| /linux/drivers/infiniband/hw/mthca/ |
| A D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
| A D | mthca_provider.h | 84 int privileged; member
|
| /linux/tools/perf/arch/arm64/util/ |
| A D | arm-spe.c | 92 bool privileged) in arm_spe_snapshot_resolve_auxtrace_defaults() argument 109 if (privileged) { in arm_spe_snapshot_resolve_auxtrace_defaults() 116 } else if (!opts->auxtrace_mmap_pages && !privileged && opts->mmap_pages == UINT_MAX) { in arm_spe_snapshot_resolve_auxtrace_defaults() 148 bool privileged = perf_event_paranoid_check(-1); in arm_spe_recording_options() local 179 arm_spe_snapshot_resolve_auxtrace_defaults(opts, privileged); in arm_spe_recording_options() 202 if (privileged) { in arm_spe_recording_options()
|
| /linux/Documentation/admin-guide/ |
| A D | perf-security.rst | 53 into two categories [6]_ : a) privileged processes (whose effective user 57 monitoring is fully available to privileged processes without access, 70 as privileged processes with respect to perf_events performance 78 observability operations is also open for CAP_SYS_ADMIN privileged 105 Mechanisms of capabilities, privileged capability-dumb files [6]_, 107 dedicated groups of privileged Perf users who are permitted to execute 109 steps can be taken to create such groups of privileged Perf users. 111 1. Create perf_users group of privileged Perf users, assign perf_users 196 3. Check that members of perf_users group have access to the privileged 215 As a result, members of perf_users group have access to the privileged [all …]
|
| /linux/tools/perf/arch/x86/util/ |
| A D | intel-bts.c | 114 bool privileged = perf_event_paranoid_check(-1); in intel_bts_recording_options() local 153 if (privileged) { in intel_bts_recording_options() 160 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options() 190 if (privileged) { in intel_bts_recording_options()
|
| A D | intel-pt.c | 629 bool privileged = perf_event_paranoid_check(-1); in intel_pt_recording_options() local 683 if (privileged) { in intel_pt_recording_options() 690 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options() 729 if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options() 753 if (privileged) { in intel_pt_recording_options()
|
| /linux/Documentation/ABI/testing/ |
| A D | sysfs-hypervisor-xen | 24 privileged (e.g. dom0), the hypervisor 27 privileged guests.
|
| /linux/drivers/infiniband/hw/irdma/ |
| A D | hmc.h | 131 bool privileged; member 141 bool privileged; member
|
| A D | hw.c | 758 bool privileged, bool reset) in irdma_close_hmc_objects_type() argument 765 info.privileged = privileged; in irdma_close_hmc_objects_type() 780 struct irdma_hmc_info *hmc_info, bool privileged, in irdma_del_hmc_objects() argument 788 hmc_info, privileged, reset); in irdma_del_hmc_objects() 816 irdma_create_hmc_objs(struct irdma_pci_f *rf, bool privileged, enum irdma_vers vers) in irdma_create_hmc_objs() argument 824 info.privileged = privileged; in irdma_create_hmc_objs() 853 dev->hmc_info, privileged, in irdma_create_hmc_objs()
|
| /linux/Documentation/filesystems/ |
| A D | fuse.rst | 18 Non-privileged mount (or user mount): 19 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 204 How do non-privileged mounts work? 207 Since the mount() system call is a privileged operation, a helper 210 The implication of providing non-privileged mounts is that the mount 235 for non-privileged mounts. 290 measures, that system processes will never enter non-privileged
|
| /linux/tools/perf/arch/arm/util/ |
| A D | cs-etm.c | 301 bool privileged = perf_event_paranoid_check(-1); in cs_etm_recording_options() local 347 if (privileged) { in cs_etm_recording_options() 355 } else if (!opts->auxtrace_mmap_pages && !privileged && in cs_etm_recording_options() 400 if (privileged) { in cs_etm_recording_options() 415 if (!privileged && in cs_etm_recording_options()
|
| /linux/Documentation/admin-guide/LSM/ |
| A D | SafeSetID.rst | 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 42 non-root programs can drop to even-lesser-privileged uids. This is especially 56 spawning semantics in the application (e.g. by using a privileged helper program 62 fork()/exec(). Because of this, as solution that uses a privileged helper in
|
| /linux/Documentation/virt/kvm/ |
| A D | ppc-pv.rst | 8 space code in PR=1 which is user space. This way we trap all privileged 11 Unfortunately that is also the downfall. There are quite some privileged 15 This is what the PPC PV interface helps with. It takes privileged instructions 147 also act on the shared page. So calling privileged instructions still works as
|
| /linux/drivers/virt/acrn/ |
| A D | Kconfig | 10 a privileged management VM, called Service VM, to manage User
|
| /linux/Documentation/s390/ |
| A D | monreader.rst | 30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP 75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name 95 (Class E privileged), see "CP Command and Utility Reference". 173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
|
| /linux/Documentation/virt/acrn/ |
| A D | cpuid.rst | 38 ACRN_FEATURE_PRIVILEGED_VM 0 guest VM is a privileged VM
|
| A D | introduction.rst | 7 hardware. It has a privileged management VM, called Service VM, to manage User
|
| /linux/Documentation/powerpc/ |
| A D | dscr.rst | 60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only) 63 Accessing DSCR through privileged SPR number (0x11) from user space
|
| A D | ultravisor.rst | 19 When enabled, PEF adds a new higher privileged mode, called Ultravisor 22 for short). Ultravisor mode is the highest privileged mode in POWER 37 PEF protects SVMs from the hypervisor, privileged users, and other 48 privileged are now ultravisor privileged. 65 * There is a new Ultravisor privileged register, SMFCTRL, which has an 123 * The following resources have become Ultravisor privileged and 222 be accessed when running in Ultravisor-privileged mode.
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| A D | spectre.rst | 9 do not modify memory but attempt to infer privileged data in the memory. 58 privileged data touched during the speculative execution. 62 execution of indirect branches to leak privileged memory. 109 this could cause privileged code's indirect branch to jump to a gadget 151 for speculative execution. This could cause privileged memory to be 166 could cause privileged memory to be accessed and leaked. 228 code to derive invalid data pointers accessing privileged memory in 268 speculate into privileged memory after entering the kernel. For places 294 pointers to privileged data in guest. The privileged data could be
|
| /linux/fs/nfs/ |
| A D | nfs4session.h | 29 unsigned int privileged : 1, member
|
| /linux/Documentation/riscv/ |
| A D | vm-layout.rst | 24 The RISC-V privileged architecture document states that the 64bit addresses
|
| /linux/Documentation/devicetree/bindings/firmware/ |
| A D | intel,stratix10-svc.txt | 15 Intel Stratix10 service layer driver, running at privileged exception level
|
| /linux/Documentation/admin-guide/sysctl/ |
| A D | fs.rst | 183 Maximum total number of pages a non-privileged user may allocate for pipes. 192 Maximum total number of pages a non-privileged user may allocate for pipes 289 memory contents of privileged processes. 296 pipe handler that knows to treat privileged core dumps with
|
| /linux/drivers/net/ethernet/freescale/enetc/ |
| A D | Kconfig | 12 physical function (PF) devices, managing ENETC Ports at a privileged
|