/linux-4.4.14/include/linux/ |
H A D | fanotify.h | 6 /* not valid from userspace, only kernel internal */
|
H A D | patchkey.h | 7 * clear whether removing this would break anything in userspace.
|
H A D | ecryptfs.h | 4 /* Version verification for shared data structures w/ userspace */ 9 * module; userspace tools such as the mount helper read the feature 49 * key between kernel and userspace because the authentication token
|
H A D | memory.h | 40 /* These states are exposed to userspace as text strings in sysfs */ 41 #define MEM_ONLINE (1<<0) /* exposed to userspace */ 42 #define MEM_GOING_OFFLINE (1<<1) /* exposed to userspace */ 43 #define MEM_OFFLINE (1<<2) /* exposed to userspace */
|
H A D | elf-fdpic.h | 23 struct elf32_fdpic_loadmap *loadmap; /* loadmap to be passed to userspace */
|
H A D | projid.h | 8 * the kernel are values used by userspace and which project id values are
|
H A D | gpio_keys.h | 17 * @can_disable: %true indicates that userspace is allowed to
|
H A D | lguest_launcher.h | 3 /* Everything the "lguest" userspace program needs to know. */
|
H A D | vfio.h | 24 * @open: Called when userspace creates new file descriptor for device 25 * @release: Called when userspace releases file descriptor for device
|
/linux-4.4.14/drivers/acpi/ |
H A D | debugfs.c | 2 * debugfs.c - ACPI debugfs interface to userspace.
|
/linux-4.4.14/arch/sparc/lib/ |
H A D | csum_copy_from_user.S | 1 /* csum_copy_from_user.S: Checksum+copy from userspace.
|
H A D | csum_copy_to_user.S | 1 /* csum_copy_to_user.S: Checksum+copy to userspace.
|
H A D | GENcopy_from_user.S | 1 /* GENcopy_from_user.S: Generic sparc64 copy from userspace.
|
H A D | U3copy_from_user.S | 1 /* U3copy_from_user.S: UltraSparc-III optimized copy from userspace.
|
H A D | GENcopy_to_user.S | 1 /* GENcopy_to_user.S: Generic sparc64 copy to userspace.
|
H A D | NG2copy_from_user.S | 1 /* NG2copy_from_user.S: Niagara-2 optimized copy from userspace.
|
H A D | NG4copy_from_user.S | 1 /* NG4copy_from_user.S: Niagara-4 optimized copy from userspace.
|
H A D | NGcopy_from_user.S | 1 /* NGcopy_from_user.S: Niagara optimized copy from userspace.
|
H A D | NGcopy_to_user.S | 1 /* NGcopy_to_user.S: Niagara optimized copy to userspace.
|
H A D | NG2copy_to_user.S | 1 /* NG2copy_to_user.S: Niagara-2 optimized copy to userspace.
|
H A D | NG4copy_to_user.S | 1 /* NG4copy_to_user.S: Niagara-4 optimized copy to userspace.
|
H A D | U1copy_from_user.S | 1 /* U1copy_from_user.S: UltraSparc-I/II/IIi/IIe optimized copy from userspace.
|
H A D | U1copy_to_user.S | 1 /* U1copy_to_user.S: UltraSparc-I/II/IIi/IIe optimized copy to userspace.
|
H A D | U3copy_to_user.S | 1 /* U3copy_to_user.S: UltraSparc-III optimized copy to userspace.
|
H A D | copy_in_user.S | 1 /* copy_in_user.S: Copy from userspace to userspace.
|
H A D | ksyms.c | 67 /* Moving data to/from/in userspace. */ 95 /* Moving data to/from/in userspace. */
|
/linux-4.4.14/include/trace/events/ |
H A D | context_tracking.h | 27 * user_enter - called when the kernel resumes to userspace 30 * This event occurs when the kernel resumes to userspace after 41 * user_exit - called when userspace enters the kernel 44 * This event occurs when userspace enters the kernel through
|
H A D | tlb.h | 18 * First define the enums in TLB_FLUSH_REASON to be exported to userspace
|
H A D | migrate.h | 25 * First define the enums in the above macros to be exported to userspace
|
/linux-4.4.14/include/uapi/linux/netfilter/ |
H A D | nf_conntrack_ftp.h | 5 /* This enum is exposed to userspace */
|
H A D | nfnetlink_acct.h | 20 NFACCT_F_OVERQUOTA = (1 << 2), /* can't be set from userspace */
|
H A D | nfnetlink_queue.h | 8 NFQNL_MSG_PACKET, /* packet from kernel to userspace */ 9 NFQNL_MSG_VERDICT, /* verdict from userspace to kernel */ 11 NFQNL_MSG_VERDICT_BATCH, /* batchv from userspace to kernel */
|
H A D | nf_conntrack_tcp.h | 7 /* This is exposed to userspace (ctnetlink) */
|
H A D | nfnetlink_log.h | 6 * userspace. Don't put kernel specific stuff in here */ 12 NFULNL_MSG_PACKET, /* packet from kernel to userspace */
|
H A D | x_tables.h | 15 /* Used by userspace */ 38 /* Used by userspace */
|
H A D | nfnetlink_compat.h | 7 /* Old nfnetlink macros for userspace */
|
/linux-4.4.14/security/ |
H A D | min_addr.c | 6 /* amount of vm to protect from userspace access by both DAC and the LSM*/ 8 /* amount of vm to protect from userspace using CAP_SYS_RAWIO (DAC) */ 10 /* amount of vm to protect from userspace using the LSM = CONFIG_LSM_MMAP_MIN_ADDR */
|
/linux-4.4.14/include/linux/spi/ |
H A D | at73c213.h | 13 * @shortname: a short discription for the DAC, seen by userspace tools. 17 * provides a name which is used to identify it in userspace tools.
