Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 32 of 32) sorted by relevance

/linux-4.4.14/arch/arm64/kernel/
Dhw_breakpoint.c148 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
150 switch (privilege) { in debug_exception_level()
156 pr_warning("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
236 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
462 info->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
464 info->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
532 if (info->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in arch_validate_hwbkpt_settings()
545 int i, max_slots, privilege; in toggle_bp_registers() local
566 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers()
567 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
/linux-4.4.14/arch/arm64/include/asm/
Dhw_breakpoint.h28 privilege : 2, member
40 return (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux-4.4.14/arch/arm/include/asm/
Dhw_breakpoint.h16 privilege : 2,
30 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
38 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux-4.4.14/Documentation/ia64/
Dfsys.txt34 - execution is at privilege level 0 (most-privileged)
51 privilege level is at level 0, this means that fsys-mode requires some
57 Linux operates in fsys-mode when (a) the privilege level is 0 (most
69 to by "regs" was executing in user mode (privilege level 3).
168 is exited. This is accomplished with the help of the lower-privilege
172 "br.ret" instruction that lowers the privilege level, a trap will
205 breakpoint that triggers at any privilege level other than 3 (user-mode).
210 syscall_via_break(), with privilege level 3. Note: the
216 taken _after_ restoring the privilege level, the CPU has already
229 syscall_via_break(), with privilege level 3.
/linux-4.4.14/Documentation/prctl/
Dno_new_privs.txt22 promises not to grant the privilege to do anything that could not have
35 Note that no_new_privs does not prevent privilege changes that do not
/linux-4.4.14/arch/arm/kernel/
Dhw_breakpoint.c578 info->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info()
580 info->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info()
678 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
/linux-4.4.14/include/uapi/linux/
Dipmi.h123 unsigned char privilege; member
/linux-4.4.14/tools/perf/Documentation/
Dperf-top.txt226 The privilege levels may be omitted, in which case, the privilege levels of the associated
227 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
Dperf-record.txt255 The privilege levels may be omitted, in which case, the privilege levels of the associated
256 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
/linux-4.4.14/Documentation/parisc/
Dregisters56 H (Higher-privilege trap) 0
57 L (Lower-privilege trap) 0
/linux-4.4.14/tools/testing/selftests/ftrace/
DREADME31 * Take care with side effects as the tests are run with root privilege.
/linux-4.4.14/Documentation/sysctl/
Dfs.txt190 is to cross privilege boundaries when following a given hardlink (i.e. a
210 is to cross privilege boundaries when following a given symlink (i.e. a
231 privilege levels or is execute only will not be dumped.
/linux-4.4.14/Documentation/devicetree/bindings/arm/
Dpsci.txt11 Functions are invoked by trapping to the privilege level of the PSCI
/linux-4.4.14/Documentation/security/
DSmack.txt358 policy is said to have privilege. As of this writing a task can
359 have privilege either by possessing capabilities or by having an
533 only be changed by a process with privilege.
683 privilege.
696 program has appropriate privilege.
701 packets will be checked if the program has appropriate privilege.
Dcredentials.txt263 (*) UNIX exec privilege escalation bits (SUID/SGID);
265 (*) File capabilities exec privilege escalation bits.
269 privilege escalation bits come into play, and may allow the resulting process
/linux-4.4.14/Documentation/devicetree/bindings/c6x/
Ddscr.txt97 Offset and default value for register used to set access privilege for
/linux-4.4.14/tools/perf/
Ddesign.txt240 has sufficient privilege to do so)
257 all events on CPU-x. Per CPU counters need CAP_SYS_ADMIN privilege.
/linux-4.4.14/scripts/
Dspelling.txt747 privilage||privilege
748 priviledge||privilege
/linux-4.4.14/Documentation/metag/
Dkernel-ABI.txt40 Global registers are shared between threads and are privilege protected.
/linux-4.4.14/Documentation/
Dintel_txt.txt206 because it operates at a higher privilege level in the system than
Dkernel-parameters.txt2468 only way then for a file to be executed with privilege
/linux-4.4.14/Documentation/filesystems/
Dfuse.txt299 privilege to send signal to the process accessing the
/linux-4.4.14/drivers/net/ethernet/emulex/benet/
Dbe_cmds.c2952 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege, in be_cmd_get_fn_privileges() argument
2980 *privilege = le32_to_cpu(resp->privilege_mask); in be_cmd_get_fn_privileges()
2987 *privilege = MAX_PRIVILEGES; in be_cmd_get_fn_privileges()
Dbe_cmds.h2361 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege,
/linux-4.4.14/Documentation/vm/
Dhugetlbpage.txt65 pool, a user with appropriate privilege can use either the mmap system call
/linux-4.4.14/Documentation/arm64/
Dacpi_object_usage.txt542 since there could be interrupts at higher privilege levels or even interrupts
/linux-4.4.14/drivers/char/ipmi/
Dipmi_msghandler.c3234 lan_addr.privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_rsp()
3340 lan_addr->privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_cmd()
/linux-4.4.14/Documentation/ioctl/
Dhdio.txt571 EACCES CAP_SYS_ADMIN or CAP_SYS_RAWIO privilege not set.
/linux-4.4.14/Documentation/powerpc/
Dhvcs.txt420 may be best to create a special hvcs group privilege for providing
/linux-4.4.14/Documentation/cgroups/
Dunified-hierarchy.txt607 controller-specific knobs - will require an explicit CAP privilege.
/linux-4.4.14/Documentation/virtual/kvm/
Dapi.txt3414 It also sets the guest privilege level to "supervisor" mode. Usually the guest
3415 runs in "hypervisor" privilege mode with a few missing features.
/linux-4.4.14/arch/arm/
DKconfig1697 use-after-free bugs becoming an exploitable privilege escalation