Home
last modified time | relevance | path

Searched full:privileged (Results 1 – 25 of 386) sorted by relevance

12345678910>>...16

/linux-6.12.1/Documentation/admin-guide/
Dperf-security.rst53 into two categories [6]_ : a) privileged processes (whose effective user
55 processes (whose effective UID is nonzero). Privileged processes bypass
57 monitoring is fully available to privileged processes without access,
70 as privileged processes with respect to perf_events performance
78 observability operations is also open for CAP_SYS_ADMIN privileged
102 Privileged Perf users groups
105 Mechanisms of capabilities, privileged capability-dumb files [6]_,
107 dedicated groups of privileged Perf users who are permitted to execute
109 steps can be taken to create such groups of privileged Perf users.
111 1. Create perf_users group of privileged Perf users, assign perf_users
[all …]
/linux-6.12.1/drivers/infiniband/hw/mthca/
Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
/linux-6.12.1/Documentation/arch/powerpc/
Ddexcr.rst10 The DEXCR is a privileged special purpose register (SPR) introduced in
22 A privileged SPR that can control aspects for userspace and kernel space
24 A hypervisor-privileged SPR that can control aspects for the hypervisor and
27 An optional ultravisor-privileged SPR that can control aspects for the ultravisor.
30 provides a non-privileged read-only view of the userspace DEXCR aspects.
73 - Non-Privileged Hash Instruction Enable (NPHIE)
170 For example, clearing NPHIE on exec is a privileged operation (a process
Ddscr.rst60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
61 (2) Privileged state SPR: 0x11 (Privileged)
63 Accessing DSCR through privileged SPR number (0x11) from user space
/linux-6.12.1/tools/testing/selftests/bpf/progs/
Dbpf_misc.h12 * Programs could be loaded in privileged and unprivileged modes.
13 * - __success, __failure, __msg, __regex imply privileged mode;
16 * If combination of privileged and unprivileged attributes is present
17 * both modes are used. If none are present privileged mode is implied.
20 * that differ between privileged and unprivileged modes.
72 * __success Expect program load success in privileged mode.
75 * __failure Expect program load failure in privileged mode.
/linux-6.12.1/Documentation/filesystems/
Dfuse.rst18 Non-privileged mount (or user mount):
19 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
204 How do non-privileged mounts work?
207 Since the mount() system call is a privileged operation, a helper
210 The implication of providing non-privileged mounts is that the mount
235 for non-privileged mounts.
290 measures, that system processes will never enter non-privileged
300 privileged. If any process could access such an 'allow_other' mount
/linux-6.12.1/include/xen/interface/
Dxenpmu.h76 * Physical processor on which the interrupt occurred. On non-privileged
82 * Domain that was interrupted. On non-privileged guests set to
84 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
/linux-6.12.1/arch/powerpc/include/asm/
Dspu_csa.h120 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads.
184 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads.
212 * @priv1: Collapsed Privileged 1 Area, w/o pads.
213 * @priv2: Collapsed Privileged 2 Area, w/o pads.
/linux-6.12.1/security/safesetid/
Dlsm.c209 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setuid()
233 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setgid()
254 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setgroups()
/linux-6.12.1/tools/perf/arch/arm64/util/
Darm-spe.c70 bool privileged) in arm_spe_snapshot_resolve_auxtrace_defaults() argument
74 * snapshot size is specified, then the default is 4MiB for privileged users, 128KiB for in arm_spe_snapshot_resolve_auxtrace_defaults()
77 * The default auxtrace mmap size is 4MiB/page_size for privileged users, 128KiB for in arm_spe_snapshot_resolve_auxtrace_defaults()
87 if (privileged) { in arm_spe_snapshot_resolve_auxtrace_defaults()
94 } else if (!opts->auxtrace_mmap_pages && !privileged && opts->mmap_pages == UINT_MAX) { in arm_spe_snapshot_resolve_auxtrace_defaults()
