| /linux/tools/testing/selftests/uevent/ |
| H A D | uevent_filtering.c | 382 * - Open uevent listening socket in initial network namespace owned by in TEST() 384 * - Trigger uevent in initial network namespace owned by initial user in TEST() 397 * owned by initial user namespace. in TEST() 398 * - Trigger uevent in initial network namespace owned by initial user in TEST() 412 * owned by initial user namespace. in TEST() 413 * - Trigger uevent in initial network namespace owned by initial user in TEST() 426 * owned by non-initial user namespace. in TEST() 427 * - Trigger uevent in initial network namespace owned by initial user in TEST() 440 * owned by initial user namespace. in TEST() 442 * - Trigger uevent in initial network namespace owned by initial user in TEST() [all …]
|
| /linux/drivers/firmware/imx/ |
| H A D | rm.c | 17 * This function check @resource is owned by current partition or not 22 * @return Returns 0 for not owned and 1 for owned. 38 * for resource owned check which means not owned or owned. in imx_sc_rm_is_resource_owned()
|
| /linux/drivers/net/ovpn/ |
| H A D | socket.c | 49 * ovpn_socket_release - release resources owned by socket user 142 /* a TCP socket can only be owned by a single peer, therefore there in ovpn_socket_new() 151 * sure it is not owned by something else in ovpn_socket_new() 156 /* socket owned by other encapsulation module */ in ovpn_socket_new() 165 /* socket owned by another ovpn instance, we can't use it */ in ovpn_socket_new() 172 /* this socket is already owned by this instance, in ovpn_socket_new() 192 /* socket is not owned: attach to this ovpn instance */ in ovpn_socket_new()
|
| /linux/rust/kernel/ |
| H A D | types.rs | 31 /// Type used to immutably borrow a value that is currently foreign-owned. 34 /// Type used to mutably borrow a value that is currently foreign-owned. 37 /// Converts a Rust-owned object to a foreign-owned one. 55 /// Converts a foreign-owned object back to a Rust-owned one. 65 /// Tries to convert a foreign-owned object back to a Rust-owned one. 85 /// Borrows a foreign-owned object immutably. 87 /// This method provides a way to access a foreign-owned value from Rust immutably. It provides 88 /// you with exactly the same abilities as an `&Self` when the value is Rust-owned. 100 /// Borrows a foreign-owned object mutably. 102 /// This method provides a way to access a foreign-owned value from Rust mutably. It provides [all …]
|
| H A D | opp.rs | 501 // Ensure the closure does not accidentally drop owned data; if violated, the compiler in set() 690 // SAFETY: The cpumask is valid and the returned pointer will be owned by the [`Table`] in from_of_cpumask() 858 // its safety requirements. The returned pointer will be owned by the new in opp_from_freq() 871 // requirements. The returned pointer will be owned by the new [`OPP`] instance. in opp_from_freq() 877 // requirements. The returned pointer will be owned by the new [`OPP`] instance. in opp_from_freq() 893 // requirements. The returned pointer will be owned by the new [`OPP`] instance. in opp_from_level() 897 // requirements. The returned pointer will be owned by the new [`OPP`] instance. in opp_from_level() 903 // requirements. The returned pointer will be owned by the new [`OPP`] instance. in opp_from_level() 922 // requirements. The returned pointer will be owned by the new [`OPP`] instance. in opp_from_bw() 928 // requirements. The returned pointer will be owned by the new [`OPP`] instance. in opp_from_bw() [all …]
|
| /linux/tools/testing/selftests/namespaces/ |
