in ipv4_conntrack_defrag() local 88 if (nf_ct_ipv4_gather_frags(skb, user)) in ipv4_conntrack_defrag()
|
/linux-4.1.27/arch/cris/arch-v32/drivers/ |
D | Kconfig | 200 hex "PA user changeable dir mask" 206 user can change direction on using ioctl's. 211 hex "PA user changeable bits mask" 217 that a user can change the value on using ioctl's. 221 hex "PB user changeable dir mask" 227 that a user can change direction on using ioctl's. 232 hex "PB user changeable bits mask" 238 that a user can change the value on using ioctl's. 242 hex "PC user changeable dir mask" 248 that a user can change direction on using ioctl's. [all …]
|
/linux-4.1.27/arch/sh/kernel/ |
D | ptrace_32.c | 383 addr > sizeof(struct user) - 3) in arch_ptrace() 388 else if (addr >= offsetof(struct user, fpu) && in arch_ptrace() 389 addr < offsetof(struct user, u_fpvalid)) { in arch_ptrace() 391 if (addr == offsetof(struct user, fpu.fpscr)) in arch_ptrace() 400 index = addr - offsetof(struct user, fpu); in arch_ptrace() 404 } else if (addr == offsetof(struct user, u_fpvalid)) in arch_ptrace() 423 addr > sizeof(struct user) - 3) in arch_ptrace() 428 else if (addr >= offsetof(struct user, fpu) && in arch_ptrace() 429 addr < offsetof(struct user, u_fpvalid)) { in arch_ptrace() 434 index = addr - offsetof(struct user, fpu); in arch_ptrace() [all …]
|
D | ptrace_64.c | 403 else if ((addr >= offsetof(struct user, fpu)) && in arch_ptrace() 404 (addr < offsetof(struct user, u_fpvalid))) { in arch_ptrace() 409 index = addr - offsetof(struct user, fpu); in arch_ptrace() 411 } else if (addr == offsetof(struct user, u_fpvalid)) { in arch_ptrace() 445 else if ((addr >= offsetof(struct user, fpu)) && in arch_ptrace() 446 (addr < offsetof(struct user, u_fpvalid))) { in arch_ptrace() 451 index = addr - offsetof(struct user, fpu); in arch_ptrace()
|
/linux-4.1.27/tools/perf/Documentation/ |
D | Makefile | 177 pdf: $(OUTPUT)user-manual.pdf 219 $(INSTALL) -m 644 $(OUTPUT)user-manual.pdf $(DESTDIR)$(pdfdir) 284 $(OUTPUT)user-manual.html: $(OUTPUT)user-manual.xml 287 $(OUTPUT)perf.info: $(OUTPUT)user-manual.texi 288 $(QUIET_MAKEINFO)$(MAKEINFO) --no-split -o $@ $(OUTPUT)user-manual.texi 290 $(OUTPUT)user-manual.texi: $(OUTPUT)user-manual.xml 292 $(DOCBOOK2X_TEXI) $(OUTPUT)user-manual.xml --encoding=UTF-8 --to-stdout >$@++ && \ 297 $(OUTPUT)user-manual.pdf: $(OUTPUT)user-manual.xml
|
/linux-4.1.27/security/selinux/ss/ |
D | context.h | 27 u32 user; member 121 dst->user = src->user; in context_cpy() 143 c->user = c->role = c->type = 0; in context_destroy() 156 return ((c1->user == c2->user) && in context_cmp()
|
D | services.c | 305 val1 = scontext->user; in constraint_expr_eval() 306 val2 = tcontext->user; in constraint_expr_eval() 413 val1 = c->user; in constraint_expr_eval() 1031 *scontext_len += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) + 1; in context_struct_to_string() 1049 sym_name(&policydb, SYM_USERS, context->user - 1), in context_struct_to_string() 1052 scontextp += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) + in context_struct_to_string() 1179 ctx->user = usrdatum->value; in string_to_context_struct() 1458 newcontext.user = tcontext->user; in security_compute_sid() 1462 newcontext.user = scontext->user; in security_compute_sid() 1467 newcontext.user = tcontext->user; in security_compute_sid() [all …]
|
D | mls.c | 207 if (!c->user || c->user > p->p_users.nprim) in mls_context_isvalid() 209 usrdatum = p->user_val_to_struct[c->user - 1]; in mls_context_isvalid() 419 int mls_setup_user_range(struct context *fromcon, struct user_datum *user, in mls_setup_user_range() argument 425 struct mls_level *user_low = &(user->range.level[0]); in mls_setup_user_range() 426 struct mls_level *user_clr = &(user->range.level[1]); in mls_setup_user_range() 427 struct mls_level *user_def = &(user->dfltlevel); in mls_setup_user_range()
|
/linux-4.1.27/Documentation/ia64/ |
D | fsys.txt | 18 switched over to kernel memory. The user-level state is saved 21 - user mode: 23 user memory. The user-level state is contained in the 28 interruption-handlers start execution in. The user-level 36 - CPU registers may contain a mixture of user-level and kernel-level 39 user-level) 46 in fsys-mode (they point to the user-level stacks, which may 49 In summary, fsys-mode is much more similar to running in user-mode 69 to by "regs" was executing in user mode (privilege level 3). 71 executing on the user-level stack(s). Finally, fsys_mode() returns [all …]
|
D | mca.txt | 40 * If an MCA/INIT event occurs while the kernel was running (not user 146 What happens when MCA/INIT is delivered what a cpu is running user 149 The user mode registers are stored in the RSE area of the MCA/INIT on 150 entry to the OS and are restored from there on return to SAL, so user 152 OS has no idea what unwind data is available for the user space stack, 153 MCA/INIT never tries to backtrace user space. Which means that the OS 154 does not bother making the user space process look like a blocked task, 155 i.e. the OS does not copy pt_regs and switch_stack to the user space 156 stack. Also the OS has no idea how big the user space RSE and memory 157 stacks are, which makes it too risky to copy the saved state to a user
|
/linux-4.1.27/Documentation/devicetree/bindings/sound/ |
D | widgets.txt | 7 "template-wname", "user-supplied-wname" 12 The "user-supplied-wname" being the user specified widget name.
