Home
last modified time | relevance | path

Searched +full:- +full:- +full:privileged (Results 1 – 25 of 363) sorted by relevance

12345678910>>...15

/external/elfutils/tests/
Drun-addrcfi.sh19 . $srcdir/test-subr.sh
21 # Note some testfiles are also used in run-allregs.sh.
29 testrun_compare ${abs_builddir}/addrcfi -e testfile11 0x080489b8 <<\EOF
41 integer reg8 (%eip): location expression: call_frame_cfa plus_uconst(-4)
68 FPU-control reg37 (%fctrl): undefined
69 FPU-control reg38 (%fstat): undefined
70 FPU-control reg39 (%mxcsr): undefined
88 integer reg8 (%eip): location expression: call_frame_cfa plus_uconst(-4)
115 FPU-control reg37 (%fctrl): undefined
116 FPU-control reg38 (%fstat): undefined
[all …]
/external/libcap/progs/
Dquicktest.sh6 # [Run this as root in a root-enabled process tree.]
11 if [ $? -ne 0 ]; then
21 echo -n "EXPECT FAILURE: "
23 if [ $? -eq 1 ]; then
27 echo "Undesired result - aborting"
34 echo -n "EXPECT SUCCESS: "
36 if [ $? -eq 0 ]; then
39 echo "Undesired result - aborting"
45 pass_capsh --print
46 pass_capsh --current
[all …]
/external/bcc/.github/workflows/
Dbcc-test.yml6 - master
11 runs-on: ubuntu-20.04
16 - TYPE: Debug
19 - TYPE: Debug
22 - TYPE: Release
26 - uses: actions/checkout@v2
27 - name: System info
29 uname -a
31 - name: Build docker container with all deps
34 --build-arg UBUNTU_VERSION=${{ matrix.os.version }} \
[all …]
/external/ppp/pppd/
Dpppd.89 .\" Copyright (c) 1993-2003 Paul Mackerras <paulus@samba.org>
25 pppd \- Point-to-Point Protocol Daemon
33 PPP is the protocol used for establishing internet links over dial-up
34 modems, DSL connections, and many other types of point-to-point
52 option from a privileged source cannot be overridden by a
53 non-privileged user.
59 (e.g. Linux, SunOS) only support the commonly-used baud rates.
62 This option sets the Async-Control-Character-Map (ACCM) for this end
70 Pppd will ask the peer to send these characters as a 2-byte
86 file may contain privileged options, such as \fInoauth\fR, even if pppd
[all …]
/external/ltp/testcases/kernel/syscalls/fanotify/
Dfanotify19.c1 // SPDX-License-Identifier: GPL-2.0-or-later
54 "unprivileged listener - events by self",
66 "unprivileged lisneter - events by child",
78 "unprivileged listener, privileged reader - events by self",
90 "unprivileged lisneter, privileged reader - events by child",
148 tst_res(TINFO, "Test #%d %s", n, tc->name); in test_fanotify()
150 /* Relinquish privileged user */ in test_fanotify()
152 tst_res(TINFO, "Running as privileged user, revoking"); in test_fanotify()
154 SAFE_SETEUID(nobody->pw_uid); in test_fanotify()
183 if (tc->fork) in test_fanotify()
[all …]
/external/libcap/tests/
Dexploit.c40 * interrupt handler - potentially watching for an opportunity to
41 * perform an exploit when invoked as a privileged thread.
67 * privileged thread code (imagine it doing whatever needs privilege).
