| /kernel/linux/linux-6.6/arch/xtensa/kernel/ |
| H A D | align.S | 367 bbsi.l a0, PS_UM_BIT, 2f # jump if user mode 558 bbsi.l a0, PS_UM_BIT, 1f # jump if user mode
|
| /kernel/liteos_a/kernel/base/ipc/ |
| H A D | los_signal.c | 226 /* If requested, copy the old mask to user. */ in OsSigprocMask() 406 /* Kernel process always has kill permission and user process should check permission */ in SendSigPermissionCheck() 408 if ((current != spcb) && (!IsCapPermit(CAP_KILL)) && (current->user->userID != spcb->user->userID)) { in SendSigPermissionCheck()
|
| /kernel/linux/linux-6.6/drivers/sbus/char/ |
| H A D | openprom.c | 7 * This character device driver allows user programs to access the 54 * Copy an openpromio structure into kernel space from user space. 58 * of the user supplied buffer. 121 * Copy an openpromio structure in kernel space back to user space. 374 static char * copyin_string(char __user *user, size_t len) in copyin_string() argument 379 return memdup_user_nul(user, len); in copyin_string()
|
| /kernel/linux/linux-5.10/security/selinux/ss/ |
| H A D | policydb.c | 551 * of a class, role, or user are needed. 939 if (!c->user || c->user > p->p_users.nprim) in policydb_context_isvalid() 957 usrdatum = p->user_val_to_struct[c->user - 1]; in policydb_context_isvalid() 962 /* user may not be associated with role */ in policydb_context_isvalid() 1047 c->user = le32_to_cpu(buf[0]); in context_read_and_validate() 1658 struct user_datum *upper, *user; in user_bounds_sanity_check() local 1662 upper = user = datum; in user_bounds_sanity_check() 1668 pr_err("SELinux: user %s: " in user_bounds_sanity_check() 1675 ebitmap_for_each_positive_bit(&user in user_bounds_sanity_check() [all...] |
| /kernel/linux/linux-5.10/net/netfilter/ipvs/ |
| H A D | ip_vs_ctl.c | 720 /* Release dest_dst and dst_cache for dest in user context */ 1362 /* I'm the first user of the service */ in ip_vs_add_service() 2775 do_ip_vs_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) in do_ip_vs_get_ctl() argument 2797 if (copy_from_user(arg, user, copylen) != 0) in do_ip_vs_get_ctl() 2819 if (copy_to_user(user, &d, sizeof(d)) != 0) in do_ip_vs_get_ctl() 2833 if (copy_to_user(user, buf, strlen(buf)+1) != 0) { in do_ip_vs_get_ctl() 2847 if (copy_to_user(user, &info, sizeof(info)) != 0) in do_ip_vs_get_ctl() 2864 ret = __ip_vs_get_service_entries(ipvs, get, user); in do_ip_vs_get_ctl() 2886 if (copy_to_user(user, entry, sizeof(*entry)) != 0) in do_ip_vs_get_ctl() 2905 ret = __ip_vs_get_dest_entries(ipvs, get, user); in do_ip_vs_get_ctl() [all...] |
| /kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/dispnv50/ |
| H A D | disp.c | 93 &chan->user); in nv50_chan_create() 95 nvif_object_map(&chan->user, NULL, 0); in nv50_chan_create() 110 nvif_object_dtor(&chan->user); in nv50_chan_destroy() 147 NVIF_WV32(&dmac->base.user, NV507C, PUT, PTR, dmac->cur); in nv50_dmac_kick() 157 u32 get = NVIF_RV32(&dmac->base.user, NV507C, GET, PTR); in nv50_dmac_free() 169 u32 get = NVIF_RV32(&dmac->base.user, NV507C, GET, PTR); in nv50_dmac_wind() 176 if (NVIF_TV32(&dmac->base.user, NV507C, GET, PTR, >, 0)) in nv50_dmac_wind() 276 ret = nvif_object_ctor(&dmac->base.user, "kmsSyncCtxDma", NV50_DISP_HANDLE_SYNCBUF, in nv50_dmac_create() 288 ret = nvif_object_ctor(&dmac->base.user, "kmsVramCtxDma", NV50_DISP_HANDLE_VRAM, in nv50_dmac_create()
