Home
last modified time | relevance | path

Searched full:user (Results 1 – 25 of 5563) sorted by relevance

12345678910>>...223

/linux/fs/smb/server/mgmt/
H A Duser_config.c16 struct ksmbd_user *user = NULL; in ksmbd_login_user() local
28 user = ksmbd_alloc_user(resp, resp_ext); in ksmbd_login_user()
31 return user; in ksmbd_login_user()
37 struct ksmbd_user *user; in ksmbd_alloc_user() local
39 user = kmalloc_obj(struct ksmbd_user, KSMBD_DEFAULT_GFP); in ksmbd_alloc_user()
40 if (!user) in ksmbd_alloc_user()
43 user->name = kstrdup(resp->account, KSMBD_DEFAULT_GFP); in ksmbd_alloc_user()
44 user->flags = resp->status; in ksmbd_alloc_user()
45 user->gid = resp->gid; in ksmbd_alloc_user()
46 user->uid = resp->uid; in ksmbd_alloc_user()
[all …]
H A Duser_config.h25 static inline bool user_guest(struct ksmbd_user *user) in user_guest() argument
27 return user->flags & KSMBD_USER_FLAG_GUEST_ACCOUNT; in user_guest()
30 static inline void set_user_flag(struct ksmbd_user *user, int flag) in set_user_flag() argument
32 user->flags |= flag; in set_user_flag()
35 static inline int test_user_flag(struct ksmbd_user *user, int flag) in test_user_flag() argument
37 return user->flags & flag; in test_user_flag()
40 static inline void set_user_guest(struct ksmbd_user *user) in set_user_guest() argument
44 static inline char *user_passkey(struct ksmbd_user *user) in user_passkey() argument
46 return user->passkey; in user_passkey()
49 static inline char *user_name(struct ksmbd_user *user) in user_name() argument
[all …]
/linux/Documentation/admin-guide/sysctl/
H A Duser.rst2 Documentation for /proc/sys/user/
12 /proc/sys/user.
16 per user per user namespace limits.
24 The creation of per user per user namespace objects are charged to
25 the user in the user namespace who created the object and
26 verified to be below the per user limit in that user namespace.
29 who created user namespaces the creation of the object happens
30 in (user namespaces can be nested) and verified to be below the per user
31 limits in the user namespaces of those users.
34 user namespace does not allow a user to escape their current limits.
[all …]
/linux/arch/arm64/kernel/
H A Dsignal.c86 * Save the user access state into ua_state and reset it to disable any
108 * Set the user access state for invoking the signal handler.
119 * Restore the user access state to the values saved in ua_state.
129 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument
132 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout()
134 memset(user, 0, sizeof(*user)); in init_user_layout()
135 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout()
137 user->limit = user->size + reserved_size; in init_user_layout()
139 user->limit -= TERMINATOR_SIZE; in init_user_layout()
140 user->limit -= EXTRA_CONTEXT_SIZE; in init_user_layout()
[all …]
/linux/kernel/trace/
H A Dtrace_events_user.c45 * probes to print out to the user.
47 * These do not reflect the mapped bytes between the user and kernel space.
201 typedef void (*user_event_func_t) (struct user_event *user, struct iov_iter *i,
209 static struct user_event_mm *user_event_mm_get_all(struct user_event *user);
211 static int destroy_user_event(struct user_event *user);
212 static bool user_fields_match(struct user_event *user, int argc,
231 static struct user_event *user_event_get(struct user_event *user) in user_event_get() argument
233 refcount_inc(&user->refcnt); in user_event_get()
235 return user; in user_event_get()
240 struct user_event *user = container_of( in delayed_destroy_user_event() local
[all …]
/linux/drivers/mtd/nand/raw/atmel/
H A Dpmecc.c347 struct atmel_pmecc_user *user; in atmel_pmecc_create_user() local
355 size = sizeof(*user); in atmel_pmecc_create_user()
366 user = devm_kzalloc(pmecc->dev, size, GFP_KERNEL); in atmel_pmecc_create_user()
367 if (!user) in atmel_pmecc_create_user()
370 user->pmecc = pmecc; in atmel_pmecc_create_user()