|
/linux-4.4.14/drivers/md/ |
H A D | dm-log-userspace-transfer.h | 10 #define DM_MSG_PREFIX "dm-log-userspace"
|
H A D | dm-log-userspace-transfer.c | 14 #include <linux/dm-log-userspace.h> 16 #include "dm-log-userspace-transfer.h" 77 * If just msg is given, then the reply is simply an ACK from userspace 131 * that was sent from userspace. 155 * @request_type: found in include/linux/dm-log-userspace.h 163 * Memory used to communicate with userspace is zero'ed 165 * from kernel space to user-space. All userspace log communications 231 DMERR("Unable to send log request [%u] to userspace: %d", dm_consult_userspace()
|
H A D | dm-log-userspace-base.c | 12 #include <linux/dm-log-userspace.h> 16 #include "dm-log-userspace-transfer.h" 31 * imposed on the size of data payload by dm-log-userspace-transfer.c: 51 * network traffic between kernel and userspace. The 'flush_lock' 75 * Combine userspace flush and mark requests for efficiency. 106 DMWARN("Attempting to contact userspace log server..."); userspace_do_request() 114 DMINFO("Reconnected to userspace log server... DM_ULOG_CTR complete"); userspace_do_request() 120 DMERR("Error trying to resume userspace log: %d", r); userspace_do_request() 174 * Where 'other args' are the userspace implementation-specific log 182 * purposes when communicating with userspace about a log. 188 * to the userspace ctr function. 203 DMWARN("Too few arguments to userspace dirty log"); userspace_ctr() 209 DMWARN("Unable to allocate userspace log context."); userspace_ctr() 448 * to userspace to ask, we might think the region is in-sync userspace_in_sync() 871 .name = "userspace", 903 DMWARN("Unable to initialize userspace log communications"); userspace_dirty_log_init() 910 DMWARN("Couldn't register userspace dirty log type"); userspace_dirty_log_init() 933 MODULE_DESCRIPTION(DM_NAME " userspace dirty log link");
|
/linux-4.4.14/scripts/ |
H A D | headers.sh | 20 um) # no userspace export
|
H A D | headers_check.pl | 74 "userspace cannot reference function or " . 82 printf STDERR "$filename:$lineno: leaks CONFIG_$1 to userspace where it is not valid\n";
|
/linux-4.4.14/fs/notify/fanotify/ |
H A D | fanotify.h | 11 * userspace 27 * information is retrieved by userspace the structure is moved from 33 int response; /* userspace answer to question */ 34 int fd; /* fd we passed to userspace for this event */
|
/linux-4.4.14/include/uapi/linux/ |
H A D | cm4000_cs.h | 11 /* those two structures are passed via ioctl() from/to userspace. They are 12 * used by existing userspace programs, so I kepth the awkward "bIFSD" naming 13 * not to break compilation of userspace apps. -HW */ 25 * member sizes. This leads to CONFIG_COMPAT breakage, since 32bit userspace
|
H A D | rfkill.h | 24 /* define userspace visible states */ 60 * @RFKILL_OP_CHANGE: a device's state changed -- userspace changes one device 61 * @RFKILL_OP_CHANGE_ALL: userspace changes all devices (of a type, or all) 71 * struct rfkill_event - events for userspace on /dev/rfkill 78 * Structure used for userspace communication on /dev/rfkill, 91 * When reading an event (whether the kernel from userspace or vice 107 /* and that's all userspace gets */
|
H A D | target_core_user.h | 20 * The mailbox tells userspace the offset of the command ring from the 23 * The kernel passes SCSI commands to userspace by putting a struct 25 * userspace via uio's interrupt mechanism. 28 * userspace should skip hdr->length bytes (mod cmdr_size) to find the 35 * When userspace is completed handling the command, set
|
H A D | dm-log-userspace.h | 13 * The device-mapper userspace log module consists of a kernel component and 39 * you will see 'Payload-to-userspace' and 'Payload-to-kernel'. The 40 * 'Payload-to-userspace' is what the kernel sends in 'additional data' as 52 * Payload-to-userspace: 76 * Payload-to-userspace: 95 * Payload-to-userspace: 114 * Payload-to-userspace: 133 * Payload-to-userspace: 152 * Payload-to-userspace: 170 * Payload-to-userspace: 189 * Payload-to-userspace: 203 * Payload-to-userspace: 215 * between kernel and userspace. 227 * Payload-to-userspace: 246 * Payload-to-userspace: 265 * Payload-to-userspace: 284 * Payload-to-userspace: 302 * Payload-to-userspace: 321 * Payload-to-userspace: 337 * Payload-to-userspace: 352 * Payload-to-userspace: 369 * Payload-to-userspace: 388 * and userspace. This could be a structure change of 397 * requests between the kernel and userspace by effectively 401 * userspace versions.
|
H A D | patchkey.h | 7 * clear whether removing this would break anything in userspace.
|
H A D | selinux_netlink.h | 26 /* Multicast groups - backwards compatiblility for userspace */
|
H A D | auto_fs.h | 32 * back to the kernel via ioctl from userspace. On architectures where 32- and 33 * 64-bit userspace binaries can be executed it's important that the size of
|
H A D | mmtimer.h | 12 * hardware may not be able to safely export its registers to userspace, 42 * Returns nonzero if the registers can be mmap'd into userspace, 0 otherwise
|
H A D | nbd.h | 44 /* there is a gap here to match userspace */ 47 /* userspace doesn't need the nbd_device structure */
|
H A D | netfilter.h | 35 /* only for userspace compatibility */ 42 /* NF_VERDICT_BITS should be 8 now, but userspace might break if this changes */
|
H A D | netfilter_decnet.h | 12 /* only for userspace compatibility */ 63 /* backwards compatibility for userspace */
|
H A D | fanotify.h | 73 * All events which require a permission response from userspace 99 /* Legit userspace responses to a _PERM event */
|
H A D | libc-compat.h | 2 * Compatibility interface for userspace libc header coordination: 6 * userspace C library. 9 * conflict with userspace definitions. If a UAPI header has such conflicting 24 * userspace libc header has been included first. 26 * (c) If the userspace libc header has been included first define a set of 38 * userspace libc headers must be fixed like this:
|
H A D | futex.h | 78 * we keep userspace flexible, to freely shape its data-structure, 84 * The death of the thread may race with userspace setting 85 * up a lock's links. So to handle this race, userspace first
|
H A D | vhost.h | 9 * This header includes interface used by userspace hypervisor for 147 * Used by QEMU userspace to ensure a consistent vhost-scsi ABI. 150 * RFC-v2 vhost-scsi userspace. Add GET_ABI_VERSION ioctl usage 166 /* Changing this breaks userspace. */
|
H A D | cgroupstats.h | 41 * Commands sent from userspace
|
H A D | dlm_device.h | 79 consists mainly of userspace pointers for the library to use */
|
H A D | fcntl.h | 11 * asynchronous lock api to userspace:
|
H A D | if_addr.h | 63 /* backwards compatibility for userspace */
|
H A D | netdevice.h | 41 #define NET_NAME_UNKNOWN 0 /* unknown origin (not exposed to userspace) */
|
H A D | netfilter_ipv4.h | 10 /* only for userspace compatibility */
|
H A D | netfilter_ipv6.h | 13 /* only for userspace compatibility */
|
H A D | personality.h | 13 FDPIC_FUNCPTRS = 0x0080000, /* userspace function ptrs point to descriptors
|
H A D | stm.h | 2 * System Trace Module (STM) userspace interfaces
|
H A D | toshiba.h | 55 * to avoid userspace of buggy BIOSes.
