/linux-4.1.27/drivers/infiniband/hw/mthca/ |
H A D | mthca_pd.c | 39 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd) mthca_pd_alloc() argument 43 pd->privileged = privileged; mthca_pd_alloc() 50 if (privileged) { mthca_pd_alloc() 64 if (pd->privileged) mthca_pd_free()
|
H A D | mthca_provider.h | 102 int privileged; member in struct:mthca_pd
|
H A D | mthca_dev.h | 462 int mthca_pd_alloc(struct mthca_dev *dev, int privileged, struct mthca_pd *pd);
|
/linux-4.1.27/arch/avr32/include/asm/ |
H A D | addrspace.h | 23 /* Returns the privileged segment base of a given address */ 30 * Map an address to a certain privileged segment
|
/linux-4.1.27/arch/unicore32/kernel/ |
H A D | ptrace.c | 20 * this routine will get a word off of the processes privileged stack. 22 * this routine assumes that all the privileged stacks are in our 31 * this routine will put a word on the processes privileged stack. 33 * this routine assumes that all the privileged stacks are in our
|
/linux-4.1.27/arch/sparc/include/asm/ |
H A D | pcr.h | 18 #define PCR_PIC_PRIV 0x00000001 /* PIC access is privileged */ 44 #define PCR_N4_PICNPT 0x00010000 /* PIC non-privileged trap */
|
H A D | mxcc.h | 61 * PRIV: A privileged mode error? 0=no 1=yes
|
H A D | hypervisor.h | 509 * placed into a memory region made available by privileged code. Each 576 * Note: This API call is for privileged code to specify temporary translation 733 * permanent mappings may be specified by privileged code. Mappings 739 * privileged code does not expect to receive misses. For example, 1182 * The hypervisor provides a trap tracing capability for privileged 1186 * privileged code. This is provided as a debugging capability for 1187 * privileged code. 1215 unsigned char hpstate; /* Hyper-privileged state */ 2745 * The hypervisor maintains MMU statistics and privileged code provides 2900 * to privileged code, instead it is programmed indirectly via this 2909 * The privileged code then proceeds to add entries to the queue and
|
/linux-4.1.27/arch/sh/include/asm/ |
H A D | addrspace.h | 28 /* Returns the privileged segment base of a given address */ 33 * Map an address to a certain privileged segment
|
/linux-4.1.27/arch/mn10300/include/asm/ |
H A D | exceptions.h | 42 EXCEP_PRIVINS = 0x000160, /* privileged instruction execution */ 51 EXCEP_PRIVINSACC = 0x0001a8, /* privileged space instruction access */ 52 EXCEP_PRIVDATACC = 0x0001b0, /* privileged space data access */
|
H A D | cpu-regs.h | 151 #define sISR_PRIV 0x00000800 /* privileged instruction execution fault */ 162 #define sISR_PRIVA 0x00800000 /* privileged space instruction access excep */ 163 #define sISR_PRIDA 0x01000000 /* privileged space data access excep */
|
/linux-4.1.27/arch/arm/include/asm/ |
H A D | firmware.h | 49 * Restore state of privileged hardware after system-wide suspend.
|
H A D | bitops.h | 12 * since they would be too costly. Also, they require privileged
|
/linux-4.1.27/security/selinux/ss/ |
H A D | constraint.h | 8 * identity or role unless it is in a privileged type.
|
/linux-4.1.27/arch/x86/include/asm/ |
H A D | lguest_hcall.h | 32 * But first, how does our Guest contact the Host to ask for privileged
|
H A D | paravirt_types.h | 104 /* hooks for various privileged instructions */
|
/linux-4.1.27/arch/x86/xen/ |
H A D | pci-swiotlb-xen.c | 49 * activate this IOMMU. If running as PV privileged, activate it pci_xen_swiotlb_detect()
|
H A D | enlighten.c | 6 * - privileged instructions
|
/linux-4.1.27/arch/sparc/kernel/ |
H A D | hvtramp.S | 30 * First setup basic privileged cpu state.
