/linux-4.4.14/arch/arm/mach-omap2/ |
D | omap_hwmod_33xx_43xx_interconnect_data.c | 26 .user = OCP_USER_MPU, 34 .user = OCP_USER_MPU | OCP_USER_SDMA, 42 .user = OCP_USER_MPU | OCP_USER_SDMA, 50 .user = OCP_USER_MPU | OCP_USER_SDMA, 58 .user = OCP_USER_MPU | OCP_USER_SDMA, 66 .user = OCP_USER_MPU | OCP_USER_SDMA, 74 .user = OCP_USER_MPU | OCP_USER_SDMA, 82 .user = OCP_USER_MPU | OCP_USER_SDMA, 90 .user = OCP_USER_MPU | OCP_USER_SDMA, 98 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_2xxx_interconnect_data.c | 31 .user = OCP_USER_MPU | OCP_USER_SDMA, 38 .user = OCP_USER_MPU, 51 .user = OCP_USER_MPU | OCP_USER_SDMA, 58 .user = OCP_USER_MPU | OCP_USER_SDMA, 66 .user = OCP_USER_MPU | OCP_USER_SDMA, 74 .user = OCP_USER_MPU | OCP_USER_SDMA, 82 .user = OCP_USER_MPU | OCP_USER_SDMA, 90 .user = OCP_USER_MPU | OCP_USER_SDMA, 98 .user = OCP_USER_MPU | OCP_USER_SDMA, 106 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_43xx_data.c | 604 .user = OCP_USER_MPU | OCP_USER_SDMA, 611 .user = OCP_USER_MPU | OCP_USER_SDMA, 618 .user = OCP_USER_MPU | OCP_USER_SDMA, 625 .user = OCP_USER_MPU | OCP_USER_SDMA, 632 .user = OCP_USER_MPU, 639 .user = OCP_USER_MPU, 646 .user = OCP_USER_MPU, 653 .user = OCP_USER_MPU, 660 .user = OCP_USER_MPU, 667 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_44xx_data.c | 2115 .user = OCP_USER_MPU | OCP_USER_SDMA, 2162 .user = OCP_USER_MPU | OCP_USER_SDMA, 3151 .user = OCP_USER_SDMA, 3159 .user = OCP_USER_MPU, 3167 .user = OCP_USER_MPU | OCP_USER_SDMA, 3175 .user = OCP_USER_MPU | OCP_USER_SDMA, 3183 .user = OCP_USER_MPU | OCP_USER_SDMA, 3191 .user = OCP_USER_MPU | OCP_USER_SDMA, 3199 .user = OCP_USER_MPU | OCP_USER_SDMA, 3207 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_7xx_data.c | 2390 .user = OCP_USER_SDMA, 2398 .user = OCP_USER_MPU | OCP_USER_SDMA, 2406 .user = OCP_USER_MPU | OCP_USER_SDMA, 2414 .user = OCP_USER_MPU, 2422 .user = OCP_USER_MPU, 2430 .user = OCP_USER_MPU | OCP_USER_SDMA, 2438 .user = OCP_USER_MPU | OCP_USER_SDMA, 2446 .user = OCP_USER_MPU | OCP_USER_SDMA, 2454 .user = OCP_USER_MPU | OCP_USER_SDMA, 2462 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_2420_data.c | 286 .user = OCP_USER_MPU | OCP_USER_SDMA, 294 .user = OCP_USER_MPU | OCP_USER_SDMA, 302 .user = OCP_USER_MPU | OCP_USER_SDMA, 310 .user = OCP_USER_MPU | OCP_USER_SDMA, 318 .user = OCP_USER_MPU | OCP_USER_SDMA, 326 .user = OCP_USER_MPU | OCP_USER_SDMA, 334 .user = OCP_USER_MPU | OCP_USER_SDMA, 342 .user = OCP_USER_MPU | OCP_USER_SDMA, 350 .user = OCP_USER_MPU | OCP_USER_SDMA, 358 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_2430_data.c | 447 .user = OCP_USER_MPU, 455 .user = OCP_USER_MPU | OCP_USER_SDMA, 463 .user = OCP_USER_MPU | OCP_USER_SDMA, 471 .user = OCP_USER_MPU, 479 .user = OCP_USER_MPU | OCP_USER_SDMA, 487 .user = OCP_USER_MPU | OCP_USER_SDMA, 495 .user = OCP_USER_MPU | OCP_USER_SDMA, 503 .user = OCP_USER_MPU | OCP_USER_SDMA, 511 .user = OCP_USER_MPU | OCP_USER_SDMA, 519 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_54xx_data.c | 2040 .user = OCP_USER_MPU | OCP_USER_SDMA, 2097 .user = OCP_USER_MPU | OCP_USER_SDMA, 2109 .user = OCP_USER_SDMA, 2117 .user = OCP_USER_MPU | OCP_USER_SDMA, 2125 .user = OCP_USER_MPU | OCP_USER_SDMA, 2133 .user = OCP_USER_MPU | OCP_USER_SDMA, 2141 .user = OCP_USER_MPU | OCP_USER_SDMA, 2149 .user = OCP_USER_MPU, 2157 .user = OCP_USER_MPU, 2165 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | omap_hwmod_81xx_data.c | 166 .user = OCP_USER_MPU, 173 .user = OCP_USER_MPU, 194 .user = OCP_USER_MPU, 201 .user = OCP_USER_MPU, 221 .user = OCP_USER_MPU, 228 .user = OCP_USER_MPU, 267 .user = OCP_USER_MPU, 288 .user = OCP_USER_MPU, 309 .user = OCP_USER_MPU, 346 .user = OCP_USER_MPU, [all …]
|
D | omap_hwmod_33xx_data.c | 337 .user = OCP_USER_MPU | OCP_USER_SDMA, 345 .user = OCP_USER_MPU | OCP_USER_SDMA, 353 .user = OCP_USER_MPU | OCP_USER_SDMA, 361 .user = OCP_USER_MPU | OCP_USER_SDMA, 369 .user = OCP_USER_MPU | OCP_USER_SDMA, 387 .user = OCP_USER_MPU, 395 .user = OCP_USER_MPU, 403 .user = OCP_USER_MPU, 411 .user = OCP_USER_MPU, 419 .user = OCP_USER_MPU, [all …]
|
D | omap_hwmod_3xxx_data.c | 2165 .user = OCP_USER_MPU | OCP_USER_SDMA, 2172 .user = OCP_USER_MPU | OCP_USER_SDMA, 2189 .user = OCP_USER_MPU, 2206 .user = OCP_USER_MPU, 2213 .user = OCP_USER_MPU | OCP_USER_SDMA, 2225 .user = OCP_USER_MPU | OCP_USER_SDMA, 2233 .user = OCP_USER_MPU, 2241 .user = OCP_USER_MPU, 2249 .user = OCP_USER_MPU, 2256 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
D | pm-debug.c | 77 static int clkdm_dbg_show_counter(struct clockdomain *clkdm, void *user) in clkdm_dbg_show_counter() argument 79 struct seq_file *s = (struct seq_file *)user; in clkdm_dbg_show_counter() 92 static int pwrdm_dbg_show_counter(struct powerdomain *pwrdm, void *user) in pwrdm_dbg_show_counter() argument 94 struct seq_file *s = (struct seq_file *)user; in pwrdm_dbg_show_counter() 122 static int pwrdm_dbg_show_timer(struct powerdomain *pwrdm, void *user) in pwrdm_dbg_show_timer() argument 124 struct seq_file *s = (struct seq_file *)user; in pwrdm_dbg_show_timer()
|
D | powerdomain.h | 209 int pwrdm_for_each(int (*fn)(struct powerdomain *pwrdm, void *user), 210 void *user); 211 int pwrdm_for_each_nolock(int (*fn)(struct powerdomain *pwrdm, void *user), 212 void *user);
|
/linux-4.4.14/fs/ncpfs/ |
D | ioctl.c | 162 struct ncp_nls_ioctl user; in ncp_set_charsets() local 170 if (copy_from_user(&user, arg, sizeof(user))) in ncp_set_charsets() 174 user.codepage[NCP_IOCSNAME_LEN] = 0; in ncp_set_charsets() 175 if (!user.codepage[0] || !strcmp(user.codepage, "default")) in ncp_set_charsets() 178 codepage = load_nls(user.codepage); in ncp_set_charsets() 185 user.iocharset[NCP_IOCSNAME_LEN] = 0; in ncp_set_charsets() 186 if (!user.iocharset[0] || !strcmp(user.iocharset, "default")) { in ncp_set_charsets() 189 } else if (!strcmp(user.iocharset, "utf8")) { in ncp_set_charsets() 193 iocharset = load_nls(user.iocharset); in ncp_set_charsets() 227 struct ncp_nls_ioctl user; in ncp_get_charsets() local [all …]
|
/linux-4.4.14/include/linux/ |
D | ipmi.h | 63 ipmi_user_t user; member 105 ipmi_user_t *user); 113 int ipmi_destroy_user(ipmi_user_t user); 116 void ipmi_get_version(ipmi_user_t user, 126 int ipmi_set_my_address(ipmi_user_t user, 129 int ipmi_get_my_address(ipmi_user_t user, 132 int ipmi_set_my_LUN(ipmi_user_t user, 135 int ipmi_get_my_LUN(ipmi_user_t user, 152 int ipmi_request_settime(ipmi_user_t user, 170 int ipmi_request_supply_msgs(ipmi_user_t user, [all …]
|
D | dcookies.h | 34 void dcookie_unregister(struct dcookie_user * user); 56 static inline void dcookie_unregister(struct dcookie_user * user) in dcookie_unregister() argument
|
D | kernel_stat.h | 87 static inline void account_process_tick(struct task_struct *tsk, int user) in account_process_tick() argument 92 extern void account_process_tick(struct task_struct *, int user);
|
/linux-4.4.14/arch/m68k/ifpsp060/ |
D | os.S | 57 | Each IO routine checks to see if the memory write/read is to/from user 60 | for user mode applications. 71 | working in user space 80 | a1 - user destination address 82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 110 | a0 - user source address 113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 140 | Read a data byte from user memory. 143 | a0 - user source address 144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode [all …]
|
/linux-4.4.14/net/bridge/netfilter/ |
D | ebt_mark_m.c | 47 const struct compat_ebt_mark_m_info *user = src; in mark_mt_compat_from_user() local 50 kern->mark = user->mark; in mark_mt_compat_from_user() 51 kern->mask = user->mask; in mark_mt_compat_from_user() 52 kern->invert = user->invert; in mark_mt_compat_from_user() 53 kern->bitmask = user->bitmask; in mark_mt_compat_from_user() 58 struct compat_ebt_mark_m_info __user *user = dst; in mark_mt_compat_to_user() local 61 if (put_user(kern->mark, &user->mark) || in mark_mt_compat_to_user() 62 put_user(kern->mask, &user->mask) || in mark_mt_compat_to_user() 63 put_user(kern->invert, &user->invert) || in mark_mt_compat_to_user() 64 put_user(kern->bitmask, &user->bitmask)) in mark_mt_compat_to_user()
|
D | ebt_mark.c | 63 const struct compat_ebt_mark_t_info *user = src; in mark_tg_compat_from_user() local 66 kern->mark = user->mark; in mark_tg_compat_from_user() 67 kern->target = user->target; in mark_tg_compat_from_user() 72 struct compat_ebt_mark_t_info __user *user = dst; in mark_tg_compat_to_user() local 75 if (put_user(kern->mark, &user->mark) || in mark_tg_compat_to_user() 76 put_user(kern->target, &user->target)) in mark_tg_compat_to_user()
|
D | ebt_limit.c | 58 user2credits(u_int32_t user) in user2credits() argument 61 if (user > 0xFFFFFFFF / (HZ*CREDITS_PER_JIFFY)) in user2credits() 63 return (user / EBT_LIMIT_SCALE) * HZ * CREDITS_PER_JIFFY; in user2credits() 65 return (user * HZ * CREDITS_PER_JIFFY) / EBT_LIMIT_SCALE; in user2credits()
|
D | ebtables.c | 1097 static int do_replace(struct net *net, const void __user *user, in do_replace() argument 1104 if (copy_from_user(&tmp, user, sizeof(tmp)) != 0) in do_replace() 1283 const void __user *user, unsigned int len) in do_update_counters() argument 1329 static int update_counters(struct net *net, const void __user *user, in update_counters() argument 1334 if (copy_from_user(&hlp, user, sizeof(hlp))) in update_counters() 1341 hlp.num_counters, user, len); in update_counters() 1398 void __user *user, unsigned int num_counters, in copy_counters_to_user() argument 1421 if (copy_to_user(user, counterstmp, in copy_counters_to_user() 1429 static int copy_everything_to_user(struct ebt_table *t, void __user *user, in copy_everything_to_user() argument 1450 if (copy_from_user(&tmp, user, sizeof(tmp))) in copy_everything_to_user() [all …]
|
/linux-4.4.14/security/keys/ |
D | key.c | 56 struct key_user *candidate = NULL, *user; in key_user_lookup() local 67 user = rb_entry(parent, struct key_user, node); in key_user_lookup() 69 if (uid_lt(uid, user->uid)) in key_user_lookup() 71 else if (uid_gt(uid, user->uid)) in key_user_lookup() 83 user = NULL; in key_user_lookup() 108 user = candidate; in key_user_lookup() 113 atomic_inc(&user->usage); in key_user_lookup() 117 return user; in key_user_lookup() 123 void key_user_put(struct key_user *user) in key_user_put() argument 125 if (atomic_dec_and_lock(&user->usage, &key_user_lock)) { in key_user_put() [all …]
|
D | proc.c | 92 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next() 129 if (kuid_has_mapping(user_ns, minkey->user->uid)) in find_ge_key() 275 struct key_user *user = rb_entry(n, struct key_user, node); in __key_user_next() local 276 if (kuid_has_mapping(user_ns, user->uid)) in __key_user_next() 335 struct key_user *user = rb_entry(_p, struct key_user, node); in proc_key_users_show() local 336 unsigned maxkeys = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show() 338 unsigned maxbytes = uid_eq(user->uid, GLOBAL_ROOT_UID) ? in proc_key_users_show() 342 from_kuid_munged(seq_user_ns(m), user->uid), in proc_key_users_show() 343 atomic_read(&user->usage), in proc_key_users_show() 344 atomic_read(&user->nkeys), in proc_key_users_show() [all …]
