Searched refs:privileges (Results 1 - 51 of 51) sorted by relevance

/linux-4.1.27/include/uapi/linux/
H A Dprctl.h161 * If no_new_privs is set, then operations that grant new privileges (i.e.
165 * Operations that merely manipulate or drop existing privileges (setresuid,
166 * capset, etc.) will still work. Drop those privileges if you want them gone.
H A Dsecurebits.h12 /* When set UID 0 has no special privileges. When unset, we support
H A Dacct.h105 #define ASU 0x02 /* ... used super-user privileges */
/linux-4.1.27/tools/power/cpupower/utils/
H A Dcpupower-info.c74 printf(_("Intel's performance bias setting needs root privileges\n")); cmd_info()
H A Dcpupower.c219 "privileges\n"), cmd); main()
/linux-4.1.27/arch/x86/kernel/
H A Dioport.c109 /* Trying to gain more privileges? */ SYSCALL_DEFINE1()
/linux-4.1.27/include/rdma/
H A Dib.h93 * calls from various contexts with elevated privileges. That includes the
/linux-4.1.27/arch/score/kernel/
H A Dprocess.c51 /* New thread loses kernel privileges. */ start_thread()
/linux-4.1.27/arch/avr32/mm/
H A Dcache.c20 * privileges. The value is completely arbitrary.
/linux-4.1.27/drivers/misc/vmw_vmci/
H A Dvmci_datagram.c184 /* Get hold of privileges of sending endpoint. */ dg_dispatch_as_host()
188 pr_warn("Couldn't get privileges (handle=0x%x:0x%x)\n", dg_dispatch_as_host()
H A Dvmci_doorbell.c89 * privileges are determined by the context ID, but for host
90 * endpoints privileges are associated with the complete
H A Dvmci_context.c1032 * set of privilege flags that will override the privileges of
/linux-4.1.27/security/integrity/evm/
H A Devm_main.c332 * requires CAP_SYS_ADMIN privileges.
354 * Removing 'security.evm' requires CAP_SYS_ADMIN privileges and that
/linux-4.1.27/arch/x86/include/uapi/asm/
H A Dhyperv.h23 * to the partition based upon the current partition privileges.
/linux-4.1.27/fs/squashfs/
H A Dxattr.c91 /* no handler or insuffficient privileges, so skip */ squashfs_listxattr()
/linux-4.1.27/net/atm/
H A Dioctl.c114 * have the same privileges that /proc/kcore needs do_vcc_ioctl()
/linux-4.1.27/scripts/package/
H A DMakefile82 echo "root privileges (e.g., 'fakeroot -u' or 'sudo')."; \
/linux-4.1.27/include/linux/
H A Damd-iommu.h145 super-user privileges */
H A Dcapability.h58 * The fs mask is all the privileges that fsuid==0 historically meant.
H A Dvmw_vmci_defs.h308 * VMCI coarse-grained privileges (per context or host
H A Dsched.h1972 #define PF_SUPERPRIV 0x00000100 /* used super-user privileges */
2042 #define PFA_NO_NEW_PRIVS 0 /* May not gain new privileges. */
/linux-4.1.27/include/xen/interface/
H A Dgrant_table.h106 /* The domain being granted foreign privileges. [GST] */
117 * GTF_invalid: This grant entry grants no privileges.