|
/linux-4.1.27/kernel/ |
D | user.c | 114 struct user_struct *user; in uid_hash_find() local 116 hlist_for_each_entry(user, hashent, uidhash_node) { in uid_hash_find() 117 if (uid_eq(user->uid, uid)) { in uid_hash_find() 118 atomic_inc(&user->__count); in uid_hash_find() 119 return user; in uid_hash_find()
|
D | uid16.c | 19 SYSCALL_DEFINE3(chown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument 21 return sys_chown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 24 SYSCALL_DEFINE3(lchown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument 26 return sys_lchown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 29 SYSCALL_DEFINE3(fchown16, unsigned int, fd, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument 31 return sys_fchown(fd, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3()
|
D | cred.c | 57 .user = INIT_USER, 118 free_uid(cred->user); in put_cred_rcu() 258 get_uid(new->user); in prepare_creds() 334 atomic_inc(&p->cred->user->processes); in copy_creds() 367 atomic_inc(&new->user->processes); in copy_creds() 459 if (new->user != old->user) in commit_creds() 460 atomic_inc(&new->user->processes); in commit_creds() 463 if (new->user != old->user) in commit_creds() 464 atomic_dec(&old->user->processes); in commit_creds() 610 get_uid(new->user); in prepare_kernel_cred()
|
/linux-4.1.27/arch/x86/um/ |
D | ptrace_64.c | 120 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user() 121 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user() 122 addr -= offsetof(struct user, u_debugreg[0]); in poke_user() 187 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user() 188 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user() 189 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
|
D | ptrace_32.c | 127 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user() 128 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user() 129 addr -= offsetof(struct user, u_debugreg[0]); in poke_user() 184 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user() 185 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user() 186 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
|
D | Makefile | 38 extra-y += user-offsets.s 39 $(obj)/user-offsets.s: c_flags = -Wp,-MD,$(depfile) $(USER_CFLAGS) \
|
/linux-4.1.27/Documentation/filesystems/ |
D | quota.txt | 9 and the second one hardlimit. An user can never exceed a hardlimit for any 12 period" or "grace time". When grace time is over, user is not able to allocate 23 When user exceeds a softlimit, runs out of grace time or reaches hardlimit, 26 when user is using a graphical desktop he usually cannot see the message. 42 - UID/GID (depends on quota type) of user / group whose limit 45 - UID of a user who caused the event 56 - four warnings are also defined for the event when user stops
|
D | 9p.txt | 64 uname=name user name to attempt mount as on the remote server. The 65 server may override or ignore this value. Certain user 121 user = if a user tries to access a file on v9fs 123 attach command (Tattach) for that user. 125 <uid> = allows only user with uid=<uid> to access 128 operations as one user 148 There are user and developer mailing lists available through the v9fs project
|
D | affs.txt | 33 The muFS (multi user File System) equivalents of the above file systems 42 system to uid or the uid of the current user, respectively. 94 - R maps to r for user, group and others. On directories, R implies x. 105 options. Since most of the Amiga file systems are single user systems 107 Amiga filesystem will be owned by the user who actually mounts the 114 - r permission will set R for user, group and others. 116 - w permission will set W and D for user, group and others. 118 - x permission of the user will set E for plain files. 123 Newly created files and directories will get the user and group ID 124 of the current user and a mode according to the umask. [all …]
|
D | fuse.txt | 14 Non-privileged mount (or user mount): 16 A userspace filesystem mounted by a non-privileged (non-root) user. 18 user. NOTE: this is not the same as mounts allowed with the "user" 31 The user who does the mounting. 35 The user who is performing filesystem operations. 85 The numeric user id of the mount owner. 103 to the user mounting the filesystem. This option is by default only 232 other users' and the super user's processes 235 other users' or the super user's processes 253 B) If another user is accessing files or directories in the [all …]
|
/linux-4.1.27/arch/tile/include/hv/ |
D | iorpc.h | 365 user; /**< Buffer as described by user apps. */ member 401 user; /**< Interrupt as described by user applications. */ member 425 user; /**< pollfd_setup as described by user applications. */ member 449 user; /**< pollfd as described by user applications. */ member
|
/linux-4.1.27/Documentation/device-mapper/ |
D | kcopyd.txt | 15 To start a copy job, the user must set up io_region structures to describe 27 To start the copy, the user calls kcopyd_copy(), passing in the client 38 When the copy completes, kcopyd will call the user's completion routine, 39 passing back the user's context pointer. It will also indicate if a read or 42 When a user is done with all their copy jobs, they should call
|
/linux-4.1.27/arch/arm/include/asm/ |
D | tls.h | 13 mrc p15, 0, \tmp2, c13, c0, 2 @ get the user r/w register 15 mcr p15, 0, \tpuser, c13, c0, 2 @ and the user r/w register 25 mrcne p15, 0, \tmp2, c13, c0, 2 @ get the user r/w register 27 mcrne p15, 0, \tpuser, c13, c0, 2 @ set user r/w register
|
/linux-4.1.27/arch/arm/boot/dts/ |
D | ste-nomadik-s8815.dts | 51 user-led { 59 user-button { 116 /* The user LED on the board is set up to be used for heartbeat */ 119 user-led { 132 user-button {
|
D | imx27-phytec-phycore-rdk.dts | 228 label = "system:red1:user"; 233 label = "system:green1:user"; 238 label = "system:blue1:user"; 243 label = "system:red2:user"; 248 label = "system:green2:user"; 253 label = "system:blue2:user";
|
D | vexpress-v2m-rs1.dtsi | 319 user@1 { 325 user@2 { 331 user@3 { 337 user@4 { 343 user@5 { 349 user@6 { 355 user@7 { 361 user@8 {
|
D | vexpress-v2m.dtsi | 318 user@1 { 324 user@2 { 330 user@3 { 336 user@4 { 342 user@5 { 348 user@6 { 354 user@7 { 360 user@8 {
|
D | imx28-sps1.dts | 150 label = "sps1-1:yellow:user"; 157 label = "sps1-2:red:user"; 164 label = "sps1-3:red:user";
|
/linux-4.1.27/fs/proc/ |
D | stat.c | 84 u64 user, nice, system, idle, iowait, irq, softirq, steal; in show_stat() local 91 user = nice = system = idle = iowait = in show_stat() 98 user += kcpustat_cpu(i).cpustat[CPUTIME_USER]; in show_stat() 121 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(user)); in show_stat() 135 user = kcpustat_cpu(i).cpustat[CPUTIME_USER]; in show_stat() 146 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(user)); in show_stat()
|
/linux-4.1.27/Documentation/arm/ |
D | mem_alignment | 15 Now for user space applications, it is possible to configure the alignment 23 real bad - it changes the behaviour of all unaligned instructions in user 32 0 A user process performing an unaligned memory access 37 1 The kernel will attempt to fix up the user process 42 2 The kernel will send a SIGBUS signal to the user process 55 operation for user space code.
