| /kernel/linux/linux-6.6/drivers/gpu/drm/nouveau/ |
| H A D | nouveau_bo.c | 852 struct nouveau_cli *cli = (void *)chan->user.client; in nouveau_bo_move_m2mf() 952 ret = nvif_object_ctor(&chan->user, "ttmBoMove", in nouveau_bo_move_init()
|
| /kernel/linux/linux-6.6/security/keys/ |
| H A D | keyring.c | 18 #include <keys/user-type.h> 129 * Free a preparse of a user defined key payload 1134 * user in the current user namespace are considered. If @uid_keyring is %true, 1135 * the keyring additionally must have been allocated as a user or user session 1155 if (!kuid_has_mapping(ns, keyring->user->uid)) in find_keyring_by_name() 1424 * of the user's key data quota to hold the link. 1577 * some of the user's key data quota to hold the link on @to_keyring.
|
| /kernel/liteos_a/arch/arm/arm/src/ |
| H A D | los_exc.c | 223 BOOL user = (frame->regCPSR & CPSR_MODE_MASK) == CPSR_MODE_USR; in OsArmSharedPageFault() local 225 pfFlags |= user ? VM_MAP_PF_FLAG_USER : 0; in OsArmSharedPageFault() 342 PrintExcInfo("task user stack = 0x%08x -> 0x%08x\n", in OsExcSysInfo() 587 BBoxNotifyError("USER_CRASH", MODULE_SYSTEM, "Crash in user", 0); in OsUserExcHandle() 608 /* kill user exc process */ in OsUserExcHandle() 1055 /* Both cores raise exceptions, and the current core is a user-mode exception. in OsCheckAllCpuStatus()
|
| /kernel/linux/linux-5.10/ipc/ |
| H A D | shm.c | 1204 struct user_struct *user = current_user(); in shmctl_do_lock() local 1206 err = shmem_lock(shm_file, 1, user); in shmctl_do_lock() 1209 shp->mlock_user = user; in shmctl_do_lock()
|
| /kernel/linux/linux-5.10/mm/ |
| H A D | shmem.c | 99 * inode->i_private (with i_mutex making sure that it has only one user at 2233 int shmem_lock(struct file *file, int lock, struct user_struct *user) in shmem_lock() argument 2245 if (!user_shm_lock(inode->i_size, user)) in shmem_lock() 2250 if (!lock && (info->flags & VM_LOCKED) && user) { in shmem_lock() 2251 user_shm_unlock(inode->i_size, user); in shmem_lock() 2660 * now we can copy it to user space... in shmem_file_read_iter() 4171 int shmem_lock(struct file *file, int lock, struct user_struct *user) in shmem_lock() argument 4291 * accessible to the user through its mapping, use S_PRIVATE flag to in shmem_zero_setup()
|
| /kernel/linux/linux-5.10/drivers/net/wireless/ath/ath11k/ |
| H A D | dp_rx.c | 1326 struct htt_ppdu_stats *ppdu_stats, u8 user) in ath11k_update_per_peer_tx_stats() 1334 struct htt_ppdu_user_stats *usr_stats = &ppdu_stats->user_stats[user]; in ath11k_update_per_peer_tx_stats() 1483 u8 user; in ath11k_htt_update_ppdu_stats() local 1485 for (user = 0; user < HTT_PPDU_STATS_MAX_USERS - 1; user++) in ath11k_htt_update_ppdu_stats() 1486 ath11k_update_per_peer_tx_stats(ar, ppdu_stats, user); in ath11k_htt_update_ppdu_stats() 1325 ath11k_update_per_peer_tx_stats(struct ath11k *ar, struct htt_ppdu_stats *ppdu_stats, u8 user) ath11k_update_per_peer_tx_stats() argument
|
| /kernel/linux/linux-6.6/drivers/net/wireless/ath/ath12k/ |
| H A D | dp_rx.c | 1324 struct htt_ppdu_stats *ppdu_stats, u8 user) in ath12k_update_per_peer_tx_stats() 1332 struct htt_ppdu_user_stats *usr_stats = &ppdu_stats->user_stats[user]; in ath12k_update_per_peer_tx_stats() 1474 u8 user; in ath12k_htt_update_ppdu_stats() local 1476 for (user = 0; user < HTT_PPDU_STATS_MAX_USERS - 1; user++) in ath12k_htt_update_ppdu_stats() 1477 ath12k_update_per_peer_tx_stats(ar, ppdu_stats, user); in ath12k_htt_update_ppdu_stats() 1323 ath12k_update_per_peer_tx_stats(struct ath12k *ar, struct htt_ppdu_stats *ppdu_stats, u8 user) ath12k_update_per_peer_tx_stats() argument
|
| /kernel/linux/linux-5.10/arch/m68k/ifpsp060/src/ |
| H A D | fpsp.S | 32 # and contains the entry points into the package. The user, in 1214 btst &0x5,EXC_SR(%a6) # user or supervisor mode? 1217 mov.l %usp,%a0 # fetch user stack pointer 1322 # emulation routine that has also been enabled by the user. 1550 # emulation routine that has also been enabled by the user. 1560 # address register was the stack pointer used from user mode, then let's update 1724 # exception occurred from user mode, then simply update a7 and exit normally. 1867 # emulation routine that has also been enabled by the user. 1883 btst &0x5,EXC_SR(%a6) # user or supervisor? 1886 mov.l EXC_A7(%a6),%a0 # update user a [all...] |
