/linux-4.4.14/arch/arm64/kernel/ |
D | hw_breakpoint.c | 148 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument 150 switch (privilege) { in debug_exception_level() 156 pr_warning("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 236 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 462 info->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 464 info->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 532 if (info->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in arch_validate_hwbkpt_settings() 545 int i, max_slots, privilege; in toggle_bp_registers() local 566 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers() 567 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
|
/linux-4.4.14/arch/arm64/include/asm/ |
D | hw_breakpoint.h | 28 privilege : 2, member 40 return (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/linux-4.4.14/arch/arm/include/asm/ |
D | hw_breakpoint.h | 16 privilege : 2, 30 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 38 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/linux-4.4.14/Documentation/ia64/ |
D | fsys.txt | 34 - execution is at privilege level 0 (most-privileged) 51 privilege level is at level 0, this means that fsys-mode requires some 57 Linux operates in fsys-mode when (a) the privilege level is 0 (most 69 to by "regs" was executing in user mode (privilege level 3). 168 is exited. This is accomplished with the help of the lower-privilege 172 "br.ret" instruction that lowers the privilege level, a trap will 205 breakpoint that triggers at any privilege level other than 3 (user-mode). 210 syscall_via_break(), with privilege level 3. Note: the 216 taken _after_ restoring the privilege level, the CPU has already 229 syscall_via_break(), with privilege level 3.
|
/linux-4.4.14/Documentation/prctl/ |
D | no_new_privs.txt | 22 promises not to grant the privilege to do anything that could not have 35 Note that no_new_privs does not prevent privilege changes that do not
|
/linux-4.4.14/arch/arm/kernel/ |
D | hw_breakpoint.c | 578 info->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 580 info->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 678 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
|
/linux-4.4.14/include/uapi/linux/ |
D | ipmi.h | 123 unsigned char privilege; member
|
/linux-4.4.14/tools/perf/Documentation/ |
D | perf-top.txt | 226 The privilege levels may be omitted, in which case, the privilege levels of the associated 227 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
D | perf-record.txt | 255 The privilege levels may be omitted, in which case, the privilege levels of the associated 256 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
/linux-4.4.14/Documentation/parisc/ |
D | registers | 56 H (Higher-privilege trap) 0 57 L (Lower-privilege trap) 0
|
/linux-4.4.14/tools/testing/selftests/ftrace/ |
D | README | 31 * Take care with side effects as the tests are run with root privilege.
|
/linux-4.4.14/Documentation/sysctl/ |
D | fs.txt | 190 is to cross privilege boundaries when following a given hardlink (i.e. a 210 is to cross privilege boundaries when following a given symlink (i.e. a 231 privilege levels or is execute only will not be dumped.
|
/linux-4.4.14/Documentation/devicetree/bindings/arm/ |
D | psci.txt | 11 Functions are invoked by trapping to the privilege level of the PSCI
|
/linux-4.4.14/Documentation/security/ |
D | Smack.txt | 358 policy is said to have privilege. As of this writing a task can 359 have privilege either by possessing capabilities or by having an 533 only be changed by a process with privilege. 683 privilege. 696 program has appropriate privilege. 701 packets will be checked if the program has appropriate privilege.
|
D | credentials.txt | 263 (*) UNIX exec privilege escalation bits (SUID/SGID); 265 (*) File capabilities exec privilege escalation bits. 269 privilege escalation bits come into play, and may allow the resulting process
|
/linux-4.4.14/Documentation/devicetree/bindings/c6x/ |
D | dscr.txt | 97 Offset and default value for register used to set access privilege for
|
/linux-4.4.14/tools/perf/ |
D | design.txt | 240 has sufficient privilege to do so) 257 all events on CPU-x. Per CPU counters need CAP_SYS_ADMIN privilege.
|
/linux-4.4.14/scripts/ |
D | spelling.txt | 747 privilage||privilege 748 priviledge||privilege
|
/linux-4.4.14/Documentation/metag/ |
D | kernel-ABI.txt | 40 Global registers are shared between threads and are privilege protected.
|
/linux-4.4.14/Documentation/ |
D | intel_txt.txt | 206 because it operates at a higher privilege level in the system than
|
D | kernel-parameters.txt | 2468 only way then for a file to be executed with privilege
|
/linux-4.4.14/Documentation/filesystems/ |
D | fuse.txt | 299 privilege to send signal to the process accessing the
|
/linux-4.4.14/drivers/net/ethernet/emulex/benet/ |
D | be_cmds.c | 2952 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege, in be_cmd_get_fn_privileges() argument 2980 *privilege = le32_to_cpu(resp->privilege_mask); in be_cmd_get_fn_privileges() 2987 *privilege = MAX_PRIVILEGES; in be_cmd_get_fn_privileges()
|
D | be_cmds.h | 2361 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege,
|
/linux-4.4.14/Documentation/vm/ |
D | hugetlbpage.txt | 65 pool, a user with appropriate privilege can use either the mmap system call
|
/linux-4.4.14/Documentation/arm64/ |
D | acpi_object_usage.txt | 542 since there could be interrupts at higher privilege levels or even interrupts
|
/linux-4.4.14/drivers/char/ipmi/ |
D | ipmi_msghandler.c | 3234 lan_addr.privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_rsp() 3340 lan_addr->privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_cmd()
|
/linux-4.4.14/Documentation/ioctl/ |
D | hdio.txt | 571 EACCES CAP_SYS_ADMIN or CAP_SYS_RAWIO privilege not set.
|
/linux-4.4.14/Documentation/powerpc/ |
D | hvcs.txt | 420 may be best to create a special hvcs group privilege for providing
|
/linux-4.4.14/Documentation/cgroups/ |
D | unified-hierarchy.txt | 607 controller-specific knobs - will require an explicit CAP privilege.
|
/linux-4.4.14/Documentation/virtual/kvm/ |
D | api.txt | 3414 It also sets the guest privilege level to "supervisor" mode. Usually the guest 3415 runs in "hypervisor" privilege mode with a few missing features.
|
/linux-4.4.14/arch/arm/ |
D | Kconfig | 1697 use-after-free bugs becoming an exploitable privilege escalation
|