Home
last modified time | relevance | path

Searched full:user (Results 1 – 25 of 5141) sorted by relevance

12345678910>>...206

/Linux-v5.10/Documentation/admin-guide/sysctl/
Duser.rst2 Documentation for /proc/sys/user/
12 /proc/sys/user.
16 per user per user namespace limits.
24 The creation of per user per user namespace objects are charged to
25 the user in the user namespace who created the object and
26 verified to be below the per user limit in that user namespace.
29 who created user namespaces the creation of the object happens
30 in (user namespaces can be nested) and verified to be below the per user
31 limits in the user namespaces of those users.
34 user namespace does not allow a user to escape their current limits.
[all …]
/Linux-v5.10/arch/arm64/kernel/
Dsignal.c67 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument
70 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout()
72 memset(user, 0, sizeof(*user)); in init_user_layout()
73 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout()
75 user->limit = user->size + reserved_size; in init_user_layout()
77 user->limit -= TERMINATOR_SIZE; in init_user_layout()
78 user->limit -= EXTRA_CONTEXT_SIZE; in init_user_layout()
82 static size_t sigframe_size(struct rt_sigframe_user_layout const *user) in sigframe_size() argument
84 return round_up(max(user->size, sizeof(struct rt_sigframe)), 16); in sigframe_size()
95 static int __sigframe_alloc(struct rt_sigframe_user_layout *user, in __sigframe_alloc() argument
[all …]
/Linux-v5.10/drivers/mtd/nand/raw/atmel/
Dpmecc.c346 struct atmel_pmecc_user *user; in atmel_pmecc_create_user() local
354 size = sizeof(*user); in atmel_pmecc_create_user()
365 user = kzalloc(size, GFP_KERNEL); in atmel_pmecc_create_user()
366 if (!user) in atmel_pmecc_create_user()
369 user->pmecc = pmecc; in atmel_pmecc_create_user()
371 user->partial_syn = (s16 *)PTR_ALIGN(user + 1, sizeof(u16)); in atmel_pmecc_create_user()
372 user->si = user->partial_syn + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user()
373 user->lmu = user->si + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user()
374 user->smu = user->lmu + (req->ecc.strength + 1); in atmel_pmecc_create_user()
375 user->mu = (s32 *)PTR_ALIGN(user->smu + in atmel_pmecc_create_user()
[all …]
/Linux-v5.10/arch/arm/mach-omap2/
Domap_hwmod_2xxx_interconnect_data.c28 .user = OCP_USER_MPU | OCP_USER_SDMA,
35 .user = OCP_USER_MPU,
48 .user = OCP_USER_MPU | OCP_USER_SDMA,
55 .user = OCP_USER_MPU | OCP_USER_SDMA,
63 .user = OCP_USER_MPU | OCP_USER_SDMA,
71 .user = OCP_USER_MPU | OCP_USER_SDMA,
79 .user = OCP_USER_MPU | OCP_USER_SDMA,
87 .user = OCP_USER_MPU | OCP_USER_SDMA,
95 .user = OCP_USER_MPU | OCP_USER_SDMA,
103 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_44xx_data.c636 .user = OCP_USER_SDMA,
644 .user = OCP_USER_MPU,
652 .user = OCP_USER_MPU | OCP_USER_SDMA,
660 .user = OCP_USER_MPU | OCP_USER_SDMA,
668 .user = OCP_USER_MPU | OCP_USER_SDMA,
676 .user = OCP_USER_MPU | OCP_USER_SDMA,
684 .user = OCP_USER_MPU | OCP_USER_SDMA,
692 .user = OCP_USER_MPU,
700 .user = OCP_USER_MPU | OCP_USER_SDMA,
708 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
Domap_hwmod_33xx_43xx_interconnect_data.c26 .user = OCP_USER_MPU,
34 .user = OCP_USER_MPU | OCP_USER_SDMA,
42 .user = OCP_USER_MPU | OCP_USER_SDMA,
50 .user = OCP_USER_MPU | OCP_USER_SDMA,
58 .user = OCP_USER_MPU | OCP_USER_SDMA,
66 .user = OCP_USER_MPU | OCP_USER_SDMA,
74 .user = OCP_USER_MPU | OCP_USER_SDMA,
82 .user = OCP_USER_MPU,
89 .user = OCP_USER_MPU | OCP_USER_SDMA,
Domap_hwmod_7xx_data.c507 .user = OCP_USER_SDMA,
515 .user = OCP_USER_MPU | OCP_USER_SDMA,
523 .user = OCP_USER_MPU | OCP_USER_SDMA,
531 .user = OCP_USER_MPU,
539 .user = OCP_USER_MPU,
547 .user = OCP_USER_MPU | OCP_USER_SDMA,
555 .user = OCP_USER_MPU | OCP_USER_SDMA,
563 .user = OCP_USER_MPU | OCP_USER_SDMA,
571 .user = OCP_USER_MPU | OCP_USER_SDMA,
579 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
/Linux-v5.10/Documentation/powerpc/
Dcxlflash.rst24 CXL provides a mechanism by which user space applications can
27 user space application direct access to Flash storage.
