/linux-master/arch/x86/include/asm/ |
H A D | user_32.h | 7 can understand it and provide useful information to the user (under 12 the contents of the user struct to find out what the floating point 15 UPAGE: 1 page consisting of a user struct that tells gdb what is present 21 current->brk to pick up all of the user variables, plus any memory 74 * is still the layout used by user mode (the new 98 /* When the kernel dumps core, it starts by dumping the user struct - 101 struct user{ struct
|
H A D | user_64.h | 8 can understand it and provide useful information to the user. 13 the user struct to find out what the floating point registers 17 UPAGE: 1 page consisting of a user struct that tells gdb what is present 23 current->brk to pick up all of the user variables, plus any memory 99 /* When the kernel dumps core, it starts by dumping the user struct - 103 struct user { struct
|
/linux-master/arch/x86/kernel/ |
H A D | hw_breakpoint.c | 14 * HW_breakpoint: a unified kernel/user-space hardware breakpoint facility, 34 #include <asm/user.h> 407 * user vs kernel detection because bp_len - 1 can't 467 * Release the user breakpoints used by ptrace 500 * i) When the causative address is from user-space and the exception 566 * Further processing in do_debug() is needed for a) user-space
|
H A D | process.c | 21 #include <linux/user-return-notifier.h> 238 * A user space thread, but it doesn't return to 420 * user mode. 448 * native_tss_update_io_bitmap - Update I/O bitmap before exiting to user mode 480 * access from user space to trigger a #GP because the bitmap is outside
|
H A D | process_32.c | 25 #include <linux/user.h>
|
H A D | process_64.c | 29 #include <linux/user.h> 180 * user thread without the need of loading a user thread GS with: 184 * - Accessing the GS segment base address for a user thread as 281 * about the base, and user code expects us to save the current 423 * There are no user segments in the GDT with nonzero bases 555 * once the new task enters user space, single-step trap and NMI 561 * allowed to trigger immediately upon entering user space. 564 * NMI should *never* be disabled in user space. As such, this 685 * do SYSRET while SS is NULL, we'll end up in user mod [all...] |
H A D | ptrace.c | 16 #include <linux/user.h> 156 * Determines which flags the user has access to [1 = access, 0 = no access]. 216 * we will never get back to user mode with invalid %cs or %ss 218 * on user_mode() to distinguish a user trap frame (which can 360 * If the user value contains TF, mark that 646 * writing for the user. And anyway this is the previous 750 if ((addr & (sizeof(data) - 1)) || addr >= sizeof(struct user)) 756 else if (addr >= offsetof(struct user, u_debugreg[0]) && 757 addr <= offsetof(struct user, u_debugreg[7])) { 758 addr -= offsetof(struct user, u_debugre [all...] |
H A D | shstk.c | 19 #include <linux/user.h>
|
H A D | signal.c | 25 #include <linux/user-return-notifier.h>
|
H A D | tls.c | 5 #include <linux/user.h> 37 * of the segmentation APIs work), user programs can and do 151 * on return to user mode.
