/Linux-v5.4/fs/ |
D | file.c | 148 static int expand_fdtable(struct files_struct *files, unsigned int nr) in expand_fdtable() argument 149 __releases(files->file_lock) in expand_fdtable() 150 __acquires(files->file_lock) in expand_fdtable() 154 spin_unlock(&files->file_lock); in expand_fdtable() 160 if (atomic_read(&files->count) > 1) in expand_fdtable() 163 spin_lock(&files->file_lock); in expand_fdtable() 174 cur_fdt = files_fdtable(files); in expand_fdtable() 177 rcu_assign_pointer(files->fdt, new_fdt); in expand_fdtable() 178 if (cur_fdt != &files->fdtab) in expand_fdtable() 193 static int expand_files(struct files_struct *files, unsigned int nr) in expand_files() argument [all …]
|
D | pipe.c | 62 if (pipe->files) in pipe_lock_nested() 77 if (pipe->files) in pipe_unlock() 575 if (!--pipe->files) { in put_pipe_info() 743 pipe->files = 2; in get_pipe_inode() 799 static int __do_pipe_flags(int *fd, struct file **files, int flags) in __do_pipe_flags() argument 807 error = create_pipe_files(files, flags); in __do_pipe_flags() 829 fput(files[0]); in __do_pipe_flags() 830 fput(files[1]); in __do_pipe_flags() 836 struct file *files[2]; in do_pipe_flags() local 837 int error = __do_pipe_flags(fd, files, flags); in do_pipe_flags() [all …]
|
/Linux-v5.4/include/linux/ |
D | fdtable.h | 73 #define rcu_dereference_check_fdtable(files, fdtfd) \ argument 74 rcu_dereference_check((fdtfd), lockdep_is_held(&(files)->file_lock)) 76 #define files_fdtable(files) \ argument 77 rcu_dereference_check_fdtable((files), (files)->fdt) 82 static inline struct file *__fcheck_files(struct files_struct *files, unsigned int fd) in __fcheck_files() argument 84 struct fdtable *fdt = rcu_dereference_raw(files->fdt); in __fcheck_files() 93 static inline struct file *fcheck_files(struct files_struct *files, unsigned int fd) in fcheck_files() argument 96 !lockdep_is_held(&files->file_lock), in fcheck_files() 98 return __fcheck_files(files, fd); in fcheck_files() 104 #define fcheck(fd) fcheck_files(current->files, fd) [all …]
|
/Linux-v5.4/tools/testing/selftests/rcutorture/bin/ |
D | kvm-find-errors.sh | 28 files= 34 files="$files $i.diags $i" 37 if test -n "$files" 39 $editor $files 49 files= 54 files="$files $i.diags $i" 57 if test -n "$files" 59 $editor $files
|
/Linux-v5.4/fs/proc/ |
D | fd.c | 22 struct files_struct *files = NULL; in seq_show() local 31 files = get_files_struct(task); in seq_show() 34 if (files) { in seq_show() 37 spin_lock(&files->file_lock); in seq_show() 38 file = fcheck_files(files, fd); in seq_show() 40 struct fdtable *fdt = files_fdtable(files); in seq_show() 49 spin_unlock(&files->file_lock); in seq_show() 50 put_files_struct(files); in seq_show() 60 show_fd_locks(m, file, files); in seq_show() 86 struct files_struct *files = get_files_struct(task); in tid_fd_mode() local [all …]
|
/Linux-v5.4/scripts/ |
D | Makefile.clean | 30 __clean-files := $(extra-y) $(extra-m) $(extra-) \ 31 $(always) $(targets) $(clean-files) \ 36 __clean-files := $(filter-out $(no-clean-files), $(__clean-files)) 42 __clean-files := $(wildcard \ 43 $(addprefix $(obj)/, $(filter-out $(objtree)/%, $(__clean-files))) \ 44 $(filter $(objtree)/%, $(__clean-files))) 49 cmd_clean = rm -rf $(__clean-files) 52 ifneq ($(strip $(__clean-files)),)
|
D | leaking_addresses.pl | 482 my @files = readdir(DIR); 485 foreach my $file (@files) { 520 my ($total, $dmesg, $paths, $files) = parse_raw_file($file); 529 squash_by($files, 'filename'); 559 my %files; # Unique filenames containing leaks. 572 cache_filename(\%files, $line); 575 return $total, \@dmesg, \%paths, \%files; 628 my ($files, $line) = @_; 635 add_to_cache($files, $filename, substr($line, $index));
|
