Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 25 of 72) sorted by relevance

123

/linux-6.15/arch/powerpc/boot/dts/
H A Dmicrowatt.dts46 usable-privilege = <6>;
52 usable-privilege = <7>;
59 usable-privilege = <6>;
65 usable-privilege = <7>;
70 usable-privilege = <2>;
78 usable-privilege = <7>;
87 usable-privilege = <7>;
96 usable-privilege = <7>;
104 usable-privilege = <7>;
109 usable-privilege = <7>;
/linux-6.15/Documentation/devicetree/bindings/powerpc/
H A Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
226 usable-privilege = <2 | 4>;
233 usable-privilege = <1 | 2 | 4>;
[all …]
/linux-6.15/arch/arm64/include/asm/
H A Dhw_breakpoint.h17 privilege : 2, member
35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux-6.15/arch/arm64/kernel/
H A Dhw_breakpoint.c141 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
143 switch (privilege) { in debug_exception_level()
149 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
230 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
495 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
497 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
570 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
583 int i, max_slots, privilege; in toggle_bp_registers() local
604 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers()
605 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
[all …]
/linux-6.15/arch/arm/include/asm/
H A Dhw_breakpoint.h17 privilege : 2,
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/linux-6.15/Documentation/devicetree/bindings/interrupt-controller/
H A Driscv,imsics.yaml18 for each privilege level (machine or supervisor). The configuration of
22 which is same for given privilege level across CPUs (or HARTs).
25 for each privilege level (machine or supervisor) which collectively describe
26 IMSIC interrupt files at that privilege level across CPUs (or HARTs).
33 privilege level (machine or supervisor) encodes group index, HART index,
H A Dsifive,plic-1.0.0.yaml17 A hart context is a privilege mode in a hardware execution thread. For example,
19 privilege modes per hart; machine mode and supervisor mode.
/linux-6.15/arch/loongarch/kernel/
H A Dhw_breakpoint.c189 u32 ctrl, privilege; in hw_breakpoint_control() local
196 privilege = CTRL_PLV0_ENABLE; in hw_breakpoint_control()
198 privilege = CTRL_PLV3_ENABLE; in hw_breakpoint_control()
226 write_wb_reg(CSR_CFG_CTRL, i, 0, privilege); in hw_breakpoint_control()
232 write_wb_reg(CSR_CFG_CTRL, i, 1, ctrl | privilege); in hw_breakpoint_control()
/linux-6.15/Documentation/devicetree/bindings/bus/
H A Dst,stm32mp25-rifsc.yaml21 any security domains (secure, privilege, compartment).
30 security domains (secure, privilege, compartment).
/linux-6.15/arch/arm/kernel/
H A Dhw_breakpoint.c571 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info()
573 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info()
674 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
724 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
/linux-6.15/Documentation/userspace-api/
H A Dno_new_privs.rst26 promises not to grant the privilege to do anything that could not have
41 Note that ``no_new_privs`` does not prevent privilege changes that do not
H A Dspec_ctrl.rst7 privilege domains.
/linux-6.15/Documentation/translations/zh_CN/security/
H A Dcredentials.rst202 * UNIX exec privilege escalation bits (SUID/SGID);
203 * File capabilities exec privilege escalation bits.
/linux-6.15/include/uapi/linux/
H A Dipmi.h118 unsigned char privilege; member
/linux-6.15/Documentation/driver-api/firmware/
H A Dother_interfaces.rst24 Some features of the Intel Stratix10 SoC require a level of privilege
/linux-6.15/Documentation/devicetree/bindings/arm/firmware/
H A Dsdei.txt11 privilege level of the SDEI firmware (specified as part of the binding
/linux-6.15/Documentation/arch/parisc/
H A Dregisters.rst70 H (Higher-privilege trap) 0
71 L (Lower-privilege trap) 0
/linux-6.15/Documentation/ABI/testing/
H A Dconfigfs-tsm83 different privilege levels, like SEV-SNP "VMPL", specify the
84 privilege level via this attribute. The minimum acceptable
/linux-6.15/tools/perf/Documentation/
H A Dperf-arm-spe.txt149 … - collect physical address (as well as VA) of loads/stores (PMSCR.PA) - requires privilege
150 …1 - collect physical timestamp instead of virtual timestamp (PMSCR.PCT) - requires privilege
217 Root privilege is required to collect context packets. But these only increase the accuracy of
H A Dperf-top.txt254 The privilege levels may be omitted, in which case, the privilege levels of the associated
255 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
/linux-6.15/tools/testing/selftests/ftrace/
H A DREADME31 * Take care with side effects as the tests are run with root privilege.
/linux-6.15/Documentation/admin-guide/hw-vuln/
H A Dsrso.rst10 tricking the elevated privilege domain (the kernel) into leaking
96 privilege domain crossings (User->Kernel, Guest->Host).
H A Dgather_data_sampling.rst39 lower-privilege contexts like guests and when running outside SGX enclaves.
/linux-6.15/Documentation/admin-guide/sysctl/
H A Dfs.rst199 is to cross privilege boundaries when following a given hardlink (i.e. a
235 is to cross privilege boundaries when following a given symlink (i.e. a
257 privilege levels or is execute only will not be dumped.
/linux-6.15/Documentation/arch/x86/x86_64/
H A Dfred.rst11 privilege level (ring transitions). The FRED architecture was

123