Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 141) sorted by relevance

123456

/openbmc/linux/drivers/infiniband/hw/mthca/
H A Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) in mthca_pd_alloc() argument
43 pd->privileged = privileged; in mthca_pd_alloc()
50 if (privileged) { in mthca_pd_alloc()
64 if (pd->privileged) in mthca_pd_free()
/openbmc/linux/Documentation/powerpc/
H A Ddexcr.rst10 The DEXCR is a privileged special purpose register (SPR) introduced in
22 A privileged SPR that can control aspects for userspace and kernel space
24 A hypervisor-privileged SPR that can control aspects for the hypervisor and
27 An optional ultravisor-privileged SPR that can control aspects for the ultravisor.
30 provides a non-privileged read-only view of the userspace DEXCR aspects.
H A Ddscr.rst60 (1) Problem state SPR: 0x03 (Un-privileged, POWER8 only)
63 Accessing DSCR through privileged SPR number (0x11) from user space
/openbmc/linux/tools/perf/arch/arm64/util/
H A Darm-spe.c69 bool privileged) in arm_spe_snapshot_resolve_auxtrace_defaults() argument
86 if (privileged) { in arm_spe_snapshot_resolve_auxtrace_defaults()
93 } else if (!opts->auxtrace_mmap_pages && !privileged && opts->mmap_pages == UINT_MAX) { in arm_spe_snapshot_resolve_auxtrace_defaults()
125 bool privileged = perf_event_paranoid_check(-1); in arm_spe_recording_options() local
158 arm_spe_snapshot_resolve_auxtrace_defaults(opts, privileged); in arm_spe_recording_options()
181 if (privileged) { in arm_spe_recording_options()
H A Dhisi-ptt.c66 bool privileged = perf_event_paranoid_check(-1); in hisi_ptt_set_auxtrace_mmap_page() local
72 if (privileged) { in hisi_ptt_set_auxtrace_mmap_page()
/openbmc/linux/Documentation/admin-guide/
H A Dperf-security.rst53 into two categories [6]_ : a) privileged processes (whose effective user
57 monitoring is fully available to privileged processes without access,
70 as privileged processes with respect to perf_events performance
78 observability operations is also open for CAP_SYS_ADMIN privileged
105 Mechanisms of capabilities, privileged capability-dumb files [6]_,
107 dedicated groups of privileged Perf users who are permitted to execute
109 steps can be taken to create such groups of privileged Perf users.
111 1. Create perf_users group of privileged Perf users, assign perf_users
168 privileged environment, naturally shell, is possible. The shell provides
196 3. Check that members of perf_users group have access to the privileged
[all …]
/openbmc/linux/Documentation/riscv/
H A Dhwprobe.rst35 as defined by the RISC-V privileged architecture specification.
38 defined by the RISC-V privileged architecture specification.
41 defined by the RISC-V privileged architecture specification.
49 privileged ISA, with the following known exceptions (more exceptions may be
H A Duabi.rst21 single-letter extensions and before any higher-privileged extensions.
34 after any lower-privileged, standard extensions. If multiple machine-level
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-hypervisor-xen24 privileged (e.g. dom0), the hypervisor
27 privileged guests.
/openbmc/linux/tools/perf/arch/x86/util/
H A Dintel-bts.c114 bool privileged = perf_event_paranoid_check(-1); in intel_bts_recording_options() local
154 if (privileged) { in intel_bts_recording_options()
161 } else if (!opts->auxtrace_mmap_pages && !privileged && in intel_bts_recording_options()
191 if (privileged) { in intel_bts_recording_options()
/openbmc/linux/drivers/infiniband/hw/irdma/
H A Dhmc.h131 bool privileged; member
141 bool privileged; member
/openbmc/linux/drivers/hv/
H A DKconfig29 being more privileged than lower levels. VTL0 is the least privileged
/openbmc/linux/Documentation/filesystems/
H A Dfuse.rst18 Non-privileged mount (or user mount):
19 A userspace filesystem mounted by a non-privileged (non-root) user.
45 non-privileged mounts. This opens up new possibilities for the use of
204 How do non-privileged mounts work?
207 Since the mount() system call is a privileged operation, a helper
210 The implication of providing non-privileged mounts is that the mount
235 for non-privileged mounts.
290 measures, that system processes will never enter non-privileged
300 privileged. If any process could access such an 'allow_other' mount
/openbmc/qemu/docs/tools/
H A Dqemu-vmsr-helper.rst20 However those registers are accessible under privileged access (CAP_SYS_RAWIO).
21 QEMU can use an external helper to access those privileged registers.
/openbmc/openbmc/poky/meta/recipes-connectivity/inetutils/inetutils/
H A Drlogin.xinetd.inetutils4 # execution with authentication based on privileged port numbers from trusted
H A Drsh.xinetd.inetutils6 # privileged port numbers from trusted hosts.
/openbmc/openbmc-build-scripts/
H A Drun-unit-test-docker.sh112 --privileged=true \
H A Drun-rootfs-size-docker.sh73 --privileged=true \
/openbmc/linux/Documentation/admin-guide/LSM/
H A DSafeSetID.rst28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no
42 non-root programs can drop to even-lesser-privileged uids. This is especially
56 spawning semantics in the application (e.g. by using a privileged helper program
62 fork()/exec(). Because of this, as solution that uses a privileged helper in
/openbmc/linux/drivers/virt/acrn/
H A DKconfig10 a privileged management VM, called Service VM, to manage User
/openbmc/linux/Documentation/virt/kvm/
H A Dppc-pv.rst8 space code in PR=1 which is user space. This way we trap all privileged
11 Unfortunately that is also the downfall. There are quite some privileged
15 This is what the PPC PV interface helps with. It takes privileged instructions
147 also act on the shared page. So calling privileged instructions still works as
/openbmc/linux/Documentation/virt/acrn/
H A Dcpuid.rst38 ACRN_FEATURE_PRIVILEGED_VM 0 guest VM is a privileged VM
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libutempter/
H A Dlibutempter_1.2.2-alt1.bb1 SUMMARY = "A privileged helper for utmp/wtmp updates"
/openbmc/linux/Documentation/arch/s390/
H A Dmonreader.rst30 location of the monitor DCSS with the Class E privileged CP command Q NSS MAP
75 the same DCSS. The CP command Q MONITOR (Class E privileged) shows the name
95 (Class E privileged), see "CP Command and Utility Reference".
173 module. You can also use the (Class E privileged) CP command Q NSS MAP to
/openbmc/linux/tools/perf/arch/arm/util/
H A Dcs-etm.c301 bool privileged = perf_event_paranoid_check(-1); in cs_etm_recording_options() local
347 if (privileged) { in cs_etm_recording_options()
355 } else if (!opts->auxtrace_mmap_pages && !privileged && in cs_etm_recording_options()
400 if (privileged) { in cs_etm_recording_options()

123456