D | Makefile.dtbinst | 22 dtbinst-files := $(sort $(dtb-y) $(if $(CONFIG_OF_ALL_DTBS), $(dtb-))) 31 $(dtbinst-files): %.dtb: $(obj)/%.dtb 37 PHONY += $(dtbinst-files) $(dtbinst-dirs) 38 __dtbs_install: $(dtbinst-files) $(dtbinst-dirs)
|
/Linux-v5.4/tools/perf/util/ |
D | data.c | 21 static void close_dir(struct perf_data_file *files, int nr) in close_dir() argument 24 close(files[nr].fd); in close_dir() 25 zfree(&files[nr].path); in close_dir() 27 free(files); in close_dir() 32 close_dir(data->dir.files, data->dir.nr); in perf_data__close_dir() 37 struct perf_data_file *files = NULL; in perf_data__create_dir() local 43 files = zalloc(nr * sizeof(*files)); in perf_data__create_dir() 44 if (!files) in perf_data__create_dir() 48 data->dir.files = files; in perf_data__create_dir() 52 struct perf_data_file *file = &files[i]; in perf_data__create_dir() [all …]
|
/Linux-v5.4/ |
D | .gitignore | 2 # NOTE! Don't add files that are generated in specific 6 # NOTE! Please use 'git ls-files -i --exclude-standard' 8 # any tracked files which get ignored after the change. 52 # Top-level generic files 86 # We don't want to ignore the following even if they are dot-files 96 # Generated include files 106 # quilt's files 110 # cscope files 114 # gnu global files 120 # id-utils files
|
/Linux-v5.4/kernel/ |
D | kcmp.c | 69 if (task->files) in get_file_raw_ptr() 70 file = fcheck_files(task->files, idx); in get_file_raw_ptr() 110 struct files_struct *files; in kcmp_epoll_target() local 119 files = get_files_struct(task2); in kcmp_epoll_target() 120 if (!files) in kcmp_epoll_target() 123 spin_lock(&files->file_lock); in kcmp_epoll_target() 124 filp_epoll = fcheck_files(files, slot.efd); in kcmp_epoll_target() 129 spin_unlock(&files->file_lock); in kcmp_epoll_target() 130 put_files_struct(files); in kcmp_epoll_target() 203 ret = kcmp_ptr(task1->files, task2->files, KCMP_FILES); in SYSCALL_DEFINE5()
|
/Linux-v5.4/Documentation/filesystems/ |
D | files.txt | 4 This document describes how locking for files (struct file) 5 and file descriptor table (struct files) works. 8 with a lock (files->file_lock) and reference count (files->count). 15 The files (struct file) themselves are protected using 30 and files->fdtab points to the new structure. The fdtable 43 fdt = files_fdtable(files); 58 3. For any update to the fd table, files->file_lock must 83 file = fcheck_files(files, fd); 106 holding files->file_lock. If ->file_lock is dropped, then 107 another thread expand the files thereby creating a new [all …]
|
D | hfs.txt | 21 used for creating new files. Default values: '????'. 24 Specifies the user/group that owns all files on the filesystems. 28 Specifies the umask used for all files , all directories or all 29 files and directories. Defaults to the umask of the mounting process. 53 and gid of files. 54 o You can't create hard- or symlinks, device files, sockets or FIFOs. 57 non-standard forks are represented as hidden additional files in the normal 61 o You can't create, delete or rename resource forks of files or the 65 o Copying files to a different filesystem will loose those attributes
|
D | ecryptfs.txt | 4 For documentation, please see the files in the doc/ subdirectory. For 31 eCryptfs, you should copy the files to an unencrypted location and 32 then copy the files back into the new eCryptfs mount to migrate the 33 files. 39 files (i.e., /root/crypt). Then, create the mount point directory 68 or (2) directories containing files only created by eCryptfs. If you 69 mount a directory that has pre-existing files not created by eCryptfs,
|
D | isofs.txt | 3 gid=nnn All files in the partition will be in group nnn. 4 uid=nnn All files in the partition will be owned by user id nnn. 26 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 30 overriderockperm Set permissions on files and directories according to 35 hide Completely strip hidden files from the file system. 36 showassoc Show files marked with the 'associated' bit 37 unhide Deprecated; showing hidden files is now default;
