/linux-4.1.27/arch/arm64/include/asm/ |
D | hw_breakpoint.h | 25 privilege : 2, member 37 return (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 46 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/linux-4.1.27/arch/arm64/kernel/ |
D | hw_breakpoint.c | 160 static enum debug_el debug_exception_level(int privilege) in debug_exception_level() argument 162 switch (privilege) { in debug_exception_level() 168 pr_warning("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 234 enum debug_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 460 info->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 462 info->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 530 if (info->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in arch_validate_hwbkpt_settings() 543 int i, max_slots, privilege; in toggle_bp_registers() local 564 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers() 565 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
|
/linux-4.1.27/arch/arm/include/asm/ |
D | hw_breakpoint.h | 16 privilege : 2, 30 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 38 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/linux-4.1.27/Documentation/ia64/ |
D | fsys.txt | 34 - execution is at privilege level 0 (most-privileged) 51 privilege level is at level 0, this means that fsys-mode requires some 57 Linux operates in fsys-mode when (a) the privilege level is 0 (most 69 to by "regs" was executing in user mode (privilege level 3). 168 is exited. This is accomplished with the help of the lower-privilege 172 "br.ret" instruction that lowers the privilege level, a trap will 205 breakpoint that triggers at any privilege level other than 3 (user-mode). 210 syscall_via_break(), with privilege level 3. Note: the 216 taken _after_ restoring the privilege level, the CPU has already 229 syscall_via_break(), with privilege level 3.
|
/linux-4.1.27/Documentation/prctl/ |
D | no_new_privs.txt | 22 promises not to grant the privilege to do anything that could not have 35 Note that no_new_privs does not prevent privilege changes that do not
|
/linux-4.1.27/arch/arm/kernel/ |
D | hw_breakpoint.c | 579 info->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 581 info->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 679 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
|
/linux-4.1.27/include/uapi/linux/ |
D | ipmi.h | 123 unsigned char privilege; member
|
/linux-4.1.27/Documentation/parisc/ |
D | registers | 56 H (Higher-privilege trap) 0 57 L (Lower-privilege trap) 0
|
/linux-4.1.27/tools/perf/Documentation/ |
D | perf-record.txt | 218 The privilege levels may be omitted, in which case, the privilege levels of the associated 219 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
/linux-4.1.27/tools/testing/selftests/ftrace/ |
D | README | 31 * Take care with side effects as the tests are run with root privilege.
|
/linux-4.1.27/Documentation/devicetree/bindings/arm/ |
D | psci.txt | 11 Functions are invoked by trapping to the privilege level of the PSCI
|
/linux-4.1.27/Documentation/sysctl/ |
D | fs.txt | 167 is to cross privilege boundaries when following a given hardlink (i.e. a 187 is to cross privilege boundaries when following a given symlink (i.e. a 208 privilege levels or is execute only will not be dumped.
|
/linux-4.1.27/Documentation/security/ |
D | Smack.txt | 323 policy is said to have privilege. As of this writing a task can 324 have privilege either by possessing capabilities or by having an 498 only be changed by a process with privilege. 648 privilege. 661 program has appropriate privilege. 666 packets will be checked if the program has appropriate privilege.
|
D | credentials.txt | 263 (*) UNIX exec privilege escalation bits (SUID/SGID); 265 (*) File capabilities exec privilege escalation bits. 269 privilege escalation bits come into play, and may allow the resulting process
|
/linux-4.1.27/Documentation/devicetree/bindings/c6x/ |
D | dscr.txt | 97 Offset and default value for register used to set access privilege for
|
/linux-4.1.27/scripts/ |
D | spelling.txt | 726 privilage||privilege 727 priviledge||privilege
|
/linux-4.1.27/tools/perf/ |
D | design.txt | 240 has sufficient privilege to do so) 257 all events on CPU-x. Per CPU counters need CAP_SYS_ADMIN privilege.
|
/linux-4.1.27/Documentation/metag/ |
D | kernel-ABI.txt | 40 Global registers are shared between threads and are privilege protected.
|
/linux-4.1.27/Documentation/ |
D | intel_txt.txt | 206 because it operates at a higher privilege level in the system than
|
D | kernel-parameters.txt | 2391 only way then for a file to be executed with privilege
|
/linux-4.1.27/Documentation/filesystems/ |
D | fuse.txt | 299 privilege to send signal to the process accessing the
|
/linux-4.1.27/drivers/net/ethernet/emulex/benet/ |
D | be_cmds.c | 2885 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege, in be_cmd_get_fn_privileges() argument 2913 *privilege = le32_to_cpu(resp->privilege_mask); in be_cmd_get_fn_privileges() 2920 *privilege = MAX_PRIVILEGES; in be_cmd_get_fn_privileges()
|
D | be_cmds.h | 2323 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege,
|
/linux-4.1.27/Documentation/vm/ |
D | hugetlbpage.txt | 65 pool, a user with appropriate privilege can use either the mmap system call
|
/linux-4.1.27/Documentation/arm64/ |
D | acpi_object_usage.txt | 542 since there could be interrupts at higher privilege levels or even interrupts
|
/linux-4.1.27/drivers/char/ipmi/ |
D | ipmi_msghandler.c | 3228 lan_addr.privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_rsp() 3334 lan_addr->privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_cmd()
|
/linux-4.1.27/Documentation/ioctl/ |
D | hdio.txt | 571 EACCES CAP_SYS_ADMIN or CAP_SYS_RAWIO privilege not set.
|
/linux-4.1.27/Documentation/cgroups/ |
D | unified-hierarchy.txt | 421 controller-specific knobs - will require an explicit CAP privilege.
|
/linux-4.1.27/Documentation/powerpc/ |
D | hvcs.txt | 420 may be best to create a special hvcs group privilege for providing
|
/linux-4.1.27/Documentation/virtual/kvm/ |
D | api.txt | 3339 It also sets the guest privilege level to "supervisor" mode. Usually the guest 3340 runs in "hypervisor" privilege mode with a few missing features.
|