| H A D | listns_permissions_test.c | 133 * all namespaces owned by that user namespace. 186 /* Create several namespaces owned by this user namespace */ in TEST() 191 /* List namespaces owned by our user namespace */ in TEST() 201 * so we should see all namespaces owned by it. in TEST() 227 TH_LOG("User with CAP_SYS_ADMIN saw %zd namespaces owned by their user namespace", in TEST() 234 * owned namespaces. 264 /* Create network namespace owned by user namespace A */ in TEST() 407 /* Create some namespaces owned by this user namespace */ in TEST() 418 /* List with LISTNS_CURRENT_USER - should see our owned namespaces */ in TEST() 447 * child user namespace's owned namespaces. [all …]
|
| H A D | listns_test.c | 174 * List namespaces owned by current user namespace. 199 TH_LOG("Found %zd namespaces owned by current user namespace", ret); in TEST() 388 /* Create some namespaces owned by this user namespace */ in TEST() 414 /* List namespaces owned by this user namespace */ in TEST() 429 TH_LOG("Found %zd namespaces owned by user namespace %llu", ret, in TEST()
|
| /linux/scripts/gendwarfksyms/ |
| H A D | types.c | 18 * A simple linked list of shared or owned strings to avoid copying strings 23 void *owned; member 33 if (entry->owned) in type_list_free() 34 free(entry->owned); in type_list_free() 41 static int type_list_append(struct list_head *list, const char *s, void *owned) in type_list_append() argument 50 entry->owned = owned; in type_list_append() 92 void *owned) in type_expansion_append() argument 94 type->len += type_list_append(&type->expanded, s, owned); in type_expansion_append()
|
| /linux/kernel/locking/ |
| H A D | rwsem.c | 39 * - Bit 0: RWSEM_READER_OWNED - rwsem may be owned by readers (just a hint) 40 * - Bit 1: RWSEM_NONSPINNABLE - Cannot spin on a reader-owned lock 42 * When the rwsem is reader-owned and a spinning writer has timed out, 51 * for a free or reader-owned rwsem, the owner value may contain 55 * seems to hang on a reader owned rwsem especially if only one reader 60 * is previously owned by a writer and the following conditions are met: 61 * - rwsem is not currently writer owned 165 * Note that the owner value just indicates the task has owned the rwsem 196 * Return true if the rwsem is owned by a reader. 212 * it will make sure that the owner field of a reader-owned rwsem either [all …]
|
| /linux/arch/x86/include/asm/ |
| H A D | mc146818rtc.h | 19 * special properties. It is owned by a CPU and stores the index register 20 * currently being accessed (if owned). The idea here is that it works 28 * a non-SMP machine just to mark that the lock is owned.
|
| /linux/arch/x86/kernel/cpu/mce/ |
| H A D | intel.c | 37 * disables CMCI on all banks owned by the cpu and clears this bitfield. At 40 * owned by the offlined cpu. 178 unsigned long *owned = (void *)this_cpu_ptr(&mce_banks_owned); in cmci_skip_bank() local 180 if (test_bit(bank, owned)) in cmci_skip_bank() 189 /* Already owned by someone else? */ in cmci_skip_bank() 191 clear_bit(bank, owned); in cmci_skip_bank() 305 * all the CMCI owned banks.
|
| /linux/Documentation/locking/ |
| H A D | rt-mutex-design.rst | 47 grab lock L1 (owned by C) 65 process blocks on a lock owned by the current process. To make this easier 68 This time, when A blocks on the lock owned by C, C would inherit the priority 209 a tree of all top waiters of the mutexes that are owned by the process. 211 blocked on mutexes owned by the process. 214 is waiting on a mutex that is owned by the task. So if the task has 305 mutex is not owned, this owner is set to NULL. Since all architectures 357 priority process that is waiting any of mutexes owned by the task. Since 372 process has just blocked on a mutex owned by the task, rt_mutex_adjust_prio 376 always contains the highest priority task that is waiting on a mutex owned
|
| /linux/usr/ |
| H A D | Kconfig | 40 If INITRAMFS_SOURCE points to a directory, files owned by this UID 41 (-1 = current user) will be owned by root in the resulting image. 50 If INITRAMFS_SOURCE points to a directory, files owned by this GID 51 (-1 = current group) will be owned by root in the resulting image.
