/linux-master/arch/x86/kvm/mmu/ |
H A D | mmu_internal.h | 201 const bool user; member in struct:kvm_page_fault 300 .user = err & PFERR_USER_MASK,
|
/linux-master/fs/ |
H A D | internal.h | 192 int do_fchownat(int dfd, const char __user *filename, uid_t user, gid_t group, 194 int chown_common(const struct path *path, uid_t user, gid_t group);
|
/linux-master/drivers/gpu/drm/nouveau/ |
H A D | nouveau_drv.h | 190 u_memcpya(uint64_t user, unsigned int nmemb, unsigned int size) argument 192 void __user *userptr = u64_to_user_ptr(user);
|
/linux-master/include/linux/ |
H A D | compiler_types.h | 55 # define __user __attribute__((user)) 57 # define __user BTF_TYPE_TAG(user) 222 * it doesn't make sense on ARM (currently the only user of __naked)
|
/linux-master/arch/parisc/kernel/ |
H A D | traps.c | 126 int i, user; local 130 user = user_mode(regs); 131 level = user ? KERN_DEBUG : KERN_CRIT; 140 if (user) 154 if (user) { 233 /* Amuse the user in a SPARC fashion */ 459 * if the user had pressed it once at any time, the 485 * If the priority level is still user, and the 487 * then the user is attempting something in a space 490 * This is normally the situation when the user [all...] |
/linux-master/kernel/ |
H A D | watch_queue.c | 257 user_bufs = account_pipe_buffers(pipe->user, pipe->nr_accounted, nr_pages); 300 (void) account_pipe_buffers(pipe->user, nr_pages, pipe->nr_accounted); 326 /* Grab the user's filter specification */ 350 * user-specified filters. 419 atomic_dec(&watch->cred->user->nr_watches); 466 if (atomic_inc_return(&cred->user->nr_watches) > task_rlimit(current, RLIMIT_NOFILE)) { 467 atomic_dec(&cred->user->nr_watches);
|
/linux-master/net/ipv6/netfilter/ |
H A D | nf_conntrack_reasm.c | 144 static struct frag_queue *fq_find(struct net *net, __be32 id, u32 user, argument 152 .user = user, 438 int nf_ct_frag6_gather(struct net *net, struct sk_buff *skb, u32 user) argument 472 fq = fq_find(net, fhdr->identification, user, hdr,
|
/linux-master/drivers/hwmon/ |
H A D | ibmpex.c | 74 struct ipmi_user *user; member in struct:ibmpex_bmc_data 120 err = ipmi_request_settime(data->user, &data->address, data->tx_msgid, 451 /* Create IPMI messaging interface user */ 453 data, &data->user); 456 "Unable to register user with IPMI interface %d\n", 502 ipmi_destroy_user(data->user); 526 ipmi_destroy_user(data->user);
|
H A D | ibmaem.c | 91 struct ipmi_user *user; member in struct:aem_ipmi_data 256 /* Initialize IPMI address, message buffers and user data */ 275 /* Create IPMI messaging interface user */ 277 data, &data->user); 280 "Unable to register user with IPMI interface %d\n", 298 err = ipmi_request_settime(data->user, &data->address, data->tx_msgid, 482 ipmi_destroy_user(data->ipmi.user); 598 ipmi_destroy_user(data->ipmi.user); 740 ipmi_destroy_user(data->ipmi.user); 791 ipmi_destroy_user(probe.user); [all...] |
/linux-master/arch/mips/mm/ |
H A D | c-r4k.c | 43 * R4K_HIT - Virtual user or kernel address based cache operations. The 44 * active_mm must be checked before using user addresses, falling 638 bool user; member in struct:flush_icache_range_args 644 bool user) 652 if (user) 669 if (user) 696 bool user = fir_args->user; local 698 __local_r4k_flush_icache_range(start, end, type, user); 702 bool user) 641 __local_r4k_flush_icache_range(unsigned long start, unsigned long end, unsigned int type, bool user) argument 701 __r4k_flush_icache_range(unsigned long start, unsigned long end, bool user) argument [all...] |
/linux-master/io_uring/ |
H A D | rsrc.c | 43 int __io_account_mem(struct user_struct *user, unsigned long nr_pages) argument 53 cur_pages = atomic_long_read(&user->locked_vm); 58 } while (!atomic_long_try_cmpxchg(&user->locked_vm, 65 if (ctx->user) 66 __io_unaccount_mem(ctx->user, nr_pages); 76 if (ctx->user) { 77 ret = __io_account_mem(ctx->user, nr_pages);
|
/linux-master/drivers/gpu/drm/nouveau/nvkm/engine/fifo/ |
H A D | gv100.c | 185 const u64 user = nvkm_memory_addr(chan->userd.mem) + chan->userd.base; local 188 nvkm_wo32(memory, offset + 0x0, lower_32_bits(user) | chan->runq << 1); 189 nvkm_wo32(memory, offset + 0x4, upper_32_bits(user));
|