H A Dxen.h552 * privileges can bind an event-channel port to a physical interrupt
/linux-4.1.27/drivers/media/usb/uvc/
H A Duvc_v4l2.c432 * a given time. Trying to perform an operation that requires privileges will
433 * automatically acquire the required privileges if possible, or return -EBUSY
437 * Operations that require privileges are:
/linux-4.1.27/drivers/net/ethernet/emulex/benet/
H A Dbe_main.c1493 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { be_set_vf_tvt()
1494 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & be_set_vf_tvt()
1497 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; be_set_vf_tvt()
1515 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { be_clear_vf_tvt()
1516 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | be_clear_vf_tvt()
1519 vf_cfg->privileges |= BE_PRIV_FILTMGMT; be_clear_vf_tvt()
3642 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, for_all_vfs()
3644 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { for_all_vfs()
3646 vf_cfg->privileges | for_all_vfs()
3650 vf_cfg->privileges |= BE_PRIV_FILTMGMT; for_all_vfs()
H A Dbe_cmds.c2915 /* In UMC mode FW does not return right privileges. be_cmd_get_fn_privileges()
2929 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges, be_cmd_set_fn_privileges() argument
2950 req->privileges_lancer = cpu_to_le32(privileges); be_cmd_set_fn_privileges()
2952 req->privileges = cpu_to_le32(privileges); be_cmd_set_fn_privileges()
H A Dbe.h368 u32 privileges; member in struct:be_vf_cfg
H A Dbe_cmds.h1698 u32 privileges; /* Used by BE3, SH-R */ member in struct:be_cmd_req_set_fn_privileges
2325 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges,
/linux-4.1.27/arch/mips/kernel/
H A Dprocess.c64 /* New thread loses kernel privileges. */ start_thread()
/linux-4.1.27/net/core/
H A Ddev_ioctl.c355 * privileges this function loads the module. If module loading is not
/linux-4.1.27/security/
H A Dcommoncap.c293 * cap_inode_need_killpriv - Determine if inode change affects privileges
690 * of its privilege. The call to setuid(!=0) would drop all privileges!
H A Ddevice_cgroup.c394 * This is used to make sure a child cgroup won't have more privileges
/linux-4.1.27/kernel/
H A Dsys.c318 * privileges, which is often a useful assertion to make when you are doing
455 * privileges, which is often a useful assertion to make when you are doing
530 * will allow a root program to temporarily drop privileges and be able to
/linux-4.1.27/fs/nfsd/
H A Dnfsfh.c202 /* Elevate privileges so that the lack of 'r' or 'x' nfsd_set_fh_dentry()
/linux-4.1.27/arch/ia64/include/asm/
H A Dprocessor.h325 * uid/privileges. \
/linux-4.1.27/fs/
H A Dcoredump.c675 * coredumps may be placed using root privileges, do_coredump()
/linux-4.1.27/arch/parisc/kernel/
H A Dentry.S535 /* PAGE_USER indicates the page can be read with user privileges,
1368 write/read privileges to this address.
/linux-4.1.27/drivers/gpu/drm/i915/
H A Di915_cmd_parser.c50 * granting userspace undue privileges. There are three categories of privilege.
/linux-4.1.27/fs/jfs/
H A Dnamei.c782 * does not have appropriate privileges or the implementation prohibits
/linux-4.1.27/net/vmw_vsock/
H A Daf_vsock.c513 * has necessary privileges. __vsock_bind_stream()
/linux-4.1.27/include/net/
H A Dtcp.h802 /* Algorithm can be set on socket without CAP_NET_ADMIN privileges */
/linux-4.1.27/lib/
H A Dvsprintf.c1566 * %pK and then elevates privileges before reading it. pointer()
/linux-4.1.27/mm/
H A Dmigrate.c1488 * capabilities, superuser privileges or the same SYSCALL_DEFINE6()
H A Dnommu.c1914 * cap_sys_admin is 1 if the process has admin privileges, 0 otherwise.
H A Dmempolicy.c1384 * capabilities, superuser privileges or the same SYSCALL_DEFINE4()
H A Dmmap.c148 * cap_sys_admin is 1 if the process has admin privileges, 0 otherwise.
/linux-4.1.27/drivers/tty/
H A Dtty_io.c2154 * obtain the privileges associated with having a tty as tty_open()
2159 * binaries, which should not imply full privileges on all ttys. tty_open()
/linux-4.1.27/tools/lguest/
H A Dlguest.c3376 /* If requested, drop privileges */ main()
3393 verbose("Dropping privileges completed\n"); main()
/linux-4.1.27/net/xfrm/
H A Dxfrm_user.c2438 /* All operations require privileges, even GET */ xfrm_user_rcv_msg()
/linux-4.1.27/arch/x86/kvm/
H A Demulate.c2866 * Check privileges. The three cases are task switch caused by... emulator_do_task_switch()
/linux-4.1.27/arch/tile/include/hv/
H A Dhypervisor.h768 * @param flags Context flags, denoting attributes or privileges of the

Completed in 1445 milliseconds