|
| /kernel/linux/linux-6.6/security/selinux/ss/ |
| H A D | policydb.c | 546 * of a class, role, or user are needed. 934 if (!c->user || c->user > p->p_users.nprim) in policydb_context_isvalid() 952 usrdatum = p->user_val_to_struct[c->user - 1]; in policydb_context_isvalid() 957 /* user may not be associated with role */ in policydb_context_isvalid() 1042 c->user = le32_to_cpu(buf[0]); in context_read_and_validate() 1656 struct user_datum *upper, *user; in user_bounds_sanity_check() local 1660 upper = user = datum; in user_bounds_sanity_check() 1666 pr_err("SELinux: user %s: " in user_bounds_sanity_check() 1673 ebitmap_for_each_positive_bit(&user in user_bounds_sanity_check() [all...] |
| /kernel/linux/linux-5.10/arch/m68k/fpsp040/ |
| H A D | setox.S | 156 | 6.3 Restore the user FPCR 174 | 7.2 Restore user FPCR. 200 | 9.4 Restore user FPCR. 216 | precision prescribed by the user FPCR. 280 | 6.6 Restore user FPCR. 295 | Notes: The idea is to return "X - tiny" under the user 324 | Restore user FPCR 327 | in the user rounding precision and mode. 566 fmovel %d1,%FPCR | ...restore user FPCR 574 fadds #0x3F800000,%fp0 | ...1+X in user mod [all...] |
| /kernel/linux/linux-5.10/drivers/net/ethernet/intel/ice/ |
| H A D | ice_ethtool_fdir.c | 399 * ice_parse_rx_flow_user_data - deconstruct user-defined data 1052 * @user: user defined data from flow specification 1058 struct ice_rx_flow_userdef *user) in ice_cfg_fdir_xtrct_seq() 1126 if (user && user->flex_fltr) { in ice_cfg_fdir_xtrct_seq() 1128 ice_flow_add_fld_raw(seg, user->flex_offset, in ice_cfg_fdir_xtrct_seq() 1132 ice_flow_add_fld_raw(&tun_seg[1], user->flex_offset, in ice_cfg_fdir_xtrct_seq() 1057 ice_cfg_fdir_xtrct_seq(struct ice_pf *pf, struct ethtool_rx_flow_spec *fsp, struct ice_rx_flow_userdef *user) ice_cfg_fdir_xtrct_seq() argument
|
| /kernel/linux/linux-6.6/arch/m68k/fpsp040/ |
| H A D | setox.S | 156 | 6.3 Restore the user FPCR 174 | 7.2 Restore user FPCR. 200 | 9.4 Restore user FPCR. 216 | precision prescribed by the user FPCR. 280 | 6.6 Restore user FPCR. 295 | Notes: The idea is to return "X - tiny" under the user 324 | Restore user FPCR 327 | in the user rounding precision and mode. 566 fmovel %d1,%FPCR | ...restore user FPCR 574 fadds #0x3F800000,%fp0 | ...1+X in user mod [all...] |
| /kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/ |
| H A D | vmm.c | 777 new->user = vma->user; in nvkm_vma_tail() 962 vma->user ? 'U' : '-', in nvkm_vma_dump() 1027 vma->user = true; in nvkm_vmm_ctor_managed() 1618 vma->user = false; in nvkm_vmm_put_locked()
|
| /kernel/linux/linux-5.10/drivers/video/fbdev/ |
| H A D | udlfb.c | 958 static int dlfb_ops_open(struct fb_info *info, int user) in dlfb_ops_open() argument 965 * not what the user wants. Fail by default with option to enable. in dlfb_ops_open() 967 if ((user == 0) && (!console)) in dlfb_ops_open() 992 dev_dbg(info->dev, "open, user=%d fb_info=%p count=%d\n", in dlfb_ops_open() 993 user, info, dlfb->fb_count); in dlfb_ops_open() 1033 static int dlfb_ops_release(struct fb_info *info, int user) in dlfb_ops_release() argument 1045 dev_dbg(info->dev, "release, user=%d count=%d\n", user, dlfb->fb_count); in dlfb_ops_release() 1382 * But at least the user has a chance to choose in dlfb_setup_modes()
