Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 72) sorted by relevance

123

/external/elfutils/tests/
Drun-addrcfi.sh370 privileged reg70 (sr0): undefined
371 privileged reg71 (sr1): undefined
372 privileged reg72 (sr2): undefined
373 privileged reg73 (sr3): undefined
374 privileged reg74 (sr4): undefined
375 privileged reg75 (sr5): undefined
376 privileged reg76 (sr6): undefined
377 privileged reg77 (sr7): undefined
378 privileged reg78 (sr8): undefined
379 privileged reg79 (sr9): undefined
[all …]
/external/libcap/progs/
Dquicktest.sh49 cp ./capsh ./privileged && chmod -s ./privileged
56 ./setcap all=ep ./privileged
61 ./setcap cap_setuid,cap_setgid=ep ./privileged
88 rm -f privileged
113 ./setcap cap_setuid,cap_setgid=ei ./privileged
120 rm -f ./privileged
/external/openssh/
Duidswap.c60 static int privileged = 0; variable
81 privileged = 0; in temporarily_use_uid()
87 privileged = 0; in temporarily_use_uid()
92 privileged = 1; in temporarily_use_uid()
182 if (!privileged) { in restore_uid()
DREADME.privsep3 privileged monitor process. Its purpose is to prevent privilege
32 --with-privsep-user=user Specify non-privileged user for privilege separation
53 process 6917 is the privileged monitor process, 6919 is the user owned
/external/openssh/contrib/cygwin/
DREADME30 --user -u <account> privileged user for service, default 'cyg_server'.
31 --pwd -w <passwd> Use "pwd" as password for privileged user.
32 --privileged On Windows XP, require privileged user
/external/google-fruit/extras/scripts/
Dpostsubmit.sh16 linux-arm) docker run --rm --privileged multiarch/qemu-user-static:register --reset
20 docker run -d -it --name fruit --privileged "${DOCKER_IMAGE}"
/external/ltp/testcases/kernel/security/prot_hsymlinks/
DREADME22 2. Hard links restriction applies only to non-privileged users. Only
23 non-privileged user can't create hard links to files if he isn't owner
/external/libchrome/mojo/public/tools/bindings/
Dchromium_bindings_configuration.gni45 "//services/viz/privileged/cpp/typemaps.gni",
46 "//services/viz/privileged/interfaces/compositing/typemaps.gni",
/external/bcc/
DQUICKSTART.md8 --privileged \
/external/autotest/client/site_tests/security_DeviceJail_Lockdown/
Dcontrol16 The test will fail if it can perform a privileged operation on a jail
/external/mksh/src/
Dsh_flags.opt134 /* -p privileged shell (suid) */
136 FN("privileged", FPRIVILEGED, OF_ANY
/external/ppp/pppd/
Dpppd.h227 extern int privileged; /* We were run by real-uid root */
702 int privileged));
706 int options_from_list __P((struct wordlist *, int privileged));
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_priv.sgml31 <para>If enabled, privileged operations are done in the wpa_priv process
45 non-privileged user account created just for this purpose to limit access
/external/mesa3d/docs/specs/OLD/
DMESA_trace.spec64 that enjoys privileged access, or that they do not wish to separate
/external/arm-neon-tests/
DInitCache.s6 ; This code must be run from a privileged mode
/external/skia/infra/skqp/docker/
DREADME.md30 docker run --privileged -d --name android_em \
/external/skqp/infra/skqp/docker/
DREADME.md30 docker run --privileged -d --name android_em \
/external/skia/infra/pathkit/docker/karma-chrome-tests/
DDockerfile37 # Run everything after as non-privileged user.
/external/skqp/infra/pathkit/docker/karma-chrome-tests/
DDockerfile37 # Run everything after as non-privileged user.
/external/skia/infra/lottiecap/docker/lottie-web-puppeteer/
DDockerfile43 # Run everything after as non-privileged user.
/external/skqp/infra/lottiecap/docker/lottie-web-puppeteer/
DDockerfile43 # Run everything after as non-privileged user.
/external/skia/infra/skqp/docker/android-skqp/
DDockerfile6 # docker run --privileged -d --name android_em -e DEVICE="Samsung Galaxy S6" butomo1989/docker-andr…
/external/skqp/infra/skqp/docker/android-skqp/
DDockerfile6 # docker run --privileged -d --name android_em -e DEVICE="Samsung Galaxy S6" butomo1989/docker-andr…
/external/python/cpython3/Misc/NEWS.d/
D3.5.5rc1.rst10 considered a potential security issue, as it may lead to privileged
/external/sl4a/
DREADME.md10 Due to its inclusion in AOSP as a privileged app, building SL4A requires a system build.

123