| /kernel/linux/linux-6.6/net/smc/ |
| D | smc_netlink.c | 39 /* can be retrieved by unprivileged users */ 44 /* can be retrieved by unprivileged users */ 49 /* can be retrieved by unprivileged users */ 54 /* can be retrieved by unprivileged users */ 59 /* can be retrieved by unprivileged users */ 64 /* can be retrieved by unprivileged users */ 69 /* can be retrieved by unprivileged users */ 74 /* can be retrieved by unprivileged users */ 79 /* can be retrieved by unprivileged users */ 101 /* can be retrieved by unprivileged users */ [all …]
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/riscv/ |
| D | extensions.yaml | 57 version of the unprivileged ISA specification. 72 version of the unprivileged ISA specification. 76 20191213 version of the unprivileged specification. 81 ratified in the 20191213 version of the unprivileged ISA 87 20191213 version of the unprivileged ISA specification. 92 ratified in the 20191213 version of the unprivileged ISA 98 ratified in the 20191213 version of the unprivileged ISA 104 ratified in the 20191213 version of the unprivileged ISA 110 the 20191213 version of the unprivileged ISA specification. 212 ratified in the 20191213 version of the unprivileged ISA [all …]
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | bpf_misc.h | 9 * Programs could be loaded in privileged and unprivileged modes. 12 * unprivileged mode. 13 * If combination of privileged and unprivileged attributes is present 17 * that differ between privileged and unprivileged modes. 20 * unprivileged mode is derived from the usual program name by adding 25 * __msg_unpriv Same as __msg but for unprivileged mode. 28 * __success_unpriv Expect program load success in unprivileged mode. 31 * __failure_unpriv Expect program load failure in unprivileged mode. 40 * __retval_unpriv Same, but load program in unprivileged mode. 59 * __auxiliary_unpriv Same, but load program in unprivileged mode.
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/ |
| D | perf-security.rst | 54 ID is 0, referred to as superuser or root), and b) unprivileged 60 Unprivileged processes are subject to a full security permission check 67 files of unprivileged users. 69 Unprivileged processes with enabled CAP_PERFMON capability are treated 87 Unprivileged processes using perf_events system call are also subject 89 outcome determines whether monitoring is permitted. So unprivileged 93 Other capabilities being granted to unprivileged processes can 166 Unprivileged users 169 perf_events *scope* and *access* control for unprivileged processes 186 imposed but ignored for unprivileged processes with CAP_IPC_LOCK [all …]
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | fanotify.h | 32 * We do not allow unprivileged groups to request permission events. 33 * We do not allow unprivileged groups to get other process pid in events. 34 * We do not allow unprivileged groups to use unlimited resources. 45 * FAN_CLASS_NOTIF is the only class we allow for unprivileged group. 46 * We do not allow unprivileged groups to get file descriptors in events,
|
| /kernel/liteos_m/arch/arm/cortex-m4/iar/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/liteos_m/arch/arm/cortex-m4/gcc/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/liteos_m/arch/arm/cortex-m4/keil/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/liteos_m/arch/arm/cortex-m7/iar/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/liteos_m/arch/arm/cortex-m7/gcc/ |
