| /Linux-v5.4/Documentation/devicetree/bindings/powerpc/ | 
| D | ibm,powerpc-cpu-features.txt | 13 enablement, privilege, and compatibility metadata. 94 - usable-privilege 104   This property describes the privilege levels and/or software components 118   This property describes the HV privilege support required to enable the 119   feature to lesser privilege levels. If the property does not exist then no 137   This property describes the OS privilege support required to enable the 138   feature to lesser privilege levels. If the property does not exist then no 179   This property may exist when the usable-privilege property value has PR bit set. 213 			usable-privilege = <1 | 2 | 4>; 219 			usable-privilege = <1 | 2>; [all …] 
 | 
| /Linux-v5.4/arch/arm64/include/asm/ | 
| D | hw_breakpoint.h | 17 	privilege	: 2,  member 27 /* Privilege Levels */ 35 	u32 val = (ctrl.len << 5) | (ctrl.type << 3) | (ctrl.privilege << 1) |  in encode_ctrl_reg() 38 	if (is_kernel_in_hyp_mode() && ctrl.privilege == AARCH64_BREAKPOINT_EL1)  in encode_ctrl_reg() 49 	ctrl->privilege	= reg & 0x3;  in decode_ctrl_reg()
  | 
| /Linux-v5.4/Documentation/ia64/ | 
| D | fsys.rst | 34   - execution is at privilege level 0 (most-privileged) 51 privilege level is at level 0, this means that fsys-mode requires some 58 Linux operates in fsys-mode when (a) the privilege level is 0 (most 70 to by "regs" was executing in user mode (privilege level 3). 177 is exited.  This is accomplished with the help of the lower-privilege 181 "br.ret" instruction that lowers the privilege level, a trap will 216 	breakpoint that triggers at any privilege level other than 222 	syscall_via_break(), with privilege level 3.  Note: the 228 	taken _after_ restoring the privilege level, the CPU has already 241 	syscall_via_break(), with privilege level 3.
  | 
| /Linux-v5.4/arch/arm/include/asm/ | 
| D | hw_breakpoint.h | 17 		privilege	: 2, 31 		(ctrl.privilege << 1) | ctrl.enabled;  in encode_ctrl_reg() 39 	ctrl->privilege	= reg & 0x3;  in decode_ctrl_reg() 65 /* Privilege Levels */
  | 
| /Linux-v5.4/arch/arm64/kernel/ | 
| D | hw_breakpoint.c | 137  * Convert a breakpoint privilege level to the corresponding exception 140 static enum dbg_active_el debug_exception_level(int privilege)  in debug_exception_level()  argument 142 	switch (privilege) {  in debug_exception_level() 148 		pr_warning("invalid breakpoint privilege level %d\n", privilege);  in debug_exception_level() 229 	enum dbg_active_el dbg_el = debug_exception_level(info->ctrl.privilege);  in hw_breakpoint_control() 489 	 * Privilege  in arch_build_bp_info() 494 		hw->ctrl.privilege = AARCH64_BREAKPOINT_EL1;  in arch_build_bp_info() 496 		hw->ctrl.privilege = AARCH64_BREAKPOINT_EL0;  in arch_build_bp_info() 569 	if (hw->ctrl.privilege == AARCH64_BREAKPOINT_EL1 && bp->hw.target)  in hw_breakpoint_arch_parse() 582 	int i, max_slots, privilege;  in toggle_bp_registers()  local [all …] 
 | 
| /Linux-v5.4/arch/sparc/include/uapi/asm/ | 
| D | psr.h | 7  *        PSTATE.PRIV for the current CPU privilege level. 24 #define PSR_PS      0x00000040         /* previous privilege level   */ 25 #define PSR_S       0x00000080         /* current privilege level    */
  | 
| D | psrcompat.h | 10 #define PSR_PS      0x00000040         /* previous privilege level   */ 11 #define PSR_S       0x00000080         /* current privilege level    */
  | 
| D | pstate.h | 30 #define PSTATE_PRIV _AC(0x0000000000000004,UL) /* Privilege.		*/ 72 #define TSTATE_PRIV	_AC(0x0000000000000400,UL) /* Privilege.	*/
  | 
| /Linux-v5.4/tools/testing/selftests/powerpc/dscr/ | 
| D | dscr_explicit_test.c | 7  * privilege state SPR and the problem state SPR for this purpose. 9  * When using the privilege state SPR, the instructions such as
  | 
| D | dscr_user_test.c | 10  * When using the privilege state SPR, the instructions such as
  | 
| D | dscr_inherit_test.c | 9  * When using the privilege state SPR, the instructions such as
  | 
| /Linux-v5.4/Documentation/userspace-api/ | 
| D | no_new_privs.rst | 26 promises not to grant the privilege to do anything that could not have 41 Note that ``no_new_privs`` does not prevent privilege changes that do not
  | 
| /Linux-v5.4/Documentation/devicetree/bindings/interrupt-controller/ | 
| D | sifive,plic-1.0.0.txt | 9 A hart context is a privilege mode in a hardware execution thread.  For example, 11 privilege modes per hart; machine mode and supervisor mode.
