Home
last modified time | relevance | path

Searched refs:unprivileged (Results 1 – 25 of 53) sorted by relevance

123

/linux/Documentation/userspace-api/
H A Dno_new_privs.rst15 - chroot is disallowed to unprivileged processes, since it would allow
53 available to an unprivileged user. If everything running with a
60 available to unprivileged tasks if ``no_new_privs`` is set. In principle,
/linux/tools/bpf/bpftool/Documentation/
H A Dbpftool-feature.rst26 | **bpftool** **feature probe** [*COMPONENT*] [**full**] [**unprivileged**] [**macros** [**prefix**…
54 When the **unprivileged** keyword is used, bpftool will dump only the
58 MUST use the **unprivileged** keyword: This is to avoid misdetection if
/linux/Documentation/admin-guide/
H A Dperf-security.rst54 ID is 0, referred to as superuser or root), and b) unprivileged
67 files of unprivileged users.
87 Prior Linux v5.9 unprivileged processes using perf_events system call
90 So unprivileged processes provided with CAP_SYS_PTRACE capability are
96 Other capabilities being granted to unprivileged processes can
226 perf_events *scope* and *access* control for unprivileged processes
243 imposed but ignored for unprivileged processes with CAP_IPC_LOCK
252 unprivileged processes with CAP_IPC_LOCK capability.
259 unprivileged processes with CAP_IPC_LOCK capability.
/linux/tools/testing/selftests/mount/
H A Drun_unprivileged_remount.sh8 ./unprivileged-remount-test ;
H A D.gitignore2 unprivileged-remount-test
H A DMakefile7 TEST_GEN_FILES := unprivileged-remount-test nosymfollow-test
/linux/kernel/bpf/
H A DKconfig74 bool "Disable unprivileged BPF by default"
78 Disables unprivileged BPF by default by setting the corresponding
/linux/Documentation/arch/riscv/
H A Duabi.rst10 chapter 27 of the unprivileged specification.
30 after standard unprivileged extensions. If multiple supervisor-level
/linux/arch/arm/boot/dts/xen/
H A Dxenvm-4.2.dts3 * Xen Virtual Machine for unprivileged guests
/linux/Documentation/driver-api/early-userspace/
H A Dearly_userspace_support.rst44 built by an unprivileged user.
65 Because device-special files cannot be created by a unprivileged user,
68 early userspace image can be built by an unprivileged user.
/linux/arch/powerpc/kvm/
H A Dbook3s_emulate.c685 goto unprivileged; in kvmppc_core_emulate_mtspr_pr()
844 unprivileged: in kvmppc_core_emulate_mtspr_pr()
885 goto unprivileged; in kvmppc_core_emulate_mfspr_pr()
1013 unprivileged: in kvmppc_core_emulate_mfspr_pr()
/linux/Documentation/security/
H A Dlandlock.rst14 including unprivileged ones. Because such a process may be compromised or
19 Landlock is designed to be usable by unprivileged processes while following the
H A Dself-protection.rst13 In the worst-case scenario, we assume an unprivileged local attacker
119 restricted to the more regular set of normally available to unprivileged
125 The kernel should never allow an unprivileged user the ability to
131 unprivileged socket API is nonsense: only the root or physically local
/linux/fs/smb/server/
H A DKconfig68 Prevent unprivileged processes to start the ksmbd kernel server.
/linux/Documentation/ABI/testing/
H A Dsysfs-class-chromeos-driver-cros-ec-lightbar15 and other system hardware. To prevent unprivileged users
H A Dsysfs-class-rtc36 (RW) The maximum interrupt rate an unprivileged user may request
/linux/Documentation/infiniband/
H A Duser_verbs.rst55 unprivileged processes do not exceed their RLIMIT_MEMLOCK limit.
/linux/Documentation/filesystems/
H A Dfuse.rst298 an unprivileged user - normally restricted from mounting with
302 processes in user namespaces where they're unprivileged. For this
365 Since we are talking about unprivileged userspace programs,
/linux/Documentation/block/
H A Dublk.rst150 permission check, and this command is added for supporting unprivileged
161 unprivileged application needs to query devices the current user owns,
233 Once the flag is set, all control commands can be sent by unprivileged
/linux/Documentation/admin-guide/hw-vuln/
H A Dtsx_async_abort.rst6 TAA is a hardware vulnerability that allows unprivileged speculative access to
72 Attacks against the TAA vulnerability can be implemented from unprivileged
H A Dgather_data_sampling.rst6 Gather Data Sampling is a hardware vulnerability which allows unprivileged
H A Dspecial-register-buffer-data-sampling.rst58 An unprivileged user can extract values returned from RDRAND and RDSEED
/linux/Documentation/admin-guide/sysctl/
H A Dnet.rst104 - 1 - enable JIT hardening for unprivileged users only
128 compiler in order to reject unprivileged JIT requests once it has
234 packet contents. If disabled, transmit timestamp requests from unprivileged
H A Dkernel.rst255 This toggle indicates whether unprivileged users are prevented
498 -EPERM) for unprivileged processes not in the io_uring_group group.
567 unprivileged users.
573 if leaking kernel pointer values to unprivileged users is a concern.
952 Controls use of the performance events system by unprivileged
1445 systems, large numbers of split locks from unprivileged users can result in
1623 Writing 1 to this entry will disable unprivileged calls to ``bpf()``;
1628 Writing 2 to this entry will also disable unprivileged calls to ``bpf()``,
/linux/Documentation/core-api/
H A Ddma-attributes.rst128 accesses to DMA buffers in both privileged "supervisor" and unprivileged

123