Searched refs:privileged (Results 1 – 25 of 72) sorted by relevance
123
/external/elfutils/tests/ |
D | run-addrcfi.sh | 370 privileged reg70 (sr0): undefined 371 privileged reg71 (sr1): undefined 372 privileged reg72 (sr2): undefined 373 privileged reg73 (sr3): undefined 374 privileged reg74 (sr4): undefined 375 privileged reg75 (sr5): undefined 376 privileged reg76 (sr6): undefined 377 privileged reg77 (sr7): undefined 378 privileged reg78 (sr8): undefined 379 privileged reg79 (sr9): undefined [all …]
|
/external/libcap/progs/ |
D | quicktest.sh | 49 cp ./capsh ./privileged && chmod -s ./privileged 56 ./setcap all=ep ./privileged 61 ./setcap cap_setuid,cap_setgid=ep ./privileged 88 rm -f privileged 113 ./setcap cap_setuid,cap_setgid=ei ./privileged 120 rm -f ./privileged
|
/external/openssh/ |
D | uidswap.c | 60 static int privileged = 0; variable 81 privileged = 0; in temporarily_use_uid() 87 privileged = 0; in temporarily_use_uid() 92 privileged = 1; in temporarily_use_uid() 182 if (!privileged) { in restore_uid()
|
D | README.privsep | 3 privileged monitor process. Its purpose is to prevent privilege 32 --with-privsep-user=user Specify non-privileged user for privilege separation 53 process 6917 is the privileged monitor process, 6919 is the user owned
|
/external/openssh/contrib/cygwin/ |
D | README | 30 --user -u <account> privileged user for service, default 'cyg_server'. 31 --pwd -w <passwd> Use "pwd" as password for privileged user. 32 --privileged On Windows XP, require privileged user
|
/external/google-fruit/extras/scripts/ |
D | postsubmit.sh | 16 linux-arm) docker run --rm --privileged multiarch/qemu-user-static:register --reset 20 docker run -d -it --name fruit --privileged "${DOCKER_IMAGE}"
|
/external/ltp/testcases/kernel/security/prot_hsymlinks/ |
D | README | 22 2. Hard links restriction applies only to non-privileged users. Only 23 non-privileged user can't create hard links to files if he isn't owner
|
/external/libchrome/mojo/public/tools/bindings/ |
D | chromium_bindings_configuration.gni | 45 "//services/viz/privileged/cpp/typemaps.gni", 46 "//services/viz/privileged/interfaces/compositing/typemaps.gni",
|
/external/bcc/ |
D | QUICKSTART.md | 8 --privileged \
|
/external/autotest/client/site_tests/security_DeviceJail_Lockdown/ |
D | control | 16 The test will fail if it can perform a privileged operation on a jail
|
/external/mksh/src/ |
D | sh_flags.opt | 134 /* -p privileged shell (suid) */ 136 FN("privileged", FPRIVILEGED, OF_ANY
|
/external/ppp/pppd/ |
D | pppd.h | 227 extern int privileged; /* We were run by real-uid root */ 702 int privileged)); 706 int options_from_list __P((struct wordlist *, int privileged));
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_priv.sgml | 31 <para>If enabled, privileged operations are done in the wpa_priv process 45 non-privileged user account created just for this purpose to limit access
|
/external/mesa3d/docs/specs/OLD/ |
D | MESA_trace.spec | 64 that enjoys privileged access, or that they do not wish to separate
|
/external/arm-neon-tests/ |
D | InitCache.s | 6 ; This code must be run from a privileged mode
|
/external/skia/infra/skqp/docker/ |
D | README.md | 30 docker run --privileged -d --name android_em \
|
/external/skqp/infra/skqp/docker/ |
D | README.md | 30 docker run --privileged -d --name android_em \
|
/external/skia/infra/pathkit/docker/karma-chrome-tests/ |
D | Dockerfile | 37 # Run everything after as non-privileged user.
|
/external/skqp/infra/pathkit/docker/karma-chrome-tests/ |
D | Dockerfile | 37 # Run everything after as non-privileged user.
|
/external/skia/infra/lottiecap/docker/lottie-web-puppeteer/ |
D | Dockerfile | 43 # Run everything after as non-privileged user.
|
/external/skqp/infra/lottiecap/docker/lottie-web-puppeteer/ |
D | Dockerfile | 43 # Run everything after as non-privileged user.
|
/external/skia/infra/skqp/docker/android-skqp/ |
D | Dockerfile | 6 # docker run --privileged -d --name android_em -e DEVICE="Samsung Galaxy S6" butomo1989/docker-andr…
|
/external/skqp/infra/skqp/docker/android-skqp/ |
D | Dockerfile | 6 # docker run --privileged -d --name android_em -e DEVICE="Samsung Galaxy S6" butomo1989/docker-andr…
|
/external/python/cpython3/Misc/NEWS.d/ |
D | 3.5.5rc1.rst | 10 considered a potential security issue, as it may lead to privileged
|
/external/sl4a/ |
D | README.md | 10 Due to its inclusion in AOSP as a privileged app, building SL4A requires a system build.
|
123