/linux-4.1.27/drivers/infiniband/hw/mthca/ |
D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
D | mthca_provider.h | 102 int privileged; member
|
D | mthca_dev.h | 462 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd);
|
/linux-4.1.27/Documentation/filesystems/ |
D | fuse.txt | 14 Non-privileged mount (or user mount): 16 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 218 How do non-privileged mounts work? 221 Since the mount() system call is a privileged operation, a helper 224 The implication of providing non-privileged mounts is that the mount 251 for non-privileged mounts. 306 measures, that system processes will never enter non-privileged
|
D | autofs4-mount-control.txt | 96 where the number of privileged ports available is exhausted.
|
D | ext2.txt | 209 allow for the system to continue functioning even if non-privileged users
|
/linux-4.1.27/drivers/infiniband/hw/amso1100/ |
D | c2_pd.c | 43 int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd) in c2_pd_alloc() argument
|
D | c2.h | 506 extern int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd);
|
/linux-4.1.27/Documentation/virtual/kvm/ |
D | ppc-pv.txt | 5 space code in PR=1 which is user space. This way we trap all privileged 8 Unfortunately that is also the downfall. There are quite some privileged 12 This is what the PPC PV interface helps with. It takes privileged instructions 138 also act on the shared page. So calling privileged instructions still works as
|
D | api.txt | 122 privileged user (CAP_SYS_ADMIN). 3535 Only privileged operation exceptions will be checked for in the kernel (or even
|
/linux-4.1.27/arch/mips/kvm/ |
D | Kconfig | 32 When running in Trap & Emulate mode patch privileged
|
/linux-4.1.27/Documentation/s390/ |
D | monreader.txt | 28 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP 71 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name 88 (Class E privileged), see "CP Command and Utility Reference". 161 module. You can also use the (Class E privileged) CP command Q NSS MAP to
|
D | Debugging390.txt | 1026 2=privileged operation exception
|
/linux-4.1.27/arch/ia64/scripts/ |
D | pvcheck.sed | 2 # Checker for paravirtualizations of privileged operations.
|
/linux-4.1.27/Documentation/security/ |
D | Smack.txt | 319 capabilities is a privileged task, whereas a task with no 491 privileged process can change its own Smack label by writing to 502 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged. 567 can only be set by privileged tasks, but any task can read them for their own 570 SMACK64IPIN: The Smack label of the task object. A privileged 574 A privileged program may set this to match the label of another 641 will put the Smack label of the root directory into value. A privileged 654 A privileged process can set the Smack label of outgoing packets with
|
D | Yama.txt | 53 did not transition uids, start privileged, or have called
|
/linux-4.1.27/Documentation/prctl/ |
D | no_new_privs.txt | 36 involve execve. An appropriately privileged task can still call
|
/linux-4.1.27/Documentation/infiniband/ |
D | user_verbs.txt | 68 use by non-privileged processes, it may be useful to add an
|
/linux-4.1.27/Documentation/pti/ |
D | pti_intel_mid.txt | 37 Below is example pseudo-code on how a 'privileged' application
|
/linux-4.1.27/Documentation/sysctl/ |
D | fs.txt | 213 contents of privileged processes. 220 to treat privileged core dumps with care, or specific directory
|
/linux-4.1.27/arch/powerpc/kvm/ |
D | Kconfig | 105 privileged instructions and registers.
|
/linux-4.1.27/Documentation/ia64/ |
D | fsys.txt | 34 - execution is at privilege level 0 (most-privileged) 58 privileged) and (b) the stacks have NOT been switched to kernel memory
|
/linux-4.1.27/Documentation/misc-devices/mei/ |
D | mei.txt | 68 configuration, the driver by default allows only a privileged
|
/linux-4.1.27/Documentation/arm/ |
D | Booting | 203 the HYP mode configuration in addition to the ordinary PL1 (privileged
|
/linux-4.1.27/Documentation/vm/ |
D | numa | 115 privileged user can specify in the scheduling or NUMA commands and functions
|
/linux-4.1.27/Documentation/cgroups/ |
D | unified-hierarchy.txt | 424 inadvertently promoted to programmable API used by non-privileged 460 significant deterrent against spraying cgroup usages in non-privileged
|
/linux-4.1.27/drivers/dma/ |
D | pl330.c | 304 bool privileged; member 1349 if (rqc->privileged) in _prepare_ccr()
|
/linux-4.1.27/scripts/ |
D | spelling.txt | 725 privilaged||privileged
|
/linux-4.1.27/Documentation/ |
D | vfio.txt | 10 safe[2], non-privileged, userspace drivers.
|
D | kernel-parameters.txt | 3480 originate from a privileged port (i.e. a port in the 3484 kernel's sunrpc client considers to be privileged
|
/linux-4.1.27/Documentation/networking/ |
D | rxrpc.txt | 508 non-privileged port will be used. A UDP port may be shared between
|
D | ip-sysctl.txt | 196 Show/set the congestion control choices available to non-privileged
|
D | bonding.txt | 2486 most Cisco switches, the privileged command "clear mac address-table
|
/linux-4.1.27/fs/nfs/ |
D | nfs4proc.c | 8348 bool privileged) in _nfs41_free_stateid() argument 8377 if (privileged) in _nfs41_free_stateid()
|
/linux-4.1.27/arch/x86/ |
D | Kconfig | 1160 This device gives privileged processes access to the x86
|