|
H A D | entry.S | 428 /* This routine handles illegal instructions and privileged
|
H A D | head_32.S | 356 /* Acquire boot time privileged register values, this will help debugging.
|
H A D | head_64.S | 524 * Make sure we are in privileged mode, have address masking,
|
H A D | traps_64.c | 1703 /* BAD, privileged state is corrupted. */ cheetah_deferred_handler() 2539 if (notify_die(DIE_TRAP, "privileged operation", regs, do_privop()
|
/linux-4.1.27/arch/metag/tbx/ |
H A D | tbiroot.S | 68 MOV D1Re0,TXSTATUS /* Are we privileged or int? */
|
H A D | tbicore.S | 65 XOR D0Ar2,D0Ar2,D0Re0 /* Toggle Id PSTAT if privileged */
|
/linux-4.1.27/include/xen/interface/ |
H A D | event_channel.h | 72 * 2. Only a sufficiently-privileged domain may bind to a physical IRQ. 123 * 2. Only a sufficiently-privileged domain may obtain the status of an event 184 * 2. Only a sufficiently-privileged domain may specify other than DOMID_SELF.
|
H A D | grant_table.h | 303 * 2. Only a sufficiently-privileged domain may specify <dom> != DOMID_SELF. 395 * 2. Only a sufficiently-privileged domain may specify <dom> != DOMID_SELF. 454 * 2. Only a sufficiently-privileged domain may specify <dom> != DOMID_SELF.
|
H A D | xen.h | 438 * DOMID_XEN is used to allow privileged domains to map restricted parts of 441 * the caller is privileged. 644 #define SIF_PRIVILEGED (1<<0) /* Is the domain privileged? */
|
/linux-4.1.27/drivers/infiniband/hw/amso1100/ |
H A D | c2_pd.c | 43 int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd) c2_pd_alloc() argument
|
H A D | c2.h | 506 extern int c2_pd_alloc(struct c2_dev *c2dev, int privileged, struct c2_pd *pd);
|
/linux-4.1.27/drivers/tty/ |
H A D | rocket.h | 61 #define ROCKET_USR_MASK 0x0071 /* Legal flags that non-privileged
|
/linux-4.1.27/arch/mips/kvm/ |
H A D | dyntrans.c | 6 * KVM/MIPS: Binary Patching for privileged instructions, reduces traps.
|
/linux-4.1.27/arch/ia64/kernel/ |
H A D | Makefile | 100 # Checker for paravirtualizations of privileged operations.
|
H A D | fsys.S | 421 * distinguish fsyscall execution from other privileged
|
H A D | perfmon.c | 2888 * - system-wide session: PMCx.pm=1 (privileged monitor) pfm_write_pmcs()
|
/linux-4.1.27/drivers/staging/lustre/lnet/klnds/o2iblnd/ |
H A D | o2iblnd_modparams.c | 146 MODULE_PARM_DESC(require_privileged_port, "require privileged port when accepting connection"); 150 MODULE_PARM_DESC(use_privileged_port, "use privileged port when initiating connection");
|
H A D | o2iblnd.h | 107 int *kib_require_priv_port;/* accept only privileged ports */ 108 int *kib_use_priv_port; /* use privileged port for active connect */
|
H A D | o2iblnd_cb.c | 1248 /* look for a free privileged port */ kiblnd_resolve_addr() 1266 CERROR("Failed to bind to a free privileged port\n"); kiblnd_resolve_addr() 2211 CERROR("Peer's port (%pI4h:%hu) is not privileged\n", kiblnd_passive_connect()
|
/linux-4.1.27/include/uapi/asm-generic/ |
H A D | siginfo.h | 184 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */ 185 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
|
/linux-4.1.27/arch/powerpc/include/asm/ |
H A D | spu_csa.h | 133 * struct spu_priv1_collapsed - condensed privileged 1 area, w/o pads. 197 * struct spu_priv2_collapsed - condensed privileged 2 area, w/o pads.
