/linux/fs/ |
A D | file.c | 429 struct files_struct * files = tsk->files; in exit_files() local 472 struct files_struct *files = current->files; in alloc_fd() local 549 struct files_struct *files = current->files; in put_unused_fd() local 575 struct files_struct *files = current->files; in fd_install() local 635 struct files_struct *files = current->files; in close_fd() local 771 struct files_struct *files = current->files; in __close_fd_get_file() local 798 struct files_struct *files = current->files; in close_fd_get_file() local 953 files = task->files; in task_lookup_fd_rcu() 969 files = task->files; in task_lookup_next_fd_rcu() 1000 struct files_struct *files = current->files; in __fget_light() local [all …]
|
A D | pipe.c | 80 if (pipe->files) in pipe_lock_nested() 95 if (pipe->files) in pipe_unlock() 702 if (!--pipe->files) { in put_pipe_info() 882 pipe->files = 2; in get_pipe_inode() 980 fput(files[0]); in __do_pipe_flags() 981 fput(files[1]); in __do_pipe_flags() 987 struct file *files[2]; in do_pipe_flags() local 1009 fput(files[0]); in do_pipe2() 1010 fput(files[1]); in do_pipe2() 1100 pipe->files++; in fifo_open() [all …]
|
/linux/include/linux/ |
A D | fdtable.h | 74 #define rcu_dereference_check_fdtable(files, fdtfd) \ argument 75 rcu_dereference_check((fdtfd), lockdep_is_held(&(files)->file_lock)) 77 #define files_fdtable(files) \ argument 78 rcu_dereference_check_fdtable((files), (files)->fdt) 83 static inline struct file *files_lookup_fd_raw(struct files_struct *files, unsigned int fd) in files_lookup_fd_raw() argument 85 struct fdtable *fdt = rcu_dereference_raw(files->fdt); in files_lookup_fd_raw() 96 RCU_LOCKDEP_WARN(!lockdep_is_held(&files->file_lock), in files_lookup_fd_locked() 98 return files_lookup_fd_raw(files, fd); in files_lookup_fd_locked() 101 static inline struct file *files_lookup_fd_rcu(struct files_struct *files, unsigned int fd) in files_lookup_fd_rcu() argument 105 return files_lookup_fd_raw(files, fd); in files_lookup_fd_rcu() [all …]
|
/linux/tools/testing/selftests/rcutorture/bin/ |
A D | kvm-find-errors.sh | 30 files= 36 files="$files $i.diags $i" 39 if test -n "$files" 41 $editor $files 53 files= 58 files="$files $i.diags $i" 61 if test -n "$files" 63 $editor $files
|
/linux/scripts/ |
A D | Makefile.clean | 30 __clean-files := \ 31 $(clean-files) $(targets) $(hostprogs) $(userprogs) \ 37 __clean-files := $(filter-out $(no-clean-files), $(__clean-files)) 43 __clean-files := $(wildcard \ 44 $(addprefix $(obj)/, $(filter-out $(objtree)/%, $(__clean-files))) \ 45 $(filter $(objtree)/%, $(__clean-files))) 50 cmd_clean = rm -rf $(__clean-files) 53 ifneq ($(strip $(__clean-files)),)
|
A D | leaking_addresses.pl | 483 my @files = readdir(DIR); 486 foreach my $file (@files) { 521 my ($total, $dmesg, $paths, $files) = parse_raw_file($file); 530 squash_by($files, 'filename'); 560 my %files; # Unique filenames containing leaks. 573 cache_filename(\%files, $line); 576 return $total, \@dmesg, \%paths, \%files; 629 my ($files, $line) = @_; 636 add_to_cache($files, $filename, substr($line, $index));
|
/linux/drivers/gpu/drm/i915/gt/ |
A D | intel_gt_debugfs.c | 62 static const struct intel_gt_debugfs_file files[] = { in gt_debugfs_register() local 66 intel_gt_debugfs_register_files(root, files, ARRAY_SIZE(files), gt); in gt_debugfs_register() 91 const struct intel_gt_debugfs_file *files, in intel_gt_debugfs_register_files() argument 95 umode_t mode = files->fops->write ? 0644 : 0444; in intel_gt_debugfs_register_files() 97 if (!files->eval || files->eval(data)) in intel_gt_debugfs_register_files() 98 debugfs_create_file(files->name, in intel_gt_debugfs_register_files() 100 files->fops); in intel_gt_debugfs_register_files() 102 files++; in intel_gt_debugfs_register_files()
|
/linux/tools/perf/util/ |