|
H A D | types.h | 43 * aligned_u64 should be used in defining kernel<->userspace ABIs to avoid
|
/linux-4.4.14/include/linux/netfilter/ |
H A D | nf_conntrack_dccp.h | 4 /* Exposed to userspace over nfnetlink */
|
/linux-4.4.14/arch/sparc/crypto/ |
H A D | crop_devid.c | 6 * mechanisms in userspace which scan the OF device tree and
|
/linux-4.4.14/include/uapi/linux/iio/ |
H A D | events.h | 1 /* The industrial I/O - event passing to userspace 16 * struct iio_event_data - The actual event being pushed to userspace
|
/linux-4.4.14/arch/avr32/lib/ |
H A D | strncpy_from_user.S | 2 * Copy to/from userspace with optional address space checking. 24 * If userspace access fails, returns -EFAULT
|
H A D | strnlen_user.S | 2 * Copy to/from userspace with optional address space checking.
|
/linux-4.4.14/drivers/staging/android/ |
H A D | ashmem.h | 21 /* support of 32bit userspace on 64bit platforms */
|
/linux-4.4.14/drivers/firmware/efi/ |
H A D | Makefile | 6 # ARM64 maps efi runtime services in userspace addresses
|
/linux-4.4.14/tools/arch/arm64/include/asm/ |
H A D | barrier.h | 9 * a case like for arm32 where we do things differently in userspace?
|
/linux-4.4.14/drivers/hv/ |
H A D | hv_utils_transport.h | 2 * Kernel/userspace transport abstraction for Hyper-V util driver. 37 void (*on_reset)(void); /* callback when userspace drops */ 38 u8 *outmsg; /* message to the userspace */
|
/linux-4.4.14/arch/openrisc/kernel/ |
H A D | process.c | 117 * @arg: arg to fn for kernel thread; always NULL for userspace thread 119 * @regs: CPU context to copy for userspace thread; always NULL for kthread 122 * structures. The first (topmost) is the userspace context of the thread. 125 * A kernel thread will not be returning to userspace, so the topmost pt_regs 127 * a kernel thread can become a userspace thread by doing a kernel_execve, in 129 * to userspace. 133 * a function to call into (with arg in r22); userspace threads need to set 135 * userspace. 138 * kernel_execve is called. In that case, the userspace pt_regs must have 141 * 'kernel thread' to return to userspace as a userspace thread. 157 /* Locate userspace context on stack... */ copy_thread()
|
H A D | ptrace.c | 38 * Copy the thread state to a regset that can be interpreted by userspace. 42 * to userspace. As such, we need to make sure that the regset remains 100 * Skip SR and padding... userspace isn't allowed to changes bits in genregs_set()
|
/linux-4.4.14/drivers/net/wireless/rt2x00/ |
H A D | rt2x00dump.h | 22 Data structures for the rt2x00debug & userspace. 25 and userspace and therefore should be kept together in 35 * This header is intended to be exported to userspace, 36 * to make the structures and enumerations available to userspace 86 * the structure. This way userspace tools compiled for earlier 91 * This field must be checked by userspace to determine if it can 94 * used for compatibility reasons so userspace can easily determine
|
/linux-4.4.14/arch/cris/arch-v32/lib/ |
H A D | checksumcopy.S | 30 1: ;; A failing userspace access (the read) will have this as PC. 71 2: ;; A failing userspace access for the read below will have this as PC. 87 3: ;; A failing userspace access for the read below will have this as PC.
|
/linux-4.4.14/drivers/mtd/ |
H A D | Makefile | 17 # 'Users' - code which presents functionality to userspace.
|
/linux-4.4.14/scripts/dtc/ |
H A D | Makefile | 10 # Source files need to get at the userspace version of libfdt_env.h to compile
|
/linux-4.4.14/security/selinux/ss/ |
H A D | status.c | 20 * The selinux_status_page shall be exposed to userspace applications 23 * of userspace access vector without context switching. 26 * protected from concurrent accesses using seqlock logic, so userspace 33 * number, it means something happen, so application will reset userspace
|
/linux-4.4.14/include/rdma/ |
H A D | iw_portmap.h | 78 * iwpm_valid_pid - Check if the userspace iwarp port mapper pid is valid 85 * iwpm_register_pid - Send a netlink query to userspace 87 * @pm_msg: Contains driver info to send to the userspace port mapper 94 * the userspace port mapper 105 * to the userspace port mapper 116 * to the userspace port mapper 129 * If successful, the function receives the userspace port mapper pid 169 * iwpm_mapping_info_cb - Process a notification that the userspace 175 * info records to the userspace port mapper
|
/linux-4.4.14/include/uapi/linux/usb/ |
H A D | cdc-wdm.h | 2 * USB CDC Device Management userspace API definitions
|
H A D | tmc.h | 10 * userspace needs to know about.
|
/linux-4.4.14/arch/mips/include/uapi/asm/ |
H A D | types.h | 16 * userspace to avoid code changes.
