/linux-6.8/Documentation/devicetree/bindings/powerpc/ |
D | ibm,powerpc-cpu-features.txt | 13 enablement, privilege, and compatibility metadata. 94 - usable-privilege 104 This property describes the privilege levels and/or software components 118 This property describes the HV privilege support required to enable the 119 feature to lesser privilege levels. If the property does not exist then no 137 This property describes the OS privilege support required to enable the 138 feature to lesser privilege levels. If the property does not exist then no 179 This property may exist when the usable-privilege property value has PR bit set. 213 usable-privilege = <1 | 2 | 4>; 219 usable-privilege = <1 | 2>; [all …]
|
/linux-6.8/arch/powerpc/boot/dts/ |
D | microwatt.dts | 44 usable-privilege = <2>; 49 usable-privilege = <3>; 55 usable-privilege = <2>; 60 usable-privilege = <3>; 65 usable-privilege = <2>; 71 usable-privilege = <3>;
|
/linux-6.8/arch/arm64/include/asm/ |
D | hw_breakpoint.h | 17 privilege : 2, member 27 /* Privilege Levels */ 35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg() 49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/linux-6.8/arch/arm64/kernel/ |
D | hw_breakpoint.c | 137 * Convert a breakpoint privilege level to the corresponding exception 140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument 142 switch (privilege) { in debug_exception_level() 148 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 489 * Privilege in arch_build_bp_info() 494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse() 582 int i, max_slots, privilege; in toggle_bp_registers() local [all …]
|
/linux-6.8/arch/arm/include/asm/ |
D | hw_breakpoint.h | 17 privilege : 2, 31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg() 68 /* Privilege Levels */
|
/linux-6.8/arch/sparc/include/uapi/asm/ |
D | psr.h | 7 * PSTATE.PRIV for the current CPU privilege level. 24 #define PSR_PS 0x00000040 /* previous privilege level */ 25 #define PSR_S 0x00000080 /* current privilege level */
|
D | psrcompat.h | 10 #define PSR_PS 0x00000040 /* previous privilege level */ 11 #define PSR_S 0x00000080 /* current privilege level */
|
/linux-6.8/arch/x86/include/asm/ |
D | segment.h | 31 * privilege level 36 * When running on Xen PV, the actual privilege level of the kernel is 1, 37 * not 0. Testing the Requested Privilege Level in a segment selector to 39 * SEGMENT_RPL_MASK is wrong because the PV kernel's privilege level 43 * kernels because privilege level 2 is never used. 47 /* User mode is privilege level 3: */
|
/linux-6.8/include/linux/ |
D | tsm.h | 12 * Privilege level is a nested permission concept to allow confidential 19 * @privlevel: optional privilege level to associate with @outblob
|
/linux-6.8/Documentation/userspace-api/ |
D | no_new_privs.rst | 26 promises not to grant the privilege to do anything that could not have 41 Note that ``no_new_privs`` does not prevent privilege changes that do not
|
/linux-6.8/Documentation/ABI/testing/ |
D | configfs-tsm | 71 different privilege levels, like SEV-SNP "VMPL", specify the 72 privilege level via this attribute. The minimum acceptable
|
/linux-6.8/tools/perf/arch/x86/util/ |
D | evsel.c | 118 return scnprintf(msg, size, "AMD IBS doesn't support privilege filtering. Try " in arch_evsel__open_strerror() 119 "again without the privilege modifiers (like 'k') at the end."); in arch_evsel__open_strerror()
|
/linux-6.8/tools/perf/Documentation/ |
D | perf-arm-spe.txt | 140 … - collect physical address (as well as VA) of loads/stores (PMSCR.PA) - requires privilege 141 …1 - collect physical timestamp instead of virtual timestamp (PMSCR.PCT) - requires privilege 206 Root privilege is required to collect context packets. But these only increase the accuracy of
|
D | perf-top.txt | 250 The privilege levels may be omitted, in which case, the privilege levels of the associated 251 event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
|
/linux-6.8/Documentation/admin-guide/LSM/ |
D | Smack.rst | 425 Privilege: 427 policy is said to have privilege. As of this writing a task can 428 have privilege either by possessing capabilities or by having an 614 only be changed by a process with privilege. 616 Privilege section in Smack Basics 779 privilege. 793 program has appropriate privilege:: 798 packets will be checked if the program has appropriate privilege.
|
/linux-6.8/tools/testing/selftests/powerpc/dscr/ |
D | dscr_explicit_test.c | 7 * privilege state SPR and the problem state SPR for this purpose. 9 * When using the privilege state SPR, the instructions such as
|
D | dscr_user_test.c | 10 * When using the privilege state SPR, the instructions such as
|
/linux-6.8/Documentation/admin-guide/hw-vuln/ |
D | srso.rst | 10 tricking the elevated privilege domain (the kernel) into leaking 96 privilege domain crossings (User->Kernel, Guest->Host).
|
/linux-6.8/Documentation/devicetree/bindings/interrupt-controller/ |
D | sifive,plic-1.0.0.yaml | 17 A hart context is a privilege mode in a hardware execution thread. For example, 19 privilege modes per hart; machine mode and supervisor mode.
|
/linux-6.8/Documentation/arch/powerpc/ |
D | ultravisor.rst | 26 | Privilege States | 68 * The privilege of a process is now determined by three MSR bits, 70 from least privilege to highest privilege. The higher privilege 71 modes can access all the resources of the lower privilege modes. 76 | S | HV| PR|Privilege | 90 | S | HV| PR|Privilege |
|
/linux-6.8/arch/x86/include/asm/xen/ |
D | interface.h | 127 * The privilege level specifies which modes may enter a trap via a software 129 * privilege levels as follows: 143 uint8_t flags; /* 0-3: privilege level; 4: clear event enable? */
|
/linux-6.8/arch/arm/kernel/ |
D | hw_breakpoint.c | 569 /* Privilege */ in arch_build_bp_info() 570 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 572 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 673 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step() 723 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
|
/linux-6.8/Documentation/devicetree/bindings/arm/firmware/ |
D | sdei.txt | 11 privilege level of the SDEI firmware (specified as part of the binding
|
/linux-6.8/Documentation/admin-guide/sysctl/ |
D | fs.rst | 194 is to cross privilege boundaries when following a given hardlink (i.e. a 230 is to cross privilege boundaries when following a given symlink (i.e. a 252 privilege levels or is execute only will not be dumped.
|
/linux-6.8/Documentation/security/ |
D | credentials.rst | 238 * UNIX exec privilege escalation bits (SUID/SGID); 239 * File capabilities exec privilege escalation bits. 243 privilege escalation bits come into play, and may allow the resulting process 550 To avoid "confused deputy" privilege escalation attacks, access control checks
|