|
D | process_keys.c | 45 struct user_struct *user; in install_user_keyrings() local 55 user = cred->user; in install_user_keyrings() 56 uid = from_kuid(cred->user_ns, user->uid); in install_user_keyrings() 58 kenter("%p{%u}", user, uid); in install_user_keyrings() 60 if (user->uid_keyring && user->session_keyring) { in install_user_keyrings() 68 if (!user->uid_keyring) { in install_user_keyrings() 77 uid_keyring = keyring_alloc(buf, user->uid, INVALID_GID, in install_user_keyrings() 93 keyring_alloc(buf, user->uid, INVALID_GID, in install_user_keyrings() 109 user->uid_keyring = uid_keyring; in install_user_keyrings() 110 user->session_keyring = session_keyring; in install_user_keyrings() [all …]
|
D | request_key.c | 150 session = cred->user->session_keyring; in call_sbin_request_key() 305 key_get(cred->user->session_keyring); in construct_get_dest_keyring() 309 dest_keyring = key_get(cred->user->uid_keyring); in construct_get_dest_keyring() 333 struct key_user *user, in construct_alloc_key() argument 346 mutex_lock(&user->cons_lock); in construct_alloc_key() 385 mutex_unlock(&user->cons_lock); in construct_alloc_key() 404 mutex_unlock(&user->cons_lock); in construct_alloc_key() 410 mutex_unlock(&user->cons_lock); in construct_alloc_key() 416 mutex_unlock(&user->cons_lock); in construct_alloc_key() 422 mutex_unlock(&user->cons_lock); in construct_alloc_key() [all …]
|
D | gc.c | 147 spin_lock(&key->user->lock); in key_gc_unused_keys() 148 key->user->qnkeys--; in key_gc_unused_keys() 149 key->user->qnbytes -= key->quotalen; in key_gc_unused_keys() 150 spin_unlock(&key->user->lock); in key_gc_unused_keys() 153 atomic_dec(&key->user->nkeys); in key_gc_unused_keys() 155 atomic_dec(&key->user->nikeys); in key_gc_unused_keys() 157 key_user_put(key->user); in key_gc_unused_keys()
|
D | keyctl.c | 787 long keyctl_chown_key(key_serial_t id, uid_t user, gid_t group) in keyctl_chown_key() argument 796 uid = make_kuid(current_user_ns(), user); in keyctl_chown_key() 799 if ((user != (uid_t) -1) && !uid_valid(uid)) in keyctl_chown_key() 805 if (user == (uid_t) -1 && group == (gid_t) -1) in keyctl_chown_key() 823 if (user != (uid_t) -1 && !uid_eq(key->uid, uid)) in keyctl_chown_key() 833 if (user != (uid_t) -1 && !uid_eq(uid, key->uid)) { in keyctl_chown_key() 857 spin_lock(&key->user->lock); in keyctl_chown_key() 858 key->user->qnkeys--; in keyctl_chown_key() 859 key->user->qnbytes -= key->quotalen; in keyctl_chown_key() 860 spin_unlock(&key->user->lock); in keyctl_chown_key() [all …]
|
/linux-4.4.14/drivers/char/ipmi/ |
D | ipmi_poweroff.c | 64 static void (*specific_poweroff_func)(ipmi_user_t user); 141 static int ipmi_request_wait_for_response(ipmi_user_t user, in ipmi_request_wait_for_response() argument 150 rv = ipmi_request_supply_msgs(user, addr, 0, send_msg, &comp, in ipmi_request_wait_for_response() 161 static int ipmi_request_in_rc_mode(ipmi_user_t user, in ipmi_request_in_rc_mode() argument 168 rv = ipmi_request_supply_msgs(user, addr, 0, send_msg, NULL, in ipmi_request_in_rc_mode() 179 ipmi_poll_interface(user); in ipmi_request_in_rc_mode() 201 static void (*atca_oem_poweroff_hook)(ipmi_user_t user); 203 static void pps_poweroff_atca(ipmi_user_t user) in pps_poweroff_atca() argument 221 rv = ipmi_request_in_rc_mode(user, in pps_poweroff_atca() 231 static int ipmi_atca_detect(ipmi_user_t user) in ipmi_atca_detect() argument [all …]
|
D | ipmi_msghandler.c | 118 ipmi_user_t user; member 735 if (!msg->user) { in deliver_response() 754 ipmi_user_t user = msg->user; in deliver_response() local 755 user->handler->ipmi_recv_hndl(msg, user->handler_data); in deliver_response() 922 ipmi_user_t *user) in ipmi_create_user() argument 1008 *user = new_user; in ipmi_create_user() 1049 ipmi_user_t user = container_of(ref, struct ipmi_user, refcount); in free_user() local 1050 kfree(user); in free_user() 1053 int ipmi_destroy_user(ipmi_user_t user) in ipmi_destroy_user() argument 1055 ipmi_smi_t intf = user->intf; in ipmi_destroy_user() [all …]
|
D | ipmi_devintf.c | 49 ipmi_user_t user; member 133 &(priv->user)); in ipmi_open() 162 rv = ipmi_destroy_user(priv->user); in ipmi_release() 175 static int handle_send_req(ipmi_user_t user, in handle_send_req() argument 221 rv = ipmi_request_settime(user, in handle_send_req() 253 rv = handle_send_req(priv->user, in ipmi_ioctl() 269 rv = handle_send_req(priv->user, in ipmi_ioctl() 386 rv = ipmi_register_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl() 400 rv = ipmi_unregister_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl() 414 rv = ipmi_register_for_cmd(priv->user, val.netfn, val.cmd, in ipmi_ioctl() [all …]
|
/linux-4.4.14/arch/frv/kernel/ |
D | ptrace.c | 45 const struct user_int_regs *iregs = &target->thread.user->i; in genregs_get() 65 struct user_int_regs *iregs = &target->thread.user->i; in genregs_set() 110 const struct user_fpmedia_regs *fpregs = &target->thread.user->f; in fpmregs_get() 130 struct user_fpmedia_regs *fpregs = &target->thread.user->f; in fpmregs_set() 205 struct user_context *user = task->thread.user; in get_reg() local 210 return ((unsigned long *) user)[regno]; in get_reg() 219 struct user_context *user = task->thread.user; in put_reg() local 231 ((unsigned long *) user)[regno] = data; in put_reg() 323 0, sizeof(child->thread.user->i), in arch_ptrace() 329 0, sizeof(child->thread.user->i), in arch_ptrace() [all …]
|
D | entry-table.S | 25 # (3) The trap table for user mode 35 # The user and kernel trap tables use the same prologue for normal 40 # (6) The fixup table for user-trap single-step 47 # The linker script places the user mode and kernel mode trap tables on to 59 # trap table for entry from user mode 60 .section .trap.user,"ax" 77 # trap fixup table for single-stepping in user mode 78 .section .trap.fixup.user,"a" 83 # trap fixup table for single-stepping in user mode 91 .section .trap.user [all …]
|
D | signal.c | 61 struct user_context *user = current->thread.user; in restore_sigcontext() local 67 tbr = user->i.tbr; in restore_sigcontext() 68 psr = user->i.psr; in restore_sigcontext() 69 if (copy_from_user(user, &sc->sc_context, sizeof(sc->sc_context))) in restore_sigcontext() 71 user->i.tbr = tbr; in restore_sigcontext() 72 user->i.psr = psr; in restore_sigcontext() 74 restore_user_regs(user); in restore_sigcontext() 76 user->i.syscallno = -1; /* disable syscall checks */ in restore_sigcontext() 78 *_gr8 = user->i.gr[8]; in restore_sigcontext() 142 save_user_regs(current->thread.user); in setup_sigcontext() [all …]
|
D | process.c | 151 save_user_regs(p->thread.user); in copy_thread() 164 save_user_regs(p->thread.user); in copy_thread() 278 ¤t->thread.user->f, in dump_fpu() 279 sizeof(current->thread.user->f)); in dump_fpu()
|
D | vmlinux.lds.S | 49 *(.trap.user) 86 *(.trap.fixup.user .trap.fixup.kernel)
|
/linux-4.4.14/arch/arm/kernel/ |
D | sys_oabi-compat.c | 200 struct oabi_flock64 user; in do_locks() local 204 if (copy_from_user(&user, (struct oabi_flock64 __user *)arg, in do_locks() 205 sizeof(user))) in do_locks() 207 kernel.l_type = user.l_type; in do_locks() 208 kernel.l_whence = user.l_whence; in do_locks() 209 kernel.l_start = user.l_start; in do_locks() 210 kernel.l_len = user.l_len; in do_locks() 211 kernel.l_pid = user.l_pid; in do_locks() 219 user.l_type = kernel.l_type; in do_locks() 220 user.l_whence = kernel.l_whence; in do_locks() [all …]
|
/linux-4.4.14/block/ |
D | ioprio.c | 66 struct user_struct *user; in SYSCALL_DEFINE3() local 118 user = current_user(); in SYSCALL_DEFINE3() 120 user = find_user(uid); in SYSCALL_DEFINE3() 122 if (!user) in SYSCALL_DEFINE3() 135 free_uid(user); in SYSCALL_DEFINE3() 182 struct user_struct *user; in SYSCALL_DEFINE2() local 216 user = current_user(); in SYSCALL_DEFINE2() 218 user = find_user(uid); in SYSCALL_DEFINE2() 220 if (!user) in SYSCALL_DEFINE2() 224 if (!uid_eq(task_uid(p), user->uid) || in SYSCALL_DEFINE2() [all …]
|
/linux-4.4.14/Documentation/powerpc/ |
D | cxlflash.txt | 20 CXL provides a mechanism by which user space applications can 23 user space application direct access to Flash storage. 29 special path for user space access, and performing error recovery. It 40 user space with a special block library. This mode further 55 directly in each user I/O, but at the minimum is involved in the 56 initial setup before the user application is allowed to send requests 86 access to the Flash from user space (without requiring a system call). 89 block library to enable this user space access. The driver supports 111 Applications intending to get access to the CXL Flash from user 115 The block library can be thought of as a 'user' of services, [all …]
|
D | dscr.txt | 4 DSCR register in powerpc allows user to have some control of prefetch of data 9 user interface. 53 The DSCR register can be accessed in the user space using any of these 59 Accessing DSCR through privileged SPR number (0x11) from user space 63 Accessing DSCR through user level SPR (0x03) from user space will first 80 (3) ptrace interface (Explicitly set user DSCR value)
|
/linux-4.4.14/arch/x86/include/asm/ |
D | pm-trace.h | 6 #define TRACE_RESUME(user) \ argument 17 generate_pm_trace(tracedata, user); \ 21 #define TRACE_SUSPEND(user) TRACE_RESUME(user) argument
|
/linux-4.4.14/kernel/bpf/ |
D | syscall.c | 51 struct user_struct *user = get_current_user(); in bpf_map_charge_memlock() local 56 atomic_long_add(map->pages, &user->locked_vm); in bpf_map_charge_memlock() 58 if (atomic_long_read(&user->locked_vm) > memlock_limit) { in bpf_map_charge_memlock() 59 atomic_long_sub(map->pages, &user->locked_vm); in bpf_map_charge_memlock() 60 free_uid(user); in bpf_map_charge_memlock() 63 map->user = user; in bpf_map_charge_memlock() 69 struct user_struct *user = map->user; in bpf_map_uncharge_memlock() local 71 atomic_long_sub(map->pages, &user->locked_vm); in bpf_map_uncharge_memlock() 72 free_uid(user); in bpf_map_uncharge_memlock() 514 struct user_struct *user = get_current_user(); in bpf_prog_charge_memlock() local [all …]
|
/linux-4.4.14/include/uapi/mtd/ |
D | Kbuild | 2 header-y += inftl-user.h 4 header-y += mtd-user.h 5 header-y += nftl-user.h 6 header-y += ubi-user.h
|
/linux-4.4.14/fs/ |
D | dcookies.c | 312 struct dcookie_user * user; in dcookie_register() local 316 user = kmalloc(sizeof(struct dcookie_user), GFP_KERNEL); in dcookie_register() 317 if (!user) in dcookie_register() 323 list_add(&user->next, &dcookie_users); in dcookie_register() 327 return user; in dcookie_register() 329 kfree(user); in dcookie_register() 330 user = NULL; in dcookie_register() 335 void dcookie_unregister(struct dcookie_user * user) in dcookie_unregister() argument 339 list_del(&user->next); in dcookie_unregister() 340 kfree(user); in dcookie_unregister()
|