|
D | Porting | 67 The maximum size of a user process in bytes. Since user space 68 always starts at zero, this is the maximum address that a user 69 process can access+1. The user space stack grows down from this 72 Any virtual address below TASK_SIZE is deemed to be user process 74 basis by the kernel. I'll call this the user segment.
|
D | kernel_user_helpers.txt | 4 These are segment of kernel provided user code reachable from user space 5 at a fixed address in kernel memory. This is used to provide user space 8 code to be executed directly in user mode for best efficiency but which is 9 too intimate with the kernel counter part to be left to user libraries. 19 since those code segments only use a few cycles before returning to user
|
/linux-4.1.27/drivers/staging/i2o/ |
D | README.ioctl | 13 utilized by user space applications to communicate with IOPs and devices 15 that are available to the user and provides examples of their uses. 21 This document and the I2O user space interface are currently maintained 53 EFAULT Invalid user space pointer was passed 79 EFAULT Invalid user space pointer was passed 108 EFAULT Invalid user space pointer was passed 143 EFAULT Invalid user space pointer was passed 151 changed properly on the IOP. The user should check the result 180 EFAULT Invalid user space pointer was passed 188 properly retrieved. The user should check the result list [all …]
|
/linux-4.1.27/Documentation/vm/ |
D | active_mm.txt | 20 user-level page tables at all, so when we do a context switch into an 25 doesn't need any user mappings - all kernel threads basically fall into 27 some amount of time they are not going to be interested in user space, 37 "stole" for such an anonymous user. For that, we have "tsk->active_mm", 54 Usually there is at least one real user, but it could be that the real 55 user exited on another CPU while a lazy user was still active, so you do 73 we have a user context", and is generally done by the page fault handler
|
/linux-4.1.27/Documentation/filesystems/nfs/ |
D | idmapper.txt | 5 Id mapper is used by NFS to translate user and group ids into names, and to 6 translate user and group names into ids. Part of this translation involves 39 uid: Find the UID for the given user 41 user: Find the user name for the given UID 56 /usr/sbin/nfs.idmap will handle gid, user, and group lookups. 73 "uid:user@domain".
|
D | rpc-cache.txt | 28 - making requests to user-space to fill in cache entries 29 - allowing user-space to directly set entries in the cache 77 Format a request to be send to user-space for an item 84 A message from user space has arrived to fill out a 123 saves any user of an item from worrying about content changing while 134 for communicating between kernel and user for populating the cache. 152 user-space. These requests appear in the channel file. 159 Thus a user-space helper is likely to: 171 written from user-space and processes it. It should return an error
|
/linux-4.1.27/Documentation/ABI/testing/ |
D | sysfs-kernel-uids | 7 to set the cpu bandwidth a user is allowed. This is a 11 example would be, if User A has shares = 1024 and user 13 bandwidth user A will. For more details refer
|
D | sysfs-platform-kim | 10 firmware. The name exposed is read from the user-space 22 command. The entry is read and made use by the user-space 42 transport driver, which will signal the user-space for opening, 44 entry. This entry would be polled upon by the user-space
|
D | sysfs-class-cxl | 48 provided that no user contexts are attached. 74 Decimal value of the current version of the kernel/user API. 170 Will return "user" or "factory" depending on the image loaded 177 Valid entries are "none", "user", and "factory". 182 "user" and "factory" means PERST will cause either the user or 183 user or factory image to be loaded.
|
D | sysfs-driver-sunxi-sid | 10 details see the user manual: 21 Users: any user space application which wants to read the SID on
|
/linux-4.1.27/include/net/irda/ |
D | irias_object.h | 89 int user); 91 int user); 93 int len, int user);
|
/linux-4.1.27/Documentation/video4linux/ |
D | sh_mobile_ceu_camera.txt | 43 Such a configuration can be produced by user requests: 58 (6) to (6') - CEU scale - user window 71 current sensor scales onto input window - this is user S_CROP: 75 3. Calculate new combined scales from "effective" input window to requested user 105 10. Use CEU scaling to scale to the requested user window: 123 1. Request exactly user rectangle from the sensor.
