Searched refs:privileged (Results 1 - 122 of 122) sorted by relevance

/linux-4.1.27/drivers/infiniband/hw/mthca/
H A Dmthca_pd.c39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) mthca_pd_alloc() argument
43 pd->privileged = privileged; mthca_pd_alloc()
50 if (privileged) { mthca_pd_alloc()
64 if (pd->privileged) mthca_pd_free()
H A Dmthca_provider.h102 int privileged; member in struct:mthca_pd
H A Dmthca_dev.h462 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd);
/linux-4.1.27/arch/avr32/include/asm/
H A Daddrspace.h23 /* Returns the privileged segment base of a given address */
30 * Map an address to a certain privileged segment
/linux-4.1.27/arch/unicore32/kernel/
H A Dptrace.c20 * this routine will get a word off of the processes privileged stack.
22 * this routine assumes that all the privileged stacks are in our
31 * this routine will put a word on the processes privileged stack.
33 * this routine assumes that all the privileged stacks are in our
/linux-4.1.27/arch/sparc/include/asm/
H A Dpcr.h18 #define PCR_PIC_PRIV 0x00000001 /* PIC access is privileged */
44 #define PCR_N4_PICNPT 0x00010000 /* PIC non-privileged trap */
H A Dmxcc.h61 * PRIV: A privileged mode error? 0=no 1=yes
H A Dhypervisor.h509 * placed into a memory region made available by privileged code. Each
576 * Note: This API call is for privileged code to specify temporary translation
733 * permanent mappings may be specified by privileged code. Mappings
739 * privileged code does not expect to receive misses. For example,
1182 * The hypervisor provides a trap tracing capability for privileged
1186 * privileged code. This is provided as a debugging capability for
1187 * privileged code.
1215 unsigned char hpstate; /* Hyper-privileged state */
2745 * The hypervisor maintains MMU statistics and privileged code provides
2900 * to privileged code, instead it is programmed indirectly via this
2909 * The privileged code then proceeds to add entries to the queue and
/linux-4.1.27/arch/sh/include/asm/
H A Daddrspace.h28 /* Returns the privileged segment base of a given address */
33 * Map an address to a certain privileged segment
/linux-4.1.27/arch/mn10300/include/asm/
H A Dexceptions.h42 EXCEP_PRIVINS = 0x000160, /* privileged instruction execution */
51 EXCEP_PRIVINSACC = 0x0001a8, /* privileged space instruction access */
52 EXCEP_PRIVDATACC = 0x0001b0, /* privileged space data access */
H A Dcpu-regs.h151 #define sISR_PRIV 0x00000800 /* privileged instruction execution fault */
162 #define sISR_PRIVA 0x00800000 /* privileged space instruction access excep */
163 #define sISR_PRIDA 0x01000000 /* privileged space data access excep */
/linux-4.1.27/arch/arm/include/asm/
H A Dfirmware.h49 * Restore state of privileged hardware after system-wide suspend.
H A Dbitops.h12 * since they would be too costly. Also, they require privileged
/linux-4.1.27/security/selinux/ss/
H A Dconstraint.h8 * identity or role unless it is in a privileged type.
/linux-4.1.27/arch/x86/include/asm/
H A Dlguest_hcall.h32 * But first, how does our Guest contact the Host to ask for privileged
H A Dparavirt_types.h104 /* hooks for various privileged instructions */
/linux-4.1.27/arch/x86/xen/
H A Dpci-swiotlb-xen.c49 * activate this IOMMU. If running as PV privileged, activate it pci_xen_swiotlb_detect()
H A Denlighten.c6 * - privileged instructions
/linux-4.1.27/arch/sparc/kernel/
H A Dhvtramp.S30 * First setup basic privileged cpu state.
H A Dentry.S428 /* This routine handles illegal instructions and privileged
H A Dhead_32.S356 /* Acquire boot time privileged register values, this will help debugging.
H A Dhead_64.S524 * Make sure we are in privileged mode, have address masking,
H A Dtraps_64.c1703 /* BAD, privileged state is corrupted. */ cheetah_deferred_handler()
2539 if (notify_die(DIE_TRAP, "privileged operation", regs, do_privop()
/linux-4.1.27/arch/metag/tbx/
H A Dtbiroot.S68 MOV D1Re0,TXSTATUS /* Are we privileged or int? */
H A Dtbicore.S65 XOR D0Ar2,D0Ar2,D0Re0 /* Toggle Id PSTAT if privileged */
/linux-4.1.27/include/xen/interface/
H A Devent_channel.h72 * 2. Only a sufficiently-privileged domain may bind to a physical IRQ.