372 user->partial_syn = (s16 *)PTR_ALIGN(user + 1, sizeof(u16)); in atmel_pmecc_create_user()
373 user->si = user->partial_syn + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user()
374 user->lmu = user->si + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user()
375 user->smu = user->lmu + (req->ecc.strength + 1); in atmel_pmecc_create_user()
376 user->mu = (s32 *)PTR_ALIGN(user->smu + in atmel_pmecc_create_user()
[all …]
/linux/arch/arm/mach-omap2/
H A Domap_hwmod_2xxx_interconnect_data.c27 .user = OCP_USER_MPU | OCP_USER_SDMA,
34 .user = OCP_USER_MPU,
47 .user = OCP_USER_MPU | OCP_USER_SDMA,
54 .user = OCP_USER_MPU | OCP_USER_SDMA,
62 .user = OCP_USER_MPU | OCP_USER_SDMA,
70 .user = OCP_USER_MPU | OCP_USER_SDMA,
78 .user = OCP_USER_MPU | OCP_USER_SDMA,
86 .user = OCP_USER_MPU | OCP_USER_SDMA,
94 .user = OCP_USER_MPU | OCP_USER_SDMA,
102 .user = OCP_USER_MPU | OCP_USER_SDMA,
[all …]
/linux/drivers/virt/acrn/
H A Dhypercall.h64 * hcall_create_vm() - Create a User VM
65 * @vminfo: Service VM GPA of info of User VM creation
75 * hcall_start_vm() - Start a User VM
76 * @vmid: User VM ID
86 * hcall_pause_vm() - Pause a User VM
87 * @vmid: User VM ID
97 * hcall_destroy_vm() - Destroy a User VM
98 * @vmid: User VM ID
108 * hcall_reset_vm() - Reset a User VM
109 * @vmid: User VM ID
[all …]
/linux/arch/powerpc/include/asm/
H A Dreg_fsl_emb.h53 #define PMLCA_FCU 0x20000000 /* Freeze in User */
84 #define PMRN_UPMC0 0x000 /* User Performance Monitor Counter 0 */
85 #define PMRN_UPMC1 0x001 /* User Performance Monitor Counter 1 */
86 #define PMRN_UPMC2 0x002 /* User Performance Monitor Counter 2 */
87 #define PMRN_UPMC3 0x003 /* User Performance Monitor Counter 3 */
88 #define PMRN_UPMC4 0x004 /* User Performance Monitor Counter 4 */
89 #define PMRN_UPMC5 0x005 /* User Performance Monitor Counter 5 */
90 #define PMRN_UPMLCA0 0x080 /* User PM Local Control A0 */
91 #define PMRN_UPMLCA1 0x081 /* User PM Local Control A1 */
92 #define PMRN_UPMLCA2 0x082 /* User PM Local Control A2 */
[all …]
/linux/arch/m68k/ifpsp060/
H A Dos.S57 | Each IO routine checks to see if the memory write/read is to/from user
60 | for user mode applications.
71 | working in user space
80 | a1 - user destination address
82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
110 | a0 - user source address
113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
140 | Read a data byte from user memory.
143 | a0 - user source address
144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode
[all …]
/linux/scripts/
H A DMakefile.userprogs7 user-csingle := $(foreach m, $(userprogs), $(if $($(m)-objs),,$(m)))
10 user-cmulti := $(foreach m, $(userprogs), $(if $($(m)-objs),$(m)))
13 user-cobjs := $(sort $(foreach m, $(userprogs), $($(m)-objs)))
15 user-csingle := $(addprefix $(obj)/, $(user-csingle))
16 user-cmulti := $(addprefix $(obj)/, $(user-cmulti))
17 user-cobjs := $(addprefix $(obj)/, $(user-cobjs))
28 $(user-csingle): $(obj)/%: $(src)/%.c FORCE
35 $(user-cmulti): FORCE
37 $(call multi_depend, $(user-cmulti), , -objs)
42 $(user-cobjs): $(obj)/%.o: $(src)/%.c FORCE
[all …]
/linux/Documentation/admin-guide/LSM/
H A DSafeSetID.rst8 allowing a user to set up user namespace UID/GID mappings.
14 to switch to a different user must be spawned with CAP_SETUID privileges.
16 user that have been explicitly given the CAP_SETUID runtime capability. It is
19 privileges opens up possible security holes since any user with access to the
24 tree of processes under non-root user(s) in the first place. Specifically,
25 since CAP_SETUID allows changing to any user on the system, including the root
26 user, it is an overpowered capability for what is needed in this scenario,
28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
29 generally feasible way in Linux to restrict the potential UIDs that a user can
30 switch to through setuid() beyond allowing a switch to any user on the system.