72 printf("started privileged thread\n"); in victim()
129 * then trigger it on the privileged peer thread. in main()
/external/mtools/
Dscsi_io.c42 int privileged; member
53 Since Sun won't accept a non-Sun label on a scsi disk, we must
54 bypass Sun's disk interface and use low-level SCSI commands to read
57 uscsi ioctl interface. By James Dugal, jpd@usl.edu, 11-96. Tested
64 Note 2: Sol 2.5 wants mtools to be suid-root, to use the ioctl. SunOS is
71 int fd = This->fd; in scsi_init()
79 sizeof(buf), This->extra_data)==0) in scsi_init()
81 This->tot_sectors= in scsi_init()
86 if(This->tot_sectors < UINT32_MAX) in scsi_init()
87 This->tot_sectors++; in scsi_init()
[all …]
/external/ltp/testcases/kernel/security/prot_hsymlinks/
DREADME19 1. Users who own sticky world-writable directory can't follow symlinks
22 2. Hard links restriction applies only to non-privileged users. Only
23 non-privileged user can't create hard links to files if he isn't owner
/external/google-fruit/extras/scripts/
Dpostsubmit.sh3 set -e
9 STLARG="-stdlib=$STL"
15 linux) DOCKER_IMAGE="polettimarco/fruit-basesystem:ubuntu-$UBUNTU" ;;
16 linux-arm) docker run --rm --privileged multiarch/qemu-user-static:register --reset
17 DOCKER_IMAGE="polettimarco/fruit-basesystem:ubuntu_arm-$UBUNTU" ;;
19 docker rm -f fruit &>/dev/null || true
20 docker run -d -it --name fruit --privileged "${DOCKER_IMAGE}"
24 docker exec fruit bash -c "
30 cd fruit; extras/scripts/postsubmit-helper.sh $1"
40 extras/scripts/postsubmit-helper.sh "$@"
/external/javassist/src/main/javassist/util/proxy/
DDefineClassHelper.java2 * Javassist, a Java-bytecode translator toolkit.
3 * Copyright (C) 1999- Shigeru Chiba. All Rights Reserved.
118 if (privileged != null && getCallerClass.invoke(stack) != this.getClass()) in getReferencedUnsafe()
156 if (privileged != null && stack.getCallerClass() != this.getClass()) in getDefineClassMethodHandle()
192 if (privileged != null && stack.getCallerClass() != this.getClass()) in getDefineClassMethod()
230 private static final Helper privileged = ClassFile.MAJOR_VERSION > ClassFile.JAVA_10 field in DefineClassHelper
245 * {@code --add-opens java.base/java.lang=ALL-UNNAMED} must be given to the JVM.
263 return privileged.defineClass(className, bcode, 0, bcode.length, in toClass()
/external/kernel-headers/original/uapi/linux/
Dseccomp.h1 /* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
11 #define SECCOMP_MODE_STRICT 1 /* uses hard-coded filter. */
12 #define SECCOMP_MODE_FILTER 2 /* uses user-supplied filter. */
30 * All BPF programs must return a 32-bit value.
31 * The bottom 16-bits are for optional return data.
32 * The upper 16-bits are ordered from least permissive values to most,
54 * struct seccomp_data - the format the BPF program executes over.
59 * @args: up to 6 system call arguments always stored as 64-bit values
93 * in scenarios where a more privileged process supervises the syscalls of a
94 * lesser privileged process to get around kernel-enforced security
[all …]
/external/swiftshader/third_party/marl/kokoro/ubuntu/
Drelease.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 set -e # Fail on any error.
23 git -C "${ROOT_DIR}" submodule update --init
25 # --privileged is required for some sanitizer builds, as they seem to require PTRACE privileges
26 docker run --rm -i \
27 --privileged \
28 --volume "${ROOT_DIR}:${ROOT_DIR}" \
29 --volume "${KOKORO_ARTIFACTS_DIR}:/mnt/artifacts" \
30 --workdir "${ROOT_DIR}" \
31 --env BUILD_SYSTEM=${BUILD_SYSTEM} \
[all …]
Dpresubmit.sh9 # https://www.apache.org/licenses/LICENSE-2.0
17 set -e # Fail on any error.
23 git -C "${ROOT_DIR}" submodule update --init
25 # --privileged is required for some sanitizer builds, as they seem to require PTRACE privileges
26 docker run --rm -i \
27 --privileged \
28 --volume "${ROOT_DIR}:${ROOT_DIR}" \
29 --workdir "${ROOT_DIR}" \
30 --env BUILD_SYSTEM=${BUILD_SYSTEM} \
31 --env BUILD_TOOLCHAIN=${BUILD_TOOLCHAIN} \
[all …]
/external/ltp/testcases/kernel/syscalls/bind/
Dbind02.c1 // SPDX-License-Identifier: GPL-2.0-or-later
11 * Make sure bind() of privileged port gives EACCESS error for non-root users.
