Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 25 of 43) sorted by relevance

12

/Linux-v5.4/Documentation/devicetree/bindings/powerpc/
Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
138 feature to lesser privilege levels. If the property does not exist then no
179 This property may exist when the usable-privilege property value has PR bit set.
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
[all …]
/Linux-v5.4/arch/arm64/include/asm/
Dhw_breakpoint.h17 privilege : 2, member
35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/Linux-v5.4/arch/arm/include/asm/
Dhw_breakpoint.h17 privilege : 2,
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/Linux-v5.4/arch/arm64/kernel/
Dhw_breakpoint.c140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
142 switch (privilege) { in debug_exception_level()
148 pr_warning("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
582 int i, max_slots, privilege; in toggle_bp_registers() local
603 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers()
604 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
/Linux-v5.4/Documentation/ia64/
Dfsys.rst34 - execution is at privilege level 0 (most-privileged)
51 privilege level is at level 0, this means that fsys-mode requires some
58 Linux operates in fsys-mode when (a) the privilege level is 0 (most
70 to by "regs" was executing in user mode (privilege level 3).
177 is exited. This is accomplished with the help of the lower-privilege
181 "br.ret" instruction that lowers the privilege level, a trap will
216 breakpoint that triggers at any privilege level other than
222 syscall_via_break(), with privilege level 3. Note: the
228 taken _after_ restoring the privilege level, the CPU has already
241 syscall_via_break(), with privilege level 3.
/Linux-v5.4/Documentation/devicetree/bindings/interrupt-controller/
Dsifive,plic-1.0.0.txt9 A hart context is a privilege mode in a hardware execution thread. For example,
11 privilege modes per hart; machine mode and supervisor mode.
/Linux-v5.4/Documentation/userspace-api/
Dno_new_privs.rst26 promises not to grant the privilege to do anything that could not have
41 Note that ``no_new_privs`` does not prevent privilege changes that do not
Dspec_ctrl.rst7 privilege domains.
/Linux-v5.4/arch/arm/kernel/
Dhw_breakpoint.c567 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info()
569 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info()
670 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
/Linux-v5.4/include/uapi/linux/
Dipmi.h104 unsigned char privilege; member
/Linux-v5.4/Documentation/driver-api/firmware/
Dother_interfaces.rst18 Some features of the Intel Stratix10 SoC require a level of privilege
/Linux-v5.4/Documentation/devicetree/bindings/arm/firmware/
Dsdei.txt11 privilege level of the SDEI firmware (specified as part of the binding
/Linux-v5.4/Documentation/parisc/
Dregisters.rst70 H (Higher-privilege trap) 0
71 L (Lower-privilege trap) 0
/Linux-v5.4/tools/perf/Documentation/
Dperf-top.txt235 The privilege levels may be omitted, in which case, the privilege levels of the associated
236 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
Dperf-record.txt372 The privilege levels may be omitted, in which case, the privilege levels of the associated
373 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
/Linux-v5.4/tools/testing/selftests/ftrace/
DREADME31 * Take care with side effects as the tests are run with root privilege.
/Linux-v5.4/Documentation/admin-guide/sysctl/
Dfs.rst225 is to cross privilege boundaries when following a given hardlink (i.e. a
261 is to cross privilege boundaries when following a given symlink (i.e. a
283 privilege levels or is execute only will not be dumped.
/Linux-v5.4/Documentation/admin-guide/
Dsecurity-bugs.rst62 Fixes for sensitive bugs, such as those that might lead to privilege
/Linux-v5.4/Documentation/powerpc/
Dultravisor.rst68 * The privilege of a process is now determined by three MSR bits,
70 from least privilege to highest privilege. The higher privilege
71 modes can access all the resources of the lower privilege modes.
/Linux-v5.4/Documentation/admin-guide/LSM/
DSmack.rst427 policy is said to have privilege. As of this writing a task can
428 have privilege either by possessing capabilities or by having an
614 only be changed by a process with privilege.
779 privilege.
793 program has appropriate privilege::
798 packets will be checked if the program has appropriate privilege.
DSafeSetID.rst72 initial system user namespace, affectively preventing privilege escalation.
/Linux-v5.4/Documentation/devicetree/bindings/c6x/
Ddscr.txt97 Offset and default value for register used to set access privilege for
/Linux-v5.4/Documentation/security/
Dcredentials.rst238 * UNIX exec privilege escalation bits (SUID/SGID);
239 * File capabilities exec privilege escalation bits.
243 privilege escalation bits come into play, and may allow the resulting process
/Linux-v5.4/Documentation/virt/kvm/devices/
Dxive.txt34 a view with a different privilege. The first page is for the
/Linux-v5.4/tools/perf/
Ddesign.txt244 has sufficient privilege to do so)
261 all events on CPU-x. Per CPU counters need CAP_SYS_ADMIN privilege.

12