|
/linux-4.4.14/arch/metag/include/asm/ |
H A D | user_gateway.h | 10 /* Page of kernel code accessible to userspace. */
|
/linux-4.4.14/arch/mips/oprofile/ |
H A D | op_impl.h | 20 /* Dummies because I am too lazy to hack the userspace tools. */
|
H A D | backtrace.c | 64 * TODO for userspace stack unwinding: 169 const int userspace = user_mode(regs); op_mips_backtrace() local 172 if (userspace) op_mips_backtrace()
|
/linux-4.4.14/arch/mn10300/mm/ |
H A D | cache-disabled.c | 14 * allow userspace to flush the instruction cache
|
H A D | cache.c | 45 * allow userspace to flush the instruction cache
|
/linux-4.4.14/arch/blackfin/include/asm/ |
H A D | fixed_code.h | 2 * This file defines the fixed addresses where userspace programs
|
H A D | l1layout.h | 2 * Defines a layout of L1 scratchpad memory that userspace can rely on.
|
/linux-4.4.14/arch/blackfin/include/uapi/asm/ |
H A D | fixed_code.h | 2 * This file defines the fixed addresses where userspace programs
|
/linux-4.4.14/arch/arm/mach-omap2/ |
H A D | am33xx-restart.c | 17 * @cmd: passed from the userspace program rebooting the system (if provided)
|
H A D | omap4-restart.c | 18 * @cmd: passed from the userspace program rebooting the system (if provided)
|
H A D | omap3-restart.c | 26 * @cmd: passed from the userspace program rebooting the system (if provided)
|
H A D | ti81xx-restart.c | 21 * @cmd: passed from the userspace program rebooting the system (if provided)
|
/linux-4.4.14/arch/x86/include/asm/ |
H A D | vvar.h | 6 * A handful of variables are accessible (read-only) from userspace 14 * mapping for userspace. Each variable needs a unique offset within
|
/linux-4.4.14/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 27 * Trusted keys are sealed to PCRs and other metadata. Although userspace 29 * data, trusted key type data is not visible decrypted from userspace.
|
/linux-4.4.14/arch/mips/cavium-octeon/crypto/ |
H A D | octeon-crypto.c | 18 * sure the state of COP2 isn't corrupted if userspace is also performing 50 * userspace.
|
/linux-4.4.14/arch/openrisc/include/uapi/asm/ |
H A D | elf.h | 23 * This files is partially exported to userspace. This allows us to keep 25 * userspace in sync.
|
/linux-4.4.14/arch/frv/include/asm/ |
H A D | mem-layout.h | 66 * memory layout from userspace's point of view 72 /* userspace process size */
|
H A D | ptrace.h | 24 * - gr28 is destroyed on entry to the kernel from userspace
|
/linux-4.4.14/arch/frv/kernel/ |
H A D | uaccess.c | 1 /* uaccess.c: userspace access functions 18 * copy a null terminated string from userspace
|
H A D | signal.c | 196 /* Set up to return from userspace. If provided, use a stub setup_frame() 197 * already in userspace. */ setup_frame() 277 /* Set up to return from userspace. If provided, use a stub setup_rt_frame() 278 * already in userspace. */ setup_rt_frame() 407 * notification of userspace execution resumption 420 /* deal with notification on about to resume userspace execution */ do_notify_resume()
|
H A D | ptrace.c | 38 * retrieve the contents of FRV userspace general registers 58 * update the contents of the FRV userspace general registers 103 * retrieve the contents of FRV userspace FP/Media registers 123 * update the contents of the FRV userspace FP/Media registers
|
/linux-4.4.14/drivers/uio/ |
H A D | uio_sercos3.c | 8 by the userspace-part. 12 userspace-part could directly modify the Interrupt Enable Register 17 Race conditions exist if the userspace-part directly modifies the 20 this reason, the userspace-part should only directly modify the 22 The userspace-part can safely disable interrupts at any time using
|
/linux-4.4.14/include/uapi/linux/spi/ |
H A D | spidev.h | 58 * @tx_buf: Holds pointer to userspace buffer with transmit data, or null. 60 * @rx_buf: Holds pointer to userspace buffer for receive data, or null. 71 * cases, such as 32-bit i386 userspace over a 64-bit x86_64 kernel). 75 * SPI_IOC_MESSAGE gives userspace the equivalent of kernel spi_sync(). 108 * NOTE: struct layout is the same in 64bit and 32bit userspace.
|
/linux-4.4.14/arch/powerpc/kvm/ |
H A D | booke_emulate.c | 157 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 168 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 180 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 191 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 203 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 214 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 225 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 240 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 251 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr() 262 * If userspace is debugging guest then guest kvmppc_booke_emulate_mtspr()
|
H A D | book3s_64_vio_hv.c | 74 /* Didn't find the liobn, punt it to userspace */ kvmppc_h_put_tce() 102 /* Didn't find the liobn, punt it to userspace */ kvmppc_h_get_tce()
|
/linux-4.4.14/arch/cris/arch-v10/lib/ |
H A D | checksumcopy.S | 40 1: ;; A failing userspace access will have this as PC. 103 2: ;; A failing userspace access will have this as PC. 122 3: ;; A failing userspace access will have this as PC.
|
/linux-4.4.14/lib/ |
H A D | strncpy_from_user.c | 82 * strncpy_from_user: - Copy a NUL terminated string from userspace. 88 * Copies a NUL-terminated string from userspace to kernel space. 93 * If access to userspace fails, returns -EFAULT (some data may have been
|
/linux-4.4.14/fs/quota/ |
H A D | netlink.c | 21 * isn't true) and userspace might thus rely on it. Assign a 34 * quota_send_warning - Send warning to userspace about exceeded quota 40 * dquot) to send a message to userspace relating to quota limits.