D | pipe.c | 595 atomic_long_add(new - old, &pipe->user->pipe_bufs); in account_pipe_buffers() 598 static bool too_many_pipe_buffers_soft(struct user_struct *user) in too_many_pipe_buffers_soft() argument 601 atomic_long_read(&user->pipe_bufs) >= pipe_user_pages_soft; in too_many_pipe_buffers_soft() 604 static bool too_many_pipe_buffers_hard(struct user_struct *user) in too_many_pipe_buffers_hard() argument 607 atomic_long_read(&user->pipe_bufs) >= pipe_user_pages_hard; in too_many_pipe_buffers_hard() 617 struct user_struct *user = get_current_user(); in alloc_pipe_info() local 619 if (!too_many_pipe_buffers_hard(user)) { in alloc_pipe_info() 620 if (too_many_pipe_buffers_soft(user)) in alloc_pipe_info() 629 pipe->user = user; in alloc_pipe_info() 634 free_uid(user); in alloc_pipe_info() [all …]
|
D | open.c | 567 static int chown_common(struct path *path, uid_t user, gid_t group) in chown_common() argument 576 uid = make_kuid(current_user_ns(), user); in chown_common() 581 if (user != (uid_t) -1) { in chown_common() 609 SYSCALL_DEFINE5(fchownat, int, dfd, const char __user *, filename, uid_t, user, in SYSCALL_DEFINE5() argument 629 error = chown_common(&path, user, group); in SYSCALL_DEFINE5() 641 SYSCALL_DEFINE3(chown, const char __user *, filename, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument 643 return sys_fchownat(AT_FDCWD, filename, user, group, 0); in SYSCALL_DEFINE3() 646 SYSCALL_DEFINE3(lchown, const char __user *, filename, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument 648 return sys_fchownat(AT_FDCWD, filename, user, group, in SYSCALL_DEFINE3() 652 SYSCALL_DEFINE3(fchown, unsigned int, fd, uid_t, user, gid_t, group) in SYSCALL_DEFINE3() argument [all …]
|
/linux-4.4.14/Documentation/namespaces/ |
D | compatibility-list.txt | 3 This document contains the information about the problems user 28 2. Intentionally, two equal user IDs in different user namespaces 30 words, user 10 in one user namespace shouldn't have the same 31 access permissions to files, belonging to user 10 in another 35 from different user namespaces should not access the same IPC objects
|
D | resource-control.txt | 3 of processes is allowed to switch user ids. With user namespaces 8 kernels that enable user namespaces, and it is further recommended 10 memory user's they don't trust to play nice can use.
|
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/dma/ |
D | usergf100.c | 78 u32 kind, user, unkn; in gf100_dmaobj_new() local 98 user = args->v0.priv; in gf100_dmaobj_new() 104 user = GF100_DMA_V0_PRIV_US; in gf100_dmaobj_new() 108 user = GF100_DMA_V0_PRIV_VM; in gf100_dmaobj_new() 114 if (user > 2) in gf100_dmaobj_new() 116 dmaobj->flags0 |= (kind << 22) | (user << 20) | oclass->base.oclass; in gf100_dmaobj_new()
|
D | usernv50.c | 78 u32 user, part, comp, kind; in nv50_dmaobj_new() local 98 user = args->v0.priv; in nv50_dmaobj_new() 105 user = NV50_DMA_V0_PRIV_US; in nv50_dmaobj_new() 110 user = NV50_DMA_V0_PRIV_VM; in nv50_dmaobj_new() 118 if (user > 2 || part > 2 || comp > 3 || kind > 0x7f) in nv50_dmaobj_new() 120 dmaobj->flags0 = (comp << 29) | (kind << 22) | (user << 20) | in nv50_dmaobj_new()
|
/linux-4.4.14/drivers/base/power/ |
D | trace.c | 79 static int set_magic_time(unsigned int user, unsigned int file, unsigned int device) in set_magic_time() argument 81 unsigned int n = user + USERHASH*(file + FILEHASH*device); in set_magic_time() 157 void generate_pm_trace(const void *tracedata, unsigned int user) in generate_pm_trace() argument 163 user_hash_value = user % USERHASH; in generate_pm_trace() 251 unsigned int user, file, dev; in late_resume_init() local 253 user = val % USERHASH; in late_resume_init() 259 pr_info(" Magic number: %d:%d:%d\n", user, file, dev); in late_resume_init()
|
/linux-4.4.14/arch/um/drivers/ |
D | net_kern.c | 157 lp->fd = (*lp->open)(&lp->user); in uml_net_open() 171 lp->tl.data = (unsigned long) &lp->user; in uml_net_open() 186 if (lp->close != NULL) (*lp->close)(lp->fd, &lp->user); in uml_net_open() 200 (*lp->close)(lp->fd, &lp->user); in uml_net_close() 364 (*lp->remove)(&lp->user); in net_device_release() 459 .max_packet = transport->user->max_packet, in eth_configure() 461 .open = transport->user->open, in eth_configure() 462 .close = transport->user->close, in eth_configure() 463 .remove = transport->user->remove, in eth_configure() 466 .add_address = transport->user->add_address, in eth_configure() [all …]
|
D | slip_kern.c | 23 spri = (struct slip_data *) private->user; in slip_init() 50 (struct slip_data *) &lp->user); in slip_read() 56 (struct slip_data *) &lp->user); in slip_write() 81 .user = &slip_user_info,
|
D | slirp_kern.c | 26 spri = (struct slirp_data *) private->user; in slirp_init() 55 (struct slirp_data *) &lp->user); in slirp_read() 61 (struct slirp_data *) &lp->user); in slirp_write() 108 .user = &slirp_user_info,
|
D | vde_kern.c | 23 vpri = (struct vde_data *) pri->user; in vde_init() 41 struct vde_data *pri = (struct vde_data *) &lp->user; in vde_read() 53 struct vde_data *pri = (struct vde_data *) &lp->user; in vde_write() 117 .user = &vde_user_info,
|
D | daemon_kern.c | 26 dpri = (struct daemon_data *) pri->user; in daemon_init() 51 (struct daemon_data *) &lp->user); in daemon_write() 83 .user = &daemon_user_info,
|
D | umcast_kern.c | 34 dpri = (struct umcast_data *) pri->user; in umcast_init() 60 (struct umcast_data *) &lp->user); in umcast_write() 165 .user = &umcast_user_info, 175 .user = &umcast_user_info,
|
D | pcap_kern.c | 25 ppri = (struct pcap_data *) pri->user; in pcap_init() 38 (struct pcap_data *) &lp->user); in pcap_read() 101 .user = &pcap_user_info,
|
/linux-4.4.14/Documentation/arm64/ |
D | memory.txt | 12 (256TB) virtual addresses, respectively, for both user and kernel. With 19 mappings while the user pgd contains only user (non-global) mappings. 28 0000000000000000 0000007fffffffff 512GB user 36 0000000000000000 0000ffffffffffff 256TB user 44 0000000000000000 000003ffffffffff 4TB user 52 0000000000000000 0000ffffffffffff 256TB user
|
D | tagged-pointers.txt | 16 (1) The kernel requires that all user addresses passed to EL1 18 parameters containing user virtual addresses *must* have 23 of tags cannot rely on the tag information for user virtual
|
/linux-4.4.14/Documentation/cgroups/ |
D | cpuacct.txt | 34 CPU time obtained by the cgroup into user and system times. Currently 37 user: Time spent by tasks of the cgroup in user mode. 40 user and system are in USER_HZ unit. 42 cpuacct controller uses percpu_counter interface to collect user and 45 - It is theoretically possible to see wrong values for user and system times. 48 - It is possible to see slightly outdated values for user and system times
|
/linux-4.4.14/arch/x86/kernel/ |
D | vm86_32.c | 97 struct vm86plus_struct __user *user; in save_v86_state() local 113 user = vm86->user_vm86; in save_v86_state() 115 if (!access_ok(VERIFY_WRITE, user, vm86->vm86plus.is_vm86pus ? in save_v86_state() 123 put_user_ex(regs->pt.bx, &user->regs.ebx); in save_v86_state() 124 put_user_ex(regs->pt.cx, &user->regs.ecx); in save_v86_state() 125 put_user_ex(regs->pt.dx, &user->regs.edx); in save_v86_state() 126 put_user_ex(regs->pt.si, &user->regs.esi); in save_v86_state() 127 put_user_ex(regs->pt.di, &user->regs.edi); in save_v86_state() 128 put_user_ex(regs->pt.bp, &user->regs.ebp); in save_v86_state() 129 put_user_ex(regs->pt.ax, &user->regs.eax); in save_v86_state() [all …]
|
D | ptrace.c | 825 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) in arch_ptrace() 831 else if (addr >= offsetof(struct user, u_debugreg[0]) && in arch_ptrace() 832 addr <= offsetof(struct user, u_debugreg[7])) { in arch_ptrace() 833 addr -= offsetof(struct user, u_debugreg[0]); in arch_ptrace() 842 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) in arch_ptrace() 847 else if (addr >= offsetof(struct user, u_debugreg[0]) && in arch_ptrace() 848 addr <= offsetof(struct user, u_debugreg[7])) { in arch_ptrace() 849 addr -= offsetof(struct user, u_debugreg[0]); in arch_ptrace() 1208 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user) || in x32_arch_ptrace() 1215 else if (addr >= offsetof(struct user, u_debugreg[0]) && in x32_arch_ptrace() [all …]
|
/linux-4.4.14/Documentation/security/ |
D | keys-ecryptfs.txt | 7 either in kernel space or in user space with a daemon called 'ecryptfsd'. In 9 using a key, the FEFEK, derived from a user prompted passphrase; in the latter 16 kernel key of the 'user' type, inserted in the user's session specific keyring 44 key-type:= 'trusted' | 'user' 51 'ecryptfs' and save it using a previously loaded user key "test": 53 $ keyctl add encrypted 1000100010001000 "new ecryptfs user:test 64" @u 57 ecryptfs user:test 64 490045d4bfe48c99f0d465fbbbb79e7500da954178e2de0697
|
D | keys-trusted-encrypted.txt | 5 and in both cases all keys are created in the kernel, and user space sees, 8 Keys can be used on any system. All user level blobs, are displayed and loaded 50 'master' key can either be a trusted-key or user-key type. The main 52 they are only as secure as the user key encrypting them. The master user key 67 key-type:= 'trusted' | 'user' 127 compromised by a user level problem, and when sealed to specific boot PCR
|
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/fifo/ |
D | chan.c | 268 if (unlikely(!chan->user)) { in nvkm_fifo_chan_rd32() 269 chan->user = ioremap(chan->addr, chan->size); in nvkm_fifo_chan_rd32() 270 if (!chan->user) in nvkm_fifo_chan_rd32() 275 *data = ioread32_native(chan->user + addr); in nvkm_fifo_chan_rd32() 283 if (unlikely(!chan->user)) { in nvkm_fifo_chan_wr32() 284 chan->user = ioremap(chan->addr, chan->size); in nvkm_fifo_chan_wr32() 285 if (!chan->user) in nvkm_fifo_chan_wr32() 290 iowrite32_native(data, chan->user + addr); in nvkm_fifo_chan_wr32() 325 if (chan->user) in nvkm_fifo_chan_dtor() 326 iounmap(chan->user); in nvkm_fifo_chan_dtor() [all …]
|
D | gpfifogf100.c | 229 1, fifo->user.bar.offset, 0x1000, in gf100_fifo_gpfifo_new() 258 nvkm_kmap(fifo->user.mem); in gf100_fifo_gpfifo_new() 260 nvkm_wo32(fifo->user.mem, usermem + i, 0x00000000); in gf100_fifo_gpfifo_new() 261 nvkm_done(fifo->user.mem); in gf100_fifo_gpfifo_new() 262 usermem = nvkm_memory_addr(fifo->user.mem) + usermem; in gf100_fifo_gpfifo_new()
|
D | gpfifogk104.c | 262 1, fifo->user.bar.offset, 0x200, in gk104_fifo_gpfifo_new() 290 nvkm_kmap(fifo->user.mem); in gk104_fifo_gpfifo_new() 292 nvkm_wo32(fifo->user.mem, usermem + i, 0x00000000); in gk104_fifo_gpfifo_new() 293 nvkm_done(fifo->user.mem); in gk104_fifo_gpfifo_new() 294 usermem = nvkm_memory_addr(fifo->user.mem) + usermem; in gk104_fifo_gpfifo_new()
|
D | gf100.c | 547 0x1000, false, &fifo->user.mem); in gf100_fifo_oneinit() 551 ret = nvkm_bar_umap(device->bar, 128 * 0x1000, 12, &fifo->user.bar); in gf100_fifo_oneinit() 555 nvkm_memory_map(fifo->user.mem, &fifo->user.bar, 0); in gf100_fifo_oneinit() 598 nvkm_wr32(device, 0x002254, 0x10000000 | fifo->user.bar.offset >> 12); in gf100_fifo_init() 609 nvkm_vm_put(&fifo->user.bar); in gf100_fifo_dtor() 610 nvkm_memory_del(&fifo->user.mem); in gf100_fifo_dtor()
|
/linux-4.4.14/Documentation/ |
