| /external/elfutils/tests/ |
| D | run-addrcfi.sh | 19 . $srcdir/test-subr.sh 21 # Note some testfiles are also used in run-allregs.sh. 29 testrun_compare ${abs_builddir}/addrcfi -e testfile11 0x080489b8 <<\EOF 41 integer reg8 (%eip): location expression: call_frame_cfa plus_uconst(-4) 68 FPU-control reg37 (%fctrl): undefined 69 FPU-control reg38 (%fstat): undefined 70 FPU-control reg39 (%mxcsr): undefined 88 integer reg8 (%eip): location expression: call_frame_cfa plus_uconst(-4) 115 FPU-control reg37 (%fctrl): undefined 116 FPU-control reg38 (%fstat): undefined [all …]
|
| /external/libcap/progs/ |
| D | quicktest.sh | 6 # [Run this as root in a root-enabled process tree.] 11 if [ $? -ne 0 ]; then 21 echo -n "EXPECT FAILURE: " 23 if [ $? -eq 1 ]; then 27 echo "Undesired result - aborting" 34 echo -n "EXPECT SUCCESS: " 36 if [ $? -eq 0 ]; then 39 echo "Undesired result - aborting" 45 pass_capsh --print 46 pass_capsh --current [all …]
|
| /external/bcc/.github/workflows/ |
| D | bcc-test.yml | 6 - master 11 runs-on: ubuntu-20.04 16 - TYPE: Debug 19 - TYPE: Debug 22 - TYPE: Release 26 - uses: actions/checkout@v2 27 - name: System info 29 uname -a 31 - name: Build docker container with all deps 34 --build-arg UBUNTU_VERSION=${{ matrix.os.version }} \ [all …]
|
| /external/ppp/pppd/ |
| D | pppd.8 | 9 .\" Copyright (c) 1993-2003 Paul Mackerras <paulus@samba.org> 25 pppd \- Point-to-Point Protocol Daemon 33 PPP is the protocol used for establishing internet links over dial-up 34 modems, DSL connections, and many other types of point-to-point 52 option from a privileged source cannot be overridden by a 53 non-privileged user. 59 (e.g. Linux, SunOS) only support the commonly-used baud rates. 62 This option sets the Async-Control-Character-Map (ACCM) for this end 70 Pppd will ask the peer to send these characters as a 2-byte 86 file may contain privileged options, such as \fInoauth\fR, even if pppd [all …]
|
| /external/ltp/testcases/kernel/syscalls/fanotify/ |
| D | fanotify19.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 54 "unprivileged listener - events by self", 66 "unprivileged lisneter - events by child", 78 "unprivileged listener, privileged reader - events by self", 90 "unprivileged lisneter, privileged reader - events by child", 148 tst_res(TINFO, "Test #%d %s", n, tc->name); in test_fanotify() 150 /* Relinquish privileged user */ in test_fanotify() 152 tst_res(TINFO, "Running as privileged user, revoking"); in test_fanotify() 154 SAFE_SETEUID(nobody->pw_uid); in test_fanotify() 183 if (tc->fork) in test_fanotify() [all …]
|
| /external/libcap/tests/ |
| D | exploit.c | 40 * interrupt handler - potentially watching for an opportunity to 41 * perform an exploit when invoked as a privileged thread. 67 * privileged thread code (imagine it doing whatever needs privilege). 72 printf("started privileged thread\n"); in victim() 129 * then trigger it on the privileged peer thread. in main()
|
| /external/mtools/ |