|
/linux-4.4.14/arch/x86/kernel/ |
H A D | uprobes.c | 72 * 6c-6f - ins,outs. SEGVs if used in userspace 73 * e4-e7 - in,out imm. SEGVs if used in userspace 74 * ec-ef - in,out acc. SEGVs if used in userspace 75 * cc - int3. SIGTRAP if used in userspace 76 * ce - into. Not used in userspace - no kernel support to make it useful. SEGVs 78 * f1 - int1. SIGTRAP if used in userspace 79 * f4 - hlt. SEGVs if used in userspace 80 * fa - cli. SEGVs if used in userspace 81 * fb - sti. SEGVs if used in userspace 85 * Normally not used in userspace, but would execute if used. 88 * of userspace single-stepping (TF flag) is fragile. 92 * Used by userspace for "int 80" syscall entry. (Other "int N" 94 * Not supported since kernel's handling of userspace single-stepping 96 * cf - iret. Normally not used in userspace. Doesn't SEGV unless arguments are bad 143 * 6c-6f - ins,outs. SEGVs if used in userspace 144 * e4-e7 - in,out imm. SEGVs if used in userspace 145 * ec-ef - in,out acc. SEGVs if used in userspace 146 * cc - int3. SIGTRAP if used in userspace 147 * f1 - int1. SIGTRAP if used in userspace 148 * f4 - hlt. SEGVs if used in userspace 149 * fa - cli. SEGVs if used in userspace 150 * fb - sti. SEGVs if used in userspace 154 * Used by userspace for "int 80" syscall entry. (Other "int N" 156 * Not supported since kernel's handling of userspace single-stepping 158 * cf - iret. Normally not used in userspace. Doesn't SEGV unless arguments are bad 906 /* We are only interested in userspace traps */ arch_uprobe_exception_notify()
|
/linux-4.4.14/drivers/staging/rtl8188eu/include/ |
H A D | mon.h | 18 * frames, both Data and Management, and passes them up to userspace
|
/linux-4.4.14/drivers/staging/lustre/include/linux/libcfs/ |
H A D | libcfs_kernelcomm.h | 38 * Kernel <-> userspace communication routines. 39 * The definitions below are used in the kernel and userspace. 82 /* KUC Broadcast Groups. This determines which userspace process hears which 102 /* kernelcomm control structure, passed from userspace to kernel */
|
/linux-4.4.14/drivers/media/rc/keymaps/ |
H A D | rc-lirc.c | 2 * all raw IR data to the lirc userspace decoder.
|
/linux-4.4.14/arch/tile/include/uapi/asm/ |
H A D | sigcontext.h | 24 * but is simplified since we know the fault is from userspace.
|
H A D | cachectl.h | 32 * __insn_flush() and __insn_finv() instructions from userspace. 33 * The DCACHE option to the system call allows userspace
|
/linux-4.4.14/arch/alpha/oprofile/ |
H A D | op_impl.h | 18 /* Dummies because I am too lazy to hack the userspace tools. */
|
/linux-4.4.14/include/uapi/mtd/ |
H A D | inftl-user.h | 2 * Parts of INFTL headers shared with userspace
|
H A D | mtd-user.h | 23 /* This file is blessed for inclusion by userspace */
|
/linux-4.4.14/kernel/ |
H A D | user-return-notifier.c | 10 * Request a notification when the current cpu returns to userspace. Must be
|
H A D | context_tracking.c | 3 * and userspace. This includes syscalls and exceptions entry/exit. 6 * runs in userspace. 63 /* Kernel threads aren't supposed to go to userspace */ __context_tracking_enter() 73 * then we'll run in userspace. We can assume there won't be __context_tracking_enter() 89 * If a task triggers an exception in userspace, sleep on the exception __context_tracking_enter() 142 * handler without needing to know if we came from userspace or not.
|
/linux-4.4.14/include/linux/usb/ |
H A D | iowarrior.h | 13 To be compatible with 2.4 userspace which didn't have an easy way to get
|
/linux-4.4.14/include/media/ |
H A D | bt819.h | 32 from userspace. */
|
H A D | videobuf2-core.h | 48 * @get_dmabuf: acquire userspace memory for a hardware operation; used for 50 * @get_userptr: acquire userspace memory for a hardware operation; used for 73 * @prepare: called every time the buffer is passed from userspace to the 76 * to the userspace, also optional. 86 * @mmap: setup a userspace mapping for a given memory buffer under 136 * @userptr: when memory is VB2_MEMORY_USERPTR, a userspace pointer 138 * @fd: when memory is VB2_MEMORY_DMABUF, a userspace file 179 * @VB2_BUF_STATE_DEQUEUED: buffer under userspace control 187 * not yet dequeued to userspace 190 * to the userspace when it is dequeued 227 * all buffers queued from userspace 229 * to be dequeued to userspace 298 * @buf_prepare: called every time the buffer is queued from userspace 307 * userspace; the buffer is synced for the CPU, so drivers 309 * perform any operations required before userspace 332 * many buffers have been queued up by userspace. 417 * @queued_list: list of buffers currently queued from userspace 420 * @done_list: list of buffers ready to be dequeued to userspace 554 * userspace. A driver that supports this field format should check for
|
H A D | videobuf-dma-sg.h | 32 * creates a buffer. The userland version takes a userspace 81 * scatter-gather list from a kernel, userspace of physical address and map the
|
/linux-4.4.14/arch/cris/kernel/ |
H A D | ptrace.c | 27 /* notification of userspace execution resumption
|
/linux-4.4.14/arch/arm/mm/ |
H A D | abort-macro.S | 16 uaccess_disable ip @ disable userspace access
|
/linux-4.4.14/tools/testing/selftests/powerpc/pmu/ebb/ |
H A D | close_clears_pmcc_test.c | 16 * by userspace to the PMU hardware.
|
/linux-4.4.14/drivers/cpufreq/ |
H A D | cpufreq_userspace.c | 96 .name = "userspace", 115 MODULE_DESCRIPTION("CPUfreq policy governor 'userspace'");
|
H A D | unicore2-cpufreq.c | 25 /* make sure that only the "userspace" governor is run
|
/linux-4.4.14/arch/um/kernel/ |
H A D | time.c | 77 /* userspace - relay signal, results in correct userspace timers */ um_timer()
|
/linux-4.4.14/arch/x86/um/vdso/ |
H A D | Makefile | 37 # Don't omit frame pointers for ease of userspace debugging, but do 47 # vDSO code runs in userspace and -pg doesn't help with profiling anyway.