D | gdb-kernel-debugging.txt | 66 scanning for modules in /home/user/linux/build 67 loading @0xffffffffa0020000: /home/user/linux/build/net/netfilter/xt_tcpudp.ko 68 loading @0xffffffffa0016000: /home/user/linux/build/net/netfilter/xt_pkttype.ko 69 loading @0xffffffffa0002000: /home/user/linux/build/net/netfilter/xt_limit.ko 70 loading @0xffffffffa00ca000: /home/user/linux/build/net/packet/af_packet.ko 71 loading @0xffffffffa003c000: /home/user/linux/build/fs/fuse/fuse.ko 73 loading @0xffffffffa0000000: /home/user/linux/build/drivers/ata/ata_generic.ko 86 loading @0xffffffffa0034000: /home/user/linux/build/lib/libcrc32c.ko 87 loading @0xffffffffa0050000: /home/user/linux/build/lib/lzo/lzo_compress.ko 88 loading @0xffffffffa006e000: /home/user/linux/build/lib/zlib_deflate/zlib_deflate.ko [all …]
|
D | cachetlb.txt | 18 if it can be proven that a user address space has never executed 42 This interface flushes an entire user address space from 55 Here we are flushing a specific range of (user) virtual 84 user virtual address 'addr' will be visible to the cpu. That 148 This interface flushes an entire user address space from 157 This interface flushes an entire user address space from 170 Here we are flushing a specific range of (user) virtual 242 size). This setting will force the SYSv IPC layer to only allow user 251 mapped into some user address space, there is always at least one more 253 PAGE_OFFSET. So immediately, once the first user maps a given [all …]
|
D | dell_rbu.txt | 30 The user should not unload the rbu driver after downloading the BIOS image 55 In the packet update mechanism, the user needs to create a new file having 57 The user creates packets header, gets the chunk of the BIOS image and 60 packet, the user needs to create more such packets out of the entire BIOS 69 In monolithic update the user simply get the BIOS image (.hdr file) and copies 84 If a user by accident executes steps 1 and 3 above without executing step 2; 96 Also after updating the BIOS image a user mode application needs to execute
|
D | dma-buf-sharing.txt | 12 either the 'exporter' of buffers, or the 'user' of buffers. 15 exporter, and A as buffer-user. 25 The buffer-user 40 3. Each buffer-user 'connects' itself to the buffer 41 4. When needed, buffer-user requests access to the buffer from exporter 42 5. When finished with its use, the buffer-user notifies end-of-DMA to exporter 43 6. when buffer-user is done using this buffer completely, it 'disconnects' 85 3. Each buffer-user 'connects' itself to the buffer 87 Each buffer-user now gets a reference to the buffer, using the fd passed to 96 After this, the buffer-user needs to attach its device with the buffer, which [all …]
|
D | vgaarbiter.txt | 47 open : open user instance of the arbiter. By default, it's attached to 50 close : close user instance. Release locks made by the user 72 unlock all : release all locks on target held by this user (not 86 The driver keeps track of which user has which locks on which card. It 88 a bit, but makes the arbiter more tolerant to user space problems and able 91 user space for a given user (file descriptor instance) of the arbiter. 182 implementation of the user space side [3]. Now (2009) Tiago Vignatti and Dave
|
D | pi-futex.txt | 6 - in the user-space fastpath a PI-enabled futex involves no kernel work 22 The short reply: user-space PI helps achieving/improving determinism for 23 user-space applications. In the best-case, it can help achieve 54 implementation to user-space. 57 inheritance only apply to kernel-space locks. But user-space locks are 60 does not apply (user-space spinlocks have the same priority inversion 61 problems as other user-space locking constructs). Fact is, pretty much
|
D | rpmsg.txt | 34 expose appropriate user space interfaces, if needed. 84 channel belongs, using the channel's src address, and the user-provided 98 addresses provided by the user. 103 ignored (and the user-provided addresses will be used instead). 127 to a destination address provided by the user. 128 The user should specify the channel, the data it wants to send, 131 channel belongs, using the channel's src address, and the user-provided 142 destination addresses provided by the user. 143 The user should specify the channel, the data it wants to send, 147 ignored (and the user-provided addresses will be used instead). [all …]
|
D | coccinelle.txt | 37 as a regular user, and install it with 204 /home/user/linux/crypto/ctr.c:188:9-16: ERR_CAST can be used with alg 205 /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth 206 /home/user/linux/crypto/xts.c:227:9-16: ERR_CAST can be used with alg 277 diff -u -p /home/user/linux/crypto/ctr.c /tmp/nothing 278 --- /home/user/linux/crypto/ctr.c 2010-05-26 10:49:38.000000000 +0200 322 * TODO [[view:/home/user/linux/crypto/ctr.c::face=ovl-face1::linb=188::colb=9::cole=16][ERR_CAST ca… 323 * TODO [[view:/home/user/linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAS… 324 * TODO [[view:/home/user/linux/crypto/xts.c::face=ovl-face1::linb=227::colb=9::cole=16][ERR_CAST ca…
|
/linux-4.4.14/tools/perf/ |
D | perf-with-kcore.sh | 121 …find "$USER_HOME/.debug" -xdev -type d ! -user "$SUDO_USER" -ls -exec chown "$SUDO_USE… 122 …find "$USER_HOME/.debug" -xdev -type f -links 1 ! -user "$SUDO_USER" -ls -exec chown "$SUDO_USE… 123 …find "$USER_HOME/.debug" -xdev -type l ! -user "$SUDO_USER" -ls -exec chown -h "$SUDO_USE… 140 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type d ! -user "$USER" -print -quit) 141 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type f -links 1 ! -user "$USER" -print -quit) 142 PERMISSIONS_OK+=$(find "$HOME/.debug" -xdev -type l ! -user "$USER" -print -quit)
|
/linux-4.4.14/Documentation/acpi/ |
D | video_extension.txt | 13 1 Export a sysfs interface for user space to control backlight level 61 as a "brightness level" indicator. Thus from the user space perspective 65 2 Notify user space about hotkey event 68 i) For some laptops, when user presses the hotkey, a scancode will be 69 generated and sent to user space through the input device created by 71 following key code will appear to user space: 84 notify value it received and send the event to user space through the 94 Once user space tool receives this event, it can modify the backlight 101 not affect the sending of event to user space, they are always sent to user
|
/linux-4.4.14/kernel/printk/ |
D | printk.c | 668 struct devkmsg_user *user = file->private_data; in devkmsg_read() local 673 if (!user) in devkmsg_read() 676 ret = mutex_lock_interruptible(&user->lock); in devkmsg_read() 680 while (user->seq == log_next_seq) { in devkmsg_read() 689 user->seq != log_next_seq); in devkmsg_read() 695 if (user->seq < log_first_seq) { in devkmsg_read() 697 user->idx = log_first_idx; in devkmsg_read() 698 user->seq = log_first_seq; in devkmsg_read() 704 msg = log_from_idx(user->idx); in devkmsg_read() 705 len = msg_print_ext_header(user->buf, sizeof(user->buf), in devkmsg_read() [all …]
|
/linux-4.4.14/net/ipv4/netfilter/ |
D | ip_tables.c | 492 (strcmp(t->target.u.user.name, in mark_source_chains() 497 if ((strcmp(t->target.u.user.name, in mark_source_chains() 542 if (strcmp(t->target.u.user.name, in mark_source_chains() 614 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match() 615 m->u.user.revision); in find_check_match() 617 duprintf("find_check_match: `%s' not found\n", m->u.user.name); in find_check_match() 685 target = xt_request_find_target(NFPROTO_IPV4, t->u.user.name, in find_check_entry() 686 t->u.user.revision); in find_check_entry() 688 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry() 721 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() [all …]
|
D | arp_tables.c | 419 (strcmp(t->target.u.user.name, in mark_source_chains() 424 if ((strcmp(t->target.u.user.name, in mark_source_chains() 461 if (strcmp(t->target.u.user.name, in mark_source_chains() 531 target = xt_request_find_target(NFPROTO_ARP, t->u.user.name, in find_check_entry() 532 t->u.user.revision); in find_check_entry() 534 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry() 560 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() 670 if (strcmp(arpt_get_target(iter)->u.user.name, in translate_table() 814 u.user.name), in copy_entries_to_user() 899 static int get_info(struct net *net, void __user *user, in get_info() argument [all …]
|
D | nf_defrag_ipv4.c | 26 u_int32_t user) in nf_ct_ipv4_gather_frags() argument 31 err = ip_defrag(net, skb, user); in nf_ct_ipv4_gather_frags() 83 enum ip_defrag_users user = in ipv4_conntrack_defrag() local 86 if (nf_ct_ipv4_gather_frags(state->net, skb, user)) in ipv4_conntrack_defrag()
|
/linux-4.4.14/net/ipv6/netfilter/ |
D | ip6_tables.c | 504 (strcmp(t->target.u.user.name, in mark_source_chains() 509 if ((strcmp(t->target.u.user.name, in mark_source_chains() 554 if (strcmp(t->target.u.user.name, in mark_source_chains() 626 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match() 627 m->u.user.revision); in find_check_match() 629 duprintf("find_check_match: `%s' not found\n", m->u.user.name); in find_check_match() 698 target = xt_request_find_target(NFPROTO_IPV6, t->u.user.name, in find_check_entry() 699 t->u.user.revision); in find_check_entry() 701 duprintf("find_check_entry: `%s' not found\n", t->u.user.name); in find_check_entry() 733 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() [all …]
|
/linux-4.4.14/drivers/gpu/drm/nouveau/ |
D | nouveau_chan.c | 47 struct nouveau_cli *cli = (void *)chan->user.client; in nouveau_channel_idle() 76 nvif_object_fini(&chan->user); in nouveau_channel_del() 237 &args, size, &chan->user); in nouveau_channel_ind() 239 if (chan->user.oclass >= KEPLER_CHANNEL_GPFIFO_A) in nouveau_channel_ind() 242 if (chan->user.oclass >= FERMI_CHANNEL_GPFIFO) in nouveau_channel_ind() 281 &args, sizeof(args), &chan->user); in nouveau_channel_dma() 296 struct nouveau_cli *cli = (void *)chan->user.client; in nouveau_channel_init() 301 nvif_object_map(&chan->user); in nouveau_channel_init() 317 ret = nvif_object_init(&chan->user, vram, NV_DMA_IN_MEMORY, in nouveau_channel_init() 341 ret = nvif_object_init(&chan->user, gart, NV_DMA_IN_MEMORY, in nouveau_channel_init() [all …]
|
D | nouveau_dma.c | 55 val = nvif_rd32(&chan->user, chan->user_get); in READ_GET() 57 val |= (uint64_t)nvif_rd32(&chan->user, chan->user_get_hi) << 32; in READ_GET() 85 struct nouveau_cli *cli = (void *)chan->user.client; in nv50_dma_push() 106 nvif_wr32(&chan->user, 0x8c, chan->dma.ib_put); in nv50_dma_push() 116 uint32_t get = nvif_rd32(&chan->user, 0x88); in nv50_dma_push_wait()
|
D | nv04_fbcon.c | 174 ret = nvif_object_init(&chan->user, 0x0062, in nv04_fbcon_accel_init() 180 ret = nvif_object_init(&chan->user, 0x0019, 0x0019, NULL, 0, in nv04_fbcon_accel_init() 185 ret = nvif_object_init(&chan->user, 0x0043, 0x0043, NULL, 0, in nv04_fbcon_accel_init() 190 ret = nvif_object_init(&chan->user, 0x0044, 0x0044, NULL, 0, in nv04_fbcon_accel_init() 195 ret = nvif_object_init(&chan->user, 0x004a, 0x004a, NULL, 0, in nv04_fbcon_accel_init() 200 ret = nvif_object_init(&chan->user, 0x005f, in nv04_fbcon_accel_init()
|
/linux-4.4.14/arch/sh/kernel/ |
