/Linux-v6.1/Documentation/admin-guide/ |
D | perf-security.rst | 53 into two categories [6]_ : a) privileged processes (whose effective user 55 processes (whose effective UID is nonzero). Privileged processes bypass 57 monitoring is fully available to privileged processes without access, 70 as privileged processes with respect to perf_events performance 78 observability operations is also open for CAP_SYS_ADMIN privileged 102 Privileged Perf users groups 105 Mechanisms of capabilities, privileged capability-dumb files [6]_, 107 dedicated groups of privileged Perf users who are permitted to execute 109 steps can be taken to create such groups of privileged Perf users. 111 1. Create perf_users group of privileged Perf users, assign perf_users [all …]
|
/Linux-v6.1/drivers/infiniband/hw/mthca/ |
D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
/Linux-v6.1/Documentation/powerpc/ |
D | dscr.rst | 60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only) 61 (2) Privileged state SPR: 0x11 (Privileged) 63 Accessing DSCR through privileged SPR number (0x11) from user space
|
D | ultravisor.rst | 19 When enabled, PEF adds a new higher privileged mode, called Ultravisor 22 for short). Ultravisor mode is the highest privileged mode in POWER 37 PEF protects SVMs from the hypervisor, privileged users, and other 48 privileged are now ultravisor privileged. 65 * There is a new Ultravisor privileged register, SMFCTRL, which has an 80 | 1 | 0 | 0 | Privileged(OS)| 94 | 0 | 0 | 0 | Privileged(OS)| 123 * The following resources have become Ultravisor privileged and 222 be accessed when running in Ultravisor-privileged mode.
|
/Linux-v6.1/Documentation/filesystems/ |
D | fuse.rst | 18 Non-privileged mount (or user mount): 19 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 204 How do non-privileged mounts work? 207 Since the mount() system call is a privileged operation, a helper 210 The implication of providing non-privileged mounts is that the mount 235 for non-privileged mounts. 290 measures, that system processes will never enter non-privileged 300 privileged. If any process could access such an 'allow_other' mount
|
/Linux-v6.1/include/xen/interface/ |
D | xenpmu.h | 76 * Physical processor on which the interrupt occurred. On non-privileged 82 * Domain that was interrupted. On non-privileged guests set to 84 * On privileged guests can be DOMID_SELF, DOMID_XEN, or, when in
|
D | event_channel.h | 73 * 2. Only a sufficiently-privileged domain may bind to a physical IRQ. 124 * 2. Only a sufficiently-privileged domain may obtain the status of an event 185 * 2. Only a sufficiently-privileged domain may specify other than DOMID_SELF.
|
/Linux-v6.1/security/safesetid/ |
D | lsm.c | 208 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setuid() 232 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setgid() 253 * privileged process from dropping to a lesser-privileged one. in safesetid_task_fix_setgroups()
|
/Linux-v6.1/arch/powerpc/include/asm/ |
D | spu_csa.h | 120 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads. 184 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads. 212 * @priv1: Collapsed Privileged 1 Area, w/o pads. 213 * @priv2: Collapsed Privileged 2 Area, w/o pads.
|
/Linux-v6.1/tools/perf/arch/arm64/util/ |
D | arm-spe.c | 92 bool privileged) in arm_spe_snapshot_resolve_auxtrace_defaults() argument 96 * snapshot size is specified, then the default is 4MiB for privileged users, 128KiB for in arm_spe_snapshot_resolve_auxtrace_defaults() 99 * The default auxtrace mmap size is 4MiB/page_size for privileged users, 128KiB for in arm_spe_snapshot_resolve_auxtrace_defaults() 109 if (privileged) { in arm_spe_snapshot_resolve_auxtrace_defaults() 116 } else if (!opts->auxtrace_mmap_pages && !privileged && opts->mmap_pages == UINT_MAX) { in arm_spe_snapshot_resolve_auxtrace_defaults() 148 bool privileged = perf_event_paranoid_check(-1); in arm_spe_recording_options() local 181 arm_spe_snapshot_resolve_auxtrace_defaults(opts, privileged); in arm_spe_recording_options() 204 if (privileged) { in arm_spe_recording_options()
|
/Linux-v6.1/Documentation/admin-guide/LSM/ |
D | SafeSetID.rst | 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 42 non-root programs can drop to even-lesser-privileged uids. This is especially 56 spawning semantics in the application (e.g. by using a privileged helper program 62 fork()/exec(). Because of this, as solution that uses a privileged helper in
|
/Linux-v6.1/arch/sparc/include/asm/ |
D | pcr.h | 19 #define PCR_PIC_PRIV 0x00000001 /* PIC access is privileged */ 45 #define PCR_N4_PICNPT 0x00010000 /* PIC non-privileged trap */
|
/Linux-v6.1/include/uapi/linux/ |
D | seccomp.h | 93 * in scenarios where a more privileged process supervises the syscalls of a 94 * lesser privileged process to get around kernel-enforced security 95 * restrictions when the privileged process deems this safe. In other words,
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | sysfs-hypervisor-xen | 24 privileged (e.g. dom0), the hypervisor 27 privileged guests.
