Home
last modified time | relevance | path

Searched full:privileged (Results 1 – 25 of 81) sorted by relevance

1234

/Documentation/arch/powerpc/
Ddexcr.rst10 The DEXCR is a privileged special purpose register (SPR) introduced in
22 A privileged SPR that can control aspects for userspace and kernel space
24 A hypervisor-privileged SPR that can control aspects for the hypervisor and
27 An optional ultravisor-privileged SPR that can control aspects for the ultravisor.
30 provides a non-privileged read-only view of the userspace DEXCR aspects.
73 - Non-Privileged Hash Instruction Enable (NPHIE)
170 For example, clearing NPHIE on exec is a privileged operation (a process
Ddscr.rst60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
61 (2) Privileged state SPR: 0x11 (Privileged)
63 Accessing DSCR through privileged SPR number (0x11) from user space
Dultravisor.rst19 When enabled, PEF adds a new higher privileged mode, called Ultravisor
22 for short). Ultravisor mode is the highest privileged mode in POWER
37 PEF protects SVMs from the hypervisor, privileged users, and other
48 privileged are now ultravisor privileged.
65 * There is a new Ultravisor privileged register, SMFCTRL, which has an
80 | 1 | 0 | 0 | Privileged(OS)|
94 | 0 | 0 | 0 | Privileged(OS)|
123 * The following resources have become Ultravisor privileged and
222 be accessed when running in Ultravisor-privileged mode.
/Documentation/admin-guide/
Dperf-security.rst53 into two categories [6]_ : a) privileged processes (whose effective user
55 processes (whose effective UID is nonzero). Privileged processes bypass
57 monitoring is fully available to privileged processes without access,
70 as privileged processes with respect to perf_events performance
78 observability operations is also open for CAP_SYS_ADMIN privileged
102 Privileged Perf users groups
105 Mechanisms of capabilities, privileged capability-dumb files [6]_,
107 dedicated groups of privileged Perf users who are permitted to execute
109 steps can be taken to create such groups of privileged Perf users.
111 1. Create perf_users group of privileged Perf users, assign perf_users
[all …]
/Documentation/ABI/testing/
Dsysfs-hypervisor-xen24 privileged (e.g. dom0), the hypervisor
27 privileged guests.
/Documentation/virt/gunyah/
Dindex.rst13 a more privileged CPU level (EL2 on Aarch64). It does not depend on a less
14 privileged operating system for its core functionality. This increases its
85 Creation of a new Capability requires the holding of a set of privileged
94 The Gunyah Resource Manager (RM) is a privileged application VM supporting the
/Documentation/filesystems/
Dfuse.rst18 Non-privileged mount (or user mount):
19 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
204 How do non-privileged mounts work?
207 Since the mount() system call is a privileged operation, a helper
210 The implication of providing non-privileged mounts is that the mount
235 for non-privileged mounts.
290 measures, that system processes will never enter non-privileged
300 privileged. If any process could access such an 'allow_other' mount
/Documentation/admin-guide/LSM/
DSafeSetID.rst28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
42 non-root programs can drop to even-lesser-privileged uids. This is especially
56 spawning semantics in the application (e.g. by using a privileged helper program
62 fork()/exec(). Because of this, as solution that uses a privileged helper in
DSmack.rst422 capabilities is a privileged task, whereas a task with no
606 privileged process can change its own Smack label by writing to
619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged.
687 can only be set by privileged tasks, but any task can read them for their own
691 The Smack label of the task object. A privileged
696 A privileged program may set this to match the label of another
772 will put the Smack label of the root directory into value. A privileged
786 A privileged process can set the Smack label of outgoing packets with
/Documentation/arch/riscv/
Duabi.rst21 single-letter extensions and before any higher-privileged extensions.
34 after any lower-privileged, standard extensions. If multiple machine-level
Dhwprobe.rst49 as defined by the RISC-V privileged architecture specification.
52 defined by the RISC-V privileged architecture specification.
55 defined by the RISC-V privileged architecture specification.
63 privileged ISA, with the following known exceptions (more exceptions may be
/Documentation/arch/s390/
Dmonreader.rst30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP
75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name
95 (Class E privileged), see "CP Command and Utility Reference".
173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
/Documentation/virt/kvm/
Dppc-pv.rst8 space code in PR=1 which is user space. This way we trap all privileged
11 Unfortunately that is also the downfall. There are quite some privileged
15 This is what the PPC PV interface helps with. It takes privileged instructions
147 also act on the shared page. So calling privileged instructions still works as
/Documentation/devicetree/bindings/timer/
Driscv,timer.yaml14 based on the time CSR defined by the RISC-V privileged specification. The
/Documentation/arch/loongarch/
Dintroduction.rst19 used in privileged mode (PLV0).
96 CSRs can only be accessed from privileged mode (PLV0):
128 0x21 Privileged Resource Configuration 1 PRCFG1
129 0x22 Privileged Resource Configuration 2 PRCFG2
130 0x23 Privileged Resource Configuration 3 PRCFG3
284 9. Privileged Instructions::
/Documentation/admin-guide/hw-vuln/
Dspectre.rst9 do not modify memory but attempt to infer privileged data in the memory.
58 privileged data touched during the speculative execution.
62 execution of indirect branches to leak privileged memory.
109 this could cause privileged code's indirect branch to jump to a gadget
163 for speculative execution. This could cause privileged memory to be
178 could cause privileged memory to be accessed and leaked.
240 code to derive invalid data pointers accessing privileged memory in
280 speculate into privileged memory after entering the kernel. For places
306 pointers to privileged data in guest. The privileged data could be
/Documentation/virt/acrn/
Dcpuid.rst38 ACRN_FEATURE_PRIVILEGED_VM 0 guest VM is a privileged VM
/Documentation/core-api/
Ddma-attributes.rst128 accesses to DMA buffers in both privileged "supervisor" and unprivileged
132 lesser-privileged levels).
/Documentation/arch/x86/
Damd-memory-encryption.rst137 privileged level is 0 and numerically higher numbers have lesser privileges.
146 running at VMPL0 to perform privileged operations or to interact with secure
147 services. An example fur such a privileged operation is PVALIDATE which is
/Documentation/devicetree/bindings/firmware/
Dintel,stratix10-svc.txt15 Intel Stratix10 service layer driver, running at privileged exception level
/Documentation/admin-guide/sysctl/
Dfs.rst152 Maximum total number of pages a non-privileged user may allocate for pipes.
161 Maximum total number of pages a non-privileged user may allocate for pipes
258 memory contents of privileged processes.
267 pipe handler that knows to treat privileged core dumps with
/Documentation/firmware-guide/acpi/
Daml-debugger.rst35 sufficiently privileged user).
/Documentation/userspace-api/
Dno_new_privs.rst42 involve ``execve()``. An appropriately privileged task can still call
/Documentation/devicetree/bindings/bus/
Dst,stm32mp25-rifsc.yaml24 setting secure, privileged and compartment information on the system bus.
/Documentation/networking/device_drivers/ethernet/amd/
Dpds_vfio_pci.rst65 -> VFIO Non-Privileged userspace driver framework

1234