123 * 2. Only a sufficiently-privileged domain may obtain the status of an event
184 * 2. Only a sufficiently-privileged domain may specify other than DOMID_SELF.
H A Dgrant_table.h303 * 2. Only a sufficiently-privileged domain may specify <dom> != DOMID_SELF.
395 * 2. Only a sufficiently-privileged domain may specify <dom> != DOMID_SELF.
454 * 2. Only a sufficiently-privileged domain may specify <dom> != DOMID_SELF.
H A Dxen.h438 * DOMID_XEN is used to allow privileged domains to map restricted parts of
441 * the caller is privileged.
644 #define SIF_PRIVILEGED (1<<0) /* Is the domain privileged? */
/linux-4.1.27/drivers/infiniband/hw/amso1100/
H A Dc2_pd.c43 int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd) c2_pd_alloc() argument
H A Dc2.h506 extern int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd);
/linux-4.1.27/drivers/tty/
H A Drocket.h61 #define ROCKET_USR_MASK 0x0071 /* Legal flags that non-privileged
/linux-4.1.27/arch/mips/kvm/
H A Ddyntrans.c6 * KVM/MIPS: Binary Patching for privileged instructions, reduces traps.
/linux-4.1.27/arch/ia64/kernel/
H A DMakefile100 # Checker for paravirtualizations of privileged operations.
H A Dfsys.S421 * distinguish fsyscall execution from other privileged
H A Dperfmon.c2888 * - system-wide session: PMCx.pm=1 (privileged monitor) pfm_write_pmcs()
/linux-4.1.27/drivers/staging/lustre/lnet/klnds/o2iblnd/
H A Do2iblnd_modparams.c146 MODULE_PARM_DESC(require_privileged_port, "require privileged port when accepting connection");
150 MODULE_PARM_DESC(use_privileged_port, "use privileged port when initiating connection");
H A Do2iblnd.h107 int *kib_require_priv_port;/* accept only privileged ports */
108 int *kib_use_priv_port; /* use privileged port for active connect */
H A Do2iblnd_cb.c1248 /* look for a free privileged port */ kiblnd_resolve_addr()
1266 CERROR("Failed to bind to a free privileged port\n"); kiblnd_resolve_addr()
2211 CERROR("Peer's port (%pI4h:%hu) is not privileged\n", kiblnd_passive_connect()
/linux-4.1.27/include/uapi/asm-generic/
H A Dsiginfo.h184 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */
185 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
/linux-4.1.27/arch/powerpc/include/asm/
H A Dspu_csa.h133 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads.
197 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads.
H A Dspu.h472 /* PV2_ImplRegs: Implementation-specific privileged-state 2 regs */
673 /* PV1_ImplRegs: Implementation-dependent privileged-state 1 regs */
H A Dhvcall.h38 #define H_PRIVILEGE -3 /* Caller not privileged */
/linux-4.1.27/arch/sh/kernel/
H A Dtraps_64.c717 * Otherwise, user mode trying to execute a privileged do_reserved_inst()
722 /* If in privileged mode, return as above. */ do_reserved_inst()
733 /* reserved/privileged control register => trap */ do_reserved_inst()
740 /* reserved/privileged control register => trap */ do_reserved_inst()
H A Dkgdb.c237 * and need privileged instructions to get to. The r15 value we sleeping_thread_to_gdb_regs()
/linux-4.1.27/arch/sh/mm/
H A Dtlbex_64.c105 the fault happened in user mode or privileged mode. */
/linux-4.1.27/arch/microblaze/kernel/cpu/
H A Dcpuinfo-static.c120 ci->mmu_privins = fcpu(cpu, "xlnx,mmu-privileged-instr"); set_cpuinfo_static()
/linux-4.1.27/arch/ia64/include/asm/
H A Dkregs.h117 #define IA64_DCR_PP_BIT 0 /* privileged performance monitor default */
H A Dparavirt_privop.h128 * privileged instructions so the code must be replaced with
/linux-4.1.27/arch/arm/kernel/
H A Dptrace.c159 * this routine will get a word off of the processes privileged stack.