183 bool privileged = perf_event_paranoid_check(-1); in arm_spe_recording_options() local
212 arm_spe_snapshot_resolve_auxtrace_defaults(opts, privileged); in arm_spe_recording_options()
235 if (privileged) { in arm_spe_recording_options()
/linux-6.12.1/Documentation/admin-guide/LSM/
DSafeSetID.rst28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
42 non-root programs can drop to even-lesser-privileged uids. This is especially
56 spawning semantics in the application (e.g. by using a privileged helper program
62 fork()/exec(). Because of this, as solution that uses a privileged helper in
/linux-6.12.1/tools/testing/selftests/cgroup/
Dtest_cpuset.c115 /* Fork a privileged child as a test object */ in test_cpuset_perms_object()
121 * (including capabilities), the main process must remain privileged for in test_cpuset_perms_object()
202 /* Put a privileged child in the subtree and modify controller state in test_cpuset_perms_subtree()
203 * from an unprivileged process, the main process remains privileged in test_cpuset_perms_subtree()
/linux-6.12.1/drivers/hv/
DKconfig29 being more privileged than lower levels. VTL0 is the least privileged
/linux-6.12.1/arch/sparc/include/asm/
Dpcr.h19 #define PCR_PIC_PRIV 0x00000001 /* PIC access is privileged */
45 #define PCR_N4_PICNPT 0x00010000 /* PIC non-privileged trap */
/linux-6.12.1/tools/include/uapi/linux/
Dseccomp.h93 * in scenarios where a more privileged process supervises the syscalls of a
94 * lesser privileged process to get around kernel-enforced security
95 * restrictions when the privileged process deems this safe. In other words,
/linux-6.12.1/include/uapi/linux/
Dseccomp.h93 * in scenarios where a more privileged process supervises the syscalls of a
94 * lesser privileged process to get around kernel-enforced security
95 * restrictions when the privileged process deems this safe. In other words,
/linux-6.12.1/Documentation/ABI/testing/
Dsysfs-hypervisor-xen24 privileged (e.g. dom0), the hypervisor
27 privileged guests.
/linux-6.12.1/security/smack/
Dsmack_access.c645 * Is the task privileged and allowed to be privileged
648 * Returns true if the task is allowed to be privileged, false if it's not.
682 * Is the task privileged and allowed to be privileged
685 * Returns true if the task is allowed to be privileged, false if it's not.
690 * All kernel tasks are privileged in smack_privileged()
/linux-6.12.1/Documentation/arch/s390/
Dmonreader.rst30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP
75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name
95 (Class E privileged), see "CP Command and Utility Reference".
173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
/linux-6.12.1/drivers/gpu/drm/amd/include/ivsrcid/gfx/
Dirqsrcs_gfx_10_1.h34 #define GFX_10_1__SRCID__CP_PRIV_REG_FAULT 184 // B8 Privileged Register Fault
35 #define GFX_10_1__SRCID__CP_PRIV_INSTR_FAULT 185 // B9 Privileged Instr Fault
Dirqsrcs_gfx_9_0.h36 #define GFX_9_0__SRCID__CP_PRIV_REG_FAULT 184 /* B8 Privileged Register Fault */
37 #define GFX_9_0__SRCID__CP_PRIV_INSTR_FAULT 185 /* B9 Privileged Instr Fault */
/linux-6.12.1/arch/sh/include/asm/
Daddrspace.h23 /* Returns the privileged segment base of a given address */
28 * Map an address to a certain privileged segment
/linux-6.12.1/drivers/accel/habanalabs/common/
Dsecurity.h102 * @priv_automated_pb_cfg: points to the main privileged PB array.
105 * @priv_cfg_size: size of the main privileged PB array.
107 * @prot_lvl_priv: indication if it's a privileged/secured PB configurations.
/linux-6.12.1/Documentation/virt/kvm/
Dppc-pv.rst8 space code in PR=1 which is user space. This way we trap all privileged
11 Unfortunately that is also the downfall. There are quite some privileged
15 This is what the PPC PV interface helps with. It takes privileged instructions
147 also act on the shared page. So calling privileged instructions still works as
/linux-6.12.1/tools/testing/selftests/powerpc/dexcr/
Ddexcr.h63 .desc = "Non-privileged hash instruction enable",
70 .desc = "Privileged hash instruction enable",

12345678910>>...16