Searched refs:unprivileged (Results 1 – 25 of 61) sorted by relevance
123
/linux-6.12.1/Documentation/userspace-api/ |
D | no_new_privs.rst | 15 - chroot is disallowed to unprivileged processes, since it would allow 53 available to an unprivileged user. If everything running with a 60 available to unprivileged tasks if ``no_new_privs`` is set. In principle,
|
/linux-6.12.1/tools/bpf/bpftool/Documentation/ |
D | bpftool-feature.rst | 26 | **bpftool** **feature probe** [*COMPONENT*] [**full**] [**unprivileged**] [**macros** [**prefix**… 54 When the **unprivileged** keyword is used, bpftool will dump only the 58 MUST use the **unprivileged** keyword: This is to avoid misdetection if
|
/linux-6.12.1/tools/testing/selftests/mount/ |
D | run_unprivileged_remount.sh | 8 ./unprivileged-remount-test ;
|
D | .gitignore | 2 unprivileged-remount-test
|
D | Makefile | 7 TEST_GEN_FILES := unprivileged-remount-test nosymfollow-test
|
/linux-6.12.1/Documentation/admin-guide/ |
D | perf-security.rst | 54 ID is 0, referred to as superuser or root), and b) unprivileged 67 files of unprivileged users. 87 Prior Linux v5.9 unprivileged processes using perf_events system call 90 So unprivileged processes provided with CAP_SYS_PTRACE capability are 96 Other capabilities being granted to unprivileged processes can 226 perf_events *scope* and *access* control for unprivileged processes 243 imposed but ignored for unprivileged processes with CAP_IPC_LOCK 252 unprivileged processes with CAP_IPC_LOCK capability. 259 unprivileged processes with CAP_IPC_LOCK capability.
|
/linux-6.12.1/kernel/bpf/ |
D | Kconfig | 74 bool "Disable unprivileged BPF by default" 78 Disables unprivileged BPF by default by setting the corresponding
|
/linux-6.12.1/Documentation/arch/riscv/ |
D | uabi.rst | 10 chapter 27 of the unprivileged specification. 30 after standard unprivileged extensions. If multiple supervisor-level
|
D | cmodx.rst | 10 program must enforce its own synchronization with the unprivileged fence.i
|
/linux-6.12.1/arch/arm/boot/dts/xen/ |
D | xenvm-4.2.dts | 3 * Xen Virtual Machine for unprivileged guests
|
/linux-6.12.1/Documentation/driver-api/early-userspace/ |
D | early_userspace_support.rst | 44 built by an unprivileged user. 65 Because device-special files cannot be created by a unprivileged user, 68 early userspace image can be built by an unprivileged user.
|
/linux-6.12.1/arch/powerpc/kvm/ |
D | book3s_emulate.c | 685 goto unprivileged; in kvmppc_core_emulate_mtspr_pr() 844 unprivileged: in kvmppc_core_emulate_mtspr_pr() 885 goto unprivileged; in kvmppc_core_emulate_mfspr_pr() 1013 unprivileged: in kvmppc_core_emulate_mfspr_pr()
|
/linux-6.12.1/Documentation/security/ |
D | landlock.rst | 14 including unprivileged ones. Because such a process may be compromised or 19 Landlock is designed to be usable by unprivileged processes while following the
|
D | self-protection.rst | 13 In the worst-case scenario, we assume an unprivileged local attacker 119 restricted to the more regular set of normally available to unprivileged 125 The kernel should never allow an unprivileged user the ability to 131 unprivileged socket API is nonsense: only the root or physically local
|
/linux-6.12.1/fs/smb/server/ |
D | Kconfig | 68 Prevent unprivileged processes to start the ksmbd kernel server.
|
/linux-6.12.1/Documentation/ABI/testing/ |
D | sysfs-class-chromeos-driver-cros-ec-lightbar | 15 and other system hardware. To prevent unprivileged users
|
D | sysfs-class-rtc | 36 (RW) The maximum interrupt rate an unprivileged user may request
|
/linux-6.12.1/Documentation/infiniband/ |
D | user_verbs.rst | 55 unprivileged processes do not exceed their RLIMIT_MEMLOCK limit.
|
/linux-6.12.1/Documentation/block/ |
D | ublk.rst | 150 permission check, and this command is added for supporting unprivileged 161 unprivileged application needs to query devices the current user owns, 221 Once the flag is set, all control commands can be sent by unprivileged
|
/linux-6.12.1/Documentation/filesystems/ |
D | fuse.rst | 298 an unprivileged user - normally restricted from mounting with 302 processes in user namespaces where they're unprivileged. For this 365 Since we are talking about unprivileged userspace programs,
|
/linux-6.12.1/security/ |
D | Kconfig | 11 bool "Restrict unprivileged access to the kernel syslog" 14 This enforces restrictions on unprivileged users reading the kernel
|
/linux-6.12.1/Documentation/admin-guide/hw-vuln/ |
D | tsx_async_abort.rst | 6 TAA is a hardware vulnerability that allows unprivileged speculative access to 72 Attacks against the TAA vulnerability can be implemented from unprivileged
|
D | gather_data_sampling.rst | 6 Gather Data Sampling is a hardware vulnerability which allows unprivileged
|
/linux-6.12.1/Documentation/admin-guide/sysctl/ |
D | net.rst | 104 - 1 - enable JIT hardening for unprivileged users only 128 compiler in order to reject unprivileged JIT requests once it has 234 packet contents. If disabled, transmit timestamp requests from unprivileged
|
D | kernel.rst | 244 This toggle indicates whether unprivileged users are prevented 478 -EPERM) for unprivileged processes not in the io_uring_group group. 547 unprivileged users. 553 if leaking kernel pointer values to unprivileged users is a concern. 932 Controls use of the performance events system by unprivileged 1425 systems, large numbers of split locks from unprivileged users can result in 1596 Writing 1 to this entry will disable unprivileged calls to ``bpf()``; 1601 Writing 2 to this entry will also disable unprivileged calls to ``bpf()``,
|
123