25 /* This port needs to be a privileged port */
50 gr = SAFE_GETGRGID(pw->pw_gid); in setup()
53 pw->pw_name, gr->gr_name); in setup()
54 SAFE_SETEGID(gr->gr_gid); in setup()
55 SAFE_SETEUID(pw->pw_uid); in setup()
/external/ltp/testcases/kernel/containers/userns/
Duserns06_capcheck.c1 // SPDX-License-Identifier: GPL-2.0-or-later
6 * When a process with non-zero user IDs performs an execve(), the
33 tst_brk(TBROK, "userns06_capcheck <privileged|unprivileged>"); in main()
37 if (strcmp("privileged", argv[1])) in main()
/external/ltp/testcases/kernel/syscalls/setfsgid/
Dsetfsgid02.c1 // SPDX-License-Identifier: GPL-2.0-or-later
14 * - privileged user can change a filesystem group ID different from saved
16 * - unprivileged user cannot change it
36 SAFE_SETEUID(ltpuser->pw_uid); in run()
41 * the gid for privileged user, and have not changed the gid in run()
/external/swiftshader/tests/kokoro/gcp_ubuntu/
Dbuild.sh9 # http://www.apache.org/licenses/LICENSE-2.0
17 set -e # Fail on any error.
27 if [ -d "/tmpfs" ]; then
33 # --privileged is required for some sanitizer builds, as they seem to require PTRACE privileges
34 docker run --rm -i \
35 --privileged \
36 --volume "${ROOT_DIR}:${ROOT_DIR}" \
37 --volume "${TMP_DIR}:/src" \
38 --volume "${KOKORO_ARTIFACTS_DIR}:/mnt/artifacts" \
39 --workdir "${ROOT_DIR}" \
[all …]
/external/autotest/server/hosts/
Dgsc_devboard_host.py3 # Use of this source code is governed by a BSD-style license that can be
17 DOCKER_IMAGE = "gcr.io/satlab-images/gsc_dev_board:release"
117 privileged=True,
124 res, output = c.exec_run(['lsusb', '-v', '-d', ULTRADEBUG],
126 privileged=True)
130 output = output.decode("utf-8").split('\n')
132 l.strip().split(' ')[-1] for l in output
173 privileged=True,
/external/deqp-deps/SPIRV-Tools/kokoro/scripts/linux/
Dbuild.sh8 # http://www.apache.org/licenses/LICENSE-2.0
19 set -e
27 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT}
29 # "--privileged" is required to run ptrace in the asan builds.
30 docker run --rm -i \
31 --privileged \
32 --volume "${ROOT_DIR}:${ROOT_DIR}" \
33 --volume "${KOKORO_ARTIFACTS_DIR}:${KOKORO_ARTIFACTS_DIR}" \
34 --workdir "${ROOT_DIR}" \
35 --env SCRIPT_DIR=${SCRIPT_DIR} \
[all …]
/external/swiftshader/third_party/SPIRV-Tools/kokoro/scripts/linux/
Dbuild.sh8 # http://www.apache.org/licenses/LICENSE-2.0
19 set -e
27 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT}
29 # "--privileged" is required to run ptrace in the asan builds.
30 docker run --rm -i \
31 --privileged \
32 --volume "${ROOT_DIR}:${ROOT_DIR}" \
33 --volume "${KOKORO_ARTIFACTS_DIR}:${KOKORO_ARTIFACTS_DIR}" \
34 --workdir "${ROOT_DIR}" \
35 --env SCRIPT_DIR=${SCRIPT_DIR} \
[all …]
/external/angle/third_party/vulkan-deps/spirv-tools/src/kokoro/scripts/linux/
Dbuild.sh8 # http://www.apache.org/licenses/LICENSE-2.0
19 set -e
27 BUILD_SHA=${KOKORO_GITHUB_COMMIT:-$KOKORO_GITHUB_PULL_REQUEST_COMMIT}
30 # Docker creates files with the root user - this can upset the Kokoro artifact copier.
