Searched refs:userspace (Results 1 – 25 of 28) sorted by relevance
12
/arch/unicore32/ |
D | Kconfig.debug | 9 If this option is disabled, you allow userspace (root) access to all 10 of memory, including kernel and userspace memory. Accidental 15 userspace access to memory mapped peripherals.
|
/arch/cris/arch-v32/lib/ |
D | checksumcopy.S | 30 1: ;; A failing userspace access (the read) will have this as PC. 71 2: ;; A failing userspace access for the read below will have this as PC. 87 3: ;; A failing userspace access for the read below will have this as PC.
|
/arch/s390/ |
D | Kconfig.debug | 13 disabled, you allow userspace access to all memory, including 14 kernel and userspace memory. Accidental memory access is likely
|
/arch/cris/arch-v10/lib/ |
D | checksumcopy.S | 40 1: ;; A failing userspace access will have this as PC. 103 2: ;; A failing userspace access will have this as PC. 122 3: ;; A failing userspace access will have this as PC.
|
/arch/mips/oprofile/ |
D | backtrace.c | 168 const int userspace = user_mode(regs); in op_mips_backtrace() local 171 if (userspace) in op_mips_backtrace()
|
/arch/mn10300/kernel/ |
D | profile-low.S | 36 # ignore userspace
|
D | entry.S | 147 # userspace resumption stub bypassing syscall exit tracing 155 # returning to userspace
|
/arch/s390/kvm/ |
D | Kconfig | 42 controlled by userspace.
|
/arch/um/kernel/ |
D | process.c | 154 userspace(¤t->thread.regs.regs); in new_thread_handler() 178 userspace(¤t->thread.regs.regs); in fork_handler()
|
/arch/m32r/kernel/ |
D | entry.S | 141 ; userspace resumption stub bypassing syscall exit tracing
|
/arch/x86/ |
D | Kconfig.debug | 11 If this option is disabled, you allow userspace (root) access to all 12 of memory, including kernel and userspace memory. Accidental 19 userspace access to PCI space and the BIOS code and data regions. 73 bool "Export kernel pagetable layout to userspace via debugfs"
|
/arch/mn10300/include/asm/ |
D | frame.inc | 69 mov d0,(TI_frame,a0) # userspace has regs->next == 0
|
/arch/m68k/math-emu/ |
D | fp_util.S | 206 | originally used to get longdouble from userspace, now it's
|
/arch/um/include/shared/ |
D | os.h | 265 extern void userspace(struct uml_pt_regs *regs);
|
/arch/arm/ |
D | Kconfig.debug | 9 If this option is disabled, you allow userspace (root) access to all 10 of memory, including kernel and userspace memory. Accidental 15 userspace access to memory mapped peripherals.
|
/arch/frv/ |
D | Kconfig | 143 bool "Protect core kernel against userspace" 149 prevent userspace accessing the underlying memory directly.
|
/arch/powerpc/ |
D | Kconfig.debug | 327 disabled, you allow userspace access to all memory, including 328 kernel and userspace memory. Accidental memory access is likely
|
/arch/frv/kernel/ |
D | entry-table.S | 323 # userspace atomic op emulation, traps 120-126
|
D | entry.S | 69 # entry point for External interrupts received whilst executing userspace code 659 # handle atomic operation emulation for userspace
|
D | switch_to.S | 31 # address of frame 0 (userspace) on current kernel stack
|
D | break.S | 439 # to get a BREAK fault not an access violation should the return be to userspace
|
/arch/um/os-Linux/skas/ |
D | process.c | 342 void userspace(struct uml_pt_regs *regs) in userspace() function
|
/arch/arm/mm/ |
D | proc-v7.S | 267 mcr p14, 6, r0, c0, c0, 0 @ stop userspace TEEHBR access
|
D | Kconfig | 685 instructions for userspace (not kernel) using LDREX/STREX. 810 helper code to userspace in read only form at a fixed location 811 in the high vector page to allow userspace to be independent of
|
/arch/x86/kernel/ |
D | entry_32.S | 317 # userspace resumption stub bypassing syscall exit tracing 338 jb resume_kernel # not returning to v8086 or userspace
|
12