Lines Matching full:unprivileged
54 ID is 0, referred to as superuser or root), and b) unprivileged
60 Unprivileged processes are subject to a full security permission check
67 files of unprivileged users.
69 Unprivileged processes with enabled CAP_PERFMON capability are treated
87 Unprivileged processes using perf_events system call are also subject
89 outcome determines whether monitoring is permitted. So unprivileged
93 Other capabilities being granted to unprivileged processes can
166 Unprivileged users
169 perf_events *scope* and *access* control for unprivileged processes
186 imposed but ignored for unprivileged processes with CAP_IPC_LOCK
195 unprivileged processes with CAP_IPC_LOCK capability.
202 unprivileged processes with CAP_IPC_LOCK capability.