33 if [[ -d "$dir" ]]; then
34 sudo chown -R "$(id -u):$(id -g)" "$dir"
41 # "--privileged" is required to run ptrace in the asan builds.
42 docker run --rm -i \
43 --privileged \
44 --volume "${ROOT_DIR}:${ROOT_DIR}" \
[all …]
/external/igt-gpu-tools/tests/i915/
Dgem_mocs_settings.c35 #define GEN9_NUM_MOCS_ENTRIES 62 /* 62 out of 64 - 63 & 64 are reserved. */
36 #define GEN11_NUM_MOCS_ENTRIES 64 /* 63-64 are reserved, but configured. */
147 [3 ... GEN9_NUM_MOCS_ENTRIES - 1] = MOCS_PTE,
151 [0 ... GEN9_NUM_MOCS_ENTRIES - 1] = { 0x00003FFF, 0x003F, 0x1 },
158 [3 ... GEN9_NUM_MOCS_ENTRIES - 1] = MOCS_PTE,
162 [0 ... GEN9_NUM_MOCS_ENTRIES - 1] = { 0x00007FFF, 0x003F, 0x1 },
166 [0 ... GEN9_NUM_MOCS_ENTRIES - 1] = 0xFFFFFFFF,
181 table->size = ARRAY_SIZE(dirty_skylake_mocs_table); in get_mocs_settings()
182 table->table = dirty_skylake_mocs_table; in get_mocs_settings()
184 table->size = ARRAY_SIZE(skylake_mocs_table); in get_mocs_settings()
[all …]
/external/perfetto/src/trace_processor/metrics/sql/chrome/
Dchrome_processes.sql1 --
2 -- Copyright 2020 The Android Open Source Project
3 --
4 -- Licensed under the Apache License, Version 2.0 (the "License");
5 -- you may not use this file except in compliance with the License.
6 -- You may obtain a copy of the License at
7 --
8 -- https://www.apache.org/licenses/LICENSE-2.0
9 --
10 -- Unless required by applicable law or agreed to in writing, software
[all …]
/external/ltp/testcases/kernel/syscalls/mlock2/
Dmlock202.c1 // SPDX-License-Identifier: GPL-2.0-or-later
11 * privileged(CAP_IPC_LOCK) and tries to lock more memory than the
14 * privileged(CAP_IPC_LOCK) and its RLIMIT_MEMLOCK limit is 0.
44 {&addr, -1, NULL, 0, EINVAL},
55 if (tc->user) { in verify_mlock2()
57 new_limit.rlim_cur = *tc->max_size; in verify_mlock2()
58 new_limit.rlim_max = *tc->max_size; in verify_mlock2()
60 SAFE_SETEUID(nobody->pw_uid); in verify_mlock2()
63 TEST(tst_syscall(__NR_mlock2, *tc->taddr, pgsz, tc->flag)); in verify_mlock2()
64 if (TST_RET != -1) { in verify_mlock2()
[all …]
/external/libcap/cap/
Dnames.go3 /* ** DO NOT EDIT THIS FILE. IT WAS AUTO-GENERATED BY LIBCAP'S GO BUILDER (mknames.go) ** */
54 // process - overriding the limitation that there be a
59 // - arbitrarily set the GID, EGID, REGID, RESGID values
60 // - arbitrarily set the supplementary GIDs
61 // - allows the forging of GID credentials passed over a
66 // - arbitrarily set the UID, EUID, REUID and RESUID
68 // - allows the forging of UID credentials passed over a
97 // NET_BIND_SERVICE allows a process to bind to privileged ports:
98 // - TCP/UDP sockets below 1024
99 // - ATM VCIs below 32
[all …]

12345678910>>...15