A D | data.c | 24 close(files[nr].fd); in close_dir() 25 zfree(&files[nr].path); in close_dir() 27 free(files); in close_dir() 43 files = zalloc(nr * sizeof(*files)); in perf_data__create_dir() 44 if (!files) in perf_data__create_dir() 48 data->dir.files = files; in perf_data__create_dir() 68 close_dir(files, i); in perf_data__create_dir() 112 file = realloc(files, (nr + 1) * sizeof(*files)); in perf_data__open_dir() 116 files = file; in perf_data__open_dir() 131 if (!files) in perf_data__open_dir() [all …]
|
/linux/ |
A D | .gitignore | 3 # NOTE! Don't add files that are generated in specific 7 # NOTE! Please use 'git ls-files -i --exclude-standard' 9 # any tracked files which get ignored after the change. 54 # Top-level generic files 91 # We don't want to ignore the following even if they are dot-files 101 # Generated include files 111 # quilt's files 115 # ctags files 119 # cscope files 123 # gnu global files [all …]
|
/linux/Documentation/filesystems/ |
A D | ntfs3.rst | 14 compressed files. 25 Note: Applied to empty files, this allows to switch type between 51 - Controls the default permissions for files/directories created after 55 - :rspan:`1` Instead of specifying umask which applies both to files and 60 - "No access rules" mount option sets access rights for files/folders to 64 - Permissions change for files/folders will be reported as successful, 76 will be marked as system immutable files. 88 - Create new files as sparse. 91 - Use this parameter to show all meta-files (System Files) on a mounted 92 NTFS partition. By default, all meta-files are hidden. [all …]
|
A D | files.rst | 7 This document describes how locking for files (struct file) 8 and file descriptor table (struct files) works. 11 with a lock (files->file_lock) and reference count (files->count). 18 The files (struct file) themselves are protected using 33 and files->fdtab points to the new structure. The fdtable 46 fdt = files_fdtable(files); 87 file = files_lookup_fd_rcu(files, fd); 116 spin_lock(&files->file_lock); 117 fd = locate_fd(files, file, start); 120 fdt = files_fdtable(files); [all …]
|
A D | hfs.rst | 26 used for creating new files. Default values: '????'. 29 Specifies the user/group that owns all files on the filesystems. 33 Specifies the umask used for all files , all directories or all 34 files and directories. Defaults to the umask of the mounting process. 58 and gid of files. 59 * You can't create hard- or symlinks, device files, sockets or FIFOs. 62 non-standard forks are represented as hidden additional files in the normal 66 * You can't create, delete or rename resource forks of files or the 70 * Copying files to a different filesystem will loose those attributes
|
A D | ecryptfs.rst | 8 For documentation, please see the files in the doc/ subdirectory. For 36 eCryptfs, you should copy the files to an unencrypted location and 37 then copy the files back into the new eCryptfs mount to migrate the 38 files. 45 files (i.e., /root/crypt). Then, create the mount point directory 77 or (2) directories containing files only created by eCryptfs. If you 78 mount a directory that has pre-existing files not created by eCryptfs,
|
A D | isofs.rst | 10 gid=nnn All files in the partition will be in group nnn. 11 uid=nnn All files in the partition will be owned by user id nnn. 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 43 overriderockperm Set permissions on files and directories according to 48 hide Completely strip hidden files from the file system. 49 showassoc Show files marked with the 'associated' bit 50 unhide Deprecated; showing hidden files is now default;
|
/linux/Documentation/dev-tools/ |
A D | gcov.rst | 13 This will create source code files annotated with execution counts 54 To enable profiling for specific files or directories, add a line 61 - For all files in one directory:: 81 The gcov kernel support creates the following files in debugfs: 84 Parent directory for all gcov-related files. 136 - all C source files + headers 139 - all C source files + headers 140 - all .gcda and .gcno files 156 - all .gcda files 157 - all links to .gcno files [all …]
|
/linux/Documentation/ABI/stable/ |