|
/linux-4.1.27/net/ipv4/ |
D | ip_fragment.c | 72 u32 user; member 100 u32 user; member 129 qp->user == arg->user; in ip4_frag_match() 146 qp->user = arg->user; in ip4_frag_init() 220 if (qp->user == IP_DEFRAG_AF_PACKET || in ip_expire() 221 ((qp->user >= IP_DEFRAG_CONNTRACK_IN) && in ip_expire() 222 (qp->user <= __IP_DEFRAG_CONNTRACK_IN_END) && in ip_expire() 239 static struct ipq *ip_find(struct net *net, struct iphdr *iph, u32 user) in ip_find() argument 246 arg.user = user; in ip_find() 636 int ip_defrag(struct sk_buff *skb, u32 user) in ip_defrag() argument [all …]
|
/linux-4.1.27/Documentation/leds/ |
D | ledtrig-transient.txt | 14 Without one shot timer interface, user space can still use timer trigger to 15 set a timer to hold a state, however when user space application crashes or 22 feature, to prevent user space crashes leaving the phone in vibrate mode 46 class device property. When brightness is set to 0 from user space via 64 Transient trigger can be enabled and disabled from user space on led class 79 - state allows user to specify a transient state to be held for the specified 94 get changed by the trigger unless user does a set via 115 allow user app to set the time once and activate it to run it once for the 147 - Control of vibrate (phones, tablets etc.) hardware by user space app. 148 - Use of LED by user space app as activity indicator. [all …]
|
/linux-4.1.27/arch/m68k/fpsp040/ |
D | x_unimp.S | 7 | Invoked when the user program encounters a floating-point 61 fmovel #0,%FPSR |clear all user bits 62 fmovel #0,%FPCR |clear all user exceptions for FPSP 72 bsrl sto_res |store the result in user space
|
D | fpsp.h | 63 | because it needs to report an exception back to the user. This 83 .set USER_D0,LV+0 | saved user D0 84 .set USER_D1,LV+4 | saved user D1 85 .set USER_A0,LV+8 | saved user A0 86 .set USER_A1,LV+12 | saved user A1 87 .set USER_FP0,LV+16 | saved user FP0 88 .set USER_FP1,LV+28 | saved user FP1 89 .set USER_FP2,LV+40 | saved user FP2 90 .set USER_FP3,LV+52 | saved user FP3 91 .set USER_FPCR,LV+64 | saved user FPCR [all …]
|
D | x_store.S | 100 | dest_dbl --- write double precision value to user space 167 exg %a0,%a1 |a0=supervisor source, a1=user dest 168 bsrl mem_write |move the number to the user's memory 251 exg %a0,%a1 |a0=supervisor source, a1=user dest 252 bsrl mem_write |move the number to the user's memory
|
D | slog2.S | 41 | 2.1 Restore the user FPCR 55 | 2.1 Restore the user FPCR 70 | 2.1 Restore the user FPCR 86 | 2.2 Restore the user FPCR. 92 | 4.1 Restore the user FPCR
|
/linux-4.1.27/Documentation/networking/ |
D | xfrm_sync.txt | 69 message (kernel<->user) as well the cause (config, query or event). 74 when going from kernel to user space) 122 a) XFRM_MSG_GETAE issued by user-->kernel. 130 b) XFRM_MSG_NEWAE is issued by either user space to configure 133 i) user --> kernel to configure a specific SA. 136 A response is issued back to the sender in user space to indicate success 141 ii) kernel->user direction as a response to XFRM_MSG_GETAE 146 iii) kernel->user to report as event if someone sets any values or 148 In such a case XFRM_AE_CU flag is set to inform the user that 152 iv) kernel->user to report event when replay threshold or a timeout [all …]
|
D | generic-hdlc.txt | 10 experimental InARP user-space daemon available on: 83 dce - Frame Relay DCE (network) side LMI instead of default DTE (user). 85 t391 - link integrity verification polling timer (in seconds) - user 87 n391 - full status polling counter - user 88 n392 - error threshold - both user and network 89 n393 - monitored events count - both user and network
|
D | netlink_mmap.txt | 18 user-space memory without copying them as done with regular socket I/O, 20 syscalls have to be issued by user-space to get more message. 22 The TX ring is used to process messages directly from user-space memory, the 29 In order to use memory mapped netlink I/O, user-space needs three main changes: 82 The blocks are only visible to the kernel, from the point of view of user-space 142 - nm_status is used for synchronizing processing between the kernel and user- 157 for user-space. Approriate action is to invoke poll() 160 TX ring: frame belongs to user-space and can be used for 176 TX ring: the frame contains a valid message from user-space to 178 the kernel will release the frame back to user-space by [all …]
|
D | nfc.txt | 87 The user must call START_POLL to poll for NFC targets, passing the desired NFC 89 state until it finds any target. However, the user can stop the polling 94 sent (including the device id). The user must call GET_TARGET to get the list of 113 To establish a connection with one target, the user must create an 116 netlink event. As a target can support more than one NFC protocol, the user
|
D | packet_mmap.txt | 30 configurable circular buffer mapped in user space that can be used to either 34 highest bandwidth. By using a shared buffer between the kernel and the user 50 From the user standpoint, you should use the higher level libpcap library, which 78 user process 107 also the mapping of the circular buffer in the user process and 120 user process 179 By default, the user should put data at : 183 the beginning of the user data will be at : 186 If you wish to put user data at a custom offset from the beginning of 196 To setup PACKET_MMAP from user level code is done with a call like [all …]
|
/linux-4.1.27/net/ax25/ |
D | ax25_uid.c | 76 ax25_uid_assoc *user; in ax25_uid_ioctl() local 101 user = ax25_findbyuid(sax25_kuid); in ax25_uid_ioctl() 102 if (user) { in ax25_uid_ioctl() 103 ax25_uid_put(user); in ax25_uid_ioctl()
|
D | ax25_route.c | 413 ax25_uid_assoc *user; in ax25_rt_autobind() local 425 user = ax25_findbyuid(current_euid()); in ax25_rt_autobind() 426 if (user) { in ax25_rt_autobind() 427 ax25->source_addr = user->call; in ax25_rt_autobind() 428 ax25_uid_put(user); in ax25_rt_autobind()
|
/linux-4.1.27/fs/notify/fanotify/ |
D | fanotify.c | 242 struct user_struct *user; in fanotify_free_group_priv() local 244 user = group->fanotify_data.user; in fanotify_free_group_priv() 245 atomic_dec(&user->fanotify_listeners); in fanotify_free_group_priv() 246 free_uid(user); in fanotify_free_group_priv()