|
H A D | um_vdso.c | 12 /* Disable profiling for userspace code */
|
/linux-4.4.14/arch/alpha/include/asm/ |
H A D | cacheflush.h | 27 Note that this definition should *not* be used for userspace 38 /* We need to flush the userspace icache after setting breakpoints in
|
H A D | thread_info.h | 82 /* Work to do on any return to userspace. */ 88 #define TS_UAC_SIGBUS 0x0004 /* ! userspace part of 'osf_sysinfo' */
|
/linux-4.4.14/arch/mn10300/lib/ |
H A D | usercopy.c | 31 * Copy a null terminated string from userspace. 87 * Clear a userspace memory
|
/linux-4.4.14/arch/avr32/include/asm/ |
H A D | thread_info.h | 78 #define TIF_USERSPACE 31 /* true if FS sets userspace */ 98 /* work to do on any return to userspace */
|
/linux-4.4.14/drivers/staging/android/uapi/ |
H A D | ion.h | 83 * struct ion_allocation_data - metadata passed from userspace for allocations 91 * Provided by userspace as an argument to the ioctl 102 * struct ion_fd_data - metadata passed to/from userspace for a handle/fd pair 106 * For ION_IOC_SHARE or ION_IOC_MAP userspace populates the handle field with 108 * descriptor to share or map in the fd field. For ION_IOC_IMPORT, userspace 125 * struct ion_custom_data - metadata passed to/from userspace for a custom ioctl
|
H A D | sync.h | 21 * @fence: returns the fd of the new fence to userspace 51 * ioctl returns length of sync_fence_data returned to userspace
|
/linux-4.4.14/arch/mn10300/kernel/ |
H A D | signal.c | 154 * store the userspace context into a signal frame 225 /* set up to return from userspace. If provided, use a stub already in setup_frame() 226 * userspace */ setup_frame() 289 /* set up to return from userspace. If provided, use a stub already in setup_rt_frame() 290 * userspace */ setup_rt_frame() 333 * handle the actual delivery of a signal to userspace 408 * notification of userspace execution resumption
|
H A D | profile-low.S | 36 # ignore userspace
|
/linux-4.4.14/drivers/media/v4l2-core/ |
H A D | videobuf2-v4l2.c | 47 * v4l2_buffer from userspace can be safely used 177 * returned to userspace 202 * Fill in plane-related data if userspace provided an array __fill_v4l2_buffer() 224 * single-planar buffers, but userspace does not. __fill_v4l2_buffer() 280 * v4l2_buffer by the userspace. It also verifies that struct 341 * userspace clearly never bothered to set it and __fill_vb2_buffer() 348 * allow_zero_bytesused flag to keep old userspace __fill_vb2_buffer() 379 * old userspace applications working. __fill_vb2_buffer() 443 * @b: buffer struct passed from userspace to vidioc_querybuf handler 448 * relevant information for the userspace. 478 * @req: struct passed from userspace to vidioc_reqbufs handler 490 * vb2_prepare_buf() - Pass ownership of a buffer from userspace to the kernel 492 * @b: buffer structure passed from userspace to vidioc_prepare_buf 523 * @create: creation parameters, passed from userspace to vidioc_create_bufs 547 * vb2_qbuf() - Queue a buffer from userspace 549 * @b: buffer structure passed from userspace to vidioc_qbuf handler 594 * vb2_dqbuf() - Dequeue a buffer to the userspace 596 * @b: buffer structure passed from userspace to vidioc_dqbuf handler 607 * returning the buffer to userspace, such as cache sync, 609 * the userspace. 627 * @type: type argument passed from userspace to vidioc_streamon handler 650 * @type: type argument passed from userspace to vidioc_streamoff handler 675 * @eb: export buffer structure passed from userspace to vidioc_expbuf 750 * vb2_poll() - implements poll userspace operation 756 * For CAPTURE queues, if a buffer is ready to be dequeued, the userspace will 1066 * @data: pointed to target userspace buffer 1157 * Transfer data to userspace. __vb2_perform_fileio()
|
H A D | videobuf2-core.c | 94 * __vb2_buf_userptr_put() - release userspace memory associated with 440 * @pb: buffer struct passed from userspace 444 * This function fills the relevant information for the userspace. 553 * 1) verifies streaming parameters passed from the userspace, 678 * to the userspace. vb2_core_reqbufs() 778 * to the userspace. vb2_core_create_bufs() 834 * a buffer is finished and the buffer may be returned to userspace. The driver 951 /* Copy relevant information provided by the userspace */ __qbuf_userptr() 963 dprintk(3, "userspace address for plane %d changed, " __qbuf_userptr() 996 dprintk(1, "failed acquiring userspace " __qbuf_userptr() 1006 * provided by userspace. __qbuf_userptr() 1065 /* Copy relevant information provided by the userspace */ __qbuf_dmabuf() 1143 * provided by userspace. __qbuf_dmabuf() 1234 * vb2_core_prepare_buf() - Pass ownership of a buffer from userspace 1238 * @pb: buffer structure passed from userspace to vidioc_prepare_buf 1265 /* Fill buffer information for the userspace */ vb2_core_prepare_buf() 1340 * vb2_core_qbuf() - Queue a buffer from userspace 1343 * @pb: buffer structure passed from userspace to vidioc_qbuf handler 1400 /* Fill buffer information for the userspace */ vb2_core_qbuf() 1434 * it and returned to userspace only while holding both driver's __vb2_wait_for_done_vb() 1582 * vb2_dqbuf() - Dequeue a buffer to the userspace 1584 * @pb: buffer structure passed from userspace to vidioc_dqbuf handler 1595 * returning the buffer to userspace, such as cache sync, 1597 * the userspace. 1625 /* Fill buffer information for the userspace */ vb2_core_dqbuf() 1651 * userspace from videobuf's queue. Returns to state after reqbufs. 1688 * ...and done list; userspace will not receive any buffers it __vb2_queue_cancel() 1789 * and videobuf, effectively returning control over them to userspace. vb2_core_streamoff() 1925 * userspace. To map whole video memory allocated on reqbufs, this function 1928 * When the userspace application calls mmap, it passes to it an offset returned 1974 * Find the plane corresponding to the offset passed by userspace. vb2_mmap() 2024 * Find the plane corresponding to the offset passed by userspace. vb2_get_unmapped_area()
