| /kernel/linux/linux-4.19/Documentation/sysctl/ |
| D | user.txt | 1 Documentation for /proc/sys/user/* kernel version 4.9.0 7 /proc/sys/user. 11 per user per user namespace limits. 19 The creation of per user per user namespace objects are charged to 20 the user in the user namespace who created the object and 21 verified to be below the per user limit in that user namespace. 24 who created user namespaces the creation of the object happens 25 in (user namespaces can be nested) and verified to be below the per user 26 limits in the user namespaces of those users. 29 user namespace does not allow a user to escape their current limits. [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/sysctl/ |
| D | user.rst | 2 Documentation for /proc/sys/user/ 12 /proc/sys/user. 16 per user per user namespace limits. 24 The creation of per user per user namespace objects are charged to 25 the user in the user namespace who created the object and 26 verified to be below the per user limit in that user namespace. 29 who created user namespaces the creation of the object happens 30 in (user namespaces can be nested) and verified to be below the per user 31 limits in the user namespaces of those users. 34 user namespace does not allow a user to escape their current limits. [all …]
|
| /kernel/linux/linux-4.19/arch/arm/mach-omap2/ |
| D | omap_hwmod_33xx_43xx_interconnect_data.c | 26 .user = OCP_USER_MPU, 34 .user = OCP_USER_MPU | OCP_USER_SDMA, 42 .user = OCP_USER_MPU | OCP_USER_SDMA, 50 .user = OCP_USER_MPU | OCP_USER_SDMA, 58 .user = OCP_USER_MPU | OCP_USER_SDMA, 66 .user = OCP_USER_MPU | OCP_USER_SDMA, 74 .user = OCP_USER_MPU | OCP_USER_SDMA, 82 .user = OCP_USER_MPU | OCP_USER_SDMA, 90 .user = OCP_USER_MPU | OCP_USER_SDMA, 98 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
| D | omap_hwmod_2xxx_interconnect_data.c | 31 .user = OCP_USER_MPU | OCP_USER_SDMA, 38 .user = OCP_USER_MPU, 51 .user = OCP_USER_MPU | OCP_USER_SDMA, 58 .user = OCP_USER_MPU | OCP_USER_SDMA, 66 .user = OCP_USER_MPU | OCP_USER_SDMA, 74 .user = OCP_USER_MPU | OCP_USER_SDMA, 82 .user = OCP_USER_MPU | OCP_USER_SDMA, 90 .user = OCP_USER_MPU | OCP_USER_SDMA, 98 .user = OCP_USER_MPU | OCP_USER_SDMA, 106 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
| D | omap_hwmod_43xx_data.c | 601 .user = OCP_USER_MPU | OCP_USER_SDMA, 608 .user = OCP_USER_MPU | OCP_USER_SDMA, 615 .user = OCP_USER_MPU | OCP_USER_SDMA, 622 .user = OCP_USER_MPU | OCP_USER_SDMA, 629 .user = OCP_USER_MPU, 636 .user = OCP_USER_MPU, 643 .user = OCP_USER_MPU, 650 .user = OCP_USER_MPU, 657 .user = OCP_USER_MPU, 664 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
| /kernel/linux/linux-4.19/arch/arm64/kernel/ |
| D | signal.c | 78 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument 81 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout() 83 memset(user, 0, sizeof(*user)); in init_user_layout() 84 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout() 86 user->limit = user->size + reserved_size; in init_user_layout() 88 user->limit -= TERMINATOR_SIZE; in init_user_layout() 89 user->limit -= EXTRA_CONTEXT_SIZE; in init_user_layout() 93 static size_t sigframe_size(struct rt_sigframe_user_layout const *user) in sigframe_size() argument 95 return round_up(max(user->size, sizeof(struct rt_sigframe)), 16); in sigframe_size() 106 static int __sigframe_alloc(struct rt_sigframe_user_layout *user, in __sigframe_alloc() argument [all …]
|
| /kernel/linux/linux-5.10/arch/arm64/kernel/ |
| D | signal.c | 68 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument 71 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout() 73 memset(user, 0, sizeof(*user)); in init_user_layout() 74 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout() 76 user->limit = user->size + reserved_size; in init_user_layout() 78 user->limit -= TERMINATOR_SIZE; in init_user_layout() 79 user->limit -= EXTRA_CONTEXT_SIZE; in init_user_layout() 83 static size_t sigframe_size(struct rt_sigframe_user_layout const *user) in sigframe_size() argument 85 return round_up(max(user->size, sizeof(struct rt_sigframe)), 16); in sigframe_size() 96 static int __sigframe_alloc(struct rt_sigframe_user_layout *user, in __sigframe_alloc() argument [all …]
