Home
last modified time | relevance | path

Searched refs:user (Results 951 - 975 of 1367) sorted by relevance

1...<<31323334353637383940>>...55

/kernel/linux/linux-5.10/drivers/media/dvb-frontends/cxd2880/
H A Dcxd2880_tnrdmd.h225 void *user; member
/kernel/linux/linux-5.10/drivers/infiniband/core/
H A Drestrack.c152 * valid for user space restrack entries.
166 res->user = true; in rdma_restrack_attach_task()
/kernel/linux/linux-5.10/drivers/scsi/aic7xxx/
H A Daic7xxx_proc.c149 ahc_format_transinfo(m, &tinfo->user); in ahc_dump_target_state()
/kernel/linux/linux-5.10/samples/seccomp/
H A Duser-trap.c16 #include <sys/user.h>
179 * interesting, because we could do unprivlieged bind mounts with user in handle_req()
/kernel/linux/linux-5.10/security/keys/
H A Ddh.c14 #include <keys/user-type.h>
H A Dinternal.h47 * Keep track of keys for a user.
62 int qnkeys; /* number of keys allocated to this user */
63 int qnbytes; /* number of bytes allocated to this user */
71 extern void key_user_put(struct key_user *user);
/kernel/linux/linux-5.10/scripts/package/
H A Dbuilddeb116 packagename=user-mode-linux-$version
/kernel/linux/linux-5.10/tools/testing/selftests/
H A DMakefile67 TARGETS += user
/kernel/linux/linux-5.10/include/uapi/linux/
H A Dxfrm.h61 __kernel_uid32_t user; member
146 XFRM_SHARE_USER, /* For this user only */
230 * Generic LSM security context for comunicating to user space
429 #define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */
/kernel/linux/linux-5.10/include/rdma/
H A Drdma_vt.h157 bool user; member
/kernel/linux/linux-5.10/fs/fscache/
H A Dobject-list.c14 #include <keys/user-type.h>
381 * - can be configured by a user-defined key added to the caller's keyrings
/kernel/linux/linux-5.10/fs/
H A Dbinfmt_aout.c23 #include <linux/user.h>
55 * create_aout_tables() parses the env- and arg-strings in new user
/kernel/linux/linux-5.10/fs/crypto/
H A Dkeysetup_v1.c25 #include <keys/user-type.h>
/kernel/linux/linux-5.10/lib/
H A Dtest_stackinit.c272 DEFINE_TEST(user, struct test_user, STRUCT, none);
/kernel/linux/linux-5.10/net/dns_resolver/
H A Ddns_key.c34 #include <keys/user-type.h>
/kernel/linux/linux-5.10/net/ceph/
H A Dcrypto.c15 #include <keys/user-type.h>
/kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/nvkm/falcon/
H A Dv1.c291 nvkm_error(falcon->user, "Falcon mem scrubbing timeout\n"); in nvkm_falcon_v1_enable()
/kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/nvkm/subdev/fault/
H A Dgv100.c227 .user = { { 0, 0, VOLTA_FAULT_BUFFER_A }, 1 },
/kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/
H A Dnv50_fbcon.c197 ret = nvif_object_ctor(&chan->user, "fbconTwoD", 0x502d, 0x502d, in nv50_fbcon_accel_init()
H A Dnvc0_fbcon.c170 ret = nvif_object_ctor(&chan->user, "fbconTwoD", 0x902d, 0x902d, in nvc0_fbcon_accel_init()
/kernel/linux/linux-5.10/include/acpi/
H A Dprocessor.h201 struct acpi_processor_lx user; /* user limit */ member
/kernel/linux/linux-5.10/include/linux/
H A Dkey.h48 #define KEY_USR_VIEW 0x00010000 /* user permissions... */
200 struct key_user *user; /* owner of this key */ member
232 #define KEY_FLAG_UID_KEYRING 9 /* set if key is a user or user session keyring */
291 #define KEY_ALLOC_UID_KEYRING 0x0010 /* allocating a user or user session keyring */
356 * keyring if found, new keys are always allocated in the user's quota, the
/kernel/linux/linux-6.6/drivers/media/dvb-frontends/cxd2880/
H A Dcxd2880_tnrdmd.h225 void *user; member
/kernel/linux/linux-6.6/drivers/net/ethernet/ibm/ehea/
H A Dehea.h166 struct h_epa_user user; /* user space accessible resource member
/kernel/linux/linux-6.6/fs/crypto/
H A Dkeysetup_v1.c25 #include <keys/user-type.h>

Completed in 17 milliseconds

1...<<31323334353637383940>>...55