|
/linux-4.4.14/fs/nilfs2/ |
H A D | ioctl.c | 43 * @argv: vector of arguments from userspace 51 * is copied into userspace. On error, one of the following 54 * %-EINVAL - Invalid arguments from userspace. 207 * @argp: pointer on argument from userspace 261 * @argp: pointer on argument from userspace 339 * @argp: pointer on argument from userspace 346 * copied into userspace pointer @argp. On error, one of the following 406 * @argp: pointer on argument from userspace 413 * copied into userspace pointer @argp. On error, one of the following 513 * @argp: pointer on argument from userspace 520 * copied into userspace pointer @argp. On error, one of the following 523 * %-EINVAL - Invalid arguments from userspace. 622 * @argv: vector of arguments from userspace 700 * @argv: vector of arguments from userspace 736 * @argv: vector of arguments from userspace 765 * @argv: vector of arguments from userspace 866 * @argp: pointer on argument from userspace 870 * from userspace. The NILFS_IOCTL_CLEAN_SEGMENTS ioctl is used by 991 * @argp: pointer on argument from userspace 1043 * @argp: pointer on argument from userspace 1075 * @argp: pointer on argument from userspace 1078 * checks the arguments from userspace and calls nilfs_sufile_trim_fs, which 1117 * @argp: pointer on argument from userspace 1162 * @argp: pointer on argument from userspace 1170 * is copied into userspace. On error, one of the following 1173 * %-EINVAL - Invalid arguments from userspace. 1211 * @argp: pointer on argument from userspace
|
/linux-4.4.14/arch/x86/entry/vsyscall/ |
H A D | vsyscall_64.c | 16 * callable by userspace at fixed addresses. 17 * - The whole concept is impossible for 32-bit compat userspace. 20 * As of mid-2014, I believe that there is no new userspace code that 22 * soon be no new userspace code that will ever use a vsyscall. 250 /* Bad news -- userspace fed a bad pointer to a vsyscall. */ emulate_vsyscall()
|
/linux-4.4.14/arch/arm/kernel/ |
H A D | vdso.c | 283 * userspace that an update is in progress. Update the fields used 286 * counter again, making it even, indicating to userspace that the 290 * fields from the data page. If seq_count is odd, userspace is 292 * the page, userspace must sample seq_count again; if it has changed 293 * from its previous value, userspace must retry the whole sequence.
|
H A D | crash_dump.c | 30 * @buf. If @buf is in userspace, set @userbuf to %1. Returns number of bytes
|
H A D | isa.c | 12 * iopl, inb, outb and friends in userspace via glibc emulation.
|
/linux-4.4.14/drivers/regulator/ |
H A D | userspace-consumer.c | 2 * userspace-consumer.c 24 #include <linux/regulator/userspace-consumer.h> 178 .name = "reg-userspace-consumer",
|
/linux-4.4.14/net/dns_resolver/ |
H A D | dns_query.c | 2 * /sbin/request-key to contact userspace when handling DNS queries. 14 * This function requires the appropriate userspace tool dns.upcall to be 64 * The DNS resolution lookup is performed by upcalling to userspace by way of
|
/linux-4.4.14/kernel/power/ |
H A D | process.c | 144 * Now that the whole userspace is frozen we need to disbale freeze_processes() 161 * (if any) before thawing the userspace tasks. So, it is the responsibility 162 * of the caller to thaw the userspace tasks, when the time is right.
|
/linux-4.4.14/arch/mips/alchemy/devboards/ |
H A D | pm.c | 2 * Alchemy Development Board example suspend userspace interface. 16 * Generic suspend userspace interface for Alchemy development boards. 18 * can be used by userspace to en/disable all au1x-provided wakeup
|
/linux-4.4.14/arch/arm/xen/ |
H A D | hypercall.S | 102 * Privcmd calls are issued by the userspace. We need to allow the 103 * kernel to access the userspace memory before issuing the hypercall. 112 * Disable userspace access from kernel. This is fine to do it
|
/linux-4.4.14/drivers/infiniband/hw/mlx4/ |
H A D | user.h | 40 * Increment this value if any changes that break userspace ABI 50 * avoid incompatibility between 32-bit userspace and 64-bit kernels).
|
/linux-4.4.14/drivers/infiniband/hw/mlx5/ |
H A D | user.h | 48 /* Increment this value if any changes that break userspace ABI 55 * avoid incompatibility between 32-bit userspace and 64-bit kernels).
|
/linux-4.4.14/drivers/infiniband/hw/mthca/ |
H A D | mthca_user.h | 40 * Increment this value if any changes that break userspace ABI 48 * avoid incompatibility between 32-bit userspace and 64-bit kernels).
|
/linux-4.4.14/drivers/devfreq/ |
H A D | governor_userspace.c | 91 .name = "userspace", 140 .name = "userspace",
|
/linux-4.4.14/arch/tile/kernel/vdso/ |
H A D | Makefile | 19 # vDSO code runs in userspace and -pg doesn't help with profiling anyway. 28 # vDSO code runs in userspace, not collecting feedback data.
|
/linux-4.4.14/arch/arc/include/asm/ |
H A D | cacheflush.h | 64 /* To clear out stale userspace mappings */ 72 * To make sure that userspace mapping is flushed to memory before
|
/linux-4.4.14/fs/jffs2/ |
H A D | background.c | 105 * that userspace processes (like gdm and X) are starved jffs2_garbage_collect_thread() 107 * doesn't help, either (presumably because userspace and GCD jffs2_garbage_collect_thread()
|
/linux-4.4.14/samples/hidraw/ |
H A D | hid-example.c | 19 * yet populate new version of hidraw.h to userspace. 22 #warning Please have your distro update the userspace kernel headers
|
/linux-4.4.14/arch/sh/kernel/ |
H A D | traps.c | 65 * - userspace errors just cause EFAULT to be returned, resulting in SEGV 66 * - kernel/userspace interfaces cause a jump to an appropriate handler
|
/linux-4.4.14/arch/openrisc/include/asm/ |
H A D | ptrace.h | 26 * Make kernel PTrace/register structures opaque to userspace... userspace can
|
/linux-4.4.14/drivers/staging/nvec/ |
H A D | nvec_paz00.c | 70 /* to expose the default value to userspace */ nvec_paz00_probe()
|
/linux-4.4.14/drivers/sh/intc/ |
H A D | userimask.c | 2 * Support for hardware-assisted userspace interrupt masking.
