Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 119) sorted by relevance

12345

/external/elfutils/tests/
Drun-addrcfi.sh370 privileged reg70 (sr0): undefined
371 privileged reg71 (sr1): undefined
372 privileged reg72 (sr2): undefined
373 privileged reg73 (sr3): undefined
374 privileged reg74 (sr4): undefined
375 privileged reg75 (sr5): undefined
376 privileged reg76 (sr6): undefined
377 privileged reg77 (sr7): undefined
378 privileged reg78 (sr8): undefined
379 privileged reg79 (sr9): undefined
[all …]
/external/libcap/progs/
Dquicktest.sh55 cp ./tcapsh-static ./privileged && /bin/chmod -s ./privileged
62 ./setcap all=ep ./privileged
67 ./setcap cap_setuid,cap_setgid=ep ./privileged
78 fail_capsh --user=nobody --mode=NOPRIV --print -- ./privileged
110 rm -f privileged
135 ./setcap cap_setuid,cap_setgid=ei ./privileged
208 ./setcap = ./privileged
212 ./setcap -r ./privileged
219 /bin/rm -f ./privileged
/external/openssh/
Duidswap.c65 static int privileged = 0; variable
87 privileged = 0; in temporarily_use_uid()
93 privileged = 0; in temporarily_use_uid()
98 privileged = 1; in temporarily_use_uid()
160 if (!privileged) { in restore_uid()
DREADME.privsep3 privileged monitor process. Its purpose is to prevent privilege
29 --with-privsep-user=user Specify non-privileged user for privilege separation
50 process 6917 is the privileged monitor process, 6919 is the user owned
/external/google-fruit/extras/scripts/
Dpostsubmit.sh16 linux-arm) docker run --rm --privileged multiarch/qemu-user-static:register --reset
20 docker run -d -it --name fruit --privileged "${DOCKER_IMAGE}"
/external/javassist/src/main/javassist/util/proxy/
DDefineClassHelper.java118 if (privileged != null && getCallerClass.invoke(stack) != this.getClass()) in getReferencedUnsafe()
156 if (privileged != null && stack.getCallerClass() != this.getClass()) in getDefineClassMethodHandle()
192 if (privileged != null && stack.getCallerClass() != this.getClass()) in getDefineClassMethod()
230 private static final Helper privileged = ClassFile.MAJOR_VERSION > ClassFile.JAVA_10 field in DefineClassHelper
263 return privileged.defineClass(className, bcode, 0, bcode.length, in toClass()
DDefinePackageHelper.java138 private static final Helper privileged field in DefinePackageHelper
168 privileged.definePackage(loader, className, in definePackage()
/external/openssh/contrib/cygwin/
DREADME30 --user -u <account> privileged user for service, default 'cyg_server'.
31 --pwd -w <passwd> Use "pwd" as password for privileged user.
32 --privileged On Windows XP, require privileged user
/external/ltp/testcases/kernel/security/prot_hsymlinks/
DREADME22 2. Hard links restriction applies only to non-privileged users. Only
23 non-privileged user can't create hard links to files if he isn't owner
/external/mtools/
Dplain_io.c49 int privileged; member
416 if(This->privileged) in scsi_io()
422 if(This->privileged) in scsi_io()
535 This->privileged = IS_PRIVILEGED(dev); in SimpleFileOpen()
696 if(This->privileged) in SimpleFileOpen()
699 if(This->privileged) in SimpleFileOpen()
/external/igt-gpu-tools/tests/i915/
Dgem_mocs_settings.c320 bool privileged) in write_registers() argument
336 if (privileged) in write_registers()
474 bool privileged) in write_dirty_mocs() argument
485 engine, privileged); in write_dirty_mocs()
490 engine, privileged); in write_dirty_mocs()
/external/libcap/doc/values/
D27.txt1 Allows a process to perform privileged operations with
D10.txt1 Allows a process to bind to privileged ports:
D38.txt1 Allows a process to enable observability of privileged
/external/virglrenderer/perf-testing/
Dperfetto-ui.sh16 --privileged \
/external/google-fruit/extras/dockerfiles/
Drebuild_all.sh6 docker run --rm --privileged multiarch/qemu-user-static:register --reset
/external/llvm-project/clang-tools-extra/docs/clang-tidy/checks/
Dandroid-cloexec-epoll-create1.rst8 would remain open across a fork+exec to a lower-privileged SELinux domain.
Dandroid-cloexec-inotify-init1.rst8 remain open across a fork+exec to a lower-privileged SELinux domain.
Dandroid-cloexec-accept4.rst8 remain open across a fork+exec to a lower-privileged SELinux domain.
Dandroid-cloexec-accept.rst8 a fork+exec to a lower-privileged SELinux domain.
Dandroid-cloexec-memfd-create.rst8 remain open across a fork+exec to a lower-privileged SELinux domain.
Dandroid-cloexec-socket.rst8 remain open across a fork+exec to a lower-privileged SELinux domain.
Dandroid-cloexec-dup.rst8 remain open across a fork+exec to a lower-privileged SELinux domain.
/external/libchrome/mojo/public/tools/bindings/
Dchromium_bindings_configuration.gni45 "//services/viz/privileged/cpp/typemaps.gni",
46 "//services/viz/privileged/interfaces/compositing/typemaps.gni",
/external/skia/tools/skqp/
Ddocker_run_apk.sh29 docker run --privileged --rm -d \

12345