| D | los_mpu.c | 43 MPU_AP_FORBID_USER_FORBID = 0x0, /* Privileged:No access Unprivileged:No access */ 44 MPU_AP_RW_USER_FORBID = 0x1, /* Privileged:Read/Write Unprivileged:No access */ 45 MPU_AP_RW_USER_RO = 0x2, /* Privileged:Read/Write Unprivileged:Read-only */ 46 MPU_AP_RW_USER_RW = 0x3, /* Privileged:Read/Write Unprivileged:Read/Write */ 47 MPU_AP_NA_USER_NA = 0x4, /* Privileged:UNPREDICTABLE Unprivileged:UNPREDICTABLE */ 48 MPU_AP_RO_USER_FORBID = 0x5, /* Privileged:Read-only Unprivileged:No access */ 49 MPU_AP_RO_USER_RO = 0x6, /* Privileged:Read-only Unprivileged:Read-only */
|
| /kernel/linux/linux-6.6/Documentation/admin-guide/ |
| D | perf-security.rst | 54 ID is 0, referred to as superuser or root), and b) unprivileged 60 Unprivileged processes are subject to a full security permission check 67 files of unprivileged users. 69 Unprivileged processes with enabled CAP_PERFMON capability are treated 87 Prior Linux v5.9 unprivileged processes using perf_events system call 90 So unprivileged processes provided with CAP_SYS_PTRACE capability are 96 Other capabilities being granted to unprivileged processes can 223 Unprivileged users 226 perf_events *scope* and *access* control for unprivileged processes 243 imposed but ignored for unprivileged processes with CAP_IPC_LOCK [all …]
|
| /kernel/linux/linux-6.6/Documentation/userspace-api/ |
| D | no_new_privs.rst | 15 - chroot is disallowed to unprivileged processes, since it would allow 49 Unprivileged users are therefore only allowed to install such filters 53 available to an unprivileged user. If everything running with a 60 available to unprivileged tasks if ``no_new_privs`` is set. In principle,
|
| /kernel/linux/linux-5.10/Documentation/userspace-api/ |
| D | no_new_privs.rst | 15 - chroot is disallowed to unprivileged processes, since it would allow 49 Unprivileged users are therefore only allowed to install such filters 53 available to an unprivileged user. If everything running with a 60 available to unprivileged tasks if ``no_new_privs`` is set. In principle,
|
| /kernel/linux/linux-6.6/tools/testing/selftests/x86/ |
| D | iopl.c | 259 printf("[RUN]\tiopl(3) unprivileged but with IOPL==3\n"); in main() 261 printf("[FAIL]\tiopl(3) should work if iopl is already 3 even if unprivileged\n"); in main() 265 printf("[RUN]\tiopl(0) unprivileged\n"); in main() 267 printf("[FAIL]\tiopl(0) should work if iopl is already 3 even if unprivileged\n"); in main() 271 printf("[RUN]\tiopl(3) unprivileged\n"); in main() 273 printf("[FAIL]\tiopl(3) should fail if when unprivileged if iopl==0\n"); in main()
|
| /kernel/linux/linux-5.10/tools/testing/selftests/x86/ |
| D | iopl.c | 259 printf("[RUN]\tiopl(3) unprivileged but with IOPL==3\n"); in main() 261 printf("[FAIL]\tiopl(3) should work if iopl is already 3 even if unprivileged\n"); in main() 265 printf("[RUN]\tiopl(0) unprivileged\n"); in main() 267 printf("[FAIL]\tiopl(0) should work if iopl is already 3 even if unprivileged\n"); in main() 271 printf("[RUN]\tiopl(3) unprivileged\n"); in main() 273 printf("[FAIL]\tiopl(3) should fail if when unprivileged if iopl==0\n"); in main()
|
| /kernel/liteos_m/arch/risc-v/nuclei/gcc/nmsis/Core/Include/ |
| D | core_compatiable.h | 48 /** \brief LDRT Unprivileged (8 bit), ARM Compatiable */ 50 /** \brief LDRT Unprivileged (16 bit), ARM Compatiable */ 52 /** \brief LDRT Unprivileged (32 bit), ARM Compatiable */ 55 /** \brief STRT Unprivileged (8 bit), ARM Compatiable */ 57 /** \brief STRT Unprivileged (16 bit), ARM Compatiable */ 59 /** \brief STRT Unprivileged (32 bit), ARM Compatiable */
|
| /kernel/linux/linux-5.10/tools/bpf/bpftool/Documentation/ |
| D | bpftool-feature.rst | 22 | **bpftool** **feature probe** [*COMPONENT*] [**full**] [**unprivileged**] [**macros** [**prefix**… 52 When the **unprivileged** keyword is used, bpftool will dump 56 supported by the system. Unprivileged users MUST use the 57 **unprivileged** keyword: This is to avoid misdetection if
|
| /kernel/linux/linux-6.6/kernel/bpf/ |