|
| H A D | smscufx.c | 1064 static int ufx_ops_open(struct fb_info *info, int user) in ufx_ops_open() argument 1070 * not what the user wants. Fail by default with option to enable. */ in ufx_ops_open() 1071 if (user == 0 && !console) in ufx_ops_open() 1101 pr_debug("open /dev/fb%d user=%d fb_info=%p count=%d", in ufx_ops_open() 1102 info->node, user, info, dev->fb_count); in ufx_ops_open() 1165 static int ufx_ops_release(struct fb_info *info, int user) in ufx_ops_release() argument 1183 pr_debug("released /dev/fb%d user=%d count=%d", in ufx_ops_release() 1184 info->node, user, dev->fb_count); in ufx_ops_release() 1573 * But at least the user has a chance to choose in ufx_setup_modes()
|
| /kernel/linux/linux-5.10/net/ax25/ |
| H A D | af_ax25.c | 299 * This is called from user mode and the timers. Thus it protects itself 1082 ax25_uid_assoc *user; in ax25_bind() local 1099 user = ax25_findbyuid(current_euid()); in ax25_bind() 1100 if (user) { in ax25_bind() 1101 call = user->call; in ax25_bind() 1102 ax25_uid_put(user); in ax25_bind() 1610 /* Add the PID if one is not supplied by the user in the skb */ in ax25_sendmsg() 1773 /* These two are safe on a single CPU system as only user tasks fiddle here */ in ax25_ioctl()
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/intel/ice/ |
| H A D | ice_ethtool_fdir.c | 474 * ice_parse_rx_flow_user_data - deconstruct user-defined data 1198 * @user: user defined data from flow specification 1204 struct ice_rx_flow_userdef *user) in ice_cfg_fdir_xtrct_seq() 1272 if (user && user->flex_fltr) { in ice_cfg_fdir_xtrct_seq() 1274 ice_flow_add_fld_raw(seg, user->flex_offset, in ice_cfg_fdir_xtrct_seq() 1278 ice_flow_add_fld_raw(&tun_seg[1], user->flex_offset, in ice_cfg_fdir_xtrct_seq() 1660 * This function updates destination VSI and queue if user specifies 1735 /* Record the original queue index as specified by user in ice_set_fdir_input_set() 1203 ice_cfg_fdir_xtrct_seq(struct ice_pf *pf, struct ethtool_rx_flow_spec *fsp, struct ice_rx_flow_userdef *user) ice_cfg_fdir_xtrct_seq() argument [all...] |
| /kernel/linux/linux-6.6/drivers/spi/ |
| H A D | spi-mtk-snfi.c | 665 struct nand_ecc_props *user = &nand->ecc.user_conf; in mtk_snand_ecc_init_ctx() local 684 if (user->step_size && user->strength) { in mtk_snand_ecc_init_ctx() 685 step_size = user->step_size; in mtk_snand_ecc_init_ctx() 686 strength = user->strength; in mtk_snand_ecc_init_ctx() 709 // if there's a user requested strength, find the minimum strength that in mtk_snand_ecc_init_ctx()
|
| /kernel/linux/linux-6.6/drivers/video/fbdev/ |
| H A D | smscufx.c | 1065 static int ufx_ops_open(struct fb_info *info, int user) in ufx_ops_open() argument 1071 * not what the user wants. Fail by default with option to enable. */ in ufx_ops_open() 1072 if (user == 0 && !console) in ufx_ops_open() 1102 pr_debug("open /dev/fb%d user=%d fb_info=%p count=%d", in ufx_ops_open() 1103 info->node, user, info, dev->fb_count); in ufx_ops_open() 1166 static int ufx_ops_release(struct fb_info *info, int user) in ufx_ops_release() argument 1184 pr_debug("released /dev/fb%d user=%d count=%d", in ufx_ops_release() 1185 info->node, user, dev->fb_count); in ufx_ops_release() 1574 * But at least the user has a chance to choose in ufx_setup_modes()