161 * this routine assumes that all the privileged stacks are in our
170 * this routine will put a word on the processes privileged stack.
172 * this routine assumes that all the privileged stacks are in our
/linux-4.1.27/fs/ecryptfs/
H A Dkthread.c161 "aborting privileged request to open lower file\n", ecryptfs_privileged_open()
/linux-4.1.27/security/keys/
H A Dpersistent.c145 * sufficiently privileged. keyctl_get_persistent()
/linux-4.1.27/drivers/misc/genwqe/
H A Dcard_debugfs.c361 /* non privileged interfaces are done here */ genwqe_init_debugfs()
396 /* privileged interfaces follow here */ genwqe_init_debugfs()
H A Dcard_base.h569 * privileged mode, either as true PF or in a virtualized system with
/linux-4.1.27/security/smack/
H A Dsmack.h337 * Is the task privileged and allowed to be privileged
H A Dsmack_lsm.c1629 * Allow a privileged task to get signals even if it shouldn't
/linux-4.1.27/include/linux/lockd/
H A Dlockd.h328 * Ensure incoming requests are from local privileged callers.
330 * Return TRUE if sender is local and is connecting via a privileged port;
/linux-4.1.27/drivers/media/usb/uvc/
H A Duvc_v4l2.c430 * Each open instance of a UVC device can either be in a privileged or
431 * unprivileged state. Only a single instance can be in a privileged state at
446 /* Always succeed if the handle is already privileged. */ uvc_acquire_privileges()
450 /* Check if the device already has a privileged handle. */ uvc_acquire_privileges()
531 /* Only free resources if this is a privileged handle. */ uvc_v4l2_release()
/linux-4.1.27/arch/frv/kernel/
H A Dtraps.c60 * - privileged instruction
397 * - user mode accessing privileged memory region
/linux-4.1.27/arch/s390/kernel/
H A Dtraps.c148 "privileged operation")
/linux-4.1.27/arch/sh/kernel/cpu/sh4a/
H A Dperf_event.c65 * 0x0200 number of elapsed cycles in privileged mode
/linux-4.1.27/arch/ia64/include/asm/native/
H A Dpvchk_inst.h6 * Checker for paravirtualizations of privileged operations.
/linux-4.1.27/arch/m32r/kernel/
H A Dtraps.c276 DO_ERROR_INFO(0x100, SIGILL, "privileged instruction", pie_handler, ILL_PRVOPC, regs->bpc)
/linux-4.1.27/drivers/connector/
H A Dcn_proc.c353 /* Can only change if privileged. */ cn_proc_mcast_ctl()
/linux-4.1.27/include/uapi/linux/
H A Dcapability.h303 /* Allow the privileged aspects of mknod() */
/linux-4.1.27/drivers/gpu/drm/i915/
H A Di915_cmd_parser.c52 * First, commands which are explicitly defined as privileged or which should
61 * Third, commands which access privileged memory (i.e. GGTT, HWS page, etc).
85 * implements a number of checks, including the privileged memory checks, via a
/linux-4.1.27/drivers/staging/lustre/lnet/lnet/
H A Dacceptor.c128 LCONSOLE_ERROR_MSG(0x11d, "No privileged ports available to connect to %s at host %pI4h on port %d\n", lnet_connect_console_error()
/linux-4.1.27/arch/xtensa/include/asm/
H A Dpgtable.h104 * RI ring (0=privileged, 1=user, 2 and 3 are unused)
/linux-4.1.27/kernel/
H A Dcapability.c418 * actually be privileged.
H A Dseccomp.c364 * behavior of privileged children. seccomp_prepare_filter()
/linux-4.1.27/drivers/xen/
H A Dprivcmd.c4 * Interface to privileged domain-0 commands.
/linux-4.1.27/drivers/tty/vt/
H A Dvt_ioctl.c1326 * Send the signal as privileged - kill_pid() will complete_change_console()
1386 * Send the signal as privileged - kill_pid() will change_console()
/linux-4.1.27/fs/
H A Dxattr.c52 * The trusted.* namespace can only be accessed by privileged users. xattr_permission()
63 * privileged users can write attributes. xattr_permission()
H A Dnamei.c764 * in a sticky world-writable directory. This is to protect privileged
/linux-4.1.27/fs/xfs/
H A Dxfs_iops.c620 * Change file ownership. Must be the owner or privileged. xfs_setattr_nonsize()
653 * Change file ownership. Must be the owner or privileged. xfs_setattr_nonsize()
H A Dxfs_ioctl.c139 * as the handle operations are privileged.
