/linux-4.4.14/drivers/infiniband/hw/mthca/ |
D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
D | mthca_provider.h | 102 int privileged; member
|
D | mthca_dev.h | 462 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd);
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | sysfs-hypervisor-pmu | 11 privileged (e.g. dom0), the hypervisor 14 privileged guests.
|
/linux-4.4.14/tools/perf/arch/x86/util/ |
D | intel-bts.c | 120 bool privileged = geteuid() == 0 || perf_event_paranoid() < 0; in intel_bts_recording_options() local 154 if (privileged) { in intel_bts_recording_options() 161 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options() 191 if (privileged) { in intel_bts_recording_options()
|
D | intel-pt.c | 505 bool privileged = geteuid() == 0 || perf_event_paranoid() < 0; in intel_pt_recording_options() local 547 if (privileged) { in intel_pt_recording_options() 554 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options() 589 if (privileged) { in intel_pt_recording_options()
|
/linux-4.4.14/Documentation/filesystems/ |
D | fuse.txt | 14 Non-privileged mount (or user mount): 16 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 218 How do non-privileged mounts work? 221 Since the mount() system call is a privileged operation, a helper 224 The implication of providing non-privileged mounts is that the mount 251 for non-privileged mounts. 306 measures, that system processes will never enter non-privileged
|
D | autofs4-mount-control.txt | 96 where the number of privileged ports available is exhausted.
|
D | ext2.txt | 209 allow for the system to continue functioning even if non-privileged users
|
/linux-4.4.14/drivers/staging/rdma/amso1100/ |
D | c2_pd.c | 43 int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd) in c2_pd_alloc() argument
|
D | c2.h | 506 extern int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd);
|
/linux-4.4.14/Documentation/virtual/kvm/ |
D | ppc-pv.txt | 5 space code in PR=1 which is user space. This way we trap all privileged 8 Unfortunately that is also the downfall. There are quite some privileged 12 This is what the PPC PV interface helps with. It takes privileged instructions 138 also act on the shared page. So calling privileged instructions still works as
|
D | api.txt | 122 privileged user (CAP_SYS_ADMIN). 3610 Only privileged operation exceptions will be checked for in the kernel (or even
|
/linux-4.4.14/arch/mips/kvm/ |
D | Kconfig | 32 When running in Trap & Emulate mode patch privileged
|
/linux-4.4.14/Documentation/powerpc/ |
D | dscr.txt | 56 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only) 59 Accessing DSCR through privileged SPR number (0x11) from user space
|
/linux-4.4.14/Documentation/s390/ |
D | monreader.txt | 28 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP 71 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name 88 (Class E privileged), see "CP Command and Utility Reference". 161 module. You can also use the (Class E privileged) CP command Q NSS MAP to
|
D | Debugging390.txt | 1026 2=privileged operation exception
|
/linux-4.4.14/Documentation/sysctl/ |
D | fs.txt | 166 Maximum total number of pages a non-privileged user may allocate for pipes. 175 Maximum total number of pages a non-privileged user may allocate for pipes 236 contents of privileged processes. 243 to treat privileged core dumps with care, or specific directory
|
/linux-4.4.14/Documentation/prctl/ |
D | no_new_privs.txt | 36 involve execve. An appropriately privileged task can still call
|
/linux-4.4.14/Documentation/input/ |
D | userio.txt | 11 of them. userio accomplishes this by allowing any privileged userspace program
|
/linux-4.4.14/Documentation/infiniband/ |
D | user_verbs.txt | 68 use by non-privileged processes, it may be useful to add an
|
/linux-4.4.14/Documentation/security/ |
D | Smack.txt | 354 capabilities is a privileged task, whereas a task with no 526 privileged process can change its own Smack label by writing to 537 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged. 602 can only be set by privileged tasks, but any task can read them for their own 605 SMACK64IPIN: The Smack label of the task object. A privileged 609 A privileged program may set this to match the label of another 676 will put the Smack label of the root directory into value. A privileged 689 A privileged process can set the Smack label of outgoing packets with
|
D | Yama.txt | 51 did not transition uids, start privileged, or have called
|
/linux-4.4.14/Documentation/pti/ |
D | pti_intel_mid.txt | 37 Below is example pseudo-code on how a 'privileged' application
|
/linux-4.4.14/arch/powerpc/kvm/ |
D | Kconfig | 105 privileged instructions and registers.
|
/linux-4.4.14/Documentation/ia64/ |
D | fsys.txt | 34 - execution is at privilege level 0 (most-privileged) 58 privileged) and (b) the stacks have NOT been switched to kernel memory
|
/linux-4.4.14/Documentation/arm/ |
D | Booting | 203 the HYP mode configuration in addition to the ordinary PL1 (privileged
|
/linux-4.4.14/tools/perf/Documentation/ |
D | intel-pt.txt | 387 nor snapshot size is specified, then the default is 4MiB for privileged users 409 The default auxtrace mmap size for Intel PT is 4MiB/page_size for privileged users 546 Privileged vs non-privileged users
|
/linux-4.4.14/Documentation/cgroups/ |
D | unified-hierarchy.txt | 252 A cgroup can be delegated to a less privileged user by granting write 610 inadvertently promoted to programmable API used by non-privileged 646 significant deterrent against spraying cgroup usages in non-privileged
|
/linux-4.4.14/Documentation/misc-devices/mei/ |
D | mei.txt | 68 configuration, the driver by default allows only a privileged
|
/linux-4.4.14/Documentation/vm/ |
D | numa | 115 privileged user can specify in the scheduling or NUMA commands and functions
|
/linux-4.4.14/drivers/dma/ |
D | pl330.c | 304 bool privileged; member 1352 if (rqc->privileged) in _prepare_ccr()
|
/linux-4.4.14/scripts/ |
D | spelling.txt | 746 privilaged||privileged
|
/linux-4.4.14/Documentation/ |
D | vfio.txt | 10 safe[2], non-privileged, userspace drivers.
|
D | adding-syscalls.txt | 145 If your new xyzzy(2) system call involves privileged functionality, it needs
|
D | kernel-parameters.txt | 3600 originate from a privileged port (i.e. a port in the 3604 kernel's sunrpc client considers to be privileged
|
/linux-4.4.14/Documentation/networking/ |
D | rxrpc.txt | 508 non-privileged port will be used. A UDP port may be shared between
|
D | ip-sysctl.txt | 196 Show/set the congestion control choices available to non-privileged
|
D | bonding.txt | 2570 most Cisco switches, the privileged command "clear mac address-table
|
/linux-4.4.14/fs/nfs/ |
D | nfs4proc.c | 8505 bool privileged) in _nfs41_free_stateid() argument 8534 if (privileged) in _nfs41_free_stateid()
|
/linux-4.4.14/arch/arm/ |
D | Kconfig | 1691 bool "Enable use of CPU domains to implement privileged no-access"
|
/linux-4.4.14/arch/x86/ |
D | Kconfig | 1175 This device gives privileged processes access to the x86
|