[all …]
/linux/include/linux/
H A Dipmi.h27 * Opaque type for a IPMI message user. One of these is needed to
48 struct ipmi_user *user; member
57 * be NULL. If the user above is NULL, then this will be the
96 * this is NULL, it will be ignored for the user. Note that you
109 * the user handle will be invalid. The interface may or may
116 /* Create a new user of the IPMI layer on the given interface number. */
120 struct ipmi_user **user);
123 * Destroy the given user of the IPMI layer. Note that after this
125 * callbacks for the user. Thus as long as you destroy all the users
130 void ipmi_destroy_user(struct ipmi_user *user);
[all …]
/linux/Documentation/arch/arm/
H A Dsunxi.rst26 * User Manual
28 …http://dl.linux-sunxi.org/A10/A10%20User%20Manual%20-%20v1.20%20%282012-04-09%2c%20DECRYPTED%29.pdf
41 * User Manual
43 http://dl.linux-sunxi.org/A13/A13%20User%20Manual%20-%20v1.2%20%282013-01-08%29.pdf
57 * User Manual
59 http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf
67 * User Manual
69 http://dl.linux-sunxi.org/A23/A23%20User%20Manual%20V1.0%2020130830.pdf
78 * User Manual
80 …http://dl.linux-sunxi.org/A31/A3x_release_document/A31/IC/A31%20user%20manual%20V1.1%2020130630.pdf
[all …]
/linux/tools/testing/selftests/namespaces/
H A Dlistns_permissions_test.c58 /* Create user namespace to be unprivileged */ in TEST()
132 * Test that users with CAP_SYS_ADMIN in a user namespace can see
133 * all namespaces owned by that user namespace.
143 .user_ns_id = 0, /* Will be set to our created user namespace */ in TEST()
166 /* Create user namespace - we'll have CAP_SYS_ADMIN in it */ in TEST()
172 /* Get the user namespace ID */ in TEST()
173 fd = open("/proc/self/ns/user", O_RDONLY); in TEST()
186 /* Create several namespaces owned by this user namespace */ in TEST()
191 /* List namespaces owned by our user namespace */ in TEST()
200 * We have CAP_SYS_ADMIN in this user namespace, in TEST()
[all …]
/linux/drivers/net/ethernet/freescale/enetc/
H A Dntmp.c110 static int netc_xmit_ntmp_cmd(struct ntmp_user *user, union netc_cbd *cbd) in netc_xmit_ntmp_cmd() argument
121 cbdr = &user->ring[0]; in netc_xmit_ntmp_cmd()
154 dev_err(user->dev, "Command BD error: 0x%04x\n", status); in netc_xmit_ntmp_cmd()
233 static int ntmp_delete_entry_by_id(struct ntmp_user *user, int tbl_id, in ntmp_delete_entry_by_id() argument
238 .dev = user->dev, in ntmp_delete_entry_by_id()
253 err = netc_xmit_ntmp_cmd(user, &cbd); in ntmp_delete_entry_by_id()
255 dev_err(user->dev, in ntmp_delete_entry_by_id()
264 static int ntmp_query_entry_by_id(struct ntmp_user *user, int tbl_id, in ntmp_query_entry_by_id() argument
280 err = netc_xmit_ntmp_cmd(user, &cbd); in ntmp_query_entry_by_id()
282 dev_err(user->dev, in ntmp_query_entry_by_id()
[all …]
/linux/tools/sched_ext/
H A Dscx_userland.bpf.c8 * enqueued in user space.
9 * 2. A primitive vruntime scheduler that is implemented in user space, for all
12 * Some parts of this example user space scheduler could be implemented more
16 * user space and kernel space. Similarly, we use a simple vruntime-sorted list
17 * in user space, but an rbtree could be used instead.
27 * Maximum amount of tasks enqueued/dispatched between kernel and user-space.
38 /* Stats that are printed by user space. */
45 * user-space scheduler and it must be decremented by the user-space scheduler
53 * This number must be updated by the user-space scheduler to keep track if
61 * The map containing tasks that are enqueued in user space from the kernel.
[all …]
/linux/Documentation/misc-devices/
H A Duacce.rst3 Uacce (Unified/User-space-access-intended Accelerator Framework)
9 Uacce (Unified/User-space-access-intended Accelerator Framework) targets to
14 Because of the unified address, hardware and user space of process can
24 | User application (CPU) | | Hardware Accelerator |
48 The user drivers and libraries are called WarpDrive.
60 | | user API | |
61 | WarpDrive library | ------------> | user driver |
96 created when user application open the chrdev. The file descriptor is used
97 as the user handle of the queue.
99 a chrdev to the user space. The user application communicates with the
[all …]
/linux/drivers/fsi/
H A Dfsi-sbefifo.c782 static void sbefifo_release_command(struct sbefifo_user *user) in sbefifo_release_command() argument
784 if (is_vmalloc_addr(user->pending_cmd)) in sbefifo_release_command()
785 vfree(user->pending_cmd); in sbefifo_release_command()
786 user->pending_cmd = NULL; in sbefifo_release_command()
787 user->pending_len = 0; in sbefifo_release_command()
793 struct sbefifo_user *user; in sbefifo_user_open() local
795 user = kzalloc_obj(struct sbefifo_user); in sbefifo_user_open()
796 if (!user) in sbefifo_user_open()
799 file->private_data = user; in sbefifo_user_open()
800 user->sbefifo = sbefifo; in sbefifo_user_open()
[all …]
/linux/Documentation/networking/dsa/
H A Dconfiguration.rst35 All other corresponding linux interfaces are called user interfaces.