D | ptrace_32.c | 383 addr > sizeof(struct user) - 3) in arch_ptrace() 388 else if (addr >= offsetof(struct user, fpu) && in arch_ptrace() 389 addr < offsetof(struct user, u_fpvalid)) { in arch_ptrace() 391 if (addr == offsetof(struct user, fpu.fpscr)) in arch_ptrace() 400 index = addr - offsetof(struct user, fpu); in arch_ptrace() 404 } else if (addr == offsetof(struct user, u_fpvalid)) in arch_ptrace() 423 addr > sizeof(struct user) - 3) in arch_ptrace() 428 else if (addr >= offsetof(struct user, fpu) && in arch_ptrace() 429 addr < offsetof(struct user, u_fpvalid)) { in arch_ptrace() 434 index = addr - offsetof(struct user, fpu); in arch_ptrace() [all …]
|
D | ptrace_64.c | 403 else if ((addr >= offsetof(struct user, fpu)) && in arch_ptrace() 404 (addr < offsetof(struct user, u_fpvalid))) { in arch_ptrace() 409 index = addr - offsetof(struct user, fpu); in arch_ptrace() 411 } else if (addr == offsetof(struct user, u_fpvalid)) { in arch_ptrace() 445 else if ((addr >= offsetof(struct user, fpu)) && in arch_ptrace() 446 (addr < offsetof(struct user, u_fpvalid))) { in arch_ptrace() 451 index = addr - offsetof(struct user, fpu); in arch_ptrace()
|
/linux-4.4.14/tools/perf/Documentation/ |
D | Makefile | 177 pdf: $(OUTPUT)user-manual.pdf 219 $(INSTALL) -m 644 $(OUTPUT)user-manual.pdf $(DESTDIR)$(pdfdir) 284 $(OUTPUT)user-manual.html: $(OUTPUT)user-manual.xml 287 $(OUTPUT)perf.info: $(OUTPUT)user-manual.texi 288 $(QUIET_MAKEINFO)$(MAKEINFO) --no-split -o $@ $(OUTPUT)user-manual.texi 290 $(OUTPUT)user-manual.texi: $(OUTPUT)user-manual.xml 292 $(DOCBOOK2X_TEXI) $(OUTPUT)user-manual.xml --encoding=UTF-8 --to-stdout >$@++ && \ 297 $(OUTPUT)user-manual.pdf: $(OUTPUT)user-manual.xml
|
/linux-4.4.14/security/selinux/ss/ |
D | context.h | 27 u32 user; member 121 dst->user = src->user; in context_cpy() 143 c->user = c->role = c->type = 0; in context_destroy() 156 return ((c1->user == c2->user) && in context_cmp()
|
D | mls.c | 207 if (!c->user || c->user > p->p_users.nprim) in mls_context_isvalid() 209 usrdatum = p->user_val_to_struct[c->user - 1]; in mls_context_isvalid() 419 int mls_setup_user_range(struct context *fromcon, struct user_datum *user, in mls_setup_user_range() argument 425 struct mls_level *user_low = &(user->range.level[0]); in mls_setup_user_range() 426 struct mls_level *user_clr = &(user->range.level[1]); in mls_setup_user_range() 427 struct mls_level *user_def = &(user->dfltlevel); in mls_setup_user_range()
|
D | services.c | 306 val1 = scontext->user; in constraint_expr_eval() 307 val2 = tcontext->user; in constraint_expr_eval() 414 val1 = c->user; in constraint_expr_eval() 1204 *scontext_len += strlen(sym_name(&policydb, SYM_USERS, context->user - 1)) + 1; in context_struct_to_string() 1222 sym_name(&policydb, SYM_USERS, context->user - 1), in context_struct_to_string() 1349 ctx->user = usrdatum->value; in string_to_context_struct() 1633 newcontext.user = tcontext->user; in security_compute_sid() 1637 newcontext.user = scontext->user; in security_compute_sid() 1642 newcontext.user = tcontext->user; in security_compute_sid() 1908 sym_name(args->oldp, SYM_USERS, c->user - 1)); in convert_context() [all …]
|
/linux-4.4.14/Documentation/ia64/ |
D | fsys.txt | 18 switched over to kernel memory. The user-level state is saved 21 - user mode: 23 user memory. The user-level state is contained in the 28 interruption-handlers start execution in. The user-level 36 - CPU registers may contain a mixture of user-level and kernel-level 39 user-level) 46 in fsys-mode (they point to the user-level stacks, which may 49 In summary, fsys-mode is much more similar to running in user-mode 69 to by "regs" was executing in user mode (privilege level 3). 71 executing on the user-level stack(s). Finally, fsys_mode() returns [all …]
|
D | mca.txt | 40 * If an MCA/INIT event occurs while the kernel was running (not user 146 What happens when MCA/INIT is delivered what a cpu is running user 149 The user mode registers are stored in the RSE area of the MCA/INIT on 150 entry to the OS and are restored from there on return to SAL, so user 152 OS has no idea what unwind data is available for the user space stack, 153 MCA/INIT never tries to backtrace user space. Which means that the OS 154 does not bother making the user space process look like a blocked task, 155 i.e. the OS does not copy pt_regs and switch_stack to the user space 156 stack. Also the OS has no idea how big the user space RSE and memory 157 stacks are, which makes it too risky to copy the saved state to a user
|
/linux-4.4.14/Documentation/devicetree/bindings/sound/ |
D | widgets.txt | 7 "template-wname", "user-supplied-wname" 12 The "user-supplied-wname" being the user specified widget name.
|
/linux-4.4.14/kernel/ |
D | user.c | 114 struct user_struct *user; in uid_hash_find() local 116 hlist_for_each_entry(user, hashent, uidhash_node) { in uid_hash_find() 117 if (uid_eq(user->uid, uid)) { in uid_hash_find() 118 atomic_inc(&user->__count); in uid_hash_find() 119 return user; in uid_hash_find()
|
D | uid16.c | 19 SYSCALL_DEFINE3(chown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument 21 return sys_chown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 24 SYSCALL_DEFINE3(lchown16, const char __user *, filename, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument 26 return sys_lchown(filename, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3() 29 SYSCALL_DEFINE3(fchown16, unsigned int, fd, old_uid_t, user, old_gid_t, group) in SYSCALL_DEFINE3() argument 31 return sys_fchown(fd, low2highuid(user), low2highgid(group)); in SYSCALL_DEFINE3()
|
D | cred.c | 62 .user = INIT_USER, 123 free_uid(cred->user); in put_cred_rcu() 263 get_uid(new->user); in prepare_creds() 339 atomic_inc(&p->cred->user->processes); in copy_creds() 372 atomic_inc(&new->user->processes); in copy_creds() 464 if (new->user != old->user) in commit_creds() 465 atomic_inc(&new->user->processes); in commit_creds() 468 if (new->user != old->user) in commit_creds() 469 atomic_dec(&old->user->processes); in commit_creds() 615 get_uid(new->user); in prepare_kernel_cred()
|
/linux-4.4.14/arch/x86/um/ |
D | ptrace_64.c | 121 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user() 122 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user() 123 addr -= offsetof(struct user, u_debugreg[0]); in poke_user() 188 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user() 189 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user() 190 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
|
D | ptrace_32.c | 128 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in poke_user() 129 (addr <= offsetof(struct user, u_debugreg[7]))) { in poke_user() 130 addr -= offsetof(struct user, u_debugreg[0]); in poke_user() 185 else if ((addr >= offsetof(struct user, u_debugreg[0])) && in peek_user() 186 (addr <= offsetof(struct user, u_debugreg[7]))) { in peek_user() 187 addr -= offsetof(struct user, u_debugreg[0]); in peek_user()
|
D | Makefile | 38 extra-y += user-offsets.s 39 $(obj)/user-offsets.s: c_flags = -Wp,-MD,$(depfile) $(USER_CFLAGS) \
|
/linux-4.4.14/Documentation/filesystems/ |
D | quota.txt | 9 and the second one hardlimit. An user can never exceed a hardlimit for any 12 period" or "grace time". When grace time is over, user is not able to allocate 23 When user exceeds a softlimit, runs out of grace time or reaches hardlimit, 26 when user is using a graphical desktop he usually cannot see the message. 45 - UID/GID (depends on quota type) of user / group whose limit 48 - UID of a user who caused the event 59 - four warnings are also defined for the event when user stops
|
D | 9p.txt | 64 uname=name user name to attempt mount as on the remote server. The 65 server may override or ignore this value. Certain user 121 user = if a user tries to access a file on v9fs 123 attach command (Tattach) for that user. 125 <uid> = allows only user with uid=<uid> to access 128 operations as one user 148 There are user and developer mailing lists available through the v9fs project
|
D | affs.txt | 33 The muFS (multi user File System) equivalents of the above file systems 42 system to uid or the uid of the current user, respectively. 94 - R maps to r for user, group and others. On directories, R implies x. 105 options. Since most of the Amiga file systems are single user systems 107 Amiga filesystem will be owned by the user who actually mounts the 114 - r permission will set R for user, group and others. 116 - w permission will set W and D for user, group and others. 118 - x permission of the user will set E for plain files. 123 Newly created files and directories will get the user and group ID 124 of the current user and a mode according to the umask. [all …]
|
D | fuse.txt | 14 Non-privileged mount (or user mount): 16 A userspace filesystem mounted by a non-privileged (non-root) user. 18 user. NOTE: this is not the same as mounts allowed with the "user" 31 The user who does the mounting. 35 The user who is performing filesystem operations. 85 The numeric user id of the mount owner. 103 to the user mounting the filesystem. This option is by default only 232 other users' and the super user's processes 235 other users' or the super user's processes 253 B) If another user is accessing files or directories in the [all …]
|
/linux-4.4.14/arch/tile/include/hv/ |
D | iorpc.h | 365 user; /**< Buffer as described by user apps. */ member 401 user; /**< Interrupt as described by user applications. */ member 425 user; /**< pollfd_setup as described by user applications. */ member 449 user; /**< pollfd as described by user applications. */ member
|
/linux-4.4.14/Documentation/device-mapper/ |
D | kcopyd.txt | 15 To start a copy job, the user must set up io_region structures to describe 27 To start the copy, the user calls kcopyd_copy(), passing in the client 38 When the copy completes, kcopyd will call the user's completion routine, 39 passing back the user's context pointer. It will also indicate if a read or 42 When a user is done with all their copy jobs, they should call
|
/linux-4.4.14/arch/arm/include/asm/ |
D | tls.h | 13 mrc p15, 0, \tmp2, c13, c0, 2 @ get the user r/w register 15 mcr p15, 0, \tpuser, c13, c0, 2 @ and the user r/w register 25 mrcne p15, 0, \tmp2, c13, c0, 2 @ get the user r/w register 27 mcrne p15, 0, \tpuser, c13, c0, 2 @ set user r/w register
|
/linux-4.4.14/fs/proc/ |
D | stat.c | 84 u64 user, nice, system, idle, iowait, irq, softirq, steal; in show_stat() local 91 user = nice = system = idle = iowait = in show_stat() 98 user += kcpustat_cpu(i).cpustat[CPUTIME_USER]; in show_stat() 121 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(user)); in show_stat() 135 user = kcpustat_cpu(i).cpustat[CPUTIME_USER]; in show_stat() 146 seq_put_decimal_ull(p, ' ', cputime64_to_clock_t(user)); in show_stat()
|
/linux-4.4.14/Documentation/arm/ |
D | mem_alignment | 15 Now for user space applications, it is possible to configure the alignment 23 real bad - it changes the behaviour of all unaligned instructions in user 32 0 A user process performing an unaligned memory access 37 1 The kernel will attempt to fix up the user process 42 2 The kernel will send a SIGBUS signal to the user process 55 operation for user space code.
