/linux-master/drivers/accessibility/speakup/ |
H A D | i18n.c | 513 static bool fmt_validate(char *template, char *user) argument 518 char *user_ptr = user; 539 * Description: Add a user-supplied message to the user_messages array. 616 /* Free user-supplied strings when module is unloaded: */
|
/linux-master/drivers/gpu/drm/radeon/ |
H A D | radeon_fbdev.c | 145 static int radeon_fbdev_fb_open(struct fb_info *info, int user) argument 163 static int radeon_fbdev_fb_release(struct fb_info *info, int user) argument
|
/linux-master/drivers/video/fbdev/ |
H A D | skeletonfb.c | 139 * @user: tell us if the userland (value=1) or the console is accessing 149 static int xxxfb_open(struct fb_info *info, int user) argument 158 * @user: tell us if the userland (value=1) or the console is accessing 168 static int xxxfb_release(struct fb_info *info, int user) argument 429 * function. Creating a dummy function will just confuse user apps. 978 /* Parse user specified options (`video=xxxfb:') */
|
/linux-master/fs/ |
H A D | init.c | 3 * Routines that mimic syscalls, but don't use the user address space or file 82 int __init init_chown(const char *filename, uid_t user, gid_t group, int flags) argument 93 error = chown_common(&path, user, group);
|
/linux-master/fs/smb/server/ |
H A D | auth.c | 139 user_passkey(sess->user), 153 len = strlen(user_name(sess->user)); 160 conv_len = smb_strtoUTF16(uniname, user_name(sess->user), len, 172 ksmbd_debug(AUTH, "Could not update with user\n"); 515 struct ksmbd_user *user = NULL; local 543 user = ksmbd_alloc_user(&resp->login_response); 544 if (!user) { 549 sess->user = user;
|
/linux-master/kernel/ |
H A D | Makefile | 8 sysctl.o capability.o ptrace.o user.o \ 123 obj-$(CONFIG_USER_RETURN_NOTIFIER) += user-return-notifier.o
|
H A D | sys.c | 230 struct user_struct *user; local 269 user = cred->user; 273 user = find_user(uid); 274 if (!user) 275 goto out_unlock; /* No processes for this user */ 282 free_uid(user); /* For find_user() */ 300 struct user_struct *user; local 337 user = cred->user; [all...] |
/linux-master/net/dsa/ |
H A D | dsa.c | 29 #include "user.h" 423 /* Perform initial assignment of CPU ports to user ports and DSA links in the 556 if (dp->user) { 557 dsa_user_destroy(dp->user); 558 dp->user = NULL; 633 /* Initialize ds->phys_mii_mask before registering the user MDIO bus 635 * the user MDIO bus driver rely on these values for probing PHY 716 * all work items scheduled by our switchdev handlers for user ports have 1000 if (dp->user->flags & IFF_UP) 1146 /* If the conduit device is not itself a DSA user i [all...] |
H A D | port.c | 19 #include "user.h" 31 * a user port's state changes. 292 * event for changing vlan_filtering setting upon user ports leaving 402 * when the user requests it through netlink or sysfs, but not 492 struct net_device *dev = dp->user; 744 struct net_device *upper_dev, *user = dp->user; local 747 netdev_for_each_upper_dev_rcu(user, upper_dev, iter) { 830 struct net_device *user = other_dp->user; local [all...] |
H A D | switch.c | 21 #include "user.h" 167 /* No need to bother with refcounting for user ports */ 219 /* No need to bother with refcounting for user ports */ 266 /* No need to bother with refcounting for user ports */ 316 /* No need to bother with refcounting for user ports */ 697 /* No need to bother with refcounting for user ports. */ 753 /* No need to bother with refcounting for user ports */ 897 struct net_device *user = dp->user; local 899 dsa_user_setup_tagger(user); [all...] |
/linux-master/arch/arm/mm/ |
H A D | alignment.c | 347 goto user; 363 user: 409 goto user; 424 user: 844 goto user; 966 user: 985 * user space. But if an interrupt occurs before actually 986 * reaching user space, then the IRQ vector entry code will 991 * are disabled on the way back to user space anyway in
|
/linux-master/include/net/ |
H A D | ip.h | 5 * interface as the means of communication with the user level. 122 It is user level problem, what it will make with them. 714 /* Return true if the value of 'user' is between 'lower_bond' 717 static inline bool ip_defrag_user_in_between(u32 user, argument 721 return user >= lower_bond && user <= upper_bond; 724 int ip_defrag(struct net *net, struct sk_buff *skb, u32 user); 726 struct sk_buff *ip_check_defrag(struct net *net, struct sk_buff *skb, u32 user); 728 static inline struct sk_buff *ip_check_defrag(struct net *net, struct sk_buff *skb, u32 user) argument
|
/linux-master/net/rose/ |
H A D | af_rose.c | 354 * This is called from user mode and the timers. Thus it protects itself 703 ax25_uid_assoc *user; local 726 user = ax25_findbyuid(current_euid()); 727 if (user) { 728 rose->source_call = user->call; 729 ax25_uid_put(user); 766 ax25_uid_assoc *user; local 832 user = ax25_findbyuid(current_euid()); 833 if (!user) { 840 rose->source_call = user [all...] |
/linux-master/drivers/infiniband/hw/cxgb4/ |
H A D | cq.c | 77 int user = (uctx != &rdev->uctx); local 82 if (user) 91 if (!user) { 106 if (user && ucontext->is_32b_cqe) { 148 ((user && ucontext->is_32b_cqe) ? 165 user ? &cq->bar2_pa : NULL); 166 if (user && !cq->bar2_pa) { 1069 * memsize must be a multiple of the page size if its a user cq.