37 The user interfaces depend on the conduit interface being up in order for them
39 interface had to be managed explicitly by the user. Starting with kernel v5.12,
42 - when a DSA user interface is brought up, the conduit interface is
44 - when the conduit interface is brought down, all DSA user interfaces are
56 a user interface
59 another user interface
62 a third user interface
65 A user interface dedicated for upstream traffic
100 # brought up manually before the user ports.
[all …]
/linux/drivers/iommu/iommufd/
H A Dpages.c788 static void pfn_reader_user_init(struct pfn_reader_user *user, in pfn_reader_user_init() argument
791 user->upages = NULL; in pfn_reader_user_init()
792 user->upages_len = 0; in pfn_reader_user_init()
793 user->upages_start = 0; in pfn_reader_user_init()
794 user->upages_end = 0; in pfn_reader_user_init()
795 user->locked = -1; in pfn_reader_user_init()
796 user->gup_flags = FOLL_LONGTERM; in pfn_reader_user_init()
798 user->gup_flags |= FOLL_WRITE; in pfn_reader_user_init()
800 user->file = (pages->type == IOPT_ADDRESS_FILE) ? pages->file : NULL; in pfn_reader_user_init()
801 user->ufolios = NULL; in pfn_reader_user_init()
[all …]
/linux/net/core/
H A Dpage_pool_user.c19 * pool->user.
24 /* Page pools are only reachable from user space (via netlink) if they are
28 * - user.list: linked to real netdev, netdev: real netdev
30 * - user.list: linked to lo, netdev: lo
33 * - user.list: unhashed, netdev: unknown
48 if (!pool || hlist_unhashed(&pool->user.list) || in netdev_nl_page_pool_get_do()
94 hlist_for_each_entry(pool, &netdev->page_pools, user.list) { in netdev_nl_page_pool_get_dump()
95 if (state->pp_id && state->pp_id < pool->user.id) in netdev_nl_page_pool_get_dump()
98 state->pp_id = pool->user.id; in netdev_nl_page_pool_get_dump()
131 if (nla_put_uint(rsp, NETDEV_A_PAGE_POOL_ID, pool->user.id) || in page_pool_nl_stats_fill()
[all …]
/linux/Documentation/admin-guide/hw-vuln/
H A Dattack_vector_controls.rst31 User-to-Kernel
34 The user-to-kernel attack vector involves a malicious userspace program
39 If no untrusted userspace applications are being run, such as with single-user
40 systems, consider disabling user-to-kernel mitigations.
43 shown to be exploitable from browser-based sandboxes. User-to-kernel
47 *user-to-kernel mitigations are enabled by default*
51 User-to-User
54 The user-to-user attack vector involves a malicious userspace program attempting
60 user-to-user mitigations.
64 userspace program requires mitigating user-to-kernel attacks as well for
[all …]
/linux/fs/smb/server/
H A Dksmbd_netlink.h14 * This is a userspace ABI to communicate data between ksmbd and user IPC
15 * daemon using netlink. This is added to track and cache user account DB
19 * This event is to check whether user IPC daemon is alive. If user IPC
25 * server from the user IPC daemon and to start the server. The global
33 * This event is to get user account info to user IPC daemon.
42 * This event is to send tree disconnect info to user IPC daemon.
45 * This event is to send logout request to user IPC daemon.
56 * This event is to get user account extension info to user IPC daemon.
67 * IPC heartbeat frame to check whether user IPC daemon is alive.
131 * IPC user login request.
[all …]
/linux/drivers/staging/greybus/Documentation/firmware/
H A Dfirmware-management57 and user first needs to identify the character device used for
61 be used by the user to identify the right character device for it. The class
80 Following are the IOCTLs and their data structures available to the user:
142 This ioctl shall be used by the user to get the version and firmware-tag of
148 This ioctl shall be used by the user to get the version of a currently
149 running Backend Interface Firmware identified by a firmware-tag. The user is
156 This ioctl shall be used by the user to load an Interface Firmware package on
157 an Interface. The user needs to fill the 'firmware_tag' and 'load_method'
163 This ioctl shall be used by the user to request an Interface to update a
164 Backend Interface Firmware. The user is required to fill the 'firmware_tag'
[all …]

12345678910>>...223