|
D | Porting | 67 The maximum size of a user process in bytes. Since user space 68 always starts at zero, this is the maximum address that a user 69 process can access+1. The user space stack grows down from this 72 Any virtual address below TASK_SIZE is deemed to be user process 74 basis by the kernel. I'll call this the user segment.
|
/linux-4.4.14/net/ipv4/ |
D | ip_fragment.c | 73 u32 user; member 103 u32 user; member 133 qp->user == arg->user && in ip4_frag_match() 152 qp->user = arg->user; in ip4_frag_init() 183 static bool frag_expire_skip_icmp(u32 user) in frag_expire_skip_icmp() argument 185 return user == IP_DEFRAG_AF_PACKET || in frag_expire_skip_icmp() 186 ip_defrag_user_in_between(user, IP_DEFRAG_CONNTRACK_IN, in frag_expire_skip_icmp() 188 ip_defrag_user_in_between(user, IP_DEFRAG_CONNTRACK_BRIDGE_IN, in frag_expire_skip_icmp() 236 if (frag_expire_skip_icmp(qp->user) && in ip_expire() 254 u32 user, int vif) in ip_find() argument [all …]
|
/linux-4.4.14/Documentation/vm/ |
D | active_mm.txt | 20 user-level page tables at all, so when we do a context switch into an 25 doesn't need any user mappings - all kernel threads basically fall into 27 some amount of time they are not going to be interested in user space, 37 "stole" for such an anonymous user. For that, we have "tsk->active_mm", 54 Usually there is at least one real user, but it could be that the real 55 user exited on another CPU while a lazy user was still active, so you do 73 we have a user context", and is generally done by the page fault handler
|
/linux-4.4.14/Documentation/trace/ |
D | stm.txt | 20 master 7 channel 15, while arbitrary user applications can use masters 37 $ ls /config/stp-policy/dummy_stm.my-policy/user 39 $ cat /config/stp-policy/dummy_stm.my-policy/user/masters 41 $ cat /config/stp-policy/dummy_stm.my-policy/user/channels 47 with "user" identification string will be allocated a master and 51 under "user" directory from the example above and this new rule will 52 be used for trace sources with the id string of "user/dummy". 64 mmu) will usually contain multiple channels' mmios, so the user will
|
/linux-4.4.14/Documentation/filesystems/nfs/ |
D | idmapper.txt | 5 Id mapper is used by NFS to translate user and group ids into names, and to 6 translate user and group names into ids. Part of this translation involves 39 uid: Find the UID for the given user 41 user: Find the user name for the given UID 56 /usr/sbin/nfs.idmap will handle gid, user, and group lookups. 73 "uid:user@domain".
|
/linux-4.4.14/include/net/irda/ |
D | irias_object.h | 89 int user); 91 int user); 93 int len, int user);
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | sysfs-kernel-uids | 7 to set the cpu bandwidth a user is allowed. This is a 11 example would be, if User A has shares = 1024 and user 13 bandwidth user A will. For more details refer
|
D | sysfs-platform-kim | 10 firmware. The name exposed is read from the user-space 22 command. The entry is read and made use by the user-space 42 transport driver, which will signal the user-space for opening, 44 entry. This entry would be polled upon by the user-space
|
D | sysfs-class-zram | 15 device and return its device id back to user (so one can 24 is a device_id provided by user.
|
/linux-4.4.14/Documentation/video4linux/ |
D | sh_mobile_ceu_camera.txt | 43 Such a configuration can be produced by user requests: 58 (6) to (6') - CEU scale - user window 71 current sensor scales onto input window - this is user S_CROP: 75 3. Calculate new combined scales from "effective" input window to requested user 105 10. Use CEU scaling to scale to the requested user window: 123 1. Request exactly user rectangle from the sensor.
|
/linux-4.4.14/arch/arm/boot/dts/ |
D | ste-nomadik-s8815.dts | 75 user-led { 83 user-button { 146 /* The user LED on the board is set up to be used for heartbeat */ 149 user-led { 162 user-button {
|
D | imx27-phytec-phycore-rdk.dts | 228 label = "system:red1:user"; 233 label = "system:green1:user"; 238 label = "system:blue1:user"; 243 label = "system:red2:user"; 248 label = "system:green2:user"; 253 label = "system:blue2:user";
|
D | at91-kizbox2.dts | 184 user { 196 label = "pwm:blue:user"; 203 label = "pwm:green:user"; 210 label = "pwm:red:user";
|
D | vexpress-v2m-rs1.dtsi | 321 user@1 { 327 user@2 { 333 user@3 { 339 user@4 { 345 user@5 { 351 user@6 { 357 user@7 { 363 user@8 {
|
D | vexpress-v2m.dtsi | 320 user@1 { 326 user@2 { 332 user@3 { 338 user@4 { 344 user@5 { 350 user@6 { 356 user@7 { 362 user@8 {
|
D | at91-kizbox.dts | 91 user { 126 label = "pwm:green:user"; 133 label = "pwm:red:user";
|
D | imx28-sps1.dts | 150 label = "sps1-1:yellow:user"; 157 label = "sps1-2:red:user"; 164 label = "sps1-3:red:user";
|
/linux-4.4.14/Documentation/leds/ |
D | ledtrig-transient.txt | 14 Without one shot timer interface, user space can still use timer trigger to 15 set a timer to hold a state, however when user space application crashes or 22 feature, to prevent user space crashes leaving the phone in vibrate mode 46 class device property. When brightness is set to 0 from user space via 64 Transient trigger can be enabled and disabled from user space on led class 79 - state allows user to specify a transient state to be held for the specified 94 get changed by the trigger unless user does a set via 115 allow user app to set the time once and activate it to run it once for the 147 - Control of vibrate (phones, tablets etc.) hardware by user space app. 148 - Use of LED by user space app as activity indicator. [all …]
|
/linux-4.4.14/Documentation/networking/ |
D | xfrm_sync.txt | 69 message (kernel<->user) as well the cause (config, query or event). 74 when going from kernel to user space) 122 a) XFRM_MSG_GETAE issued by user-->kernel. 130 b) XFRM_MSG_NEWAE is issued by either user space to configure 133 i) user --> kernel to configure a specific SA. 136 A response is issued back to the sender in user space to indicate success 141 ii) kernel->user direction as a response to XFRM_MSG_GETAE 146 iii) kernel->user to report as event if someone sets any values or 148 In such a case XFRM_AE_CU flag is set to inform the user that 152 iv) kernel->user to report event when replay threshold or a timeout [all …]
|
D | generic-hdlc.txt | 10 experimental InARP user-space daemon available on: 83 dce - Frame Relay DCE (network) side LMI instead of default DTE (user). 85 t391 - link integrity verification polling timer (in seconds) - user 87 n391 - full status polling counter - user 88 n392 - error threshold - both user and network 89 n393 - monitored events count - both user and network
|
D | netlink_mmap.txt | 18 user-space memory without copying them as done with regular socket I/O, 20 syscalls have to be issued by user-space to get more message. 22 The TX ring is used to process messages directly from user-space memory, the 29 In order to use memory mapped netlink I/O, user-space needs three main changes: 82 The blocks are only visible to the kernel, from the point of view of user-space 142 - nm_status is used for synchronizing processing between the kernel and user- 157 for user-space. Approriate action is to invoke poll() 160 TX ring: frame belongs to user-space and can be used for 176 TX ring: the frame contains a valid message from user-space to 178 the kernel will release the frame back to user-space by [all …]
|
D | nfc.txt | 87 The user must call START_POLL to poll for NFC targets, passing the desired NFC 89 state until it finds any target. However, the user can stop the polling 94 sent (including the device id). The user must call GET_TARGET to get the list of 113 To establish a connection with one target, the user must create an 116 netlink event. As a target can support more than one NFC protocol, the user
|
D | packet_mmap.txt | 30 configurable circular buffer mapped in user space that can be used to either 34 highest bandwidth. By using a shared buffer between the kernel and the user 50 From the user standpoint, you should use the higher level libpcap library, which 78 user process 107 also the mapping of the circular buffer in the user process and 120 user process 179 By default, the user should put data at : 183 the beginning of the user data will be at : 186 If you wish to put user data at a custom offset from the beginning of 196 To setup PACKET_MMAP from user level code is done with a call like [all …]
|
/linux-4.4.14/arch/m68k/fpsp040/ |
D | x_unimp.S | 7 | Invoked when the user program encounters a floating-point 61 fmovel #0,%FPSR |clear all user bits 62 fmovel #0,%FPCR |clear all user exceptions for FPSP 72 bsrl sto_res |store the result in user space
|
D | fpsp.h | 63 | because it needs to report an exception back to the user. This 83 .set USER_D0,LV+0 | saved user D0 84 .set USER_D1,LV+4 | saved user D1 85 .set USER_A0,LV+8 | saved user A0 86 .set USER_A1,LV+12 | saved user A1 87 .set USER_FP0,LV+16 | saved user FP0 88 .set USER_FP1,LV+28 | saved user FP1 89 .set USER_FP2,LV+40 | saved user FP2 90 .set USER_FP3,LV+52 | saved user FP3 91 .set USER_FPCR,LV+64 | saved user FPCR [all …]
|
D | x_store.S | 100 | dest_dbl --- write double precision value to user space 167 exg %a0,%a1 |a0=supervisor source, a1=user dest 168 bsrl mem_write |move the number to the user's memory 251 exg %a0,%a1 |a0=supervisor source, a1=user dest 252 bsrl mem_write |move the number to the user's memory
|
D | slog2.S | 41 | 2.1 Restore the user FPCR 55 | 2.1 Restore the user FPCR 70 | 2.1 Restore the user FPCR 86 | 2.2 Restore the user FPCR. 92 | 4.1 Restore the user FPCR
|
/linux-4.4.14/net/ax25/ |
D | ax25_uid.c | 75 ax25_uid_assoc *user; in ax25_uid_ioctl() local 100 user = ax25_findbyuid(sax25_kuid); in ax25_uid_ioctl() 101 if (user) { in ax25_uid_ioctl() 102 ax25_uid_put(user); in ax25_uid_ioctl()
|
/linux-4.4.14/fs/notify/fanotify/ |
D | fanotify.c | 242 struct user_struct *user; in fanotify_free_group_priv() local 244 user = group->fanotify_data.user; in fanotify_free_group_priv() 245 atomic_dec(&user->fanotify_listeners); in fanotify_free_group_priv() 246 free_uid(user); in fanotify_free_group_priv()
