/kernel/linux/linux-5.10/arch/arm64/include/asm/ |
H A D | hw_breakpoint.h | 17 privilege : 2, member 35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg() 49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/kernel/linux/linux-6.6/arch/arm64/include/asm/ |
H A D | hw_breakpoint.h | 17 privilege : 2, member 35 u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) | in encode_ctrl_reg() 38 if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1) in encode_ctrl_reg() 49 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/kernel/linux/linux-5.10/arch/arm64/kernel/ |
H A D | hw_breakpoint.c | 137 * Convert a breakpoint privilege level to the corresponding exception 140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument 142 switch (privilege) { in debug_exception_level() 148 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse() 582 int i, max_slots, privilege; in toggle_bp_registers() local [all...] |
/kernel/linux/linux-6.6/arch/arm64/kernel/ |
H A D | hw_breakpoint.c | 137 * Convert a breakpoint privilege level to the corresponding exception 140 static enum dbg_active_el debug_exception_level(int privilege) in debug_exception_level() argument 142 switch (privilege) { in debug_exception_level() 148 pr_warn("invalid breakpoint privilege level %d\n", privilege); in debug_exception_level() 229 enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege); in hw_breakpoint_control() 494 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1; in arch_build_bp_info() 496 hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0; in arch_build_bp_info() 569 if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target) in hw_breakpoint_arch_parse() 582 int i, max_slots, privilege; in toggle_bp_registers() local [all...] |
/kernel/linux/linux-5.10/arch/arm/include/asm/ |
H A D | hw_breakpoint.h | 17 privilege : 2, member 31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/kernel/linux/linux-6.6/arch/arm/include/asm/ |
H A D | hw_breakpoint.h | 17 privilege : 2, member 31 (ctrl.privilege << 1) | ctrl.enabled; in encode_ctrl_reg() 39 ctrl->privilege = reg & 0x3; in decode_ctrl_reg()
|
/kernel/linux/linux-5.10/arch/arm/kernel/ |
H A D | hw_breakpoint.c | 570 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 572 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 673 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step() 723 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
|
/kernel/linux/linux-6.6/arch/arm/kernel/ |
H A D | hw_breakpoint.c | 570 hw->ctrl.privilege = ARM_BREAKPOINT_USER; in arch_build_bp_info() 572 hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV; in arch_build_bp_info() 673 info->step_ctrl.privilege = info->ctrl.privilege; in enable_single_step() 723 return !user_mode(regs) && info->ctrl.privilege == ARM_BREAKPOINT_USER; in watchpoint_fault_on_uaccess()
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
H A D | ipmi.h | 104 unsigned char privilege; member
|
/kernel/linux/linux-6.6/include/uapi/linux/ |
H A D | ipmi.h | 118 unsigned char privilege; member
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
H A D | ipmi.h | 47 unsigned char privilege; member
|
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/ |
H A D | ipmi.h | 47 unsigned char privilege; member
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
H A D | ipmi.h | 35 unsigned char privilege; member
|
/kernel/linux/linux-5.10/security/smack/ |
H A D | smack_access.c | 633 * privilege to violate MAC policy. If no labels are 641 * smack_privileged_cred - are all privilege requirements met by cred 679 * smack_privileged - are all privilege requirements met
|
/kernel/linux/linux-6.6/security/smack/ |
H A D | smack_access.c | 633 * privilege to violate MAC policy. If no labels are 641 * smack_privileged_cred - are all privilege requirements met by cred 679 * smack_privileged - are all privilege requirements met
|
/kernel/linux/linux-5.10/drivers/net/ethernet/emulex/benet/ |
H A D | be_cmds.c | 3605 /* Get privilege(s) for a function */ 3606 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege, in be_cmd_get_fn_privileges() argument 3634 *privilege = le32_to_cpu(resp->privilege_mask); in be_cmd_get_fn_privileges() 3637 * Override with correct privilege equivalent to PF. in be_cmd_get_fn_privileges() 3641 *privilege = MAX_PRIVILEGES; in be_cmd_get_fn_privileges() 3649 /* Set privilege(s) for a function */
|
H A D | be_cmds.h | 2462 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege,
|
/kernel/linux/linux-6.6/drivers/net/ethernet/emulex/benet/ |
H A D | be_cmds.c | 3606 /* Get privilege(s) for a function */ 3607 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege, in be_cmd_get_fn_privileges() argument 3635 *privilege = le32_to_cpu(resp->privilege_mask); in be_cmd_get_fn_privileges() 3638 * Override with correct privilege equivalent to PF. in be_cmd_get_fn_privileges() 3642 *privilege = MAX_PRIVILEGES; in be_cmd_get_fn_privileges() 3650 /* Set privilege(s) for a function */
|
H A D | be_cmds.h | 2462 int be_cmd_get_fn_privileges(struct be_adapter *adapter, u32 *privilege,
|
/kernel/linux/linux-5.10/drivers/char/ipmi/ |
H A D | ipmi_msghandler.c | 3846 lan_addr.privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_rsp() 3949 lan_addr->privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_cmd()
|
/kernel/linux/linux-6.6/drivers/char/ipmi/ |
H A D | ipmi_msghandler.c | 4135 lan_addr.privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_rsp() 4238 lan_addr->privilege = msg->rsp[3] >> 4; in handle_lan_get_msg_cmd()
|