Searched refs:user (Results 176 - 200 of 691) sorted by path

1234567891011>>

/linux-master/arch/x86/include/asm/
H A Duser_32.h7 can understand it and provide useful information to the user (under
12 the contents of the user struct to find out what the floating point
15 UPAGE: 1 page consisting of a user struct that tells gdb what is present
21 current->brk to pick up all of the user variables, plus any memory
74 * is still the layout used by user mode (the new
98 /* When the kernel dumps core, it starts by dumping the user struct -
101 struct user{ struct
H A Duser_64.h8 can understand it and provide useful information to the user.
13 the user struct to find out what the floating point registers
17 UPAGE: 1 page consisting of a user struct that tells gdb what is present
23 current->brk to pick up all of the user variables, plus any memory
99 /* When the kernel dumps core, it starts by dumping the user struct -
103 struct user { struct
/linux-master/arch/x86/kernel/
H A Dhw_breakpoint.c14 * HW_breakpoint: a unified kernel/user-space hardware breakpoint facility,
34 #include <asm/user.h>
407 * user vs kernel detection because bp_len - 1 can't
467 * Release the user breakpoints used by ptrace
500 * i) When the causative address is from user-space and the exception
566 * Further processing in do_debug() is needed for a) user-space
H A Dprocess.c21 #include <linux/user-return-notifier.h>
238 * A user space thread, but it doesn't return to
420 * user mode.
448 * native_tss_update_io_bitmap - Update I/O bitmap before exiting to user mode
480 * access from user space to trigger a #GP because the bitmap is outside
H A Dprocess_32.c25 #include <linux/user.h>
H A Dprocess_64.c29 #include <linux/user.h>
180 * user thread without the need of loading a user thread GS with:
184 * - Accessing the GS segment base address for a user thread as
281 * about the base, and user code expects us to save the current
423 * There are no user segments in the GDT with nonzero bases
555 * once the new task enters user space, single-step trap and NMI
561 * allowed to trigger immediately upon entering user space.
564 * NMI should *never* be disabled in user space. As such, this
685 * do SYSRET while SS is NULL, we'll end up in user mod
[all...]
H A Dptrace.c16 #include <linux/user.h>
156 * Determines which flags the user has access to [1 = access, 0 = no access].
216 * we will never get back to user mode with invalid %cs or %ss
218 * on user_mode() to distinguish a user trap frame (which can
360 * If the user value contains TF, mark that
646 * writing for the user. And anyway this is the previous
750 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user))
756 else if (addr >= offsetof(struct user, u_debugreg[0]) &&
757 addr <= offsetof(struct user, u_debugreg[7])) {
758 addr -= offsetof(struct user, u_debugre
[all...]
H A Dshstk.c19 #include <linux/user.h>
H A Dsignal.c25 #include <linux/user-return-notifier.h>
H A Dtls.c5 #include <linux/user.h>
37 * of the segmentation APIs work), user programs can and do
151 * on return to user mode.
H A Dvm86_32.c99 struct vm86plus_struct __user *user; local
105 * to access user space.
112 user = vm86->user_vm86;
114 if (!user_access_begin(user, vm86->vm86plus.is_vm86pus ?
119 unsafe_put_user(regs->pt.bx, &user->regs.ebx, Efault_end);
120 unsafe_put_user(regs->pt.cx, &user->regs.ecx, Efault_end);
121 unsafe_put_user(regs->pt.dx, &user->regs.edx, Efault_end);
122 unsafe_put_user(regs->pt.si, &user->regs.esi, Efault_end);
123 unsafe_put_user(regs->pt.di, &user->regs.edi, Efault_end);
124 unsafe_put_user(regs->pt.bp, &user
[all...]
/linux-master/arch/x86/kvm/
H A Dcpuid.c21 #include <asm/user.h>
H A Dx86.c48 #include <linux/user-return-notifier.h>
2039 /* Check if the user wanted to know about this MSR fault */
2068 /* MSR read failed? See if we should ask user space */
2090 /* MSR write failed? See if we should ask user space */
2446 pr_warn_ratelimited("user requested TSC rate below hardware speed\n");
2743 * Here lies UAPI baggage: when a user-initiated TSC write has
4561 * Read or write a bunch of msrs. Parameters are user addresses.
5420 /* events->sipi_vector is never valid when reporting to user space */
7531 /* NPT walks are always user-walks */
9807 * Make sure the user ca
[all...]
/linux-master/arch/x86/kvm/mmu/
H A Dmmu_internal.h201 const bool user; member in struct:kvm_page_fault
292 .user = err & PFERR_USER_MASK,
H A Dpaging_tmpl.h824 !is_cr0_wp(vcpu->arch.mmu) && !fault->user && fault->slot) {
829 * If we converted a user page to a kernel page,
/linux-master/arch/x86/math-emu/
H A Dfpu_entry.c18 | The file contains code which accesses user memory. |
19 | Emulator static data may change when user memory is accessed, due to |
33 #include <asm/user.h>
312 /* No more access to user memory, it is safe
464 /* None of these instructions access user memory */
544 which accesses user address space. Access to separate segments is
/linux-master/arch/x86/mm/
H A Ddump_pagetables.c413 bool user)
417 if (user && boot_cpu_has(X86_FEATURE_PTI))
433 pr_info("x86/mm: Checking user space page tables\n");
412 ptdump_walk_pgd_level_debugfs(struct seq_file *m, struct mm_struct *mm, bool user) argument
/linux-master/arch/x86/um/
H A DMakefile42 $(obj)/user-offsets.s: c_flags = -Wp,-MD,$(depfile) $(USER_CFLAGS) \
44 targets += user-offsets.s
46 include/generated/user_constants.h: $(obj)/user-offsets.s FORCE
H A Dptrace_32.c28 /* determines which flags the user has access to. */
108 else if ((addr >= offsetof(struct user, u_debugreg[0])) &&
109 (addr <= offsetof(struct user, u_debugreg[7]))) {
110 addr -= offsetof(struct user, u_debugreg[0]);
164 else if ((addr >= offsetof(struct user, u_debugreg[0])) &&
165 (addr <= offsetof(struct user, u_debugreg[7]))) {
166 addr -= offsetof(struct user, u_debugreg[0]);
H A Dptrace_64.c18 * determines which flags the user has access to.
118 else if ((addr >= offsetof(struct user, u_debugreg[0])) &&
119 (addr <= offsetof(struct user, u_debugreg[7]))) {
120 addr -= offsetof(struct user, u_debugreg[0]);
182 else if ((addr >= offsetof(struct user, u_debugreg[0])) &&
183 (addr <= offsetof(struct user, u_debugreg[7]))) {
184 addr -= offsetof(struct user, u_debugreg[0]);
H A Duser-offsets.c7 #include <sys/user.h>
/linux-master/arch/x86/um/asm/
H A Delf.h8 #include <asm/user.h>
77 * This is the range that is readable by user mode, and things
78 * acting like user mode such as get_user_pages.
180 /* No user-accessible fixmap addresses, i.e. vsyscall */
H A Dprocessor.h22 #include <asm/user.h>
/linux-master/arch/x86/um/os-Linux/
H A Dregisters.c11 #include <sys/user.h>
/linux-master/arch/xtensa/include/asm/
H A Delf.h128 * This yields a mask that user programs can use to figure out what
129 * instruction set this CPU supports. This could be done in user space,
180 xtregs_user_t user; member in struct:__anon194

Completed in 311 milliseconds

1234567891011>>