33 special path for user space access, and performing error recovery. It
44 user space with a special block library. This mode further
59 directly in each user I/O, but at the minimum is involved in the
60 initial setup before the user application is allowed to send requests
68 | 512 * 64 KB User MMIO |
70 | User Accessible |
90 access to the Flash from user space (without requiring a system call).
93 block library to enable this user space access. The driver supports
[all …]
/Linux-v5.10/arch/powerpc/include/asm/
Dreg_fsl_emb.h36 #define PMLCA_FCU 0x20000000 /* Freeze in User */
67 #define PMRN_UPMC0 0x000 /* User Performance Monitor Counter 0 */
68 #define PMRN_UPMC1 0x001 /* User Performance Monitor Counter 1 */
69 #define PMRN_UPMC2 0x002 /* User Performance Monitor Counter 2 */
70 #define PMRN_UPMC3 0x003 /* User Performance Monitor Counter 3 */
71 #define PMRN_UPMC4 0x004 /* User Performance Monitor Counter 4 */
72 #define PMRN_UPMC5 0x005 /* User Performance Monitor Counter 5 */
73 #define PMRN_UPMLCA0 0x080 /* User PM Local Control A0 */
74 #define PMRN_UPMLCA1 0x081 /* User PM Local Control A1 */
75 #define PMRN_UPMLCA2 0x082 /* User PM Local Control A2 */
[all …]
/Linux-v5.10/scripts/
DMakefile.userprogs7 user-csingle := $(foreach m, $(userprogs), $(if $($(m)-objs),,$(m)))
10 user-cmulti := $(foreach m, $(userprogs), $(if $($(m)-objs),$(m)))
13 user-cobjs := $(sort $(foreach m, $(userprogs), $($(m)-objs)))
15 user-csingle := $(addprefix $(obj)/, $(user-csingle))
16 user-cmulti := $(addprefix $(obj)/, $(user-cmulti))
17 user-cobjs := $(addprefix $(obj)/, $(user-cobjs))
27 $(user-csingle): $(obj)/%: $(src)/%.c FORCE
35 $(user-cmulti): FORCE
37 $(call multi_depend, $(user-cmulti), , -objs)
42 $(user-cobjs): $(obj)/%.o: $(src)/%.c FORCE
[all …]
/Linux-v5.10/Documentation/admin-guide/LSM/
DSafeSetID.rst8 allowing a user to set up user namespace UID/GID mappings.
14 to switch to a different user must be spawned with CAP_SETUID privileges.
16 user that have been explicitly given the CAP_SETUID runtime capability. It is
19 privileges opens up possible security holes since any user with access to the
24 tree of processes under non-root user(s) in the first place. Specifically,
25 since CAP_SETUID allows changing to any user on the system, including the root
26 user, it is an overpowered capability for what is needed in this scenario,
28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
29 generally feasible way in Linux to restrict the potential UIDs that a user can
30 switch to through setuid() beyond allowing a switch to any user on the system.
[all …]
/Linux-v5.10/include/linux/
Dipmi.h27 * Opaque type for a IPMI message user. One of these is needed to
48 struct ipmi_user *user; member
57 * be NULL. If the user above is NULL, then this will be the
91 * this is NULL, it will be ignored for the user.
103 * the user handle will be invalid. The interface may or may
110 /* Create a new user of the IPMI layer on the given interface number. */
114 struct ipmi_user **user);
117 * Destroy the given user of the IPMI layer. Note that after this
119 * callbacks for the user. Thus as long as you destroy all the users
124 int ipmi_destroy_user(struct ipmi_user *user);
[all …]
Dtracehook.h8 * user tracing/debugging support might need to do something. These
19 * user debugging or tracing facility (such as ptrace). The interfaces
84 * @regs: user register state of current task
88 * Full user register state is available here. Changing the values
94 * made. If @task ever returns to user mode after this, its register state
109 * @regs: user register state of current task
114 * user register state is available here. It is safe to block here,
137 * Register and stack state reflects the user handler about to run.