|
/linux-4.1.27/drivers/staging/lustre/lustre/ |
D | Kconfig | 20 To mount Lustre file systems, you also need to install the user space 21 mount.lustre and other user space commands which can be found in the 26 performance computing. Source code of both kernel space and user space 39 This option defines the maximum size of buffer in bytes that user space
|
/linux-4.1.27/Documentation/ptp/ |
D | ptp.txt | 6 presents a standardized method for developing PTP user space 11 drivers and a user space interface. The infrastructure supports a 21 - One short or periodic alarms, with signal delivery to user program 23 - Period output signals configurable from user space 29 class driver handles all of the dealings with user space. The 40 ** PTP hardware clock user space API
|
/linux-4.1.27/net/netfilter/ |
D | xt_limit.c | 92 static u32 user2credits(u32 user) in user2credits() argument 95 if (user > 0xFFFFFFFF / (HZ*CREDITS_PER_JIFFY)) in user2credits() 97 return (user / XT_LIMIT_SCALE) * HZ * CREDITS_PER_JIFFY; in user2credits() 99 return (user * HZ * CREDITS_PER_JIFFY) / XT_LIMIT_SCALE; in user2credits()
|
/linux-4.1.27/drivers/misc/ |
D | atmel-ssc.c | 52 if (ssc->user) { in ssc_request() 57 ssc->user++; in ssc_request() 71 if (ssc->user) in ssc_free() 72 ssc->user--; in ssc_free()
|
/linux-4.1.27/net/core/ |
D | scm.c | 90 fpl->user = NULL; in scm_fp_copy() 112 if (!fpl->user) in scm_fp_copy() 113 fpl->user = get_uid(current_user()); in scm_fp_copy() 127 free_uid(fpl->user); in __scm_destroy() 345 new_fpl->user = get_uid(fpl->user); in scm_fp_dup()
|
/linux-4.1.27/Documentation/watchdog/ |
D | hpwdt.txt | 11 by the user. Remember that the two modes are not dependent on one another. 12 A user can have the NMI sourcing without the watchdog timer and vice-versa. 24 soft_margin - allows the user to set the watchdog timer value 25 allow_kdump - allows the user to save off a kernel dump image after an NMI 30 for this module parameter is 0 or LAST. If the user wants to 46 NMIs in a matter of seconds. If a user sees the Linux kernel's "dazed and
|
/linux-4.1.27/arch/s390/kernel/ |
D | vtime.c | 69 u64 timer, clock, user, system, steal; in do_account_vtime() local 110 user = S390_lowcore.user_timer - ti->user_timer; in do_account_vtime() 111 S390_lowcore.steal_timer -= user; in do_account_vtime() 118 user_scaled = user; in do_account_vtime() 128 account_user_time(tsk, user, user_scaled); in do_account_vtime() 137 return virt_timer_forward(user + system); in do_account_vtime()
|
D | compat_linux.h | 90 long compat_sys_s390_chown16(const char __user *filename, u16 user, u16 group); 91 long compat_sys_s390_lchown16(const char __user *filename, u16 user, u16 group); 92 long compat_sys_s390_fchown16(unsigned int fd, u16 user, u16 group);
|
/linux-4.1.27/arch/arm/mm/ |
D | proc-macros.S | 159 @ user read-only -> kernel read-only 201 tst r3, #L_PTE_USER @ user? 243 tst r3, #L_PTE_USER @ user? 244 orrne r2, r2, #PTE_EXT_AP_URO_SRW @ yes -> user r/o, system r/w 247 orreq r2, r2, #PTE_EXT_AP_UNO_SRW @ yes -> user n/a, system r/w 248 @ combined with user -> user r/w
|
/linux-4.1.27/drivers/scsi/isci/ |
D | init.c | 466 struct sci_user_parameters *user = &ihost->user_parameters; in sci_oem_defaults() local 489 user->phys[i].max_speed_generation = SCIC_SDS_PARM_GEN2_SPEED; in sci_oem_defaults() 492 user->phys[i].align_insertion_frequency = 0x7f; in sci_oem_defaults() 493 user->phys[i].in_connection_align_insertion_frequency = 0xff; in sci_oem_defaults() 494 user->phys[i].notify_enable_spin_up_insertion_frequency = 0x33; in sci_oem_defaults() 505 user->stp_inactivity_timeout = 5; in sci_oem_defaults() 506 user->ssp_inactivity_timeout = 5; in sci_oem_defaults() 507 user->stp_max_occupancy_timeout = 5; in sci_oem_defaults() 508 user->ssp_max_occupancy_timeout = 20; in sci_oem_defaults() 509 user->no_outbound_task_timeout = 2; in sci_oem_defaults()
|
/linux-4.1.27/drivers/infiniband/hw/ehca/ |
D | hcp_phyp.c | 66 galpas->user.fw_handle = paddr_user; in hcp_galpas_ctor() 79 galpas->user.fw_handle = galpas->kernel.fw_handle = 0; in hcp_galpas_dtor()
|
/linux-4.1.27/arch/arm64/include/asm/ |
D | page.h | 53 extern void __cpu_clear_user_page(void *p, unsigned long user); 55 unsigned long user);
|
/linux-4.1.27/arch/um/ |
D | Kconfig.um | 30 booting and normal file access, this module lets the UML user 38 /tmp/umlshare is a directory on the host with files the UML user 42 <http://user-mode-linux.sourceforge.net/hostfs.html>. 57 See <http://user-mode-linux.sf.net/old/hppfs.html> for more information. 66 The user mode linux management console is a low-level interface to 68 a full-blown operating system running under every user mode linux
|
D | Kconfig.debug | 12 See <http://user-mode-linux.sourceforge.net/old/gprof.html> for more 25 See <http://user-mode-linux.sourceforge.net/old/gprof.html> for more
|
/linux-4.1.27/fs/exofs/ |
D | Kconfig.ore | 4 # for every ORE user we do it like this. Any user should add itself here
|
/linux-4.1.27/fs/notify/inotify/ |
D | inotify_fsnotify.c | 168 if (group->inotify_data.user) { in inotify_free_group_priv() 169 atomic_dec(&group->inotify_data.user->inotify_devs); in inotify_free_group_priv() 170 free_uid(group->inotify_data.user); in inotify_free_group_priv()
|
/linux-4.1.27/include/uapi/linux/netfilter/ |
D | x_tables.h | 18 } user; member 41 } user; member 58 .target.u.user = { \
|
/linux-4.1.27/arch/um/include/shared/ |
D | net_kern.h | 42 char user[0]; member 56 const struct net_user_info *user; member
|
/linux-4.1.27/sound/core/seq/ |
D | seq_clientmgr.c | 321 struct snd_seq_user_client *user; in snd_seq_open() local 342 user = &client->data.user; in snd_seq_open() 343 user->fifo = NULL; in snd_seq_open() 344 user->fifo_pool_size = 0; in snd_seq_open() 347 user->fifo_pool_size = SNDRV_SEQ_DEFAULT_CLIENT_EVENTS; in snd_seq_open() 348 user->fifo = snd_seq_fifo_new(user->fifo_pool_size); in snd_seq_open() 349 if (user->fifo == NULL) { in snd_seq_open() 365 user->file = file; in snd_seq_open() 381 if (client->data.user.fifo) in snd_seq_release() 382 snd_seq_fifo_delete(&client->data.user.fifo); in snd_seq_release() [all …]
|
/linux-4.1.27/mm/ |
