Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 75) sorted by relevance

123

/kernel/linux/linux-5.10/drivers/infiniband/hw/mthca/
Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
Dmthca_provider.h84 int privileged; member
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dperf-security.rst53 into two categories [6]_ : a) privileged processes (whose effective user
57 monitoring is fully available to privileged processes without access,
70 as privileged processes with respect to perf_events performance
78 observability operations is also open for CAP_SYS_ADMIN privileged
102 Mechanisms of capabilities, privileged capability-dumb files [6]_ and
104 privileged Perf users who are permitted to execute performance monitoring
106 taken to create such groups of privileged Perf users.
108 1. Create perf_users group of privileged Perf users, assign perf_users
246 privileged users can be provided with memory above the constraints for
/kernel/linux/linux-5.10/Documentation/ABI/testing/
Dsysfs-hypervisor-xen24 privileged (e.g. dom0), the hypervisor
27 privileged guests.
/kernel/linux/linux-5.10/tools/perf/arch/x86/util/
Dintel-bts.c114 bool privileged = perf_event_paranoid_check(-1); in intel_bts_recording_options() local
153 if (privileged) { in intel_bts_recording_options()
160 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options()
190 if (privileged) { in intel_bts_recording_options()
Dintel-pt.c629 bool privileged = perf_event_paranoid_check(-1); in intel_pt_recording_options() local
683 if (privileged) { in intel_pt_recording_options()
690 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options()
729 if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options()
753 if (privileged) { in intel_pt_recording_options()
/kernel/linux/linux-5.10/tools/perf/arch/arm64/util/
Darm-spe.c71 bool privileged = perf_event_paranoid_check(-1); in arm_spe_recording_options() local
95 if (privileged) { in arm_spe_recording_options()
/kernel/linux/linux-5.10/Documentation/filesystems/
Dfuse.rst18 Non-privileged mount (or user mount):
19 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
204 How do non-privileged mounts work?
207 Since the mount() system call is a privileged operation, a helper
210 The implication of providing non-privileged mounts is that the mount
235 for non-privileged mounts.
290 measures, that system processes will never enter non-privileged
/kernel/linux/linux-5.10/tools/perf/arch/arm/util/
Dcs-etm.c262 bool privileged = perf_event_paranoid_check(-1); in cs_etm_recording_options() local
308 if (privileged) { in cs_etm_recording_options()
316 } else if (!opts->auxtrace_mmap_pages && !privileged && in cs_etm_recording_options()
361 if (privileged) { in cs_etm_recording_options()
376 if (!privileged && in cs_etm_recording_options()
/kernel/linux/linux-5.10/Documentation/admin-guide/LSM/
DSafeSetID.rst28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
42 non-root programs can drop to even-lesser-privileged uids. This is especially
56 spawning semantics in the application (e.g. by using a privileged helper program
62 fork()/exec(). Because of this, as solution that uses a privileged helper in
/kernel/linux/linux-5.10/Documentation/virt/kvm/
Dppc-pv.rst8 space code in PR=1 which is user space. This way we trap all privileged
11 Unfortunately that is also the downfall. There are quite some privileged
15 This is what the PPC PV interface helps with. It takes privileged instructions
147 also act on the shared page. So calling privileged instructions still works as
/kernel/linux/linux-5.10/Documentation/powerpc/
Ddscr.rst60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
63 Accessing DSCR through privileged SPR number (0x11) from user space
Dultravisor.rst19 When enabled, PEF adds a new higher privileged mode, called Ultravisor
22 for short). Ultravisor mode is the highest privileged mode in POWER
37 PEF protects SVMs from the hypervisor, privileged users, and other
48 privileged are now ultravisor privileged.
65 * There is a new Ultravisor privileged register, SMFCTRL, which has an
123 * The following resources have become Ultravisor privileged and
222 be accessed when running in Ultravisor-privileged mode.
/kernel/linux/linux-5.10/Documentation/s390/
Dmonreader.rst30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP
75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name
95 (Class E privileged), see "CP Command and Utility Reference".
173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
/kernel/linux/linux-5.10/fs/nfs/
Dnfs4session.h28 unsigned int privileged : 1, member
/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/
Dspectre.rst9 do not modify memory but attempt to infer privileged data in the memory.
58 privileged data touched during the speculative execution.
62 execution of indirect branches to leak privileged memory.
109 this could cause privileged code's indirect branch to jump to a gadget
164 for speculative execution. This could cause privileged memory to be
179 could cause privileged memory to be accessed and leaked.
241 code to derive invalid data pointers accessing privileged memory in
281 speculate into privileged memory after entering the kernel. For places
307 pointers to privileged data in guest. The privileged data could be
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/firmware/
Dintel,stratix10-svc.txt15 Intel Stratix10 service layer driver, running at privileged exception level
/kernel/linux/linux-5.10/drivers/net/ethernet/freescale/enetc/
DKconfig11 physical function (PF) devices, managing ENETC Ports at a privileged
/kernel/linux/linux-5.10/arch/mips/kvm/
DKconfig62 When running in Trap & Emulate mode patch privileged
/kernel/linux/linux-5.10/Documentation/firmware-guide/acpi/
Daml-debugger.rst35 sufficiently privileged user).
/kernel/linux/linux-5.10/Documentation/core-api/
Ddma-attributes.rst128 accesses to DMA buffers in both privileged "supervisor" and unprivileged
132 lesser-privileged levels).
/kernel/linux/linux-5.10/Documentation/admin-guide/sysctl/
Dfs.rst183 Maximum total number of pages a non-privileged user may allocate for pipes.
192 Maximum total number of pages a non-privileged user may allocate for pipes
289 memory contents of privileged processes.
296 pipe handler that knows to treat privileged core dumps with
/kernel/linux/linux-5.10/Documentation/userspace-api/
Dno_new_privs.rst42 involve ``execve()``. An appropriately privileged task can still call
/kernel/linux/linux-5.10/Documentation/input/
Duserio.rst19 of them. userio accomplishes this by allowing any privileged userspace program
/kernel/linux/linux-5.10/Documentation/infiniband/
Duser_verbs.rst74 use by non-privileged processes, it may be useful to add an

123