|
H A D | spu.h | 472 /* PV2_ImplRegs: Implementation-specific privileged-state 2 regs */ 673 /* PV1_ImplRegs: Implementation-dependent privileged-state 1 regs */
|
H A D | hvcall.h | 38 #define H_PRIVILEGE -3 /* Caller not privileged */
|
/linux-4.1.27/arch/sh/kernel/ |
H A D | traps_64.c | 717 * Otherwise, user mode trying to execute a privileged do_reserved_inst() 722 /* If in privileged mode, return as above. */ do_reserved_inst() 733 /* reserved/privileged control register => trap */ do_reserved_inst() 740 /* reserved/privileged control register => trap */ do_reserved_inst()
|
H A D | kgdb.c | 237 * and need privileged instructions to get to. The r15 value we sleeping_thread_to_gdb_regs()
|
/linux-4.1.27/arch/sh/mm/ |
H A D | tlbex_64.c | 105 the fault happened in user mode or privileged mode. */
|
/linux-4.1.27/arch/microblaze/kernel/cpu/ |
H A D | cpuinfo-static.c | 120 ci->mmu_privins = fcpu(cpu, "xlnx,mmu-privileged-instr"); set_cpuinfo_static()
|
/linux-4.1.27/arch/ia64/include/asm/ |
H A D | kregs.h | 117 #define IA64_DCR_PP_BIT 0 /* privileged performance monitor default */
|
H A D | paravirt_privop.h | 128 * privileged instructions so the code must be replaced with
|
/linux-4.1.27/arch/arm/kernel/ |
H A D | ptrace.c | 159 * this routine will get a word off of the processes privileged stack. 161 * this routine assumes that all the privileged stacks are in our 170 * this routine will put a word on the processes privileged stack. 172 * this routine assumes that all the privileged stacks are in our
|
/linux-4.1.27/fs/ecryptfs/ |
H A D | kthread.c | 161 "aborting privileged request to open lower file\n", ecryptfs_privileged_open()
|
/linux-4.1.27/security/keys/ |
H A D | persistent.c | 145 * sufficiently privileged. keyctl_get_persistent()
|
/linux-4.1.27/drivers/misc/genwqe/ |
H A D | card_debugfs.c | 361 /* non privileged interfaces are done here */ genwqe_init_debugfs() 396 /* privileged interfaces follow here */ genwqe_init_debugfs()
|
H A D | card_base.h | 569 * privileged mode, either as true PF or in a virtualized system with
|
/linux-4.1.27/security/smack/ |
H A D | smack.h | 337 * Is the task privileged and allowed to be privileged
|
H A D | smack_lsm.c | 1629 * Allow a privileged task to get signals even if it shouldn't
|
/linux-4.1.27/include/linux/lockd/ |
H A D | lockd.h | 328 * Ensure incoming requests are from local privileged callers. 330 * Return TRUE if sender is local and is connecting via a privileged port;
|
/linux-4.1.27/drivers/media/usb/uvc/ |
H A D | uvc_v4l2.c | 430 * Each open instance of a UVC device can either be in a privileged or 431 * unprivileged state. Only a single instance can be in a privileged state at 446 /* Always succeed if the handle is already privileged. */ uvc_acquire_privileges() 450 /* Check if the device already has a privileged handle. */ uvc_acquire_privileges() 531 /* Only free resources if this is a privileged handle. */ uvc_v4l2_release()
|
/linux-4.1.27/arch/frv/kernel/ |
H A D | traps.c | 60 * - privileged instruction 397 * - user mode accessing privileged memory region
|
/linux-4.1.27/arch/s390/kernel/ |
H A D | traps.c | 148 "privileged operation")
|
/linux-4.1.27/arch/sh/kernel/cpu/sh4a/ |
H A D | perf_event.c | 65 * 0x0200 number of elapsed cycles in privileged mode
|
/linux-4.1.27/arch/ia64/include/asm/native/ |
H A D | pvchk_inst.h | 6 * Checker for paravirtualizations of privileged operations.