|
| /kernel/linux/linux-5.10/drivers/mtd/nand/raw/atmel/ |
| D | pmecc.c | 346 struct atmel_pmecc_user *user; in atmel_pmecc_create_user() local 354 size = sizeof(*user); in atmel_pmecc_create_user() 365 user = kzalloc(size, GFP_KERNEL); in atmel_pmecc_create_user() 366 if (!user) in atmel_pmecc_create_user() 369 user->pmecc = pmecc; in atmel_pmecc_create_user() 371 user->partial_syn = (s16 *)PTR_ALIGN(user + 1, sizeof(u16)); in atmel_pmecc_create_user() 372 user->si = user->partial_syn + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user() 373 user->lmu = user->si + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user() 374 user->smu = user->lmu + (req->ecc.strength + 1); in atmel_pmecc_create_user() 375 user->mu = (s32 *)PTR_ALIGN(user->smu + in atmel_pmecc_create_user() [all …]
|
| /kernel/linux/linux-4.19/drivers/mtd/nand/raw/atmel/ |
| D | pmecc.c | 349 struct atmel_pmecc_user *user; in atmel_pmecc_create_user() local 357 size = sizeof(*user); in atmel_pmecc_create_user() 368 user = kzalloc(size, GFP_KERNEL); in atmel_pmecc_create_user() 369 if (!user) in atmel_pmecc_create_user() 372 user->pmecc = pmecc; in atmel_pmecc_create_user() 374 user->partial_syn = (s16 *)PTR_ALIGN(user + 1, sizeof(u16)); in atmel_pmecc_create_user() 375 user->si = user->partial_syn + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user() 376 user->lmu = user->si + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user() 377 user->smu = user->lmu + (req->ecc.strength + 1); in atmel_pmecc_create_user() 378 user->mu = (s32 *)PTR_ALIGN(user->smu + in atmel_pmecc_create_user() [all …]
|
| /kernel/linux/linux-5.10/arch/arm/mach-omap2/ |
| D | omap_hwmod_2xxx_interconnect_data.c | 28 .user = OCP_USER_MPU | OCP_USER_SDMA, 35 .user = OCP_USER_MPU, 48 .user = OCP_USER_MPU | OCP_USER_SDMA, 55 .user = OCP_USER_MPU | OCP_USER_SDMA, 63 .user = OCP_USER_MPU | OCP_USER_SDMA, 71 .user = OCP_USER_MPU | OCP_USER_SDMA, 79 .user = OCP_USER_MPU | OCP_USER_SDMA, 87 .user = OCP_USER_MPU | OCP_USER_SDMA, 95 .user = OCP_USER_MPU | OCP_USER_SDMA, 103 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
| /kernel/linux/linux-5.10/arch/powerpc/include/asm/ |
| D | reg_fsl_emb.h | 36 #define PMLCA_FCU 0x20000000 /* Freeze in User */ 67 #define PMRN_UPMC0 0x000 /* User Performance Monitor Counter 0 */ 68 #define PMRN_UPMC1 0x001 /* User Performance Monitor Counter 1 */ 69 #define PMRN_UPMC2 0x002 /* User Performance Monitor Counter 2 */ 70 #define PMRN_UPMC3 0x003 /* User Performance Monitor Counter 3 */ 71 #define PMRN_UPMC4 0x004 /* User Performance Monitor Counter 4 */ 72 #define PMRN_UPMC5 0x005 /* User Performance Monitor Counter 5 */ 73 #define PMRN_UPMLCA0 0x080 /* User PM Local Control A0 */ 74 #define PMRN_UPMLCA1 0x081 /* User PM Local Control A1 */ 75 #define PMRN_UPMLCA2 0x082 /* User PM Local Control A2 */ [all …]
|
| /kernel/linux/linux-4.19/arch/powerpc/include/asm/ |
| D | reg_fsl_emb.h | 36 #define PMLCA_FCU 0x20000000 /* Freeze in User */ 67 #define PMRN_UPMC0 0x000 /* User Performance Monitor Counter 0 */ 68 #define PMRN_UPMC1 0x001 /* User Performance Monitor Counter 1 */ 69 #define PMRN_UPMC2 0x002 /* User Performance Monitor Counter 2 */ 70 #define PMRN_UPMC3 0x003 /* User Performance Monitor Counter 3 */ 71 #define PMRN_UPMC4 0x004 /* User Performance Monitor Counter 4 */ 72 #define PMRN_UPMC5 0x005 /* User Performance Monitor Counter 5 */ 73 #define PMRN_UPMLCA0 0x080 /* User PM Local Control A0 */ 74 #define PMRN_UPMLCA1 0x081 /* User PM Local Control A1 */ 75 #define PMRN_UPMLCA2 0x082 /* User PM Local Control A2 */ [all …]
|
| /kernel/linux/linux-5.10/Documentation/powerpc/ |
