Home
last modified time | relevance | path

Searched full:privilege (Results 1 – 25 of 211) sorted by relevance

123456789

/linux/Documentation/devicetree/bindings/powerpc/
H A Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
138 feature to lesser privilege levels. If the property does not exist then no
179 This property may exist when the usable-privilege property value has PR bit set.
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
[all …]
/linux/arch/powerpc/boot/dts/
H A Dmicrowatt.dts46 usable-privilege = <6>;
52 usable-privilege = <7>;
59 usable-privilege = <6>;
65 usable-privilege = <7>;
70 usable-privilege = <2>;
78 usable-privilege = <7>;
87 usable-privilege = <7>;
96 usable-privilege = <7>;
104 usable-privilege = <7>;
109 usable-privilege = <7>;
/linux/arch/arm64/include/asm/
H A Dhw_breakpoint.h17 privilege : 2, member
27 /* Privilege Levels */
35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux/arch/arm64/kernel/
H A Dhw_breakpoint.c139 * Convert a breakpoint privilege level to the corresponding exception
142 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
144 switch (privilege) { in debug_exception_level()
150 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
231 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
491 * Privilege in arch_build_bp_info()
496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
498 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
571 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
584 int i, max_slots, privilege; in toggle_bp_registers() local
[all …]
/linux/arch/arm/include/asm/
H A Dhw_breakpoint.h17 privilege : 2,
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
68 /* Privilege Levels */
/linux/arch/sparc/include/uapi/asm/
H A Dpsr.h7 * PSTATE.PRIV for the current CPU privilege level.
24 #define PSR_PS 0x00000040 /* previous privilege level */
25 #define PSR_S 0x00000080 /* current privilege level */
H A Dpsrcompat.h10 #define PSR_PS 0x00000040 /* previous privilege level */
11 #define PSR_S 0x00000080 /* current privilege level */
/linux/arch/x86/include/asm/
H A Dsegment.h31 * privilege level
36 * When running on Xen PV, the actual privilege level of the kernel is 1,
37 * not 0. Testing the Requested Privilege Level in a segment selector to
39 * SEGMENT_RPL_MASK is wrong because the PV kernel's privilege level
43 * kernels because privilege level 2 is never used.
47 /* User mode is privilege level 3: */
/linux/Documentation/gpu/nova/core/
H A Ddevinit.rst57 The initialization process involves careful privilege management. For example, before
58 accessing certain completion status registers, the driver must check privilege level
60 privilege level to allow CPU (LS/low-secure) access. This is the case, for example,
/linux/include/linux/
H A Dtsm.h14 * Privilege level is a nested permission concept to allow confidential
21 * @privlevel: optional privilege level to associate with @outblob
61 * @TSM_REPORT_PRIVLEVEL: index of the desired privilege level attribute
/linux/Documentation/userspace-api/
H A Dno_new_privs.rst26 promises not to grant the privilege to do anything that could not have
41 Note that ``no_new_privs`` does not prevent privilege changes that do not
/linux/Documentation/devicetree/bindings/bus/
H A Dst,stm32mp25-rifsc.yaml21 any security domains (secure, privilege, compartment).
30 security domains (secure, privilege, compartment).
/linux/drivers/perf/
H A DKconfig105 full perf feature support i.e. counter overflow, privilege mode
242 branch types and privilege based filtering. It captures additional
244 type, branch privilege level etc.
H A Darm_brbe.c368 * BRBE supports the following privilege mode filters while generating
408 * captured, irrespective of the perf event's privilege. in branch_type_to_brbcr()
409 * If the perf event does not have enough privilege for in branch_type_to_brbcr()
592 pr_warn_once("%d - unknown branch privilege captured\n", brbe_el); in brbinf_get_perf_priv()
641 * Branch privilege level is available for target only and complete in perf_entry_from_brbe_regset()
/linux/tools/testing/selftests/powerpc/dscr/
H A Ddscr_explicit_test.c7 * privilege state SPR and the problem state SPR for this purpose.
9 * When using the privilege state SPR, the instructions such as
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst425 Privilege:
427 policy is said to have privilege. As of this writing a task can
428 have privilege either by possessing capabilities or by having an
619 only be changed by a process with privilege.
621 Privilege section in Smack Basics
789 privilege.
803 program has appropriate privilege::
808 packets will be checked if the program has appropriate privilege.
/linux/Documentation/devicetree/bindings/interrupt-controller/
H A Dsifive,plic-1.0.0.yaml17 A hart context is a privilege mode in a hardware execution thread. For example,
19 privilege modes per hart; machine mode and supervisor mode.
/linux/Documentation/arch/powerpc/
H A Dultravisor.rst26 | Privilege States |
68 * The privilege of a process is now determined by three MSR bits,
70 from least privilege to highest privilege. The higher privilege
71 modes can access all the resources of the lower privilege modes.
76 | S | HV| PR|Privilege |
90 | S | HV| PR|Privilege |
/linux/Documentation/ABI/testing/
H A Dconfigfs-tsm-report83 different privilege levels, like SEV-SNP "VMPL", specify the
84 privilege level via this attribute. The minimum acceptable
/linux/Documentation/filesystems/fuse/
H A Dfuse-passthrough.rst49 Privilege Requirements
130 file descriptors, starting with a higher privilege requirement (like
/linux/include/linux/sched/
H A Dcoredump.h28 * that are using this for checking for privilege transitions, it must
/linux/Documentation/translations/zh_CN/security/
H A Dcredentials.rst202 * UNIX exec privilege escalation bits (SUID/SGID);
203 * File capabilities exec privilege escalation bits.
/linux/tools/perf/arch/x86/util/
H A Devsel.c176 return scnprintf(msg, size, "AMD IBS doesn't support privilege filtering. Try " in amd_evsel__open_strerror()
177 "again without the privilege modifiers (like 'k') at the end."); in amd_evsel__open_strerror()
/linux/Documentation/devicetree/bindings/arm/firmware/
H A Dsdei.txt11 privilege level of the SDEI firmware (specified as part of the binding
/linux/tools/testing/selftests/tty/
H A Dtty_tiocsti_test.c53 * 4. Result: Effective privilege escalation via file descriptor passing
336 /* Prevent privilege regain */ in drop_all_privs()
339 /* Verify privilege drop */ in drop_all_privs()
456 /* Handle privilege dropping */ in run_fdpass_tiocsti_test()

123456789