|
| H A D | udlfb.c | 958 static int dlfb_ops_open(struct fb_info *info, int user) in dlfb_ops_open() argument 965 * not what the user wants. Fail by default with option to enable. in dlfb_ops_open() 967 if ((user == 0) && (!console)) in dlfb_ops_open() 993 dev_dbg(info->dev, "open, user=%d fb_info=%p count=%d\n", in dlfb_ops_open() 994 user, info, dlfb->fb_count); in dlfb_ops_open() 1034 static int dlfb_ops_release(struct fb_info *info, int user) in dlfb_ops_release() argument 1046 dev_dbg(info->dev, "release, user=%d count=%d\n", user, dlfb->fb_count); in dlfb_ops_release() 1383 * But at least the user has a chance to choose in dlfb_setup_modes()
|
| /kernel/linux/linux-6.6/net/ax25/ |
| H A D | af_ax25.c | 303 * This is called from user mode and the timers. Thus it protects itself 1091 ax25_uid_assoc *user; in ax25_bind() local 1108 user = ax25_findbyuid(current_euid()); in ax25_bind() 1109 if (user) { in ax25_bind() 1110 call = user->call; in ax25_bind() 1111 ax25_uid_put(user); in ax25_bind() 1619 /* Add the PID if one is not supplied by the user in the skb */ in ax25_sendmsg() 1782 /* These two are safe on a single CPU system as only user tasks fiddle here */ in ax25_ioctl()
|
| /kernel/linux/linux-5.10/net/core/ |
| H A D | skbuff.c | 1052 * supplied by the user. 1066 struct user_struct *user; in mm_account_pinned_pages() local 1073 user = mmp->user ? : current_user(); in mm_account_pinned_pages() 1076 old_pg = atomic_long_read(&user->locked_vm); in mm_account_pinned_pages() 1080 } while (atomic_long_cmpxchg(&user->locked_vm, old_pg, new_pg) != in mm_account_pinned_pages() 1083 if (!mmp->user) { in mm_account_pinned_pages() 1084 mmp->user = get_uid(user); in mm_account_pinned_pages() 1096 if (mmp->user) { in mm_unaccount_pinned_pages() [all...] |
| /kernel/linux/linux-6.6/net/core/ |
| H A D | skbuff.c | 1486 * supplied by the user. 1500 struct user_struct *user; in mm_account_pinned_pages() local 1511 user = mmp->user ? : current_user(); in mm_account_pinned_pages() 1513 old_pg = atomic_long_read(&user->locked_vm); in mm_account_pinned_pages() 1518 } while (!atomic_long_try_cmpxchg(&user->locked_vm, &old_pg, new_pg)); in mm_account_pinned_pages() 1520 if (!mmp->user) { in mm_account_pinned_pages() 1521 mmp->user = get_uid(user); in mm_account_pinned_pages() 1533 if (mmp->user) { in mm_unaccount_pinned_pages() [all...] |
| /kernel/linux/linux-5.10/arch/arm/kernel/ |
| H A D | process.c | 19 #include <linux/user.h> 103 * Get the domain register for the parent context. In user in __show_regs() 155 segment = "user"; in __show_regs() 311 * The vectors page is always readable from user space for the
|
| /kernel/linux/linux-5.10/arch/powerpc/platforms/maple/ |
| H A D | setup.c | 20 #include <linux/user.h>
|
| /kernel/linux/linux-5.10/arch/mips/kernel/ |
| H A D | scall32-o32.S | 42 * stack arguments from the user stack to the kernel stack. 45 lw t0, PT_R29(sp) # get old user stack pointer
|
| H A D | scall64-o32.S | 59 * stack arguments from the user stack to the kernel stack. 65 ld t0, PT_R29(sp) # get old user stack pointer
|