D | mlock.c | 730 int user_shm_lock(size_t size, struct user_struct *user) in user_shm_lock() argument 742 locked + user->locked_shm > lock_limit && !capable(CAP_IPC_LOCK)) in user_shm_lock() 744 get_uid(user); in user_shm_lock() 745 user->locked_shm += locked; in user_shm_lock() 752 void user_shm_unlock(size_t size, struct user_struct *user) in user_shm_unlock() argument 755 user->locked_shm -= (size + PAGE_SIZE - 1) >> PAGE_SHIFT; in user_shm_unlock() 757 free_uid(user); in user_shm_unlock()
|
/linux-4.1.27/arch/x86/kernel/ |
D | ptrace.c | 827 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) in arch_ptrace() 833 else if (addr >= offsetof(struct user, u_debugreg[0]) && in arch_ptrace() 834 addr <= offsetof(struct user, u_debugreg[7])) { in arch_ptrace() 835 addr -= offsetof(struct user, u_debugreg[0]); in arch_ptrace() 844 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) in arch_ptrace() 849 else if (addr >= offsetof(struct user, u_debugreg[0]) && in arch_ptrace() 850 addr <= offsetof(struct user, u_debugreg[7])) { in arch_ptrace() 851 addr -= offsetof(struct user, u_debugreg[0]); in arch_ptrace() 1143 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user) || in x32_arch_ptrace() 1150 else if (addr >= offsetof(struct user, u_debugreg[0]) && in x32_arch_ptrace() [all …]
|
/linux-4.1.27/Documentation/power/ |
D | freezing-of-tasks.txt | 6 The freezing of tasks is a mechanism by which user space processes and some 14 PF_NOFREEZE unset (all user space processes and some kernel threads) are 24 fake signal to all user space processes, and wakes up all the kernel threads. 38 For user space processes try_to_freeze() is called automatically from the 110 The majority of these are user space processes, but if any of the kernel threads 122 3. The third reason is to prevent user space processes and some kernel threads 123 from interfering with the suspending and resuming of devices. A user space 138 user threads and then waiting for a sync is practically one of the easier 142 freezing user threads I don't find really objectionable." 152 4. Another reason for freezing tasks is to prevent user space processes from [all …]
|
/linux-4.1.27/Documentation/ABI/stable/ |
D | sysfs-driver-w1_ds28e04 | 6 Users: any user space application which wants to communicate with DS28E04-100 15 Users: any user space application which wants to communicate with DS28E04-100
|
D | sysfs-firmware-opal-elog | 23 Typically, a user space daemon will monitor for new 33 user space to solve the problem. In future, we may 35 it easier for simple user space processes to extract
|
/linux-4.1.27/include/uapi/linux/ |
D | atmsap.h | 111 unsigned char user; /* user-specified l2 information */ member 122 unsigned char user; /* user specified l3 information */ member
|
/linux-4.1.27/net/iucv/ |
D | Kconfig | 6 Select this option if you want to use inter-user communication 16 based on z/VM inter-user communication vehicle or based on
|
/linux-4.1.27/kernel/events/ |
D | callchain.c | 166 int user = !event->attr.exclude_callchain_user; in perf_callchain() local 168 if (!kernel && !user) in perf_callchain() 185 if (user) { in perf_callchain()
|
/linux-4.1.27/Documentation/x86/ |
D | entry_64.txt | 48 toggles whether gs is the kernel gs or the user gs. The swapgs 50 single depth, it should only be used if entering from user mode to 51 kernel mode and then when returning to user-space, and precisely 81 If we are at an interrupt or user-trap/gate-alike boundary then we can 86 user-space execution then we must do the SWAPGS. 98 - Interrupt entry from user mode will switch off the IST stack.
|
D | exception-tables.txt | 4 When a process runs in kernel mode, it often has to access user 54 to executable code. This code is hidden inside the user access macros. 138 > 1: movb (%ebx),%dl /* this is the actual user access */ 153 understand. Can we? The actual user access is quite obvious. Thanks 154 to the unified address space we can just access the address in user 199 The whole user memory access is reduced to 10 x86 machine instructions. 275 8b) DL becomes zero (the value we "read" from user space) 277 instruction immediately after the faulting user access). 283 get_user macro actually returns a value: 0, if the user access was
|
/linux-4.1.27/drivers/net/ethernet/ti/ |
D | davinci_mdio.c | 83 } user[0]; member 179 reg = __raw_readl(®s->user[0].access); in wait_for_user_access() 197 reg = __raw_readl(®s->user[0].access); in wait_for_user_access() 245 __raw_writel(reg, &data->regs->user[0].access); in davinci_mdio_read() 253 reg = __raw_readl(&data->regs->user[0].access); in davinci_mdio_read() 290 __raw_writel(reg, &data->regs->user[0].access); in davinci_mdio_write()
|
/linux-4.1.27/net/sched/ |
D | act_ipt.c | 39 target = xt_request_find_target(AF_INET, t->u.user.name, in ipt_init_target() 40 t->u.user.revision); in ipt_init_target() 234 t = kmemdup(ipt->tcfi_t, ipt->tcfi_t->u.user.target_size, GFP_ATOMIC); in tcf_ipt_dump() 240 strcpy(t->u.user.name, ipt->tcfi_t->u.kernel.target->name); in tcf_ipt_dump() 242 if (nla_put(skb, TCA_IPT_TARG, ipt->tcfi_t->u.user.target_size, t) || in tcf_ipt_dump()
|
/linux-4.1.27/kernel/rcu/ |
D | tiny.c | 149 void rcu_check_callbacks(int user) in rcu_check_callbacks() argument 152 if (user) in rcu_check_callbacks() 156 if (user) in rcu_check_callbacks()
|
/linux-4.1.27/net/sctp/ |
D | Kconfig | 22 -- acknowledged error-free non-duplicated transfer of user data, 24 -- sequenced delivery of user messages within multiple streams, 25 with an option for order-of-arrival delivery of individual user 27 -- optional bundling of multiple user messages into a single SCTP
|
/linux-4.1.27/net/unix/ |
D | garbage.c | 119 void unix_inflight(struct user_struct *user, struct file *fp) in unix_inflight() argument 136 user->unix_inflight++; in unix_inflight() 140 void unix_notinflight(struct user_struct *user, struct file *fp) in unix_notinflight() argument 155 user->unix_inflight--; in unix_notinflight()
|
/linux-4.1.27/Documentation/i2c/ |
D | old-module-parameters | 1 I2C device driver binding control from user-space 5 <linux/i2c.h> which created standard module parameters to let the user 15 "instantiating-devices", section "Method 4: Instantiate from user-space".