| /kernel/linux/linux-6.6/arch/m68k/ifpsp060/src/ |
| H A D | fpsp.S | 32 # and contains the entry points into the package. The user, in 1214 btst &0x5,EXC_SR(%a6) # user or supervisor mode? 1217 mov.l %usp,%a0 # fetch user stack pointer 1322 # emulation routine that has also been enabled by the user. 1550 # emulation routine that has also been enabled by the user. 1560 # address register was the stack pointer used from user mode, then let's update 1724 # exception occurred from user mode, then simply update a7 and exit normally. 1867 # emulation routine that has also been enabled by the user. 1883 btst &0x5,EXC_SR(%a6) # user or supervisor? 1886 mov.l EXC_A7(%a6),%a0 # update user a [all...] |
| /kernel/linux/linux-5.10/arch/powerpc/kernel/ |
| H A D | vdso.c | 16 #include <linux/user.h>
|
| /kernel/linux/linux-5.10/arch/x86/kernel/ |
| H A D | process.c | 20 #include <linux/user-return-notifier.h> 68 * runs user code, but cpu_current_top_of_stack should still 183 * An IO thread is a user space thread, but it doesn't in copy_thread() 353 * user mode. in switch_to_bitmap() 413 * access from user space to trigger a #GP because tbe bitmap is outside in native_tss_update_io_bitmap()
|
| /kernel/linux/linux-5.10/arch/sparc/kernel/ |
| H A D | process_64.c | 28 #include <linux/user.h>
|
| /kernel/linux/linux-5.10/arch/x86/boot/ |
| H A D | header.S | 73 # Allow the user to press a key, then reboot
|
| /kernel/linux/linux-5.10/arch/parisc/kernel/ |
| H A D | ptrace.c | 19 #include <linux/user.h> 101 * value such that it traps once back in user space. We in user_enable_single_step()
|
| /kernel/linux/linux-5.10/arch/powerpc/platforms/pseries/ |
| H A D | setup.c | 22 #include <linux/user.h> 436 * out to the user, since this is called very late in kexec in pseries_big_endian_exceptions() 861 /* PAPR says we can only set kernel and user bits */ in pseries_set_xdabr()
|
| /kernel/linux/linux-5.10/tools/testing/selftests/powerpc/ptrace/ |
| H A D | ptrace.h | 22 #include <sys/user.h>
|
| /kernel/linux/linux-6.6/arch/arm/vfp/ |
| H A D | vfpmodule.c | 19 #include <linux/user.h>
|
| /kernel/linux/linux-6.6/arch/parisc/kernel/ |
| H A D | ptrace.c | 18 #include <linux/user.h> 100 * value such that it traps once back in user space. We in user_enable_single_step()
|
| /kernel/linux/linux-6.6/arch/s390/kernel/ |
| H A D | cert_store.c | 25 #include <keys/user-type.h> 151 * user key but cannot be updated. 305 pr_dbf_msg("Couldn't get user session keyring: %ld", in get_user_session_keyring()
|
| /kernel/linux/linux-6.6/arch/sparc/kernel/ |
| H A D | process_64.c | 25 #include <linux/user.h>
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/sfc/falcon/ |
| H A D | net_driver.h | 670 * @rxq_entries: Size of receive queues requested by user. 671 * @txq_entries: Size of transmit queues requested by user. 1088 int (*rx_push_rss_config)(struct ef4_nic *efx, bool user,
|
| /kernel/linux/linux-5.10/drivers/scsi/aic7xxx/ |
| H A D | aic7xxx.h | 556 * don't want to upset the user. This 678 #define AHC_TRANS_USER 0x08 /* Modify user negotiation settings */ 698 * Per-initiator current, goal and user transfer negotiation information. */ 703 struct ahc_transinfo user; member
|
| /kernel/linux/linux-5.10/fs/nfs/ |
| H A D | nfs4idmap.c | 46 #include <keys/user-type.h> 393 { Opt_find_user, "user:%s" }, 787 ret = nfs_idmap_lookup_name(id, "user", buf, buflen, idmap); in nfs_map_uid_to_name()
|
| /kernel/linux/linux-5.10/fs/ecryptfs/ |
| H A D | ecryptfs_kernel.h | 18 #include <keys/user-type.h> 38 #define ECRYPTFS_XATTR_NAME "user.ecryptfs" 279 * @global_auth_tok_key: The key from the user's keyring for the sig 284 * in the user keyring that apply to newly created files. A list of
|
| /kernel/linux/linux-5.10/fs/proc/ |
| H A D | kcore.c | 17 #include <linux/user.h> 496 /* we have to zero-fill user buffer even if no read */ in read_kcore() 511 * hardened user copy kernel text checks. in read_kcore()
|