|
/linux-4.1.27/arch/m32r/kernel/ |
H A D | traps.c | 276 DO_ERROR_INFO(0x100, SIGILL, "privileged instruction", pie_handler, ILL_PRVOPC, regs->bpc)
|
/linux-4.1.27/drivers/connector/ |
H A D | cn_proc.c | 353 /* Can only change if privileged. */ cn_proc_mcast_ctl()
|
/linux-4.1.27/include/uapi/linux/ |
H A D | capability.h | 303 /* Allow the privileged aspects of mknod() */
|
/linux-4.1.27/drivers/gpu/drm/i915/ |
H A D | i915_cmd_parser.c | 52 * First, commands which are explicitly defined as privileged or which should 61 * Third, commands which access privileged memory (i.e. GGTT, HWS page, etc). 85 * implements a number of checks, including the privileged memory checks, via a
|
/linux-4.1.27/drivers/staging/lustre/lnet/lnet/ |
H A D | acceptor.c | 128 LCONSOLE_ERROR_MSG(0x11d, "No privileged ports available to connect to %s at host %pI4h on port %d\n", lnet_connect_console_error()
|
/linux-4.1.27/arch/xtensa/include/asm/ |
H A D | pgtable.h | 104 * RI ring (0=privileged, 1=user, 2 and 3 are unused)
|
/linux-4.1.27/kernel/ |
H A D | capability.c | 418 * actually be privileged.
|
H A D | seccomp.c | 364 * behavior of privileged children. seccomp_prepare_filter()
|
/linux-4.1.27/drivers/xen/ |
H A D | privcmd.c | 4 * Interface to privileged domain-0 commands.
|
/linux-4.1.27/drivers/tty/vt/ |
H A D | vt_ioctl.c | 1326 * Send the signal as privileged - kill_pid() will complete_change_console() 1386 * Send the signal as privileged - kill_pid() will change_console()
|
/linux-4.1.27/fs/ |
H A D | xattr.c | 52 * The trusted.* namespace can only be accessed by privileged users. xattr_permission() 63 * privileged users can write attributes. xattr_permission()
|
H A D | namei.c | 764 * in a sticky world-writable directory. This is to protect privileged
|
/linux-4.1.27/fs/xfs/ |
H A D | xfs_iops.c | 620 * Change file ownership. Must be the owner or privileged. xfs_setattr_nonsize() 653 * Change file ownership. Must be the owner or privileged. xfs_setattr_nonsize()
|
H A D | xfs_ioctl.c | 139 * as the handle operations are privileged. 1225 * Change file ownership. Must be the owner or privileged. CAP_FSETID xfs_ioctl_setattr()
|
H A D | xfs_mount.c | 919 * privileged transactions. This is needed so that transaction xfs_mountfs()
|
/linux-4.1.27/arch/s390/kvm/ |
H A D | priv.c | 2 * handling privileged instructions 628 * the privileged ones, that we can handle in the kernel. kvm_s390_handle_b2()
|
/linux-4.1.27/security/ |
H A D | commoncap.c | 622 * who aren't privileged to do so. 649 * aren't privileged to remove them.
|
/linux-4.1.27/arch/x86/lguest/ |
H A D | boot.c | 17 * These Guests know that they cannot do privileged operations, such as disable 419 * the Host won't even notice since it isn't privileged. So we try not to get 1410 * have to override to avoid privileged instructions.
|
/linux-4.1.27/arch/powerpc/platforms/cell/spufs/ |
H A D | switch.c | 506 * for save/restore is privileged, so the setup_mfc_sr1() 1832 * save regions of the privileged & problem state areas. save_csa() 1997 * restore regions of the privileged & problem state areas. restore_csa()
|
/linux-4.1.27/drivers/spi/ |
H A D | spidev.c | 68 * REVISIT should changing those flags be privileged?
