Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 83) sorted by relevance

1234

/linux/drivers/infiniband/hw/mthca/
H A Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
H A Dmthca_provider.h84 int privileged; member
/linux/Documentation/admin-guide/
H A Dperf-security.rst53 into two categories [6]_ : a) privileged processes (whose effective user
57 monitoring is fully available to privileged processes without access,
70 as privileged processes with respect to perf_events performance
78 observability operations is also open for CAP_SYS_ADMIN privileged
105 Mechanisms of capabilities, privileged capability-dumb files [6]_,
107 dedicated groups of privileged Perf users who are permitted to execute
109 steps can be taken to create such groups of privileged Perf users.
111 1. Create perf_users group of privileged Perf users, assign perf_users
168 privileged environment, naturally shell, is possible. The shell provides
196 3. Check that members of perf_users group have access to the privileged
[all …]
/linux/Documentation/arch/powerpc/
H A Ddexcr.rst10 The DEXCR is a privileged special purpose register (SPR) introduced in
22 A privileged SPR that can control aspects for userspace and kernel space
24 A hypervisor-privileged SPR that can control aspects for the hypervisor and
27 An optional ultravisor-privileged SPR that can control aspects for the ultravisor.
30 provides a non-privileged read-only view of the userspace DEXCR aspects.
170 For example, clearing NPHIE on exec is a privileged operation (a process
H A Ddscr.rst60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
63 Accessing DSCR through privileged SPR number (0x11) from user space
H A Dultravisor.rst19 When enabled, PEF adds a new higher privileged mode, called Ultravisor
22 for short). Ultravisor mode is the highest privileged mode in POWER
37 PEF protects SVMs from the hypervisor, privileged users, and other
48 privileged are now ultravisor privileged.
65 * There is a new Ultravisor privileged register, SMFCTRL, which has an
123 * The following resources have become Ultravisor privileged and
222 be accessed when running in Ultravisor-privileged mode.
/linux/tools/perf/arch/arm64/util/
H A Darm-spe.c191 bool privileged) in arm_spe_snapshot_resolve_auxtrace_defaults() argument
208 if (privileged) { in arm_spe_snapshot_resolve_auxtrace_defaults()
215 } else if (!opts->auxtrace_mmap_pages && !privileged && opts->mmap_pages == UINT_MAX) { in arm_spe_snapshot_resolve_auxtrace_defaults()
299 bool privileged = perf_event_paranoid_check(-1); in arm_spe_setup_aux_buffer() local
310 arm_spe_snapshot_resolve_auxtrace_defaults(opts, privileged); in arm_spe_setup_aux_buffer()
336 if (privileged) { in arm_spe_setup_aux_buffer()
H A Dhisi-ptt.c67 bool privileged = perf_event_paranoid_check(-1); in hisi_ptt_set_auxtrace_mmap_page() local
73 if (privileged) { in hisi_ptt_set_auxtrace_mmap_page()
/linux/tools/perf/arch/x86/util/
H A Dintel-bts.c114 bool privileged = perf_event_paranoid_check(-1); in intel_bts_recording_options() local
154 if (privileged) { in intel_bts_recording_options()
161 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options()
191 if (privileged) { in intel_bts_recording_options()
H A Dintel-pt.c622 bool privileged = perf_event_paranoid_check(-1); in intel_pt_recording_options() local
678 if (privileged) { in intel_pt_recording_options()
685 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options()
724 if (!opts->auxtrace_mmap_pages && !privileged && in intel_pt_recording_options()
748 if (privileged) { in intel_pt_recording_options()
/linux/Documentation/ABI/testing/
H A Dsysfs-hypervisor-xen24 privileged (e.g. dom0), the hypervisor
27 privileged guests.
/linux/Documentation/filesystems/fuse/
H A Dfuse.rst18 Non-privileged mount (or user mount):
19 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
218 How do non-privileged mounts work?
221 Since the mount() system call is a privileged operation, a helper