|
/linux-4.4.14/drivers/staging/lustre/lustre/ |
D | Kconfig | 20 To mount Lustre file systems, you also need to install the user space 21 mount.lustre and other user space commands which can be found in the 26 performance computing. Source code of both kernel space and user space 39 This option defines the maximum size of buffer in bytes that user space
|
/linux-4.4.14/net/netfilter/ |
D | x_tables.c | 534 u_int16_t msize = cm->u.user.match_size; in xt_compat_match_from_user() 535 char name[sizeof(m->u.user.name)]; in xt_compat_match_from_user() 548 m->u.user.match_size = msize; in xt_compat_match_from_user() 551 strncpy(m->u.user.name, name, sizeof(m->u.user.name)); in xt_compat_match_from_user() 564 u_int16_t msize = m->u.user.match_size - off; in xt_compat_match_to_user() 567 put_user(msize, &cm->u.user.match_size) || in xt_compat_match_to_user() 568 copy_to_user(cm->u.user.name, m->u.kernel.match->name, in xt_compat_match_to_user() 613 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) == 0 && in xt_compat_check_entry_offsets() 695 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) == 0 && in xt_check_entry_offsets() 775 void *xt_copy_counters_from_user(const void __user *user, unsigned int len, in xt_copy_counters_from_user() argument [all …]
|
D | xt_limit.c | 92 static u32 user2credits(u32 user) in user2credits() argument 95 if (user > 0xFFFFFFFF / (HZ*CREDITS_PER_JIFFY)) in user2credits() 97 return (user / XT_LIMIT_SCALE) * HZ * CREDITS_PER_JIFFY; in user2credits() 99 return (user * HZ * CREDITS_PER_JIFFY) / XT_LIMIT_SCALE; in user2credits()
|
/linux-4.4.14/Documentation/ptp/ |
D | ptp.txt | 6 presents a standardized method for developing PTP user space 11 drivers and a user space interface. The infrastructure supports a 21 - One short or periodic alarms, with signal delivery to user program 23 - Period output signals configurable from user space 29 class driver handles all of the dealings with user space. The 40 ** PTP hardware clock user space API
|
/linux-4.4.14/drivers/misc/ |
D | atmel-ssc.c | 52 if (ssc->user) { in ssc_request() 57 ssc->user++; in ssc_request() 71 if (ssc->user) in ssc_free() 72 ssc->user--; in ssc_free()
|
/linux-4.4.14/net/core/ |
D | scm.c | 90 fpl->user = NULL; in scm_fp_copy() 112 if (!fpl->user) in scm_fp_copy() 113 fpl->user = get_uid(current_user()); in scm_fp_copy() 127 free_uid(fpl->user); in __scm_destroy() 345 new_fpl->user = get_uid(fpl->user); in scm_fp_dup()
|
/linux-4.4.14/arch/s390/kernel/ |
D | vtime.c | 98 u64 timer, clock, user, system, steal; in do_account_vtime() local 120 user = S390_lowcore.user_timer - ti->user_timer; in do_account_vtime() 121 S390_lowcore.steal_timer -= user; in do_account_vtime() 128 user_scaled = user; in do_account_vtime() 138 account_user_time(tsk, user, user_scaled); in do_account_vtime() 147 return virt_timer_forward(user + system); in do_account_vtime()
|
D | compat_linux.h | 90 long compat_sys_s390_chown16(const char __user *filename, u16 user, u16 group); 91 long compat_sys_s390_lchown16(const char __user *filename, u16 user, u16 group); 92 long compat_sys_s390_fchown16(unsigned int fd, u16 user, u16 group);
|
/linux-4.4.14/Documentation/watchdog/ |
D | hpwdt.txt | 11 by the user. Remember that the two modes are not dependent on one another. 12 A user can have the NMI sourcing without the watchdog timer and vice-versa. 24 soft_margin - allows the user to set the watchdog timer value 25 allow_kdump - allows the user to save off a kernel dump image after an NMI 30 for this module parameter is 0 or LAST. If the user wants to 46 NMIs in a matter of seconds. If a user sees the Linux kernel's "dazed and
|
/linux-4.4.14/arch/arm/mm/ |
D | proc-macros.S | 159 @ user read-only -> kernel read-only 201 tst r3, #L_PTE_USER @ user? 243 tst r3, #L_PTE_USER @ user? 244 orrne r2, r2, #PTE_EXT_AP_URO_SRW @ yes -> user r/o, system r/w 247 orreq r2, r2, #PTE_EXT_AP_UNO_SRW @ yes -> user n/a, system r/w 248 @ combined with user -> user r/w
|
/linux-4.4.14/drivers/scsi/isci/ |
D | init.c | 464 struct sci_user_parameters *user = &ihost->user_parameters; in sci_oem_defaults() local 487 user->phys[i].max_speed_generation = SCIC_SDS_PARM_GEN2_SPEED; in sci_oem_defaults() 490 user->phys[i].align_insertion_frequency = 0x7f; in sci_oem_defaults() 491 user->phys[i].in_connection_align_insertion_frequency = 0xff; in sci_oem_defaults() 492 user->phys[i].notify_enable_spin_up_insertion_frequency = 0x33; in sci_oem_defaults() 503 user->stp_inactivity_timeout = 5; in sci_oem_defaults() 504 user->ssp_inactivity_timeout = 5; in sci_oem_defaults() 505 user->stp_max_occupancy_timeout = 5; in sci_oem_defaults() 506 user->ssp_max_occupancy_timeout = 20; in sci_oem_defaults() 507 user->no_outbound_task_timeout = 2; in sci_oem_defaults()
|
/linux-4.4.14/drivers/staging/rdma/ehca/ |
D | hcp_phyp.c | 66 galpas->user.fw_handle = paddr_user; in hcp_galpas_ctor() 79 galpas->user.fw_handle = galpas->kernel.fw_handle = 0; in hcp_galpas_dtor()
|
/linux-4.4.14/arch/arm64/include/asm/ |
D | page.h | 44 extern void __cpu_clear_user_page(void *p, unsigned long user); 46 unsigned long user);
|
/linux-4.4.14/fs/exofs/ |
D | Kconfig.ore | 4 # for every ORE user we do it like this. Any user should add itself here
|
/linux-4.4.14/include/uapi/linux/netfilter/ |
D | x_tables.h | 18 } user; member 41 } user; member 58 .target.u.user = { \
|
/linux-4.4.14/fs/notify/inotify/ |
D | inotify_fsnotify.c | 168 if (group->inotify_data.user) { in inotify_free_group_priv() 169 atomic_dec(&group->inotify_data.user->inotify_devs); in inotify_free_group_priv() 170 free_uid(group->inotify_data.user); in inotify_free_group_priv()
|
/linux-4.4.14/Documentation/features/debug/user-ret-profiler/ |
D | arch-support.txt | 2 # Feature name: user-ret-profiler 4 # description: arch supports user-space return from system call profiler
|
/linux-4.4.14/arch/um/include/shared/ |
D | net_kern.h | 42 char user[0]; member 56 const struct net_user_info *user; member
|
/linux-4.4.14/arch/arm64/boot/dts/arm/ |
D | vexpress-v2m-rs1.dtsi | 321 user@1 { 327 user@2 { 333 user@3 { 339 user@4 { 345 user@5 { 351 user@6 { 357 user@7 { 363 user@8 {
|
/linux-4.4.14/sound/core/seq/ |
D | seq_clientmgr.c | 321 struct snd_seq_user_client *user; in snd_seq_open() local 342 user = &client->data.user; in snd_seq_open() 343 user->fifo = NULL; in snd_seq_open() 344 user->fifo_pool_size = 0; in snd_seq_open() 347 user->fifo_pool_size = SNDRV_SEQ_DEFAULT_CLIENT_EVENTS; in snd_seq_open() 348 user->fifo = snd_seq_fifo_new(user->fifo_pool_size); in snd_seq_open() 349 if (user->fifo == NULL) { in snd_seq_open() 365 user->file = file; in snd_seq_open() 381 if (client->data.user.fifo) in snd_seq_release() 382 snd_seq_fifo_delete(&client->data.user.fifo); in snd_seq_release() [all …]
|
/linux-4.4.14/arch/um/ |
D | Kconfig.um | 30 booting and normal file access, this module lets the UML user 38 /tmp/umlshare is a directory on the host with files the UML user 42 <http://user-mode-linux.sourceforge.net/hostfs.html>. 52 The user mode linux management console is a low-level interface to 54 a full-blown operating system running under every user mode linux
|
D | Kconfig.debug | 12 See <http://user-mode-linux.sourceforge.net/old/gprof.html> for more 25 See <http://user-mode-linux.sourceforge.net/old/gprof.html> for more
|
/linux-4.4.14/Documentation/power/ |
D | freezing-of-tasks.txt | 6 The freezing of tasks is a mechanism by which user space processes and some 14 PF_NOFREEZE unset (all user space processes and some kernel threads) are 24 fake signal to all user space processes, and wakes up all the kernel threads. 38 For user space processes try_to_freeze() is called automatically from the 110 The majority of these are user space processes, but if any of the kernel threads 122 3. The third reason is to prevent user space processes and some kernel threads 123 from interfering with the suspending and resuming of devices. A user space 138 user threads and then waiting for a sync is practically one of the easier 142 freezing user threads I don't find really objectionable." 152 4. Another reason for freezing tasks is to prevent user space processes from [all …]
|
/linux-4.4.14/include/uapi/linux/ |
D | atmsap.h | 111 unsigned char user; /* user-specified l2 information */ member 122 unsigned char user; /* user specified l3 information */ member
|
/linux-4.4.14/net/iucv/ |
D | Kconfig | 6 Select this option if you want to use inter-user communication 16 based on z/VM inter-user communication vehicle or based on
|
/linux-4.4.14/Documentation/ABI/stable/ |
D | sysfs-driver-w1_ds28e04 | 6 Users: any user space application which wants to communicate with DS28E04-100 15 Users: any user space application which wants to communicate with DS28E04-100
|
/linux-4.4.14/kernel/events/ |
D | callchain.c | 166 int user = !event->attr.exclude_callchain_user; in perf_callchain() local 168 if (!kernel && !user) in perf_callchain() 185 if (user) { in perf_callchain()
|
/linux-4.4.14/kernel/rcu/ |
D | tiny.c | 116 void rcu_check_callbacks(int user) in rcu_check_callbacks() argument 119 if (user) in rcu_check_callbacks() 123 if (user) in rcu_check_callbacks()
|
/linux-4.4.14/drivers/net/ethernet/ti/ |
D | davinci_mdio.c | 83 } user[0]; member 179 reg = __raw_readl(®s->user[0].access); in wait_for_user_access() 197 reg = __raw_readl(®s->user[0].access); in wait_for_user_access() 245 __raw_writel(reg, &data->regs->user[0].access); in davinci_mdio_read() 253 reg = __raw_readl(&data->regs->user[0].access); in davinci_mdio_read() 290 __raw_writel(reg, &data->regs->user[0].access); in davinci_mdio_write()
|
/linux-4.4.14/Documentation/x86/ |
D | entry_64.txt | 48 toggles whether gs is the kernel gs or the user gs. The swapgs 50 single depth, it should only be used if entering from user mode to 51 kernel mode and then when returning to user-space, and precisely 81 If we are at an interrupt or user-trap/gate-alike boundary then we can 86 user-space execution then we must do the SWAPGS. 98 - Interrupt entry from user mode will switch off the IST stack.