| D | scsi_io.c | 42 int privileged; member 53 Since Sun won't accept a non-Sun label on a scsi disk, we must 54 bypass Sun's disk interface and use low-level SCSI commands to read 57 uscsi ioctl interface. By James Dugal, jpd@usl.edu, 11-96. Tested 64 Note 2: Sol 2.5 wants mtools to be suid-root, to use the ioctl. SunOS is 71 int fd = This->fd; in scsi_init() 79 sizeof(buf), This->extra_data)==0) in scsi_init() 81 This->tot_sectors= in scsi_init() 86 if(This->tot_sectors < UINT32_MAX) in scsi_init() 87 This->tot_sectors++; in scsi_init() [all …]
|
| /external/ltp/testcases/kernel/security/prot_hsymlinks/ |
| D | README | 19 1. Users who own sticky world-writable directory can't follow symlinks 22 2. Hard links restriction applies only to non-privileged users. Only 23 non-privileged user can't create hard links to files if he isn't owner
|
| /external/google-fruit/extras/scripts/ |
| D | postsubmit.sh | 3 set -e 9 STLARG="-stdlib=$STL" 15 linux) DOCKER_IMAGE="polettimarco/fruit-basesystem:ubuntu-$UBUNTU" ;; 16 linux-arm) docker run --rm --privileged multiarch/qemu-user-static:register --reset 17 DOCKER_IMAGE="polettimarco/fruit-basesystem:ubuntu_arm-$UBUNTU" ;; 19 docker rm -f fruit &>/dev/null || true 20 docker run -d -it --name fruit --privileged "${DOCKER_IMAGE}" 24 docker exec fruit bash -c " 30 cd fruit; extras/scripts/postsubmit-helper.sh $1" 40 extras/scripts/postsubmit-helper.sh "$@"
|
| /external/javassist/src/main/javassist/util/proxy/ |
| D | DefineClassHelper.java | 2 * Javassist, a Java-bytecode translator toolkit. 3 * Copyright (C) 1999- Shigeru Chiba. All Rights Reserved. 118 if (privileged != null && getCallerClass.invoke(stack) != this.getClass()) in getReferencedUnsafe() 156 if (privileged != null && stack.getCallerClass() != this.getClass()) in getDefineClassMethodHandle() 192 if (privileged != null && stack.getCallerClass() != this.getClass()) in getDefineClassMethod() 230 private static final Helper privileged = ClassFile.MAJOR_VERSION > ClassFile.JAVA_10 field in DefineClassHelper 245 * {@code --add-opens java.base/java.lang=ALL-UNNAMED} must be given to the JVM. 263 return privileged.defineClass(className, bcode, 0, bcode.length, in toClass()
|
| /external/kernel-headers/original/uapi/linux/ |
| D | seccomp.h | 1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ 11 #define SECCOMP_MODE_STRICT 1 /* uses hard-coded filter. */ 12 #define SECCOMP_MODE_FILTER 2 /* uses user-supplied filter. */ 30 * All BPF programs must return a 32-bit value. 31 * The bottom 16-bits are for optional return data. 32 * The upper 16-bits are ordered from least permissive values to most, 54 * struct seccomp_data - the format the BPF program executes over. 59 * @args: up to 6 system call arguments always stored as 64-bit values 93 * in scenarios where a more privileged process supervises the syscalls of a 94 * lesser privileged process to get around kernel-enforced security [all …]
|
| /external/swiftshader/third_party/marl/kokoro/ubuntu/ |
| D | release.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 set -e # Fail on any error. 23 git -C "${ROOT_DIR}" submodule update --init 25 # --privileged is required for some sanitizer builds, as they seem to require PTRACE privileges 26 docker run --rm -i \ 27 --privileged \ 28 --volume "${ROOT_DIR}:${ROOT_DIR}" \ 29 --volume "${KOKORO_ARTIFACTS_DIR}:/mnt/artifacts" \ 30 --workdir "${ROOT_DIR}" \ 31 --env BUILD_SYSTEM=${BUILD_SYSTEM} \ [all …]
|
