Home
last modified time | relevance | path

Searched full:privileged (Results 1 – 25 of 286) sorted by relevance

12345678910>>...12

/linux-5.10/drivers/infiniband/hw/mthca/
Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
/linux-5.10/Documentation/admin-guide/
Dperf-security.rst53 into two categories [6]_ : a) privileged processes (whose effective user
55 processes (whose effective UID is nonzero). Privileged processes bypass
57 monitoring is fully available to privileged processes without access,
70 as privileged processes with respect to perf_events performance
78 observability operations is also open for CAP_SYS_ADMIN privileged
99 Privileged Perf users groups
102 Mechanisms of capabilities, privileged capability-dumb files [6]_ and
104 privileged Perf users who are permitted to execute performance monitoring
106 taken to create such groups of privileged Perf users.
108 1. Create perf_users group of privileged Perf users, assign perf_users
[all …]
/linux-5.10/Documentation/powerpc/
Ddscr.rst60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
61 (2) Privileged state SPR: 0x11 (Privileged)
63 Accessing DSCR through privileged SPR number (0x11) from user space
Dultravisor.rst19 When enabled, PEF adds a new higher privileged mode, called Ultravisor
22 for short). Ultravisor mode is the highest privileged mode in POWER
37 PEF protects SVMs from the hypervisor, privileged users, and other
48 privileged are now ultravisor privileged.
65 * There is a new Ultravisor privileged register, SMFCTRL, which has an
80 | 1 | 0 | 0 | Privileged(OS)|
94 | 0 | 0 | 0 | Privileged(OS)|
123 * The following resources have become Ultravisor privileged and
222 be accessed when running in Ultravisor-privileged mode.
/linux-5.10/include/xen/interface/
Dxenpmu.h76 * Physical processor on which the interrupt occurred. On non-privileged
82 * Domain that was interrupted. On non-privileged guests set to
84 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
Devent_channel.h73 * 2. Only a sufficiently-privileged domain may bind to a physical IRQ.
124 * 2. Only a sufficiently-privileged domain may obtain the status of an event
185 * 2. Only a sufficiently-privileged domain may specify other than DOMID_SELF.
/linux-5.10/Documentation/filesystems/
Dfuse.rst18 Non-privileged mount (or user mount):
19 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
204 How do non-privileged mounts work?
207 Since the mount() system call is a privileged operation, a helper
210 The implication of providing non-privileged mounts is that the mount
235 for non-privileged mounts.
290 measures, that system processes will never enter non-privileged
/linux-5.10/arch/powerpc/include/asm/
Dspu_csa.h120 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads.
184 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads.
212 * @priv1: Collapsed Privileged 1 Area, w/o pads.
213 * @priv2: Collapsed Privileged 2 Area, w/o pads.
/linux-5.10/Documentation/admin-guide/LSM/
DSafeSetID.rst28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
42 non-root programs can drop to even-lesser-privileged uids. This is especially
56 spawning semantics in the application (e.g. by using a privileged helper program
62 fork()/exec(). Because of this, as solution that uses a privileged helper in
DSmack.rst422 capabilities is a privileged task, whereas a task with no
606 privileged process can change its own Smack label by writing to
619 A process with CAP_MAC_OVERRIDE or CAP_MAC_ADMIN is privileged.
687 can only be set by privileged tasks, but any task can read them for their own
691 The Smack label of the task object. A privileged
696 A privileged program may set this to match the label of another
772 will put the Smack label of the root directory into value. A privileged
786 A privileged process can set the Smack label of outgoing packets with
/linux-5.10/arch/sparc/include/asm/
Dpcr.h19 #define PCR_PIC_PRIV 0x00000001 /* PIC access is privileged */
45 #define PCR_N4_PICNPT 0x00010000 /* PIC non-privileged trap */
/linux-5.10/include/uapi/linux/
Dseccomp.h91 * in scenarios where a more privileged process supervises the syscalls of a
92 * lesser privileged process to get around kernel-enforced security
93 * restrictions when the privileged process deems this safe. In other words,
/linux-5.10/Documentation/ABI/testing/
Dsysfs-hypervisor-xen24 privileged (e.g. dom0), the hypervisor
27 privileged guests.
/linux-5.10/security/safesetid/
Dlsm.c217 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setuid()
241 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setgid()
/linux-5.10/security/smack/
Dsmack_access.c646 * Is the task privileged and allowed to be privileged
649 * Returns true if the task is allowed to be privileged, false if it's not.
683 * Is the task privileged and allowed to be privileged
686 * Returns true if the task is allowed to be privileged, false if it's not.
691 * All kernel tasks are privileged in smack_privileged()
/linux-5.10/drivers/gpu/drm/amd/include/ivsrcid/gfx/
Dirqsrcs_gfx_10_1.h34 #define GFX_10_1__SRCID__CP_PRIV_REG_FAULT 184 // B8 Privileged Register Fault
35 #define GFX_10_1__SRCID__CP_PRIV_INSTR_FAULT 185 // B9 Privileged Instr Fault
Dirqsrcs_gfx_9_0.h36 #define GFX_9_0__SRCID__CP_PRIV_REG_FAULT 184 /* B8 Privileged Register Fault */
37 #define GFX_9_0__SRCID__CP_PRIV_INSTR_FAULT 185 /* B9 Privileged Instr Fault */
/linux-5.10/Documentation/s390/
Dmonreader.rst30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP
75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name
95 (Class E privileged), see "CP Command and Utility Reference".
173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
/linux-5.10/arch/sh/include/asm/
Daddrspace.h23 /* Returns the privileged segment base of a given address */
28 * Map an address to a certain privileged segment
/linux-5.10/Documentation/virt/kvm/
Dppc-pv.rst8 space code in PR=1 which is user space. This way we trap all privileged
11 Unfortunately that is also the downfall. There are quite some privileged
15 This is what the PPC PV interface helps with. It takes privileged instructions
147 also act on the shared page. So calling privileged instructions still works as
/linux-5.10/Documentation/admin-guide/hw-vuln/
Dspectre.rst9 do not modify memory but attempt to infer privileged data in the memory.
58 privileged data touched during the speculative execution.
62 execution of indirect branches to leak privileged memory.
109 this could cause privileged code's indirect branch to jump to a gadget
151 for speculative execution. This could cause privileged memory to be
166 could cause privileged memory to be accessed and leaked.
228 code to derive invalid data pointers accessing privileged memory in
268 speculate into privileged memory after entering the kernel. For places
294 pointers to privileged data in guest. The privileged data could be
/linux-5.10/tools/perf/arch/x86/util/
Dintel-bts.c114 bool privileged = perf_event_paranoid_check(-1); in intel_bts_recording_options() local
153 if (privileged) { in intel_bts_recording_options()
160 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options()
190 if (privileged) { in intel_bts_recording_options()
/linux-5.10/Documentation/driver-api/
Dpti_intel_mid.rst44 Below is example pseudo-code on how a 'privileged' application
46 a system. 'Privileged' means the application has enough
/linux-5.10/include/dt-bindings/dma/
Ddw-dmac.h10 #define DW_DMAC_HPROT1_PRIVILEGED_MODE (1 << 0) /* Privileged Mode */
/linux-5.10/drivers/char/
Dadi.c3 * Privileged ADI driver for sparc64
237 MODULE_DESCRIPTION("Privileged interface to ADI");

12345678910>>...12