|
/linux-4.1.27/drivers/char/ |
H A D | apm-emulation.c | 370 * privileged operation -- cevans apm_open()
|
/linux-4.1.27/fs/lockd/ |
H A D | host.c | 202 * @noresvport: 1 if non-privileged port should be used
|
/linux-4.1.27/net/9p/ |
H A D | trans_rdma.c | 671 /* Bind to a privileged port if we need to */ rdma_create_trans()
|
/linux-4.1.27/net/sunrpc/xprtrdma/ |
H A D | transport.c | 324 xprt->resvport = 0; /* privileged port not needed */ xprt_setup_rdma()
|
/linux-4.1.27/arch/powerpc/kvm/ |
H A D | book3s_hv_rmhandlers.S | 210 li r3, 0 /* Don't wake on privileged (OS) doorbell */ 2169 lis r3, LPCR_PECEDP@h /* Do wake on privileged doorbell */ 2347 cmpwi r6, 5 /* privileged doorbell? */
|
H A D | booke.c | 1097 * In GS mode, hypervisor privileged instructions trap kvmppc_handle_exit() 1200 * hcall from guest userspace -- send privileged kvmppc_handle_exit()
|
H A D | book3s_hv.c | 2597 /* We don't need to emulate any privileged instructions or dcbz */ kvmppc_core_emulate_op_hv()
|
/linux-4.1.27/arch/metag/include/asm/ |
H A D | tbx.h | 89 or access unprivileged areas of memory while at privileged level. */ 255 #define TBICTX_PRIV_BIT 0x8000 /* Set if system uses 'privileged' model */
|
/linux-4.1.27/net/vmw_vsock/ |
H A D | vmci_transport.c | 611 /* This handler is privileged when this module is running on the host. vmci_transport_recv_dgram_cb() 728 /* This handler is privileged when this module is running on the host. vmci_transport_recv_stream_cb()
|
/linux-4.1.27/drivers/net/ethernet/qlogic/qlcnic/ |
H A D | qlcnic_sysfs.c | 227 "LED test not supported in non privileged mode\n"); qlcnic_store_beacon()
|
H A D | qlcnic_83xx_hw.c | 1583 "LED test is not supported in non-privileged mode\n"); qlcnic_83xx_set_led() 1766 "Loopback test not supported in non privileged mode\n"); qlcnic_83xx_loopback_test()
|
H A D | qlcnic_83xx_init.c | 699 * Ensure vNIC mode privileged function starts only after vNIC mode is
|
/linux-4.1.27/drivers/gpu/drm/r128/ |
H A D | r128_state.c | 1577 * privileged clients. r128_cce_indirect()
|
/linux-4.1.27/arch/microblaze/kernel/ |
H A D | entry.S | 478 /* adjust exception address for privileged instruction
|
/linux-4.1.27/fs/logfs/ |
H A D | logfs.h | 415 * the root user. Non-privileged users can no longer write once
|
/linux-4.1.27/include/uapi/drm/ |
H A D | i915_drm.h | 731 /** Request a privileged ("secure") batch buffer. Note only available for
|
/linux-4.1.27/arch/parisc/kernel/ |
H A D | syscall.S | 105 gate .+8, %r0 /* become privileged */
|
/linux-4.1.27/net/ipv4/ |
H A D | ping.c | 409 * We need our own bind because there are no privileged id's == local ports.
