Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 30 of 30) sorted by relevance

/linux-4.1.27/arch/arm64/include/asm/
Dhw_breakpoint.h25 privilege : 2, member
37 return (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
46 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux-4.1.27/arch/arm64/kernel/
Dhw_breakpoint.c160 static enum debug_el debug_exception_level(int privilege) in debug_exception_level() argument
162 switch (privilege) { in debug_exception_level()
168 pr_warning("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
234 enum debug_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
460 info->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
462 info->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
530 if (info->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in arch_validate_hwbkpt_settings()
543 int i, max_slots, privilege; in toggle_bp_registers() local
564 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers()
565 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
/linux-4.1.27/arch/arm/include/asm/
Dhw_breakpoint.h16 privilege : 2,
30 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
38 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux-4.1.27/Documentation/ia64/
Dfsys.txt34 - execution is at privilege level 0 (most-privileged)
51 privilege level is at level 0, this means that fsys-mode requires some
57 Linux operates in fsys-mode when (a) the privilege level is 0 (most
69 to by "regs" was executing in user mode (privilege level 3).
168 is exited. This is accomplished with the help of the lower-privilege
172 "br.ret" instruction that lowers the privilege level, a trap will
205 breakpoint that triggers at any privilege level other than 3 (user-mode).
210 syscall_via_break(), with privilege level 3. Note: the
216 taken _after_ restoring the privilege level, the CPU has already
229 syscall_via_break(), with privilege level 3.
/linux-4.1.27/Documentation/prctl/
Dno_new_privs.txt22 promises not to grant the privilege to do anything that could not have
35 Note that no_new_privs does not prevent privilege changes that do not
/linux-4.1.27/arch/arm/kernel/
Dhw_breakpoint.c579 info->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info()
581 info->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info()
679 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
/linux-4.1.27/include/uapi/linux/
Dipmi.h123 unsigned char privilege; member
/linux-4.1.27/Documentation/parisc/
Dregisters56 H (Higher-privilege trap) 0
57 L (Lower-privilege trap) 0
/linux-4.1.27/tools/perf/Documentation/
Dperf-record.txt218 The privilege levels may be omitted, in which case, the privilege levels of the associated
219 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
/linux-4.1.27/tools/testing/selftests/ftrace/
DREADME31 * Take care with side effects as the tests are run with root privilege.
/linux-4.1.27/Documentation/devicetree/bindings/arm/
Dpsci.txt11 Functions are invoked by trapping to the privilege level of the PSCI
/linux-4.1.27/Documentation/sysctl/
Dfs.txt167 is to cross privilege boundaries when following a given hardlink (i.e. a
187 is to cross privilege boundaries when following a given symlink (i.e. a
208 privilege levels or is execute only will not be dumped.
/linux-4.1.27/Documentation/security/
DSmack.txt323 policy is said to have privilege. As of this writing a task can
324 have privilege either by possessing capabilities or by having an
498 only be changed by a process with privilege.
648 privilege.
661 program has appropriate privilege.
666 packets will be checked if the program has appropriate privilege.
Dcredentials.txt263 (*) UNIX exec privilege escalation bits (SUID/SGID);
265 (*) File capabilities exec privilege escalation bits.
269 privilege escalation bits come into play, and may allow the resulting process
/linux-4.1.27/Documentation/devicetree/bindings/c6x/
Ddscr.txt97 Offset and default value for register used to set access privilege for
/linux-4.1.27/scripts/
Dspelling.txt726 privilage||privilege
727 priviledge||privilege
/linux-4.1.27/tools/perf/
Ddesign.txt240 has sufficient privilege to do so)
257 all events on CPU-x. Per CPU counters need CAP_SYS_ADMIN privilege.
/linux-4.1.27/Documentation/metag/
Dkernel-ABI.txt40 Global registers are shared between threads and are privilege protected.
/linux-4.1.27/Documentation/
Dintel_txt.txt206 because it operates at a higher privilege level in the system than
Dkernel-parameters.txt2391 only way then for a file to be executed with privilege
/linux-4.1.27/Documentation/filesystems/
Dfuse.txt299 privilege to send signal to the process accessing the
/linux-4.1.27/drivers/net/ethernet/emulex/benet/
Dbe_cmds.c2885 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege, in be_cmd_get_fn_privileges() argument
2913 *privilege = le32_to_cpu(resp->privilege_mask); in be_cmd_get_fn_privileges()
2920 *privilege = MAX_PRIVILEGES; in be_cmd_get_fn_privileges()
Dbe_cmds.h2323 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege,
/linux-4.1.27/Documentation/vm/
Dhugetlbpage.txt65 pool, a user with appropriate privilege can use either the mmap system call
/linux-4.1.27/Documentation/arm64/
Dacpi_object_usage.txt542 since there could be interrupts at higher privilege levels or even interrupts
/linux-4.1.27/drivers/char/ipmi/
Dipmi_msghandler.c3228 lan_addr.privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_rsp()
3334 lan_addr->privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_cmd()
/linux-4.1.27/Documentation/ioctl/
Dhdio.txt571 EACCES CAP_SYS_ADMIN or CAP_SYS_RAWIO privilege not set.
/linux-4.1.27/Documentation/cgroups/
Dunified-hierarchy.txt421 controller-specific knobs - will require an explicit CAP privilege.
/linux-4.1.27/Documentation/powerpc/
Dhvcs.txt420 may be best to create a special hvcs group privilege for providing
/linux-4.1.27/Documentation/virtual/kvm/
Dapi.txt3339 It also sets the guest privilege level to "supervisor" mode. Usually the guest
3340 runs in "hypervisor" privilege mode with a few missing features.