Searched refs:privileged (Results 1 – 25 of 31) sorted by relevance
12
370 privileged reg70 (sr0): undefined371 privileged reg71 (sr1): undefined372 privileged reg72 (sr2): undefined373 privileged reg73 (sr3): undefined374 privileged reg74 (sr4): undefined375 privileged reg75 (sr5): undefined376 privileged reg76 (sr6): undefined377 privileged reg77 (sr7): undefined378 privileged reg78 (sr8): undefined379 privileged reg79 (sr9): undefined[all …]
49 cp ./capsh ./privileged && chmod -s ./privileged56 ./setcap all=ep ./privileged61 ./setcap cap_setuid,cap_setgid=ep ./privileged88 rm -f privileged109 ./setcap cap_setuid,cap_setgid=ei ./privileged116 rm -f ./privileged
49 csch,"clear subchannel",N/A,"privileged instruction"51 csp,"compare and swap and purge",N/A,"privileged instruction"60 diag,diagnose,N/A,"privileged instruction"67 epar,"extract primary ASN",N/A,"privileged instruction"68 epair,"extract primary ASN and instance",N/A,"privileged instruction"70 esar,"extract secondary ASN",N/A,"privileged instruction",71 esair,"extract secondary ASN and instance,N/A,"privileged instruction",76 hsch,"halt subchannel",N/A,"privileged instruction"77 iac,"insert address space control",N/A,"privileged instruction"80 ipk,"insert PSW key",N/A,"privileged instruction"[all …]
8 Enforces a whitelist of known, allowed reserved privileged processes on the system12 To maintain a minimal set of reserved privileged processes on the system15 Fail if the list of reserved privileged processes doesn't match the baseline
255 def _GetRowsForTestInRange(test_key, start_rev, end_rev, privileged=False): argument257 if privileged:266 def _GetRowsForTestAroundRev(test_key, rev, num_points, privileged=False): argument271 if privileged:279 if privileged:290 def _GetLatestRowsForTest(test_key, num_points, privileged=False): argument292 if privileged:
134 /* -p privileged shell (suid) */136 FN("privileged", FPRIVILEGED, OF_ANY
71 FN("privileged", FPRIVILEGED, OF_ANY, 'p')
227 extern int privileged; /* We were run by real-uid root */702 int privileged));706 int options_from_list __P((struct wordlist *, int privileged));
148 int privileged; /* we're running as real uid root */ variable340 privileged = uid == 0;369 privileged = 1;406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
488 privileged = 1;1239 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { in auth_check_options()2014 return allow_any_ip || privileged || !have_route_to(addr);
379 privileged_option = privileged;503 ret = options_from_file(path, 0, 1, privileged); in options_from_user()
64 that enjoys privileged access, or that they do not wish to separate
31 <para>If enabled, privileged operations are done in the wpa_priv process45 non-privileged user account created just for this purpose to limit access
10 Due to its inclusion in AOSP as a privileged app, building SL4A requires a system build.
44 type. Being able to bind to any privileged port is still a formidable
920 privileged operations into a separate process (wpa_priv) while leaving929 enabled, the privileged operations (driver wrapper and l2_packet) are932 wrappers that communicate with the privileged wpa_priv process to933 perform the needed operations. wpa_priv can control what privileged941 on a laptop or as a special non-privileged user account created just969 Linux capabilities instead of privileged process974 by running wpa_supplicant as a privileged process with effective user id
241 # privileged user
161 <command/tracepath/ is not a privileged program, unlike
163 // This also allows non-privileged users on the local host to manage
233 One idea is to disallow not privileged user to allocate flow
META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF ...
173 // Special Registers - only available in privileged mode.
1130 principalAprivatisation)GI!5N&K5P</&Eprivatization)GI!5N&K5P</&EprivilegedD…
11 // privileged modes. These are not typically used by the compiler, but are
85 * Worked around a kernel bug in tracing privileged executables.