Home
last modified time | relevance | path

Searched full:privileged (Results 1 – 25 of 549) sorted by relevance

12345678910>>...22

/kernel/linux/linux-5.10/drivers/infiniband/hw/mthca/
Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
/kernel/linux/linux-4.19/drivers/infiniband/hw/mthca/
Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dperf-security.rst53 into two categories [6]_ : a) privileged processes (whose effective user
55 processes (whose effective UID is nonzero). Privileged processes bypass
57 monitoring is fully available to privileged processes without access,
70 as privileged processes with respect to perf_events performance
78 observability operations is also open for CAP_SYS_ADMIN privileged
99 Privileged Perf users groups
102 Mechanisms of capabilities, privileged capability-dumb files [6]_ and
104 privileged Perf users who are permitted to execute performance monitoring
106 taken to create such groups of privileged Perf users.
108 1. Create perf_users group of privileged Perf users, assign perf_users
[all …]
/kernel/liteos_m/arch/arm/cortex-m4/gcc/
Dlos_mpu.c43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */
44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */
45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */
46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */
47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */
48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */
49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
/kernel/liteos_m/arch/arm/cortex-m7/gcc/
Dlos_mpu.c43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */
44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */
45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */
46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */
47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */
48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */
49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
/kernel/liteos_m/arch/arm/cortex-m4/iar/
Dlos_mpu.c43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */
44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */
45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */
46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */
47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */
48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */
49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
/kernel/liteos_m/arch/arm/cortex-m7/iar/
Dlos_mpu.c43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */
44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */
45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */
46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */
47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */
48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */
49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
/kernel/linux/linux-4.19/Documentation/powerpc/
Ddscr.txt56 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
57 (2) Privileged state SPR: 0x11 (Privileged)
59 Accessing DSCR through privileged SPR number (0x11) from user space
/kernel/linux/linux-5.10/Documentation/powerpc/
Ddscr.rst60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
61 (2) Privileged state SPR: 0x11 (Privileged)
63 Accessing DSCR through privileged SPR number (0x11) from user space
/kernel/linux/linux-4.19/arch/unicore32/kernel/
Dptrace.c21 * this routine will get a word off of the processes privileged stack.
23 * this routine assumes that all the privileged stacks are in our
32 * this routine will put a word on the processes privileged stack.
34 * this routine assumes that all the privileged stacks are in our
/kernel/linux/linux-4.19/include/xen/interface/
Dxenpmu.h76 * Physical processor on which the interrupt occurred. On non-privileged
82 * Domain that was interrupted. On non-privileged guests set to
84 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
/kernel/linux/linux-5.10/include/xen/interface/
Dxenpmu.h76 * Physical processor on which the interrupt occurred. On non-privileged
82 * Domain that was interrupted. On non-privileged guests set to
84 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
/kernel/linux/linux-4.19/Documentation/filesystems/
Dfuse.txt14 Non-privileged mount (or user mount):
16 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
218 How do non-privileged mounts work?
221 Since the mount() system call is a privileged operation, a helper
224 The implication of providing non-privileged mounts is that the mount
251 for non-privileged mounts.
306 measures, that system processes will never enter non-privileged
/kernel/linux/linux-5.10/Documentation/filesystems/
Dfuse.rst18 Non-privileged mount (or user mount):
19 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
204 How do non-privileged mounts work?
207 Since the mount() system call is a privileged operation, a helper
210 The implication of providing non-privileged mounts is that the mount
235 for non-privileged mounts.
290 measures, that system processes will never enter non-privileged
/kernel/linux/linux-5.10/arch/powerpc/include/asm/
Dspu_csa.h120 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads.
184 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads.
212 * @priv1: Collapsed Privileged 1 Area, w/o pads.
213 * @priv2: Collapsed Privileged 2 Area, w/o pads.
/kernel/linux/linux-4.19/arch/powerpc/include/asm/
Dspu_csa.h133 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads.
197 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads.
225 * @priv1: Collapsed Privileged 1 Area, w/o pads.
226 * @priv2: Collapsed Privileged 2 Area, w/o pads.
/kernel/linux/linux-5.10/Documentation/admin-guide/LSM/
DSafeSetID.rst28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
42 non-root programs can drop to even-lesser-privileged uids. This is especially
56 spawning semantics in the application (e.g. by using a privileged helper program
62 fork()/exec(). Because of this, as solution that uses a privileged helper in
/kernel/linux/linux-4.19/Documentation/ABI/testing/
Dsysfs-hypervisor-xen22 privileged (e.g. dom0), the hypervisor
25 privileged guests.
/kernel/linux/linux-4.19/Documentation/virtual/kvm/
Dppc-pv.txt5 space code in PR=1 which is user space. This way we trap all privileged
8 Unfortunately that is also the downfall. There are quite some privileged
12 This is what the PPC PV interface helps with. It takes privileged instructions
138 also act on the shared page. So calling privileged instructions still works as
/kernel/linux/linux-5.10/arch/sparc/include/asm/
Dpcr.h19 #define PCR_PIC_PRIV 0x00000001 /* PIC access is privileged */
45 #define PCR_N4_PICNPT 0x00010000 /* PIC non-privileged trap */
/kernel/linux/linux-4.19/arch/sparc/include/asm/
Dpcr.h19 #define PCR_PIC_PRIV 0x00000001 /* PIC access is privileged */
45 #define PCR_N4_PICNPT 0x00010000 /* PIC non-privileged trap */
/kernel/linux/linux-5.10/Documentation/ABI/testing/
Dsysfs-hypervisor-xen24 privileged (e.g. dom0), the hypervisor
27 privileged guests.
/kernel/linux/linux-5.10/include/uapi/linux/
Dseccomp.h91 * in scenarios where a more privileged process supervises the syscalls of a
92 * lesser privileged process to get around kernel-enforced security
93 * restrictions when the privileged process deems this safe. In other words,
/kernel/linux/linux-5.10/security/safesetid/
Dlsm.c217 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setuid()
241 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setgid()
/kernel/linux/linux-4.19/security/smack/
Dsmack_access.c631 * Is the task privileged and allowed to be privileged
634 * Returns true if the task is allowed to be privileged, false if it's not.
668 * Is the task privileged and allowed to be privileged
671 * Returns true if the task is allowed to be privileged, false if it's not.
676 * All kernel tasks are privileged in smack_privileged()

12345678910>>...22