Searched refs:user (Results 1 - 25 of 691) sorted by last modified time

1234567891011>>

/linux-master/fs/smb/server/
H A Dsmb2pdu.c72 pr_err("Invalid user session id: %llu\n", id);
563 * smb2_check_user_session() - check for valid session for a user
577 * require a session id, so no need to validate user session's for
606 /* Check for validity of user session */
610 ksmbd_debug(SMB, "Invalid user session, Uid %llu\n", sess_id);
1393 struct ksmbd_user *user; local
1421 ksmbd_debug(SMB, "session setup request for user %s\n", name);
1422 user = ksmbd_login_user(name);
1424 return user;
1434 struct ksmbd_user *user; local
[all...]
/linux-master/fs/smb/client/
H A Dconnect.c31 #include <keys/user-type.h>
905 /* smb buffer will be freed by user thread */
2693 /* If the user really knows what they are doing they can override */
3086 * user space buffer
3451 * the user on mount
/linux-master/fs/bcachefs/
H A Dbcachefs_format.h690 x(user, 4) \
921 * @user_uuid - user visible UUID, may be changed
H A Dchecksum.c19 #include <keys/user-type.h>
542 key_id = request_key("user", key_description, NULL,
547 key_id = request_key("user", key_description, NULL,
552 key_id = request_key("user", key_description, NULL,
605 key_id = request_key("user", key_description.buf, NULL, KEY_SPEC_USER_KEYRING);
/linux-master/drivers/clk/
H A Dclk.c831 struct clk *user; local
838 hlist_for_each_entry(user, &core->clks, clks_node)
839 if (min_rate > user->max_rate || max_rate < user->min_rate)
2813 /* TODO: Create a per-user clk and change callers to call clk_put */
4755 * given user should be balanced with calls to clk_rate_exclusive_put()
/linux-master/block/
H A Dblk-iocost.c826 /* if user is overriding anything, maintain what was there */
3169 dname, ioc->enabled, ioc->user_qos_params ? "user" : "auto",
3216 bool enable, user; local
3247 user = ioc->user_qos_params;
3267 user = false;
3268 else if (!strcmp(buf, "user"))
3269 user = true;
3309 user = true;
3325 if (user) {
3371 dname, ioc->user_cost_model ? "user"
3410 bool user; local
[all...]
/linux-master/arch/x86/kvm/
H A Dx86.c48 #include <linux/user-return-notifier.h>
2039 /* Check if the user wanted to know about this MSR fault */
2068 /* MSR read failed? See if we should ask user space */
2090 /* MSR write failed? See if we should ask user space */
2446 pr_warn_ratelimited("user requested TSC rate below hardware speed\n");
2743 * Here lies UAPI baggage: when a user-initiated TSC write has
4561 * Read or write a bunch of msrs. Parameters are user addresses.
5420 /* events->sipi_vector is never valid when reporting to user space */
7531 /* NPT walks are always user-walks */
9807 * Make sure the user ca
[all...]
H A Dcpuid.c21 #include <asm/user.h>
/linux-master/net/unix/
H A Daf_unix.c1776 /* The "user->unix_inflight" variable is protected by the garbage
1783 struct user_struct *user = current_user(); local
1785 if (unlikely(READ_ONCE(user->unix_inflight) > task_rlimit(p, RLIMIT_NOFILE)))
1806 unix_inflight(scm->fp->user, scm->fp->fp[i]);
1819 unix_notinflight(scm->fp->user, scm->fp->fp[i]);
H A Dgarbage.c112 void unix_inflight(struct user_struct *user, struct file *filp) argument
131 WRITE_ONCE(user->unix_inflight, user->unix_inflight + 1);
136 void unix_notinflight(struct user_struct *user, struct file *filp) argument
154 WRITE_ONCE(user->unix_inflight, user->unix_inflight - 1);
404 READ_ONCE(fpl->user->unix_inflight) < UNIX_INFLIGHT_SANE_USER)
/linux-master/kernel/
H A Dfork.c20 #include <linux/sched/user.h>
84 #include <linux/user-return-notifier.h>
1152 * One for the user space visible state that goes away when reaped.
1439 * Main user is sys_prctl(PR_SET_MM_MAP/EXE_FILE).
1530 * this kernel workthread has transiently adopted a user mm with use_mm,
1914 /* Ref-count the new filter user, and assign it. */
2183 * If the new process will be in a different pid or user namespace
2228 * Mark us a user worker, and block any signal that isn't
2260 if (p->real_cred->user != INIT_USER &&
2502 * From this point on we must avoid any synchronous user
[all...]
/linux-master/drivers/net/ethernet/microchip/sparx5/
H A Dsparx5_tc_flower.c501 /* Add an extra rule with a special user and the new keyset */
502 erule->user = VCAP_USER_TC_EXTRA;
/linux-master/drivers/net/dsa/
H A Dmt7530.c1181 * is affine to the inbound user port.
1186 /* CPU port gets connected to all user ports of
1206 /* Allow the user port gets connected to the cpu port and also
1249 * largest MTU of the user ports. Because the switch only has a global
1434 /* CPU port also does the same thing until all user ports belonging to
1467 /* Set the port as a user port which is to be able to recognize
1476 /* Also set CPU ports to the "user" VLAN port attribute, to
1480 * are forwarded to user ports as tagged, and untagged as
2476 /* Set default PVID to 0 on all user ports */
2589 /* Set default PVID to 0 on all user port
[all...]
/linux-master/drivers/gpu/drm/amd/amdgpu/
H A Damdgpu_cs.c347 /* MM engine doesn't support user fences */
1507 * @user: drm_amdgpu_fence copied from user space