|
/linux-master/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_uc_fw.c | 86 * for GuC at least. As it is useful to report to the user that they are not 548 bool user = e == -EINVAL; local 553 uc_fw->user_overridden = user; 558 uc_fw->user_overridden = user; 562 uc_fw->user_overridden = user; 568 uc_fw->user_overridden = user; 573 uc_fw->user_overridden = user; 574 } else if (user && i915_inject_probe_error(i915, e)) {
|
/linux-master/include/linux/ |
H A D | syscalls.h | 438 asmlinkage long sys_fchownat(int dfd, const char __user *filename, uid_t user, 440 asmlinkage long sys_fchown(unsigned int fd, uid_t user, gid_t group); 1007 uid_t user, gid_t group); 1011 uid_t user, gid_t group); 1120 old_uid_t user, old_gid_t group); 1122 old_uid_t user, old_gid_t group); 1123 asmlinkage long sys_fchown16(unsigned int fd, old_uid_t user, old_gid_t group); 1198 int ksys_fchown(unsigned int fd, uid_t user, gid_t group); 1232 extern int do_fchownat(int dfd, const char __user *filename, uid_t user, 1235 static inline long ksys_chown(const char __user *filename, uid_t user, argument 1241 ksys_lchown(const char __user *filename, uid_t user, gid_t group) argument [all...] |
/linux-master/net/bpf/ |
H A D | test_run.c | 446 /* Clamp copy if the user has provided a size hint, but copy the full 781 * after csd_lock(). However, since cpu is from user 1207 /* There can't be user provided data before the meta data */ 1539 const struct nf_hook_state *user, 1542 if (user->in || user->out) 1545 if (user->net || user->sk || user->okfn) 1548 switch (user 1538 verify_and_copy_hook_state(struct nf_hook_state *state, const struct nf_hook_state *user, struct net_device *dev) argument [all...] |
/linux-master/drivers/mtd/nand/ |
H A D | ecc-mxic.c | 224 struct nand_ecc_props *user = &nand->ecc.user_conf; local 252 if (user->step_size && user->strength) { 253 step_size = user->step_size; 254 strength = user->strength;
|
/linux-master/arch/m68k/fpsp040/ |
H A D | x_snan.S | 179 bsrl mem_write |write snan to user memory 201 bsrl mem_write |write snan to user memory 222 bsrl mem_write |write snan to user memory
|
H A D | skeleton.S | 23 | interrupt) the user program can be resumed via 'rte'. 370 | to return to user mode, but there may be OS specific code 387 | mem_write --- write to user or supervisor address space 394 | a1 - user destination address 427 | mem_read --- read from user or supervisor address space 438 | a0 - user source address 479 | movec %d1,%DFC | set dfc for user data space 483 movesb %d1,(%a1)+ | write user byte 494 | movec %d1,%SFC | set sfc for user space 497 movesb (%a0)+,%d1 | fetch user byt [all...] |
/linux-master/arch/m68k/ifpsp060/ |
H A D | iskeleton.S | 68 | Linux/68k: If returning to user space, check for needed reselections. 192 | d0 = `xxxxxxff -> supervisor; `xxxxxx00 -> user 258 | d0 = `xxxxxxff -> supervisor; `xxxxxx00 -> user
|
/linux-master/fs/autofs/ |
H A D | dev-ioctl.c | 23 * or other user space daemon which uses direct mounts or offset 40 * memory we copied from user land. 50 * Check that the user compiled against correct version of autofs 63 "kernel(%u.%u), user(%u.%u), cmd(0x%08x)\n", 288 /* Close file descriptor allocated above (user can also use close(2)). */ 594 struct autofs_dev_ioctl __user *user) 620 param = copy_dev_ioctl(user); 681 if (err >= 0 && copy_to_user(user, param, AUTOFS_DEV_IOCTL_SIZE)) 593 _autofs_dev_ioctl(unsigned int command, struct autofs_dev_ioctl __user *user) argument
|
/linux-master/arch/xtensa/kernel/ |
H A D | vectors.S | 4 * This file contains all exception vectors (user, kernel, and double), 20 * We use a two-level table approach. The user and kernel exception vectors 41 * Note: Neither the kernel nor the user exception handler generate literals. 119 * to read data from an invalid address in user space. 126 * cases go through the double exception vector than through the user and 130 * happens when accessing user-space memory with the user's permissions 139 * zero indicates to use the default kernel/user exception handler. 187 * - Fixup handlers can jump to the default kernel and user exception 252 * We return to the instruction in user spac [all...] |
/linux-master/arch/arm/kernel/ |
H A D | ptrace.c | 16 #include <linux/user.h> 247 * Read the word at offset "off" into the "struct user". We 267 else if (off >= sizeof(struct user)) 274 * Write the word at offset "off" into "struct user". We 280 if (off & 3 || off >= sizeof(struct user))
|
/linux-master/arch/arm/mach-omap2/ |
H A D | powerdomain.c | 437 int pwrdm_for_each(int (*fn)(struct powerdomain *pwrdm, void *user), argument 438 void *user) 447 ret = (*fn)(temp_pwrdm, user);
|