|
/linux-4.4.14/Documentation/sysctl/ |
D | fs.txt | 35 - pipe-user-pages-hard 36 - pipe-user-pages-soft 164 pipe-user-pages-hard: 166 Maximum total number of pages a non-privileged user may allocate for pipes. 173 pipe-user-pages-soft: 175 Maximum total number of pages a non-privileged user may allocate for pipes 177 new pipes will be limited to a single page in size for this user in order to 191 root process follows a hardlink created by another user). Additionally, 211 root process follows a symlink belonging to another user). For a likely 233 owned by the current user and no security is applied. This is [all …]
|
/linux-4.4.14/net/sched/ |
D | act_ipt.c | 39 target = xt_request_find_target(AF_INET, t->u.user.name, in ipt_init_target() 40 t->u.user.revision); in ipt_init_target() 235 t = kmemdup(ipt->tcfi_t, ipt->tcfi_t->u.user.target_size, GFP_ATOMIC); in tcf_ipt_dump() 241 strcpy(t->u.user.name, ipt->tcfi_t->u.kernel.target->name); in tcf_ipt_dump() 243 if (nla_put(skb, TCA_IPT_TARG, ipt->tcfi_t->u.user.target_size, t) || in tcf_ipt_dump()
|
/linux-4.4.14/mm/ |
D | mlock.c | 767 int user_shm_lock(size_t size, struct user_struct *user) in user_shm_lock() argument 779 locked + user->locked_shm > lock_limit && !capable(CAP_IPC_LOCK)) in user_shm_lock() 781 get_uid(user); in user_shm_lock() 782 user->locked_shm += locked; in user_shm_lock() 789 void user_shm_unlock(size_t size, struct user_struct *user) in user_shm_unlock() argument 792 user->locked_shm -= (size + PAGE_SIZE - 1) >> PAGE_SHIFT; in user_shm_unlock() 794 free_uid(user); in user_shm_unlock()
|
/linux-4.4.14/net/unix/ |
D | garbage.c | 119 void unix_inflight(struct user_struct *user, struct file *fp) in unix_inflight() argument 136 user->unix_inflight++; in unix_inflight() 140 void unix_notinflight(struct user_struct *user, struct file *fp) in unix_notinflight() argument 155 user->unix_inflight--; in unix_notinflight()
|
/linux-4.4.14/net/sctp/ |
D | Kconfig | 22 -- acknowledged error-free non-duplicated transfer of user data, 24 -- sequenced delivery of user messages within multiple streams, 25 with an option for order-of-arrival delivery of individual user 27 -- optional bundling of multiple user messages into a single SCTP
|
/linux-4.4.14/Documentation/i2c/ |
D | old-module-parameters | 1 I2C device driver binding control from user-space 5 <linux/i2c.h> which created standard module parameters to let the user 15 "instantiating-devices", section "Method 4: Instantiate from user-space".
|
/linux-4.4.14/include/net/ |
D | af_unix.h | 9 void unix_inflight(struct user_struct *user, struct file *fp); 10 void unix_notinflight(struct user_struct *user, struct file *fp);
|
/linux-4.4.14/drivers/android/ |
D | Kconfig | 30 Enable this to support an old 32-bit Android user-space (v4.4 and 33 Note that enabling this will break newer Android user-space.
|
/linux-4.4.14/drivers/lguest/ |
D | core.c | 209 int run_guest(struct lg_cpu *cpu, unsigned long __user *user) in run_guest() argument 213 if (put_user(*cpu->reg_read, user)) in run_guest() 230 if (copy_to_user(user, &cpu->pending, in run_guest()
|
/linux-4.4.14/drivers/staging/iio/Documentation/ |
D | sysfs-bus-iio-dds | 9 (out_altvoltageX_pincontrol_frequency_en is active) or the user 28 To exit this mode the user can write 39 (out_altvoltageX_pincontrol_phase_en is active) or the user can 58 out_altvoltageX_phaseY. To exit this mode the user can write
|
D | sysfs-bus-iio-adc-ad7280a | 15 The inY-inZ_balance_timer file allows the user to program 17 allows the user to set the timer to a value from 0 minutes to
|
/linux-4.4.14/Documentation/crypto/ |
D | api-intro.txt | 21 'Transforms' are user-instantiated objects, which maintain state, handle all 23 abstraction to the underlying algorithms. However, at the user 28 [transform api] (user interface) 32 The idea is to make the user interface and algorithm registration API 81 Transforms may only be allocated in user context, and cryptographic 82 methods may only be called from softirq and user contexts. For 84 user context.
|
/linux-4.4.14/net/bluetooth/hidp/ |
D | core.c | 65 struct l2cap_user *user); 67 struct l2cap_user *user); 930 session->user.probe = hidp_session_probe; in hidp_session_new() 931 session->user.remove = hidp_session_remove; in hidp_session_new() 932 INIT_LIST_HEAD(&session->user.list); in hidp_session_new() 1089 struct l2cap_user *user) in hidp_session_probe() argument 1091 struct hidp_session *session = container_of(user, in hidp_session_probe() 1093 user); in hidp_session_probe() 1150 struct l2cap_user *user) in hidp_session_remove() argument 1152 struct hidp_session *session = container_of(user, in hidp_session_remove() [all …]
|
/linux-4.4.14/arch/um/os-Linux/drivers/ |
D | tuntap_kern.c | 25 tpri = (struct tuntap_data *) pri->user; in tuntap_init() 74 .user = &tuntap_user_info,
|
D | ethertap_kern.c | 26 epri = (struct ethertap_data *) pri->user; in etap_init() 88 .user = ðertap_user_info,
|
/linux-4.4.14/Documentation/hid/ |
D | hiddev.txt | 52 So you point your hiddev compliant user-space program at the correct 55 Assuming that you have a hiddev compliant user-space program, of 113 The user passes in a hiddev_collection_info struct with the index 143 be filled in by the user through HIDIOCSUSAGE calls (below) to fill in 148 Fills in a hiddev_report_info structure for the user. The report is 150 must be filled in by the user. The ID can be absolute -- the actual 161 hiddev_field_info structure. The user must fill in report_id and 173 usage to be retrieved can be specified as above, or the user can 180 Sets the value of a usage in an output report. The user fills in
|
/linux-4.4.14/Documentation/wimax/ |
D | README.wimax | 7 control API for WiMAX devices, usable from kernel and user space. 22 the user. As well, the stack provides API functions that the driver 25 The stack exports the API calls needed to control the device to user 47 The drivers will register debugfs entries that allow the user to tweak
|
/linux-4.4.14/arch/mn10300/kernel/ |
D | ptrace.c | 265 struct user *dummy = NULL; in user_enable_single_step() 280 struct user *dummy = NULL; in user_disable_single_step() 308 if ((addr & 3) || addr > sizeof(struct user) - 3) in arch_ptrace() 321 if ((addr & 3) || addr > sizeof(struct user) - 3) in arch_ptrace()
|
/linux-4.4.14/Documentation/usb/ |
D | functionfs.txt | 5 the user space driver has registered by writing descriptors and 6 strings (the user space program has to provide the same information 13 From user space point of view it is a file system which when 40 where the last two are implemented via FunctionFS. On user space
|
/linux-4.4.14/Documentation/mic/ |
D | scif_overview.txt | 28 DMA, CPU copies or remote memory mapping via mmap. SCIF supports both user and 64 SCIF has a user space library which is a thin IOCTL wrapper providing a user 65 space API similar to the kernel API in scif.h. The SCIF user space library
|
/linux-4.4.14/arch/tile/ |
D | Kconfig | 304 Select the desired split between kernel and user memory. 311 available to user programs, making the address space there 320 bool "3.75G/0.25G user/kernel split (no kernel networking)" 322 bool "3.5G/0.5G user/kernel split" 324 bool "3G/1G user/kernel split" 326 bool "2.75G/1.25G user/kernel split (for full 1G low memory)" 328 bool "2.5G/1.5G user/kernel split" 330 bool "2.25G/1.75G user/kernel split" 332 bool "2G/2G user/kernel split" 334 bool "1G/3G user/kernel split" [all …]
|
/linux-4.4.14/tools/build/Documentation/ |
D | Build.txt | 7 Basically the user provides set of 'Build' files that list objects and 46 The user supplies 'Build' makefiles that contains a objects list, and connects 66 To follow the above example, the user provides following 'Build' files: 105 via user makefiles to get usefull definitions. 120 invoked by the user.
|
/linux-4.4.14/net/netrom/ |
D | af_netrom.c | 568 ax25_uid_assoc *user; in nr_bind() local 607 user = ax25_findbyuid(current_euid()); in nr_bind() 608 if (user) { in nr_bind() 609 nr->user_addr = user->call; in nr_bind() 610 ax25_uid_put(user); in nr_bind() 640 ax25_uid_assoc *user; in nr_connect() local 681 user = ax25_findbyuid(current_euid()); in nr_connect() 682 if (user) { in nr_connect() 683 nr->user_addr = user->call; in nr_connect() 684 ax25_uid_put(user); in nr_connect() [all …]
|
/linux-4.4.14/arch/m68k/include/asm/ |
D | a.out-core.h | 23 static inline void aout_dump_thread(struct pt_regs *regs, struct user *dump) in aout_dump_thread() 40 dump->u_ar0 = offsetof(struct user, regs); in aout_dump_thread()
|
/linux-4.4.14/fs/coda/ |
D | Kconfig | 14 *client*. You will need user level code as well, both for the 15 client and server. Servers are currently user level, i.e. they need
|
/linux-4.4.14/fs/autofs4/ |
D | Kconfig | 7 automounter (amd), which is a pure user space daemon. 9 To use the automounter you need the user-space tools from
|
/linux-4.4.14/arch/xtensa/kernel/ |
D | ptrace.c | 145 ret |= __copy_to_user(&xtregs->user,&ti->xtregs_user, in ptrace_getxregs() 146 sizeof(xtregs->user)); in ptrace_getxregs() 171 ret |= __copy_from_user(&ti->xtregs_user, &xtregs->user, in ptrace_setxregs() 172 sizeof(xtregs->user)); in ptrace_setxregs()
|
/linux-4.4.14/drivers/clocksource/ |
D | em_sti.c | 163 static int em_sti_start(struct em_sti_priv *p, unsigned int user) in em_sti_start() argument 175 p->active[user] = 1; in em_sti_start() 181 static void em_sti_stop(struct em_sti_priv *p, unsigned int user) in em_sti_stop() argument 188 p->active[user] = 0; in em_sti_stop()
|
/linux-4.4.14/Documentation/early-userspace/ |
D | README | 41 built by an unprivileged user. 49 directory, limited user and group ID translation can be performed. 50 INITRAMFS_ROOT_UID can be set to a user ID that needs to be mapped to 51 user root (0). INITRAMFS_ROOT_GID can be set to a group ID that needs 60 initramfs image will be an aggregate of all of them. In this way a user 62 Because device-special files cannot be created by a unprivileged user, 65 early userspace image can be built by an unprivileged user.
|
/linux-4.4.14/Documentation/DocBook/ |
D | kernel-api.xml.db | 120 API-bitmap-parse-user 122 API-bitmap-parselist-user 172 API-memdup-user 173 API-get-user-pages-fast 174 API---copy-to-user-inatomic 175 API---copy-to-user 176 API---copy-from-user 177 API-clear-user 178 API---clear-user 179 API--copy-to-user [all …]
|