|
/Linux-v6.1/security/smack/ |
D | smack_access.c | 645 * Is the task privileged and allowed to be privileged 648 * Returns true if the task is allowed to be privileged, false if it's not. 682 * Is the task privileged and allowed to be privileged 685 * Returns true if the task is allowed to be privileged, false if it's not. 690 * All kernel tasks are privileged in smack_privileged()
|
/Linux-v6.1/drivers/gpu/drm/amd/include/ivsrcid/gfx/ |
D | irqsrcs_gfx_10_1.h | 34 #define GFX_10_1__SRCID__CP_PRIV_REG_FAULT 184 // B8 Privileged Register Fault 35 #define GFX_10_1__SRCID__CP_PRIV_INSTR_FAULT 185 // B9 Privileged Instr Fault
|
D | irqsrcs_gfx_9_0.h | 36 #define GFX_9_0__SRCID__CP_PRIV_REG_FAULT 184 /* B8 Privileged Register Fault */ 37 #define GFX_9_0__SRCID__CP_PRIV_INSTR_FAULT 185 /* B9 Privileged Instr Fault */
|
D | irqsrcs_gfx_11_0_0.h | 56 #define GFX_11_0_0__SRCID__CP_PRIV_REG_FAULT 184 // 0xB8 Privileged Register Fault 57 #define GFX_11_0_0__SRCID__CP_PRIV_INSTR_FAULT 185 // 0xB9 Privileged Instr Fault
|
/Linux-v6.1/Documentation/s390/ |
D | monreader.rst | 30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP 75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name 95 (Class E privileged), see "CP Command and Utility Reference". 173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
|
/Linux-v6.1/arch/sh/include/asm/ |
D | addrspace.h | 23 /* Returns the privileged segment base of a given address */ 28 * Map an address to a certain privileged segment
|
/Linux-v6.1/Documentation/virt/kvm/ |
D | ppc-pv.rst | 8 space code in PR=1 which is user space. This way we trap all privileged 11 Unfortunately that is also the downfall. There are quite some privileged 15 This is what the PPC PV interface helps with. It takes privileged instructions 147 also act on the shared page. So calling privileged instructions still works as
|
/Linux-v6.1/drivers/infiniband/hw/irdma/ |
D | hmc.h | 131 bool privileged; member 141 bool privileged; member
|
/Linux-v6.1/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 9 do not modify memory but attempt to infer privileged data in the memory. 58 privileged data touched during the speculative execution. 62 execution of indirect branches to leak privileged memory. 109 this could cause privileged code's indirect branch to jump to a gadget 164 for speculative execution. This could cause privileged memory to be 179 could cause privileged memory to be accessed and leaked. 241 code to derive invalid data pointers accessing privileged memory in 281 speculate into privileged memory after entering the kernel. For places 307 pointers to privileged data in guest. The privileged data could be
|
/Linux-v6.1/Documentation/loongarch/ |
D | introduction.rst | 19 used in privileged mode (PLV0). 96 CSRs can only be accessed from privileged mode (PLV0): 128 0x21 Privileged Resource Configuration 1 PRCFG1 129 0x22 Privileged Resource Configuration 2 PRCFG2 130 0x23 Privileged Resource Configuration 3 PRCFG3 284 9. Privileged Instructions::
|
/Linux-v6.1/tools/perf/arch/x86/util/ |
D | intel-bts.c | 114 bool privileged = perf_event_paranoid_check(-1); in intel_bts_recording_options() local 154 if (privileged) { in intel_bts_recording_options() 161 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options() 191 if (privileged) { in intel_bts_recording_options()
|