/openbmc/linux/Documentation/devicetree/bindings/riscv/ |
H A D | extensions.yaml | 57 version of the unprivileged ISA specification. 72 version of the unprivileged ISA specification. 76 20191213 version of the unprivileged specification. 81 ratified in the 20191213 version of the unprivileged ISA 87 20191213 version of the unprivileged ISA specification. 92 ratified in the 20191213 version of the unprivileged ISA 98 ratified in the 20191213 version of the unprivileged ISA 104 ratified in the 20191213 version of the unprivileged ISA 212 ratified in the 20191213 version of the unprivileged ISA 219 unprivileged ISA specification. [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/glibc/glibc/ |
H A D | 0021-fix-create-thread-failed-in-unprivileged-process-BZ-.patch | 4 Subject: [PATCH] fix create thread failed in unprivileged process [BZ #28287] 7 applied, start a unprivileged container (docker run without --privileged), 15 was specified by an unprivileged process (process without CAP_SYS_ADMIN)
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | no_new_privs.rst | 15 - chroot is disallowed to unprivileged processes, since it would allow 53 available to an unprivileged user. If everything running with a 60 available to unprivileged tasks if ``no_new_privs`` is set. In principle,
|
/openbmc/linux/tools/bpf/bpftool/Documentation/ |
H A D | bpftool-feature.rst | 26 | **bpftool** **feature probe** [*COMPONENT*] [**full**] [**unprivileged**] [**macros** [**prefix**… 58 When the **unprivileged** keyword is used, bpftool will dump 63 **unprivileged** keyword: This is to avoid misdetection if
|
/openbmc/linux/tools/testing/selftests/mount/ |
H A D | run_unprivileged_remount.sh | 8 ./unprivileged-remount-test ;
|
H A D | .gitignore | 2 unprivileged-remount-test
|
H A D | Makefile | 7 TEST_GEN_FILES := unprivileged-remount-test nosymfollow-test
|
/openbmc/linux/Documentation/riscv/ |
H A D | uabi.rst | 10 chapter 27 of the unprivileged specification. 30 after standard unprivileged extensions. If multiple supervisor-level
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | perf-security.rst | 54 ID is 0, referred to as superuser or root), and b) unprivileged 67 files of unprivileged users. 87 Prior Linux v5.9 unprivileged processes using perf_events system call 90 So unprivileged processes provided with CAP_SYS_PTRACE capability are 96 Other capabilities being granted to unprivileged processes can 226 perf_events *scope* and *access* control for unprivileged processes 243 imposed but ignored for unprivileged processes with CAP_IPC_LOCK 252 unprivileged processes with CAP_IPC_LOCK capability. 259 unprivileged processes with CAP_IPC_LOCK capability.
|
/openbmc/openbmc/poky/meta/recipes-support/libcap/files/ |
H A D | 0002-tests-do-not-run-target-executables.patch | 19 # unprivileged
|
/openbmc/linux/kernel/bpf/ |
H A D | Kconfig | 73 bool "Disable unprivileged BPF by default" 77 Disables unprivileged BPF by default by setting the corresponding
|
/openbmc/openbmc/poky/meta/recipes-kernel/systemtap/systemtap/ |
H A D | 0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch | 23 # Why the "id -u" condition? This way, an unprivileged user can run
|
/openbmc/linux/arch/arm/boot/dts/xen/ |
H A D | xenvm-4.2.dts | 3 * Xen Virtual Machine for unprivileged guests
|
/openbmc/linux/Documentation/driver-api/early-userspace/ |
H A D | early_userspace_support.rst | 44 built by an unprivileged user. 65 Because device-special files cannot be created by a unprivileged user, 68 early userspace image can be built by an unprivileged user.
|
/openbmc/linux/arch/powerpc/kvm/ |
H A D | book3s_emulate.c | 685 goto unprivileged; in kvmppc_core_emulate_mtspr_pr() 844 unprivileged: in kvmppc_core_emulate_mtspr_pr() 885 goto unprivileged; in kvmppc_core_emulate_mfspr_pr() 1013 unprivileged: in kvmppc_core_emulate_mfspr_pr()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/polkit/ |
H A D | polkit_124.bb | 2 …cation-level toolkit for defining and handling the policy that allows unprivileged processes to sp…
|
/openbmc/linux/fs/smb/server/ |
H A D | Kconfig | 68 Prevent unprivileged processes to start the ksmbd kernel server.
|
/openbmc/sdbusplus/example/yaml/net/poettering/ |
H A D | Calculator.interface.yaml | 46 - unprivileged
|
/openbmc/linux/Documentation/security/ |
H A D | landlock.rst | 14 including unprivileged ones. Because such process may be compromised or 19 Landlock is designed to be usable by unprivileged processes while following the
|
H A D | self-protection.rst | 13 In the worst-case scenario, we assume an unprivileged local attacker 119 restricted to the more regular set of normally available to unprivileged 125 The kernel should never allow an unprivileged user the ability to 131 unprivileged socket API is nonsense: only the root or physically local
|
/openbmc/sdbusplus/include/sdbusplus/ |
H A D | vtable.hpp | 107 constexpr auto unprivileged = SD_BUS_VTABLE_UNPRIVILEGED; variable
|
/openbmc/sdbusplus/docs/yaml/ |
H A D | interface.md | 147 `unprivileged`and `no_reply`, which corresponds to `SD_BUS_VTABLE_DEPRECATED`, 159 - unprivileged 191 - `unprivileged` - SD_BUS_VTABLE_UNPRIVILEGED
|
/openbmc/qemu/docs/tools/ |
H A D | qemu-pr-helper.rst | 19 the operating system restricts sending these commands to unprivileged
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-chromeos-driver-cros-ec-lightbar | 15 and other system hardware. To prevent unprivileged users
|
H A D | sysfs-class-rtc | 36 (RW) The maximum interrupt rate an unprivileged user may request
|