| D | cxlflash.rst | 24 CXL provides a mechanism by which user space applications can 27 user space application direct access to Flash storage. 33 special path for user space access, and performing error recovery. It 44 user space with a special block library. This mode further 59 directly in each user I/O, but at the minimum is involved in the 60 initial setup before the user application is allowed to send requests 68 | 512 * 64 KB User MMIO | 70 | User Accessible | 90 access to the Flash from user space (without requiring a system call). 93 block library to enable this user space access. The driver supports [all …]
|
| /kernel/linux/linux-4.19/Documentation/powerpc/ |
| D | cxlflash.txt | 20 CXL provides a mechanism by which user space applications can 23 user space application direct access to Flash storage. 29 special path for user space access, and performing error recovery. It 40 user space with a special block library. This mode further 55 directly in each user I/O, but at the minimum is involved in the 56 initial setup before the user application is allowed to send requests 64 | 512 * 64 KB User MMIO | 66 | User Accessible | 86 access to the Flash from user space (without requiring a system call). 89 block library to enable this user space access. The driver supports [all …]
|
| /kernel/linux/linux-5.10/scripts/ |
| D | Makefile.userprogs | 7 user-csingle := $(foreach m, $(userprogs), $(if $($(m)-objs),,$(m))) 10 user-cmulti := $(foreach m, $(userprogs), $(if $($(m)-objs),$(m))) 13 user-cobjs := $(sort $(foreach m, $(userprogs), $($(m)-objs))) 15 user-csingle := $(addprefix $(obj)/, $(user-csingle)) 16 user-cmulti := $(addprefix $(obj)/, $(user-cmulti)) 17 user-cobjs := $(addprefix $(obj)/, $(user-cobjs)) 27 $(user-csingle): $(obj)/%: $(src)/%.c FORCE 35 $(user-cmulti): FORCE 37 $(call multi_depend, $(user-cmulti), , -objs) 42 $(user-cobjs): $(obj)/%.o: $(src)/%.c FORCE [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 8 allowing a user to set up user namespace UID/GID mappings. 14 to switch to a different user must be spawned with CAP_SETUID privileges. 16 user that have been explicitly given the CAP_SETUID runtime capability. It is 19 privileges opens up possible security holes since any user with access to the 24 tree of processes under non-root user(s) in the first place. Specifically, 25 since CAP_SETUID allows changing to any user on the system, including the root 26 user, it is an overpowered capability for what is needed in this scenario, 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 29 generally feasible way in Linux to restrict the potential UIDs that a user can 30 switch to through setuid() beyond allowing a switch to any user on the system. [all …]
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | ipmi.h | 27 * Opaque type for a IPMI message user. One of these is needed to 48 struct ipmi_user *user; member 57 * be NULL. If the user above is NULL, then this will be the 91 * this is NULL, it will be ignored for the user. 103 * the user handle will be invalid. The interface may or may 110 /* Create a new user of the IPMI layer on the given interface number. */ 114 struct ipmi_user **user); 117 * Destroy the given user of the IPMI layer. Note that after this 119 * callbacks for the user. Thus as long as you destroy all the users 124 int ipmi_destroy_user(struct ipmi_user *user); [all …]
|
| /kernel/linux/linux-4.19/include/linux/ |
| D | ipmi.h | 27 * Opaque type for a IPMI message user. One of these is needed to 48 struct ipmi_user *user; member 57 * be NULL. If the user above is NULL, then this will be the 91 * this is NULL, it will be ignored for the user. 103 * the user handle will be invalid. The interface may or may 110 /* Create a new user of the IPMI layer on the given interface number. */ 114 struct ipmi_user **user); 117 * Destroy the given user of the IPMI layer. Note that after this 119 * callbacks for the user. Thus as long as you destroy all the users 124 int ipmi_destroy_user(struct ipmi_user *user); [all …]
|
| /kernel/linux/linux-5.10/arch/m68k/ifpsp060/ |
