Home
last modified time | relevance | path

Searched refs:privileges (Results 1 – 38 of 38) sorted by relevance

/linux-4.1.27/Documentation/prctl/
Dno_new_privs.txt1 The execve system call can grant a newly-started program privileges that
4 gaining these privileges as well, the kernel and user code must be
49 escalate its privileges by directly attacking setuid, setgid, and
Dseccomp_filter.txt70 run with CAP_SYS_ADMIN privileges in its namespace. If these are not
72 programs cannot be applied to child processes with greater privileges
/linux-4.1.27/Documentation/
Dkselftest.txt27 - note that some tests will require root privileges.
54 - note that some tests will require root privileges.
Dsysrq.txt39 allowed (by a user with admin privileges).
Dvfio.txt26 and requires root privileges to access things like PCI configuration
/linux-4.1.27/Documentation/trace/
Dmmiotrace.txt48 If not (requires root privileges):
53 Activate mmiotrace (requires root privileges):
69 Shut down mmiotrace (requires root privileges):
/linux-4.1.27/Documentation/ia64/
Defirtc.txt89 Root privileges are required to be able to set the time of day.
122 Root privileges are required to be able to set the alarm.
/linux-4.1.27/security/keys/
DKconfig33 it is or by a process with administrative privileges. The active
/linux-4.1.27/Documentation/video4linux/
Duvcvideo.txt132 Insufficient privileges (super user privileges are required).
/linux-4.1.27/Documentation/pti/
Dpti_intel_mid.txt40 privileges to successfully manipulate the ldisc drivers
/linux-4.1.27/Documentation/acpi/
Dmethod-customizing.txt71 memory and gain additional rights, if root's privileges got
/linux-4.1.27/Documentation/filesystems/
Dfuse.txt17 The filesystem daemon is running with the privileges of the mounting
228 A) mount owner should not be able to get elevated privileges with the
240 A) The mount owner could gain elevated privileges by either:
Dmandatory-locking.txt78 to run mandatory lock candidates with setgid privileges.
Dproc.txt1865 privileges, whether other user runs some sensitive program, whether other users
/linux-4.1.27/drivers/net/ethernet/emulex/benet/
Dbe_main.c1493 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt()
1494 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt()
1497 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt()
1515 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt()
1516 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt()
1519 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt()
3642 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup()
3644 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup()
3646 vf_cfg->privileges | in be_vf_setup()
3650 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
Dbe.h368 u32 privileges; member
Dbe_cmds.h1698 u32 privileges; /* Used by BE3, SH-R */ member
2325 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges,
Dbe_cmds.c2929 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges, in be_cmd_set_fn_privileges() argument
2950 req->privileges_lancer = cpu_to_le32(privileges); in be_cmd_set_fn_privileges()
2952 req->privileges = cpu_to_le32(privileges); in be_cmd_set_fn_privileges()
/linux-4.1.27/Documentation/s390/
Dmonreader.txt75 DCSS if your z/VM doesn't have one already, you need Class E privileges to
DDebugging390.txt1479 If you have a guest with certain privileges you may be able to see devices
/linux-4.1.27/Documentation/security/
Dcredentials.txt122 'group' and 'other'), each of which may be granted certain privileges
270 extra privileges, based on the annotations on the executable file.
/linux-4.1.27/tools/power/cpupower/po/
Dde.po224 msgid "Subcommand %s needs root privileges\n"
778 msgid "Intel's performance bias setting needs root privileges\n"
Dcs.po229 msgid "Subcommand %s needs root privileges\n"
767 msgid "Intel's performance bias setting needs root privileges\n"
Dit.po224 msgid "Subcommand %s needs root privileges\n"
776 msgid "Intel's performance bias setting needs root privileges\n"
Dfr.po224 msgid "Subcommand %s needs root privileges\n"
767 msgid "Intel's performance bias setting needs root privileges\n"
Dpt.po222 msgid "Subcommand %s needs root privileges\n"
778 msgid "Intel's performance bias setting needs root privileges\n"
/linux-4.1.27/Documentation/development-process/
D3.Early-stage28 misuse of the LSM framework (which is not intended to confer privileges
/linux-4.1.27/drivers/staging/speakup/
Dspkguide.txt158 which require root privileges.
648 Both require root privileges.
653 /etc/rc.d. Execute the following command with root privileges:
1125 root privileges.
1152 This script needs root privileges to run, so if it is not installed as
1171 Note that talkwith must always be executed with root privileges.
/linux-4.1.27/scripts/
Dspelling.txt728 priviledges||privileges
/linux-4.1.27/Documentation/vm/
Dhugetlbpage.txt57 privileges can dynamically allocate more or free some persistent huge pages
/linux-4.1.27/Documentation/ioctl/
Dhdio.txt531 privileges.
/linux-4.1.27/Documentation/powerpc/
Dhvcs.txt436 setup a session on your machine with the console group privileges. As
/linux-4.1.27/Documentation/laptops/
Dlaptop-mode.txt433 echo "You do not have enough privileges to enable laptop_mode." >&2
/linux-4.1.27/Documentation/sysctl/
Dkernel.txt376 %pK will be replaced with 0's regardless of privileges.
/linux-4.1.27/drivers/staging/comedi/
DKconfig30 be requested by a userspace program without root privileges.
/linux-4.1.27/Documentation/networking/
Dfilter.txt34 setup a socket, attach a filter, lock it then drop privileges and be
/linux-4.1.27/Documentation/virtual/uml/
DUserModeLinux-HOWTO.txt855 requires root privileges.
926 exploit the helper's root privileges.
/linux-4.1.27/init/
DKconfig270 process_vm_writev which allow a process with the correct privileges