/linux-master/arch/arc/kernel/ |
H A D | entry-compact.S | 13 * into user reg-file when traded task rets to user space. 157 ; -preemption off IRQ, user task in syscall picked to run 336 ; e.g. Task'A' user-code -> L2 intr -> schedule -> 'B' user-code ret
|
/linux-master/arch/xtensa/kernel/ |
H A D | signal.c | 41 xtregs_user_t user; member in struct:rt_sigframe::__anon1 173 err |= __copy_to_user(&frame->xtregs.user, &ti->xtregs_user, 207 * handler, or the user mode value doesn't matter (e.g. PS.OWB). 235 err |= __copy_from_user(&ti->xtregs_user, &frame->xtregs.user, 381 /* Create the user context. */ 450 * the kernel can handle, and then we build all the user-level signal handling
|
/linux-master/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/ |
H A D | base.c | 429 mmu->user.ctor = nvkm_ummu_new; 430 mmu->user.base = func->mmu.user;
|
/linux-master/drivers/gpu/drm/nouveau/nvkm/engine/device/ |
H A D | user.c | 343 sclass = &device->mmu->user; 345 sclass = &device->fault->user; 347 sclass = &device->vfn->user;
|
/linux-master/drivers/md/ |
H A D | dm-ioctl.c | 1242 * Copies device info back to user space, used by 1884 static int check_version(unsigned int cmd, struct dm_ioctl __user *user, argument 1892 if (copy_from_user(kernel_params->version, user->version, sizeof(kernel_params->version))) 1897 DMERR("ioctl interface mismatch: kernel(%u.%u.%u), user(%u.%u.%u), cmd(%d)", 1913 if (copy_to_user(user->version, kernel_params->version, sizeof(kernel_params->version))) 1931 static int copy_params(struct dm_ioctl __user *user, struct dm_ioctl *param_kernel, argument 1940 (char __user *)user + sizeof(param_kernel->version), 1970 if (secure_data && clear_user(user, param_kernel->data_size)) 1977 /* Copy from param_kernel (which was already copied from user) */ 1980 if (copy_from_user(&dmi->data, (char __user *)user 2028 ctl_ioctl(struct file *file, uint command, struct dm_ioctl __user *user) argument [all...] |
/linux-master/arch/s390/kernel/ |
H A D | entry.S | 269 # clear user controlled register to prevent speculative use 321 tmhh %r8,0x0001 # coming from user space? 324 j 3f # -> fault in user space 351 # clear user controlled registers to prevent speculative use 361 tmhh %r8,0x0001 # returning to user space? 396 tmhh %r8,0x0001 # interrupting from user ? 412 # clear user controlled registers to prevent speculative use 428 tmhh %r8,0x0001 # returning to user ? 469 tmhh %r8,0x0001 # interrupting from user ? 497 # clear user controlle [all...] |
/linux-master/net/bridge/netfilter/ |
H A D | ebtables.c | 33 * For reading or updating the counters, the user context needs to 545 * if i == NF_BR_NUMHOOKS it must be a user defined chain 561 if (i == NF_BR_NUMHOOKS) /* it's a user defined chain */ 901 udc_cnt = 0; /* will hold the nr. of user defined chains (udc) */ 1017 /* the user wants counters back 1070 /* so, a user can change the chains while having messed up her counter 1079 net_warn_ratelimited("ebtables: counters copy to user failed while replacing table\n"); 1516 void __user *user, unsigned int num_counters, 1537 if (copy_to_user(user, counterstmp, 1545 static int copy_everything_to_user(struct ebt_table *t, void __user *user, argument 1514 copy_counters_to_user(struct ebt_table *t, const struct ebt_counter *oldcounters, void __user *user, unsigned int num_counters, unsigned int nentries) argument 1851 compat_copy_everything_to_user(struct ebt_table *t, void __user *user, int *len, int cmd) argument 2372 compat_do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument 2445 do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument [all...] |
/linux-master/arch/m68k/fpsp040/ |
H A D | sto_res.S | 4 | Takes the result and puts it in where the user expects it.
|
/linux-master/net/bluetooth/hidp/ |
H A D | hidp.h | 151 struct l2cap_user user; member in struct:hidp_session
|
/linux-master/tools/testing/selftests/powerpc/ptrace/ |
H A D | ptrace-syscall.c | 17 #include <sys/user.h>
|
/linux-master/tools/testing/selftests/x86/ |
H A D | sysret_rip.c | 21 #include <sys/user.h>
|
H A D | unwind_vdso.c | 40 #include <sys/user.h>
|
H A D | fsgsbase_restore.c | 24 #include <sys/user.h>
|