Home
last modified time | relevance | path

Searched refs:privilege (Results 1 - 21 of 21) sorted by relevance

/kernel/linux/linux-5.10/arch/arm64/include/asm/
H A Dhw_breakpoint.h17 privilege : 2, member
35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/kernel/linux/linux-6.6/arch/arm64/include/asm/
H A Dhw_breakpoint.h17 privilege : 2, member
35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg()
38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg()
49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/kernel/linux/linux-5.10/arch/arm64/kernel/
H A Dhw_breakpoint.c137 * Convert a breakpoint privilege level to the corresponding exception
140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
142 switch (privilege) { in debug_exception_level()
148 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
582 int i, max_slots, privilege; in toggle_bp_registers() local
[all...]
/kernel/linux/linux-6.6/arch/arm64/kernel/
H A Dhw_breakpoint.c137 * Convert a breakpoint privilege level to the corresponding exception
140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument
142 switch (privilege) { in debug_exception_level()
148 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level()
229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control()
494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info()
496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info()
569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse()
582 int i, max_slots, privilege; in toggle_bp_registers() local
[all...]
/kernel/linux/linux-5.10/arch/arm/include/asm/
H A Dhw_breakpoint.h17 privilege : 2, member
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/kernel/linux/linux-6.6/arch/arm/include/asm/
H A Dhw_breakpoint.h17 privilege : 2, member
31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg()
39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
/kernel/linux/linux-5.10/arch/arm/kernel/
H A Dhw_breakpoint.c570 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info()
572 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info()
673 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
723 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
/kernel/linux/linux-6.6/arch/arm/kernel/
H A Dhw_breakpoint.c570 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info()
572 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info()
673 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step()
723 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
/kernel/linux/linux-5.10/include/uapi/linux/
H A Dipmi.h104 unsigned char privilege; member
/kernel/linux/linux-6.6/include/uapi/linux/
H A Dipmi.h118 unsigned char privilege; member
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/
H A Dipmi.h47 unsigned char privilege; member
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/
H A Dipmi.h47 unsigned char privilege; member
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/
H A Dipmi.h35 unsigned char privilege; member
/kernel/linux/linux-5.10/security/smack/
H A Dsmack_access.c633 * privilege to violate MAC policy. If no labels are
641 * smack_privileged_cred - are all privilege requirements met by cred
679 * smack_privileged - are all privilege requirements met
/kernel/linux/linux-6.6/security/smack/
H A Dsmack_access.c633 * privilege to violate MAC policy. If no labels are
641 * smack_privileged_cred - are all privilege requirements met by cred
679 * smack_privileged - are all privilege requirements met
/kernel/linux/linux-5.10/drivers/net/ethernet/emulex/benet/
H A Dbe_cmds.c3605 /* Get privilege(s) for a function */
3606 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege, in be_cmd_get_fn_privileges() argument
3634 *privilege = le32_to_cpu(resp->privilege_mask); in be_cmd_get_fn_privileges()
3637 * Override with correct privilege equivalent to PF. in be_cmd_get_fn_privileges()
3641 *privilege = MAX_PRIVILEGES; in be_cmd_get_fn_privileges()
3649 /* Set privilege(s) for a function */
H A Dbe_cmds.h2462 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege,
/kernel/linux/linux-6.6/drivers/net/ethernet/emulex/benet/
H A Dbe_cmds.c3606 /* Get privilege(s) for a function */
3607 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege, in be_cmd_get_fn_privileges() argument
3635 *privilege = le32_to_cpu(resp->privilege_mask); in be_cmd_get_fn_privileges()
3638 * Override with correct privilege equivalent to PF. in be_cmd_get_fn_privileges()
3642 *privilege = MAX_PRIVILEGES; in be_cmd_get_fn_privileges()
3650 /* Set privilege(s) for a function */
H A Dbe_cmds.h2462 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege,
/kernel/linux/linux-5.10/drivers/char/ipmi/
H A Dipmi_msghandler.c3846 lan_addr.privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_rsp()
3949 lan_addr->privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_cmd()
/kernel/linux/linux-6.6/drivers/char/ipmi/
H A Dipmi_msghandler.c4135 lan_addr.privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_rsp()
4238 lan_addr->privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_cmd()

Completed in 51 milliseconds