|
/Linux-v5.4/Documentation/dev-tools/ |
D | gcov.rst | 13 This will create source code files annotated with execution counts 54 To enable profiling for specific files or directories, add a line 61 - For all files in one directory:: 65 To exclude files from being profiled even when CONFIG_GCOV_PROFILE_ALL 74 Only files which are linked to the main kernel image or are compiled as 81 The gcov kernel support creates the following files in debugfs: 84 Parent directory for all gcov-related files. 130 gcc version used for kernel build. Also the following files need to be 134 - all C source files + headers 137 - all C source files + headers [all …]
|
/Linux-v5.4/arch/mips/ |
D | Kbuild | 2 # Fail on warnings - also for files referenced in subdirs 3 # -Werror can be disabled for specific files using: 17 # mips object files 18 # The object files are linked as core-y files would be linked
|
/Linux-v5.4/arch/s390/scripts/ |
D | Makefile.chkbss | 6 chkbss-files := $(addsuffix .chkbss, $(chkbss)) 7 clean-files += $(chkbss-files) 10 chkbss: $(addprefix $(obj)/, $(chkbss-files))
|
/Linux-v5.4/drivers/gpu/drm/qxl/ |
D | qxl_debugfs.c | 103 struct drm_info_list *files, in qxl_debugfs_add_files() argument 109 if (qdev->debugfs[i].files == files) { in qxl_debugfs_add_files() 121 qdev->debugfs[qdev->debugfs_count].files = files; in qxl_debugfs_add_files() 125 drm_debugfs_create_files(files, nfiles, in qxl_debugfs_add_files()
|
/Linux-v5.4/fs/jffs2/ |
D | LICENCE | 1 The files in this directory and elsewhere which refer to this LICENCE 20 As a special exception, if other files instantiate templates or use 21 macros or inline functions from these files, or you compile these 22 files and link them with other works to produce a work based on these 23 files, these files do not by themselves cause the resulting work to be 25 these files must still be made available in accordance with section (3)
|
/Linux-v5.4/include/drm/ |
D | drm_debugfs.h | 83 int drm_debugfs_create_files(const struct drm_info_list *files, 86 int drm_debugfs_remove_files(const struct drm_info_list *files, 89 static inline int drm_debugfs_create_files(const struct drm_info_list *files, in drm_debugfs_create_files() argument 96 static inline int drm_debugfs_remove_files(const struct drm_info_list *files, in drm_debugfs_remove_files() argument
|
/Linux-v5.4/Documentation/ABI/stable/ |
D | sysfs-driver-mlxreg-io | 9 The files are read only. 16 Description: These files show with which CPLD versions have been burned 19 The files are read only. 30 The files are read only. 37 Description: These files show with which CPLD versions have been burned 40 The files are read only. 47 Description: These files enable and disable the access to the JTAG domain. 70 Description: These files allow asserting system power cycling, switching 83 The files are write only. 97 Description: These files show the system reset cause, as following: power [all …]
|
D | sysfs-driver-usb-usbtmc | 6 These files show the various USB TMC capabilities as described 12 The files are read only. 20 These files show the various USB TMC capabilities as described 27 The files are read only.
|
/Linux-v5.4/tools/testing/selftests/pstore/ |
D | pstore_post_reboot_tests | 53 files=`ls dmesg-${backend}-*` 54 operate_files $? "$files" grep_end_trace 77 files=`ls *-${backend}-*` 78 operate_files $? "$files" rm
|
/Linux-v5.4/drivers/staging/comedi/drivers/ni_routing/tools/ |
D | Makefile | 31 everything : csv-files c-files csv-blank 44 csv-files : ni_values.py comedi_h.py 51 c-files : comedi_h.py
|