| D | Kconfig | 73 bool "Disable unprivileged BPF by default" 77 Disables unprivileged BPF by default by setting the corresponding 83 Unprivileged BPF could be used to exploit certain potential
|
| /kernel/linux/linux-6.6/tools/bpf/bpftool/Documentation/ |
| D | bpftool-feature.rst | 26 | **bpftool** **feature probe** [*COMPONENT*] [**full**] [**unprivileged**] [**macros** [**prefix**… 58 When the **unprivileged** keyword is used, bpftool will dump 62 supported by the system. Unprivileged users MUST use the 63 **unprivileged** keyword: This is to avoid misdetection if
|
| /kernel/linux/linux-5.10/tools/bpf/bpftool/ |
| D | feature.c | 175 printf("bpf() syscall for unprivileged users is enabled\n"); in probe_unprivileged_disabled() 234 printf("JIT compiler hardening is enabled for unprivileged users\n"); in probe_jit_harden() 287 printf("Unable to retrieve global memory limit for JIT compiler for unprivileged users\n"); in probe_jit_limit() 290 printf("Global memory limit for JIT compiler for unprivileged users is %ld bytes\n", res); in probe_jit_limit() 498 /* Probe may succeed even if program load fails, for unprivileged users in probe_prog_type() 537 * check required for unprivileged users in probe_map_type() 569 * unprivileged users check that we did not fail because of in probe_helper_for_progtype() 841 p_err("missing %s, required for full feature probing; run as root or use 'unprivileged'", in handle_perms() 844 …err("missing %s%s%s%s%s%s%s%srequired for full feature probing; run as root or use 'unprivileged'", in handle_perms() 949 } else if (is_prefix(*argv, "unprivileged")) { in do_probe() [all …]
|
| /kernel/linux/linux-6.6/Documentation/riscv/ |
| D | uabi.rst | 10 chapter 27 of the unprivileged specification. 30 after standard unprivileged extensions. If multiple supervisor-level
|
| /kernel/linux/linux-6.6/tools/bpf/bpftool/ |
| D | feature.c | 207 printf("bpf() syscall for unprivileged users is enabled\n"); in probe_unprivileged_disabled() 269 printf("JIT compiler hardening is enabled for unprivileged users\n"); in probe_jit_harden() 322 printf("Unable to retrieve global memory limit for JIT compiler for unprivileged users\n"); in probe_jit_limit() 325 printf("Global memory limit for JIT compiler for unprivileged users is %ld bytes\n", res); in probe_jit_limit() 574 /* Probe may succeed even if program load fails, for unprivileged users in probe_prog_type() 641 * check required for unprivileged users in probe_map_type() 699 * unprivileged users check that we did not fail because of in probe_helper_for_progtype() 1110 p_err("missing %s, required for full feature probing; run as root or use 'unprivileged'", in handle_perms() 1113 …err("missing %s%s%s%s%s%s%s%srequired for full feature probing; run as root or use 'unprivileged'", in handle_perms() 1218 } else if (is_prefix(*argv, "unprivileged")) { in do_probe() [all …]
|
| /kernel/linux/linux-6.6/net/devlink/ |
| D | netlink.c | 360 /* can be retrieved by unprivileged users */ 366 /* can be retrieved by unprivileged users */ 372 /* can be retrieved by unprivileged users */ 390 /* can be retrieved by unprivileged users */ 410 /* can be retrieved by unprivileged users */
|
| /kernel/linux/linux-5.10/Documentation/driver-api/early-userspace/ |
| D | early_userspace_support.rst | 44 built by an unprivileged user. 65 Because device-special files cannot be created by a unprivileged user, 68 early userspace image can be built by an unprivileged user.
|
| /kernel/linux/linux-6.6/Documentation/driver-api/early-userspace/ |
| D | early_userspace_support.rst | 44 built by an unprivileged user. 65 Because device-special files cannot be created by a unprivileged user, 68 early userspace image can be built by an unprivileged user.
|