|
/linux-4.1.27/net/ipv6/ |
H A D | ipv6_sockglue.c | 405 /* hop-by-hop / destination options are privileged option */ do_ipv6_setsockopt()
|
/linux-4.1.27/drivers/xen/events/ |
H A D | events_base.c | 677 /* Only the privileged domain can do this. For non-priv, the pcifront xen_bind_pirq_gsi_to_irq()
|
/linux-4.1.27/drivers/dma/ |
H A D | pl330.c | 304 bool privileged; member in struct:pl330_reqcfg 1349 if (rqc->privileged) _prepare_ccr()
|
H A D | amba-pl08x.c | 1330 /* Access the cell in privileged mode, non-bufferable, non-cacheable */ pl08x_cctl()
|
/linux-4.1.27/drivers/s390/char/ |
H A D | tape_3590.c | 1443 dev_warn (&device->cdev->dev, "A different host has privileged" tape_3590_unit_check()
|
/linux-4.1.27/drivers/net/fddi/skfp/ |
H A D | skfddi.c | 945 * Perform IOCTL call functions here. Some are privileged operations and the
|
/linux-4.1.27/drivers/net/ethernet/sfc/ |
H A D | mcdi_pcol.h | 1896 /* enum: The function can perform privileged operations */ 7843 * function. Only a privileged function may change the port sniffing 7879 * associated with the calling function. Only a privileged function may read
|
/linux-4.1.27/drivers/net/ethernet/emulex/benet/ |
H A D | be_cmds.c | 230 "VF is not privileged to issue opcode %d-%d\n", be_mcc_compl_process()
|
/linux-4.1.27/drivers/net/ethernet/mellanox/mlx4/ |
H A D | cmd.c | 989 /* Non-privileged VFs are only allowed "host" view LID-routed 'Get' MADs. mlx4_MAD_IFC_wrapper()
|
/linux-4.1.27/arch/x86/kernel/ |
H A D | apm_32.c | 1621 * privileged operation -- cevans do_open()
|
/linux-4.1.27/drivers/gpu/drm/radeon/ |
H A D | radeon_state.c | 2519 * privileged clients. radeon_cp_indirect()
|
/linux-4.1.27/drivers/usb/serial/ |
H A D | ftdi_sio.c | 1495 /* Make the changes - these are privileged changes! */ set_serial_info()
|
/linux-4.1.27/net/sunrpc/ |
H A D | xprtsock.c | 2214 * socket on a privileged port.
|
/linux-4.1.27/tools/testing/ktest/ |
H A D | ktest.pl | 347 (most likely root, since you need privileged operations)
|
/linux-4.1.27/fs/nfs/ |
H A D | nfs4proc.c | 8348 bool privileged) _nfs41_free_stateid() 8377 if (privileged) _nfs41_free_stateid() 8345 _nfs41_free_stateid(struct nfs_server *server, nfs4_stateid *stateid, struct rpc_cred *cred, bool privileged) _nfs41_free_stateid() argument
|
/linux-4.1.27/net/sctp/ |
H A D | socket.c | 1149 * privileged port, it MAY be permitted to __sctp_connect() 1809 * style socket with open associations on a privileged sctp_sendmsg()
|
/linux-4.1.27/drivers/net/wireless/ |
H A D | atmel.c | 2312 * this is privileged and therefore a normal user can't atmel_set_scan()
|
H A D | airo.c | 7222 * this is privileged and therefore a normal user can't airo_set_scan()
|
/linux-4.1.27/drivers/gpu/drm/ |
H A D | drm_crtc.c | 3493 * GET_FB() privileged, so just return an invalid handle drm_mode_getfb()
|
/linux-4.1.27/arch/x86/kvm/ |
H A D | emulate.c | 9 * privileged instructions:
|
/linux-4.1.27/drivers/net/ethernet/dec/tulip/ |
H A D | de4x5.c | 5351 ** Perform IOCTL call functions here. Some are privileged operations and the
|
/linux-4.1.27/drivers/scsi/lpfc/ |
H A D | lpfc_attr.c | 862 /* verify if privileged for the request operation */ lpfc_sli4_pdev_status_reg_wait()
|
/linux-4.1.27/kernel/events/ |
H A D | core.c | 7758 /* privileged levels capture (kernel, hv): check permissions */ perf_copy_attr()
|