Searched full:privileged (Results 1 – 25 of 53) sorted by relevance
123
| /Documentation/admin-guide/ |
| D | perf-security.rst | 53 into two categories [6]_ : a) privileged processes (whose effective user 55 processes (whose effective UID is nonzero). Privileged processes bypass 57 monitoring is fully available to privileged processes without access, 70 as privileged processes with respect to perf_events performance 85 perf_events/Perf privileged users 88 Mechanisms of capabilities, privileged capability-dumb files [6]_ and 90 perf_events/Perf privileged users who are permitted to execute 92 taken to create such a group of privileged Perf users. 94 1. Create perf_users group of privileged Perf users, assign perf_users 211 privileged users can be provided with memory above the constraints for
|
| /Documentation/powerpc/ |
| D | dscr.rst | 60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only) 61 (2) Privileged state SPR: 0x11 (Privileged) 63 Accessing DSCR through privileged SPR number (0x11) from user space
|
| D | ultravisor.rst | 19 When enabled, PEF adds a new higher privileged mode, called Ultravisor 22 for short). Ultravisor mode is the highest privileged mode in POWER 37 PEF protects SVMs from the hypervisor, privileged users, and other 48 privileged are now ultravisor privileged. 65 * There is a new Ultravisor privileged register, SMFCTRL, which has an 80 | 1 | 0 | 0 | Privileged(OS)| 94 | 0 | 0 | 0 | Privileged(OS)| 123 * The following resources have become Ultravisor privileged and 222 be accessed when running in Ultravisor-privileged mode.
|
| /Documentation/ABI/testing/ |
| D | sysfs-hypervisor-xen | 22 privileged (e.g. dom0), the hypervisor 25 privileged guests.
|
| /Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 42 non-root programs can drop to even-lesser-privileged uids. This is especially 56 spawning semantics in the application (e.g. by using a privileged helper program 62 fork()/exec(). Because of this, as solution that uses a privileged helper in
|
| D | Smack.rst | 422 capabilities is a privileged task, whereas a task with no 606 privileged process can change its own Smack label by writing to 619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged. 687 can only be set by privileged tasks, but any task can read them for their own 691 The Smack label of the task object. A privileged 696 A privileged program may set this to match the label of another 772 will put the Smack label of the root directory into value. A privileged 786 A privileged process can set the Smack label of outgoing packets with
|
| D | Yama.rst | 53 did not transition uids, start privileged, or have called
|
| /Documentation/filesystems/ |
| D | fuse.txt | 14 Non-privileged mount (or user mount): 16 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 218 How do non-privileged mounts work? 221 Since the mount() system call is a privileged operation, a helper 224 The implication of providing non-privileged mounts is that the mount 251 for non-privileged mounts. 306 measures, that system processes will never enter non-privileged
|
| /Documentation/virt/kvm/ |
| D | ppc-pv.txt | 5 space code in PR=1 which is user space. This way we trap all privileged 8 Unfortunately that is also the downfall. There are quite some privileged 12 This is what the PPC PV interface helps with. It takes privileged instructions 138 also act on the shared page. So calling privileged instructions still works as
|
| /Documentation/s390/ |
| D | monreader.rst | 30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP 75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name 95 (Class E privileged), see "CP Command and Utility Reference". 173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
|
| /Documentation/driver-api/ |
| D | pti_intel_mid.rst | 44 Below is example pseudo-code on how a 'privileged' application 46 a system. 'Privileged' means the application has enough
|
| /Documentation/admin-guide/hw-vuln/ |
| D | spectre.rst | 9 do not modify memory but attempt to infer privileged data in the memory. 58 privileged data touched during the speculative execution. 62 execution of indirect branches to leak privileged memory. 109 this could cause privileged code's indirect branch to jump to a gadget 151 for speculative execution. This could cause privileged memory to be 166 could cause privileged memory to be accessed and leaked. 228 code to derive invalid data pointers accessing privileged memory in 268 speculate into privileged memory after entering the kernel. For places 294 pointers to privileged data in guest. The privileged data could be
|
| D | multihit.rst | 39 Privileged software, including OS and virtual machine managers (VMM), are in 51 using a 4 KB translation cached in the iTLB. Privileged software modifies the
|
| /Documentation/devicetree/bindings/firmware/ |
| D | intel,stratix10-svc.txt | 15 Intel Stratix10 service layer driver, running at privileged exception level
|
| /Documentation/firmware-guide/acpi/ |
| D | aml-debugger.rst | 35 sufficiently privileged user).
|
| /Documentation/userspace-api/ |
| D | no_new_privs.rst | 42 involve ``execve()``. An appropriately privileged task can still call
|
| /Documentation/ |
| D | DMA-attributes.txt | 154 accesses to DMA buffers in both privileged "supervisor" and unprivileged 158 lesser-privileged levels).
|
| /Documentation/admin-guide/sysctl/ |
| D | fs.rst | 183 Maximum total number of pages a non-privileged user may allocate for pipes. 192 Maximum total number of pages a non-privileged user may allocate for pipes 289 memory contents of privileged processes. 296 pipe handler that knows to treat privileged core dumps with
|
| /Documentation/devicetree/bindings/interrupt-controller/ |
| D | sifive,plic-1.0.0.txt | 5 (PLIC) high-level specification in the RISC-V Privileged Architecture
|
| /Documentation/infiniband/ |
| D | user_verbs.rst | 74 use by non-privileged processes, it may be useful to add an
|
| /Documentation/input/ |
| D | userio.rst | 19 of them. userio accomplishes this by allowing any privileged userspace program
|
| /Documentation/gpu/ |
| D | drm-uapi.rst | 131 is, no modesetting or privileged ioctls can be issued on render nodes. 146 privileged ioctls on render nodes. 150 authenticates clients on the privileged primary/legacy node is no longer
|
| /Documentation/devicetree/bindings/riscv/ |
| D | cpus.yaml | 51 hart. These values originate from the RISC-V Privileged
|
| /Documentation/driver-api/mei/ |
| D | mei.rst | 38 configuration, the driver by default allows only a privileged
|
| /Documentation/media/uapi/v4l/ |
| D | dev-overlay.rst | 79 privileged because it allows to set up DMA into physical memory, 89 driver. The :ref:`VIDIOC_S_FBUF <VIDIOC_G_FBUF>` ioctl is not privileged. An application
|
123