224 The implication of providing non-privileged mounts is that the mount
249 for non-privileged mounts.
304 measures, that system processes will never enter non-privileged
314 privileged. If any process could access such an 'allow_other' mount
H A Dfuse-passthrough.rst38 3. The (privileged) FUSE daemon uses the ``FUSE_DEV_IOC_BACKING_OPEN`` ioctl
122 ensuring that only privileged users can create these potentially complex
/linux/drivers/infiniband/hw/irdma/
H A Dhw.c726 if (rf->sc_dev.privileged) in irdma_destroy_aeq()
794 if (rf->sc_dev.privileged) in irdma_del_ceq_0()
828 if (rf->sc_dev.privileged) in irdma_del_ceqs()
878 bool privileged, bool reset) in irdma_close_hmc_objects_type() argument
885 info.privileged = privileged; in irdma_close_hmc_objects_type()
900 struct irdma_hmc_info *hmc_info, bool privileged, in irdma_del_hmc_objects() argument
908 hmc_info, privileged, reset); in irdma_del_hmc_objects()
934 static int irdma_create_hmc_objs(struct irdma_pci_f *rf, bool privileged, in irdma_create_hmc_objs() argument
942 info.privileged = privileged; in irdma_create_hmc_objs()
973 dev->hmc_info, privileged, in irdma_create_hmc_objs()
[all …]
/linux/drivers/virt/acrn/
H A DKconfig10 a privileged management VM, called Service VM, to manage User
/linux/Documentation/virt/kvm/
H A Dppc-pv.rst8 space code in PR=1 which is user space. This way we trap all privileged
11 Unfortunately that is also the downfall. There are quite some privileged
15 This is what the PPC PV interface helps with. It takes privileged instructions
147 also act on the shared page. So calling privileged instructions still works as
/linux/Documentation/virt/acrn/
H A Dcpuid.rst38 ACRN_FEATURE_PRIVILEGED_VM 0 guest VM is a privileged VM
H A Dintroduction.rst7 hardware. It has a privileged management VM, called Service VM, to manage User
/linux/Documentation/arch/s390/
H A Dmonreader.rst30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP
75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name
95 (Class E privileged), see "CP Command and Utility Reference".
173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
/linux/tools/perf/arch/arm/util/
H A Dcs-etm.c326 bool privileged = perf_event_paranoid_check(-1); in cs_etm_get_evsel()
372 if (privileged) { in cs_etm_recording_options()
380 } else if (!opts->auxtrace_mmap_pages && !privileged && in cs_etm_recording_options()
425 if (privileged) { in cs_etm_recording_options()
340 bool privileged = perf_event_paranoid_check(-1); cs_etm_recording_options() local
/linux/drivers/hv/
H A DKconfig32 being more privileged than lower levels. VTL0 is the least privileged
/linux/Documentation/arch/riscv/
H A Duabi.rst23 single-letter extensions and before any higher-privileged extensions.
36 after any lower-privileged, standard extensions. If multiple machine-level
/linux/Documentation/admin-guide/hw-vuln/
H A Dspectre.rst9 do not modify memory but attempt to infer privileged data in the memory.
58 privileged data touched during the speculative execution.
62 execution of indirect branches to leak privileged memory.
109 this could cause privileged code's indirect branch to jump to a gadget
163 for speculative execution. This could cause privileged memory to be
178 could cause privileged memory to be accessed and leaked.
240 code to derive invalid data pointers accessing privileged memory in
280 speculate into privileged memory after entering the kernel. For places
306 pointers to privileged data in guest. The privileged data could be
/linux/kernel/sched/
H A Dpsi.c1302 bool privileged; in psi_trigger_create() local
1312 privileged = cap_raised(file->f_cred->cap_effective, CAP_SYS_RESOURCE); in psi_trigger_create()
1336 if (!privileged && window_us % 2000000) in psi_trigger_create()
1360 t->aggregator = privileged ? PSI_POLL : PSI_AVGS; in psi_trigger_create()
1362 if (privileged) { in psi_trigger_create()
/linux/Documentation/firmware-guide/acpi/
H A Daml-debugger.rst35 sufficiently privileged user).

1234