140 * Called without locks, shortly before returning to user mode
154 * before returning to user mode. If it's already running in user mode,
[all …]
/Linux-v5.10/arch/m68k/ifpsp060/
Dos.S57 | Each IO routine checks to see if the memory write/read is to/from user
60 | for user mode applications.
71 | working in user space
80 | a1 - user destination address
82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
110 | a0 - user source address
113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
140 | Read a data byte from user memory.
143 | a0 - user source address
144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
[all …]
/Linux-v5.10/Documentation/arm/
Dsunxi.rst26 * User Manual
28 …http://dl.linux-sunxi.org/A10/A10%20User%20Manual%20-%20v1.20%20%282012-04-09%2c%20DECRYPTED%29.pdf
41 * User Manual
43 http://dl.linux-sunxi.org/A13/A13%20User%20Manual%20-%20v1.2%20%282013-01-08%29.pdf
57 * User Manual
59 http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf
67 * User Manual
69 http://dl.linux-sunxi.org/A23/A23%20User%20Manual%20V1.0%2020130830.pdf
78 * User Manual
80 …http://dl.linux-sunxi.org/A31/A3x_release_document/A31/IC/A31%20user%20manual%20V1.1%2020130630.pdf
[all …]
/Linux-v5.10/Documentation/misc-devices/
Duacce.rst6 Uacce (Unified/User-space-access-intended Accelerator Framework) targets to
11 Because of the unified address, hardware and user space of process can
21 | User application (CPU) | | Hardware Accelerator |
45 The user drivers and libraries are called WarpDrive.
57 | | user API | |
58 | WarpDrive library | ------------> | user driver |
93 created when user application open the chrdev. The file descriptor is used
94 as the user handle of the queue.
96 a chrdev to the user space. The user application communicates with the
109 * @UACCE_QFRT_DUS: device user share region
[all …]
/Linux-v5.10/sound/soc/sof/intel/
DKconfig17 This option is not user-selectable but automagically handled by
33 This option is not user-selectable but automagically handled by
39 This option is not user-selectable but automagically handled by
47 This option is not user-selectable but automagically handled by
57 This option is not user-selectable but automagically handled by
82 This option is not user-selectable but automagically handled by
106 This option is not user-selectable but automagically handled by
125 This option is not user-selectable but automagically handled by
140 This option is not user-selectable but automagically handled by
155 This option is not user-selectable but automagically handled by
[all …]
/Linux-v5.10/drivers/staging/greybus/Documentation/firmware/
Dfirmware-management57 and user first needs to identify the character device used for
61 be used by the user to identify the right character device for it. The class
80 Following are the IOCTLs and their data structures available to the user:
142 This ioctl shall be used by the user to get the version and firmware-tag of
148 This ioctl shall be used by the user to get the version of a currently
149 running Backend Interface Firmware identified by a firmware-tag. The user is
156 This ioctl shall be used by the user to load an Interface Firmware package on
157 an Interface. The user needs to fill the 'firmware_tag' and 'load_method'
163 This ioctl shall be used by the user to request an Interface to update a
164 Backend Interface Firmware. The user is required to fill the 'firmware_tag'
[all …]
/Linux-v5.10/arch/powerpc/include/asm/nohash/32/
Dmmu-44x.h36 #define PPC44x_TLB_U0 0x00008000 /* User 0 */
37 #define PPC44x_TLB_U1 0x00004000 /* User 1 */
38 #define PPC44x_TLB_U2 0x00002000 /* User 2 */
39 #define PPC44x_TLB_U3 0x00001000 /* User 3 */
47 #define PPC44x_TLB_UX 0x00000020 /* User execution */
48 #define PPC44x_TLB_UW 0x00000010 /* User write */
49 #define PPC44x_TLB_UR 0x00000008 /* User read */
82 #define PPC47x_TLB2_U0 0x00008000 /* User 0 */
83 #define PPC47x_TLB2_U1 0x00004000 /* User 1 */
84 #define PPC47x_TLB2_U2 0x00002000 /* User 2 */
[all …]
/Linux-v5.10/security/keys/
Dkey.c48 * Get the key quota record for a user, allocating a new record if one doesn't