|
/linux-4.1.27/drivers/android/ |
D | Kconfig | 30 Enable this to support an old 32-bit Android user-space (v4.4 and 33 Note that enabling this will break newer Android user-space.
|
/linux-4.1.27/drivers/lguest/ |
D | core.c | 209 int run_guest(struct lg_cpu *cpu, unsigned long __user *user) in run_guest() argument 213 if (put_user(*cpu->reg_read, user)) in run_guest() 230 if (copy_to_user(user, &cpu->pending, in run_guest()
|
/linux-4.1.27/drivers/staging/iio/Documentation/ |
D | sysfs-bus-iio-dds | 9 (out_altvoltageX_pincontrol_frequency_en is active) or the user 28 To exit this mode the user can write 39 (out_altvoltageX_pincontrol_phase_en is active) or the user can 58 out_altvoltageX_phaseY. To exit this mode the user can write
|
D | sysfs-bus-iio-adc-ad7280a | 15 The inY-inZ_balance_timer file allows the user to program 17 allows the user to set the timer to a value from 0 minutes to
|
/linux-4.1.27/Documentation/crypto/ |
D | api-intro.txt | 21 'Transforms' are user-instantiated objects, which maintain state, handle all 23 abstraction to the underlying algorithms. However, at the user 28 [transform api] (user interface) 32 The idea is to make the user interface and algorithm registration API 81 Transforms may only be allocated in user context, and cryptographic 82 methods may only be called from softirq and user contexts. For 84 user context.
|
/linux-4.1.27/arch/tile/ |
D | Kconfig | 281 Select the desired split between kernel and user memory. 288 available to user programs, making the address space there 297 bool "3.75G/0.25G user/kernel split (no kernel networking)" 299 bool "3.5G/0.5G user/kernel split" 301 bool "3G/1G user/kernel split" 303 bool "2.75G/1.25G user/kernel split (for full 1G low memory)" 305 bool "2.5G/1.5G user/kernel split" 307 bool "2.25G/1.75G user/kernel split" 309 bool "2G/2G user/kernel split" 311 bool "1G/3G user/kernel split" [all …]
|
/linux-4.1.27/arch/um/os-Linux/drivers/ |
D | tuntap_kern.c | 25 tpri = (struct tuntap_data *) pri->user; in tuntap_init() 74 .user = &tuntap_user_info,
|
D | ethertap_kern.c | 26 epri = (struct ethertap_data *) pri->user; in etap_init() 88 .user = ðertap_user_info,
|
/linux-4.1.27/include/net/ |
D | af_unix.h | 9 void unix_inflight(struct user_struct *user, struct file *fp); 10 void unix_notinflight(struct user_struct *user, struct file *fp);
|
/linux-4.1.27/tools/perf/util/ |
D | probe-event.h | 132 bool user); 137 bool user);
|
/linux-4.1.27/Documentation/hid/ |
D | hiddev.txt | 52 So you point your hiddev compliant user-space program at the correct 55 Assuming that you have a hiddev compliant user-space program, of 113 The user passes in a hiddev_collection_info struct with the index 143 be filled in by the user through HIDIOCSUSAGE calls (below) to fill in 148 Fills in a hiddev_report_info structure for the user. The report is 150 must be filled in by the user. The ID can be absolute -- the actual 161 hiddev_field_info structure. The user must fill in report_id and 173 usage to be retrieved can be specified as above, or the user can 180 Sets the value of a usage in an output report. The user fills in
|
D | uhid.txt | 4 UHID allows user-space to implement HID transport drivers. Please see 8 With UHID, a user-space transport driver can create kernel hid-devices for each 9 device connected to the user-space controlled bus. The UHID API defines the I/O 10 events provided from the kernel to user-space and vice versa. 12 There is an example user-space application in ./samples/uhid/uhid-example.c 50 UHID_OPEN event, the internally attached HID Device Driver has no user attached. 53 user closes the HID device, you will receive an UHID_CLOSE event. This may be 55 reference-counting in user-space. That is, you will never receive multiple 137 For messages sent by user-space to the kernel, you must adjust the
|
/linux-4.1.27/Documentation/usb/ |
D | functionfs.txt | 5 the user space driver has registered by writing descriptors and 6 strings (the user space program has to provide the same information 13 From user space point of view it is a file system which when 40 where the last two are implemented via FunctionFS. On user space
|
D | hotplug.txt | 9 to publish their device (and class) support to user utilities. 19 This involves a mix of kernel mode and user mode actions. Making devices 20 be immediately usable means that any user mode actions can't wait for an 23 actively (calling such a user mode helper program directly). 75 user mode daemon to detect changes in system configuration. 86 files can be used by various user mode policy agents to make sure all the
|
/linux-4.1.27/arch/mn10300/kernel/ |
D | ptrace.c | 265 struct user *dummy = NULL; in user_enable_single_step() 280 struct user *dummy = NULL; in user_disable_single_step() 308 if ((addr & 3) || addr > sizeof(struct user) - 3) in arch_ptrace() 321 if ((addr & 3) || addr > sizeof(struct user) - 3) in arch_ptrace()
|
/linux-4.1.27/Documentation/wimax/ |
D | README.wimax | 7 control API for WiMAX devices, usable from kernel and user space. 22 the user. As well, the stack provides API functions that the driver 25 The stack exports the API calls needed to control the device to user 47 The drivers will register debugfs entries that allow the user to tweak
|
/linux-4.1.27/net/bluetooth/hidp/ |
D | core.c | 65 struct l2cap_user *user); 67 struct l2cap_user *user); 930 session->user.probe = hidp_session_probe; in hidp_session_new() 931 session->user.remove = hidp_session_remove; in hidp_session_new() 1088 struct l2cap_user *user) in hidp_session_probe() argument 1090 struct hidp_session *session = container_of(user, in hidp_session_probe() 1092 user); in hidp_session_probe() 1149 struct l2cap_user *user) in hidp_session_remove() argument 1151 struct hidp_session *session = container_of(user, in hidp_session_remove() 1153 user); in hidp_session_remove() [all …]
