/linux-master/fs/smb/server/ |
H A D | smb2pdu.c | 72 pr_err("Invalid user session id: %llu\n", id); 563 * smb2_check_user_session() - check for valid session for a user 577 * require a session id, so no need to validate user session's for 606 /* Check for validity of user session */ 610 ksmbd_debug(SMB, "Invalid user session, Uid %llu\n", sess_id); 1393 struct ksmbd_user *user; local 1421 ksmbd_debug(SMB, "session setup request for user %s\n", name); 1422 user = ksmbd_login_user(name); 1424 return user; 1434 struct ksmbd_user *user; local [all...] |
/linux-master/fs/smb/client/ |
H A D | connect.c | 31 #include <keys/user-type.h> 905 /* smb buffer will be freed by user thread */ 2693 /* If the user really knows what they are doing they can override */ 3086 * user space buffer 3451 * the user on mount
|
/linux-master/fs/bcachefs/ |
H A D | bcachefs_format.h | 690 x(user, 4) \ 921 * @user_uuid - user visible UUID, may be changed
|
H A D | checksum.c | 19 #include <keys/user-type.h> 542 key_id = request_key("user", key_description, NULL, 547 key_id = request_key("user", key_description, NULL, 552 key_id = request_key("user", key_description, NULL, 605 key_id = request_key("user", key_description.buf, NULL, KEY_SPEC_USER_KEYRING);
|
/linux-master/drivers/clk/ |
H A D | clk.c | 831 struct clk *user; local 838 hlist_for_each_entry(user, &core->clks, clks_node) 839 if (min_rate > user->max_rate || max_rate < user->min_rate) 2813 /* TODO: Create a per-user clk and change callers to call clk_put */ 4755 * given user should be balanced with calls to clk_rate_exclusive_put()
|
/linux-master/block/ |
H A D | blk-iocost.c | 826 /* if user is overriding anything, maintain what was there */ 3169 dname, ioc->enabled, ioc->user_qos_params ? "user" : "auto", 3216 bool enable, user; local 3247 user = ioc->user_qos_params; 3267 user = false; 3268 else if (!strcmp(buf, "user")) 3269 user = true; 3309 user = true; 3325 if (user) { 3371 dname, ioc->user_cost_model ? "user" 3410 bool user; local [all...] |
/linux-master/arch/x86/kvm/ |
H A D | x86.c | 48 #include <linux/user-return-notifier.h> 2039 /* Check if the user wanted to know about this MSR fault */ 2068 /* MSR read failed? See if we should ask user space */ 2090 /* MSR write failed? See if we should ask user space */ 2446 pr_warn_ratelimited("user requested TSC rate below hardware speed\n"); 2743 * Here lies UAPI baggage: when a user-initiated TSC write has 4561 * Read or write a bunch of msrs. Parameters are user addresses. 5420 /* events->sipi_vector is never valid when reporting to user space */ 7531 /* NPT walks are always user-walks */ 9807 * Make sure the user ca [all...] |
H A D | cpuid.c | 21 #include <asm/user.h>
|
/linux-master/net/unix/ |
H A D | af_unix.c | 1776 /* The "user->unix_inflight" variable is protected by the garbage 1783 struct user_struct *user = current_user(); local 1785 if (unlikely(READ_ONCE(user->unix_inflight) > task_rlimit(p, RLIMIT_NOFILE))) 1806 unix_inflight(scm->fp->user, scm->fp->fp[i]); 1819 unix_notinflight(scm->fp->user, scm->fp->fp[i]);
|
H A D | garbage.c | 112 void unix_inflight(struct user_struct *user, struct file *filp) argument 131 WRITE_ONCE(user->unix_inflight, user->unix_inflight + 1); 136 void unix_notinflight(struct user_struct *user, struct file *filp) argument 154 WRITE_ONCE(user->unix_inflight, user->unix_inflight - 1); 404 READ_ONCE(fpl->user->unix_inflight) < UNIX_INFLIGHT_SANE_USER)
|
/linux-master/kernel/ |
H A D | fork.c | 20 #include <linux/sched/user.h> 84 #include <linux/user-return-notifier.h> 1152 * One for the user space visible state that goes away when reaped. 1439 * Main user is sys_prctl(PR_SET_MM_MAP/EXE_FILE). 1530 * this kernel workthread has transiently adopted a user mm with use_mm, 1914 /* Ref-count the new filter user, and assign it. */ 2183 * If the new process will be in a different pid or user namespace 2228 * Mark us a user worker, and block any signal that isn't 2260 if (p->real_cred->user != INIT_USER && 2502 * From this point on we must avoid any synchronous user [all...] |
/linux-master/drivers/net/ethernet/microchip/sparx5/ |
H A D | sparx5_tc_flower.c | 501 /* Add an extra rule with a special user and the new keyset */ 502 erule->user = VCAP_USER_TC_EXTRA;
|
/linux-master/drivers/net/dsa/ |
H A D | mt7530.c | 1181 * is affine to the inbound user port. 1186 /* CPU port gets connected to all user ports of 1206 /* Allow the user port gets connected to the cpu port and also 1249 * largest MTU of the user ports. Because the switch only has a global 1434 /* CPU port also does the same thing until all user ports belonging to 1467 /* Set the port as a user port which is to be able to recognize 1476 /* Also set CPU ports to the "user" VLAN port attribute, to 1480 * are forwarded to user ports as tagged, and untagged as 2476 /* Set default PVID to 0 on all user ports */ 2589 /* Set default PVID to 0 on all user port [all...] |
/linux-master/drivers/gpu/drm/amd/amdgpu/ |