  | 
| /Linux-v5.4/Documentation/admin-guide/LSM/ | 
| D | Smack.rst | 425   Privilege: 427 	policy is said to have privilege. As of this writing a task can 428 	have privilege either by possessing capabilities or by having an 614 only be changed by a process with privilege. 616 Privilege  subsection 779 privilege. 793 program has appropriate privilege:: 798 packets will be checked if the program has appropriate privilege.
  | 
| /Linux-v5.4/Documentation/powerpc/ | 
| D | ultravisor.rst | 26 	| Privilege States | 68     * The privilege of a process is now determined by three MSR bits, 70       from least privilege to highest privilege. The higher privilege 71       modes can access all the resources of the lower privilege modes. 76       | S | HV| PR|Privilege      | 90       | S | HV| PR|Privilege      |
  | 
| /Linux-v5.4/tools/perf/Documentation/ | 
| D | perf-top.txt | 235 	The privilege levels may be omitted, in which case, the privilege levels of the associated 236 	event are applied to the branch filter. Both kernel (k) and hypervisor (hv) privilege
  | 
| /Linux-v5.4/arch/ia64/include/asm/ | 
| D | pal.h | 519 			pl		: 2,	/* privilege level */ 520 			pv		: 1,	/* privilege level field valid */ 556 			pl		: 2,	/* privilege level */ 557 			pv		: 1,	/* privilege level field valid */ 592 			pl		: 2,	/* privilege level */ 593 			pv		: 1,	/* privilege level field valid */ 622 			pl		: 2,	/* privilege level */ 623 			pv		: 1,	/* privilege level field valid */ 652 			pl		: 2,	/* privilege level */ 653 			pv		: 1,	/* privilege level field valid */
  | 
| /Linux-v5.4/arch/c6x/include/asm/ | 
| D | traps.h | 17 #define EXCEPT_CAUSE_PRX  (1 << 6) /* privilege exception */
  | 
| /Linux-v5.4/security/ | 
| D | commoncap.c | 34  * to get full privilege on a kernel without file capabilities 308  * Erase the privilege-enhancing security markings on an inode. 705  * @effective: Do we have effective root privilege? 886 	/* Check for privilege-elevated exec. */  in cap_bprm_set_creds() 992  * of its privilege. The call to setuid(!=0) would drop all privileges! 1184 	 * system from legacy UID=0 based privilege (when filesystem  in cap_task_prctl() 1199 	 * capability-based-privilege environment.  in cap_task_prctl() 1214 			 * [4] doing anything requires privilege (go read about  in cap_task_prctl()
  | 
| /Linux-v5.4/arch/x86/include/asm/xen/ | 
| D | interface.h | 127  * The privilege level specifies which modes may enter a trap via a software 129  * privilege levels as follows: 143     uint8_t       flags;   /* 0-3: privilege level; 4: clear event enable?  */
  | 
| /Linux-v5.4/Documentation/devicetree/bindings/arm/firmware/ | 
| D | sdei.txt | 11 privilege level of the SDEI firmware (specified as part of the binding
  | 
| /Linux-v5.4/arch/sparc/include/asm/ | 
| D | psr.h | 7  *        PSTATE.PRIV for the current CPU privilege level.
  | 
| /Linux-v5.4/Documentation/driver-api/firmware/ | 
| D | other_interfaces.rst | 18 Some features of the Intel Stratix10 SoC require a level of privilege
  | 
| /Linux-v5.4/arch/arm/kernel/ | 
| D | hw_breakpoint.c | 566 	/* Privilege */  in arch_build_bp_info() 567 	hw->ctrl.privilege = ARM_BREAKPOINT_USER;  in arch_build_bp_info() 569 		hw->ctrl.privilege |= ARM_BREAKPOINT_PRIV;  in arch_build_bp_info() 670 	info->step_ctrl.privilege = info->ctrl.privilege;  in enable_single_step()
  | 
| /Linux-v5.4/arch/parisc/kernel/ | 
| D | syscall.S | 17 executing on this page executes with kernel level privilege (there's more to it 19 completer to activate the privilege promotion).  The upshot is that everything 20 that runs on the gateway page runs at kernel privilege but with the current 25 point.  For all the other functions, we execute at kernel privilege but don't 80 	gate	lws_start, %r0		/* increase privilege */ 91 	gate	.+8, %r0		/* increase privilege */
  |