/linux-4.1.27/Documentation/prctl/ |
D | no_new_privs.txt | 1 The execve system call can grant a newly-started program privileges that 4 gaining these privileges as well, the kernel and user code must be 49 escalate its privileges by directly attacking setuid, setgid, and
|
D | seccomp_filter.txt | 70 run with CAP_SYS_ADMIN privileges in its namespace. If these are not 72 programs cannot be applied to child processes with greater privileges
|
/linux-4.1.27/Documentation/ |
D | kselftest.txt | 27 - note that some tests will require root privileges. 54 - note that some tests will require root privileges.
|
D | sysrq.txt | 39 allowed (by a user with admin privileges).
|
D | vfio.txt | 26 and requires root privileges to access things like PCI configuration
|
/linux-4.1.27/Documentation/trace/ |
D | mmiotrace.txt | 48 If not (requires root privileges): 53 Activate mmiotrace (requires root privileges): 69 Shut down mmiotrace (requires root privileges):
|
/linux-4.1.27/Documentation/ia64/ |
D | efirtc.txt | 89 Root privileges are required to be able to set the time of day. 122 Root privileges are required to be able to set the alarm.
|
/linux-4.1.27/security/keys/ |
D | Kconfig | 33 it is or by a process with administrative privileges. The active
|
/linux-4.1.27/Documentation/video4linux/ |
D | uvcvideo.txt | 132 Insufficient privileges (super user privileges are required).
|
/linux-4.1.27/Documentation/pti/ |
D | pti_intel_mid.txt | 40 privileges to successfully manipulate the ldisc drivers
|
/linux-4.1.27/Documentation/acpi/ |
D | method-customizing.txt | 71 memory and gain additional rights, if root's privileges got
|
/linux-4.1.27/Documentation/filesystems/ |
D | fuse.txt | 17 The filesystem daemon is running with the privileges of the mounting 228 A) mount owner should not be able to get elevated privileges with the 240 A) The mount owner could gain elevated privileges by either:
|
D | mandatory-locking.txt | 78 to run mandatory lock candidates with setgid privileges.
|
D | proc.txt | 1865 privileges, whether other user runs some sensitive program, whether other users
|
/linux-4.1.27/drivers/net/ethernet/emulex/benet/ |
D | be_main.c | 1493 if (vf_cfg->privileges & BE_PRIV_FILTMGMT) { in be_set_vf_tvt() 1494 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges & in be_set_vf_tvt() 1497 vf_cfg->privileges &= ~BE_PRIV_FILTMGMT; in be_set_vf_tvt() 1515 if (!(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_clear_vf_tvt() 1516 status = be_cmd_set_fn_privileges(adapter, vf_cfg->privileges | in be_clear_vf_tvt() 1519 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_clear_vf_tvt() 3642 status = be_cmd_get_fn_privileges(adapter, &vf_cfg->privileges, in be_vf_setup() 3644 if (!status && !(vf_cfg->privileges & BE_PRIV_FILTMGMT)) { in be_vf_setup() 3646 vf_cfg->privileges | in be_vf_setup() 3650 vf_cfg->privileges |= BE_PRIV_FILTMGMT; in be_vf_setup()
|
D | be.h | 368 u32 privileges; member
|
D | be_cmds.h | 1698 u32 privileges; /* Used by BE3, SH-R */ member 2325 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges,
|
D | be_cmds.c | 2929 int be_cmd_set_fn_privileges(struct be_adapter *adapter, u32 privileges, in be_cmd_set_fn_privileges() argument 2950 req->privileges_lancer = cpu_to_le32(privileges); in be_cmd_set_fn_privileges() 2952 req->privileges = cpu_to_le32(privileges); in be_cmd_set_fn_privileges()
|
/linux-4.1.27/Documentation/s390/ |
D | monreader.txt | 75 DCSS if your z/VM doesn't have one already, you need Class E privileges to
|
D | Debugging390.txt | 1479 If you have a guest with certain privileges you may be able to see devices
|
/linux-4.1.27/Documentation/security/ |
D | credentials.txt | 122 'group' and 'other'), each of which may be granted certain privileges 270 extra privileges, based on the annotations on the executable file.
|
/linux-4.1.27/tools/power/cpupower/po/ |
D | de.po | 224 msgid "Subcommand %s needs root privileges\n" 778 msgid "Intel's performance bias setting needs root privileges\n"
|
D | cs.po | 229 msgid "Subcommand %s needs root privileges\n" 767 msgid "Intel's performance bias setting needs root privileges\n"
|
D | it.po | 224 msgid "Subcommand %s needs root privileges\n" 776 msgid "Intel's performance bias setting needs root privileges\n"
|
D | fr.po | 224 msgid "Subcommand %s needs root privileges\n" 767 msgid "Intel's performance bias setting needs root privileges\n"
|
D | pt.po | 222 msgid "Subcommand %s needs root privileges\n" 778 msgid "Intel's performance bias setting needs root privileges\n"
|
/linux-4.1.27/Documentation/development-process/ |
D | 3.Early-stage | 28 misuse of the LSM framework (which is not intended to confer privileges
|
/linux-4.1.27/drivers/staging/speakup/ |
D | spkguide.txt | 158 which require root privileges. 648 Both require root privileges. 653 /etc/rc.d. Execute the following command with root privileges: 1125 root privileges. 1152 This script needs root privileges to run, so if it is not installed as 1171 Note that talkwith must always be executed with root privileges.
|
/linux-4.1.27/scripts/ |
D | spelling.txt | 728 priviledges||privileges
|
/linux-4.1.27/Documentation/vm/ |
D | hugetlbpage.txt | 57 privileges can dynamically allocate more or free some persistent huge pages
|
/linux-4.1.27/Documentation/ioctl/ |
D | hdio.txt | 531 privileges.
|
/linux-4.1.27/Documentation/powerpc/ |
D | hvcs.txt | 436 setup a session on your machine with the console group privileges. As
|
/linux-4.1.27/Documentation/laptops/ |
D | laptop-mode.txt | 433 echo "You do not have enough privileges to enable laptop_mode." >&2
|
/linux-4.1.27/Documentation/sysctl/ |
D | kernel.txt | 376 %pK will be replaced with 0's regardless of privileges.
|
/linux-4.1.27/drivers/staging/comedi/ |
D | Kconfig | 30 be requested by a userspace program without root privileges.
|
/linux-4.1.27/Documentation/networking/ |
D | filter.txt | 34 setup a socket, attach a filter, lock it then drop privileges and be
|
/linux-4.1.27/Documentation/virtual/uml/ |
D | UserModeLinux-HOWTO.txt | 855 requires root privileges. 926 exploit the helper's root privileges.
|
/linux-4.1.27/init/ |
D | Kconfig | 270 process_vm_writev which allow a process with the correct privileges
|