H A D | amdgpu_cs.c | 347 /* MM engine doesn't support user fences */ 1507 * @user: drm_amdgpu_fence copied from user space 1511 struct drm_amdgpu_fence *user) 1518 ctx = amdgpu_ctx_get(filp->driver_priv, user->ctx_id); 1522 r = amdgpu_ctx_get_entity(ctx, user->ip_type, user->ip_instance, 1523 user->ring, &entity); 1529 fence = amdgpu_ctx_get_fence(ctx, entity, user->seq_no); 1509 amdgpu_cs_get_fence(struct amdgpu_device *adev, struct drm_file *filp, struct drm_amdgpu_fence *user) argument
|
/linux-master/arch/s390/kernel/ |
H A D | entry.S | 269 # clear user controlled register to prevent speculative use 321 tmhh %r8,0x0001 # coming from user space? 324 j 3f # -> fault in user space 351 # clear user controlled registers to prevent speculative use 361 tmhh %r8,0x0001 # returning to user space? 396 tmhh %r8,0x0001 # interrupting from user ? 412 # clear user controlled registers to prevent speculative use 428 tmhh %r8,0x0001 # returning to user ? 492 tmhh %r8,0x0001 # interrupting from user ? 520 # clear user controlle [all...] |
/linux-master/io_uring/ |
H A D | io_uring.c | 1653 * Similarly do not spin if we have not informed the user of any 2450 * 1) allows us to batch the cost of updating the user visible 2601 /* if user messes with these they will just get an early return */ 2756 * Can't support mapping user allocated ring memory on 32-bit 2927 free_uid(ctx->user); 3495 * Do not allow to map to user-provided address to avoid breaking the 3723 * Once the user has been informed we can clear the bit 3903 * When SETUP_IOPOLL and SETUP_SQPOLL are both enabled, user 3914 ctx->user = get_uid(current_user()); 4178 * Allow user cop [all...] |
/linux-master/include/linux/ |
H A D | io_uring_types.h | 399 struct user_struct *user; member in struct:io_ring_ctx 454 /* first byte is taken by user flags, shift it to not overlap */
|
H A D | sockptr.h | 17 void __user *user; member in union:__anon156::__anon157 34 return (sockptr_t) { .user = p }; 41 return !sockptr.user; 48 return copy_from_user(dst, src.user + offset, size); 54 * This is unsafe, unless caller checked user provided optlen. 67 * @optval: Source address. (in user or kernel space) 90 return copy_struct_from_user(dst, ksize, src.user, size); 110 return copy_to_user(dst.user + offset, src, size); 155 return strncpy_from_user(dst, src.user, count); 162 return check_zeroed_user(src.user [all...] |
/linux-master/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 188 /* Head of user chain: ERROR target with chainname */ 415 (strcmp(t->target.u.user.name, 445 if (strcmp(t->target.u.user.name, 498 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, 499 m->u.user.revision); 563 target = xt_request_find_target(NFPROTO_IPV6, t->u.user.name, 564 t->u.user.revision); 597 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) 674 /* Checks and translates the user-supplied table segment (held in 711 if (strcmp(ip6t_get_target(iter)->u.user 962 get_info(struct net *net, void __user *user, const int *len) argument 1659 do_ip6t_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument [all...] |
/linux-master/net/ipv4/netfilter/ |
H A D | ip_tables.c | 163 /* Head of user chain: ERROR target with chainname */ 397 (strcmp(t->target.u.user.name, 427 if (strcmp(t->target.u.user.name, 481 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, 482 m->u.user.revision); 544 target = xt_request_find_target(NFPROTO_IPV4, t->u.user.name, 545 t->u.user.revision); 579 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) 657 /* Checks and translates the user-supplied table segment (held in 694 if (strcmp(ipt_get_target(iter)->u.user 946 get_info(struct net *net, void __user *user, const int *len) argument 1650 do_ipt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument [all...] |
H A D | arp_tables.c | 334 (strcmp(t->target.u.user.name, 365 if (strcmp(t->target.u.user.name, 417 target = xt_request_find_target(NFPROTO_ARP, t->u.user.name, 418 t->u.user.revision); 445 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) 516 /* Checks and translates the user-supplied table segment (held in 556 if (strcmp(arpt_get_target(iter)->u.user.name, 791 static int get_info(struct net *net, void __user *user, const int *len) argument 800 if (copy_from_user(name, user, sizeof(name)) != 0) 831 if (copy_to_user(user, 1443 do_arpt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument [all...] |
/linux-master/net/bluetooth/ |
H A D | l2cap_core.c | 1657 int l2cap_register_user(struct l2cap_conn *conn, struct l2cap_user *user) argument 1671 if (!list_empty(&user->list)) { 1682 ret = user->probe(conn, user); 1686 list_add(&user->list, &conn->users); 1695 void l2cap_unregister_user(struct l2cap_conn *conn, struct l2cap_user *user) argument 1701 if (list_empty(&user->list)) 1704 list_del_init(&user->list); 1705 user->remove(conn, user); 1714 struct l2cap_user *user; local [all...] |
/linux-master/drivers/accel/ivpu/ |
H A D | ivpu_hw_37xx.c | 596 ivpu_hw_init_range(&hw->ranges.user, 0xc0000000, 255 * SZ_1M);
|
H A D | ivpu_hw_40xx.c | 733 ivpu_hw_init_range(&vdev->hw->ranges.user, 0x80000000, SZ_256M);
|
H A D | ivpu_hw.h | 47 struct ivpu_addr_range user; member in struct:ivpu_hw_info::__anon5
|