|
/linux-4.4.14/drivers/gpu/drm/rockchip/ |
H A D | rockchip_drm_gem.h | 39 /* mmap a gem object to userspace. */
|
/linux-4.4.14/drivers/platform/chrome/ |
H A D | cros_ec_dev.h | 2 * cros_ec_dev - expose the Chrome OS Embedded Controller to userspace
|
/linux-4.4.14/arch/um/include/shared/ |
H A D | as-layout.h | 13 * this is used in userspace code, which has no access to the kernel
|
H A D | user.h | 14 * copying too much infrastructure for my taste, so userspace files
|
/linux-4.4.14/arch/x86/um/shared/sysdep/ |
H A D | ptrace_64.h | 30 * are already defined for kernel code, but not for userspace code.
|
/linux-4.4.14/security/apparmor/ |
H A D | crypto.c | 14 * compared to userspace policy compiles to check loaded policy is what
|
/linux-4.4.14/fs/ocfs2/cluster/ |
H A D | ocfs2_nodemanager.h | 6 * Header describing the interface between userspace and the kernel
|
/linux-4.4.14/fs/xfs/libxfs/ |
H A D | xfs_alloc_btree.h | 39 * (note that some of these may appear unused, but they are used in userspace)
|
H A D | xfs_ialloc_btree.h | 39 * (note that some of these may appear unused, but they are used in userspace)
|
/linux-4.4.14/include/net/ |
H A D | af_ieee802154.h | 2 * IEEE 802.15.4 interface for userspace
|
/linux-4.4.14/include/uapi/linux/nfsd/ |
H A D | cld.h | 44 /* message struct for communication with userspace */
|
/linux-4.4.14/arch/powerpc/include/uapi/asm/ |
H A D | opal-prd.h | 29 * layout and content is private to the firmware <--> userspace interface, so
|
/linux-4.4.14/arch/mips/kernel/ |
H A D | perf_event.c | 24 * Leave userspace callchain empty for now. When we find a way to trace
|
/linux-4.4.14/arch/parisc/include/uapi/asm/ |
H A D | stat.h | 39 /* This is the struct that 32-bit userspace applications are expecting.
|
/linux-4.4.14/arch/hexagon/include/uapi/asm/ |
H A D | user.h | 5 * Layout for registers passed in elf core dumps to userspace.
|
/linux-4.4.14/arch/ia64/oprofile/ |
H A D | perfmon.c | 74 /* all the ops are handled via userspace for IA64 perfmon */
|
/linux-4.4.14/arch/m32r/lib/ |
H A D | csum_partial_copy.c | 41 * Copy from userspace and compute checksum. If we catch an exception
|
/linux-4.4.14/arch/blackfin/kernel/ |
H A D | sys_bfin.c | 54 /* Needed for legacy userspace atomic emulation */
|
/linux-4.4.14/tools/include/linux/ |
H A D | err.h | 20 * The same principle works for userspace, because 'error' pointers
|
/linux-4.4.14/drivers/watchdog/ |
H A D | via_wdt.c | 86 * and there is still time left before userspace should send the 88 * then the external/userspace heartbeat). 89 * 2) the watchdog timer has been stopped by userspace. 103 /* calculate when the next userspace timeout will be */ wdt_ping()
|
/linux-4.4.14/tools/testing/selftests/powerpc/mm/ |
H A D | hugetlb_vs_thp_test.c | 51 * userspace, so the harness can kill us if we get stuck. That way we test_body()
|
/linux-4.4.14/drivers/staging/vme/devices/ |
H A D | vme_user.c | 313 pr_warn("Partial copy from userspace\n"); vme_user_ioctl() 328 * to userspace as they are vme_user_ioctl() 339 pr_warn("Partial copy to userspace\n"); vme_user_ioctl() 354 pr_warn("Partial copy from userspace\n"); vme_user_ioctl() 359 * to userspace as they are vme_user_ioctl() 374 * to userspace as they are vme_user_ioctl() 384 pr_warn("Partial copy to userspace\n"); vme_user_ioctl() 394 pr_warn("Partial copy from userspace\n"); vme_user_ioctl() 399 * to userspace as they are vme_user_ioctl()
|
/linux-4.4.14/arch/um/os-Linux/skas/ |
H A D | process.c | 315 void userspace(struct uml_pt_regs *regs) userspace() function 348 printk(UM_KERN_ERR "userspace - ptrace continue " userspace() 355 printk(UM_KERN_ERR "userspace - wait failed, " userspace() 362 printk(UM_KERN_ERR "userspace - PTRACE_GETREGS failed, " userspace() 368 printk(UM_KERN_ERR "userspace - get_fp_registers failed, " userspace() 408 printk(UM_KERN_ERR "userspace - child stopped " userspace()
|
/linux-4.4.14/drivers/s390/char/ |
H A D | vmcp.c | 132 * let userspace to change the response size, if userspace expects a bigger
|
/linux-4.4.14/drivers/ssb/ |
H A D | sprom.c | 80 * be holding the lock for several seconds. So allow userspace ssb_attr_sprom_show() 123 * be holding the lock for several seconds. So allow userspace ssb_attr_sprom_store()
|
/linux-4.4.14/drivers/char/ |
H A D | uv_mmtimer.c | 79 * %MMTIMER_MMAPAVAIL - Returns 1 if registers can be mmap'd into userspace 140 * uv_mmtimer_mmap - maps the clock's registers into userspace
|
/linux-4.4.14/lib/xz/ |
H A D | xz_dec_test.c | 43 * place for the data coming from the userspace. 95 * Decode the data given to us from the userspace. CRC32 of the uncompressed
|