Home
last modified time | relevance | path

Searched full:privilege (Results 1 – 25 of 381) sorted by relevance

12345678910>>...16

/kernel/linux/linux-4.19/Documentation/devicetree/bindings/powerpc/
Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
138 feature to lesser privilege levels. If the property does not exist then no
179 This property may exist when the usable-privilege property value has PR bit set.
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/powerpc/
Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
138 feature to lesser privilege levels. If the property does not exist then no
179 This property may exist when the usable-privilege property value has PR bit set.
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
[all …]
/kernel/linux/linux-5.10/arch/arm64/include/asm/
Dhw_breakpoint.h17 privilege : 2, member
27 /* Privilege Levels */
35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/kernel/linux/linux-4.19/arch/arm64/include/asm/
Dhw_breakpoint.h30 privilege : 2, member
40 /* Privilege Levels */
48 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
51 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
62 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/kernel/linux/linux-4.19/Documentation/ia64/
Dfsys.txt34 - execution is at privilege level 0 (most-privileged)
51 privilege level is at level 0, this means that fsys-mode requires some
57 Linux operates in fsys-mode when (a) the privilege level is 0 (most
69 to by "regs" was executing in user mode (privilege level 3).
168 is exited. This is accomplished with the help of the lower-privilege
172 "br.ret" instruction that lowers the privilege level, a trap will
205 breakpoint that triggers at any privilege level other than 3 (user-mode).
210 syscall_via_break(), with privilege level 3. Note: the
216 taken _after_ restoring the privilege level, the CPU has already
229 syscall_via_break(), with privilege level 3.
/kernel/linux/linux-5.10/Documentation/ia64/
Dfsys.rst34 - execution is at privilege level 0 (most-privileged)
51 privilege level is at level 0, this means that fsys-mode requires some
58 Linux operates in fsys-mode when (a) the privilege level is 0 (most
70 to by "regs" was executing in user mode (privilege level 3).
177 is exited. This is accomplished with the help of the lower-privilege
181 "br.ret" instruction that lowers the privilege level, a trap will
216 breakpoint that triggers at any privilege level other than
222 syscall_via_break(), with privilege level 3. Note: the
228 taken _after_ restoring the privilege level, the CPU has already
241 syscall_via_break(), with privilege level 3.
/kernel/linux/linux-4.19/arch/arm/include/asm/
Dhw_breakpoint.h17 privilege : 2,
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
65 /* Privilege Levels */
/kernel/linux/linux-5.10/arch/arm/include/asm/
Dhw_breakpoint.h17 privilege : 2,
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
68 /* Privilege Levels */
/kernel/linux/linux-4.19/arch/arm64/kernel/
Dhw_breakpoint.c148 * Convert a breakpoint privilege level to the corresponding exception
151 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
153 switch (privilege) { in debug_exception_level()
159 pr_warning("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
240 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
500 * Privilege in arch_build_bp_info()
505 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
507 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
576 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
589 int i, max_slots, privilege; in toggle_bp_registers() local
[all …]
/kernel/linux/linux-5.10/arch/arm64/kernel/
Dhw_breakpoint.c137 * Convert a breakpoint privilege level to the corresponding exception
140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
142 switch (privilege) { in debug_exception_level()
148 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
489 * Privilege in arch_build_bp_info()
494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
582 int i, max_slots, privilege; in toggle_bp_registers() local
[all …]
/kernel/linux/linux-4.19/arch/sparc/include/uapi/asm/
Dpsr.h7 * PSTATE.PRIV for the current CPU privilege level.
24 #define PSR_PS 0x00000040 /* previous privilege level */
25 #define PSR_S 0x00000080 /* current privilege level */
Dpsrcompat.h10 #define PSR_PS 0x00000040 /* previous privilege level */
11 #define PSR_S 0x00000080 /* current privilege level */
/kernel/linux/linux-5.10/arch/sparc/include/uapi/asm/
Dpsr.h7 * PSTATE.PRIV for the current CPU privilege level.
24 #define PSR_PS 0x00000040 /* previous privilege level */
25 #define PSR_S 0x00000080 /* current privilege level */
Dpsrcompat.h10 #define PSR_PS 0x00000040 /* previous privilege level */
11 #define PSR_S 0x00000080 /* current privilege level */
/kernel/linux/linux-5.10/arch/x86/include/asm/
Dsegment.h30 * privilege level
35 * When running on Xen PV, the actual privilege level of the kernel is 1,
36 * not 0. Testing the Requested Privilege Level in a segment selector to
38 * SEGMENT_RPL_MASK is wrong because the PV kernel's privilege level
42 * kernels because privilege level 2 is never used.
46 /* User mode is privilege level 3: */
/kernel/linux/linux-4.19/tools/testing/selftests/powerpc/dscr/
Ddscr_explicit_test.c6 * privilege state SPR and the problem state SPR for this purpose.
8 * When using the privilege state SPR, the instructions such as
/kernel/linux/linux-5.10/tools/testing/selftests/powerpc/dscr/
Ddscr_explicit_test.c7 * privilege state SPR and the problem state SPR for this purpose.
9 * When using the privilege state SPR, the instructions such as
/kernel/linux/linux-5.10/Documentation/userspace-api/
Dno_new_privs.rst26 promises not to grant the privilege to do anything that could not have
41 Note that ``no_new_privs`` does not prevent privilege changes that do not
/kernel/linux/linux-4.19/Documentation/userspace-api/
Dno_new_privs.rst26 promises not to grant the privilege to do anything that could not have
41 Note that ``no_new_privs`` does not prevent privilege changes that do not
/kernel/linux/linux-4.19/Documentation/devicetree/bindings/interrupt-controller/
Dsifive,plic-1.0.0.txt9 A hart context is a privilege mode in a hardware execution thread. For example,
11 privilege modes per hart; machine mode and supervisor mode.
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/interrupt-controller/
Dsifive,plic-1.0.0.yaml16 A hart context is a privilege mode in a hardware execution thread. For example,
18 privilege modes per hart; machine mode and supervisor mode.
/kernel/linux/linux-4.19/tools/perf/Documentation/
Dperf-top.txt232 The privilege levels may be omitted, in which case, the privilege levels of the associated
233 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
/kernel/linux/linux-5.10/Documentation/admin-guide/LSM/
DSmack.rst425 Privilege:
427 policy is said to have privilege. As of this writing a task can
428 have privilege either by possessing capabilities or by having an
614 only be changed by a process with privilege.
616 Privilege section in Smack Basics
779 privilege.
793 program has appropriate privilege::
798 packets will be checked if the program has appropriate privilege.
/kernel/linux/linux-4.19/Documentation/admin-guide/LSM/
DSmack.rst425 Privilege:
427 policy is said to have privilege. As of this writing a task can
428 have privilege either by possessing capabilities or by having an
614 only be changed by a process with privilege.
616 Privilege section in Smack Basics
779 privilege.
793 program has appropriate privilege::
798 packets will be checked if the program has appropriate privilege.
/kernel/linux/linux-4.19/Documentation/parisc/
Dregisters56 H (Higher-privilege trap) 0
57 L (Lower-privilege trap) 0

12345678910>>...16