/Linux-v4.19/Documentation/devicetree/bindings/powerpc/ |
D | ibm,powerpc-cpu-features.txt | 13 enablement, privilege, and compatibility metadata. 94 - usable-privilege 104 This property describes the privilege levels and/or software components 118 This property describes the HV privilege support required to enable the 119 feature to lesser privilege levels. If the property does not exist then no 137 This property describes the OS privilege support required to enable the 138 feature to lesser privilege levels. If the property does not exist then no 179 This property may exist when the usable-privilege property value has PR bit set. 213 usable-privilege = <1 | 2 | 4>; 219 usable-privilege = <1 | 2>; [all …]
|
/Linux-v4.19/arch/arm64/include/asm/ |
D | hw_breakpoint.h | 30 privilege : 2, member 48 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 51 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg() 62 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/Linux-v4.19/arch/arm/include/asm/ |
D | hw_breakpoint.h | 17 privilege : 2, 31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/Linux-v4.19/arch/arm64/kernel/ |
D | hw_breakpoint.c | 151 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument 153 switch (privilege) { in debug_exception_level() 159 pr_warning("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 240 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 505 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 507 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 575 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse() 588 int i, max_slots, privilege; in toggle_bp_registers() local 609 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers() 610 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
|
/Linux-v4.19/Documentation/ia64/ |
D | fsys.txt | 34 - execution is at privilege level 0 (most-privileged) 51 privilege level is at level 0, this means that fsys-mode requires some 57 Linux operates in fsys-mode when (a) the privilege level is 0 (most 69 to by "regs" was executing in user mode (privilege level 3). 168 is exited. This is accomplished with the help of the lower-privilege 172 "br.ret" instruction that lowers the privilege level, a trap will 205 breakpoint that triggers at any privilege level other than 3 (user-mode). 210 syscall_via_break(), with privilege level 3. Note: the 216 taken _after_ restoring the privilege level, the CPU has already 229 syscall_via_break(), with privilege level 3.
|
/Linux-v4.19/Documentation/devicetree/bindings/interrupt-controller/ |
D | sifive,plic-1.0.0.txt | 9 A hart context is a privilege mode in a hardware execution thread. For example, 11 privilege modes per hart; machine mode and supervisor mode.
|
/Linux-v4.19/Documentation/userspace-api/ |
D | no_new_privs.rst | 26 promises not to grant the privilege to do anything that could not have 41 Note that ``no_new_privs`` does not prevent privilege changes that do not
|
D | spec_ctrl.rst | 7 privilege domains.
|
/Linux-v4.19/arch/arm/kernel/ |
D | hw_breakpoint.c | 577 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 579 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 678 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
|
/Linux-v4.19/include/uapi/linux/ |
D | ipmi.h | 104 unsigned char privilege; member
|
/Linux-v4.19/Documentation/devicetree/bindings/arm/firmware/ |
D | sdei.txt | 11 privilege level of the SDEI firmware (specified as part of the binding
|
/Linux-v4.19/Documentation/parisc/ |
D | registers | 56 H (Higher-privilege trap) 0 57 L (Lower-privilege trap) 0
|
/Linux-v4.19/tools/perf/Documentation/ |
D | perf-top.txt | 232 The privilege levels may be omitted, in which case, the privilege levels of the associated 233 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
D | perf-record.txt | 356 The privilege levels may be omitted, in which case, the privilege levels of the associated 357 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
/Linux-v4.19/tools/testing/selftests/ftrace/ |
D | README | 31 * Take care with side effects as the tests are run with root privilege.
|
/Linux-v4.19/Documentation/devicetree/bindings/arm/ |
D | psci.txt | 11 Functions are invoked by trapping to the privilege level of the PSCI
|
/Linux-v4.19/Documentation/sysctl/ |
D | fs.txt | 210 is to cross privilege boundaries when following a given hardlink (i.e. a 246 is to cross privilege boundaries when following a given symlink (i.e. a 267 privilege levels or is execute only will not be dumped.
|
/Linux-v4.19/Documentation/admin-guide/ |
D | security-bugs.rst | 50 Fixes for sensitive bugs, such as those that might lead to privilege
|
/Linux-v4.19/Documentation/admin-guide/LSM/ |
D | Smack.rst | 427 policy is said to have privilege. As of this writing a task can 428 have privilege either by possessing capabilities or by having an 614 only be changed by a process with privilege. 779 privilege. 793 program has appropriate privilege:: 798 packets will be checked if the program has appropriate privilege.
|
/Linux-v4.19/Documentation/devicetree/bindings/c6x/ |
D | dscr.txt | 97 Offset and default value for register used to set access privilege for
|
/Linux-v4.19/Documentation/security/ |
D | credentials.rst | 238 * UNIX exec privilege escalation bits (SUID/SGID); 239 * File capabilities exec privilege escalation bits. 243 privilege escalation bits come into play, and may allow the resulting process
|
/Linux-v4.19/tools/perf/ |
D | design.txt | 240 has sufficient privilege to do so) 257 all events on CPU-x. Per CPU counters need CAP_SYS_ADMIN privilege.
|
/Linux-v4.19/Documentation/ |
D | DMA-attributes.txt | 156 subsystem that the buffer is fully accessible at the elevated privilege
|
/Linux-v4.19/scripts/ |
D | spelling.txt | 937 privilage||privilege 938 priviledge||privilege
|
/Linux-v4.19/Documentation/riscv/ |
D | pmu.txt | 77 (2) privilege level setting (user space only, kernel space only, both);
|