Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 31) sorted by relevance

12

/external/elfutils/tests/
Drun-addrcfi.sh370 privileged reg70 (sr0): undefined
371 privileged reg71 (sr1): undefined
372 privileged reg72 (sr2): undefined
373 privileged reg73 (sr3): undefined
374 privileged reg74 (sr4): undefined
375 privileged reg75 (sr5): undefined
376 privileged reg76 (sr6): undefined
377 privileged reg77 (sr7): undefined
378 privileged reg78 (sr8): undefined
379 privileged reg79 (sr9): undefined
[all …]
/external/libcap/progs/
Dquicktest.sh49 cp ./capsh ./privileged && chmod -s ./privileged
56 ./setcap all=ep ./privileged
61 ./setcap cap_setuid,cap_setgid=ep ./privileged
88 rm -f privileged
109 ./setcap cap_setuid,cap_setgid=ei ./privileged
116 rm -f ./privileged
/external/valgrind/docs/internals/
Ds390-opcodes.csv49 csch,"clear subchannel",N/A,"privileged instruction"
51 csp,"compare and swap and purge",N/A,"privileged instruction"
60 diag,diagnose,N/A,"privileged instruction"
67 epar,"extract primary ASN",N/A,"privileged instruction"
68 epair,"extract primary ASN and instance",N/A,"privileged instruction"
70 esar,"extract secondary ASN",N/A,"privileged instruction",
71 esair,"extract secondary ASN and instance,N/A,"privileged instruction",
76 hsch,"halt subchannel",N/A,"privileged instruction"
77 iac,"insert address space control",N/A,"privileged instruction"
80 ipk,"insert PSW key",N/A,"privileged instruction"
[all …]
/external/autotest/client/site_tests/security_ReservedPrivileges/
Dcontrol8 Enforces a whitelist of known, allowed reserved privileged processes on the system
12 To maintain a minimal set of reserved privileged processes on the system
15 Fail if the list of reserved privileged processes doesn't match the baseline
/external/chromium-trace/catapult/dashboard/dashboard/
Dgraph_json.py255 def _GetRowsForTestInRange(test_key, start_rev, end_rev, privileged=False): argument
257 if privileged:
266 def _GetRowsForTestAroundRev(test_key, rev, num_points, privileged=False): argument
271 if privileged:
279 if privileged:
290 def _GetLatestRowsForTest(test_key, num_points, privileged=False): argument
292 if privileged:
/external/mksh/src/
Dsh_flags.opt134 /* -p privileged shell (suid) */
136 FN("privileged", FPRIVILEGED, OF_ANY
Dsh_flags.gen71 FN("privileged", FPRIVILEGED, OF_ANY, 'p')
/external/ppp/pppd/
Dpppd.h227 extern int privileged; /* We were run by real-uid root */
702 int privileged));
706 int options_from_list __P((struct wordlist *, int privileged));
Dmain.c148 int privileged; /* we're running as real uid root */ variable
340 privileged = uid == 0;
369 privileged = 1;
406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
Dauth.c488 privileged = 1;
1239 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { in auth_check_options()
2014 return allow_any_ip || privileged || !have_route_to(addr);
Doptions.c379 privileged_option = privileged;
503 ret = options_from_file(path, 0, 1, privileged); in options_from_user()
/external/mesa3d/docs/OLD/
DMESA_trace.spec64 that enjoys privileged access, or that they do not wish to separate
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_priv.sgml31 <para>If enabled, privileged operations are done in the wpa_priv process
45 non-privileged user account created just for this purpose to limit access
/external/sl4a/
DREADME.md10 Due to its inclusion in AOSP as a privileged app, building SL4A requires a system build.
/external/libcap/doc/
Dcapability.notes44 type. Being able to bind to any privileged port is still a formidable
/external/wpa_supplicant_8/wpa_supplicant/
DREADME920 privileged operations into a separate process (wpa_priv) while leaving
929 enabled, the privileged operations (driver wrapper and l2_packet) are
932 wrappers that communicate with the privileged wpa_priv process to
933 perform the needed operations. wpa_priv can control what privileged
941 on a laptop or as a special non-privileged user account created just
969 Linux capabilities instead of privileged process
974 by running wpa_supplicant as a privileged process with effective user id
/external/autotest/client/tests/kvm/steps/
DFedora-8-64.steps241 # privileged user
/external/iputils/doc/
Dtracepath.sgml161 <command/tracepath/ is not a privileged program, unlike
/external/mdnsresponder/
DPrivateDNS.txt163 // This also allows non-privileged users on the local host to manage
/external/iproute2/doc/
Dapi-ip6-flowlabels.tex233 One idea is to disallow not privileged user to allocate flow
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
Dorg.eclipse.equinox.util_1.0.200.v20100503.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF ...
/external/llvm/lib/Target/ARM/
DARMRegisterInfo.td173 // Special Registers - only available in privileged mode.
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/en-GB/
Den-GB_klex.pkb1130 principalAprivatisation)GI!5N&K5P</&Eprivatization)GI!5N&K5P</&E privilegedD���������������…
/external/llvm/lib/Target/X86/
DX86InstrSystem.td11 // privileged modes. These are not typically used by the compiler, but are
/external/strace/
DNEWS85 * Worked around a kernel bug in tracing privileged executables.

12