|
| /linux/drivers/net/ethernet/altera/ |
| H A D | altera_sgdmahw.h | 37 * bit 7: hardware owned 82 * bit 17: clears owned by hardware if 0, does not clear otherwise 112 #define SGDMA_CTRLREG_COBHW BIT(17)/* Clears owned by hardware */
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | verifier_global_ptr_args.c | 164 struct task_struct *owned; in subprog_trusted_acq_rel() local 166 owned = bpf_task_acquire(task); in subprog_trusted_acq_rel() 167 if (!owned) in subprog_trusted_acq_rel() 170 bpf_task_release(owned); /* this one is OK, we acquired it locally */ in subprog_trusted_acq_rel()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | linked_list.c | 533 while (test__start_subtest("btf: owning | owned AA cycle")) { in test_btf() 559 while (test__start_subtest("btf: owning | owned ABA cycle")) { in test_btf() 600 while (test__start_subtest("btf: owning -> owned")) { in test_btf() 629 while (test__start_subtest("btf: owning -> owning | owned -> owned")) { in test_btf() 673 while (test__start_subtest("btf: owning | owned -> owning | owned -> owned")) { in test_btf() 720 while (test__start_subtest("btf: owning -> owning | owned -> owning | owned -> owned")) { in test_btf()
|
| /linux/arch/arm64/kvm/hyp/include/nvhe/ |
| H A D | memory.h | 14 * 00: The page is owned and exclusively accessible by the component; 15 * 01: The page is owned and accessible by the component, but is also 17 * 10: The page is accessible but not owned by the component;
|
| /linux/include/linux/ns/ |
| H A D | nstree_types.h | 42 * @ns_owner_node: Node in the owner namespace's tree of owned namespaces 43 * @ns_owner_root: Root of the tree of namespaces owned by this namespace
|
| /linux/Documentation/filesystems/ |
| H A D | idmappings.rst | 178 owned by ``u1000``: 235 ``u0:k20000:r10000`` and it reads a file owned by ``u1000`` from disk. This 247 Consequently the user would see that this file is owned by ``u4000``. 586 ``dir`` and all files below it would continue to appear owned by the overflowid 594 owned by ``u1000``. At uni or at work they may have another login id such as 738 Assume a file owned by ``u1000`` is read from disk. The filesystem maps this id 792 also be reported as being owned by ``u1000`` and vica versa. 935 filesystem's idmapping via the mount's idmapping. The file is now owned by 960 are owned by ``u1000`` whereas at uni or work they have login id ``u1125``. 965 mix of files and directories owned by ``u1000`` and ``u1125``. [all …]
|
| H A D | omfs.rst | 37 uid=n make all files owned by specified user 38 gid=n make all files owned by specified group
|
| /linux/drivers/vfio/ |
| H A D | iommufd.c | 85 * valid ID for the device that is owned by the ictx 86 * -ENOENT = device is owned but there is no ID 87 * -ENODEV or other error = device is not owned
|
| /linux/rust/proc-macro2/ |
| H A D | rcvec.rs | 57 let vec = if let Some(owned) = Rc::get_mut(&mut self.inner) { in make_owned() 58 mem::take(owned) in make_owned()
|
| /linux/drivers/usb/host/ |
| H A D | ehci-sysfs.c | 41 new_owner = PORT_OWNER; /* Owned by companion */ in companion_store() 46 new_owner = 0; /* Owned by EHCI */ in companion_store()
|
| /linux/drivers/interconnect/qcom/ |
| H A D | icc-rpm.h | 51 * @bus_clk: a pointer to a HLOS-owned bus clock 77 * @ap_owned: indicates if the node is owned by the AP or by the RPM
|
| /linux/include/uapi/linux/ |
| H A D | dqblk_xfs.h | 62 __u64 d_bcount; /* # disk blocks owned by the user */ 63 __u64 d_icount; /* # inodes owned by the user */ 76 __u64 d_rtbcount; /* # realtime blocks owned */
|