| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/powerpc/ |
| H A D | ibm,powerpc-cpu-features.txt | 13 enablement, privilege, and compatibility metadata. 94 - usable-privilege 104 This property describes the privilege levels and/or software components 118 This property describes the HV privilege support required to enable the 119 feature to lesser privilege levels. If the property does not exist then no 137 This property describes the OS privilege support required to enable the 138 feature to lesser privilege levels. If the property does not exist then no 179 This property may exist when the usable-privilege property value has PR bit set. 213 usable-privilege = <1 | 2 | 4>; 219 usable-privilege = <1 | 2>; [all …]
|
| /OK3568_Linux_fs/kernel/arch/arm64/include/asm/ |
| H A D | hw_breakpoint.h | 17 privilege : 2, member 35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg() 49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
| /OK3568_Linux_fs/kernel/arch/arm64/kernel/ |
| H A D | hw_breakpoint.c | 140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument 142 switch (privilege) { in debug_exception_level() 148 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse() 582 int i, max_slots, privilege; in toggle_bp_registers() local 603 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers() 604 if (debug_exception_level(privilege) != el) in toggle_bp_registers() [all …]
|
| /OK3568_Linux_fs/kernel/arch/arm/include/asm/ |
| H A D | hw_breakpoint.h | 17 privilege : 2, 31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
| /OK3568_Linux_fs/kernel/Documentation/ia64/ |
| H A D | fsys.rst | 34 - execution is at privilege level 0 (most-privileged) 51 privilege level is at level 0, this means that fsys-mode requires some 58 Linux operates in fsys-mode when (a) the privilege level is 0 (most 70 to by "regs" was executing in user mode (privilege level 3). 177 is exited. This is accomplished with the help of the lower-privilege 181 "br.ret" instruction that lowers the privilege level, a trap will 216 breakpoint that triggers at any privilege level other than 222 syscall_via_break(), with privilege level 3. Note: the 228 taken _after_ restoring the privilege level, the CPU has already 241 syscall_via_break(), with privilege level 3.
|
| /OK3568_Linux_fs/buildroot/package/xinetd/ |
| H A D | 0005-CVE-2013-4342-xinetd-ignores-user-and-group-directiv.patch | 7 …MUX services without dropping privilege to match the service configuration allowing the service to…
|
| /OK3568_Linux_fs/u-boot/doc/ |
| H A D | README.fsl-trustzone-components | 7 privilege mode), but still some configurations of these peripherals 8 might be required while the bootloader is executing in EL3 privilege
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-gnome/recipes-extended/gparted/files/ |
| H A D | 0001-Install-polkit-action-unconditionally-executable-pke.patch | 22 dnl Find graphical privilege escalation program 43 dnl Check for alternative graphical privilege escalation programs.
|
| /OK3568_Linux_fs/kernel/arch/arm/kernel/ |
| H A D | hw_breakpoint.c | 570 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 572 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 673 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step() 723 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
|
| /OK3568_Linux_fs/buildroot/package/s6-networking/ |
| H A D | Config.in | 9 management, TCP access control, privilege escalation across
|
| /OK3568_Linux_fs/kernel/Documentation/userspace-api/ |
| H A D | no_new_privs.rst | 26 promises not to grant the privilege to do anything that could not have 41 Note that ``no_new_privs`` does not prevent privilege changes that do not
|
| /OK3568_Linux_fs/buildroot/package/libcap/ |
| H A D | Config.in | 8 privilege into a set of distinct privileges.
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
| H A D | safe_finger.patch | 22 #define UNPRIV_NAME "nobody" /* Preferred privilege level */
|
| /OK3568_Linux_fs/buildroot/package/gpsd/ |
| H A D | Config.in | 48 bool "GPSD privilege revocation user" 56 bool "GPSD privilege revocation group"
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | ipmi.h | 104 unsigned char privilege; member
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | ipmi.h | 104 unsigned char privilege; member
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | ipmi.h | 104 unsigned char privilege; member
|
| /OK3568_Linux_fs/kernel/Documentation/parisc/ |
| H A D | registers.rst | 70 H (Higher-privilege trap) 0 71 L (Lower-privilege trap) 0
|
| /OK3568_Linux_fs/kernel/Documentation/driver-api/firmware/ |
| H A D | other_interfaces.rst | 18 Some features of the Intel Stratix10 SoC require a level of privilege
|
| /OK3568_Linux_fs/external/xserver/debian/ |
| H A D | xserver-xorg-core.NEWS | 18 risk of privilege escalation due to X server bugs, but has some side effects:
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/arm/firmware/ |
| H A D | sdei.txt | 11 privilege level of the SDEI firmware (specified as part of the binding
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/polkit/polkit/ |
| H A D | 0001-pkexec-local-privilege-escalation-CVE-2021-4034.patch | 4 Subject: [PATCH 1/3] pkexec: local privilege escalation (CVE-2021-4034)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/polkit/ |
| H A D | polkit_0.119.bb | 27 file://0001-pkexec-local-privilege-escalation-CVE-2021-4034.patch \
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/ftrace/ |
| H A D | README | 31 * Take care with side effects as the tests are run with root privilege.
|
| /OK3568_Linux_fs/kernel/tools/perf/Documentation/ |
| H A D | perf-top.txt | 246 The privilege levels may be omitted, in which case, the privilege levels of the associated 247 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|