| D | presubmit.sh | 9 # https://www.apache.org/licenses/LICENSE-2.0 17 set -e # Fail on any error. 23 git -C "${ROOT_DIR}" submodule update --init 25 # --privileged is required for some sanitizer builds, as they seem to require PTRACE privileges 26 docker run --rm -i \ 27 --privileged \ 28 --volume "${ROOT_DIR}:${ROOT_DIR}" \ 29 --workdir "${ROOT_DIR}" \ 30 --env BUILD_SYSTEM=${BUILD_SYSTEM} \ 31 --env BUILD_TOOLCHAIN=${BUILD_TOOLCHAIN} \ [all …]
|
| /external/ltp/testcases/kernel/syscalls/bind/ |
| D | bind02.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 11 * Make sure bind() of privileged port gives EACCESS error for non-root users. 25 /* This port needs to be a privileged port */ 50 gr = SAFE_GETGRGID(pw->pw_gid); in setup() 53 pw->pw_name, gr->gr_name); in setup() 54 SAFE_SETEGID(gr->gr_gid); in setup() 55 SAFE_SETEUID(pw->pw_uid); in setup()
|
| /external/ltp/testcases/kernel/containers/userns/ |
| D | userns06_capcheck.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 6 * When a process with non-zero user IDs performs an execve(), the 33 tst_brk(TBROK, "userns06_capcheck <privileged|unprivileged>"); in main() 37 if (strcmp("privileged", argv[1])) in main()
|
| /external/ltp/testcases/kernel/syscalls/setfsgid/ |
| D | setfsgid02.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 14 * - privileged user can change a filesystem group ID different from saved 16 * - unprivileged user cannot change it 36 SAFE_SETEUID(ltpuser->pw_uid); in run() 41 * the gid for privileged user, and have not changed the gid in run()
|
| /external/swiftshader/tests/kokoro/gcp_ubuntu/ |
| D | build.sh | 9 # http://www.apache.org/licenses/LICENSE-2.0 17 set -e # Fail on any error. 27 if [ -d "/tmpfs" ]; then 33 # --privileged is required for some sanitizer builds, as they seem to require PTRACE privileges 34 docker run --rm -i \ 35 --privileged \ 36 --volume "${ROOT_DIR}:${ROOT_DIR}" \ 37 --volume "${TMP_DIR}:/src" \ 38 --volume "${KOKORO_ARTIFACTS_DIR}:/mnt/artifacts" \ 39 --workdir "${ROOT_DIR}" \ [all …]
|
| /external/autotest/server/hosts/ |
| D | gsc_devboard_host.py | 3 # Use of this source code is governed by a BSD-style license that can be 17 DOCKER_IMAGE = "gcr.io/satlab-images/gsc_dev_board:release" 117 privileged=True, 124 res, output = c.exec_run(['lsusb', '-v', '-d', ULTRADEBUG], 126 privileged=True) 130 output = output.decode("utf-8").split('\n') 132 l.strip().split(' ')[-1] for l in output 173 privileged=True,
|
| /external/deqp-deps/SPIRV-Tools/kokoro/scripts/linux/ |
| D | build.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 19 set -e 27 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT} 29 # "--privileged" is required to run ptrace in the asan builds. 30 docker run --rm -i \ 31 --privileged \ 32 --volume "${ROOT_DIR}:${ROOT_DIR}" \ 33 --volume "${KOKORO_ARTIFACTS_DIR}:${KOKORO_ARTIFACTS_DIR}" \ 34 --workdir "${ROOT_DIR}" \ 35 --env SCRIPT_DIR=${SCRIPT_DIR} \ [all …]
|
| /external/swiftshader/third_party/SPIRV-Tools/kokoro/scripts/linux/ |
| D | build.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 19 set -e 27 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT} 29 # "--privileged" is required to run ptrace in the asan builds. 30 docker run --rm -i \ 31 --privileged \ 32 --volume "${ROOT_DIR}:${ROOT_DIR}" \ 33 --volume "${KOKORO_ARTIFACTS_DIR}:${KOKORO_ARTIFACTS_DIR}" \ 34 --workdir "${ROOT_DIR}" \ 35 --env SCRIPT_DIR=${SCRIPT_DIR} \ [all …]
