| /linux/arch/powerpc/boot/dts/ |
| H A D | microwatt.dts | 46 usable-privilege = <6>; 52 usable-privilege = <7>; 59 usable-privilege = <6>; 65 usable-privilege = <7>; 70 usable-privilege = <2>; 78 usable-privilege = <7>; 87 usable-privilege = <7>; 96 usable-privilege = <7>; 104 usable-privilege = <7>; 109 usable-privilege = <7>;
|
| /linux/Documentation/devicetree/bindings/powerpc/ |
| H A D | ibm,powerpc-cpu-features.txt | 13 enablement, privilege, and compatibility metadata. 94 - usable-privilege 104 This property describes the privilege levels and/or software components 118 This property describes the HV privilege support required to enable the 119 feature to lesser privilege levels. If the property does not exist then no 137 This property describes the OS privilege support required to enable the 138 feature to lesser privilege levels. If the property does not exist then no 179 This property may exist when the usable-privilege property value has PR bit set. 213 usable-privilege = <1 | 2 | 4>; 219 usable-privilege = <1 | 2>; [all …]
|
| /linux/arch/arm64/include/asm/ |
| H A D | hw_breakpoint.h | 17 privilege : 2, member 35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg() 49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
| /linux/arch/arm64/kernel/ |
| H A D | hw_breakpoint.c | 142 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument 144 switch (privilege) { in debug_exception_level() 150 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 231 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 498 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 571 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse() 584 int i, max_slots, privilege; in toggle_bp_registers() local 605 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers() 606 if (debug_exception_level(privilege) != el) in toggle_bp_registers() [all …]
|
| /linux/arch/arm/include/asm/ |
| H A D | hw_breakpoint.h | 17 privilege : 2, 31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
| /linux/Documentation/gpu/nova/core/ |
| H A D | devinit.rst | 57 The initialization process involves careful privilege management. For example, before 58 accessing certain completion status registers, the driver must check privilege level 60 privilege level to allow CPU (LS/low-secure) access. This is the case, for example,
|
| H A D | fwsec.rst | 27 (see falcon.rst for privilege levels).
|
| /linux/arch/arm/kernel/ |
| H A D | hw_breakpoint.c | 571 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 573 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 674 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step() 724 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
|
| /linux/Documentation/userspace-api/ |
| H A D | no_new_privs.rst | 26 promises not to grant the privilege to do anything that could not have 41 Note that ``no_new_privs`` does not prevent privilege changes that do not
|
| H A D | spec_ctrl.rst | 7 privilege domains.
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | credentials.rst | 202 * UNIX exec privilege escalation bits (SUID/SGID); 203 * File capabilities exec privilege escalation bits.
|
| /linux/include/uapi/linux/ |
| H A D | ipmi.h | 118 unsigned char privilege; member
|
| /linux/Documentation/driver-api/firmware/ |
| H A D | other_interfaces.rst | 24 Some features of the Intel Stratix10 SoC require a level of privilege
|
| /linux/Documentation/arch/parisc/ |
| H A D | registers.rst | 70 H (Higher-privilege trap) 0 71 L (Lower-privilege trap) 0
|
| /linux/Documentation/devicetree/bindings/arm/firmware/ |
| H A D | sdei.txt | 11 privilege level of the SDEI firmware (specified as part of the binding
|
| /linux/drivers/perf/ |
| H A D | Kconfig | 105 full perf feature support i.e. counter overflow, privilege mode 242 branch types and privilege based filtering. It captures additional 244 type, branch privilege level etc.
|
| /linux/Documentation/ABI/testing/ |
| H A D | configfs-tsm-report | 83 different privilege levels, like SEV-SNP "VMPL", specify the 84 privilege level via this attribute. The minimum acceptable
|
| /linux/tools/testing/selftests/ftrace/ |
| H A D | README | 31 * Take care with side effects as the tests are run with root privilege.
|
| /linux/tools/perf/Documentation/ |
| H A D | perf-top.txt | 254 The privilege levels may be omitted, in which case, the privilege levels of the associated 255 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
| H A D | perf-arm-spe.txt | 148 … - collect physical address (as well as VA) of loads/stores (PMSCR.PA) - requires privilege 149 …1 - collect physical timestamp instead of virtual timestamp (PMSCR.PCT) - requires privilege 290 Root privilege is required to collect context packets. But these only increase the accuracy of
|
| /linux/Documentation/security/ |
| H A D | credentials.rst | 238 * UNIX exec privilege escalation bits (SUID/SGID); 239 * File capabilities exec privilege escalation bits. 243 privilege escalation bits come into play, and may allow the resulting process 545 To avoid "confused deputy" privilege escalation attacks, access control checks
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | gather_data_sampling.rst | 39 lower-privilege contexts like guests and when running outside SGX enclaves.
|
| /linux/Documentation/arch/x86/x86_64/ |
| H A D | fred.rst | 11 privilege level (ring transitions). The FRED architecture was
|
| /linux/Documentation/arch/powerpc/ |
| H A D | ultravisor.rst | 68 * The privilege of a process is now determined by three MSR bits, 70 from least privilege to highest privilege. The higher privilege 71 modes can access all the resources of the lower privilege modes.
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 427 policy is said to have privilege. As of this writing a task can 428 have privilege either by possessing capabilities or by having an 619 only be changed by a process with privilege. 789 privilege. 803 program has appropriate privilege:: 808 packets will be checked if the program has appropriate privilege.
|