| D | os.S | 57 | Each IO routine checks to see if the memory write/read is to/from user 60 | for user mode applications. 71 | working in user space 80 | a1 - user destination address 82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 110 | a0 - user source address 113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 140 | Read a data byte from user memory. 143 | a0 - user source address 144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode [all …]
|
| /kernel/linux/linux-4.19/arch/m68k/ifpsp060/ |
| D | os.S | 57 | Each IO routine checks to see if the memory write/read is to/from user 60 | for user mode applications. 71 | working in user space 80 | a1 - user destination address 82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 110 | a0 - user source address 113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 140 | Read a data byte from user memory. 143 | a0 - user source address 144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode [all …]
|
| /kernel/linux/linux-5.10/Documentation/arm/ |
| D | sunxi.rst | 26 * User Manual 28 …http://dl.linux-sunxi.org/A10/A10%20User%20Manual%20-%20v1.20%20%282012-04-09%2c%20DECRYPTED%29.pdf 41 * User Manual 43 http://dl.linux-sunxi.org/A13/A13%20User%20Manual%20-%20v1.2%20%282013-01-08%29.pdf 57 * User Manual 59 http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf 67 * User Manual 69 http://dl.linux-sunxi.org/A23/A23%20User%20Manual%20V1.0%2020130830.pdf 78 * User Manual 80 …http://dl.linux-sunxi.org/A31/A3x_release_document/A31/IC/A31%20user%20manual%20V1.1%2020130630.pdf [all …]
|
| /kernel/linux/linux-4.19/Documentation/arm/sunxi/ |
| D | README | 21 + User Manual 22 …http://dl.linux-sunxi.org/A10/A10%20User%20Manual%20-%20v1.20%20%282012-04-09%2c%20DECRYPTED%29.pdf 31 + User Manual 32 http://dl.linux-sunxi.org/A13/A13%20User%20Manual%20-%20v1.2%20%282013-01-08%29.pdf 43 + User Manual 44 http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf 49 + User Manual 50 http://dl.linux-sunxi.org/A23/A23%20User%20Manual%20V1.0%2020130830.pdf 56 + User Manual 57 …http://dl.linux-sunxi.org/A31/A3x_release_document/A31/IC/A31%20user%20manual%20V1.1%2020130630.pdf [all …]
|
| /kernel/linux/linux-5.10/Documentation/misc-devices/ |
| D | uacce.rst | 6 Uacce (Unified/User-space-access-intended Accelerator Framework) targets to 11 Because of the unified address, hardware and user space of process can 21 | User application (CPU) | | Hardware Accelerator | 45 The user drivers and libraries are called WarpDrive. 57 | | user API | | 58 | WarpDrive library | ------------> | user driver | 93 created when user application open the chrdev. The file descriptor is used 94 as the user handle of the queue. 96 a chrdev to the user space. The user application communicates with the 109 * @UACCE_QFRT_DUS: device user share region [all …]
|
| /kernel/linux/linux-5.10/sound/soc/sof/intel/ |
| D | Kconfig | 17 This option is not user-selectable but automagically handled by 33 This option is not user-selectable but automagically handled by 39 This option is not user-selectable but automagically handled by 47 This option is not user-selectable but automagically handled by 57 This option is not user-selectable but automagically handled by 82 This option is not user-selectable but automagically handled by 106 This option is not user-selectable but automagically handled by 125 This option is not user-selectable but automagically handled by 140 This option is not user-selectable but automagically handled by 155 This option is not user-selectable but automagically handled by [all …]
|
| /kernel/linux/linux-4.19/Documentation/namespaces/ |
| D | compatibility-list.txt | 3 This document contains the information about the problems user 10 UTS IPC VFS PID User Net 15 User 2 2 X 28 2. Intentionally, two equal user IDs in different user namespaces 30 words, user 10 in one user namespace shouldn't have the same 31 access permissions to files, belonging to user 10 in another 35 from different user namespaces should not access the same IPC objects
|