1225 * Change file ownership. Must be the owner or privileged. CAP_FSETID xfs_ioctl_setattr()
H A Dxfs_mount.c919 * privileged transactions. This is needed so that transaction xfs_mountfs()
/linux-4.1.27/arch/s390/kvm/
H A Dpriv.c2 * handling privileged instructions
628 * the privileged ones, that we can handle in the kernel. kvm_s390_handle_b2()
/linux-4.1.27/security/
H A Dcommoncap.c622 * who aren't privileged to do so.
649 * aren't privileged to remove them.
/linux-4.1.27/arch/x86/lguest/
H A Dboot.c17 * These Guests know that they cannot do privileged operations, such as disable
419 * the Host won't even notice since it isn't privileged. So we try not to get
1410 * have to override to avoid privileged instructions.
/linux-4.1.27/arch/powerpc/platforms/cell/spufs/
H A Dswitch.c506 * for save/restore is privileged, so the setup_mfc_sr1()
1832 * save regions of the privileged & problem state areas. save_csa()
1997 * restore regions of the privileged & problem state areas. restore_csa()
/linux-4.1.27/drivers/spi/
H A Dspidev.c68 * REVISIT should changing those flags be privileged?
/linux-4.1.27/drivers/char/
H A Dapm-emulation.c370 * privileged operation -- cevans apm_open()
/linux-4.1.27/fs/lockd/
H A Dhost.c202 * @noresvport: 1 if non-privileged port should be used
/linux-4.1.27/net/9p/
H A Dtrans_rdma.c671 /* Bind to a privileged port if we need to */ rdma_create_trans()
/linux-4.1.27/net/sunrpc/xprtrdma/
H A Dtransport.c324 xprt->resvport = 0; /* privileged port not needed */ xprt_setup_rdma()
/linux-4.1.27/arch/powerpc/kvm/
H A Dbook3s_hv_rmhandlers.S210 li r3, 0 /* Don't wake on privileged (OS) doorbell */
2169 lis r3, LPCR_PECEDP@h /* Do wake on privileged doorbell */
2347 cmpwi r6, 5 /* privileged doorbell? */
H A Dbooke.c1097 * In GS mode, hypervisor privileged instructions trap kvmppc_handle_exit()
1200 * hcall from guest userspace -- send privileged kvmppc_handle_exit()
H A Dbook3s_hv.c2597 /* We don't need to emulate any privileged instructions or dcbz */ kvmppc_core_emulate_op_hv()
/linux-4.1.27/arch/metag/include/asm/
H A Dtbx.h89 or access unprivileged areas of memory while at privileged level. */
255 #define TBICTX_PRIV_BIT 0x8000 /* Set if system uses 'privileged' model */
/linux-4.1.27/net/vmw_vsock/
H A Dvmci_transport.c611 /* This handler is privileged when this module is running on the host. vmci_transport_recv_dgram_cb()
728 /* This handler is privileged when this module is running on the host. vmci_transport_recv_stream_cb()
/linux-4.1.27/drivers/net/ethernet/qlogic/qlcnic/
H A Dqlcnic_sysfs.c227 "LED test not supported in non privileged mode\n"); qlcnic_store_beacon()
H A Dqlcnic_83xx_hw.c1583 "LED test is not supported in non-privileged mode\n"); qlcnic_83xx_set_led()
1766 "Loopback test not supported in non privileged mode\n"); qlcnic_83xx_loopback_test()
H A Dqlcnic_83xx_init.c699 * Ensure vNIC mode privileged function starts only after vNIC mode is
/linux-4.1.27/drivers/gpu/drm/r128/
H A Dr128_state.c1577 * privileged clients. r128_cce_indirect()
/linux-4.1.27/arch/microblaze/kernel/
H A Dentry.S478 /* adjust exception address for privileged instruction
/linux-4.1.27/fs/logfs/
H A Dlogfs.h415 * the root user. Non-privileged users can no longer write once
/linux-4.1.27/include/uapi/drm/
H A Di915_drm.h731 /** Request a privileged ("secure") batch buffer. Note only available for
/linux-4.1.27/arch/parisc/kernel/
H A Dsyscall.S105 gate .+8, %r0 /* become privileged */
/linux-4.1.27/net/ipv4/
H A Dping.c409 * We need our own bind because there are no privileged id's == local ports.
