| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | bpf_misc.h | 9 * Programs could be loaded in privileged and unprivileged modes. 10 * - __success, __failure, __msg imply privileged mode; 13 * If combination of privileged and unprivileged attributes is present 14 * both modes are used. If none are present privileged mode is implied. 17 * that differ between privileged and unprivileged modes. 27 * __success Expect program load success in privileged mode. 30 * __failure Expect program load failure in privileged mode.
|
| /kernel/linux/linux-5.10/drivers/infiniband/hw/mthca/ |
| D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
| /kernel/linux/linux-6.6/Documentation/powerpc/ |
| D | dexcr.rst | 10 The DEXCR is a privileged special purpose register (SPR) introduced in 22 A privileged SPR that can control aspects for userspace and kernel space 24 A hypervisor-privileged SPR that can control aspects for the hypervisor and 27 An optional ultravisor-privileged SPR that can control aspects for the ultravisor. 30 provides a non-privileged read-only view of the userspace DEXCR aspects.
|
| D | dscr.rst | 60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only) 61 (2) Privileged state SPR: 0x11 (Privileged) 63 Accessing DSCR through privileged SPR number (0x11) from user space
|
| /kernel/linux/linux-6.6/drivers/infiniband/hw/mthca/ |
| D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/ |
| D | perf-security.rst | 53 into two categories [6]_ : a) privileged processes (whose effective user 55 processes (whose effective UID is nonzero). Privileged processes bypass 57 monitoring is fully available to privileged processes without access, 70 as privileged processes with respect to perf_events performance 78 observability operations is also open for CAP_SYS_ADMIN privileged 102 Privileged Perf users groups 105 Mechanisms of capabilities, privileged capability-dumb files [6]_, 107 dedicated groups of privileged Perf users who are permitted to execute 109 steps can be taken to create such groups of privileged Perf users. 111 1. Create perf_users group of privileged Perf users, assign perf_users [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/ |
| D | perf-security.rst | 53 into two categories [6]_ : a) privileged processes (whose effective user 55 processes (whose effective UID is nonzero). Privileged processes bypass 57 monitoring is fully available to privileged processes without access, 70 as privileged processes with respect to perf_events performance 78 observability operations is also open for CAP_SYS_ADMIN privileged 99 Privileged Perf users groups 102 Mechanisms of capabilities, privileged capability-dumb files [6]_ and 104 privileged Perf users who are permitted to execute performance monitoring 106 taken to create such groups of privileged Perf users. 108 1. Create perf_users group of privileged Perf users, assign perf_users [all …]
|
| /kernel/liteos_m/arch/arm/cortex-m4/iar/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/liteos_m/arch/arm/cortex-m4/gcc/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/liteos_m/arch/arm/cortex-m4/keil/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/liteos_m/arch/arm/cortex-m7/iar/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/liteos_m/arch/arm/cortex-m7/gcc/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/linux/linux-5.10/Documentation/powerpc/ |
| D | dscr.rst | 60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only) 61 (2) Privileged state SPR: 0x11 (Privileged) 63 Accessing DSCR through privileged SPR number (0x11) from user space
|
| /kernel/linux/linux-6.6/Documentation/riscv/ |
| D | hwprobe.rst | 35 as defined by the RISC-V privileged architecture specification. 38 defined by the RISC-V privileged architecture specification. 41 defined by the RISC-V privileged architecture specification. 49 privileged ISA, with the following known exceptions (more exceptions may be
|
| /kernel/linux/linux-6.6/Documentation/filesystems/ |
| D | fuse.rst | 18 Non-privileged mount (or user mount): 19 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 204 How do non-privileged mounts work? 207 Since the mount() system call is a privileged operation, a helper 210 The implication of providing non-privileged mounts is that the mount 235 for non-privileged mounts. 290 measures, that system processes will never enter non-privileged 300 privileged. If any process could access such an 'allow_other' mount
|
| /kernel/linux/linux-5.10/include/xen/interface/ |
| D | xenpmu.h | 76 * Physical processor on which the interrupt occurred. On non-privileged 82 * Domain that was interrupted. On non-privileged guests set to 84 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
|
| /kernel/linux/linux-6.6/include/xen/interface/ |
| D | xenpmu.h | 76 * Physical processor on which the interrupt occurred. On non-privileged 82 * Domain that was interrupted. On non-privileged guests set to 84 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
|
| /kernel/linux/linux-5.10/Documentation/filesystems/ |
| D | fuse.rst | 18 Non-privileged mount (or user mount): 19 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 204 How do non-privileged mounts work? 207 Since the mount() system call is a privileged operation, a helper 210 The implication of providing non-privileged mounts is that the mount 235 for non-privileged mounts. 290 measures, that system processes will never enter non-privileged
|
| /kernel/linux/linux-6.6/security/safesetid/ |
| D | lsm.c | 208 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setuid() 232 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setgid() 253 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setgroups()
|
| /kernel/linux/linux-5.10/arch/powerpc/include/asm/ |
| D | spu_csa.h | 120 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads. 184 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads. 212 * @priv1: Collapsed Privileged 1 Area, w/o pads. 213 * @priv2: Collapsed Privileged 2 Area, w/o pads.
|
| /kernel/linux/linux-6.6/arch/powerpc/include/asm/ |
| D | spu_csa.h | 120 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads. 184 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads. 212 * @priv1: Collapsed Privileged 1 Area, w/o pads. 213 * @priv2: Collapsed Privileged 2 Area, w/o pads.
|
| /kernel/linux/linux-6.6/tools/perf/arch/arm64/util/ |
| D | arm-spe.c | 69 bool privileged) in arm_spe_snapshot_resolve_auxtrace_defaults() argument 73 * snapshot size is specified, then the default is 4MiB for privileged users, 128KiB for in arm_spe_snapshot_resolve_auxtrace_defaults() 76 * The default auxtrace mmap size is 4MiB/page_size for privileged users, 128KiB for in arm_spe_snapshot_resolve_auxtrace_defaults() 86 if (privileged) { in arm_spe_snapshot_resolve_auxtrace_defaults() 93 } else if (!opts->auxtrace_mmap_pages && !privileged && opts->mmap_pages == UINT_MAX) { in arm_spe_snapshot_resolve_auxtrace_defaults() 125 bool privileged = perf_event_paranoid_check(-1); in arm_spe_recording_options() local 158 arm_spe_snapshot_resolve_auxtrace_defaults(opts, privileged); in arm_spe_recording_options() 181 if (privileged) { in arm_spe_recording_options()
|
| /kernel/linux/linux-6.6/tools/testing/selftests/cgroup/ |
| D | test_cpuset.c | 115 /* Fork a privileged child as a test object */ in test_cpuset_perms_object() 121 * (including capabilities), the main process must remain privileged for in test_cpuset_perms_object() 202 /* Put a privileged child in the subtree and modify controller state in test_cpuset_perms_subtree() 203 * from an unprivileged process, the main process remains privileged in test_cpuset_perms_subtree()
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 42 non-root programs can drop to even-lesser-privileged uids. This is especially 56 spawning semantics in the application (e.g. by using a privileged helper program 62 fork()/exec(). Because of this, as solution that uses a privileged helper in
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 42 non-root programs can drop to even-lesser-privileged uids. This is especially 56 spawning semantics in the application (e.g. by using a privileged helper program 62 fork()/exec(). Because of this, as solution that uses a privileged helper in
|