/external/elfutils/tests/ |
D | run-addrcfi.sh | 370 privileged reg70 (sr0): undefined 371 privileged reg71 (sr1): undefined 372 privileged reg72 (sr2): undefined 373 privileged reg73 (sr3): undefined 374 privileged reg74 (sr4): undefined 375 privileged reg75 (sr5): undefined 376 privileged reg76 (sr6): undefined 377 privileged reg77 (sr7): undefined 378 privileged reg78 (sr8): undefined 379 privileged reg79 (sr9): undefined [all …]
|
/external/libcap/progs/ |
D | quicktest.sh | 55 cp ./tcapsh-static ./privileged && /bin/chmod -s ./privileged 62 ./setcap all=ep ./privileged 67 ./setcap cap_setuid,cap_setgid=ep ./privileged 78 fail_capsh --user=nobody --mode=NOPRIV --print -- ./privileged 110 rm -f privileged 135 ./setcap cap_setuid,cap_setgid=ei ./privileged 208 ./setcap = ./privileged 212 ./setcap -r ./privileged 219 /bin/rm -f ./privileged
|
/external/openssh/ |
D | uidswap.c | 65 static int privileged = 0; variable 87 privileged = 0; in temporarily_use_uid() 93 privileged = 0; in temporarily_use_uid() 98 privileged = 1; in temporarily_use_uid() 160 if (!privileged) { in restore_uid()
|
D | README.privsep | 3 privileged monitor process. Its purpose is to prevent privilege 29 --with-privsep-user=user Specify non-privileged user for privilege separation 50 process 6917 is the privileged monitor process, 6919 is the user owned
|
/external/google-fruit/extras/scripts/ |
D | postsubmit.sh | 16 linux-arm) docker run --rm --privileged multiarch/qemu-user-static:register --reset 20 docker run -d -it --name fruit --privileged "${DOCKER_IMAGE}"
|
/external/javassist/src/main/javassist/util/proxy/ |
D | DefineClassHelper.java | 118 if (privileged != null && getCallerClass.invoke(stack) != this.getClass()) in getReferencedUnsafe() 156 if (privileged != null && stack.getCallerClass() != this.getClass()) in getDefineClassMethodHandle() 192 if (privileged != null && stack.getCallerClass() != this.getClass()) in getDefineClassMethod() 230 private static final Helper privileged = ClassFile.MAJOR_VERSION > ClassFile.JAVA_10 field in DefineClassHelper 263 return privileged.defineClass(className, bcode, 0, bcode.length, in toClass()
|
D | DefinePackageHelper.java | 138 private static final Helper privileged field in DefinePackageHelper 168 privileged.definePackage(loader, className, in definePackage()
|
/external/openssh/contrib/cygwin/ |
D | README | 30 --user -u <account> privileged user for service, default 'cyg_server'. 31 --pwd -w <passwd> Use "pwd" as password for privileged user. 32 --privileged On Windows XP, require privileged user
|
/external/ltp/testcases/kernel/security/prot_hsymlinks/ |
D | README | 22 2. Hard links restriction applies only to non-privileged users. Only 23 non-privileged user can't create hard links to files if he isn't owner
|
/external/mtools/ |
D | plain_io.c | 49 int privileged; member 416 if(This->privileged) in scsi_io() 422 if(This->privileged) in scsi_io() 535 This->privileged = IS_PRIVILEGED(dev); in SimpleFileOpen() 696 if(This->privileged) in SimpleFileOpen() 699 if(This->privileged) in SimpleFileOpen()
|
/external/igt-gpu-tools/tests/i915/ |
D | gem_mocs_settings.c | 320 bool privileged) in write_registers() argument 336 if (privileged) in write_registers() 474 bool privileged) in write_dirty_mocs() argument 485 engine, privileged); in write_dirty_mocs() 490 engine, privileged); in write_dirty_mocs()
|
/external/libcap/doc/values/ |
D | 27.txt | 1 Allows a process to perform privileged operations with
|
D | 10.txt | 1 Allows a process to bind to privileged ports:
|
D | 38.txt | 1 Allows a process to enable observability of privileged
|
/external/virglrenderer/perf-testing/ |
D | perfetto-ui.sh | 16 --privileged \
|
/external/google-fruit/extras/dockerfiles/ |
D | rebuild_all.sh | 6 docker run --rm --privileged multiarch/qemu-user-static:register --reset
|
/external/llvm-project/clang-tools-extra/docs/clang-tidy/checks/ |
D | android-cloexec-epoll-create1.rst | 8 would remain open across a fork+exec to a lower-privileged SELinux domain.
|
D | android-cloexec-inotify-init1.rst | 8 remain open across a fork+exec to a lower-privileged SELinux domain.
|
D | android-cloexec-accept4.rst | 8 remain open across a fork+exec to a lower-privileged SELinux domain.
|
D | android-cloexec-accept.rst | 8 a fork+exec to a lower-privileged SELinux domain.
|
D | android-cloexec-memfd-create.rst | 8 remain open across a fork+exec to a lower-privileged SELinux domain.
|
D | android-cloexec-socket.rst | 8 remain open across a fork+exec to a lower-privileged SELinux domain.
|
D | android-cloexec-dup.rst | 8 remain open across a fork+exec to a lower-privileged SELinux domain.
|
/external/libchrome/mojo/public/tools/bindings/ |
D | chromium_bindings_configuration.gni | 45 "//services/viz/privileged/cpp/typemaps.gni", 46 "//services/viz/privileged/interfaces/compositing/typemaps.gni",
|
/external/skia/tools/skqp/ |
D | docker_run_apk.sh | 29 docker run --privileged --rm -d \
|