/linux-4.1.27/net/ipv6/
H A Dipv6_sockglue.c405 /* hop-by-hop / destination options are privileged option */ do_ipv6_setsockopt()
/linux-4.1.27/drivers/xen/events/
H A Devents_base.c677 /* Only the privileged domain can do this. For non-priv, the pcifront xen_bind_pirq_gsi_to_irq()
/linux-4.1.27/drivers/dma/
H A Dpl330.c304 bool privileged; member in struct:pl330_reqcfg
1349 if (rqc->privileged) _prepare_ccr()
H A Damba-pl08x.c1330 /* Access the cell in privileged mode, non-bufferable, non-cacheable */ pl08x_cctl()
/linux-4.1.27/drivers/s390/char/
H A Dtape_3590.c1443 dev_warn (&device->cdev->dev, "A different host has privileged" tape_3590_unit_check()
/linux-4.1.27/drivers/net/fddi/skfp/
H A Dskfddi.c945 * Perform IOCTL call functions here. Some are privileged operations and the
/linux-4.1.27/drivers/net/ethernet/sfc/
H A Dmcdi_pcol.h1896 /* enum: The function can perform privileged operations */
7843 * function. Only a privileged function may change the port sniffing
7879 * associated with the calling function. Only a privileged function may read
/linux-4.1.27/drivers/net/ethernet/emulex/benet/
H A Dbe_cmds.c230 "VF is not privileged to issue opcode %d-%d\n", be_mcc_compl_process()
/linux-4.1.27/drivers/net/ethernet/mellanox/mlx4/
H A Dcmd.c989 /* Non-privileged VFs are only allowed "host" view LID-routed 'Get' MADs. mlx4_MAD_IFC_wrapper()
/linux-4.1.27/arch/x86/kernel/
H A Dapm_32.c1621 * privileged operation -- cevans do_open()
/linux-4.1.27/drivers/gpu/drm/radeon/
H A Dradeon_state.c2519 * privileged clients. radeon_cp_indirect()
/linux-4.1.27/drivers/usb/serial/
H A Dftdi_sio.c1495 /* Make the changes - these are privileged changes! */ set_serial_info()
/linux-4.1.27/net/sunrpc/
H A Dxprtsock.c2214 * socket on a privileged port.
/linux-4.1.27/tools/testing/ktest/
H A Dktest.pl347 (most likely root, since you need privileged operations)
/linux-4.1.27/fs/nfs/
H A Dnfs4proc.c8348 bool privileged) _nfs41_free_stateid()
8377 if (privileged) _nfs41_free_stateid()
8345 _nfs41_free_stateid(struct nfs_server *server, nfs4_stateid *stateid, struct rpc_cred *cred, bool privileged) _nfs41_free_stateid() argument
/linux-4.1.27/net/sctp/
H A Dsocket.c1149 * privileged port, it MAY be permitted to __sctp_connect()
1809 * style socket with open associations on a privileged sctp_sendmsg()
/linux-4.1.27/drivers/net/wireless/
H A Datmel.c2312 * this is privileged and therefore a normal user can't atmel_set_scan()
H A Dairo.c7222 * this is privileged and therefore a normal user can't airo_set_scan()
/linux-4.1.27/drivers/gpu/drm/
H A Ddrm_crtc.c3493 * GET_FB() privileged, so just return an invalid handle drm_mode_getfb()
/linux-4.1.27/arch/x86/kvm/
H A Demulate.c9 * privileged instructions:
/linux-4.1.27/drivers/net/ethernet/dec/tulip/
H A Dde4x5.c5351 ** Perform IOCTL call functions here. Some are privileged operations and the
/linux-4.1.27/drivers/scsi/lpfc/
H A Dlpfc_attr.c862 /* verify if privileged for the request operation */ lpfc_sli4_pdev_status_reg_wait()
/linux-4.1.27/kernel/events/
H A Dcore.c7758 /* privileged levels capture (kernel, hv): check permissions */ perf_copy_attr()

Completed in 5281 milliseconds