Home
last modified time | relevance | path

Searched refs:privileged (Results 1 – 25 of 34) sorted by relevance

12

/external/elfutils/src/tests/
Drun-addrcfi.sh369 privileged reg70 (sr0): undefined
370 privileged reg71 (sr1): undefined
371 privileged reg72 (sr2): undefined
372 privileged reg73 (sr3): undefined
373 privileged reg74 (sr4): undefined
374 privileged reg75 (sr5): undefined
375 privileged reg76 (sr6): undefined
376 privileged reg77 (sr7): undefined
377 privileged reg78 (sr8): undefined
378 privileged reg79 (sr9): undefined
[all …]
/external/valgrind/docs/internals/
Ds390-opcodes.csv49 csch,"clear subchannel",N/A,"privileged instruction"
51 csp,"compare and swap and purge",N/A,"privileged instruction"
60 diag,diagnose,N/A,"privileged instruction"
67 epar,"extract primary ASN",N/A,"privileged instruction"
68 epair,"extract primary ASN and instance",N/A,"privileged instruction"
70 esar,"extract secondary ASN",N/A,"privileged instruction",
71 esair,"extract secondary ASN and instance,N/A,"privileged instruction",
76 hsch,"halt subchannel",N/A,"privileged instruction"
77 iac,"insert address space control",N/A,"privileged instruction"
80 ipk,"insert PSW key",N/A,"privileged instruction"
[all …]
/external/openssh/
Duidswap.c56 static int privileged = 0; variable
77 privileged = 0; in temporarily_use_uid()
83 privileged = 0; in temporarily_use_uid()
88 privileged = 1; in temporarily_use_uid()
172 if (!privileged) { in restore_uid()
DREADME.privsep3 privileged monitor process. Its purpose is to prevent privilege
36 --with-privsep-user=user Specify non-privileged user for privilege separation
60 process 6917 is the privileged monitor process, 6919 is the user owned
Dsshconnect.c273 ssh_create_socket(int privileged, struct addrinfo *ai) in ssh_create_socket() argument
286 if (options.bind_address == NULL && !privileged) in ssh_create_socket()
307 if (privileged) { in ssh_create_socket()
DREADME.tun56 the privileged user (in /root/.ssh/config):
DOVERVIEW112 privileged socket). Any extra privileges are dropped before
Dssh.088 as a SOCKS server. Only root can forward privileged ports.
93 square brackets. Only the superuser can forward privileged
168 superuser can forward privileged ports. By default, the local
595 root can open sockets on privileged ports) and doesn't conflict with any
/external/openssh/contrib/cygwin/
DREADME29 --user -u <account> privileged user for service, default 'cyg_server'.
30 --pwd -w <passwd> Use "pwd" as password for privileged user.
31 --privileged On Windows XP, require privileged user
Dssh-host-config585 --privileged )
/external/mksh/src/
Dsh_flags.opt115 /* -p privileged shell (suid) */
117 FN("privileged", FPRIVILEGED, OF_ANY
Dsh_flags.gen51 FN("privileged", FPRIVILEGED, OF_ANY, 'p')
/external/ppp/pppd/
Dpppd.h227 extern int privileged; /* We were run by real-uid root */
702 int privileged));
706 int options_from_list __P((struct wordlist *, int privileged));
Dmain.c148 int privileged; /* we're running as real uid root */ variable
340 privileged = uid == 0;
369 privileged = 1;
406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
Dauth.c488 privileged = 1;
1239 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { in auth_check_options()
2014 return allow_any_ip || privileged || !have_route_to(addr);
Doptions.c379 privileged_option = privileged;
503 ret = options_from_file(path, 0, 1, privileged); in options_from_user()
/external/mesa3d/docs/OLD/
DMESA_trace.spec64 that enjoys privileged access, or that they do not wish to separate
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_priv.sgml31 <para>If enabled, privileged operations are done in the wpa_priv process
45 non-privileged user account created just for this purpose to limit access
/external/sepolicy/
Dsystem_app.te3 # com.android.settings. These are not as privileged as the system
/external/wpa_supplicant_8/wpa_supplicant/
DREADME906 privileged operations into a separate process (wpa_priv) while leaving
915 enabled, the privileged operations (driver wrapper and l2_packet) are
918 wrappers that communicate with the privileged wpa_priv process to
919 perform the needed operations. wpa_priv can control what privileged
927 on a laptop or as a special non-privileged user account created just
955 Linux capabilities instead of privileged process
960 by running wpa_supplicant as a privileged process with effective user id
/external/iputils/doc/
Dtracepath.sgml161 <command/tracepath/ is not a privileged program, unlike
/external/mdnsresponder/
DPrivateDNS.txt163 // This also allows non-privileged users on the local host to manage
/external/iproute2/doc/
Dapi-ip6-flowlabels.tex233 One idea is to disallow not privileged user to allocate flow
/external/llvm/lib/Target/ARM/
DARMRegisterInfo.td173 // Special Registers - only available in privileged mode.
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/en-GB/
Den-GB_klex.pkb1130 principalAprivatisation)GI!5N&K5P</&Eprivatization)GI!5N&K5P</&E privilegedD���������������…

12