|
H A D | vm86_32.c | 99 struct vm86plus_struct __user *user; local 105 * to access user space. 112 user = vm86->user_vm86; 114 if (!user_access_begin(user, vm86->vm86plus.is_vm86pus ? 119 unsafe_put_user(regs->pt.bx, &user->regs.ebx, Efault_end); 120 unsafe_put_user(regs->pt.cx, &user->regs.ecx, Efault_end); 121 unsafe_put_user(regs->pt.dx, &user->regs.edx, Efault_end); 122 unsafe_put_user(regs->pt.si, &user->regs.esi, Efault_end); 123 unsafe_put_user(regs->pt.di, &user->regs.edi, Efault_end); 124 unsafe_put_user(regs->pt.bp, &user [all...] |
/linux-master/arch/x86/kvm/ |
H A D | cpuid.c | 21 #include <asm/user.h>
|
H A D | x86.c | 48 #include <linux/user-return-notifier.h> 2039 /* Check if the user wanted to know about this MSR fault */ 2068 /* MSR read failed? See if we should ask user space */ 2090 /* MSR write failed? See if we should ask user space */ 2446 pr_warn_ratelimited("user requested TSC rate below hardware speed\n"); 2743 * Here lies UAPI baggage: when a user-initiated TSC write has 4561 * Read or write a bunch of msrs. Parameters are user addresses. 5420 /* events->sipi_vector is never valid when reporting to user space */ 7531 /* NPT walks are always user-walks */ 9807 * Make sure the user ca [all...] |
/linux-master/arch/x86/kvm/mmu/ |
H A D | mmu_internal.h | 201 const bool user; member in struct:kvm_page_fault 292 .user = err & PFERR_USER_MASK,
|
H A D | paging_tmpl.h | 824 !is_cr0_wp(vcpu->arch.mmu) && !fault->user && fault->slot) { 829 * If we converted a user page to a kernel page,
|
/linux-master/arch/x86/math-emu/ |
H A D | fpu_entry.c | 18 | The file contains code which accesses user memory. | 19 | Emulator static data may change when user memory is accessed, due to | 33 #include <asm/user.h> 312 /* No more access to user memory, it is safe 464 /* None of these instructions access user memory */ 544 which accesses user address space. Access to separate segments is
|
/linux-master/arch/x86/mm/ |
H A D | dump_pagetables.c | 413 bool user) 417 if (user && boot_cpu_has(X86_FEATURE_PTI)) 433 pr_info("x86/mm: Checking user space page tables\n"); 412 ptdump_walk_pgd_level_debugfs(struct seq_file *m, struct mm_struct *mm, bool user) argument
|
/linux-master/arch/x86/um/ |
H A D | Makefile | 42 $(obj)/user-offsets.s: c_flags = -Wp,-MD,$(depfile) $(USER_CFLAGS) \ 44 targets += user-offsets.s 46 include/generated/user_constants.h: $(obj)/user-offsets.s FORCE
|
H A D | ptrace_32.c | 28 /* determines which flags the user has access to. */ 108 else if ((addr >= offsetof(struct user, u_debugreg[0])) && 109 (addr <= offsetof(struct user, u_debugreg[7]))) { 110 addr -= offsetof(struct user, u_debugreg[0]); 164 else if ((addr >= offsetof(struct user, u_debugreg[0])) && 165 (addr <= offsetof(struct user, u_debugreg[7]))) { 166 addr -= offsetof(struct user, u_debugreg[0]);
|
H A D | ptrace_64.c | 18 * determines which flags the user has access to. 118 else if ((addr >= offsetof(struct user, u_debugreg[0])) && 119 (addr <= offsetof(struct user, u_debugreg[7]))) { 120 addr -= offsetof(struct user, u_debugreg[0]); 182 else if ((addr >= offsetof(struct user, u_debugreg[0])) && 183 (addr <= offsetof(struct user, u_debugreg[7]))) { 184 addr -= offsetof(struct user, u_debugreg[0]);
|
H A D | user-offsets.c | 7 #include <sys/user.h>
|
/linux-master/arch/x86/um/asm/ |
H A D | elf.h | 8 #include <asm/user.h> 77 * This is the range that is readable by user mode, and things 78 * acting like user mode such as get_user_pages. 180 /* No user-accessible fixmap addresses, i.e. vsyscall */
|
H A D | processor.h | 22 #include <asm/user.h>
|
/linux-master/arch/x86/um/os-Linux/ |
H A D | registers.c | 11 #include <sys/user.h>
|
/linux-master/arch/xtensa/include/asm/ |
H A D | elf.h | 128 * This yields a mask that user programs can use to figure out what 129 * instruction set this CPU supports. This could be done in user space, 180 xtregs_user_t user; member in struct:__anon194
|