|
| /external/angle/third_party/vulkan-deps/spirv-tools/src/kokoro/scripts/linux/ |
| D | build.sh | 8 # http://www.apache.org/licenses/LICENSE-2.0 19 set -e 27 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT} 30 # Docker creates files with the root user - this can upset the Kokoro artifact copier. 33 if [[ -d "$dir" ]]; then 34 sudo chown -R "$(id -u):$(id -g)" "$dir" 41 # "--privileged" is required to run ptrace in the asan builds. 42 docker run --rm -i \ 43 --privileged \ 44 --volume "${ROOT_DIR}:${ROOT_DIR}" \ [all …]
|
| /external/igt-gpu-tools/tests/i915/ |
| D | gem_mocs_settings.c | 35 #define GEN9_NUM_MOCS_ENTRIES 62 /* 62 out of 64 - 63 & 64 are reserved. */ 36 #define GEN11_NUM_MOCS_ENTRIES 64 /* 63-64 are reserved, but configured. */ 147 [3 ... GEN9_NUM_MOCS_ENTRIES - 1] = MOCS_PTE, 151 [0 ... GEN9_NUM_MOCS_ENTRIES - 1] = { 0x00003FFF, 0x003F, 0x1 }, 158 [3 ... GEN9_NUM_MOCS_ENTRIES - 1] = MOCS_PTE, 162 [0 ... GEN9_NUM_MOCS_ENTRIES - 1] = { 0x00007FFF, 0x003F, 0x1 }, 166 [0 ... GEN9_NUM_MOCS_ENTRIES - 1] = 0xFFFFFFFF, 181 table->size = ARRAY_SIZE(dirty_skylake_mocs_table); in get_mocs_settings() 182 table->table = dirty_skylake_mocs_table; in get_mocs_settings() 184 table->size = ARRAY_SIZE(skylake_mocs_table); in get_mocs_settings() [all …]
|
| /external/perfetto/src/trace_processor/metrics/sql/chrome/ |
| D | chrome_processes.sql | 1 -- 2 -- Copyright 2020 The Android Open Source Project 3 -- 4 -- Licensed under the Apache License, Version 2.0 (the "License"); 5 -- you may not use this file except in compliance with the License. 6 -- You may obtain a copy of the License at 7 -- 8 -- https://www.apache.org/licenses/LICENSE-2.0 9 -- 10 -- Unless required by applicable law or agreed to in writing, software [all …]
|
| /external/ltp/testcases/kernel/syscalls/mlock2/ |
| D | mlock202.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 11 * privileged(CAP_IPC_LOCK) and tries to lock more memory than the 14 * privileged(CAP_IPC_LOCK) and its RLIMIT_MEMLOCK limit is 0. 44 {&addr, -1, NULL, 0, EINVAL}, 55 if (tc->user) { in verify_mlock2() 57 new_limit.rlim_cur = *tc->max_size; in verify_mlock2() 58 new_limit.rlim_max = *tc->max_size; in verify_mlock2() 60 SAFE_SETEUID(nobody->pw_uid); in verify_mlock2() 63 TEST(tst_syscall(__NR_mlock2, *tc->taddr, pgsz, tc->flag)); in verify_mlock2() 64 if (TST_RET != -1) { in verify_mlock2() [all …]
|
| /external/libcap/cap/ |
| D | names.go | 3 /* ** DO NOT EDIT THIS FILE. IT WAS AUTO-GENERATED BY LIBCAP'S GO BUILDER (mknames.go) ** */ 54 // process - overriding the limitation that there be a 59 // - arbitrarily set the GID, EGID, REGID, RESGID values 60 // - arbitrarily set the supplementary GIDs 61 // - allows the forging of GID credentials passed over a 66 // - arbitrarily set the UID, EUID, REUID and RESUID 68 // - allows the forging of UID credentials passed over a 97 // NET_BIND_SERVICE allows a process to bind to privileged ports: 98 // - TCP/UDP sockets below 1024 99 // - ATM VCIs below 32 [all …]
|