A D | sysfs-driver-mlxreg-io | 8 The files are read only. 18 The files are read only. 28 The files are read only. 37 The files are read only. 79 The files are write only. 101 The files are read only. 117 The files are read only. 126 The files are read only. 145 The files are read only. 156 The files are read only. [all …]
|
/linux/drivers/gpu/drm/qxl/ |
A D | qxl_debugfs.c | 96 struct drm_info_list *files, in qxl_debugfs_add_files() argument 102 if (qdev->debugfs[i].files == files) { in qxl_debugfs_add_files() 114 qdev->debugfs[qdev->debugfs_count].files = files; in qxl_debugfs_add_files() 118 drm_debugfs_create_files(files, nfiles, in qxl_debugfs_add_files()
|
/linux/fs/jffs2/ |
A D | LICENCE | 1 The files in this directory and elsewhere which refer to this LICENCE 20 As a special exception, if other files instantiate templates or use 21 macros or inline functions from these files, or you compile these 22 files and link them with other works to produce a work based on these 23 files, these files do not by themselves cause the resulting work to be 25 these files must still be made available in accordance with section (3)
|
/linux/arch/mips/ |
A D | Kbuild | 2 # Fail on warnings - also for files referenced in subdirs 3 # -Werror can be disabled for specific files using: 17 # mips object files 18 # The object files are linked as core-y files would be linked
|
/linux/include/drm/ |
A D | drm_debugfs.h | 83 void drm_debugfs_create_files(const struct drm_info_list *files, 86 int drm_debugfs_remove_files(const struct drm_info_list *files, 89 static inline void drm_debugfs_create_files(const struct drm_info_list *files, in drm_debugfs_create_files() argument 94 static inline int drm_debugfs_remove_files(const struct drm_info_list *files, in drm_debugfs_remove_files() argument
|
/linux/fs/proc/ |
A D | fd.c | 23 struct files_struct *files = NULL; in seq_show() local 33 files = task->files; in seq_show() 34 if (files) { in seq_show() 37 spin_lock(&files->file_lock); in seq_show() 38 file = files_lookup_fd_locked(files, fd); in seq_show() 40 struct fdtable *fdt = files_fdtable(files); in seq_show() 49 spin_unlock(&files->file_lock); in seq_show() 63 show_fd_locks(m, file, files); in seq_show()
|
/linux/fs/ceph/ |
A D | metric.c | 20 struct ceph_opened_files *files; in ceph_mdsc_send_metrics() local 35 + sizeof(*meta) + sizeof(*dlease) + sizeof(*files) in ceph_mdsc_send_metrics() 109 files = (struct ceph_opened_files *)(dlease + 1); in ceph_mdsc_send_metrics() 110 files->header.type = cpu_to_le32(CLIENT_METRIC_TYPE_OPENED_FILES); in ceph_mdsc_send_metrics() 111 files->header.ver = 1; in ceph_mdsc_send_metrics() 112 files->header.compat = 1; in ceph_mdsc_send_metrics() 113 files->header.data_len = cpu_to_le32(sizeof(*files) - header_len); in ceph_mdsc_send_metrics() 114 files->opened_files = cpu_to_le64(atomic64_read(&m->opened_files)); in ceph_mdsc_send_metrics() 115 files->total = cpu_to_le64(sum); in ceph_mdsc_send_metrics() 119 icaps = (struct ceph_pinned_icaps *)(files + 1); in ceph_mdsc_send_metrics()
|
/linux/tools/testing/selftests/pstore/ |
A D | pstore_post_reboot_tests | 53 files=`ls dmesg-${backend}-*` 54 operate_files $? "$files" grep_end_trace 77 files=`ls *-${backend}-*` 78 operate_files $? "$files" rm
|
/linux/drivers/comedi/drivers/ni_routing/tools/ |
A D | Makefile | 31 everything : csv-files c-files csv-blank 44 csv-files : ni_values.py comedi_h.py 51 c-files : comedi_h.py
|
/linux/Documentation/process/ |
A D | license-rules.rst | 18 as a whole, though individual source files can have a different license 37 into any source files which create an executable running on the Linux 86 files. There was build breakage observed with generated .lds files where 109 For example, the linux kernel UAPI files use the expression:: 167 The files in this directory contain the full license text and 169 identifier which shall be used for the license in source files. 247 The files in this directory contain the full license text and 294 The files in this directory contain the full license text and 446 corresponding source files. 464 in the corresponding source files. [all …]
|