| /linux-6.15/arch/powerpc/boot/dts/ |
| H A D | microwatt.dts | 46 usable-privilege = <6>; 52 usable-privilege = <7>; 59 usable-privilege = <6>; 65 usable-privilege = <7>; 70 usable-privilege = <2>; 78 usable-privilege = <7>; 87 usable-privilege = <7>; 96 usable-privilege = <7>; 104 usable-privilege = <7>; 109 usable-privilege = <7>;
|
| /linux-6.15/Documentation/devicetree/bindings/powerpc/ |
| H A D | ibm,powerpc-cpu-features.txt | 13 enablement, privilege, and compatibility metadata. 94 - usable-privilege 104 This property describes the privilege levels and/or software components 118 This property describes the HV privilege support required to enable the 119 feature to lesser privilege levels. If the property does not exist then no 137 This property describes the OS privilege support required to enable the 213 usable-privilege = <1 | 2 | 4>; 219 usable-privilege = <1 | 2>; 226 usable-privilege = <2 | 4>; 233 usable-privilege = <1 | 2 | 4>; [all …]
|
| /linux-6.15/arch/arm64/include/asm/ |
| H A D | hw_breakpoint.h | 17 privilege : 2, member 35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg() 49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
| /linux-6.15/arch/arm64/kernel/ |
| H A D | hw_breakpoint.c | 141 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument 143 switch (privilege) { in debug_exception_level() 149 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 230 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 495 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 497 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 570 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse() 583 int i, max_slots, privilege; in toggle_bp_registers() local 604 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers() 605 if (debug_exception_level(privilege) != el) in toggle_bp_registers() [all …]
|
| /linux-6.15/arch/arm/include/asm/ |
| H A D | hw_breakpoint.h | 17 privilege : 2, 31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
| /linux-6.15/Documentation/devicetree/bindings/interrupt-controller/ |
| H A D | riscv,imsics.yaml | 18 for each privilege level (machine or supervisor). The configuration of 22 which is same for given privilege level across CPUs (or HARTs). 25 for each privilege level (machine or supervisor) which collectively describe 26 IMSIC interrupt files at that privilege level across CPUs (or HARTs). 33 privilege level (machine or supervisor) encodes group index, HART index,
|
| H A D | sifive,plic-1.0.0.yaml | 17 A hart context is a privilege mode in a hardware execution thread. For example, 19 privilege modes per hart; machine mode and supervisor mode.
|
| /linux-6.15/arch/loongarch/kernel/ |
| H A D | hw_breakpoint.c | 189 u32 ctrl, privilege; in hw_breakpoint_control() local 196 privilege = CTRL_PLV0_ENABLE; in hw_breakpoint_control() 198 privilege = CTRL_PLV3_ENABLE; in hw_breakpoint_control() 226 write_wb_reg(CSR_CFG_CTRL, i, 0, privilege); in hw_breakpoint_control() 232 write_wb_reg(CSR_CFG_CTRL, i, 1, ctrl | privilege); in hw_breakpoint_control()
|
| /linux-6.15/Documentation/devicetree/bindings/bus/ |
| H A D | st,stm32mp25-rifsc.yaml | 21 any security domains (secure, privilege, compartment). 30 security domains (secure, privilege, compartment).
|
| /linux-6.15/arch/arm/kernel/ |
| H A D | hw_breakpoint.c | 571 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 573 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 674 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step() 724 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
|
| /linux-6.15/Documentation/userspace-api/ |
| H A D | no_new_privs.rst | 26 promises not to grant the privilege to do anything that could not have 41 Note that ``no_new_privs`` does not prevent privilege changes that do not
|
| H A D | spec_ctrl.rst | 7 privilege domains.
|
| /linux-6.15/Documentation/translations/zh_CN/security/ |
| H A D | credentials.rst | 202 * UNIX exec privilege escalation bits (SUID/SGID); 203 * File capabilities exec privilege escalation bits.
|
| /linux-6.15/include/uapi/linux/ |
| H A D | ipmi.h | 118 unsigned char privilege; member
|
| /linux-6.15/Documentation/driver-api/firmware/ |
| H A D | other_interfaces.rst | 24 Some features of the Intel Stratix10 SoC require a level of privilege
|
| /linux-6.15/Documentation/devicetree/bindings/arm/firmware/ |
| H A D | sdei.txt | 11 privilege level of the SDEI firmware (specified as part of the binding
|
| /linux-6.15/Documentation/arch/parisc/ |
| H A D | registers.rst | 70 H (Higher-privilege trap) 0 71 L (Lower-privilege trap) 0
|
| /linux-6.15/Documentation/ABI/testing/ |
| H A D | configfs-tsm | 83 different privilege levels, like SEV-SNP "VMPL", specify the 84 privilege level via this attribute. The minimum acceptable
|
| /linux-6.15/tools/perf/Documentation/ |
| H A D | perf-arm-spe.txt | 149 … - collect physical address (as well as VA) of loads/stores (PMSCR.PA) - requires privilege 150 …1 - collect physical timestamp instead of virtual timestamp (PMSCR.PCT) - requires privilege 217 Root privilege is required to collect context packets. But these only increase the accuracy of
|
| H A D | perf-top.txt | 254 The privilege levels may be omitted, in which case, the privilege levels of the associated 255 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
| /linux-6.15/tools/testing/selftests/ftrace/ |
| H A D | README | 31 * Take care with side effects as the tests are run with root privilege.
|
| /linux-6.15/Documentation/admin-guide/hw-vuln/ |
| H A D | srso.rst | 10 tricking the elevated privilege domain (the kernel) into leaking 96 privilege domain crossings (User->Kernel, Guest->Host).
|
| H A D | gather_data_sampling.rst | 39 lower-privilege contexts like guests and when running outside SGX enclaves.
|
| /linux-6.15/Documentation/admin-guide/sysctl/ |
| H A D | fs.rst | 199 is to cross privilege boundaries when following a given hardlink (i.e. a 235 is to cross privilege boundaries when following a given symlink (i.e. a 257 privilege levels or is execute only will not be dumped.
|
| /linux-6.15/Documentation/arch/x86/x86_64/ |
| H A D | fred.rst | 11 privilege level (ring transitions). The FRED architecture was
|