1511 struct drm_amdgpu_fence *user)
1518 ctx = amdgpu_ctx_get(filp->driver_priv, user->ctx_id);
1522 r = amdgpu_ctx_get_entity(ctx, user->ip_type, user->ip_instance,
1523 user->ring, &entity);
1529 fence = amdgpu_ctx_get_fence(ctx, entity, user->seq_no);
1509 amdgpu_cs_get_fence(struct amdgpu_device *adev, struct drm_file *filp, struct drm_amdgpu_fence *user) argument
/linux-master/arch/s390/kernel/
H A Dentry.S269 # clear user controlled register to prevent speculative use
321 tmhh %r8,0x0001 # coming from user space?
324 j 3f # -> fault in user space
351 # clear user controlled registers to prevent speculative use
361 tmhh %r8,0x0001 # returning to user space?
396 tmhh %r8,0x0001 # interrupting from user ?
412 # clear user controlled registers to prevent speculative use
428 tmhh %r8,0x0001 # returning to user ?
492 tmhh %r8,0x0001 # interrupting from user ?
520 # clear user controlle
[all...]
/linux-master/io_uring/
H A Dio_uring.c1653 * Similarly do not spin if we have not informed the user of any
2450 * 1) allows us to batch the cost of updating the user visible
2601 /* if user messes with these they will just get an early return */
2756 * Can't support mapping user allocated ring memory on 32-bit
2927 free_uid(ctx->user);
3495 * Do not allow to map to user-provided address to avoid breaking the
3723 * Once the user has been informed we can clear the bit
3903 * When SETUP_IOPOLL and SETUP_SQPOLL are both enabled, user
3914 ctx->user = get_uid(current_user());
4178 * Allow user cop
[all...]
/linux-master/include/linux/
H A Dio_uring_types.h399 struct user_struct *user; member in struct:io_ring_ctx
454 /* first byte is taken by user flags, shift it to not overlap */
H A Dsockptr.h17 void __user *user; member in union:__anon156::__anon157
34 return (sockptr_t) { .user = p };
41 return !sockptr.user;
48 return copy_from_user(dst, src.user + offset, size);
54 * This is unsafe, unless caller checked user provided optlen.
67 * @optval: Source address. (in user or kernel space)
90 return copy_struct_from_user(dst, ksize, src.user, size);
110 return copy_to_user(dst.user + offset, src, size);
155 return strncpy_from_user(dst, src.user, count);
162 return check_zeroed_user(src.user
[all...]
/linux-master/net/ipv6/netfilter/
H A Dip6_tables.c188 /* Head of user chain: ERROR target with chainname */
415 (strcmp(t->target.u.user.name,
445 if (strcmp(t->target.u.user.name,
498 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name,
499 m->u.user.revision);
563 target = xt_request_find_target(NFPROTO_IPV6, t->u.user.name,
564 t->u.user.revision);
597 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0)
674 /* Checks and translates the user-supplied table segment (held in
711 if (strcmp(ip6t_get_target(iter)->u.user
962 get_info(struct net *net, void __user *user, const int *len) argument
1659 do_ip6t_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument
[all...]
/linux-master/net/ipv4/netfilter/
H A Dip_tables.c163 /* Head of user chain: ERROR target with chainname */
397 (strcmp(t->target.u.user.name,
427 if (strcmp(t->target.u.user.name,
481 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name,
482 m->u.user.revision);
544 target = xt_request_find_target(NFPROTO_IPV4, t->u.user.name,
545 t->u.user.revision);
579 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0)
657 /* Checks and translates the user-supplied table segment (held in
694 if (strcmp(ipt_get_target(iter)->u.user
946 get_info(struct net *net, void __user *user, const int *len) argument
1650 do_ipt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument
[all...]
H A Darp_tables.c334 (strcmp(t->target.u.user.name,
365 if (strcmp(t->target.u.user.name,
417 target = xt_request_find_target(NFPROTO_ARP, t->u.user.name,
418 t->u.user.revision);
445 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0)
516 /* Checks and translates the user-supplied table segment (held in
556 if (strcmp(arpt_get_target(iter)->u.user.name,
791 static int get_info(struct net *net, void __user *user, const int *len) argument
800 if (copy_from_user(name, user, sizeof(name)) != 0)
831 if (copy_to_user(user,
1443 do_arpt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument
[all...]
/linux-master/net/bluetooth/
H A Dl2cap_core.c1657 int l2cap_register_user(struct l2cap_conn *conn, struct l2cap_user *user) argument
1671 if (!list_empty(&user->list)) {
1682 ret = user->probe(conn, user);
1686 list_add(&user->list, &conn->users);
1695 void l2cap_unregister_user(struct l2cap_conn *conn, struct l2cap_user *user) argument
1701 if (list_empty(&user->list))
1704 list_del_init(&user->list);
1705 user->remove(conn, user);
1714 struct l2cap_user *user; local
[all...]
/linux-master/drivers/accel/ivpu/
H A Divpu_hw_37xx.c596 ivpu_hw_init_range(&hw->ranges.user, 0xc0000000, 255 * SZ_1M);
H A Divpu_hw_40xx.c733 ivpu_hw_init_range(&vdev->hw->ranges.user, 0x80000000, SZ_256M);
H A Divpu_hw.h47 struct ivpu_addr_range user; member in struct:ivpu_hw_info::__anon5

Completed in 482 milliseconds

1234567891011>>