|
/linux-4.1.27/net/netrom/ |
D | af_netrom.c | 568 ax25_uid_assoc *user; in nr_bind() local 607 user = ax25_findbyuid(current_euid()); in nr_bind() 608 if (user) { in nr_bind() 609 nr->user_addr = user->call; in nr_bind() 610 ax25_uid_put(user); in nr_bind() 640 ax25_uid_assoc *user; in nr_connect() local 681 user = ax25_findbyuid(current_euid()); in nr_connect() 682 if (user) { in nr_connect() 683 nr->user_addr = user->call; in nr_connect() 684 ax25_uid_put(user); in nr_connect() [all …]
|
/linux-4.1.27/arch/m68k/include/asm/ |
D | a.out-core.h | 23 static inline void aout_dump_thread(struct pt_regs *regs, struct user *dump) in aout_dump_thread() 40 dump->u_ar0 = offsetof(struct user, regs); in aout_dump_thread()
|
/linux-4.1.27/fs/autofs4/ |
D | Kconfig | 7 automounter (amd), which is a pure user space daemon. 9 To use the automounter you need the user-space tools from
|
/linux-4.1.27/fs/coda/ |
D | Kconfig | 14 *client*. You will need user level code as well, both for the 15 client and server. Servers are currently user level, i.e. they need
|
/linux-4.1.27/arch/xtensa/kernel/ |
D | ptrace.c | 145 ret |= __copy_to_user(&xtregs->user,&ti->xtregs_user, in ptrace_getxregs() 146 sizeof(xtregs->user)); in ptrace_getxregs() 171 ret |= __copy_from_user(&ti->xtregs_user, &xtregs->user, in ptrace_setxregs() 172 sizeof(xtregs->user)); in ptrace_setxregs()
|
/linux-4.1.27/Documentation/s390/ |
D | kvm.txt | 28 This call causes the kernel to switch on PGSTE in the user page table. This 31 will implicitly try to switch on PGSTE if the user process has not called 36 the calling process. It does not have any user-visible effect other than a small 48 at guest absolute address zero and at a user address that is aligned on any 52 user memory layout this does still allow a large flexibility when 54 ** KVM_GET_DIRTY_LOG doesn't work properly yet. The user will receive an empty
|
/linux-4.1.27/Documentation/early-userspace/ |
D | README | 41 built by an unprivileged user. 49 directory, limited user and group ID translation can be performed. 50 INITRAMFS_ROOT_UID can be set to a user ID that needs to be mapped to 51 user root (0). INITRAMFS_ROOT_GID can be set to a group ID that needs 60 initramfs image will be an aggregate of all of them. In this way a user 62 Because device-special files cannot be created by a unprivileged user, 65 early userspace image can be built by an unprivileged user.
|
/linux-4.1.27/drivers/usb/atm/ |
D | Kconfig | 26 two parts of the firmware, extracted by the user space tools; see 38 install the firmware, extracted by the user space tools; see 63 the modem using a user space utility (a firmware loader for example).
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | README | 70 domain to the proper network user. The mount.cifs mount helper can be 89 2) an entry for the share in /etc/fstab indicating that a user may 91 //server/usersharename /mnt/username cifs user 0 0 93 Note that when the mount.cifs utility is run suid (allowing user mounts), 99 by simply specifying "nosuid" among the mount options. For user mounts 110 To permit users to ummount directories that they have user mounted (see above), 115 helper). As with mount.cifs, to enable user unmounts umount.cifs must be marked 119 must be a cifs mount, and the uid of the current user must match the uid 120 of the user who mounted the resource. 122 Also note that the customary way of allowing user mounts and unmounts is [all …]
|
/linux-4.1.27/drivers/clocksource/ |
D | em_sti.c | 163 static int em_sti_start(struct em_sti_priv *p, unsigned int user) in em_sti_start() argument 175 p->active[user] = 1; in em_sti_start() 181 static void em_sti_stop(struct em_sti_priv *p, unsigned int user) in em_sti_stop() argument 188 p->active[user] = 0; in em_sti_stop()
|
/linux-4.1.27/Documentation/serial/ |
D | serial-rs485.txt | 22 available at user-level to allow switching from one mode to the other, and 39 to enable/disable RS485 mode from user-space 42 to get RS485 mode from kernel-space (i.e., driver) to user-space. 83 From user-level, RS485 configuration can be get/set using the previous
|
/linux-4.1.27/arch/cris/arch-v10/ |
D | README.mm | 37 space. We also use it to keep the user-mode virtual mapping in the same 39 user-mode process' data. 42 address 0, overlapping with the user-mode virtual space, so that descriptor 45 0xc0000000, to co-exist with the user-mode mapping. We will do something 84 In user-mode it looks the same except that only the space 0-AFFFFFFF is 91 and shrinking the user-mode memory space. 93 The MMU can map all 4 GB in user mode, but doing that would mean that a 94 few extra instructions would be needed for each access to user mode
|
/linux-4.1.27/fs/cifs/ |
D | cifsencrypt.c | 495 __le16 *user; in calc_ntlmv2_hash() local 522 user = kmalloc(2 + (len * 2), GFP_KERNEL); in calc_ntlmv2_hash() 523 if (user == NULL) { in calc_ntlmv2_hash() 529 len = cifs_strtoUTF16(user, ses->user_name, len, nls_cp); in calc_ntlmv2_hash() 530 UniStrupr(user); in calc_ntlmv2_hash() 532 memset(user, '\0', 2); in calc_ntlmv2_hash() 536 (char *)user, 2 * len); in calc_ntlmv2_hash() 537 kfree(user); in calc_ntlmv2_hash()
|
/linux-4.1.27/drivers/thermal/ |
D | Kconfig | 71 Select this if you want to let the user space manage the 100 Enable this to let the user space manage the platform thermals. 132 user can manually input temperature and test the different trip 239 user interface is exposed via generic thermal framework. 249 two trip points which can be set by user to get notifications via thermal 260 be set by user mode programs to get notifications via Linux thermal 279 the information to the user or use this information for making 281 information to allow the user to select his laptop to run without
|