Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 25 of 77) sorted by relevance

1234

/OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/powerpc/
H A Dibm,powerpc-cpu-features.txt13 enablement, privilege, and compatibility metadata.
94 - usable-privilege
104 This property describes the privilege levels and/or software components
118 This property describes the HV privilege support required to enable the
119 feature to lesser privilege levels. If the property does not exist then no
137 This property describes the OS privilege support required to enable the
138 feature to lesser privilege levels. If the property does not exist then no
179 This property may exist when the usable-privilege property value has PR bit set.
213 usable-privilege = <1 | 2 | 4>;
219 usable-privilege = <1 | 2>;
[all …]
/OK3568_Linux_fs/kernel/arch/arm64/include/asm/
H A Dhw_breakpoint.h17 privilege : 2, member
35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/OK3568_Linux_fs/kernel/arch/arm64/kernel/
H A Dhw_breakpoint.c140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
142 switch (privilege) { in debug_exception_level()
148 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
582 int i, max_slots, privilege; in toggle_bp_registers() local
603 privilege = counter_arch_bp(slots[i])->ctrl.privilege; in toggle_bp_registers()
604 if (debug_exception_level(privilege) != el) in toggle_bp_registers()
[all …]
/OK3568_Linux_fs/kernel/arch/arm/include/asm/
H A Dhw_breakpoint.h17 privilege : 2,
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/OK3568_Linux_fs/kernel/Documentation/ia64/
H A Dfsys.rst34 - execution is at privilege level 0 (most-privileged)
51 privilege level is at level 0, this means that fsys-mode requires some
58 Linux operates in fsys-mode when (a) the privilege level is 0 (most
70 to by "regs" was executing in user mode (privilege level 3).
177 is exited. This is accomplished with the help of the lower-privilege
181 "br.ret" instruction that lowers the privilege level, a trap will
216 breakpoint that triggers at any privilege level other than
222 syscall_via_break(), with privilege level 3. Note: the
228 taken _after_ restoring the privilege level, the CPU has already
241 syscall_via_break(), with privilege level 3.
/OK3568_Linux_fs/buildroot/package/xinetd/
H A D0005-CVE-2013-4342-xinetd-ignores-user-and-group-directiv.patch7 …MUX services without dropping privilege to match the service configuration allowing the service to…
/OK3568_Linux_fs/u-boot/doc/
H A DREADME.fsl-trustzone-components7 privilege mode), but still some configurations of these peripherals
8 might be required while the bootloader is executing in EL3 privilege
/OK3568_Linux_fs/yocto/meta-openembedded/meta-gnome/recipes-extended/gparted/files/
H A D0001-Install-polkit-action-unconditionally-executable-pke.patch22 dnl Find graphical privilege escalation program
43 dnl Check for alternative graphical privilege escalation programs.
/OK3568_Linux_fs/kernel/arch/arm/kernel/
H A Dhw_breakpoint.c570 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info()
572 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info()
673 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
723 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
/OK3568_Linux_fs/buildroot/package/s6-networking/
H A DConfig.in9 management, TCP access control, privilege escalation across
/OK3568_Linux_fs/kernel/Documentation/userspace-api/
H A Dno_new_privs.rst26 promises not to grant the privilege to do anything that could not have
41 Note that ``no_new_privs`` does not prevent privilege changes that do not
/OK3568_Linux_fs/buildroot/package/libcap/
H A DConfig.in8 privilege into a set of distinct privileges.
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/
H A Dsafe_finger.patch22 #define UNPRIV_NAME "nobody" /* Preferred privilege level */
/OK3568_Linux_fs/buildroot/package/gpsd/
H A DConfig.in48 bool "GPSD privilege revocation user"
56 bool "GPSD privilege revocation group"
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/
H A Dipmi.h104 unsigned char privilege; member
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/
H A Dipmi.h104 unsigned char privilege; member
/OK3568_Linux_fs/kernel/include/uapi/linux/
H A Dipmi.h104 unsigned char privilege; member
/OK3568_Linux_fs/kernel/Documentation/parisc/
H A Dregisters.rst70 H (Higher-privilege trap) 0
71 L (Lower-privilege trap) 0
/OK3568_Linux_fs/kernel/Documentation/driver-api/firmware/
H A Dother_interfaces.rst18 Some features of the Intel Stratix10 SoC require a level of privilege
/OK3568_Linux_fs/external/xserver/debian/
H A Dxserver-xorg-core.NEWS18 risk of privilege escalation due to X server bugs, but has some side effects:
/OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/arm/firmware/
H A Dsdei.txt11 privilege level of the SDEI firmware (specified as part of the binding
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/polkit/polkit/
H A D0001-pkexec-local-privilege-escalation-CVE-2021-4034.patch4 Subject: [PATCH 1/3] pkexec: local privilege escalation (CVE-2021-4034)
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/polkit/
H A Dpolkit_0.119.bb27 file://0001-pkexec-local-privilege-escalation-CVE-2021-4034.patch \
/OK3568_Linux_fs/kernel/tools/testing/selftests/ftrace/
H A DREADME31 * Take care with side effects as the tests are run with root privilege.
/OK3568_Linux_fs/kernel/tools/perf/Documentation/
H A Dperf-top.txt246 The privilege levels may be omitted, in which case, the privilege levels of the associated
247 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege

1234