Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 25 of 65) sorted by relevance

123

/linux-6.12.1/arch/powerpc/boot/dts/
Dmicrowatt.dts44 usable-privilege = <2>;
49 usable-privilege = <3>;
55 usable-privilege = <2>;
60 usable-privilege = <3>;
65 usable-privilege = <2>;
71 usable-privilege = <3>;
/linux-6.12.1/Documentation/devicetree/bindings/powerpc/
Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
138 feature to lesser privilege levels. If the property does not exist then no
179 This property may exist when the usable-privilege property value has PR bit set.
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
[all …]
/linux-6.12.1/arch/arm64/include/asm/
Dhw_breakpoint.h17 privilege : 2, member
35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux-6.12.1/arch/arm64/kernel/
Dhw_breakpoint.c141 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
143 switch (privilege) { in debug_exception_level()
149 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
230 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
495 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
497 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
570 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
583 int i, max_slots, privilege; in toggle_bp_registers() local
604 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers()
605 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
[all …]
/linux-6.12.1/arch/arm/include/asm/
Dhw_breakpoint.h17 privilege : 2,
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux-6.12.1/arch/loongarch/kernel/
Dhw_breakpoint.c177 u32 ctrl, privilege; in hw_breakpoint_control() local
184 privilege = CTRL_PLV0_ENABLE; in hw_breakpoint_control()
186 privilege = CTRL_PLV3_ENABLE; in hw_breakpoint_control()
214 write_wb_reg(CSR_CFG_CTRL, i, 0, privilege); in hw_breakpoint_control()
220 write_wb_reg(CSR_CFG_CTRL, i, 1, ctrl | privilege); in hw_breakpoint_control()
/linux-6.12.1/arch/arm/kernel/
Dhw_breakpoint.c571 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info()
573 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info()
674 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
724 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
/linux-6.12.1/Documentation/userspace-api/
Dno_new_privs.rst26 promises not to grant the privilege to do anything that could not have
41 Note that ``no_new_privs`` does not prevent privilege changes that do not
Dspec_ctrl.rst7 privilege domains.
/linux-6.12.1/include/uapi/linux/
Dipmi.h118 unsigned char privilege; member
/linux-6.12.1/Documentation/driver-api/firmware/
Dother_interfaces.rst24 Some features of the Intel Stratix10 SoC require a level of privilege
/linux-6.12.1/Documentation/devicetree/bindings/arm/firmware/
Dsdei.txt11 privilege level of the SDEI firmware (specified as part of the binding
/linux-6.12.1/Documentation/arch/parisc/
Dregisters.rst70 H (Higher-privilege trap) 0
71 L (Lower-privilege trap) 0
/linux-6.12.1/tools/perf/Documentation/
Dperf-arm-spe.txt149 … - collect physical address (as well as VA) of loads/stores (PMSCR.PA) - requires privilege
150 …1 - collect physical timestamp instead of virtual timestamp (PMSCR.PCT) - requires privilege
216 Root privilege is required to collect context packets. But these only increase the accuracy of
Dperf-top.txt254 The privilege levels may be omitted, in which case, the privilege levels of the associated
255 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
/linux-6.12.1/Documentation/ABI/testing/
Dconfigfs-tsm83 different privilege levels, like SEV-SNP "VMPL", specify the
84 privilege level via this attribute. The minimum acceptable
/linux-6.12.1/tools/testing/selftests/ftrace/
DREADME31 * Take care with side effects as the tests are run with root privilege.
/linux-6.12.1/Documentation/admin-guide/sysctl/
Dfs.rst194 is to cross privilege boundaries when following a given hardlink (i.e. a
230 is to cross privilege boundaries when following a given symlink (i.e. a
252 privilege levels or is execute only will not be dumped.
/linux-6.12.1/Documentation/admin-guide/hw-vuln/
Dsrso.rst10 tricking the elevated privilege domain (the kernel) into leaking
96 privilege domain crossings (User->Kernel, Guest->Host).
Dgather_data_sampling.rst39 lower-privilege contexts like guests and when running outside SGX enclaves.
/linux-6.12.1/Documentation/security/
Dcredentials.rst238 * UNIX exec privilege escalation bits (SUID/SGID);
239 * File capabilities exec privilege escalation bits.
243 privilege escalation bits come into play, and may allow the resulting process
550 To avoid "confused deputy" privilege escalation attacks, access control checks
Dsnp-tdx-threat-model.rst173 privilege to create, destroy, or pause the guest, part of the goal of
239 --> guest kernel privilege escalation. This includes traditional
/linux-6.12.1/Documentation/arch/x86/x86_64/
Dfred.rst11 privilege level (ring transitions). The FRED architecture was
/linux-6.12.1/Documentation/arch/powerpc/
Dultravisor.rst68 * The privilege of a process is now determined by three MSR bits,
70 from least privilege to highest privilege. The higher privilege
71 modes can access all the resources of the lower privilege modes.
/linux-6.12.1/Documentation/admin-guide/LSM/
DSmack.rst427 policy is said to have privilege. As of this writing a task can
428 have privilege either by possessing capabilities or by having an
614 only be changed by a process with privilege.
779 privilege.
793 program has appropriate privilege::
798 packets will be checked if the program has appropriate privilege.

123