53 struct key_user *candidate = NULL, *user; in key_user_lookup() local
61 /* search the tree for a user record with a matching UID */ in key_user_lookup()
64 user = rb_entry(parent, struct key_user, node); in key_user_lookup()
66 if (uid_lt(uid, user->uid)) in key_user_lookup()
68 else if (uid_gt(uid, user->uid)) in key_user_lookup()
76 /* allocate a candidate user record if we don't already have in key_user_lookup()
80 user = NULL; in key_user_lookup()
91 /* if we get here, then the user record still hadn't appeared on the in key_user_lookup()
105 user = candidate; in key_user_lookup()
[all …]
/Linux-v5.10/Documentation/admin-guide/namespaces/
Dcompatibility-list.rst5 This document contains the information about the problems user
13 - UTS IPC VFS PID User Net
19 User 2 2 X
33 2. Intentionally, two equal user IDs in different user namespaces
35 words, user 10 in one user namespace shouldn't have the same
36 access permissions to files, belonging to user 10 in another
40 from different user namespaces should not access the same IPC objects
/Linux-v5.10/net/bridge/netfilter/
Debt_mark_m.c48 const struct compat_ebt_mark_m_info *user = src; in mark_mt_compat_from_user() local
51 kern->mark = user->mark; in mark_mt_compat_from_user()
52 kern->mask = user->mask; in mark_mt_compat_from_user()
53 kern->invert = user->invert; in mark_mt_compat_from_user()
54 kern->bitmask = user->bitmask; in mark_mt_compat_from_user()
59 struct compat_ebt_mark_m_info __user *user = dst; in mark_mt_compat_to_user() local
62 if (put_user(kern->mark, &user->mark) || in mark_mt_compat_to_user()
63 put_user(kern->mask, &user->mask) || in mark_mt_compat_to_user()
64 put_user(kern->invert, &user->invert) || in mark_mt_compat_to_user()
65 put_user(kern->bitmask, &user->bitmask)) in mark_mt_compat_to_user()
/Linux-v5.10/drivers/char/ipmi/
Dipmi_poweroff.c45 static void (*specific_poweroff_func)(struct ipmi_user *user);
69 /* parameter definition to allow user to flag power cycle */
122 static int ipmi_request_wait_for_response(struct ipmi_user *user, in ipmi_request_wait_for_response() argument
131 rv = ipmi_request_supply_msgs(user, addr, 0, send_msg, &comp, in ipmi_request_wait_for_response()
142 static int ipmi_request_in_rc_mode(struct ipmi_user *user, in ipmi_request_in_rc_mode() argument
149 rv = ipmi_request_supply_msgs(user, addr, 0, send_msg, NULL, in ipmi_request_in_rc_mode()
160 ipmi_poll_interface(user); in ipmi_request_in_rc_mode()
182 static void (*atca_oem_poweroff_hook)(struct ipmi_user *user);
184 static void pps_poweroff_atca(struct ipmi_user *user) in pps_poweroff_atca() argument
202 rv = ipmi_request_in_rc_mode(user, in pps_poweroff_atca()
[all …]
Dipmi_msghandler.c178 * The main "user" data structure.
184 * Set to NULL when the user is destroyed, a pointer to myself
196 /* The interface this user is bound to. */
206 static struct ipmi_user *acquire_ipmi_user(struct ipmi_user *user, int *index) in acquire_ipmi_user() argument
207 __acquires(user->release_barrier) in acquire_ipmi_user()
211 *index = srcu_read_lock(&user->release_barrier); in acquire_ipmi_user()
212 ruser = srcu_dereference(user->self, &user->release_barrier); in acquire_ipmi_user()
214 srcu_read_unlock(&user->release_barrier, *index); in acquire_ipmi_user()
218 static void release_ipmi_user(struct ipmi_user *user, int index) in release_ipmi_user() argument
220 srcu_read_unlock(&user->release_barrier, index); in release_ipmi_user()
[all …]
/Linux-v5.10/kernel/
Duser.c3 * The "user cache".
7 * We have a per-user structure to keep track of how many
8 * processes, files etc the user has claimed, in order to be
9 * able to have per-user limits for system resources.
17 #include <linux/sched/user.h>
24 * userns count is 1 for root user, 1 for init_uts_ns,
74 * UID task count cache, to get fast user lookup in "alloc_uid"
75 * when changing user ID's (ie setuid() and friends).
123 struct user_struct *user; in uid_hash_find() local
125 hlist_for_each_entry(user, hashent, uidhash_node) { in uid_hash_find()
[all …]

12345678910>>...206