| /linux/drivers/infiniband/hw/mthca/ |
| H A D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument 43 pd->privileged = privileged; in mthca_pd_alloc() 50 if (privileged) { in mthca_pd_alloc() 64 if (pd->privileged) in mthca_pd_free()
|
| H A D | mthca_provider.h | 84 int privileged; member
|
| /linux/Documentation/arch/powerpc/ |
| H A D | dexcr.rst | 10 The DEXCR is a privileged special purpose register (SPR) introduced in 22 A privileged SPR that can control aspects for userspace and kernel space 24 A hypervisor-privileged SPR that can control aspects for the hypervisor and 27 An optional ultravisor-privileged SPR that can control aspects for the ultravisor. 30 provides a non-privileged read-only view of the userspace DEXCR aspects. 170 For example, clearing NPHIE on exec is a privileged operation (a process
|
| H A D | dscr.rst | 60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only) 63 Accessing DSCR through privileged SPR number (0x11) from user space
|
| /linux/tools/perf/arch/arm64/util/ |
| H A D | arm-spe.c | 191 bool privileged) in arm_spe_snapshot_resolve_auxtrace_defaults() argument 208 if (privileged) { in arm_spe_snapshot_resolve_auxtrace_defaults() 215 } else if (!opts->auxtrace_mmap_pages && !privileged && opts->mmap_pages == UINT_MAX) { in arm_spe_snapshot_resolve_auxtrace_defaults() 298 bool privileged = perf_event_paranoid_check(-1); in arm_spe_setup_aux_buffer() local 309 arm_spe_snapshot_resolve_auxtrace_defaults(opts, privileged); in arm_spe_setup_aux_buffer() 335 if (privileged) { in arm_spe_setup_aux_buffer()
|
| H A D | hisi-ptt.c | 67 bool privileged = perf_event_paranoid_check(-1); in hisi_ptt_set_auxtrace_mmap_page() local 73 if (privileged) { in hisi_ptt_set_auxtrace_mmap_page()
|
| /linux/Documentation/admin-guide/ |
| H A D | perf-security.rst | 53 into two categories [6]_ : a) privileged processes (whose effective user 57 monitoring is fully available to privileged processes without access, 70 as privileged processes with respect to perf_events performance 78 observability operations is also open for CAP_SYS_ADMIN privileged 105 Mechanisms of capabilities, privileged capability-dumb files [6]_, 107 dedicated groups of privileged Perf users who are permitted to execute 109 steps can be taken to create such groups of privileged Perf users. 111 1. Create perf_users group of privileged Perf users, assign perf_users 168 privileged environment, naturally shell, is possible. The shell provides 196 3. Check that members of perf_users group have access to the privileged [all …]
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-hypervisor-xen | 24 privileged (e.g. dom0), the hypervisor 27 privileged guests.
|
| /linux/tools/perf/arch/x86/util/ |
| H A D | intel-bts.c | 114 bool privileged = perf_event_paranoid_check(-1); in intel_bts_recording_options() local 154 if (privileged) { in intel_bts_recording_options() 161 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options() 191 if (privileged) { in intel_bts_recording_options()
|
| H A D | intel-pt.c | 622 bool privileged = perf_event_paranoid_check(-1); in intel_pt_recording_options() local 679 if (privileged) { in intel_pt_recording_options() 686 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options() 725 if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options() 749 if (privileged) { in intel_pt_recording_options()
|
| /linux/Documentation/filesystems/fuse/ |
| H A D | fuse.rst | 18 Non-privileged mount (or user mount): 19 A userspace filesystem mounted by a non-privileged (non-root) user. 45 non-privileged mounts. This opens up new possibilities for the use of 218 How do non-privileged mounts work? 221 Since the mount() system call is a privileged operation, a helper 224 The implication of providing non-privileged mounts is that the mount 249 for non-privileged mounts. 304 measures, that system processes will never enter non-privileged 314 privileged. If any process could access such an 'allow_other' mount
|
| H A D | fuse-passthrough.rst | 38 3. The (privileged) FUSE daemon uses the ``FUSE_DEV_IOC_BACKING_OPEN`` ioctl 122 ensuring that only privileged users can create these potentially complex
|
| /linux/drivers/virt/acrn/ |
| H A D | Kconfig | 10 a privileged management VM, called Service VM, to manage User
|
| /linux/Documentation/virt/acrn/ |
| H A D | cpuid.rst | 38 ACRN_FEATURE_PRIVILEGED_VM 0 guest VM is a privileged VM
|
| H A D | introduction.rst | 7 hardware. It has a privileged management VM, called Service VM, to manage User
|
| /linux/Documentation/virt/kvm/ |
| H A D | ppc-pv.rst | 8 space code in PR=1 which is user space. This way we trap all privileged 11 Unfortunately that is also the downfall. There are quite some privileged 15 This is what the PPC PV interface helps with. It takes privileged instructions 147 also act on the shared page. So calling privileged instructions still works as
|
| /linux/drivers/infiniband/hw/irdma/ |
| H A D | hw.c | 658 if (rf->sc_dev.privileged) in irdma_destroy_aeq() 726 if (rf->sc_dev.privileged) in irdma_del_ceq_0() 760 if (rf->sc_dev.privileged) in irdma_del_ceqs() 810 bool privileged, bool reset) in irdma_close_hmc_objects_type() argument 817 info.privileged = privileged; in irdma_close_hmc_objects_type() 832 struct irdma_hmc_info *hmc_info, bool privileged, in irdma_del_hmc_objects() argument 840 hmc_info, privileged, reset); in irdma_del_hmc_objects() 866 static int irdma_create_hmc_objs(struct irdma_pci_f *rf, bool privileged, in irdma_create_hmc_objs() argument 874 info.privileged = privileged; in irdma_create_hmc_objs() 905 dev->hmc_info, privileged, in irdma_create_hmc_objs() [all …]
|
| /linux/Documentation/arch/riscv/ |
| H A D | uabi.rst | 21 single-letter extensions and before any higher-privileged extensions. 34 after any lower-privileged, standard extensions. If multiple machine-level
|
| /linux/drivers/hv/ |
| H A D | Kconfig | 32 being more privileged than lower levels. VTL0 is the least privileged
|
| /linux/Documentation/arch/s390/ |
| H A D | monreader.rst | 30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP 75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name 95 (Class E privileged), see "CP Command and Utility Reference". 173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
|
| /linux/tools/perf/arch/arm/util/ |
| H A D | cs-etm.c | 315 bool privileged = perf_event_paranoid_check(-1); in cs_etm_recording_options() local 361 if (privileged) { in cs_etm_recording_options() 369 } else if (!opts->auxtrace_mmap_pages && !privileged && in cs_etm_recording_options() 414 if (privileged) { in cs_etm_recording_options()
|
| /linux/fs/nfs/ |
| H A D | nfs4session.h | 29 unsigned int privileged : 1, member
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | spectre.rst | 9 do not modify memory but attempt to infer privileged data in the memory. 58 privileged data touched during the speculative execution. 62 execution of indirect branches to leak privileged memory. 109 this could cause privileged code's indirect branch to jump to a gadget 163 for speculative execution. This could cause privileged memory to be 178 could cause privileged memory to be accessed and leaked. 240 code to derive invalid data pointers accessing privileged memory in 280 speculate into privileged memory after entering the kernel. For places 306 pointers to privileged data in guest. The privileged data could be
|
| /linux/kernel/sched/ |
| H A D | psi.c | 1302 bool privileged; in psi_trigger_create() local 1312 privileged = cap_raised(file->f_cred->cap_effective, CAP_SYS_RESOURCE); in psi_trigger_create() 1336 if (!privileged && window_us % 2000000) in psi_trigger_create() 1360 t->aggregator = privileged ? PSI_POLL : PSI_AVGS; in psi_trigger_create() 1362 if (privileged) { in psi_trigger_create()
|
| /linux/Documentation/firmware-guide/acpi/ |
| H A D | aml-debugger.rst | 35 sufficiently privileged user).
|